id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1502.07565
Xiaofu Wu Dr
Xiaofu Wu, Zhen Yan, Cong Ling, Xiang-Gen Xia
Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission
33 pages, 13 figures, submitted for possible publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, we have developed a PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS) for independent multicarrier transmission. In this paper, we make a further step by proposing a novel artificial-noise-aided PHY-PCRAS (ANA-PHY-PCRAS) for practical orthogonal frequency division multiplexing (OFDM) transmission, where the Tikhonov-distributed artificial noise is introduced to interfere with the phase-modulated key for resisting potential key-recovery attacks whenever a static channel between two legitimate users is unfortunately encountered. Then, we address various practical issues for ANA-PHY-PCRAS with OFDM transmission, including correlation among subchannels, imperfect carrier and timing recoveries. Among them, we show that the effect of sampling offset is very significant and a search procedure in the frequency domain should be incorporated for verification. With practical OFDM transmission, the number of uncorrelated subchannels is often not sufficient. Hence, we employ a time-separated approach for allocating enough subchannels and a modified ANA-PHY-PCRAS is proposed to alleviate the discontinuity of channel phase at far-separated time slots. Finally, the key equivocation is derived for the worst case scenario. We conclude that the enhanced security of ANA-PHY-PCRAS comes from the uncertainty of both the wireless channel and introduced artificial noise, compared to the traditional challenge-response authentication scheme implemented at the upper layer.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 14:16:51 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2016 23:30:40 GMT" } ]
2016-02-19T00:00:00
[ [ "Wu", "Xiaofu", "" ], [ "Yan", "Zhen", "" ], [ "Ling", "Cong", "" ], [ "Xia", "Xiang-Gen", "" ] ]
new_dataset
0.992307
1602.05925
Scott Purdy
Scott Purdy
Encoding Data for HTM Systems
null
null
null
null
cs.NE q-bio.NC
http://creativecommons.org/licenses/by/4.0/
Hierarchical Temporal Memory (HTM) is a biologically inspired machine intelligence technology that mimics the architecture and processes of the neocortex. In this white paper we describe how to encode data as Sparse Distributed Representations (SDRs) for use in HTM systems. We explain several existing encoders, which are available through the open source project called NuPIC, and we discuss requirements for creating encoders for new types of data.
[ { "version": "v1", "created": "Thu, 18 Feb 2016 19:56:39 GMT" } ]
2016-02-19T00:00:00
[ [ "Purdy", "Scott", "" ] ]
new_dataset
0.99723
1209.3638
Josu Doncel
Josu Doncel, Urtzi Ayesta, Konstantine Avrachenkov, Peter Jacko
Congestion Control of TCP Flows in Internet Routers by Means of Index Policy
To appear in Computer Networks
null
10.1016/j.comnet.2013.08.001
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the problem of fast and fair transmission of flows in a router, which is a fundamental issue in networks like the Internet. We model the interaction between a TCP source and a bottleneck queue with the objective of designing optimal packet admission controls in the bottleneck queue. We focus on the relaxed version of the problem obtained by relaxing the fixed buffer capacity constraint that must be satisfied at all time epoch. The relaxation allows us to reduce the multi-flow problem into a family of single-flow problems, for which we can analyze both theoretically and numerically the existence of optimal control policies of special structure. In particular, we show that for a variety of parameters, TCP flows can be optimally controlled in routers by so-called index policies, but not always by threshold policies. We have also implemented index policies in Network Simulator-3 and tested in a simple topology their applicability in real networks. The simulation results show that the index policy covers a big range of desirable properties with respect to fairness between different versions of TCP models, across users with different round-trip-time and minimum buffer required to achieve full utility of the queue.
[ { "version": "v1", "created": "Mon, 17 Sep 2012 12:42:23 GMT" }, { "version": "v2", "created": "Mon, 5 Aug 2013 14:13:08 GMT" } ]
2016-02-18T00:00:00
[ [ "Doncel", "Josu", "" ], [ "Ayesta", "Urtzi", "" ], [ "Avrachenkov", "Konstantine", "" ], [ "Jacko", "Peter", "" ] ]
new_dataset
0.998611
1406.1062
Gabriel Arrobo
Gabriel E. Arrobo, Calvin A. Perumalla, Stanley B. Hanke, Thomas P. Ketterl, Peter J. Fabri, and Richard D. Gitlin
An Innovative Wireless Cardiac Rhythm Management (iCRM) System
null
null
10.1109/WTS.2014.6835035
null
cs.CE cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a wireless Communicator to manage and enhance a Cardiac Rhythm Management System. The system includes: (1) an on-body wireless Electrocardiogram (ECG), (2) an Intracardiac Electrogram (EGM) embedded inside an Implantable Cardioverter/Defibrillator, and (3) a Communicator (with a resident Learning System). The first two devices are existing technology available in the market and are emulated using data from the Physionet database, while the Communicator was designed and implemented by our research team. The value of the information obtained by combining the information supplied by (1) and (2), presented to the Communicator, improves decision making regarding use of the actuator or other actions. Preliminary results show a high level of confidence in the decisions made by the Communicator. For example, excellent accuracy is achieved in predicting atrial arrhythmia in 8 patients using only external ECG when we used a neural network.
[ { "version": "v1", "created": "Tue, 3 Jun 2014 19:29:04 GMT" } ]
2016-02-18T00:00:00
[ [ "Arrobo", "Gabriel E.", "" ], [ "Perumalla", "Calvin A.", "" ], [ "Hanke", "Stanley B.", "" ], [ "Ketterl", "Thomas P.", "" ], [ "Fabri", "Peter J.", "" ], [ "Gitlin", "Richard D.", "" ] ]
new_dataset
0.992377
1406.1727
Gabriel Arrobo
Chao He, Yang Liu, Thomas P. Ketterl, Gabriel E. Arrobo, and Richard D. Gitlin
MIMO In Vivo
WAMICON 2014
null
10.1109/WAMICON.2014.6857757
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the performance of MIMO for in vivo environments, using ANSYS HFSS and their complete human body model, to determine the maximum data rates that can be achieved using an IEEE 802.11n system. Due to the lossy nature of the in vivo medium, achieving high data rates with reliable performance will be a challenge, especially since the in vivo antenna performance is strongly affected by near field coupling to the lossy medium and the signals levels will be limited by specified specific absorption rate (SAR) levels. We analyzed the bit error rate (BER) of a MIMO system with one pair of antennas placed in vivo and the second pair placed inside and outside the body at various distances from the in vivo antennas. The results were compared to SISO simulations and showed that by using MIMO in vivo, significant performance gain can be achieved, and at least two times the data rate can be supported with SAR limited transmit power levels, making it possible to achieve target data rates in the 100 Mbps.
[ { "version": "v1", "created": "Tue, 3 Jun 2014 05:48:36 GMT" } ]
2016-02-18T00:00:00
[ [ "He", "Chao", "" ], [ "Liu", "Yang", "" ], [ "Ketterl", "Thomas P.", "" ], [ "Arrobo", "Gabriel E.", "" ], [ "Gitlin", "Richard D.", "" ] ]
new_dataset
0.996316
1602.05559
Omar Alzubi
Hassan Hamdoun, Jafar A. Alzubi, Omar A. Alzubi and Solomon Mangeni
Key Economic and Environmental Perspectives on Sustainability in the ICT Sector
5 pages, 4 figures, Journal paper
Middle-East Journal of Scientific Research 21 (8): 1341-1345, 2014
10.5829/idosi.mejsr.2014.21.08.21709
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Telecommunication networks have become as critical to the 21st century development as were railways, roads and canals, to the 19th Century developments and is now seen as enabler to a more sustained business, environment and society as a whole. Still fascinating has been and is the exponential rate of growth in this industry. This is one sector where the next revolution is always just around the corner whether known or unknown. The telecoms industry is categorized by high rates of innovation in a rapidly changing technological environment. This in turn is associated with an immense range of sustainability concerns and challenges for the Telecoms service providers, the service users and the whole industry and its far reaching influence on other industries. This paper discusses three key aspects of such challenges namely; the question of sustainable power/energy supply for the industry when the change is resulting in increasing energy and operational cost, the exploitation of technologies advancement for sustainability and their business and environmental benefits.
[ { "version": "v1", "created": "Wed, 17 Feb 2016 20:14:20 GMT" } ]
2016-02-18T00:00:00
[ [ "Hamdoun", "Hassan", "" ], [ "Alzubi", "Jafar A.", "" ], [ "Alzubi", "Omar A.", "" ], [ "Mangeni", "Solomon", "" ] ]
new_dataset
0.997427
1504.04387
Jennifer Golbeck
Jennifer Golbeck
Benford's Law Applies To Online Social Networks
9 pages, 2 figures
null
10.1371/journal.pone.0135169
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Benford's Law states that the frequency of first digits of numbers in naturally occurring systems is not evenly distributed. Numbers beginning with a 1 occur roughly 30\% of the time, and are six times more common than numbers beginning with a 9. We show that Benford's Law applies to social and behavioral features of users in online social networks. We consider social data from five major social networks: Facebook, Twitter, Google Plus, Pinterest, and Live Journal. We show that the distribution of first significant digits of friend and follower counts for users in these systems follow Benford's Law. The same holds for the number of posts users make. We extend this to egocentric networks, showing that friend counts among the people in an individual's social network also follow the expected distribution. We discuss how this can be used to detect suspicious or fraudulent activity online and to validate datasets.
[ { "version": "v1", "created": "Thu, 16 Apr 2015 20:43:35 GMT" } ]
2016-02-17T00:00:00
[ [ "Golbeck", "Jennifer", "" ] ]
new_dataset
0.998057
1505.01723
Jichang Zhao
Yue Hu, Jichang Zhao and Junjie Wu
Emoticon-based Ambivalent Expression: A Hidden Indicator for Unusual Behaviors in Weibo
Data sets can be downloaded freely from www.datatang.com/data/47207 or http://pan.baidu.com/s/1mg67cbm. Any issues feel free to contact [email protected]
null
10.1371/journal.pone.0147079
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent decades have witnessed online social media being a big-data window for quantificationally testifying conventional social theories and exploring much detailed human behavioral patterns. In this paper, by tracing the emoticon use in Weibo, a group of hidden "ambivalent users" are disclosed for frequently posting ambivalent tweets containing both positive and negative emotions. Further investigation reveals that this ambivalent expression could be a novel indicator of many unusual social behaviors. For instance, ambivalent users with the female as the majority like to make a sound in midnights or at weekends. They mention their close friends frequently in ambivalent tweets, which attract more replies and thus serve as a more private communication way. Ambivalent users also respond differently to public affairs from others and demonstrate more interests in entertainment and sports events. Moreover, the sentiment shift of words adopted in ambivalent tweets is more evident than usual and exhibits a clear "negative to positive" pattern. The above observations, though being promiscuous seemingly, actually point to the self regulation of negative mood in Weibo, which could find its base from the emotion management theories in sociology but makes an interesting extension to the online environment. Finally, as an interesting corollary, ambivalent users are found connected with compulsive buyers and turn out to be perfect targets for online marketing.
[ { "version": "v1", "created": "Thu, 7 May 2015 14:35:31 GMT" } ]
2016-02-17T00:00:00
[ [ "Hu", "Yue", "" ], [ "Zhao", "Jichang", "" ], [ "Wu", "Junjie", "" ] ]
new_dataset
0.998885
1505.04546
Yukiko Yamauchi
Yukiko Yamauchi, Taichi Uehara, Shuji Kijima, and Masafumi Yamashita
Plane Formation by Synchronous Mobile Robots in the Three Dimensional Euclidean Space
null
null
null
null
cs.DC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Creating a swarm of mobile computing entities frequently called robots, agents or sensor nodes, with self-organization ability is a contemporary challenge in distributed computing. Motivated by this, we investigate the plane formation problem that requires a swarm of robots moving in the three dimensional Euclidean space to land on a common plane. The robots are fully synchronous and endowed with visual perception. But they do not have identifiers, nor access to the global coordinate system, nor any means of explicit communication with each other. Though there are plenty of results on the agreement problem for robots in the two dimensional plane, for example, the point formation problem, the pattern formation problem, and so on, this is the first result for robots in the three dimensional space. This paper presents a necessary and sufficient condition for fully-synchronous robots to solve the plane formation problem that does not depend on obliviousness i.e., the availability of local memory at robots. An implication of the result is somewhat counter-intuitive: The robots cannot form a plane from most of the semi-regular polyhedra, while they can form a plane from every regular polyhedron (except a regular icosahedron), whose symmetry is usually considered to be higher than any semi-regular polyhedrdon.
[ { "version": "v1", "created": "Mon, 18 May 2015 08:15:12 GMT" }, { "version": "v2", "created": "Sun, 24 May 2015 07:49:26 GMT" }, { "version": "v3", "created": "Tue, 16 Feb 2016 10:20:45 GMT" } ]
2016-02-17T00:00:00
[ [ "Yamauchi", "Yukiko", "" ], [ "Uehara", "Taichi", "" ], [ "Kijima", "Shuji", "" ], [ "Yamashita", "Masafumi", "" ] ]
new_dataset
0.988932
1601.01199
Lutz Bornmann Dr.
Andreas Thor, Werner Marx, Loet Leydesdorff, Lutz Bornmann
Introducing CitedReferencesExplorer (CRExplorer): A program for Reference Publication Year Spectroscopy with Cited References Standardization
Accepted for publication in the Journal of Informetrics
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new tool - the CitedReferencesExplorer (CRExplorer, www.crexplorer.net) - which can be used to disambiguate and analyze the cited references (CRs) of a publication set downloaded from the Web of Science (WoS). The tool is especially suitable to identify those publications which have been frequently cited by the researchers in a field and thereby to study for example the historical roots of a research field or topic. CRExplorer simplifies the identification of key publications by enabling the user to work with both a graph for identifying most frequently cited reference publication years (RPYs) and the list of references for the RPYs which have been most frequently cited. A further focus of the program is on the standardization of CRs. It is a serious problem in bibliometrics that there are several variants of the same CR in the WoS. In this study, CRExplorer is used to study the CRs of all papers published in the Journal of Informetrics. The analyses focus on the most important papers published between 1980 and 1990.
[ { "version": "v1", "created": "Wed, 6 Jan 2016 14:56:59 GMT" }, { "version": "v2", "created": "Tue, 16 Feb 2016 10:13:31 GMT" } ]
2016-02-17T00:00:00
[ [ "Thor", "Andreas", "" ], [ "Marx", "Werner", "" ], [ "Leydesdorff", "Loet", "" ], [ "Bornmann", "Lutz", "" ] ]
new_dataset
0.997672
1602.02358
Haohan Zhu
Haohan Zhu, Xianrui Meng and George Kollios
NED: An Inter-Graph Node Metric Based On Edit Distance
null
null
null
null
cs.DB cs.LG cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Node similarity is a fundamental problem in graph analytics. However, node similarity between nodes in different graphs (inter-graph nodes) has not received a lot of attention yet. The inter-graph node similarity is important in learning a new graph based on the knowledge of an existing graph (transfer learning on graphs) and has applications in biological, communication, and social networks. In this paper, we propose a novel distance function for measuring inter-graph node similarity with edit distance, called NED. In NED, two nodes are compared according to their local neighborhood structures which are represented as unordered k-adjacent trees, without relying on labels or other assumptions. Since the computation problem of tree edit distance on unordered trees is NP-Complete, we propose a modified tree edit distance, called TED*, for comparing neighborhood trees. TED* is a metric distance, as the original tree edit distance, but more importantly, TED* is polynomially computable. As a metric distance, NED admits efficient indexing, provides interpretable results, and shows to perform better than existing approaches on a number of data analysis tasks, including graph de-anonymization. Finally, the efficiency and effectiveness of NED are empirically demonstrated using real-world graphs.
[ { "version": "v1", "created": "Sun, 7 Feb 2016 11:00:03 GMT" }, { "version": "v2", "created": "Sat, 13 Feb 2016 21:14:57 GMT" }, { "version": "v3", "created": "Tue, 16 Feb 2016 04:24:07 GMT" } ]
2016-02-17T00:00:00
[ [ "Zhu", "Haohan", "" ], [ "Meng", "Xianrui", "" ], [ "Kollios", "George", "" ] ]
new_dataset
0.997744
1602.04841
Matthew Howard
R. B. Ribas Manero and J. Grewal and B. Michael and A. Shafti and K. Althoefer and J. Ll. Ribas Fernandez and M. J. Howard
Wearable Embroidered Muscle Activity Sensing Device for the Human Upper Leg
Preprint submitted to IEEE-EMBC 2016
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the last decade, running has become one of the most popular physical activities in the world. Although the benefits of running are numerous, there is a risk of Running Related Injuries (RRI) of the lower extremities. Electromyography (EMG) techniques have previously been used to study causes of RRIs, but the complexity of this technology limits its use to a laboratory setting. As running is primarily an outdoors activity, this lack of technology acts as a barrier to the study of RRIs in natural environments. This study presents a minimally invasive wearable muscle sensing device consisting of jogging leggings with embroidered surface EMG (sEMG) electrodes capable of recording muscle activity data of the quadriceps group. To test the use of the device, a proof of concept study consisting of $N=2$ runners performing a set of $5km$ running trials is presented in which the effect of running surfaces on muscle fatigue, a potential cause of RRIs, is evaluated. Results show that muscle fatigue can be analysed from the sEMG data obtained through the wearable device, and that running on soft surfaces (such as sand) may increase the likelihood of suffering from RRIs.
[ { "version": "v1", "created": "Mon, 15 Feb 2016 21:23:09 GMT" } ]
2016-02-17T00:00:00
[ [ "Manero", "R. B. Ribas", "" ], [ "Grewal", "J.", "" ], [ "Michael", "B.", "" ], [ "Shafti", "A.", "" ], [ "Althoefer", "K.", "" ], [ "Fernandez", "J. Ll. Ribas", "" ], [ "Howard", "M. J.", "" ] ]
new_dataset
0.998286
1602.04878
Clayton Davis
Clayton A Davis, Julia Heiman, Erick Janssen, Stephanie Sanders, Justin Garcia, Filippo Menczer
Kinsey Reporter: Citizen Science for Sex Research
Let's Talk About Sex (Apps) Workshop at CSCW 2015
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kinsey Reporter is a global mobile app to share, explore, and visualize anonymous data about sex. Reports are submitted via smartphone, then visualized on a website or downloaded for offline analysis. In this paper we present the major features of the Kinsey Reporter citizen science platform designed to preserve the anonymity of its contributors, and preliminary data analyses that suggest questions for future research.
[ { "version": "v1", "created": "Tue, 16 Feb 2016 01:07:32 GMT" } ]
2016-02-17T00:00:00
[ [ "Davis", "Clayton A", "" ], [ "Heiman", "Julia", "" ], [ "Janssen", "Erick", "" ], [ "Sanders", "Stephanie", "" ], [ "Garcia", "Justin", "" ], [ "Menczer", "Filippo", "" ] ]
new_dataset
0.998384
1602.05134
Nicholas Rotella
Nicholas Rotella, Sean Mason, Stefan Schaal and Ludovic Righetti
Inertial Sensor-Based Humanoid Joint State Estimation
Accepted to International Conference on Robotics and Automation (ICRA) 2016
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents methods for the determination of a humanoid robot's joint velocities and accelerations directly from link-mounted Inertial Measurement Units (IMUs) each containing a three-axis gyroscope and a three-axis accelerometer. No information about the global pose of the floating base or its links is required and precise knowledge of the link IMU poses is not necessary due to presented calibration routines. Additionally, a filter is introduced to fuse gyroscope angular velocities with joint position measurements and compensate the computed joint velocities for time-varying gyroscope biases. The resulting joint velocities are subject to less noise and delay than filtered velocities computed from numerical differentiation of joint potentiometer signals, leading to superior performance in joint feedback control as demonstrated in experiments performed on a SARCOS hydraulic humanoid.
[ { "version": "v1", "created": "Tue, 16 Feb 2016 18:43:43 GMT" } ]
2016-02-17T00:00:00
[ [ "Rotella", "Nicholas", "" ], [ "Mason", "Sean", "" ], [ "Schaal", "Stefan", "" ], [ "Righetti", "Ludovic", "" ] ]
new_dataset
0.999413
1501.04344
Dmitry Zakablukov
Dmitry V. Zakablukov
Asymptotic bounds of depth for a reversible circuit consisting of NOT, CNOT and 2-CNOT gates
In Russian, 14 pages, 4 figures
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper discusses the asymptotic depth of a reversible circuit consisting of NOT, CNOT and 2-CNOT gates. Reversible circuit depth function $D(n, q)$ for a circuit implementing a transformation $f\colon \mathbb Z_2^n \to \mathbb Z_2^n$ is introduced as a function of $n$ and the number of additional inputs $q$. It is proved that for the case of implementing a permutation from $A(\mathbb Z_2^n)$ with a reversible circuit having no additional inputs the depth is bounded as $D(n, 0) \gtrsim 2^n / (3\log_2 n)$. It is proved that for the case of implementing a transformation $f\colon \mathbb Z_2^n \to \mathbb Z_2^n$ with a reversible circuit having $q_0 \sim 2^n$ additional inputs the depth is bounded as $D(n, q_0) \lesssim 3n$.
[ { "version": "v1", "created": "Sun, 18 Jan 2015 20:39:52 GMT" }, { "version": "v2", "created": "Sat, 13 Feb 2016 10:11:01 GMT" } ]
2016-02-16T00:00:00
[ [ "Zakablukov", "Dmitry V.", "" ] ]
new_dataset
0.990984
1507.01981
Wei Quan Lim
Wei Quan Lim, Seth Gilbert, Wei Zhong Lim
Dynamic Reallocation Problems in Scheduling
29 pages; updated references and other minor changes
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we look at the problem of scheduling tasks on a single-processor system, where each task requires unit time and must be scheduled within a certain time window, and each task can be added to or removed from the system at any time. On each operation, the system is allowed to reschedule any tasks, but the goal is to minimize the number of rescheduled tasks. Our main result is an allocator that maintains a valid schedule for all tasks in the system if their time windows have constant size and reschedules O(1/{\epsilon}*log(1/{\epsilon})) tasks on each insertion as {\epsilon}->0, where {\epsilon} is a certain measure of the schedule flexibility of the system. We also show that it is optimal for any allocator that works on arbitrary instances. We also briefly mention a few variants of the problem, such as if the tasks have time windows of difference sizes, for which we have an allocator that we conjecture reschedules only 1 task on each insertion if the schedule flexibility remains above a certain threshold.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 22:28:39 GMT" }, { "version": "v2", "created": "Mon, 15 Feb 2016 18:07:17 GMT" } ]
2016-02-16T00:00:00
[ [ "Lim", "Wei Quan", "" ], [ "Gilbert", "Seth", "" ], [ "Lim", "Wei Zhong", "" ] ]
new_dataset
0.997034
1510.07246
Anne-Kathrin Schmuck
Anne-Kathrin Schmuck, Rupak Majumdar
Dynamic Hierarchical Reactive Controller Synthesis
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the formal approach to reactive controller synthesis, a symbolic controller for a possibly hybrid system is obtained by algorithmically computing a winning strategy in a two-player game. Such game-solving algorithms scale poorly as the size of the game graph increases. However, in many applications, the game graph has a natural hierarchical structure. In this paper, we propose a modeling formalism and a synthesis algorithm that exploits this hierarchical structure for more scalable synthesis. We define local games on hierarchical graphs as a modeling formalism which decomposes a large-scale reactive synthesis problem in two dimensions. First, the construction of a hierarchical game graph introduces abstraction layers, where each layer is again a two-player game graph. Second, every such layer is decomposed into multiple local game graphs, each corresponding to a node in the higher level game graph. While local games have the potential to reduce the state space for controller synthesis, they lead to more complex synthesis problems where strategies computed for one local game can impose additional requirements on lower-level local games. Our second contribution is a procedure to construct a dynamic controller for local game graphs over hierarchies. The controller computes assume-admissible winning strategies that satisfy local specifications in the presence of environment assumptions, and dynamically updates specifications and strategies due to interactions between games at different abstraction layers at each step of the play. We show that our synthesis procedure is sound: the controller constructs a play which satisfies all local specifications. We illustrate our results through an example controlling an autonomous robot in a known, multistory building.
[ { "version": "v1", "created": "Sun, 25 Oct 2015 13:46:40 GMT" }, { "version": "v2", "created": "Mon, 15 Feb 2016 15:37:39 GMT" } ]
2016-02-16T00:00:00
[ [ "Schmuck", "Anne-Kathrin", "" ], [ "Majumdar", "Rupak", "" ] ]
new_dataset
0.997897
1602.04210
Mohammed Al-Maqri
Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi
Adaptive Multi-polling Scheduler for QoS Support of Video Transmission in IEEE 802.11e WLANs
arXiv admin note: text overlap with arXiv:1602.03699, arXiv:1602.03886
null
10.1007/s11235-015-0020-y
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 802.11E Task Group has been established to enhance Quality of Service (QoS) provision for time-bounded services in the current IEEE 802.11 Medium Access Control (MAC) protocol. The QoS is introduced throughout Hybrid Coordination Function Controlled Channel Access (HCCA) for the rigorous QoS provision. In HCCA, the station is allocated a fixed Transmission Opportunity (TXOP) based on its TSPEC parameters so that it is efficient for Constant Bit Rate streams. However, as the profile of Variable Bit Rate (VBR) traffics is inconstant, they are liable to experience a higher delay especially in bursty traffic case. In this paper, we present a dynamic TXOP assignment algorithm called Adaptive Multi-polling TXOP scheduling algorithm (AMTXOP) for supporting the video traffics transmission over IEEE 802.11e wireless networks. This scheme invests a piggybacked information about the size of the subsequent video frames of the uplink streams to assist the Hybrid Coordinator accurately assign the TXOP according to actual change in the traffic profile. The proposed scheduler is powered by integrating multi-polling scheme to further reduce the delay and polling overhead. Extensive simulation experiments have been carried out to show the efficiency of the AMTXOP over the existing schemes in terms of the packet delay and the channel utilization.
[ { "version": "v1", "created": "Fri, 12 Feb 2016 05:09:11 GMT" } ]
2016-02-16T00:00:00
[ [ "Al-Maqri", "Mohammed A.", "" ], [ "Othman", "Mohamed", "" ], [ "Ali", "Borhanuddin Mohd", "" ], [ "Hanapi", "Zurina Mohd", "" ] ]
new_dataset
0.991586
1602.04281
Nicholas Bolten
Nicholas Bolten, Amirhossein Amini, Yun Hao, Vaishnavi Ravichandran, Andre Stephens, Anat Caspi
Urban sidewalks: visualization and routing for individuals with limited mobility
null
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People with limited mobility in the U.S. (defined as having difficulty or inability to walk a quarter of a mile without help and without the use of special equipment) face a growing informational gap: while pedestrian routing algorithms are getting faster and more informative, planning a route with a wheeled device in urban centers is very difficult due to lack of integrated pertinent information regarding accessibility along the route. Moreover, reducing access to street-spaces translates to reduced access to other public information and services that are increasingly made available to the public along urban streets. To adequately plan a commute, a traveler with limited or wheeled mobility must know whether her path may be blocked by construction, whether the sidewalk would be too steep or rendered unusable due to poor conditions, whether the street can be crossed or a highway is blocking the way, or whether there is a sidewalk at all. These details populate different datasets in many modern municipalities, but they are not immediately available in a convenient, integrated format to be useful to people with limited mobility. Our project, AccessMap, in its first phase (v.1) overlayed the information that is most relevant to people with limited mobility on a map, enabling self-planning of routes. Here, we describe the next phase of the project: synthesizing commonly available open data (including streets, sidewalks, curb ramps, elevation data, and construction permit information) to generate a graph of paths to enable variable cost-function accessible routing.
[ { "version": "v1", "created": "Sat, 13 Feb 2016 03:42:17 GMT" } ]
2016-02-16T00:00:00
[ [ "Bolten", "Nicholas", "" ], [ "Amini", "Amirhossein", "" ], [ "Hao", "Yun", "" ], [ "Ravichandran", "Vaishnavi", "" ], [ "Stephens", "Andre", "" ], [ "Caspi", "Anat", "" ] ]
new_dataset
0.987844
1602.04294
Cristian-Ioan Vasile
Cristian-Ioan Vasile, Derya Aksaray, Calin Belta
Time Window Temporal Logic
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces time window temporal logic (TWTL), a rich expressivity language for describing various time bounded specifications. In particular, the syntax and semantics of TWTL enable the compact representation of serial tasks, which are typically seen in robotics and control applications. This paper also discusses the relaxation of TWTL formulae with respect to deadlines of tasks. Efficient automata-based frameworks to solve synthesis, verification and learning problems are also presented. The key ingredient to the presented solution is an algorithm to translate a TWTL formula to an annotated finite state automaton that encodes all possible temporal relaxations of the specification. Case studies illustrating the expressivity of the logic and the proposed algorithms are included.
[ { "version": "v1", "created": "Sat, 13 Feb 2016 07:10:59 GMT" } ]
2016-02-16T00:00:00
[ [ "Vasile", "Cristian-Ioan", "" ], [ "Aksaray", "Derya", "" ], [ "Belta", "Calin", "" ] ]
new_dataset
0.999487
1602.04376
Fahad Muhammad
Muhammad Fahad
BPCMont: Business Process Change Management Ontology
5 pages, 7 Figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Change management for evolving collaborative business process development is crucial when the business logic, transections and workflow change due to changes in business strategies or organizational and technical environment. During the change implementation, business processes are analyzed and improved ensuring that they capture the proposed change and they do not contain any undesired functionalities or change side-effects. This paper presents Business Process Change Management approach for the efficient and effective implementation of change in the business process. The key technology behind our approach is our proposed Business Process Change Management Ontology (BPCMont) which is the main contribution of this paper. BPCMont, as a formalized change specification, helps to revert BP into a consistent state in case of system crash, intermediate conflicting stage or unauthorized change done, aid in change traceability in the new and old versions of business processes, change effects can be seen and estimated effectively, ease for Stakeholders to validate and verify change implementation, etc.
[ { "version": "v1", "created": "Sat, 13 Feb 2016 20:27:44 GMT" } ]
2016-02-16T00:00:00
[ [ "Fahad", "Muhammad", "" ] ]
new_dataset
0.998644
1602.04568
Bruno Woltzenlogel Paleo
John Slaney, Bruno Woltzenlogel Paleo
Conflict Resolution: a First-Order Resolution Calculus with Decision Literals and Conflict-Driven Clause Learning
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper defines the (first-order) conflict resolution calculus: an extension of the resolution calculus inspired by techniques used in modern SAT-solvers. The resolution inference is restricted to (first-order) unit-propagation and the calculus is extended with a mechanism for assuming decision literals and a new inference rule for clause learning, which is a first-order generalization of the propositional conflict-driven clause learning (CDCL) procedure. The calculus is sound (because it can be simulated by natural deduction) and refutationally complete (because it can simulate resolution), and these facts are proven in detail here.
[ { "version": "v1", "created": "Mon, 15 Feb 2016 06:28:53 GMT" } ]
2016-02-16T00:00:00
[ [ "Slaney", "John", "" ], [ "Paleo", "Bruno Woltzenlogel", "" ] ]
new_dataset
0.999393
1602.04629
Andres Garcia-Saavedra
Ismael Gomez-Miguelez, Andres Garcia-Saavedra, Paul D. Sutton, Pablo Serrano, Cristina Cano, Douglas J. Leith
srsLTE: An Open-Source Platform for LTE Evolution and Experimentation
7 pages, 5 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with LTE Release 8. We show the potential of the srsLTE library by extending the baseline code to allow LTE transmissions in the unlicensed bands and coexistence with WiFi. We also expand previous results on this emerging research area by showing how different vendor-specific mechanisms in WiFi cards might affect coexistence.
[ { "version": "v1", "created": "Mon, 15 Feb 2016 11:10:43 GMT" } ]
2016-02-16T00:00:00
[ [ "Gomez-Miguelez", "Ismael", "" ], [ "Garcia-Saavedra", "Andres", "" ], [ "Sutton", "Paul D.", "" ], [ "Serrano", "Pablo", "" ], [ "Cano", "Cristina", "" ], [ "Leith", "Douglas J.", "" ] ]
new_dataset
0.999643
1602.03886
Mohammed Al-Maqri
Mohammed A. Al-Maqri, Mohamed Othman, Borhanuddin Mohd Ali, Zurina Mohd Hanapi
Providing Dynamic TXOP for QoS Support of Video Transmission in IEEE 802.11e WLANs
arXiv admin note: substantial text overlap with arXiv:1602.03699
null
10.4304/jnw.10.9.501-511
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The IEEE 802.11e standard introduced by IEEE 802.11 Task Group E (TGe) enhances the Quality of Service (QoS) by means of HCF Controlled Channel Access (HCCA). The scheduler of HCCA allocates Transmission Opportunities (TXOPs) to QoS-enabled Station (QSTA) based on their TS Specifications (TSPECs) negotiated at the traffic setup time so that it is only efficient for Constant Bit Rate (CBR) applications. However, Variable Bit Rate (VBR) traffics are not efficiently supported as they exhibit nondeterministic profile during the time. In this paper, we present a dynamic TXOP assignment Scheduling Algorithm for supporting the video traffics transmission over IEEE 802.11e wireless networks. This algorithm uses a piggybacked information about the size of the subsequent video frames of the uplink traffic to assist the Hybrid Coordinator accurately assign the TXOP according to the fast changes in the VBR profile. The proposed scheduling algorithm has been evaluated using simulation with different variability level video streams. The simulation results show that the proposed algorithm reduces the delay experienced by VBR traffic streams comparable to HCCA scheduler due to the accurate assignment of the TXOP which preserve the channel time for transmission.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 13:34:14 GMT" } ]
2016-02-15T00:00:00
[ [ "Al-Maqri", "Mohammed A.", "" ], [ "Othman", "Mohamed", "" ], [ "Ali", "Borhanuddin Mohd", "" ], [ "Hanapi", "Zurina Mohd", "" ] ]
new_dataset
0.99884
1602.03929
Nalin Asanka Gamagedara Arachchilage
Nalin Asanka Gamagedara Arachchilage and Melissa Cole
Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks
8 in International Journal for e-Learning Security (IJeLS), Volume 1, Issue 1/2, March/June 2011. arXiv admin note: substantial text overlap with arXiv:1511.07093
null
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance behaviour through motivation of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.
[ { "version": "v1", "created": "Fri, 12 Feb 2016 00:01:14 GMT" } ]
2016-02-15T00:00:00
[ [ "Arachchilage", "Nalin Asanka Gamagedara", "" ], [ "Cole", "Melissa", "" ] ]
new_dataset
0.995553
1602.03960
Sujay Kumar Jauhar
Sujay Kumar Jauhar, Peter Turney and Eduard Hovy
TabMCQ: A Dataset of General Knowledge Tables and Multiple-choice Questions
Keywords: Data, General Knowledge, Tables, Question Answering, MCQ, Crowd-sourcing, Mechanical Turk
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe two new related resources that facilitate modelling of general knowledge reasoning in 4th grade science exams. The first is a collection of curated facts in the form of tables, and the second is a large set of crowd-sourced multiple-choice questions covering the facts in the tables. Through the setup of the crowd-sourced annotation task we obtain implicit alignment information between questions and tables. We envisage that the resources will be useful not only to researchers working on question answering, but also to people investigating a diverse range of other applications such as information extraction, question parsing, answer type identification, and lexical semantic modelling.
[ { "version": "v1", "created": "Fri, 12 Feb 2016 03:54:43 GMT" } ]
2016-02-15T00:00:00
[ [ "Jauhar", "Sujay Kumar", "" ], [ "Turney", "Peter", "" ], [ "Hovy", "Eduard", "" ] ]
new_dataset
0.999654
1012.1288
Dohan Kim
Dohan Kim
Representations of task assignments in distributed systems using Young tableaux and symmetric groups
This is an Accepted Manuscript of an article published by Taylor & Francis Group in International Journal of Parallel, Emergent and Distributed Systems on 02/02/2015, available online: http://dx.doi.org/10.1080/17445760.2014.997729
International Journal of Parallel, Emergent and Distributed Systems 31 (2016): 152-175
10.1080/17445760.2014.997729
null
cs.DC math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach to representing task assignments for partitioned agents (respectively, tasks) in distributed systems. A partition of agents (respectively, tasks) is represented by a Young tableau, which is one of the main tools in studying symmetric groups and combinatorics. In this paper we propose a task, agent, and assignment tableau in order to represent a task assignment for partitioned agents (respectively, tasks) in a distributed system. This paper is concerned with representations of task assignments rather than finding approximate or near optimal solutions for task assignments. A Young tableau approach allows us to raise the expressiveness of partitioned agents (respectively, tasks) and their task assignments.
[ { "version": "v1", "created": "Mon, 6 Dec 2010 19:16:18 GMT" }, { "version": "v2", "created": "Sun, 10 Jul 2011 13:45:44 GMT" }, { "version": "v3", "created": "Sun, 25 Sep 2011 18:56:53 GMT" }, { "version": "v4", "created": "Wed, 1 May 2013 15:33:15 GMT" }, { "version": "v5", "created": "Thu, 11 Feb 2016 04:05:41 GMT" } ]
2016-02-12T00:00:00
[ [ "Kim", "Dohan", "" ] ]
new_dataset
0.971841
1311.2505
Giuliano La Guardia Gadioli
Giuliano G. La Guardia
On optimal constacyclic codes
arXiv admin note: text overlap with arXiv:1310.3265. Accepted for publishing in Linear Algebra and its Applications
null
null
null
cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 17:14:54 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2016 15:13:12 GMT" } ]
2016-02-12T00:00:00
[ [ "La Guardia", "Giuliano G.", "" ] ]
new_dataset
0.998914
1507.04452
Junil Choi
Junil Choi and Jianhua Mo and Robert W. Heath Jr
Near Maximum-Likelihood Detector and Channel Estimator for Uplink Multiuser Massive MIMO Systems with One-Bit ADCs
13 pages, 8 figures, 2 tables, submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In massive multiple-input multiple-output (MIMO) systems, it may not be power efficient to have a high-resolution analog-to-digital converter (ADC) for each antenna element. In this paper, a near maximum likelihood (nML) detector for uplink multiuser massive MIMO systems is proposed where each antenna is connected to a pair of one-bit ADCs, i.e., one for each real and imaginary component of the baseband signal. The exhaustive search over all the possible transmitted vectors required in the original maximum likelihood (ML) detection problem is relaxed to formulate an ML estimation problem. Then, the ML estimation problem is converted into a convex optimization problem which can be efficiently solved. Using the solution, the base station can perform simple symbol-by-symbol detection for the transmitted signals from multiple users. To further improve detection performance, we also develop a two-stage nML detector that exploits the structures of both the original ML and the proposed (one-stage) nML detectors. Numerical results show that the proposed nML detectors are efficient enough to simultaneously support multiple uplink users adopting higher-order constellations, e.g., 16 quadrature amplitude modulation. Since our detectors exploit the channel state information as part of the detection, an ML channel estimation technique with one-bit ADCs that shares the same structure with our proposed nML detector is also developed. The proposed detectors and channel estimator provide a complete low power solution for the uplink of a massive MIMO system.
[ { "version": "v1", "created": "Thu, 16 Jul 2015 05:01:30 GMT" }, { "version": "v2", "created": "Mon, 9 Nov 2015 22:54:24 GMT" }, { "version": "v3", "created": "Thu, 11 Feb 2016 00:52:45 GMT" } ]
2016-02-12T00:00:00
[ [ "Choi", "Junil", "" ], [ "Mo", "Jianhua", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.968586
1512.08168
Kazuhiro Inaba
Kazuhiro Inaba
Quick Brown Fox in Formal Languages
null
null
null
null
cs.FL
http://creativecommons.org/publicdomain/zero/1.0/
Given a finite alphabet $\Sigma$ and a deterministic finite automaton on $\Sigma$, the problem of determining whether the language recognized by the automaton contains any pangram is \NP-complete. Various other language classes and problems around pangrams are analyzed.
[ { "version": "v1", "created": "Sun, 27 Dec 2015 03:55:18 GMT" }, { "version": "v2", "created": "Fri, 8 Jan 2016 13:00:47 GMT" }, { "version": "v3", "created": "Wed, 27 Jan 2016 09:23:20 GMT" }, { "version": "v4", "created": "Fri, 5 Feb 2016 15:52:15 GMT" }, { "version": "v5", "created": "Thu, 11 Feb 2016 00:31:08 GMT" } ]
2016-02-12T00:00:00
[ [ "Inaba", "Kazuhiro", "" ] ]
new_dataset
0.997523
1602.03097
Jos Wetzels
Jos Wetzels
Open Sesame: The Password Hashing Competition and Argon2
17 pages
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 18:39:20 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2016 12:30:02 GMT" } ]
2016-02-12T00:00:00
[ [ "Wetzels", "Jos", "" ] ]
new_dataset
0.997984
1602.03586
Ross Atkins
Ross Atkins and Puck Rombach and Fiona Skerman
Guessing Numbers of Odd Cycles
16 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a given number of colours, $s$, the guessing number of a graph is the base $s$ logarithm of the size of the largest family of colourings of the vertex set of the graph such that the colour of each vertex can be determined from the colours of the vertices in its neighbourhood. An upper bound for the guessing number of the $n$-vertex cycle graph $C_n$ is $n/2$. It is known that the guessing number equals $n/2$ whenever $n$ is even or $s$ is a perfect square \cite{Christofides2011guessing}. We show that, for any given integer $s\geq 2$, if $a$ is the largest factor of $s$ less than or equal to $\sqrt{s}$, for sufficiently large odd $n$, the guessing number of $C_n$ with $s$ colours is $(n-1)/2 + \log_s(a)$. This answers a question posed by Christofides and Markstr\"{o}m in 2011 \cite{Christofides2011guessing}. We also present an explicit protocol which achieves this bound for every $n$. Linking this to index coding with side information, we deduce that the information defect of $C_n$ with $s$ colours is $(n+1)/2 - \log_s(a)$ for sufficiently large odd $n$. Our results are a generalisation of the $s=2$ case which was proven in \cite{bar2011index}.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 00:53:50 GMT" } ]
2016-02-12T00:00:00
[ [ "Atkins", "Ross", "" ], [ "Rombach", "Puck", "" ], [ "Skerman", "Fiona", "" ] ]
new_dataset
0.996145
1602.03643
Mikael Mortensen
Mikael Mortensen and Kristian Valen-Sendstad
Oasis: a high-level/high-performance open source Navier-Stokes solver
null
Computer Physics Communications, Volume 188, p 177-188, 2015
10.1016/j.cpc.2014.10.026
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Oasis is a high-level/high-performance finite element Navier-Stokes solver written from scratch in Python using building blocks from the FEniCS project (fenicsproject.org). The solver is unstructured and targets large-scale applications in complex geometries on massively parallel clusters. Oasis utilizes MPI and interfaces, through FEniCS, to the linear algebra backend PETSc. Oasis advocates a high-level, programmable user interface through the creation of highly flexible Python modules for new problems. Through the high-level Python interface the user is placed in complete control of every aspect of the solver. A version of the solver, that is using piecewise linear elements for both velocity and pressure, is shown reproduce very well the classical, spectral, turbulent channel simulations of Moser, Kim and Mansour at $Re_{\tau}=180$ [Phys. Fluids, vol 11(4), p. 964]. The computational speed is strongly dominated by the iterative solvers provided by the linear algebra backend, which is arguably the best performance any similar implicit solver using PETSc may hope for. Higher order accuracy is also demonstrated and new solvers may be easily added within the same framework.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 08:56:43 GMT" } ]
2016-02-12T00:00:00
[ [ "Mortensen", "Mikael", "" ], [ "Valen-Sendstad", "Kristian", "" ] ]
new_dataset
0.996991
1602.03706
Behzad Mirkhanzadeh
Behzad Mirkhanzadeh, Naeim Taheri, Siyavash Khorsandi
SDxVPN: A Software-Defined Solution for VPN Service Providers
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BGP/MPLS IP VPN and VPLS services are considered to be widely used in IP/MPLS networks for connecting customers' remote sites. However, service providers struggle with many challenges to provide these services. Management complexity, equipment costs, and last but not least, scalability issues emerging as the customers increase in number, are just some of these problems. Software-defined networking (SDN) is an emerging paradigm that can solve aforementioned issues using a logically centralized controller for network devices. In this paper, we propose a SDN-based solution called SDxVPN which considerably lowers the complexity of VPN service definition and management. Our method eliminates complex and costly device interactions that used to be done through several control plane protocols and enables customers to determine their service specifications, define restriction policies and even interconnect with other customers automatically without operator's intervention. We describe our prototype implementation of SDxVPN and its scalability evaluations under several representative scenarios. The results indicate the effectiveness of the proposed solution for deployment to provide large scale VPN services.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 12:46:31 GMT" } ]
2016-02-12T00:00:00
[ [ "Mirkhanzadeh", "Behzad", "" ], [ "Taheri", "Naeim", "" ], [ "Khorsandi", "Siyavash", "" ] ]
new_dataset
0.99906
1602.03722
Kai-Uwe Schmidt
Kai-Uwe Schmidt
Sequences with small correlation
Survey paper, 32 pages
Des. Codes Cryptogr. 78(1), 237-267, 2016
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The extent to which a sequence of finite length differs from a shifted version of itself is measured by its aperiodic autocorrelations. Of particular interest are sequences whose entries are 1 or -1, called binary sequences, and sequences whose entries are complex numbers of unit magnitude, called unimodular sequences. Since the 1950s, there is sustained interest in sequences with small aperiodic autocorrelations relative to the sequence length. One of the main motivations is that a sequence with small aperiodic autocorrelations is intrinsically suited for the separation of signals from noise, and therefore has natural applications in digital communications. This survey reviews the state of knowledge concerning the two central problems in this area: How small can the aperiodic autocorrelations of a binary or a unimodular sequence collectively be and how can we efficiently find the best such sequences? Since the analysis and construction of sequences with small aperiodic autocorrelations is closely tied to the (often much easier) analysis of periodic autocorrelation properties, several fundamental results on corresponding problems in the periodic setting are also reviewed.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 13:25:17 GMT" } ]
2016-02-12T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ] ]
new_dataset
0.962914
1512.02385
Yigit Ugur
Yigit Ugur, Zohaib Hassan Awan and Aydin Sezgin
Cloud Radio Access Networks with Coded Caching
5 pages, 3 figures, WSA 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A cloud radio access network (C-RAN) is considered as a candidate to meet the expectations of higher data rate de- mands in wireless networks. In C-RAN, low energy base stations (BSs) are deployed over a small geography and are allowed to connect to the cloud via finite capacity backhaul links where the information is processed. A conventional C-RAN, however, requires high capacity backhaul links, since the requested files need to be transferred first from the cloud to the BS before conveying them to the users. One approach to overcome the limitations of the backhaul links is to introduce local storage caches at the BSs, in which the popular files are stored locally in order to reduce the load of the backhaul links. Furthermore, we utilize coded caching with the goal to minimize the total network cost, i.e., the transmit power and the cost associated with the backhaul links. The initial formulation of the optimization problem for this model is non-convex. We first reformulate and then convexify the problem through some relaxation techniques. In comparison to the uncoded caching at the BSs, our results highlight the benefits associated with coded caching and show that it decreases the backhaul cost.
[ { "version": "v1", "created": "Tue, 8 Dec 2015 09:56:03 GMT" }, { "version": "v2", "created": "Wed, 10 Feb 2016 11:13:11 GMT" } ]
2016-02-11T00:00:00
[ [ "Ugur", "Yigit", "" ], [ "Awan", "Zohaib Hassan", "" ], [ "Sezgin", "Aydin", "" ] ]
new_dataset
0.980676
1602.02744
Emanuel Gluskin
Emanuel Gluskin
The physical and circuit-theoretic significance of the Memristor : Full version
23 pages, 6 figures
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is observed that the inductive and capacitive features of the memristor reflect (and are a quintessence of) such features of any resistor. The very presence of the voltage and current state variables, associated by their electrodynamics sense with electrical and magnetic fields, in the resistive characteristic v = f(i), forces any resister to accumulate some magnetic and electrostatic fields and energies around itself, i.e. L and C elements are always present. From the circuit-theoretic point of view, the role of the memristor is seen, first of all, in the elimination of the use of a unique v(i). This makes circuits with hysteresis characteristics relevant, and also suggests that the concept of memristor should influence the basic problem of definition of nonlinearity. Since the memristor mainly originates from the resistor, it was found necessary to overview some unusual cases of resistive circuits. The present opinion is that the framework of basic circuit theory and its connection with applications should be logically expanded in order to naturally include the new element.
[ { "version": "v1", "created": "Sun, 7 Feb 2016 11:52:56 GMT" }, { "version": "v2", "created": "Wed, 10 Feb 2016 16:37:43 GMT" } ]
2016-02-11T00:00:00
[ [ "Gluskin", "Emanuel", "" ] ]
new_dataset
0.997255
1510.08883
Vitaly Skachek
Hui Zhang and Vitaly Skachek
Bounds for Batch Codes with Restricted Query Size
Submitted to ISIT 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present new upper bounds on the parameters of batch codes with restricted query size. These bounds are an improvement on the Singleton bound. The techniques for derivations of these bounds are based on the ideas in the literature for codes with locality. By employing additional ideas, we obtain further improvements, which are specific for batch codes.
[ { "version": "v1", "created": "Thu, 29 Oct 2015 20:22:40 GMT" }, { "version": "v2", "created": "Tue, 9 Feb 2016 12:19:14 GMT" } ]
2016-02-10T00:00:00
[ [ "Zhang", "Hui", "" ], [ "Skachek", "Vitaly", "" ] ]
new_dataset
0.999856
1602.02831
Brian Butler
Brian K. Butler
Minimum Distances of the QC-LDPC Codes in IEEE 802 Communication Standards
Submitted to IEEE ISIT 2016. 5 pages, 2 figures, and 7 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work applies earlier results on Quasi-Cyclic (QC) LDPC codes to the codes specified in six separate IEEE 802 standards, specifying wireless communications from 54 MHz to 60 GHz. First, we examine the weight matrices specified to upper bound the codes' minimum distance independent of block length. Next, we search for the minimum distance achieved for the parity check matrices selected at each block length. Finally, solutions to the computational challenges encountered are addressed.
[ { "version": "v1", "created": "Tue, 9 Feb 2016 01:03:03 GMT" } ]
2016-02-10T00:00:00
[ [ "Butler", "Brian K.", "" ] ]
new_dataset
0.998314
1602.02982
Olve Mo
Bjorn Gustavsen and Olve Mo
Variable Transmission Voltage for Loss Minimization in Long Offshore Wind Farm AC Export Cables
To be submitted to IEEE Transactions on Power Delivery
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Connection of offshore wind farms to shore requires the use of submarine cables. In the case of long HVAC connections, the capacitive charging currents limit the transfer capability and lead to high losses. This paper shows that the losses can be substantially reduced by continuously adjusting the cable operating voltage according to the instantaneous wind farm power production.Calculations for a 320 MW windfarm connected to shore via a 200 km cable at 220 kV nominal voltage shows that an annual loss reduction of 9 percent is achievable by simply using a 15 percent tap changer voltage regulation on the two transformers. Allowing a larger voltage regulation range leads to further loss reduction (13 percent for 0.4-1.0 p.u. voltage range). If the windfarm has a low utilization factor, the loss reduction potential is demonstrated to be as high as 21 percent . The methodology can be applied without introducing new technology that needs to be developed or qualified.
[ { "version": "v1", "created": "Tue, 9 Feb 2016 13:44:03 GMT" } ]
2016-02-10T00:00:00
[ [ "Gustavsen", "Bjorn", "" ], [ "Mo", "Olve", "" ] ]
new_dataset
0.996876
1602.03084
Jing Wang
Jing Wang, Zhiyuan Yan, Hongmei Xie
Local Codes with Cooperative Repair in Distributed Storage System
null
null
null
null
cs.IT cs.DC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the research on local repair codes is mainly confined to repair the failed nodes within each repair group. But if the extreme cases occur that the entire repair group has failed, the local code stored in the failed group need to be recovered as a whole. In this paper, local codes with cooperative repair, in which the local codes are constructed based on minimum storage regeneration (MSR) codes, is proposed to achieve repairing the failed groups. Specifically, the proposed local codes with cooperative repair construct a kind of mutual interleaving structure among the parity symbols, that the parity symbols of each local code, named as distributed local parity, can be generated by the parity symbols of the MSR codes in its two adjacent local codes. Taking advantage of the structure given, the failed local groups can be repaired cooperatively by their adjacent local groups with lower repair locality, and meanwhile the minimum distance of local codes with cooperative repair is derived. Theoretical analysis and simulation experiments show that, compared with codes with local regeneration (such as MSR-local codes and MBR-local codes), the proposed local codes with cooperative repair have benefits in bandwidth overhead and repair locality for the case of local groups failure.
[ { "version": "v1", "created": "Tue, 9 Feb 2016 17:26:26 GMT" } ]
2016-02-10T00:00:00
[ [ "Wang", "Jing", "" ], [ "Yan", "Zhiyuan", "" ], [ "Xie", "Hongmei", "" ] ]
new_dataset
0.995715
1203.1450
Barak Pearlmutter
Alexey Radul and Barak A. Pearlmutter and Jeffrey Mark Siskind
AD in Fortran, Part 2: Implementation via Prepreprocessor
null
Recent Advances in Algorithmic Differentiation, Springer Lecture Notes in Computational Science and Engineering volume 87, 2012, ISBN 978-3-642-30022-6, pages 273-284
10.1007/978-3-642-30023-3_25
null
cs.PL cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an implementation of the Farfel Fortran AD extensions. These extensions integrate forward and reverse AD directly into the programming model, with attendant benefits to flexibility, modularity, and ease of use. The implementation we describe is a "prepreprocessor" that generates input to existing Fortran-based AD tools. In essence, blocks of code which are targeted for AD by Farfel constructs are put into subprograms which capture their lexical variable context, and these are closure-converted into top-level subprograms and specialized to eliminate EXTERNAL arguments, rendering them amenable to existing AD preprocessors, which are then invoked, possibly repeatedly if the AD is nested.
[ { "version": "v1", "created": "Wed, 7 Mar 2012 12:16:30 GMT" }, { "version": "v2", "created": "Thu, 8 Mar 2012 09:56:48 GMT" } ]
2016-02-09T00:00:00
[ [ "Radul", "Alexey", "" ], [ "Pearlmutter", "Barak A.", "" ], [ "Siskind", "Jeffrey Mark", "" ] ]
new_dataset
0.997777
1408.5780
Aditya Ramamoorthy
Oktay Olmez and Aditya Ramamoorthy
Fractional repetition codes with flexible repair from combinatorial designs
27 pages in IEEE two-column format. IEEE Transactions on Information Theory (to appear)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractional repetition (FR) codes are a class of regenerating codes for distributed storage systems with an exact (table-based) repair process that is also uncoded, i.e., upon failure, a node is regenerated by simply downloading packets from the surviving nodes. In our work, we present constructions of FR codes based on Steiner systems and resolvable combinatorial designs such as affine geometries, Hadamard designs and mutually orthogonal Latin squares. The failure resilience of our codes can be varied in a simple manner. We construct codes with normalized repair bandwidth ($\beta$) strictly larger than one; these cannot be obtained trivially from codes with $\beta = 1$. Furthermore, we present the Kronecker product technique for generating new codes from existing ones and elaborate on their properties. FR codes with locality are those where the repair degree is smaller than the number of nodes contacted for reconstructing the stored file. For these codes we establish a tradeoff between the local repair property and failure resilience and construct codes that meet this tradeoff. Much of prior work only provided lower bounds on the FR code rate. In our work, for most of our constructions we determine the code rate for certain parameter ranges.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 14:52:00 GMT" }, { "version": "v2", "created": "Mon, 8 Feb 2016 17:25:02 GMT" } ]
2016-02-09T00:00:00
[ [ "Olmez", "Oktay", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
new_dataset
0.998463
1410.4772
Euripides Markou
Shantanu Das, Flaminia L. Luccio, Euripides Markou
Mobile Agents Rendezvous in spite of a Malicious Agent
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the problem of rendezvous, i.e., having multiple mobile agents gather in a single node of the network. Unlike previous studies, we need to achieve rendezvous in presence of a very powerful adversary, a malicious agent that moves through the network and tries to block the honest agents and prevents them from gathering. The malicious agent is assumed to be arbitrarily fast, has full knowledge of the network and it cannot be exterminated by the honest agents. On the other hand, the honest agents are assumed to be quite weak: They are asynchronous and anonymous, they have only finite memory, they have no prior knowledge of the network and they can communicate with the other agents only when they meet at a node. Can the honest agents achieve rendezvous starting from an arbitrary configuration in spite of the malicious agent? We present some necessary conditions for solving rendezvous in spite of the malicious agent in arbitrary networks. We then focus on the ring and mesh topologies and provide algorithms to solve rendezvous. For ring networks, our algorithms solve rendezvous in all feasible instances of the problem, while we show that rendezvous is impossible for an even number of agents in unoriented rings. For the oriented mesh networks, we prove that the problem can be solved when the honest agents initially form a connected configuration without holes if and only if they can see which are the occupied nodes within a two-hops distance. To the best of our knowledge, this is the first attempt to study such a powerful and mobile fault model, in the context of mobile agents. Our model lies between the more powerful but static fault model of black holes (which can even destroy the agents), and the less powerful but mobile fault model of Byzantine agents (which can only imitate the honest agents but can neither harm nor stop them).
[ { "version": "v1", "created": "Fri, 17 Oct 2014 15:50:46 GMT" }, { "version": "v2", "created": "Mon, 8 Feb 2016 19:18:59 GMT" } ]
2016-02-09T00:00:00
[ [ "Das", "Shantanu", "" ], [ "Luccio", "Flaminia L.", "" ], [ "Markou", "Euripides", "" ] ]
new_dataset
0.998492
1507.05724
Chen Chen
Chen Chen and Daniele Enrico Asoni and David Barrera and George Danezis and Adrian Perrig
HORNET: High-speed Onion Routing at the Network Layer
14 pages, 5 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present HORNET, a system that enables high-speed end-to-end anonymous channels by leveraging next generation network architectures. HORNET is designed as a low-latency onion routing system that operates at the network layer thus enabling a wide range of applications. Our system uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate nodes. This design enables HORNET nodes to process anonymous traffic at over 93 Gb/s. HORNET can also scale as required, adding minimal processing overhead per additional anonymous channel. We discuss design and implementation details, as well as a performance and security evaluation.
[ { "version": "v1", "created": "Tue, 21 Jul 2015 06:51:44 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2016 09:15:48 GMT" }, { "version": "v3", "created": "Mon, 8 Feb 2016 10:04:30 GMT" } ]
2016-02-09T00:00:00
[ [ "Chen", "Chen", "" ], [ "Asoni", "Daniele Enrico", "" ], [ "Barrera", "David", "" ], [ "Danezis", "George", "" ], [ "Perrig", "Adrian", "" ] ]
new_dataset
0.999102
1602.02238
Daniele Quercia
Giovanni Quattrone, Davide Proserpio, Daniele Quercia, Licia Capra, Mirco Musolesi
Who Benefits from the "Sharing" Economy of Airbnb?
In Proceedings of the 26th International ACM Conference on World Wide Web (WWW), 2016
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sharing economy platforms have become extremely popular in the last few years, and they have changed the way in which we commute, travel, and borrow among many other activities. Despite their popularity among consumers, such companies are poorly regulated. For example, Airbnb, one of the most successful examples of sharing economy platform, is often criticized by regulators and policy makers. While, in theory, municipalities should regulate the emergence of Airbnb through evidence-based policy making, in practice, they engage in a false dichotomy: some municipalities allow the business without imposing any regulation, while others ban it altogether. That is because there is no evidence upon which to draft policies. Here we propose to gather evidence from the Web. After crawling Airbnb data for the entire city of London, we find out where and when Airbnb listings are offered and, by matching such listing information with census and hotel data, we determine the socio-economic conditions of the areas that actually benefit from the hospitality platform. The reality is more nuanced than one would expect, and it has changed over the years. Airbnb demand and offering have changed over time, and traditional regulations have not been able to respond to those changes. That is why, finally, we rely on our data analysis to envision regulations that are responsive to real-time demands, contributing to the emerging idea of "algorithmic regulation".
[ { "version": "v1", "created": "Sat, 6 Feb 2016 11:19:51 GMT" } ]
2016-02-09T00:00:00
[ [ "Quattrone", "Giovanni", "" ], [ "Proserpio", "Davide", "" ], [ "Quercia", "Daniele", "" ], [ "Capra", "Licia", "" ], [ "Musolesi", "Mirco", "" ] ]
new_dataset
0.963297
1602.02396
Wouter Bokslag
Wouter Bokslag
The problem of popular primes: Logjam
9 pages, 1 figures
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
This paper will discuss the Logjam attack on TLS. The Logjam attack allows, under certain conditions, to defeat the security provided by TLS. This is done by manipulating server and client into using weak and deprecated export grade crypto, and subsequently breaking the Diffie-Hellman key exchange. We explore how the attack works conceptually and how exactly TLS is vulnerable to this attack. Also, the conditions under which the attack can be mounted are discussed, and an estimate of the impact of the attack is presented. Lastly, several mitigations are presented.
[ { "version": "v1", "created": "Sun, 7 Feb 2016 17:48:20 GMT" } ]
2016-02-09T00:00:00
[ [ "Bokslag", "Wouter", "" ] ]
new_dataset
0.977394
1602.02506
Thomas Steiner
Thomas Steiner
Wikipedia Tools for Google Spreadsheets
4 pages, 3 Listings, 4 figures
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce the Wikipedia Tools for Google Spreadsheets. Google Spreadsheets is part of a free, Web-based software office suite offered by Google within its Google Docs service. It allows users to create and edit spreadsheets online, while collaborating with other users in realtime. Wikipedia is a free-access, free-content Internet encyclopedia, whose content and data is available, among other means, through an API. With the Wikipedia Tools for Google Spreadsheets, we have created a toolkit that facilitates working with Wikipedia data from within a spreadsheet context. We make these tools available as open-source on GitHub [https://github.com/tomayac/wikipedia-tools-for-google-spreadsheets], released under the permissive Apache 2.0 license.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 09:40:43 GMT" } ]
2016-02-09T00:00:00
[ [ "Steiner", "Thomas", "" ] ]
new_dataset
0.99366
1602.02610
Petr Golovach
R\'emy Belmonte, Fedor V. Fomin, Petr A. Golovach, and M. S. Ramanujan
Metric Dimension of Bounded Tree-length Graphs
null
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of resolving sets in a graph was introduced by Slater (1975) and Harary and Melter (1976) as a way of uniquely identifying every vertex in a graph. A set of vertices in a graph is a resolving set if for any pair of vertices x and y there is a vertex in the set which has distinct distances to x and y. A smallest resolving set in a graph is called a metric basis and its size, the metric dimension of the graph. The problem of computing the metric dimension of a graph is a well-known NP-hard problem and while it was known to be polynomial time solvable on trees, it is only recently that efforts have been made to understand its computational complexity on various restricted graph classes. In recent work, Foucaud et al. (2015) showed that this problem is NP-complete even on interval graphs. They complemented this result by also showing that it is fixed-parameter tractable (FPT) parameterized by the metric dimension of the graph. In this work, we show that this FPT result can in fact be extended to all graphs of bounded tree-length. This includes well-known classes like chordal graphs, AT-free graphs and permutation graphs. We also show that this problem is FPT parameterized by the modular-width of the input graph.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 15:40:03 GMT" } ]
2016-02-09T00:00:00
[ [ "Belmonte", "Rémy", "" ], [ "Fomin", "Fedor V.", "" ], [ "Golovach", "Petr A.", "" ], [ "Ramanujan", "M. S.", "" ] ]
new_dataset
0.987358
1602.02665
Bruno Gon\c{c}alves
Johan Bollen, Bruno Gon\c{c}alves, Ingrid van de Leemput, Guangchen Ruan
The happiness paradox: your friends are happier than you
15 pages, 3 figures, 2 tables
null
null
null
cs.SI cs.CL cs.HC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most individuals in social networks experience a so-called Friendship Paradox: they are less popular than their friends on average. This effect may explain recent findings that widespread social network media use leads to reduced happiness. However the relation between popularity and happiness is poorly understood. A Friendship paradox does not necessarily imply a Happiness paradox where most individuals are less happy than their friends. Here we report the first direct observation of a significant Happiness Paradox in a large-scale online social network of $39,110$ Twitter users. Our results reveal that popular individuals are indeed happier and that a majority of individuals experience a significant Happiness paradox. The magnitude of the latter effect is shaped by complex interactions between individual popularity, happiness, and the fact that users cluster assortatively by level of happiness. Our results indicate that the topology of online social networks and the distribution of happiness in some populations can cause widespread psycho-social effects that affect the well-being of billions of individuals.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 17:46:18 GMT" } ]
2016-02-09T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Gonçalves", "Bruno", "" ], [ "van de Leemput", "Ingrid", "" ], [ "Ruan", "Guangchen", "" ] ]
new_dataset
0.996158
1602.02695
Michel Raynal
Achour Most\'efaoui (LINA), Michel Raynal (ASAP)
Two-Bit Messages are Sufficient to Implement Atomic Read/Write Registers in Crash-prone Systems
null
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Atomic registers are certainly the most basic objects of computing science. Their implementation on top of an n-process asynchronous message-passing system has received a lot of attention. It has been shown that t \textless{} n/2 (where t is the maximal number of processes that may crash) is a necessary and sufficient requirement to build an atomic register on top of a crash-prone asynchronous message-passing system. Considering such a context, this paper presents an algorithm which implements a single-writer multi-reader atomic register with four message types only, and where no message needs to carry control information in addition to its type. Hence, two bits are sufficient to capture all the control information carried by all the implementation messages. Moreover, the messages of two types need to carry a data value while the messages of the two other types carry no value at all. As far as we know, this algorithm is the first with such an optimality property on the size of control information carried by messages. It is also particularly efficient from a time complexity point of view.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 19:06:03 GMT" } ]
2016-02-09T00:00:00
[ [ "Mostéfaoui", "Achour", "", "LINA" ], [ "Raynal", "Michel", "", "ASAP" ] ]
new_dataset
0.998391
1602.02704
Mario Blaum
Mario Blaum and Steven R. Hetzler
Integrated Interleaved Codes as Locally Recoverable Codes: Properties and Performance
24 pages, 5 figures and 3 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Considerable interest has been paid in recent literature to codes combining local and global properties for erasure correction. Applications are in cloud type of implementations, in which fast recovery of a failed storage device is important, but additional protection is required in order to avoid data loss, and in RAID type of architectures, in which total device failures coexist with silent failures at the page or sector level in each device. Existing solutions to these problems require in general relatively large finite fields. The techniques of Integrated Interleaved Codes (which are closely related to Generalized Concatenated Codes) are proposed to reduce significantly the size of the finite field, and it is shown that when the parameters of these codes are judiciously chosen, their performance may be competitive with the one of codes optimizing the minimum distance.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 19:21:52 GMT" } ]
2016-02-09T00:00:00
[ [ "Blaum", "Mario", "" ], [ "Hetzler", "Steven R.", "" ] ]
new_dataset
0.998151
1006.5024
Jacob Biehl
Jacob T. Biehl, Thea Turner, Pernilla Quarfordt, Bill van Melle, Tony Dunnigan, Gene Golovchinsky
MyUnity: Building Awareness and Fostering Community in the Workplace
This paper has been withdrawn to comply with revised corporate policies
null
null
FXPAL-TR-09-021
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Successful collaboration depends on effective communication. Ongoing group awareness facilitates communication by enabling workers to be more informed about their collaborators, about their activities, and about the interpersonal dependencies among people working together. In this paper we present MyUnity, a new system that aids workers in building group awareness. The system uses multiple sources, both automatic and user-provided, to report colleagues' location, availability, current tasks, and preferred communication channels. Information is aggregated, fused and presented as a simple presence state for each worker. Workers can each independently control what information is collected by the system, allowing them to participate in the system without compromising their privacy. Results from a four-week field study show MyUnity increased group awareness and fostered an increased sense of community in the workplace. Results provide insights into the utility of awareness systems in the workplace.
[ { "version": "v1", "created": "Fri, 25 Jun 2010 17:01:37 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2016 21:19:07 GMT" } ]
2016-02-08T00:00:00
[ [ "Biehl", "Jacob T.", "" ], [ "Turner", "Thea", "" ], [ "Quarfordt", "Pernilla", "" ], [ "van Melle", "Bill", "" ], [ "Dunnigan", "Tony", "" ], [ "Golovchinsky", "Gene", "" ] ]
new_dataset
0.988728
1510.05216
Tiark Rompf
Tiark Rompf, Nada Amin
From F to DOT: Type Soundness Proofs with Definitional Interpreters
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scala's type system unifies ML modules, object-oriented, and functional programming. The Dependent Object Types (DOT) family of calculi has been proposed as a new foundation for Scala and similar languages. Unfortunately, it is not clear how DOT relates to any well-known type systems, and type soundness has only been established for very restricted subsets. In fact, important Scala features are known to break at least one key metatheoretic property such as environment narrowing or subtyping transitivity, which are usually required for a type soundness proof. First, and, perhaps surprisingly, we show how rich DOT calculi can still be proved sound. The key insight is that narrowing and subtyping transitivity only need to hold for runtime objects, but not for code that is never executed. Alas, the dominant method of proving type soundness, Wright and Felleisen's syntactic approach, is based on term rewriting, which does not a priori make a distinction between runtime and type assignment time. Second, we demonstrate how type soundness can be proved for advanced, polymorphic, type systems with respect to high-level, definitional interpreters, implemented in Coq. We present the first mechanized soundness proof in this style for System F<: and several extensions, including mutable references. Our proofs use only simple induction: another surprising result, as the combination of big-step semantics, mutable references, and polymorphism is commonly believed to require co-inductive proof techniques. Third, we show how DOT-like calculi emerge as generalizations of F<:, exposing a rich design space of calculi with path-dependent types which we collectively call System D. Armed with insights from the definitional interpreter semantics, we also show how equivalent small-step semantics and soundness proofs in Wright-Felleisen-style can be derived for these systems.
[ { "version": "v1", "created": "Sun, 18 Oct 2015 09:53:06 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2016 21:01:58 GMT" } ]
2016-02-08T00:00:00
[ [ "Rompf", "Tiark", "" ], [ "Amin", "Nada", "" ] ]
new_dataset
0.975324
1601.04967
Ling Liu
Ling Liu and Cong Ling
Polar Codes and Polar Lattices for Independent Fading Channels
22 pages, 9 figures, extended version of ISIT 2016 submission. Some simulation results have been updated
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design polar codes and polar lattices for i.i.d. fading channels when the channel state information is only available to the receiver. For the binary input case, we propose a new design of polar codes through single-stage polarization to achieve the ergodic capacity. For the non-binary input case, polar codes are further extended to polar lattices to achieve the egodic Poltyrev capacity, i.e., the capacity without power limit. When the power constraint is taken into consideration, we show that polar lattices with lattice Gaussian shaping achieve the egodic capacity of fading channels. The coding and shaping are both explicit, and the overall complexity of encoding and decoding is $O(N \log^2 N)$.
[ { "version": "v1", "created": "Tue, 19 Jan 2016 15:55:57 GMT" }, { "version": "v2", "created": "Thu, 21 Jan 2016 10:54:23 GMT" }, { "version": "v3", "created": "Fri, 5 Feb 2016 00:32:17 GMT" } ]
2016-02-08T00:00:00
[ [ "Liu", "Ling", "" ], [ "Ling", "Cong", "" ] ]
new_dataset
0.991901
1602.00981
Oliver Bra\v{c}evac
Oliver Bra\v{c}evac and Sebastian Erdweg and Guido Salvaneschi and Mira Mezini
CPL: A Core Language for Cloud Computing -- Technical Report
Technical report accompanying the MODULARITY '16 submission
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Running distributed applications in the cloud involves deployment. That is, distribution and configuration of application services and middleware infrastructure. The considerable complexity of these tasks resulted in the emergence of declarative JSON-based domain-specific deployment languages to develop deployment programs. However, existing deployment programs unsafely compose artifacts written in different languages, leading to bugs that are hard to detect before run time. Furthermore, deployment languages do not provide extension points for custom implementations of existing cloud services such as application-specific load balancing policies. To address these shortcomings, we propose CPL (Cloud Platform Language), a statically-typed core language for programming both distributed applications as well as their deployment on a cloud platform. In CPL, application services and deployment programs interact through statically typed, extensible interfaces, and an application can trigger further deployment at run time. We provide a formal semantics of CPL and demonstrate that it enables type-safe, composable and extensible libraries of service combinators, such as load balancing and fault tolerance.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 15:48:50 GMT" }, { "version": "v2", "created": "Fri, 5 Feb 2016 19:24:30 GMT" } ]
2016-02-08T00:00:00
[ [ "Bračevac", "Oliver", "" ], [ "Erdweg", "Sebastian", "" ], [ "Salvaneschi", "Guido", "" ], [ "Mezini", "Mira", "" ] ]
new_dataset
0.99976
1602.01927
Jamil Ahmad
Zanobya N. Khan, Rashid Jalal Qureshi, and Jamil Ahmad
On Feature based Delaunay Triangulation for Palmprint Recognition
null
Journal of Platform Technology, 3(4), 9-18 (2015)
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Authentication of individuals via palmprint based biometric system is becoming very popular due to its reliability as it contains unique and stable features. In this paper, we present a novel approach for palmprint recognition and its representation. To extract the palm lines, local thresholding technique Niblack binarization algorithm is adopted. The endpoints of these lines are determined and a connection is created among them using the Delaunay triangulation thereby generating a distinct topological structure of each palmprint. Next, we extract different geometric as well as quantitative features from the triangles of the Delaunay triangulation that assist in identifying different individuals. To ensure that the proposed approach is invariant to rotation and scaling, features were made relative to topological and geometrical structure of the palmprint. The similarity of the two palmprints is computed using the weighted sum approach and compared with the k-nearest neighbor. The experimental results obtained reflect the effectiveness of the proposed approach to discriminate between different palmprint images and thus achieved a recognition rate of 90% over large databases.
[ { "version": "v1", "created": "Fri, 5 Feb 2016 05:31:41 GMT" } ]
2016-02-08T00:00:00
[ [ "Khan", "Zanobya N.", "" ], [ "Qureshi", "Rashid Jalal", "" ], [ "Ahmad", "Jamil", "" ] ]
new_dataset
0.966923
1602.02047
Elvys Linhares Pontes
Elvys Linhares Pontes
Utiliza\c{c}\~ao de Grafos e Matriz de Similaridade na Sumariza\c{c}\~ao Autom\'atica de Documentos Baseada em Extra\c{c}\~ao de Frases
Dissertation, 83 pages, in Portuguese. in Disserta\c{c}\~ao de Mestrado, Universidade Federal do Cear\'a, 2015
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The internet increased the amount of information available. However, the reading and understanding of this information are costly tasks. In this scenario, the Natural Language Processing (NLP) applications enable very important solutions, highlighting the Automatic Text Summarization (ATS), which produce a summary from one or more source texts. Automatically summarizing one or more texts, however, is a complex task because of the difficulties inherent to the analysis and generation of this summary. This master's thesis describes the main techniques and methodologies (NLP and heuristics) to generate summaries. We have also addressed and proposed some heuristics based on graphs and similarity matrix to measure the relevance of judgments and to generate summaries by extracting sentences. We used the multiple languages (English, French and Spanish), CSTNews (Brazilian Portuguese), RPM (French) and DECODA (French) corpus to evaluate the developped systems. The results obtained were quite interesting.
[ { "version": "v1", "created": "Fri, 5 Feb 2016 14:54:57 GMT" } ]
2016-02-08T00:00:00
[ [ "Pontes", "Elvys Linhares", "" ] ]
new_dataset
0.963149
1602.02148
Boudhayan Gupta
Boudhayan Gupta
A replay-attack resistant message authentication scheme using time-based keying hash functions and unique message identifiers
null
null
null
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
Hash-based message authentication codes are an extremely simple yet hugely effective construction for producing keyed message digests using shared secrets. HMACs have seen widespread use as ad-hoc digital signatures in many Internet applications. While messages signed with an HMAC are secure against sender impersonation and tampering in transit, if used alone they are susceptible to replay attacks. We propose a construction that extends HMACs to produce a keyed message digest that has a finite validity period. We then propose a message signature scheme that uses this time-dependent MAC along with an unique message identifier to calculate a set of authentication factors using which a recipient can readily detect and ignore replayed messages, thus providing perfect resistance against replay attacks. We further analyse time-based message authentication codes and show that they provide stronger security guarantees than plain HMACs, even when used independently of the aforementioned replay attack resistant message signature scheme.
[ { "version": "v1", "created": "Fri, 5 Feb 2016 20:50:53 GMT" } ]
2016-02-08T00:00:00
[ [ "Gupta", "Boudhayan", "" ] ]
new_dataset
0.991699
1511.02503
Wei Li
Wei Li, Mingquan Qiu, Zhencai Zhu, Bo Wu, Gongbo Zhou
Bearing fault diagnosis based on spectrum images of vibration signals
null
Measurement Science and Technology, Volume 27, Number 3, 2016
10.1088/0957-0233/27/3/035005
null
cs.CV cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bearing fault diagnosis has been a challenge in the monitoring activities of rotating machinery, and it's receiving more and more attention. The conventional fault diagnosis methods usually extract features from the waveforms or spectrums of vibration signals in order to realize fault classification. In this paper, a novel feature in the form of images is presented, namely the spectrum images of vibration signals. The spectrum images are simply obtained by doing fast Fourier transformation. Such images are processed with two-dimensional principal component analysis (2DPCA) to reduce the dimensions, and then a minimum distance method is applied to classify the faults of bearings. The effectiveness of the proposed method is verified with experimental data.
[ { "version": "v1", "created": "Sun, 8 Nov 2015 16:51:22 GMT" }, { "version": "v2", "created": "Sun, 20 Dec 2015 15:00:22 GMT" }, { "version": "v3", "created": "Mon, 11 Jan 2016 14:30:19 GMT" }, { "version": "v4", "created": "Wed, 3 Feb 2016 07:12:04 GMT" }, { "version": "v5", "created": "Thu, 4 Feb 2016 01:52:35 GMT" } ]
2016-02-05T00:00:00
[ [ "Li", "Wei", "" ], [ "Qiu", "Mingquan", "" ], [ "Zhu", "Zhencai", "" ], [ "Wu", "Bo", "" ], [ "Zhou", "Gongbo", "" ] ]
new_dataset
0.999667
1602.01511
Can Xiang
Chunming Tang, Can Xiang, Keqin Feng
Linear codes with a few weights from inhomogeneous quadratic functions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes with few weights have been an interesting subject of study for many years, as these codes have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, linear codes with a few weights are constructed from inhomogeneous quadratic functions over the finite field $\gf(p)$, where $p$ is an odd prime. They include some earlier linear codes as special cases. The weight distributions of these linear codes are also determined.
[ { "version": "v1", "created": "Thu, 4 Feb 2016 00:01:54 GMT" } ]
2016-02-05T00:00:00
[ [ "Tang", "Chunming", "" ], [ "Xiang", "Can", "" ], [ "Feng", "Keqin", "" ] ]
new_dataset
0.99671
1602.01545
Ching-Yi Lai
Alexei Ashikhmin and Ching-Yi Lai and Todd Brun
Correction of Data and Syndrome Errors by Stabilizer Codes
2 figures. This is a short version of our full paper (in preparation)
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Performing active quantum error correction to protect fragile quantum states highly depends on the correctness of error information--error syndromes. To obtain reliable error syndromes using imperfect physical circuits, we propose the idea of quantum data-syndrome (DS) codes that are capable of correcting both data qubits and syndrome bits errors. We study fundamental properties of quantum DS codes and provide several CSS-type code constructions of quantum DS codes.
[ { "version": "v1", "created": "Thu, 4 Feb 2016 02:56:50 GMT" } ]
2016-02-05T00:00:00
[ [ "Ashikhmin", "Alexei", "" ], [ "Lai", "Ching-Yi", "" ], [ "Brun", "Todd", "" ] ]
new_dataset
0.959998
1602.01171
EPTCS
Swen Jacobs (Saarland University, Saarbr\"ucken, Germany), Roderick Bloem (Graz University of Technology, Austria), Romain Brenguier (Universit\'e Libre de Bruxelles, Brussels, Belgium), Robert K\"onighofer (Graz University of Technology, Austria), Guillermo A. P\'erez (Universit\'e Libre de Bruxelles, Brussels, Belgium), Jean-Fran\c{c}ois Raskin (Universit\'e Libre de Bruxelles, Brussels, Belgium), Leonid Ryzhyk (NICTA, Sydney, Australia and Carnegie Mellon University, Pittsburgh, USA), Ocan Sankur (Universit\'e Libre de Bruxelles, Brussels, Belgium), Martina Seidl (Johannes-Kepler-University, Linz, Austria), Leander Tentrup (Saarland University, Saarbr\"ucken, Germany), Adam Walker (NICTA, Sydney, Australia)
The Second Reactive Synthesis Competition (SYNTCOMP 2015)
In Proceedings SYNT 2015, arXiv:1602.00786
EPTCS 202, 2016, pp. 27-57
10.4204/EPTCS.202.4
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on the design and results of the second reactive synthesis competition (SYNTCOMP 2015). We describe our extended benchmark library, with 6 completely new sets of benchmarks, and additional challenging instances for 4 of the benchmark sets that were already used in SYNTCOMP 2014. To enhance the analysis of experimental results, we introduce an extension of our benchmark format with meta-information, including a difficulty rating and a reference size for solutions. Tools are evaluated on a set of 250 benchmarks, selected to provide a good coverage of benchmarks from all classes and difficulties. We report on changes of the evaluation scheme and the experimental setup. Finally, we describe the entrants into SYNTCOMP 2015, as well as the results of our experimental evaluation. In our analysis, we emphasize progress over the tools that participated last year.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 02:49:55 GMT" } ]
2016-02-04T00:00:00
[ [ "Jacobs", "Swen", "", "Saarland University, Saarbrücken, Germany" ], [ "Bloem", "Roderick", "", "Graz University of Technology, Austria" ], [ "Brenguier", "Romain", "", "Université Libre de Bruxelles, Brussels, Belgium" ], [ "Könighofer", "Robert", "", "Graz University of Technology, Austria" ], [ "Pérez", "Guillermo A.", "", "Université\n Libre de Bruxelles, Brussels, Belgium" ], [ "Raskin", "Jean-François", "", "Université Libre de Bruxelles, Brussels, Belgium" ], [ "Ryzhyk", "Leonid", "", "NICTA,\n Sydney, Australia and Carnegie Mellon University, Pittsburgh, USA" ], [ "Sankur", "Ocan", "", "Université Libre de Bruxelles, Brussels, Belgium" ], [ "Seidl", "Martina", "", "Johannes-Kepler-University, Linz, Austria" ], [ "Tentrup", "Leander", "", "Saarland\n University, Saarbrücken, Germany" ], [ "Walker", "Adam", "", "NICTA, Sydney, Australia" ] ]
new_dataset
0.998773
1602.01173
EPTCS
Ioannis Filippidis, Richard M. Murray, Gerard J. Holzmann
A multi-paradigm language for reactive synthesis
In Proceedings SYNT 2015, arXiv:1602.00786
EPTCS 202, 2016, pp. 73-97
10.4204/EPTCS.202.6
null
cs.LO cs.PL cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a language for describing reactive synthesis problems that integrates imperative and declarative elements. The semantics is defined in terms of two-player turn-based infinite games with full information. Currently, synthesis tools accept linear temporal logic (LTL) as input, but this description is less structured and does not facilitate the expression of sequential constraints. This motivates the use of a structured programming language to specify synthesis problems. Transition systems and guarded commands serve as imperative constructs, expressed in a syntax based on that of the modeling language Promela. The syntax allows defining which player controls data and control flow, and separating a program into assumptions and guarantees. These notions are necessary for input to game solvers. The integration of imperative and declarative paradigms allows using the paradigm that is most appropriate for expressing each requirement. The declarative part is expressed in the LTL fragment of generalized reactivity(1), which admits efficient synthesis algorithms, extended with past LTL. The implementation translates Promela to input for the Slugs synthesizer and is written in Python. The AMBA AHB bus case study is revisited and synthesized efficiently, identifying the need to reorder binary decision diagrams during strategy construction, in order to prevent the exponential blowup observed in previous work.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 02:50:18 GMT" } ]
2016-02-04T00:00:00
[ [ "Filippidis", "Ioannis", "" ], [ "Murray", "Richard M.", "" ], [ "Holzmann", "Gerard J.", "" ] ]
new_dataset
0.999288
1602.01178
Tam Nguyen
Erik Cambria, Tam V. Nguyen, Brian Cheng, Kenneth Kwok, Jose Sepulveda
GECKA3D: A 3D Game Engine for Commonsense Knowledge Acquisition
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Commonsense knowledge representation and reasoning is key for tasks such as artificial intelligence and natural language understanding. Since commonsense consists of information that humans take for granted, gathering it is an extremely difficult task. In this paper, we introduce a novel 3D game engine for commonsense knowledge acquisition (GECKA3D) which aims to collect commonsense from game designers through the development of serious games. GECKA3D integrates the potential of serious games and games with a purpose. This provides a platform for the acquisition of re-usable and multi-purpose knowledge, and also enables the development of games that can provide entertainment value and teach players something meaningful about the actual world they live in.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 03:32:31 GMT" } ]
2016-02-04T00:00:00
[ [ "Cambria", "Erik", "" ], [ "Nguyen", "Tam V.", "" ], [ "Cheng", "Brian", "" ], [ "Kwok", "Kenneth", "" ], [ "Sepulveda", "Jose", "" ] ]
new_dataset
0.99872
1602.01225
Christoph Hackl
Christoph M. Hackl and Korbinian Schechner
Non-ideal torque control of wind turbine systems: Impacts on annual energy production
6 pages, 8 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss non-ideal torque control in wind turbine systems (WTS). Most high-level controllers generate a reference torque which is then send to the underlying electrical drive system (generator+inverter) of the WTS to steer the turbine/generator to its optimal operation point (depending on the wind speed). The energy production heavily depends on the mechanical power (i.e. the product of rotational speed and generator torque). However, since torque sensors in the MW range are not available or extremely expensive, the torque controllers are implemented as feedforward controllers and, therefore, are inherently sensitive to parameter variations/uncertainties. Based on real wind data and a dynamical WTS model, we discuss causes and impacts of non-ideal (feedforward) torque control on the energy production and the gross earnings.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 08:49:30 GMT" } ]
2016-02-04T00:00:00
[ [ "Hackl", "Christoph M.", "" ], [ "Schechner", "Korbinian", "" ] ]
new_dataset
0.998416
1602.01416
Hossein Shokri Ghadikolaei
Roberto Congiu and Hossein Shokri-Ghadikolaei and Carlo Fischione and Fortunato Santucci
On the Relay-Fallback Tradeoff in Millimeter Wave Wireless System
6 pages, 5 figures, accepted in IEEE INFOCOM mmNet Workshop
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave (mmWave) communications systems are promising candidate to support extremely high data rate services in future wireless networks. MmWave communications exhibit high penetration loss (blockage) and require directional transmissions to compensate for severe channel attenuations and for high noise powers. When blockage occurs, there are at least two simple prominent options: 1) switching to the conventional microwave frequencies (fallback option) and 2) using an alternative non-blocked path (relay option). However, currently it is not clear under which conditions and network parameters one option is better than the other. To investigate the performance of the two options, this paper proposes a novel blockage model that allows deriving maximum achievable throughput and delay performance of both options. A simple criterion to decide which option should be taken under which network condition is provided. By a comprehensive performance analysis, it is shown that the right option depends on the payload size, beam training overhead, and blockage probability. For a network with light traffic and low probability of blockage in the direct link, the fallback option is throughput- and delay-optimal. For a network with heavy traffic demands and semi-static topology (low beam-training overhead), the relay option is preferable.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 19:07:30 GMT" } ]
2016-02-04T00:00:00
[ [ "Congiu", "Roberto", "" ], [ "Shokri-Ghadikolaei", "Hossein", "" ], [ "Fischione", "Carlo", "" ], [ "Santucci", "Fortunato", "" ] ]
new_dataset
0.999467
1601.01289
Mirmojtaba Gharibi
Mirmojtaba Gharibi, Raouf Boutaba, Steven L. Waslander
Internet of Drones
null
null
null
null
cs.NI cs.RO
http://creativecommons.org/licenses/by/4.0/
The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes. The IoD provides generic services for various drone applications such as package delivery, traffic surveillance, search and rescue and more. In this paper, we present a conceptual model of how such an architecture can be organized and we specify the features that an IoD system based on our architecture should implement. For doing so, we extract key concepts from three existing large scale networks, namely the air traffic control network, the cellular network, and the Internet and explore their connections to our novel architecture for drone traffic management.
[ { "version": "v1", "created": "Wed, 6 Jan 2016 19:47:09 GMT" }, { "version": "v2", "created": "Tue, 2 Feb 2016 00:41:06 GMT" } ]
2016-02-03T00:00:00
[ [ "Gharibi", "Mirmojtaba", "" ], [ "Boutaba", "Raouf", "" ], [ "Waslander", "Steven L.", "" ] ]
new_dataset
0.974644
1602.00841
Dmitry Namiot
Manfred Sneps-Sneppe, Dmitry Namiot
On Physical Web models
a paper for Sibcon 2016
null
null
null
cs.CY cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Physical Web is a generic term describes interconnection of physical objects and web. The Physical Web lets present physical objects in a web. There are different ways to do that and we will discuss them in our paper. Usually, the web presentation for a physical object could be implemented with the help of mobile devices. The basic idea behind the Physical Web is to navigate and control physical objects in the world surrounding mobile devices with the help of web technologies. Of course, there are different ways to identify and enumerate physical objects. In this paper, we describe the existing models as well as related challenges. In our analysis, we will target objects enumeration and navigation as well as data retrieving and programming for the Physical Web.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 09:17:37 GMT" } ]
2016-02-03T00:00:00
[ [ "Sneps-Sneppe", "Manfred", "" ], [ "Namiot", "Dmitry", "" ] ]
new_dataset
0.999627
1602.00895
Maria Potop-Butucaru
Nesrine Khernane (NPA), Maria Potop-Butucaru (NPA), Claude Chaudet
BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
-Wireless body area network(WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in WBANs especially in multi-hop architectures. In this paper, we propose and present the design and the evaluation of a secure lightweight and energy efficient authentication scheme BANZKP based on an efficient cryptographic protocol, Zero Knowledge Proof (ZKP) and a commitment scheme. ZKP is used to confirm the identify of the sensor nodes, with small computational requirement, which is favorable for body sensors given their limited resources, while the commitment scheme is used to deal with replay attacks and hence the injection attacks by committing a message and revealing the key later. Our scheme reduces the memory requirement by 56.13 % compared to TinyZKP [13], the comparable alternative so far for Body Area Networks, and uses 10 % less energy.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 12:08:59 GMT" } ]
2016-02-03T00:00:00
[ [ "Khernane", "Nesrine", "", "NPA" ], [ "Potop-Butucaru", "Maria", "", "NPA" ], [ "Chaudet", "Claude", "" ] ]
new_dataset
0.999729
1602.00914
Fei Li
Fei Li, Yang Yan, Qiuyan Wang and Tongjiang Yan
Binary linear codes with at most 4 weights
8 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past decades, linear codes with few weights have been widely studied, since they have applications in space communications, data storage and cryptography. In this paper, a class of binary linear codes is constructed and their weight distribution is determined. Results show that they are at most 4-weight linear codes. Additionally, these codes can be used in secret sharing schemes.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 13:17:48 GMT" } ]
2016-02-03T00:00:00
[ [ "Li", "Fei", "" ], [ "Yan", "Yang", "" ], [ "Wang", "Qiuyan", "" ], [ "Yan", "Tongjiang", "" ] ]
new_dataset
0.9989
1602.00932
Georg Nawratil
Georg Nawratil and Josef Schicho
Addendum to Pentapods with Mobility 2
9 pages, 6 figures
null
null
null
cs.RO math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a foregoing publication the authors studied pentapods with mobility 2, where neither all platform anchor points nor all base anchor points are located on a line. It turned out that the given classification is incomplete. This addendum is devoted to the discussion of the missing cases resulting in additional solutions already known to Duporcq.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 14:05:11 GMT" } ]
2016-02-03T00:00:00
[ [ "Nawratil", "Georg", "" ], [ "Schicho", "Josef", "" ] ]
new_dataset
0.989411
1602.01084
Andrew Adamatzky
Alex J. L. Morgan, David A. Barrow, Andrew Adamatzky, Martin M. Hanczyc
Simple fluidic digital half-adder
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fluidic one-bit half-adder is made of five channels which intersect at a junction. Two channels are inputs, two channels are outputs and one channel is the drain. The channels direct fluid from input fragments to output fragments and the streams of fluid interact at the junctions. Binary signals are represented by water droplets introduced in the input channels: presence of a droplet in an input or output segments symbolises logical {\sc True}, absence --- {\sc False}. The droplets travel along channels by following a path of least resistance unless deflected at the junction. We demonstrate the function of the half-adder in both computer modelling and laboratory experiments, and propose a design of a one-bit full adder based on simulation.
[ { "version": "v1", "created": "Tue, 2 Feb 2016 20:59:28 GMT" } ]
2016-02-03T00:00:00
[ [ "Morgan", "Alex J. L.", "" ], [ "Barrow", "David A.", "" ], [ "Adamatzky", "Andrew", "" ], [ "Hanczyc", "Martin M.", "" ] ]
new_dataset
0.999693
1410.7041
Qiang Huo
Qiang Huo, Kun Yang, Lingyang Song, Yonghui Li, Bingli Jiao
Compressed Relaying for Two-Way Relay Networks with Correlated Sources
11 pages, 4 figures. appears in IEEE Wireless Communications Letters, 2014
IEEE Wireless Communications Letters, Vol. 4, No. 1, February 2015
10.1109/LWC.2014.2362748
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, a compressed relaying scheme via Huffman and physical-layer network coding (HPNC) is proposed for two-way relay networks with correlated sources (TWRN-CS). In the HPNC scheme, both sources first transmit the correlated raw source messages to the relay simultaneously. The relay performs physical-layer network coding (PNC) on the received symbols, compresses the PNC-coded symbols using Huffman coding, and broadcasts the compressed symbols to both source nodes. Then, each source decodes the other source's messages by using its own messages as side information. Compression rate and block error rate (BLER) of the proposed scheme are analyzed. Simulation results demonstrate that the HPNC scheme can effectively improve the network throughput, and meanwhile, achieve the superior BLER performance compared with the conventional non-compressed relaying scheme in TWRN-CS.
[ { "version": "v1", "created": "Sun, 26 Oct 2014 15:11:58 GMT" } ]
2016-02-02T00:00:00
[ [ "Huo", "Qiang", "" ], [ "Yang", "Kun", "" ], [ "Song", "Lingyang", "" ], [ "Li", "Yonghui", "" ], [ "Jiao", "Bingli", "" ] ]
new_dataset
0.990162
1512.05023
Anirudh Sivaraman Kaushalram
Anirudh Sivaraman, Mihai Budiu, Alvin Cheung, Changhoon Kim, Steve Licking, George Varghese, Hari Balakrishnan, Mohammad Alizadeh, Nick McKeown
Packet Transactions: High-level Programming for Line-Rate Switches
16 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane algorithms must be in hardware. With today's switch hardware, algorithms cannot be changed, nor new algorithms installed, after a switch has been built. This paper shows how to program data-plane algorithms in a high-level language and compile those programs into low-level microcode that can run on emerging programmable line-rate switching chipsets. The key challenge is that these algorithms create and modify algorithmic state. The key idea to achieve line-rate programmability for stateful algorithms is the notion of a packet transaction : a sequential code block that is atomic and isolated from other such code blocks. We have developed this idea in Domino, a C-like imperative language to express data-plane algorithms. We show with many examples that Domino provides a convenient and natural way to express sophisticated data-plane algorithms, and show that these algorithms can be run at line rate with modest estimated die-area overhead.
[ { "version": "v1", "created": "Wed, 16 Dec 2015 01:15:06 GMT" }, { "version": "v2", "created": "Sat, 30 Jan 2016 04:27:07 GMT" } ]
2016-02-02T00:00:00
[ [ "Sivaraman", "Anirudh", "" ], [ "Budiu", "Mihai", "" ], [ "Cheung", "Alvin", "" ], [ "Kim", "Changhoon", "" ], [ "Licking", "Steve", "" ], [ "Varghese", "George", "" ], [ "Balakrishnan", "Hari", "" ], [ "Alizadeh", "Mohammad", "" ], [ "McKeown", "Nick", "" ] ]
new_dataset
0.988909
1602.00252
Erick Stattner
Erick Stattner
Comment Diffusons-nous sur les R\'eseaux Sociaux ?
12 pages, in French. Colloque international et interdisciplinaire pour les enjeux et usages des technologies de l'information et de la communication, 2015 (EUTIC 2015)
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emergence of new communication media such as blogs, online newspapers and social networks allow us to go further in the understanding of human behavior. Indeed, these public exchange spaces are now firmly planted in our modern society and appear to be powerful sensors of social behavior and opinion movements. In this paper, we focus on information spreading and attempt to understand what are the conditions in which a person decides to speak on a subject. For this purpose, we propose a set of measures that aim to characterize the diffusion behavior. Our measures have been used on messages related to two events that took place in January 2015: presentation by Microsoft of a new virtual reality headset and the election of a political party of radical left in Greece.
[ { "version": "v1", "created": "Sun, 31 Jan 2016 14:31:20 GMT" } ]
2016-02-02T00:00:00
[ [ "Stattner", "Erick", "" ] ]
new_dataset
0.987011
1602.00307
Hatem Alismail
Hatem Alismail, Brett Browning, Simon Lucey
Bit-Planes: Dense Subpixel Alignment of Binary Descriptors
10 pages. In submission
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary descriptors have been instrumental in the recent evolution of computationally efficient sparse image alignment algorithms. Increasingly, however, the vision community is interested in dense image alignment methods, which are more suitable for estimating correspondences from high frame rate cameras as they do not rely on exhaustive search. However, classic dense alignment approaches are sensitive to illumination change. In this paper, we propose an easy to implement and low complexity dense binary descriptor, which we refer to as bit-planes, that can be seamlessly integrated within a multi-channel Lucas & Kanade framework. This novel approach combines the robustness of binary descriptors with the speed and accuracy of dense alignment methods. The approach is demonstrated on a template tracking problem achieving state-of-the-art robustness and faster than real-time performance on consumer laptops (400+ fps on a single core Intel i7) and hand-held mobile devices (100+ fps on an iPad Air 2).
[ { "version": "v1", "created": "Sun, 31 Jan 2016 19:51:11 GMT" } ]
2016-02-02T00:00:00
[ [ "Alismail", "Hatem", "" ], [ "Browning", "Brett", "" ], [ "Lucey", "Simon", "" ] ]
new_dataset
0.979513
1602.00398
Seunghoon Lee
Seunghoon Lee
A Short Note on Improved Logic Circuits in a Hexagonal Minesweeper
12 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims to present an advanced version of PP-hardness proof of Minesweeper by Bondt. The advancement includes improved Minesweeper configurations for 'logic circuits' in a hexagonal Minesweeper. To do so, I demonstrate logical uncertainty in Minesweeper, which ironically allows a possibility to make some Boolean operators. The fact that existing hexagonal logic circuits did not clearly distinguish the true and false signal needs an improved form of a hexagonal wire. I introduce new forms of logic circuits such as NOT, AND, OR gates, a curve and a splitter of wires. Moreover, these new logic circuits complement Bondt's proof for PP-hardness of Minesweeper by giving a new figure.
[ { "version": "v1", "created": "Mon, 1 Feb 2016 06:11:35 GMT" } ]
2016-02-02T00:00:00
[ [ "Lee", "Seunghoon", "" ] ]
new_dataset
0.990013
1602.00454
Christoph Koutschan
Christoph Koutschan and Peter Paule
Holonomic Tools for Basic Hypergeometric Functions
null
null
null
null
cs.SC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the exception of q-hypergeometric summation, the use of computer algebra packages implementing Zeilberger's "holonomic systems approach" in a broader mathematical sense is less common in the field of q-series and basic hypergeometric functions. A major objective of this article is to popularize the usage of such tools also in these domains. Concrete case studies showing software in action introduce to the basic techniques. An application highlight is a new computer-assisted proof of the celebrated Ismail-Zhang formula, an important q-analog of a classical expansion formula of plane waves in terms of Gegenbauer polynomials.
[ { "version": "v1", "created": "Mon, 1 Feb 2016 10:04:20 GMT" } ]
2016-02-02T00:00:00
[ [ "Koutschan", "Christoph", "" ], [ "Paule", "Peter", "" ] ]
new_dataset
0.968497
1602.00503
Amine Ghrab
Amine Ghrab, Oscar Romero, Sabri Skhiri, Alejandro Vaisman, Esteban Zim\'anyi
GRAD: On Graph Database Modeling
28 pages, 13 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph databases have emerged as the fundamental technology underpinning trendy application domains where traditional databases are not well-equipped to handle complex graph data. However, current graph databases support basic graph structures and integrity constraints with no standard algebra. In this paper, we introduce GRAD, a native and generic graph database model. GRAD goes beyond traditional graph database models, which support simple graph structures and constraints. Instead, GRAD presents a complete graph database model supporting advanced graph structures, a set of well-defined constraints over these structures and a powerful graph analysis-oriented algebra.
[ { "version": "v1", "created": "Mon, 1 Feb 2016 12:49:25 GMT" } ]
2016-02-02T00:00:00
[ [ "Ghrab", "Amine", "" ], [ "Romero", "Oscar", "" ], [ "Skhiri", "Sabri", "" ], [ "Vaisman", "Alejandro", "" ], [ "Zimányi", "Esteban", "" ] ]
new_dataset
0.997167
1602.00615
William Woodruff
William Woodruff
EMFS: Repurposing SMTP and IMAP for Data Storage and Synchronization
18 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud storage has become a massive and lucrative business, with companies like Apple, Microsoft, Google, and Dropbox providing hundreds of millions of clients with synchronized and redundant storage. These services often command price-to-storage ratios significantly higher than the market rate for physical storage, as well as increase the surface area for data leakage. In place of this consumer-unfriendly status quo, I propose using widely available, well standardized email protocols like SMTP and IMAP in conjunction with free email service providers to store, synchronize, and share files across discrete systems.
[ { "version": "v1", "created": "Fri, 29 Jan 2016 07:05:36 GMT" } ]
2016-02-02T00:00:00
[ [ "Woodruff", "William", "" ] ]
new_dataset
0.99426
1511.07922
Yi Zhang
Yi Zhang
Contraction of Ore Ideals with Applications
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ore operators form a common algebraic abstraction of linear ordinary differential and recurrence equations. Given an Ore operator $L$ with polynomial coefficients in $x$, it generates a left ideal $I$ in the Ore algebra over the field $\mathbf{k}(x)$ of rational functions. We present an algorithm for computing a basis of the contraction ideal of $I$ in the Ore algebra over the ring $R[x]$ of polynomials, where $R$ may be either $\mathbf{k}$ or a domain with $\mathbf{k}$ as its fraction field. This algorithm is based on recent work on desingularization for Ore operators by Chen, Jaroschek, Kauers and Singer. Using a basis of the contraction ideal, we compute a completely desingularized operator for $L$ whose leading coefficient not only has minimal degree in $x$ but also has minimal content. Completely desingularized operators have interesting applications such as certifying integer sequences and checking special cases of a conjecture of Krattenthaler.
[ { "version": "v1", "created": "Wed, 25 Nov 2015 00:15:50 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2015 21:08:36 GMT" }, { "version": "v3", "created": "Wed, 16 Dec 2015 06:54:48 GMT" }, { "version": "v4", "created": "Thu, 17 Dec 2015 08:54:06 GMT" }, { "version": "v5", "created": "Wed, 23 Dec 2015 12:07:20 GMT" }, { "version": "v6", "created": "Sun, 3 Jan 2016 02:38:59 GMT" }, { "version": "v7", "created": "Thu, 28 Jan 2016 02:47:23 GMT" }, { "version": "v8", "created": "Fri, 29 Jan 2016 03:02:20 GMT" } ]
2016-02-01T00:00:00
[ [ "Zhang", "Yi", "" ] ]
new_dataset
0.999774
1601.08154
Tiago Azevedo
Tiago Azevedo, Paulo J. M. de Ara\'ujo, Rosaldo J. F. Rossetti, Ana Paula C. Rocha
JADE, TraSMAPI and SUMO: A tool-chain for simulating traffic light control
null
Proceedings of the 8th International Workshop on Agents in Traffic and Transportation, ATT'14, held at the Thirteenth International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS'14 (2014) 8-15
10.13140/2.1.2739.4886
null
cs.MA
http://creativecommons.org/licenses/by/4.0/
Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contributes to the understanding of such complex and highly dynamic systems by proposing an open-source tool-chain to implement multi-agent-based solutions in traffic and transportation. The proposed approach relies on two very popular tools in both domains, with focus on traffic light control. This tool-chain consists in combining JADE (Java Agent DEvelopment Framework), for the implementation of multi-agent systems, with SUMO (Simulation of Urban MObility), for the microscopic simulation of traffic interactions. TraSMAPI (Traffic Simulation Manager Application Programming Interface) is used to combine JADE and SUMO allowing communication between them. A demonstration of the concept is presented to illustrate the main features of this tool-chain, using Q-Learning as the reinforcement learning method for each traffic light agent in a simulated network. Results demonstrate the feasibility of the proposed framework as a practical means to experiment with different agent-based designs of intelligent transportation solutions.
[ { "version": "v1", "created": "Fri, 29 Jan 2016 15:29:21 GMT" } ]
2016-02-01T00:00:00
[ [ "Azevedo", "Tiago", "" ], [ "de Araújo", "Paulo J. M.", "" ], [ "Rossetti", "Rosaldo J. F.", "" ], [ "Rocha", "Ana Paula C.", "" ] ]
new_dataset
0.987693
1601.08190
Nikhil Krishnan M
M. Nikhil Krishnan, P. Vijay Kumar
On MBR codes with replication
Submitted to ISIT 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An early paper by Rashmi et. al. presented the construction of an $(n,k,d=n-1)$ MBR regenerating code featuring the inherent double replication of all code symbols and repair-by-transfer (RBT), both of which are important in practice. We first show that no MBR code can contain even a single code symbol that is replicated more than twice. We then go on to present two new families of MBR codes which feature double replication of all systematic message symbols. The codes also possess a set of $d$ nodes whose contents include the message symbols and which can be repaired through help-by-transfer (HBT). As a corollary, we obtain systematic RBT codes for the case $d=(n-1)$ that possess inherent double replication of all code symbols and having a field size of $O(n)$ in comparison with the general, $O(n^2)$ field size requirement of the earlier construction by Rashmi et. al. For the cases $(k=d=n-2)$ or $(k+1=d=n-2)$, the field size can be reduced to $q=2$, and hence the codes can be binary. We also give a necessary and sufficient condition for the existence of MBR codes having double replication of all code symbols and also suggest techniques which will enable an arbitrary MBR code to be converted to one with double replication of all code symbols.
[ { "version": "v1", "created": "Fri, 29 Jan 2016 16:48:58 GMT" } ]
2016-02-01T00:00:00
[ [ "Krishnan", "M. Nikhil", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.991602
1601.08227
Irene M\'arquez-Corbella
Irene M\'arquez-Corbella and Jean-Pierre Tillich
Using Reed-Solomon codes in the $\left( U\mid U+V\right)$ construction and an application to cryptography
null
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a modification of Reed-Solomon codes that beats the Guruwami-Sudan $1-\sqrt{R}$ decoding radius of Reed-Solomon codes at low rates $R$. The idea is to choose Reed-Solomon codes $U$ and $V$ with appropriate rates in a $\left( U\mid U+V\right)$ construction and to decode them with the Koetter-Vardy soft information decoder. We suggest to use a slightly more general version of these codes (but which has the same decoding performances as the $\left( U\mid U+V\right)$-construction) for code-based cryptography, namely to build a McEliece scheme. The point is here that these codes not only perform nearly as well (or even better in the low rate regime) as Reed-Solomon codes, their structure seems to avoid the Sidelnikov-Shestakov attack which broke a previous McEliece proposal based on generalized Reed-Solomon codes.
[ { "version": "v1", "created": "Fri, 29 Jan 2016 19:30:36 GMT" } ]
2016-02-01T00:00:00
[ [ "Márquez-Corbella", "Irene", "" ], [ "Tillich", "Jean-Pierre", "" ] ]
new_dataset
0.996998
1308.3466
Frederik Mallmann-Trenn
Petra Berenbrink, Funda Erg\"un, Frederik Mallmann-Trenn, and Erfan Sadeqi Azer
Palindrome Recognition In The Streaming Model
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Palindrome Problem one tries to find all palindromes (palindromic substrings) in a given string. A palindrome is defined as a string which reads forwards the same as backwards, e.g., the string "racecar". A related problem is the Longest Palindromic Substring Problem in which finding an arbitrary one of the longest palindromes in the given string suffices. We regard the streaming version of both problems. In the streaming model the input arrives over time and at every point in time we are only allowed to use sublinear space. The main algorithms in this paper are the following: The first one is a one-pass randomized algorithm that solves the Palindrome Problem. It has an additive error and uses $O(\sqrt n$) space. The second algorithm is a two-pass algorithm which determines the exact locations of all longest palindromes. It uses the first algorithm as the first pass. The third algorithm is again a one-pass randomized algorithm, which solves the Longest Palindromic Substring Problem. It has a multiplicative error using only $O(\log(n))$ space. We also give two variants of the first algorithm which solve other related practical problems.
[ { "version": "v1", "created": "Thu, 15 Aug 2013 18:04:24 GMT" }, { "version": "v2", "created": "Wed, 9 Oct 2013 09:24:29 GMT" }, { "version": "v3", "created": "Thu, 28 Jan 2016 11:55:49 GMT" } ]
2016-01-29T00:00:00
[ [ "Berenbrink", "Petra", "" ], [ "Ergün", "Funda", "" ], [ "Mallmann-Trenn", "Frederik", "" ], [ "Azer", "Erfan Sadeqi", "" ] ]
new_dataset
0.969217
1511.06940
Mathew Samimi
Mathew K. Samimi, Shu Sun, and Theodore S. Rappaport
MIMO Channel Modeling and Capacity Analysis for 5G Millimeter-Wave Wireless Systems
5 pages, 6 figures, accepted in the 10th European Conference on Antennas and Propagation (EuCAP'2016), April 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a 3-D statistical channel model of the impulse response with small-scale spatially correlated random coefficients for multi-element transmitter and receiver antenna arrays, derived using the physically-based time cluster - spatial lobe (TCSL) clustering scheme. The small-scale properties of multipath amplitudes are modeled based on 28 GHz outdoor millimeter-wave small-scale local area channel measurements. The wideband channel capacity is evaluated by considering measurement-based Rician-distributed voltage amplitudes, and the spatial autocorrelation of multipath amplitudes for each pair of transmitter and receiver antenna elements. Results indicate that Rician channels may exhibit equal or possibly greater capacity compared to Rayleigh channels, depending on the number of antennas.
[ { "version": "v1", "created": "Sat, 21 Nov 2015 23:44:48 GMT" }, { "version": "v2", "created": "Thu, 28 Jan 2016 01:37:13 GMT" } ]
2016-01-29T00:00:00
[ [ "Samimi", "Mathew K.", "" ], [ "Sun", "Shu", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.997799
1601.06847
Alessandro Biason
Alessandro Biason and Michele Zorzi
Battery-Powered Devices in WPCNs
13 pages, 11 figures, submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless powered communication networks are becoming an effective solution for improving self sustainability of mobile devices. In this context, a hybrid access point transfers energy to a group of nodes, which use the harvested energy to perform computation or transmission tasks. While the availability of the wireless energy transfer mechanism opens up new frontiers, an appropriate choice of the network parameters (e.g., transmission powers, transmission duration, amount of transferred energy, etc.) is required in order to achieve high performance. In this work, we study the throughput optimization problem in a system composed of an access point which recharges the batteries of two devices at different distances. In the literature, the main focus so far has been on slot-oriented optimization, in which all the harvested energy is used in the same slot in which it is harvested. However, this approach is strongly sub-optimal because it does not exploit the possibility to store the energy and use it at a later time. Thus, instead of considering the slot-oriented case, we address the long-term maximization. This assumption greatly increases the optimization complexity, requiring to consider, e.g., the channel state realizations, its statistics and the batteries evolution. Our objective is to find the best scheduling scheme, both for the energy transferred by the access point and for the data sent by the two nodes. We discuss how to perform the maximization with optimal as well as approximate techniques and show that the slot-oriented policies proposed so far are strongly sub-optimal in the long run.
[ { "version": "v1", "created": "Mon, 25 Jan 2016 23:21:48 GMT" }, { "version": "v2", "created": "Thu, 28 Jan 2016 16:55:29 GMT" } ]
2016-01-29T00:00:00
[ [ "Biason", "Alessandro", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.972443
1601.07633
Harinaivo Andriatahiny
Harinaivo Andriatahiny
The Generalized Reed-Muller codes and the radical powers of a modular algebra
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First, a new proof of Berman and Charpin's characterization of the Reed-Muller codes over the binary field or over an arbitrary prime field is presented. These codes are considered as the powers of the radical of a modular algebra. Secondly, the same method is used for the study of the Generalized Reed-Muller codes over a non prime field.
[ { "version": "v1", "created": "Thu, 28 Jan 2016 03:58:32 GMT" } ]
2016-01-29T00:00:00
[ [ "Andriatahiny", "Harinaivo", "" ] ]
new_dataset
0.997657
1509.00116
M. Salman Asif
M. Salman Asif, Ali Ayremlou, Aswin Sankaranarayanan, Ashok Veeraraghavan, and Richard Baraniuk
FlatCam: Thin, Bare-Sensor Cameras using Coded Aperture and Computation
12 pages, 10 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
FlatCam is a thin form-factor lensless camera that consists of a coded mask placed on top of a bare, conventional sensor array. Unlike a traditional, lens-based camera where an image of the scene is directly recorded on the sensor pixels, each pixel in FlatCam records a linear combination of light from multiple scene elements. A computational algorithm is then used to demultiplex the recorded measurements and reconstruct an image of the scene. FlatCam is an instance of a coded aperture imaging system; however, unlike the vast majority of related work, we place the coded mask extremely close to the image sensor that can enable a thin system. We employ a separable mask to ensure that both calibration and image reconstruction are scalable in terms of memory requirements and computational complexity. We demonstrate the potential of the FlatCam design using two prototypes: one at visible wavelengths and one at infrared wavelengths.
[ { "version": "v1", "created": "Tue, 1 Sep 2015 01:59:59 GMT" }, { "version": "v2", "created": "Wed, 27 Jan 2016 20:09:57 GMT" } ]
2016-01-28T00:00:00
[ [ "Asif", "M. Salman", "" ], [ "Ayremlou", "Ali", "" ], [ "Sankaranarayanan", "Aswin", "" ], [ "Veeraraghavan", "Ashok", "" ], [ "Baraniuk", "Richard", "" ] ]
new_dataset
0.999636
1509.04274
Swetank Kumar Saha
Swetank Kumar Saha, Viral Vijay Vira, Anuj Garg, Dimitrios Koutsonikolas
60 GHz Multi-Gigabit Indoor WLANs: Dream or Reality?
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The millimeter-wave (mmWave) technology, recently standardized by IEEE 802.11ad, is emerging as an attractive alternative to the traditional 2.4/5GHz wireless systems, promising multi-Gigabit wireless throughput. However, the high attenuation and vulnerability to blockage of 60 GHz links have limited its applications (until recently) to short-range, line-of-sight, static scenarios. On the other hand, the question of whether it is feasible to build general-purpose WLANs out of mmWave radios in dynamic indoor environments with non-line-of-sight links remains largely unanswered. In this paper, through extensive measurements with COTS 802.11ad hardware in an indoor office environment, we investigate the question of whether the mmWave technology, in spite of its unique propagation characteristics, can serve as a viable choice for providing multi-Gigabit ubiquitous wireless indoor connectivity. We study the range of 60 GHz transmissions in indoor environments, the impact of antenna height, location, orientation, and distance on 60 GHz performance, the interaction among metrics from different layers of the network stack, the increased opportunities for spatial reuse, and the impact of human blockage. Our results reveal a number of challenges that we have to address for 60 GHz multi-gigabit WLANs to become a reality.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 20:07:50 GMT" }, { "version": "v2", "created": "Wed, 27 Jan 2016 01:33:10 GMT" } ]
2016-01-28T00:00:00
[ [ "Saha", "Swetank Kumar", "" ], [ "Vira", "Viral Vijay", "" ], [ "Garg", "Anuj", "" ], [ "Koutsonikolas", "Dimitrios", "" ] ]
new_dataset
0.998979
1601.06383
Kai Wan
Kai Wan, Daniela Tuninetti, Pablo Piantanida
On Caching with More Users than Files
6 pages, 3 figures, submitted to ISIT 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Caching appears to be an efficient way to reduce peak hour network traffic congestion by storing some content at the user's cache without knowledge of later demands. Recently, Maddah-Ali and Niesen proposed a two-phase, placement and delivery phase, coded caching strategy for centralized systems (where coordination among users is possible in the placement phase), and for decentralized systems. This paper investigates the same setup under the further assumption that the number of users is larger than the number of files. By using the same uncoded placement strategy of Maddah-Ali and Niesen, a novel coded delivery strategy is proposed to profit from the multicasting opportunities that arise because a file may be demanded by multiple users. The proposed delivery method is proved to be optimal under the constraint of uncoded placement for centralized systems with two files, moreover it is shown to outperform known caching strategies for both centralized and decentralized systems.
[ { "version": "v1", "created": "Sun, 24 Jan 2016 13:36:36 GMT" }, { "version": "v2", "created": "Tue, 26 Jan 2016 21:13:51 GMT" } ]
2016-01-28T00:00:00
[ [ "Wan", "Kai", "" ], [ "Tuninetti", "Daniela", "" ], [ "Piantanida", "Pablo", "" ] ]
new_dataset
0.983412
1601.07250
Yuting Zheng
Yuting Zheng
Living Innovation Laboratory Model Design and Implementation
This is a book draft
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Living Innovation Laboratory (LIL) is an open and recyclable way for multidisciplinary researchers to remote control resources and co-develop user centered projects. In the past few years, there were several papers about LIL published and trying to discuss and define the model and architecture of LIL. People all acknowledge about the three characteristics of LIL: user centered, co-creation, and context aware, which make it distinguished from test platform and other innovation approaches. Its existing model consists of five phases: initialization, preparation, formation, development, and evaluation. Goal Net is a goal-oriented methodology to formularize a progress. In this thesis, Goal Net is adopted to subtract a detailed and systemic methodology for LIL. LIL Goal Net Model breaks the five phases of LIL into more detailed steps. Big data, crowd sourcing, crowd funding and crowd testing take place in suitable steps to realize UUI, MCC and PCA throughout the innovation process in LIL 2.0. It would become a guideline for any company or organization to develop a project in the form of an LIL 2.0 project. To prove the feasibility of LIL Goal Net Model, it was applied to two real cases. One project is a Kinect game and the other one is an Internet product. They were both transformed to LIL 2.0 successfully, based on LIL goal net based methodology. The two projects were evaluated by phenomenography, which was a qualitative research method to study human experiences and their relations in hope of finding the better way to improve human experiences. Through phenomenographic study, the positive evaluation results showed that the new generation of LIL had more advantages in terms of effectiveness and efficiency.
[ { "version": "v1", "created": "Wed, 27 Jan 2016 03:07:03 GMT" } ]
2016-01-28T00:00:00
[ [ "Zheng", "Yuting", "" ] ]
new_dataset
0.996072
1601.07457
Marco Cattani
Marco Cattani, Ioannis Protonotarios
Gondola: a Parametric Robot Infrastructure for Repeatable Mobile Experiments
null
null
null
null
cs.RO cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When deploying a testbed infrastructure for Wireless Sensor Networks (WSNs), one of the most challenging feature is to provide repeatable mobility. Wheeled robots, usually employed for such tasks, strive to adapt to the wide range of environments where WSNs are deployed, from chaotic office spaces to potato fields in the farmland. For this reson, these robot systems often require expensive customization steps that, for example, adapt their localization and navigation system. To avoid these issues, in this paper we present the design of Gondola, a parametric robot infrastructure based on pulling wires, rather than wheels, that avoids the most common problems of wheeled robot and easily adapts to many WSN's scenarios. Different from wheeled robots, wich movements are constrained on a 2-dimensional plane, Gondola can easily move in 3-dimensional spaces with no need of a complex localization system and an accuracy that is comparable with off-the-shelf wheeled robots.
[ { "version": "v1", "created": "Wed, 27 Jan 2016 17:29:20 GMT" } ]
2016-01-28T00:00:00
[ [ "Cattani", "Marco", "" ], [ "Protonotarios", "Ioannis", "" ] ]
new_dataset
0.999263
1109.3475
Peter Hor\'ak
Peter Horak and Bader F. AlBdaiwi
Diameter Perfect Lee Codes
null
IEEE Transactions on Information Theory, Vol 58, No 8, pp. 5490--5499, August 2012
10.1109/TIT.2012.2196257
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lee codes have been intensively studied for more than 40 years. Interest in these codes has been triggered by the Golomb-Welch conjecture on the existence of the perfect error-correcting Lee codes. In this paper we deal with the existence and enumeration of diameter perfect Lee codes. As main results we determine all $q$ for which there exists a linear diameter-4 perfect Lee code of word length $n$ over $Z_{q},$ and prove that for each $n\geq 3$ there are uncountable many diameter-4 perfect Lee codes of word length $n$ over $Z.$ This is in a strict contrast with perfect error-correcting Lee codes of word length $n$ over $Z\,$\ as there is a unique such code for $n=3,$ and its is conjectured that this is always the case when $2n+1$ is a prime. We produce diameter perfect Lee codes by an algebraic construction that is based on a group homomorphism. This will allow us to design an efficient algorithm for their decoding. We hope that this construction will turn out to be useful far beyond the scope of this paper.
[ { "version": "v1", "created": "Thu, 15 Sep 2011 20:19:22 GMT" }, { "version": "v2", "created": "Sun, 1 Apr 2012 18:48:37 GMT" }, { "version": "v3", "created": "Fri, 13 Apr 2012 14:19:53 GMT" } ]
2016-01-27T00:00:00
[ [ "Horak", "Peter", "" ], [ "AlBdaiwi", "Bader F.", "" ] ]
new_dataset
0.998097
1301.5451
Qu Xiaobo
Xiaobo Qu, Ying Chen, Xiaoxing Zhuang, Zhiyu Yan, Di Guo, Zhong Chen
Spread spectrum compressed sensing MRI using chirp radio frequency pulses
4 pages, 4 figures
null
null
null
cs.CV math.OC physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing has shown great potential in reducing data acquisition time in magnetic resonance imaging (MRI). Recently, a spread spectrum compressed sensing MRI method modulates an image with a quadratic phase. It performs better than the conventional compressed sensing MRI with variable density sampling, since the coherence between the sensing and sparsity bases are reduced. However, spread spectrum in that method is implemented via a shim coil which limits its modulation intensity and is not convenient to operate. In this letter, we propose to apply chirp (linear frequency-swept) radio frequency pulses to easily control the spread spectrum. To accelerate the image reconstruction, an alternating direction algorithm is modified by exploiting the complex orthogonality of the quadratic phase encoding. Reconstruction on the acquired data demonstrates that more image features are preserved using the proposed approach than those of conventional CS-MRI.
[ { "version": "v1", "created": "Wed, 23 Jan 2013 09:59:38 GMT" } ]
2016-01-27T00:00:00
[ [ "Qu", "Xiaobo", "" ], [ "Chen", "Ying", "" ], [ "Zhuang", "Xiaoxing", "" ], [ "Yan", "Zhiyu", "" ], [ "Guo", "Di", "" ], [ "Chen", "Zhong", "" ] ]
new_dataset
0.994774
1601.06880
Tadashi Wadayama
Tadashi Wadayama and Taisuke Izumi
Bounds on Asymptotic Rate of Capacitive Crosstalk Avoidance Codes for On-chip Buses
10 pages, 2 figures, submitted to ISIT 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to prevent the capacitive crosstalk in on-chip buses, several types of capacitive crosstalk avoidance codes have been devised. These codes are designed to prohibit transition patterns prone to the capacity crosstalk from any consecutive two words transmitted to on-chip buses. This paper provides a rigorous analysis on the asymptotic rate of (p,q)-transition free word sequences under the assumption that coding is based on a pair of a stateful encoder and a stateless decoder. The symbols p and q represent k-bit transition patterns that should not be appeared in any consecutive two words at the same adjacent k-bit positions. It is proved that the maximum rate of the sequences equals to the subgraph domatic number of (p,q)-transition free graph. Based on the theoretical results on the subgraph domatic partition problem, a pair of lower and upper bounds on the asymptotic rate is derived. We also present that the asymptotic rate 0.8325 is achievable for the (10,01)-transition free word sequences.
[ { "version": "v1", "created": "Tue, 26 Jan 2016 03:46:11 GMT" } ]
2016-01-27T00:00:00
[ [ "Wadayama", "Tadashi", "" ], [ "Izumi", "Taisuke", "" ] ]
new_dataset
0.99781
1601.06931
Manuel Marin-Jimenez
F.M. Castro and M.J. Mar\'in-Jim\'enez and N. Guil and R. Mu\~noz-Salinas
Fisher Motion Descriptor for Multiview Gait Recognition
This paper extends with new experiments the one published at ICPR'2014
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to identify individuals by analyzing their gait. Instead of using binary silhouettes as input data (as done in many previous works) we propose and evaluate the use of motion descriptors based on densely sampled short-term trajectories. We take advantage of state-of-the-art people detectors to define custom spatial configurations of the descriptors around the target person, obtaining a rich representation of the gait motion. The local motion features (described by the Divergence-Curl-Shear descriptor) extracted on the different spatial areas of the person are combined into a single high-level gait descriptor by using the Fisher Vector encoding. The proposed approach, coined Pyramidal Fisher Motion, is experimentally validated on `CASIA' dataset (parts B and C), `TUM GAID' dataset, `CMU MoBo' dataset and the recent `AVA Multiview Gait' dataset. The results show that this new approach achieves state-of-the-art results in the problem of gait recognition, allowing to recognize walking people from diverse viewpoints on single and multiple camera setups, wearing different clothes, carrying bags, walking at diverse speeds and not limited to straight walking paths.
[ { "version": "v1", "created": "Tue, 26 Jan 2016 09:05:26 GMT" } ]
2016-01-27T00:00:00
[ [ "Castro", "F. M.", "" ], [ "Marín-Jiménez", "M. J.", "" ], [ "Guil", "N.", "" ], [ "Muñoz-Salinas", "R.", "" ] ]
new_dataset
0.996156
1601.07059
Ago-Erik Riet
Kristo Visk and Ago-Erik Riet
Permutation codes, source coding and a generalisation of Bollob\'as-Lubell-Yamamoto-Meshalkin and Kraft inequalities
5 pages, 1 figure
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a general framework to prove Kraft-type inequalities for prefix-free permutation codes for source coding with various notions of permutation code and prefix. We also show that the McMillan-type converse theorem in most of these cases does not hold, and give a general form of a counterexample. Our approach is more general and works for other structures besides permutation codes. The classical Kraft inequality for prefix-free codes as well as results about permutation codes follow as corollaries of our main theorem and main counterexample.
[ { "version": "v1", "created": "Tue, 26 Jan 2016 15:03:53 GMT" } ]
2016-01-27T00:00:00
[ [ "Visk", "Kristo", "" ], [ "Riet", "Ago-Erik", "" ] ]
new_dataset
0.998686
1601.07077
Matthias Schulz
Matthias Schulz, Daniel Wegemer and Matthias Hollick
NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode
Project website: https://seemoo.tu-darmstadt.de/nexmon
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments. Monitor mode, which allows eavesdropping on all frames on a wireless communication channel, is a first step to lower this barrier. Use cases include, but are not limited to, network packet analyses, security research and testing of new medium access control layer protocols. Monitor mode is generally offered by SoftMAC drivers that implement the media access control sublayer management entity (MLME) in the driver rather than in the Wi-Fi chip. On smartphones, however, mostly FullMAC chips are used to reduce power consumption, as MLME tasks do not need to wake up the main processor. Even though, monitor mode is also possible in FullMAC scenarios, it is generally not implemented in today's Wi-Fi firmwares used in smartphones. This work focuses on bringing monitor mode to Nexus 5 smartphones to enhance the interoperability between applications that require monitor mode and BCM4339 Wi-Fi chips. The implementation is based on our new C-based programming framework to extend existing Wi-Fi firmwares.
[ { "version": "v1", "created": "Thu, 24 Dec 2015 17:19:20 GMT" } ]
2016-01-27T00:00:00
[ [ "Schulz", "Matthias", "" ], [ "Wegemer", "Daniel", "" ], [ "Hollick", "Matthias", "" ] ]
new_dataset
0.999704