id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1412.3164
|
Razvan Ro\c{s}ie
|
R\u{a}zvan Ro\c{s}ie
|
On quantum preimage attacks
|
Witdrawn by author - Inappropriate format
| null | null | null |
cs.CR quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a preimage attack against cryptographic hash functions based on
the speedup enabled by quantum computing. Preimage resistance is a fundamental
property cryptographic hash functions must possess. The motivation behind this
work relies in the lack of conventional attacks against newly introduced hash
schemes such as the recently elected SHA-3 standard. The proposed algorithm
consists of two parts: a classical one running in O(log |S|), where S
represents the searched space, and a quantum part that contains the bulk of the
Deutsch-Jozsa circuit. The mixed approach we follow makes use of the quantum
parallelism concept to check the existence of an argument (preimage) for a
given hash value (image) in the preestablished search space. For this purpose,
we explain how a non-unitary measurement gate can be used to determine if S
contains the target value. Our method is entirely theoretical and is based on
the assumptions that a hash function can be implemented by a quantum computer
and the key measurement gate we describe is physically realizable. Finally, we
present how the algorithm finds a solution on S.
|
[
{
"version": "v1",
"created": "Wed, 10 Dec 2014 00:45:58 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2016 19:43:25 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Roşie",
"Răzvan",
""
]
] |
new_dataset
| 0.996674 |
1601.03708
|
Piotr Dziurzanski
|
Piotr Dziurzanski, Amit Kumar Singh, Leandro S. Indrusiak, Bj\"orn
Saballus
|
Benchmarking, System Design and Case-studies for Multi-core based
Embedded Automotive Systems
|
2nd International Workshop on Dynamic Resource Allocation and
Management in Embedded, High Performance and Cloud Computing DREAMCloud 2016
(arXiv:cs/1449078)
| null | null |
DREAMCloud/2016/04
|
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, using of automotive use cases as benchmarks for real-time
system design has been proposed. The use cases are described in a format
supported by AMALTHEA platform, which is a model based open source development
environment for automotive multi-core systems. An example of a simple
Electronic Control Unit has been analysed and presented with enough details to
reconstruct this system in any format. For researchers willing to use AMALTHEA
file format directly, an appropriate parser has been developed and offered. An
example of applying this parser and benchmark for optimising makespan while not
violating the timing constraints by allocating functionality to different
Network on Chip resource is demonstrated.
|
[
{
"version": "v1",
"created": "Thu, 14 Jan 2016 19:39:44 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Dziurzanski",
"Piotr",
""
],
[
"Singh",
"Amit Kumar",
""
],
[
"Indrusiak",
"Leandro S.",
""
],
[
"Saballus",
"Björn",
""
]
] |
new_dataset
| 0.998343 |
1601.06181
|
Viet Nguyen Tien
|
Viet T.Nguyen, Jubin Jose, Xinzhou Wu and Tom Richardson
|
Secure Content Distribution in Vehicular Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dedicated short range communication (DSRC) relies on secure distribution to
vehicles of a certificate revocation list (CRL) for enabling security
protocols. CRL distribution utilizing vehicle-to-vehicle (V2V) communications
is preferred to an infrastructure-only approach. One approach to V2V CRL
distribution, using rateless coding at the source and forwarding at vehicle
relays is vulnerable to a pollution attack in which a few malicious vehicles
forward incorrect packets which then spread through the network leading to
denial-of-service. This paper develops a new scheme called Precode-and-Hash
that enables efficient packet verification before forwarding thereby preventing
the pollution attack. In contrast to rateless codes, it utilizes a fixed
low-rate precode and random selection of packets from the set of precoded
packets. The fixed precode admits efficient hash verification of all encoded
packets. Specifically, hashes are computed for all precoded packets and sent
securely using signatures. We analyze the performance of the Precode-and-Hash
scheme for a multi-hop line network and provide simulation results for several
schemes in a more realistic vehicular model.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 21:57:56 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Nguyen",
"Viet T.",
""
],
[
"Jose",
"Jubin",
""
],
[
"Wu",
"Xinzhou",
""
],
[
"Richardson",
"Tom",
""
]
] |
new_dataset
| 0.99165 |
1601.06245
|
Zhiwei Zeng
|
Zhiwei Zeng
|
Artificial Persuasion in Pedagogical Games
|
This is a book draft
| null | null | null |
cs.AI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Persuasive Teachable Agent (PTA) is a special type of Teachable Agent which
incorporates a persuasion theory in order to provide persuasive and more
personalized feedback to the student. By employing the persuasion techniques,
the PTA seeks to maintain the student in a high motivation and high ability
state in which he or she has higher cognitive ability and his or her changes in
attitudes are more persistent. However, the existing model of the PTA still has
a few limitations. Firstly, the existing PTA model focuses on modelling the
PTA's ability to persuade, while does not model its ability to be taught by the
student and to practice the knowledge it has learnt. Secondly, the quantitative
model for computational processes in the PTA has low reusability. Thirdly,
there is still a gap between theoretical models and practical implementation of
the PTA.
To address these three limitations, this book proposes an improved agent
model which follows a goal-oriented approach and models the PTA in its totality
by integrating the Persuasion Reasoning of the PTA with the Teachability
Reasoning and the Practicability Reasoning. The project also proposes a more
abstract and generalized quantitative model for the computations in the PTA.
With higher level of abstraction, the reusability of the quantitative model is
also improved. New system architecture is introduced to bridge the gap between
theoretical models and implementation of the PTA.
|
[
{
"version": "v1",
"created": "Sat, 23 Jan 2016 07:29:20 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Zeng",
"Zhiwei",
""
]
] |
new_dataset
| 0.999512 |
1601.06278
|
Laurent Pierre
|
Laurent Pierre
|
Fortuitous sequences of flips of the top of a stack of n burnt pancakes
for all n>24
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Burnt pancakes problem was defined by Gates and Papadimitriou in 1979. A
stack S of pancakes with a burnt side must be sorted by size, the smallest on
top, and each pancake with burnt side down. Only operation allowed is to split
stack in two parts and flip upper part. g(S) is the minimal number of flips
needed to sort stack S. Stack S may be -In when pancakes are in right order but
upside down or -f_n when all pancakes are right side up but sorted in reverse
order. Gates et al. proved that g(-f_n)>=3n/2-1.
In 1995 Cohen and Blum proved that g(-I_n)=g(-f_n)+1>=3n/2.
In 1997 Heydari and Sudborough proved that g(-I_n)<= 3(n+1)/2 whenever some
fortuitous sequence of flips exists. They gave fortuitous sequences for n=3,
15, 27 and 31. They showed that two fortuitous sequences S_n and S_n' may
combine into another fortuitous sequence S_n'' with n''=n+n'-3. So a fortuitous
sequence S_n gives a fortuitous sequence S_{n+12}. This proves that
g(-I_n)<=3(n+1)/2 if n is congruent to 3 modulo 4 and n>=23.
In 2011 Josef Cibulka enhanced Gates and Papadimitriou's lower bound thanks
to a potential function. He got so g(-I_n)>=3n/2+1 if n>1 proving thereby, that
g(-I_n)=3(n+1)/2 if n is congruent to 3 modulo 4 and n>=23.
This paper explains how to build generalized fortuitous sequences for every
n>=25 proving thereby that g(-I_n)=ceiling(3n/2)+1 for every n>=25.
|
[
{
"version": "v1",
"created": "Sat, 23 Jan 2016 15:42:53 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Pierre",
"Laurent",
""
]
] |
new_dataset
| 0.993735 |
1601.06496
|
Da Yan
|
Da Yan, James Cheng, Fan Yang
|
Lightweight Fault Tolerance in Large-Scale Distributed Graph Processing
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The success of Google's Pregel framework in distributed graph processing has
inspired a surging interest in developing Pregel-like platforms featuring a
user-friendly "think like a vertex" programming model. Existing Pregel-like
systems support a fault tolerance mechanism called checkpointing, which
periodically saves computation states as checkpoints to HDFS, so that when a
failure happens, computation rolls back to the latest checkpoint. However, a
checkpoint in existing systems stores a huge amount of data, including vertex
states, edges, and messages sent by vertices, which significantly degrades the
failure-free performance. Moreover, the high checkpointing cost prevents
frequent checkpointing, and thus recovery has to replay all the computations
from a state checkpointed some time ago.
In this paper, we propose a novel checkpointing approach which only stores
vertex states and incremental edge updates to HDFS as a lightweight checkpoint
(LWCP), so that writing an LWCP is typically tens of times faster than writing
a conventional checkpoint. To recover from the latest LWCP, messages are
generated from the vertex states, and graph topology is recovered by replaying
incremental edge updates. We show how to realize lightweight checkpointing with
minor modifications of the vertex-centric programming interface. We also apply
the same idea to a recently-proposed log-based approach for fast recovery, to
make it work efficiently in practice by significantly reducing the cost of
garbage collection of logs. Extensive experiments on large real graphs verified
the effectiveness of LWCP in improving both failure-free performance and the
performance of recovery.
|
[
{
"version": "v1",
"created": "Mon, 25 Jan 2016 07:25:03 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Yan",
"Da",
""
],
[
"Cheng",
"James",
""
],
[
"Yang",
"Fan",
""
]
] |
new_dataset
| 0.993506 |
1601.06502
|
Mehdi Tibouchi
|
Jeremy Maitin-Shepard, Mehdi Tibouchi and Diego Aranha
|
Elliptic Curve Multiset Hash
|
Implementation available on https://github.com/jbms/ecmh
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A homomorphic, or incremental, multiset hash function, associates a hash
value to arbitrary collections of objects (with possible repetitions) in such a
way that the hash of the union of two collections is easy to compute from the
hashes of the two collections themselves: it is simply their sum under a
suitable group operation. In particular, hash values of large collections can
be computed incrementally and/or in parallel. Homomorphic hashing is thus a
very useful primitive with applications ranging from database integrity
verification to streaming set/multiset comparison and network coding.
Unfortunately, constructions of homomorphic hash functions in the literature
are hampered by two main drawbacks: they tend to be much longer than usual hash
functions at the same security level (e.g. to achieve a collision resistance of
2^128, they are several thousand bits long, as opposed to 256 bits for usual
hash functions), and they are also quite slow.
In this paper, we introduce the Elliptic Curve Multiset Hash (ECMH), which
combines a usual bit string-valued hash function like BLAKE2 with an efficient
encoding into binary elliptic curves to overcome both difficulties. On the one
hand, the size of ECMH digests is essentially optimal: 2m-bit hash values
provide O(2^m) collision resistance. On the other hand, we demonstrate a
highly-efficient software implementation of ECMH, which our thorough empirical
evaluation shows to be capable of processing over 3 million set elements per
second on a 4 GHz Intel Haswell machine at the 128-bit security level---many
times faster than previous practical methods.
|
[
{
"version": "v1",
"created": "Mon, 25 Jan 2016 08:03:03 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Maitin-Shepard",
"Jeremy",
""
],
[
"Tibouchi",
"Mehdi",
""
],
[
"Aranha",
"Diego",
""
]
] |
new_dataset
| 0.997811 |
1601.06603
|
Sibo Song
|
Sibo Song, Ngai-Man Cheung, Vijay Chandrasekhar, Bappaditya Mandal,
Jie Lin
|
Egocentric Activity Recognition with Multimodal Fisher Vector
|
5 pages, 4 figures, ICASSP 2016 accepted
| null | null | null |
cs.MM cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increasing availability of wearable devices, research on egocentric
activity recognition has received much attention recently. In this paper, we
build a Multimodal Egocentric Activity dataset which includes egocentric videos
and sensor data of 20 fine-grained and diverse activity categories. We present
a novel strategy to extract temporal trajectory-like features from sensor data.
We propose to apply the Fisher Kernel framework to fuse video and temporal
enhanced sensor features. Experiment results show that with careful design of
feature extraction and fusion algorithm, sensor data can enhance
information-rich video data. We make publicly available the Multimodal
Egocentric Activity dataset to facilitate future research.
|
[
{
"version": "v1",
"created": "Mon, 25 Jan 2016 13:57:07 GMT"
}
] | 2016-01-26T00:00:00 |
[
[
"Song",
"Sibo",
""
],
[
"Cheung",
"Ngai-Man",
""
],
[
"Chandrasekhar",
"Vijay",
""
],
[
"Mandal",
"Bappaditya",
""
],
[
"Lin",
"Jie",
""
]
] |
new_dataset
| 0.999511 |
1203.0030
|
Chithrupa Ramesh
|
Chithrupa Ramesh, Henrik Sandberg and Karl H. Johansson
|
Design of State-based Schedulers for a Network of Control Loops
|
17 pages, technical report
| null |
10.1109/TAC.2013.2251791
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a closed-loop system, which has a contention-based multiple access
network on its sensor link, the Medium Access Controller (MAC) may discard some
packets when the traffic on the link is high. We use a local state-based
scheduler to select a few critical data packets to send to the MAC. In this
paper, we analyze the impact of such a scheduler on the closed-loop system in
the presence of traffic, and show that there is a dual effect with state-based
scheduling. In general, this makes the optimal scheduler and controller hard to
find. However, by removing past controls from the scheduling criterion, we find
that certainty equivalence holds. This condition is related to the classical
result of Bar-Shalom and Tse, and it leads to the design of a scheduler with a
certainty equivalent controller. This design, however, does not result in an
equivalent system to the original problem, in the sense of Witsenhausen.
Computing the estimate is difficult, but can be simplified by introducing a
symmetry constraint on the scheduler. Based on these findings, we propose a
dual predictor architecture for the closed-loop system, which ensures
separation between scheduler, observer and controller. We present an example of
this architecture, which illustrates a network-aware event-triggering
mechanism.
|
[
{
"version": "v1",
"created": "Wed, 29 Feb 2012 22:03:36 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Ramesh",
"Chithrupa",
""
],
[
"Sandberg",
"Henrik",
""
],
[
"Johansson",
"Karl H.",
""
]
] |
new_dataset
| 0.980002 |
1511.07386
|
Iasonas Kokkinos
|
Iasonas Kokkinos
|
Pushing the Boundaries of Boundary Detection using Deep Learning
|
The previous version reported large improvements w.r.t. the LPO
region proposal baseline, which turned out to be due to a wrong computation
for the baseline. The improvements are currently less important, and are
omitted. We are sorry if the reported results caused any confusion. We have
also integrated reviewer feedback regarding human performance on the BSD
benchmark
| null | null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we show that adapting Deep Convolutional Neural Network training
to the task of boundary detection can result in substantial improvements over
the current state-of-the-art in boundary detection.
Our contributions consist firstly in combining a careful design of the loss
for boundary detection training, a multi-resolution architecture and training
with external data to improve the detection accuracy of the current state of
the art. When measured on the standard Berkeley Segmentation Dataset, we
improve theoptimal dataset scale F-measure from 0.780 to 0.808 - while human
performance is at 0.803. We further improve performance to 0.813 by combining
deep learning with grouping, integrating the Normalized Cuts technique within a
deep network.
We also examine the potential of our boundary detector in conjunction with
the task of semantic segmentation and demonstrate clear improvements over
state-of-the-art systems. Our detector is fully integrated in the popular Caffe
framework and processes a 320x420 image in less than a second.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 19:54:09 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jan 2016 15:31:32 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Kokkinos",
"Iasonas",
""
]
] |
new_dataset
| 0.990941 |
1601.01421
|
Lanqiang Li
|
Li Liu, Lanqiang Li, Xiaoshan Kai, Shixin Zhu
|
Repeated-root constacyclic codes of length $3lp^{s}$ and their dual
codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $p\neq3$ be any prime and $l\neq3$ be any odd prime with $gcd(p,l)=1$.
$F_{q}^{*}=\langle\xi\rangle$ is decomposed into mutually disjoint union of
$gcd(q-1,3lp^{s})$ coset over the subgroup $\langle\xi^{3lp^{s}}\rangle$, where
$\xi$ is a primitive $(q-1)$th root of unity. We classify all repeated-root
constacyclic codes of length $3lp^{s}$ over the finite field $F_{q}$ into some
equivalence classes by the decomposition, where $q=p^{m}$, $s$ and $m$ are
positive integers. According to the equivalence classes, we explicitly
determine the generator polynomials of all repeated-root constacyclic codes of
length $3lp^{s}$ over $F_{q}$ and their dual codes. Self-dual
cyclic(negacyclic) codes of length $3lp^{s}$ over $F_{q}$ exist only when
$p=2$. And we give all self-dual cyclic(negacyclic) codes of length
$3l2^{s}$over $F_{2^{m}}$ and its enumeration.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 07:22:28 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jan 2016 11:31:24 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Liu",
"Li",
""
],
[
"Li",
"Lanqiang",
""
],
[
"Kai",
"Xiaoshan",
""
],
[
"Zhu",
"Shixin",
""
]
] |
new_dataset
| 0.999725 |
1601.05833
|
Michael Roland
|
Michael Roland
|
Executing Arbitrary Code in the Context of the Smartcard System Service
|
University of Applied Sciences Upper Austria, JR-Center u'smile,
Vulnerability report, associated CVE identifier is CVE-2015-6606, 28 pages, 6
figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report summarizes our findings regarding a severe weakness in
implementations of the Open Mobile API deployed on several Android devices. The
vulnerability allows arbitrary code coming from a specially crafted Android
application package (APK) to be injected into and executed by the smartcard
system service component (the middleware component of the Open Mobile API
implementation). This can be exploited to gain elevated capabilities, such as
privileges protected by signature- and system-level permissions assigned to
this service. The affected source code seems to originate from the
SEEK-for-Android open-source project and was adopted by various vendor-specific
implementations of the Open Mobile API, including the one that is used on the
Nexus 6 (as of Android version 5.1).
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 22:41:08 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Roland",
"Michael",
""
]
] |
new_dataset
| 0.999094 |
1601.05893
|
Hans De Sterck
|
Shawn Brunsting, Hans De Sterck, Remco Dolman, Teun van Sprundel
|
GeoTextTagger: High-Precision Location Tagging of Textual Documents
using a Natural Language Processing Approach
| null | null | null | null |
cs.AI cs.CL cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Location tagging, also known as geotagging or geolocation, is the process of
assigning geographical coordinates to input data. In this paper we present an
algorithm for location tagging of textual documents. Our approach makes use of
previous work in natural language processing by using a state-of-the-art
part-of-speech tagger and named entity recognizer to find blocks of text which
may refer to locations. A knowledge base (OpenStreatMap) is then used to find a
list of possible locations for each block. Finally, one location is chosen for
each block by assigning distance-based scores to each location and repeatedly
selecting the location and block with the best score. We tested our geolocation
algorithm with Wikipedia articles about topics with a well-defined geographical
location that are geotagged by the articles' authors, where classification
approaches have achieved median errors as low as 11 km, with attainable
accuracy limited by the class size. Our approach achieved a 10th percentile
error of 490 metres and median error of 54 kilometres on the Wikipedia dataset
we used. When considering the five location tags with the greatest scores, 50%
of articles were assigned at least one tag within 8.5 kilometres of the
article's author-assigned true location. We also tested our approach on Twitter
messages that are tagged with the location from which the message was sent.
Twitter texts are challenging because they are short and unstructured and often
do not contain words referring to the location they were sent from, but we
obtain potentially useful results. We explain how we use the Spark framework
for data analytics to collect and process our test data. In general,
classification-based approaches for location tagging may be reaching their
upper accuracy limit, but our precision-focused approach has high accuracy for
some texts and shows significant potential for improvement overall.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 07:09:54 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Brunsting",
"Shawn",
""
],
[
"De Sterck",
"Hans",
""
],
[
"Dolman",
"Remco",
""
],
[
"van Sprundel",
"Teun",
""
]
] |
new_dataset
| 0.982639 |
1601.05908
|
Mohamed Alrshah
|
Mohamed A. Alrshah, Mohamed Othman, Borhanuddin Ali, Zurina Mohd
Hanapi
|
Agile-SD: A Linux-based TCP Congestion Control Algorithm for Supporting
High-speed and Short-distance Networks
|
12 Pages
|
Journal of Network and Computer Applications, 55, pp.181-190
(2015)
|
10.1016/j.jnca.2015.05.011
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, high-speed and short-distance networks are widely deployed and
their necessity is rapidly increasing everyday. This type of networks is used
in several network applications; such as Local Area Networks (LAN) and Data
Center Networks (DCN). In LANs and DCNs, high-speed and short-distance networks
are commonly deployed to connect between computing and storage elements in
order to provide rapid services. Indeed, the overall performance of such
networks is significantly influenced by the Congestion Control Algorithm (CCA)
which suffers from the problem of bandwidth under-utilization, especially if
the applied buffer regime is very small. In this paper, a novel loss-based CCA
tailored for high-speed and Short-Distance (SD) networks, namely Agile-SD, has
been proposed. The main contribution of the proposed CCA is to implement the
mechanism of agility factor. Further, intensive simulation experiments have
been carried out to evaluate the performance of Agile-SD compared to Compound
and Cubic which are the default CCAs of the most commonly used operating
systems. The results of the simulation experiments show that the proposed CCA
outperforms the compared CCAs in terms of average throughput, loss ratio and
fairness, especially when a small buffer is applied. Moreover, Agile-SD shows
lower sensitivity to the buffer size change and packet error rate variation
which increases its efficiency.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 08:44:02 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Alrshah",
"Mohamed A.",
""
],
[
"Othman",
"Mohamed",
""
],
[
"Ali",
"Borhanuddin",
""
],
[
"Hanapi",
"Zurina Mohd",
""
]
] |
new_dataset
| 0.999464 |
1601.05917
|
Jin Sima
|
Jin Sima and Wei Chen
|
Polar Codes for Broadcast Channels with Receiver Message Side
Information and Noncausal State Available at the Encoder
|
22 pages, 7 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper polar codes are proposed for two receiver broadcast channels
with receiver message side information (BCSI) and noncausal state available at
the encoder, referred to as BCSI with noncausal state for short, where the two
receivers know a priori the private messages intended for each other. This
channel generalizes BCSI with common message and Gelfand-Pinsker problem and
has applications in cellular communication systems. We establish an achievable
rate region for BCSI with noncausal state and show that it is strictly larger
than the straightforward extension of the Gelfand-Pinsker result. To achieve
the established rate region with polar coding, we present polar codes for the
general Gelfand-Pinsker problem, which adopts chaining construction and
utilizes causal information to pre-transmit the frozen bits. It is also shown
that causal information is necessary to pre-transmit the frozen bits. Based on
the result of Gelfand-Pinsker problem, we use the chaining construction method
to design polar codes for BCSI with noncausal state. The difficulty is that
there are multiple chains sharing common information bit indices. To avoid
value assignment conflicts, a nontrivial polarization alignment scheme is
presented. It is shown that the proposed rate region is tight for degraded BCSI
with noncausal state.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 09:16:28 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Sima",
"Jin",
""
],
[
"Chen",
"Wei",
""
]
] |
new_dataset
| 0.999769 |
1601.06057
|
Bartosz Zieli\'nski
|
Matthias Zeppelzauer, Bartosz Zieli\'nski, Mateusz Juda and Markus
Seidl
|
Topological descriptors for 3D surface analysis
|
12 pages, 3 figures, CTIC 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate topological descriptors for 3D surface analysis, i.e. the
classification of surfaces according to their geometric fine structure. On a
dataset of high-resolution 3D surface reconstructions we compute persistence
diagrams for a 2D cubical filtration. In the next step we investigate different
topological descriptors and measure their ability to discriminate structurally
different 3D surface patches. We evaluate their sensitivity to different
parameters and compare the performance of the resulting topological descriptors
to alternative (non-topological) descriptors. We present a comprehensive
evaluation that shows that topological descriptors are (i) robust, (ii) yield
state-of-the-art performance for the task of 3D surface analysis and (iii)
improve classification performance when combined with non-topological
descriptors.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 16:10:54 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Zeppelzauer",
"Matthias",
""
],
[
"Zieliński",
"Bartosz",
""
],
[
"Juda",
"Mateusz",
""
],
[
"Seidl",
"Markus",
""
]
] |
new_dataset
| 0.99985 |
1601.06081
|
Marco Guerini
|
Marco Guerini and Carlo Strapparava
|
Why Do Urban Legends Go Viral?
|
Preprint of paper in Journal of Information Processing and Management
Volume 52, Issue 1, January 2016, Pages 163-172
| null |
10.1016/j.ipm.2015.05.003
| null |
cs.CL cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Urban legends are a genre of modern folklore, consisting of stories about
rare and exceptional events, just plausible enough to be believed, which tend
to propagate inexorably across communities. In our view, while urban legends
represent a form of "sticky" deceptive text, they are marked by a tension
between the credible and incredible. They should be credible like a news
article and incredible like a fairy tale to go viral. In particular we will
focus on the idea that urban legends should mimic the details of news (who,
where, when) to be credible, while they should be emotional and readable like a
fairy tale to be catchy and memorable. Using NLP tools we will provide a
quantitative analysis of these prototypical characteristics. We also lay out
some machine learning experiments showing that it is possible to recognize an
urban legend using just these simple features.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 17:33:28 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Guerini",
"Marco",
""
],
[
"Strapparava",
"Carlo",
""
]
] |
new_dataset
| 0.994203 |
1601.06087
|
Aria Ahmadi
|
Aria Ahmadi and Ioannis Patras
|
Unsupervised convolutional neural networks for motion estimation
|
Submitted to ICIP 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional methods for motion estimation estimate the motion field F between
a pair of images as the one that minimizes a predesigned cost function. In this
paper, we propose a direct method and train a Convolutional Neural Network
(CNN) that when, at test time, is given a pair of images as input it produces a
dense motion field F at its output layer. In the absence of large datasets with
ground truth motion that would allow classical supervised training, we propose
to train the network in an unsupervised manner. The proposed cost function that
is optimized during training, is based on the classical optical flow
constraint. The latter is differentiable with respect to the motion field and,
therefore, allows backpropagation of the error to previous layers of the
network. Our method is tested on both synthetic and real image sequences and
performs similarly to the state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 17:57:07 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Ahmadi",
"Aria",
""
],
[
"Patras",
"Ioannis",
""
]
] |
new_dataset
| 0.985669 |
1601.06128
|
Rodrigo Nogueira
|
Aline Bessa, Fernando de Mesentier Silva, Rodrigo Frassetto Nogueira,
Enrico Bertini, and Juliana Freire
|
RioBusData: Outlier Detection in Bus Routes of Rio de Janeiro
|
In Symposium on Visualization in Data Science (VDS at IEEE VIS),
Chicago, Illinois, US, 2015
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Buses are the primary means of public transportation in the city of Rio de
Janeiro, carrying around 100 million passengers every month. Recently,
real-time GPS coordinates of all operating public buses has been made publicly
available - roughly 1 million GPS entries each captured each day. In an initial
study, we observed that a substantial number of buses follow trajectories that
do not follow the expected behavior. In this paper, we present RioBusData, a
tool that helps users identify and explore, through different visualizations,
the behavior of outlier trajectories. We describe how the system automatically
detects these outliers using a Convolutional Neural Network (CNN) and we also
discuss a series of case studies which show how RioBusData helps users better
understand not only the flow and service of outlier buses but also the bus
system as a whole.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 19:46:33 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Bessa",
"Aline",
""
],
[
"Silva",
"Fernando de Mesentier",
""
],
[
"Nogueira",
"Rodrigo Frassetto",
""
],
[
"Bertini",
"Enrico",
""
],
[
"Freire",
"Juliana",
""
]
] |
new_dataset
| 0.999275 |
1601.06153
|
Swanand Kadhe
|
Swanand Kadhe and Alex Sprintson
|
Codes with Unequal Locality
|
Longer version of the ISIT 2016 submission
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a code $\code$, its $i$-th symbol is said to have locality $r$ if its
value can be recovered by accessing some other $r$ symbols of $\code$. Locally
repairable codes (LRCs) are the family of codes such that every symbol has
locality $r$.
In this paper, we focus on (linear) codes whose individual symbols can be
partitioned into disjoint subsets such that the symbols in one subset have
different locality than the symbols in other. We call such codes as "codes with
unequal locality". For codes with "unequal information locality", we compute a
tight upper bound on the minimum distance as a function of number of
information symbols of each locality. We demonstrate that the construction of
Pyramid codes can be adapted to design codes with unequal information locality
that achieve the minimum distance bound. This result generalizes the classical
result of Gopalan et al. for codes with unequal locality. Next, we consider
codes with "unequal all symbol locality", and establish an upper bound on the
minimum distance as a function of number of symbols of each locality. We show
that the construction based on rank-metric codes by Silberstein et al. can be
adapted to obtain codes with unequal all symbol locality that achieve the
minimum distance bound. Finally, we introduce the concept of "locality
requirement" on a code, which can be viewed as a recoverability requirement on
symbols. Information locality requirement on a code essentially specifies the
minimum number of information symbols of different localities that must be
present in the code. We present a greedy algorithm that assigns localities to
information symbols so as to maximize the minimum distance among all codes that
satisfy a given locality requirement.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 20:57:35 GMT"
}
] | 2016-01-25T00:00:00 |
[
[
"Kadhe",
"Swanand",
""
],
[
"Sprintson",
"Alex",
""
]
] |
new_dataset
| 0.999802 |
1511.00053
|
Daniel Biedermann
|
Daniel H. Biedermann, Peter M. Kielar, Quirin Aumann, Carlos M.
Osorio, Celeste T. W. Lai
|
CarPed -- A Hybrid and Macroscopic Traffic and Pedestrian Simulator
|
8 pages. In: Proceedings of the 27th Forum Bauinformatik, Aachen,
Germany, 2015
| null |
10.13140/RG.2.1.3665.4562
| null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dense human flow has been a concern for the safety of public events for a
long time. Macroscopic pedestrian models, which are mainly based on fluid
dynamics, are often used to simulate huge crowds due to their low computational
costs (Columbo & Rosini 2005). Similar approaches are used in the field of
traffic simulations (Lighthill & Whitham 1955). A combined macroscopic
simulation of vehicles and pedestrians is extremely helpful for
all-encompassing traffic control. Therefore, we developed a hybrid model that
contains networks for vehicular traffic and human flow. This comprehensive
model supports concurrent multi-modal simulations of traffic and pedestrians.
|
[
{
"version": "v1",
"created": "Sat, 31 Oct 2015 01:00:35 GMT"
}
] | 2016-01-24T00:00:00 |
[
[
"Biedermann",
"Daniel H.",
""
],
[
"Kielar",
"Peter M.",
""
],
[
"Aumann",
"Quirin",
""
],
[
"Osorio",
"Carlos M.",
""
],
[
"Lai",
"Celeste T. W.",
""
]
] |
new_dataset
| 0.977299 |
1312.5990
|
David Sutter
|
David Sutter, Joseph M. Renes
|
Universal Polar Codes for More Capable and Less Noisy Channels and
Sources
|
10 pages, 3 figures
| null |
10.1109/ISIT.2014.6875075
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove two results on the universality of polar codes for source coding and
channel communication. First, we show that for any polar code built for a
source $P_{X,Z}$ there exists a slightly modified polar code - having the same
rate, the same encoding and decoding complexity and the same error rate - that
is universal for every source $P_{X,Y}$ when using successive cancellation
decoding, at least when the channel $P_{Y|X}$ is more capable than $P_{Z|X}$
and $P_X$ is such that it maximizes $I(X;Y) - I(X;Z)$ for the given channels
$P_{Y|X}$ and $P_{Z|X}$. This result extends to channel coding for discrete
memoryless channels. Second, we prove that polar codes using successive
cancellation decoding are universal for less noisy discrete memoryless
channels.
|
[
{
"version": "v1",
"created": "Fri, 20 Dec 2013 15:31:30 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Dec 2013 10:13:06 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Apr 2014 16:25:59 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Sutter",
"David",
""
],
[
"Renes",
"Joseph M.",
""
]
] |
new_dataset
| 0.999622 |
1601.05535
|
Francois Goulette
|
Pierre Charbonnier, Jean-Philippe Tarel (SYNTIM), Francois Goulette
(CAOR)
|
On the Diagnostic of Road Pathway Visibility
|
in Transport Research Arena Europe, 2010, Bruxelles, France. 2010
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visibility distance on the road pathway plays a significant role in road
safety and in particular, has a clear impact on the choice of speed limits.
Visibility distance is thus of importance for road engineers and authorities.
While visibility distance criteria are routinely taken into account in road
design, only a few systems exist for estimating it on existing road networks.
Most existing systems comprise a target vehicle followed at a constant distance
by an observer vehicle, which only allows to check if a given, fixed visibility
distance is available. We propose two new approaches that allow estimating the
maximum available visibility distance, involving only one vehicle and based on
different sensor technologies, namely binocular stereovision and 3D range
sensing (LIDAR). The first approach is based on the processing of two views
taken by digital cameras onboard the diagnostic vehicle. The main stages of the
process are: road segmentation, edge registration between the two views, road
profile 3D reconstruction and finally, maximal road visibility distance
estimation. The second approach involves the use of a Terrestrial LIDAR Mobile
Mapping System. The triangulated 3D model of the road and its surroundings
provided by the system is used to simulate targets at different distances,
which allows estimating the maximum geometric visibility distance along the
pathway. These approaches were developed in the context of the SARI-VIZIR
PREDIT project. Both approaches are described, evaluated and compared. Their
pros and cons with respect to vehicle following systems are also discussed.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 07:50:42 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Charbonnier",
"Pierre",
"",
"SYNTIM"
],
[
"Tarel",
"Jean-Philippe",
"",
"SYNTIM"
],
[
"Goulette",
"Francois",
"",
"CAOR"
]
] |
new_dataset
| 0.979794 |
1601.05593
|
Nick Pears
|
Nick Pears and Christian Duncan
|
Automatic 3D modelling of craniofacial form
|
57 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Three-dimensional models of craniofacial variation over the general
population are useful for assessing pre- and post-operative head shape when
treating various craniofacial conditions, such as craniosynostosis. We present
a new method of automatically building both sagittal profile models and full 3D
surface models of the human head using a range of techniques in 3D surface
image analysis; in particular, automatic facial landmarking using supervised
machine learning, global and local symmetry plane detection using a variant of
trimmed iterative closest points, locally-affine template warping (for full 3D
models) and a novel pose normalisation using robust iterative ellipse fitting.
The PCA-based models built using the new pose normalisation are more compact
than those using Generalised Procrustes Analysis and we demonstrate their
utility in a clinical case study.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 11:46:35 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Pears",
"Nick",
""
],
[
"Duncan",
"Christian",
""
]
] |
new_dataset
| 0.990565 |
1601.05644
|
Weilong Peng
|
Weilong Peng (1), Zhiyong Feng (1) and Chao Xu (2) ((1) School of
Computer Science, Tianjin University (2) School of Software, Tianjin
University)
|
B-spline Shape from Motion & Shading: An Automatic Free-form Surface
Modeling for Face Reconstruction
|
9 pages, 6 figures
| null | null | null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
Recently, many methods have been proposed for face reconstruction from
multiple images, most of which involve fundamental principles of Shape from
Shading and Structure from motion. However, a majority of the methods just
generate discrete surface model of face. In this paper, B-spline Shape from
Motion and Shading (BsSfMS) is proposed to reconstruct continuous B-spline
surface for multi-view face images, according to an assumption that shading and
motion information in the images contain 1st- and 0th-order derivative of
B-spline face respectively. Face surface is expressed as a B-spline surface
that can be reconstructed by optimizing B-spline control points. Therefore,
normals and 3D feature points computed from shading and motion of images
respectively are used as the 1st- and 0th- order derivative information, to be
jointly applied in optimizing the B-spline face. Additionally, an IMLS
(iterative multi-least-square) algorithm is proposed to handle the difficult
control point optimization. Furthermore, synthetic samples and LFW dataset are
introduced and conducted to verify the proposed approach, and the experimental
results demonstrate the effectiveness with different poses, illuminations,
expressions etc., even with wild images.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 14:11:40 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Peng",
"Weilong",
""
],
[
"Feng",
"Zhiyong",
""
],
[
"Xu",
"Chao",
""
]
] |
new_dataset
| 0.999322 |
1601.05706
|
Jason S. Ku
|
Hugo A. Akitaya, Erik D. Demaine, Martin L. Demaine, Adam Hesterberg,
Ferran Hurtado, Jason S. Ku, and Jayson Lynch
|
Pachinko
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by the Japanese game Pachinko, we study simple (perfectly
"inelastic" collisions) dynamics of a unit ball falling amidst point obstacles
(pins) in the plane. A classic example is that a checkerboard grid of pins
produces the binomial distribution, but what probability distributions result
from different pin placements? In the 50-50 model, where the pins form a subset
of this grid, not all probability distributions are possible, but surprisingly
the uniform distribution is possible for $\{1,2,4,8,16\}$ possible drop
locations. Furthermore, every probability distribution can be approximated
arbitrarily closely, and every dyadic probability distribution can be divided
by a suitable power of $2$ and then constructed exactly (along with extra
"junk" outputs). In a more general model, if a ball hits a pin off center, it
falls left or right accordingly. Then we prove a universality result: any
distribution of $n$ dyadic probabilities, each specified by $k$ bits, can be
constructed using $O(n k^2)$ pins, which is close to the information-theoretic
lower bound of $\Omega(n k)$.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 16:52:27 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Akitaya",
"Hugo A.",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Hesterberg",
"Adam",
""
],
[
"Hurtado",
"Ferran",
""
],
[
"Ku",
"Jason S.",
""
],
[
"Lynch",
"Jayson",
""
]
] |
new_dataset
| 0.995805 |
1601.05747
|
Jason S. Ku
|
Jason S. Ku and Erik D. Demaine
|
Folding Flat Crease Patterns with Thick Materials
| null | null |
10.1115/1.4031954
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modeling folding surfaces with nonzero thickness is of practical interest for
mechanical engineering. There are many existing approaches that account for
material thickness in folding applications. We propose a new systematic and
broadly applicable algorithm to transform certain flat-foldable crease patterns
into new crease patterns with similar folded structure but with a
facet-separated folded state. We provide conditions on input crease patterns
for the algorithm to produce a thickened crease pattern avoiding local self
intersection, and provide bounds for the maximum thickness that the algorithm
can produce for a given input. We demonstrate these results in parameterized
numerical simulations and physical models.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 18:44:49 GMT"
}
] | 2016-01-22T00:00:00 |
[
[
"Ku",
"Jason S.",
""
],
[
"Demaine",
"Erik D.",
""
]
] |
new_dataset
| 0.998263 |
1506.08565
|
Hendrik Vogt
|
Hendrik Vogt and Zohaib Hassan Awan and Aydin Sezgin
|
Full-Duplex vs. Half-Duplex Secret-Key Generation
|
Extended version, submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Full-duplex (FD) communication is regarded as a key technology in future 5G
and Internet of Things (IoT) systems. In addition to high data rate
constraints, the success of these systems depends on the ability to allow for
confidentiality and security. Secret-key agreement from reciprocal wireless
channels can be regarded as a valuable supplement for security at the physical
layer. In this work, we study the role of FD communication in conjunction with
secret-key agreement. We first introduce two complementary key generation
models for FD and half-duplex (HD) settings and compare the performance by
introducing the key-reconciliation function. Furthermore, we study the impact
of the so called probing-reconciliation trade-off, the role of a strong
eavesdropper and analyze the system in the high SNR regime. We show that under
certain conditions, the FD mode enforces a deteriorating impact on the
capabilities of the eavesdropper and offers several advantages in terms of
secret-key rate over the conventional HD setups. Our analysis reveals as an
interesting insight that perfect self-interference cancellation is not
necessary in order to obtain performance gains over the HD mode.
|
[
{
"version": "v1",
"created": "Mon, 29 Jun 2015 09:53:01 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 2016 13:50:01 GMT"
}
] | 2016-01-21T00:00:00 |
[
[
"Vogt",
"Hendrik",
""
],
[
"Awan",
"Zohaib Hassan",
""
],
[
"Sezgin",
"Aydin",
""
]
] |
new_dataset
| 0.975655 |
1601.05141
|
Pranav Agrawal
|
Mengfan Tang, Pranav Agrawal, Ramesh Jain
|
Habits vs Environment: What really causes asthma?
|
Presented at ACM WebSci 2015, Oxford UK
| null | null | null |
cs.CY cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite considerable number of studies on risk factors for asthma onset, very
little is known about their relative importance. To have a full picture of
these factors, both categories, personal and environmental data, have to be
taken into account simultaneously, which is missing in previous studies. We
propose a framework to rank the risk factors from heterogeneous data sources of
the two categories. Established on top of EventShop and Personal EventShop,
this framework extracts about 400 features, and analyzes them by employing a
gradient boosting tree. The features come from sources including personal
profile and life-event data, and environmental data on air pollution, weather
and PM2.5 emission sources. The top ranked risk factors derived from our
framework agree well with the general medical consensus. Thus, our framework is
a reliable approach, and the discovered rankings of relative importance of risk
factors can provide insights for the prevention of asthma.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2016 00:37:11 GMT"
}
] | 2016-01-21T00:00:00 |
[
[
"Tang",
"Mengfan",
""
],
[
"Agrawal",
"Pranav",
""
],
[
"Jain",
"Ramesh",
""
]
] |
new_dataset
| 0.983369 |
1601.05228
|
Swen Jacobs
|
Swen Jacobs and Felix Klein
|
A High-Level LTL Synthesis Format: TLSF v1.0
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the Temporal Logic Synthesis Format (TLSF), a high-level format to
describe synthesis problems via Linear Temporal Logic (LTL). The format builds
upon standard LTL, but additionally allows to use high level constructs, such
as sets and functions, to provide a compact and human readable representation.
Furthermore, the format allows to identify parameters of a specification such
that a single description can be used to define a family of problems. We also
present a tool to automatically translate the format into plain LTL, which then
can be used for synthesis by a solver. The tool also allows to adjust
parameters of the specification and to apply standard transformations on the
resulting formula.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2016 10:38:10 GMT"
}
] | 2016-01-21T00:00:00 |
[
[
"Jacobs",
"Swen",
""
],
[
"Klein",
"Felix",
""
]
] |
new_dataset
| 0.999716 |
1601.05384
|
Pedro Gonnet
|
Pedro Gonnet, Aidan B. G. Chalk and Matthieu Schaller
|
QuickSched: Task-based parallelism with dependencies and conflicts
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes QuickSched, a compact and efficient Open-Source
C-language library for task-based shared-memory parallel programming.
QuickSched extends the standard dependency-only scheme of task-based
programming with the concept of task conflicts, i.e.~sets of tasks that can be
executed in any order, yet not concurrently. These conflicts are modelled using
exclusively lockable hierarchical resources. The scheduler itself prioritizes
tasks along the critical path of execution and is shown to perform and scale
well on a 64-core parallel shared-memory machine for two example problems: A
tiled QR decomposition and a task-based Barnes-Hut tree code.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2016 19:41:17 GMT"
}
] | 2016-01-21T00:00:00 |
[
[
"Gonnet",
"Pedro",
""
],
[
"Chalk",
"Aidan B. G.",
""
],
[
"Schaller",
"Matthieu",
""
]
] |
new_dataset
| 0.999435 |
1404.5585
|
Matthew Skala
|
Matthew Skala
|
A Structural Query System for Han Characters
|
28 pages, 5 figures, for submission to ACM Transactions on Asian
Language Information Processing
|
International Journal of Asian Language Processing 23(2) (2015)
127-159
| null | null |
cs.CL cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The IDSgrep structural query system for Han character dictionaries is
presented. This system includes a data model and syntax for describing the
spatial structure of Han characters using Extended Ideographic Description
Sequences (EIDSes) based on the Unicode IDS syntax; a language for querying
EIDS databases, designed to suit the needs of font developers and foreign
language learners; a bit vector index inspired by Bloom filters for faster
query operations; a freely available implementation; and format translation
from popular third-party IDS and XML character databases. Experimental results
are included, with a comparison to other software used for similar
applications.
|
[
{
"version": "v1",
"created": "Tue, 22 Apr 2014 18:26:09 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Skala",
"Matthew",
""
]
] |
new_dataset
| 0.964099 |
1407.4235
|
Tatsuhiko Hatanaka
|
Tatsuhiko Hatanaka, Takehiro Ito, Xiao Zhou
|
The List Coloring Reconfiguration Problem for Bounded Pathwidth Graphs
| null | null |
10.1587/transfun.E98.A.1168
| null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of transforming one list (vertex) coloring of a graph
into another list coloring by changing only one vertex color assignment at a
time, while at all times maintaining a list coloring, given a list of allowed
colors for each vertex. This problem is known to be PSPACE-complete for
bipartite planar graphs. In this paper, we first show that the problem remains
PSPACE-complete even for bipartite series-parallel graphs, which form a proper
subclass of bipartite planar graphs. We note that our reduction indeed shows
the PSPACE-completeness for graphs with pathwidth two, and it can be extended
for threshold graphs. In contrast, we give a polynomial-time algorithm to solve
the problem for graphs with pathwidth one. Thus, this paper gives precise
analyses of the problem with respect to pathwidth.
|
[
{
"version": "v1",
"created": "Wed, 16 Jul 2014 08:55:12 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Hatanaka",
"Tatsuhiko",
""
],
[
"Ito",
"Takehiro",
""
],
[
"Zhou",
"Xiao",
""
]
] |
new_dataset
| 0.997937 |
1501.04705
|
Chenrong Xiong
|
Chenrong Xiong and Jun Lin and Zhiyuan Yan
|
Symbol-Decision Successive Cancellation List Decoder for Polar Codes
|
13 pages, 17 figures
| null |
10.1109/TSP.2015.2486750
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are of great interests because they provably achieve the capacity
of both discrete and continuous memoryless channels while having an explicit
construction. Most existing decoding algorithms of polar codes are based on
bit-wise hard or soft decisions. In this paper, we propose symbol-decision
successive cancellation (SC) and successive cancellation list (SCL) decoders
for polar codes, which use symbol-wise hard or soft decisions for higher
throughput or better error performance. First, we propose to use a recursive
channel combination to calculate symbol-wise channel transition probabilities,
which lead to symbol decisions. Our proposed recursive channel combination also
has a lower complexity than simply combining bit-wise channel transition
probabilities. The similarity between our proposed method and Arikan's channel
transformations also helps to share hardware resources between calculating bit-
and symbol-wise channel transition probabilities. Second, a two-stage list
pruning network is proposed to provide a trade-off between the error
performance and the complexity of the symbol-decision SCL decoder. Third, since
memory is a significant part of SCL decoders, we propose a pre-computation
memory-saving technique to reduce memory requirement of an SCL decoder.
Finally, to evaluate the throughput advantage of our symbol-decision decoders,
we design an architecture based on a semi-parallel successive cancellation list
decoder. In this architecture, different symbol sizes, sorting implementations,
and message scheduling schemes are considered. Our synthesis results show that
in terms of area efficiency, our symbol-decision SCL decoders outperform both
bit- and symbol-decision SCL decoders.
|
[
{
"version": "v1",
"created": "Tue, 20 Jan 2015 03:18:33 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Xiong",
"Chenrong",
""
],
[
"Lin",
"Jun",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
new_dataset
| 0.999241 |
1505.00344
|
Robert Merrison-Hort
|
Robert Merrison-Hort
|
Fireflies: New software for interactively exploring dynamical systems
using GPU computing
|
31 pages, 8 figures, 4 supplementary videos
| null |
10.1142/S0218127415501813
| null |
cs.MS cs.DC math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In non-linear systems, where explicit analytic solutions usually can't be
found, visualisation is a powerful approach which can give insights into the
dynamical behaviour of models; it is also crucial for teaching this area of
mathematics. In this paper we present new software, Fireflies, which exploits
the power of graphical processing unit (GPU) computing to produce spectacular
interactive visualisations of arbitrary systems of ordinary differential
equations. In contrast to typical phase portraits, Fireflies draws the current
position of trajectories (projected onto 2D or 3D space) as single points of
light, which move as the system is simulated. Due to the massively parallel
nature of GPU hardware, Fireflies is able to simulate millions of trajectories
in parallel (even on standard desktop computer hardware), producing "swarms" of
particles that move around the screen in real-time according to the equations
of the system. Particles that move forwards in time reveal stable attractors
(e.g. fixed points and limit cycles), while the option of integrating another
group of trajectories backwards in time can reveal unstable objects
(repellers). Fireflies allows the user to change the parameters of the system
as it is running, in order to see the effect that they have on the dynamics and
to observe bifurcations. We demonstrate the capabilities of the software with
three examples: a two-dimensional "mean field" model of neuronal activity, the
classical Lorenz system, and a 15-dimensional model of three interacting
biologically realistic neurons.
|
[
{
"version": "v1",
"created": "Sat, 2 May 2015 13:57:16 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Merrison-Hort",
"Robert",
""
]
] |
new_dataset
| 0.987792 |
1505.04569
|
Suman Sau
|
Suman Sau, Swagata Mandal, Jogender Saini, Amlan Chakrabarti and
Subhasis Chattopadhyay
|
High speed fault tolerant secure communication for muon chamber using
fpga based gbt emulator
| null | null |
10.1088/1742-6596/664/8/082049
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for
Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment
will investigate the highly compressed nuclear matter using nucleus-nucleus
collisions. This experiment will examine heavy-ion collisions in fixed target
geometry and will be able to measure hadrons, electrons and muons. CBM requires
precise time synchronization, compact hardware, radiation tolerance,
self-triggered front-end electronics, efficient data aggregation schemes and
capability to handle high data rate (up to several TB/s). As a part of the
implementation of read out chain of MUCH in India, we have tried to implement
FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that
can be used to implement multipurpose high speed bidirectional optical links
for high-energy physics (HEP) experiments and is developed by CERN. GBTx will
be used in highly irradiated area and more prone to be affected by multi bit
error. To mitigate this effect instead of single bit error correcting RS code
we have used two bit error correcting (15, 7) BCH code. It will increase the
redundancy which in turn increases the reliability of the coded data. So the
coded data will be less prone to be affected by noise due to radiation. Data
will go from detector to PC through multiple nodes through the communication
channel. In order to make the data communication secure, advanced encryption
standard (AES - a symmetric key cryptography) and RSA (asymmetric key
cryptography) are used after the channel coding.
|
[
{
"version": "v1",
"created": "Mon, 18 May 2015 09:32:11 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Sau",
"Suman",
""
],
[
"Mandal",
"Swagata",
""
],
[
"Saini",
"Jogender",
""
],
[
"Chakrabarti",
"Amlan",
""
],
[
"Chattopadhyay",
"Subhasis",
""
]
] |
new_dataset
| 0.998244 |
1601.04780
|
Paul E. Gunnells
|
Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells
|
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic
Eraser
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Algebraic Eraser Diffie-Hellman (AEDH) protocol was introduced in 2005
and published in 2006 by Anshel-Anshel-Goldfeld-Lemieux as a protocol suitable
for use on platforms with constrained computational resources, such as FPGAs,
ASICs, and wireless sensors. It is a group-theoretic cryptographic protocol
that allows two users to construct a shared secret via a Diffie-Hellman-type
scheme over an insecure channel.
Building on the refuted 2012 permutation-based attack of
Kalka-Teichner-Tsaban, in 2015 Ben-Zvi-Blackburn-Tsaban (BBT) presented a
heuristic attack that attempts to recover the AEDH shared secret. In their
paper BBT reference the AEDH protocol as presented to ISO for certification
(ISO 29167-20) by SecureRF. The ISO draft contains two profiles using the
Algebraic Eraser. One profile is unaffected by this attack; the second profile
is subject to their attack provided the attack runs in real time. This is not
the case in most practical deployments.
The BBT attack is simply a targeted attack that does not attempt to break the
method, system parameters, or recover any private keys. Rather, its limited
focus is to recover the shared secret in a single transaction. In addition, the
BBT attack is based on several conjectures that are assumed to hold when
parameters are chosen according to standard distributions, which can be
mitigated, if not avoided. This paper shows how to choose special distributions
so that these conjectures do not hold making the BBT attack ineffective for
braid groups with sufficiently many strands. Further, the BBT attack assumes
that certain data is available to an attacker, but there are realistic
deployment scenarios where this is not the case, making the attack fail
completely. In summary, the BBT attack is flawed (with respect to the SecureRF
ISO draft) and, at a minimum, over-reaches as to its applicability.
|
[
{
"version": "v1",
"created": "Tue, 19 Jan 2016 03:01:21 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Anshel",
"Iris",
""
],
[
"Atkins",
"Derek",
""
],
[
"Goldfeld",
"Dorian",
""
],
[
"Gunnells",
"Paul E.",
""
]
] |
new_dataset
| 0.99821 |
1601.04964
|
Ross Duncan
|
Ross Duncan and Kevin Dunne
|
Interacting Frobenius Algebras are Hopf
|
32 pages; submitted
| null | null | null |
cs.LO math.CT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Theories featuring the interaction between a Frobenius algebra and a Hopf
algebra have recently appeared in several areas in computer science: concurrent
programming, control theory, and quantum computing, among others. Bonchi,
Sobocinski, and Zanasi (2014) have shown that, given a suitable distributive
law, a pair of Hopf algebras forms two Frobenius algebras. Here we take the
opposite approach, and show that interacting Frobenius algebras form Hopf
algebras. We generalise (BSZ 2014) by including non-trivial dynamics of the
underlying object---the so-called phase group---and investigate the effects of
finite dimensionality of the underlying model. We recover the system of Bonchi
et al as a subtheory in the prime power dimensional case, but the more general
theory does not arise from a distributive law.
|
[
{
"version": "v1",
"created": "Tue, 19 Jan 2016 15:53:33 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Duncan",
"Ross",
""
],
[
"Dunne",
"Kevin",
""
]
] |
new_dataset
| 0.97453 |
1601.05069
|
Tan Le Thanh
|
Le Thanh Tan
|
Medium Access Control for Dynamic Spectrum Sharing in Cognitive Radio
Networks
|
This is the Ph.D. Dissertation
| null | null | null |
cs.NI cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The proliferation of wireless services and applications over the past decade
has led to the rapidly increasing demand in wireless spectrum. Hence, we have
been facing a critical spectrum shortage problem even though several
measurements have indicated that most licensed radio spectrum is very
underutilized. These facts have motivated the development of dynamic spectrum
access (DSA) and cognitive radio techniques to enhance the efficiency and
flexibility of spectrum utilization.
In this dissertation, we investigate design, analysis, and optimization
issues for joint spectrum sensing and cognitive medium access control (CMAC)
protocol engineering for cognitive radio networks (CRNs). The joint spectrum
sensing and CMAC design is considered under the interweave spectrum sharing
paradigm and different communications settings. Our research has resulted in
four major research contributions, namely, the CMAC protocol design with
parallel spectrum sensing, the CMAC protocol with sequential sensing, the CMAC
protocol with cooperative sensing and the asynchronous Full-Duplex cognitive
MAC.
We develop various analytical models for throughput performance analysis of
our proposed CMAC protocol designs. Based on these analytical models, we
develop different efficient algorithms to configure the CMAC protocol including
channel allocation, sensing time, transmit power, contention window to maximize
the total throughput of the secondary network. Furthermore, extensive numerical
results are presented to gain further insights and to evaluate the performance
of our CMAC protocol designs. Both the numerical and simulation results confirm
that our proposed CMAC protocols can achieve efficient spectrum utilization and
significant performance gains compared to existing and unoptimized designs.
|
[
{
"version": "v1",
"created": "Tue, 19 Jan 2016 20:34:08 GMT"
}
] | 2016-01-20T00:00:00 |
[
[
"Tan",
"Le Thanh",
""
]
] |
new_dataset
| 0.998671 |
1402.1617
|
Michal Yemini
|
Michal Yemini, Anelia Somekh-Baruch and Amir Leshem
|
Asynchronous Transmission over Single-User State-Dependent Channels
|
The paper "On channels with asynchronous side information" was split
into two separate papers: the enclosed paper which considers only
point-to-point channels and an additional paper named "On the multiple access
channel with asynchronous cognition" which discusses the multiuser setups
| null |
10.1109/TIT.2015.2476477
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several channels with asynchronous side information are introduced. We first
consider single-user state-dependent channels with asynchronous side
information at the transmitter. It is assumed that the state information
sequence is a possibly delayed version of the state sequence, and that the
encoder and the decoder are aware of the fact that the state information might
be delayed. It is additionally assumed that an upper bound on the delay is
known to both encoder and decoder, but other than that, they are ignorant of
the actual delay. We consider both the causal and the noncausal cases and
present achievable rates for these channels, and the corresponding coding
schemes. We find the capacity of the asynchronous Gel'fand-Pinsker channel with
feedback. Finally, we consider a memoryless state dependent channel with
asynchronous side information at both the transmitter and receiver, and
establish a single-letter expression for its capacity.
|
[
{
"version": "v1",
"created": "Fri, 7 Feb 2014 12:28:17 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2015 09:44:44 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Yemini",
"Michal",
""
],
[
"Somekh-Baruch",
"Anelia",
""
],
[
"Leshem",
"Amir",
""
]
] |
new_dataset
| 0.987826 |
1406.7577
|
Jermain Kaminski
|
Jermain Kaminski
|
Nowcasting the Bitcoin Market with Twitter Signals
| null | null | null |
ci-2014/48
|
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper analyzes correlations and causalities between Bitcoin market
indicators and Twitter posts containing emotional signals on Bitcoin. Within a
timeframe of 104 days (November 23rd 2013 - March 7th 2014), about 160,000
Twitter posts containing "bitcoin" and a positive, negative or uncertainty
related term were collected and further analyzed. For instance, the terms
"happy", "love", "fun", "good", "bad", "sad" and "unhappy" represent positive
and negative emotional signals, while "hope", "fear" and "worry" are considered
as indicators of uncertainty. The static (daily) Pearson correlation results
show a significant positive correlation between emotional tweets and the close
price, trading volume and intraday price spread of Bitcoin. However, a dynamic
Granger causality analysis does not confirm a statistically significant effect
of emotional Tweets on Bitcoin market values. To the contrary, the analyzed
data shows that a higher Bitcoin trading volume Granger causes more signals of
uncertainty within a 24 to 72-hour timeframe. This result leads to the
interpretation that emotional sentiments rather mirror the market than that
they make it predictable. Finally, the conclusion of this paper is that the
microblogging platform Twitter is Bitcoin's virtual trading floor, emotionally
reflecting its trading dynamics.
|
[
{
"version": "v1",
"created": "Mon, 30 Jun 2014 02:08:03 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Aug 2015 15:33:54 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Jan 2016 10:46:02 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Kaminski",
"Jermain",
""
]
] |
new_dataset
| 0.996596 |
1503.01008
|
Leandro Montero
|
J.-A. Angles d'Auriac, Cs. Bujtas, A. El Maftouhi, M. Karpinski, Y.
Manoussakis, L. Montero, N. Narayanan, L. Rosaz, J. Thapper, Zs. Tuza
|
Tropical Dominating Sets in Vertex-Coloured Graphs
|
19 pages, 4 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a vertex-coloured graph, a dominating set is said to be tropical if
every colour of the graph appears at least once in the set. Here, we study
minimum tropical dominating sets from structural and algorithmic points of
view. First, we prove that the tropical dominating set problem is NP-complete
even when restricted to a simple path. Then, we establish upper bounds related
to various parameters of the graph such as minimum degree and number of edges.
We also give upper bounds for random graphs. Last, we give approximability and
inapproximability results for general and restricted classes of graphs, and
establish a FPT algorithm for interval graphs.
|
[
{
"version": "v1",
"created": "Tue, 3 Mar 2015 16:53:03 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Oct 2015 15:43:44 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Jan 2016 10:49:18 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"d'Auriac",
"J. -A. Angles",
""
],
[
"Bujtas",
"Cs.",
""
],
[
"Maftouhi",
"A. El",
""
],
[
"Karpinski",
"M.",
""
],
[
"Manoussakis",
"Y.",
""
],
[
"Montero",
"L.",
""
],
[
"Narayanan",
"N.",
""
],
[
"Rosaz",
"L.",
""
],
[
"Thapper",
"J.",
""
],
[
"Tuza",
"Zs.",
""
]
] |
new_dataset
| 0.979192 |
1601.04066
|
Olanrewaju Eluyefa
|
Eluyefa Olanrewaju Andrew
|
Human Computer Symbiosis
| null | null | null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human Computer Symbiosis is similar to Human Computer Interaction in the
sense that it is about how humans and computer interact with each other. For
this interaction to be made there needs to be a symbiotic relationship between
man and computer. Man can interact with computer in many ways, either just by
typing with the keyboard or surfing the web. The cyber-physical-socio space is
an important aspect to be looked into when referring to the interaction between
man and computer. This paper investigates various aspects related to human
computer symbiosis. Alongside the aspects related to the topic, this paper
would also look into the limitations of Human Computer Symbiosis and evaluate
some previously proposed solutions.
|
[
{
"version": "v1",
"created": "Fri, 15 Jan 2016 01:04:23 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Andrew",
"Eluyefa Olanrewaju",
""
]
] |
new_dataset
| 0.999178 |
1601.04249
|
Jayanta Kumar Das
|
Jayanta Kumar Das, Pabitra Pal Choudhury, Sudhakar Sahoo
|
Multi-Number CVT-XOR Arithmetic Operations in any Base System and its
Significant Properties
|
Pages-4, Tables-4, Figure-2
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Carry Value Transformation (CVT) is a model of discrete dynamical system
which is one special case of Integral Value Transformations (IVTs). Earlier in
[5] it has been proved that sum of two non-negative integers is equal to the
sum of their CVT and XOR values in any base system. In the present study, this
phenomenon is extended to perform CVT and XOR operations for many non-negative
integers in any base system. To achieve that both the definition of CVT and XOR
are modified over the set of multiple integers instead of two. Also some
important properties of these operations have been studied. With the help of
cellular automata the adder circuit designed in [14] on using CVT-XOR
recurrence formula is used to design a parallel adder circuit for multiple
numbers in binary number system.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2015 13:19:36 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Das",
"Jayanta Kumar",
""
],
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Sahoo",
"Sudhakar",
""
]
] |
new_dataset
| 0.994494 |
1601.04669
|
Cornelia Fermuller Cornelia Fermuller
|
Morimichi Nishigaki and Cornelia Ferm\"uller
|
The Image Torque Operator for Contour Processing
|
32 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Contours are salient features for image description, but the detection and
localization of boundary contours is still considered a challenging problem.
This paper introduces a new tool for edge processing implementing the
Gestaltism idea of edge grouping. This tool is a mid-level image operator,
called the Torque operator, that is designed to help detect closed contours in
images. The torque operator takes as input the raw image and creates an image
map by computing from the image gradients within regions of multiple sizes a
measure of how well the edges are aligned to form closed convex contours.
Fundamental properties of the torque are explored and illustrated through
examples. Then it is applied in pure bottom-up processing in a variety of
applications, including edge detection, visual attention and segmentation and
experimentally demonstrated a useful tool that can improve existing techniques.
Finally, its extension as a more general grouping mechanism and application in
object recognition is discussed.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2016 19:40:50 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Nishigaki",
"Morimichi",
""
],
[
"Fermüller",
"Cornelia",
""
]
] |
new_dataset
| 0.984328 |
1601.04672
|
Andrew Adamatzky
|
Andrew Adamatzky
|
Physical maze solvers. All twelve prototypes implement 1961 Lee
algorithm
|
Final version of the paper will be published in "Emergent
Computation. Festschrift for Selim Akl" (Springer, 2016)
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We overview experimental laboratory prototypes of maze solvers. We speculate
that all maze solvers implement Lee algorithm by first developing a gradient of
values showing a distance from any site of the maze to the destination site and
then tracing a path from a given source site to the destination site. All
prototypes approximate a set of many-source-one-destination paths using
resistance, chemical and temporal gradients. They trace a path from a given
source site to the destination site using electrical current, fluidic, growth
of slime mould, Marangoni flow, crawling of epithelial cells, excitation waves
in chemical medium, propagating crystallisation patterns. Some of the
prototypes visualise the path using a stream of dye, thermal camera or glow
discharge; others require a computer to extract the path from time lapse images
of the tracing. We discuss the prototypes in terms of speed, costs and
durability of the path visualisation.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2016 19:54:21 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.997846 |
1601.04689
|
Santhosh Kumar
|
Shrinivas Kudekar, Santhosh Kumar, Marco Mondelli, Henry D. Pfister,
Eren \c{S}a\c{s}o\u{g}lu, R\"udiger Urbanke
|
Reed-Muller Codes Achieve Capacity on Erasure Channels
|
This article combines our previous articles arXiv:1505.05123 and
arXiv:1505.05831
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new approach to proving that a sequence of deterministic
linear codes achieves capacity on an erasure channel under maximum a posteriori
decoding. Rather than relying on the precise structure of the codes our method
exploits code symmetry. In particular, the technique applies to any sequence of
linear codes where the blocklengths are strictly increasing, the code rates
converge, and the permutation group of each code is doubly transitive. In other
words, we show that symmetry alone implies near-optimal performance.
An important consequence of this result is that a sequence of Reed-Muller
codes with increasing blocklength and converging rate achieves capacity. This
possibility has been suggested previously in the literature but it has only
been proven for cases where the limiting code rate is 0 or 1. Moreover, these
results extend naturally to all affine-invariant codes and, thus, to extended
primitive narrow-sense BCH codes. This also resolves, in the affirmative, the
existence question for capacity-achieving sequences of binary cyclic codes. The
primary tools used in the proof are the sharp threshold property for symmetric
monotone boolean functions and the area theorem for extrinsic information
transfer functions.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2016 20:50:08 GMT"
}
] | 2016-01-19T00:00:00 |
[
[
"Kudekar",
"Shrinivas",
""
],
[
"Kumar",
"Santhosh",
""
],
[
"Mondelli",
"Marco",
""
],
[
"Pfister",
"Henry D.",
""
],
[
"Şaşoğlu",
"Eren",
""
],
[
"Urbanke",
"Rüdiger",
""
]
] |
new_dataset
| 0.987622 |
1506.08477
|
O-joung Kwon
|
Eun Jung Kim and O-joung Kwon
|
A polynomial kernel for Block Graph Deletion
|
22 pages, 2 figures, An extended abstract appeared in IPEC2015
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the Block Graph Deletion problem, we are given a graph $G$ on $n$ vertices
and a positive integer $k$, and the objective is to check whether it is
possible to delete at most $k$ vertices from $G$ to make it a block graph,
i.e., a graph in which each block is a clique. In this paper, we obtain a
kernel with $\mathcal{O}(k^{6})$ vertices for the Block Graph Deletion problem.
This is a first step to investigate polynomial kernels for deletion problems
into non-trivial classes of graphs of bounded rank-width, but unbounded
tree-width. Our result also implies that Chordal Vertex Deletion admits a
polynomial-size kernel on diamond-free graphs. For the kernelization and its
analysis, we introduce the notion of `complete degree' of a vertex. We believe
that the underlying idea can be potentially applied to other problems. We also
prove that the Block Graph Deletion problem can be solved in time $10^{k}\cdot
n^{\mathcal{O}(1)}$.
|
[
{
"version": "v1",
"created": "Mon, 29 Jun 2015 00:01:09 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Dec 2015 21:37:24 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Jan 2016 21:06:50 GMT"
}
] | 2016-01-18T00:00:00 |
[
[
"Kim",
"Eun Jung",
""
],
[
"Kwon",
"O-joung",
""
]
] |
new_dataset
| 0.999553 |
1601.03768
|
Nicholas Moehle
|
Nicholas Moehle and Stephen Boyd
|
Optimal Current Waveforms for Switched-Reluctance Motors
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the problem of finding current waveforms for a
switched reluctance motor that minimize a user-defined combination of torque
ripple and RMS current. The motor model we use is fairly general, and includes
magnetic saturation, voltage and current limits, and highly coupled magnetics
(and therefore, unconventional geometries and winding patterns). We solve this
problem by approximating it as a mixed-integer convex program, which we solve
globally using branch and bound. We demonstrate our approach on an
experimentally verified model of a fully pitched switched reluctance motor, for
which we find the globally optimal waveforms, even for high rotor speeds.
|
[
{
"version": "v1",
"created": "Thu, 14 Jan 2016 22:08:13 GMT"
}
] | 2016-01-18T00:00:00 |
[
[
"Moehle",
"Nicholas",
""
],
[
"Boyd",
"Stephen",
""
]
] |
new_dataset
| 0.985546 |
1601.03829
|
Jun Kingsley Zou
|
Binyin Ren, Mao Wang, Jingjing Zhang, Wenjie Yang, Jun Zou, and Min
Hua
|
Cellular Communications on License-Exempt Spectrum: A Tutorial
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A traditional cellular system (e.g., LTE) operates only on the licensed
spectrum. This tutorial explains the concept of cellular communications on both
licensed and license-exempt spectrum under a unified architecture. The purpose
to extend a cellular system into the bandwidth-rich license-exempt spectrum is
to form a larger cellular network for all spectrum types. This would result in
an ultimate mobile converged cellular network. This tutorial examines the
benefits of this concept, the technical challenges, and provides a conceptual
LTE-based design example that helps to show how a traditional cellular system
like the LTE can adapt itself to a different spectrum type, conform to the
regulatory requirements, and harmoniously co-exist with the incumbent systems
such as Wi-Fi. In order to cope with the interference and regulation rules on
license-exempt spectrum, a special medium access mechanism is introduced into
the existing LTE transmission frame structure to exploit the full benefits of
coordinated and managed cellular architecture.
|
[
{
"version": "v1",
"created": "Fri, 15 Jan 2016 07:15:33 GMT"
}
] | 2016-01-18T00:00:00 |
[
[
"Ren",
"Binyin",
""
],
[
"Wang",
"Mao",
""
],
[
"Zhang",
"Jingjing",
""
],
[
"Yang",
"Wenjie",
""
],
[
"Zou",
"Jun",
""
],
[
"Hua",
"Min",
""
]
] |
new_dataset
| 0.997977 |
1601.03835
|
Shuling Wang
|
Tao Liu, Yangjia Li, Shuling Wang, Mingsheng Ying, Naijun Zhan
|
A Theorem Prover for Quantum Hoare Logic and Its Applications
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum Hoare Logic (QHL) was introduced in Ying's work to specify and reason
about quantum programs. In this paper, we implement a theorem prover for QHL
based on Isabelle/HOL. By applying the theorem prover, verifying a quantum
program against a specification is transformed equivalently into an order
relation between matrices. Due to the limitation of Isabelle/HOL, the
calculation of the order relation is solved by calling an outside oracle
written in Python. To the best of our knowledge, this is the first theorem
prover for quantum programs. To demonstrate its power, the correctness of two
well-known quantum algorithms, i.e., Grover Quantum Search and Quantum Phase
Estimation (the key step in Shor's quantum algorithm of factoring in polynomial
time) are proved using the theorem prover. These are the first mechanized
proofs for both of them.
|
[
{
"version": "v1",
"created": "Fri, 15 Jan 2016 08:34:04 GMT"
}
] | 2016-01-18T00:00:00 |
[
[
"Liu",
"Tao",
""
],
[
"Li",
"Yangjia",
""
],
[
"Wang",
"Shuling",
""
],
[
"Ying",
"Mingsheng",
""
],
[
"Zhan",
"Naijun",
""
]
] |
new_dataset
| 0.996004 |
1601.03533
|
Bernd Zwattendorfer
|
Bernd Zwattendorfer and Daniel Slamanig
|
The Austrian eID Ecosystem in the Public Cloud: How to Obtain Privacy
While Preserving Practicality
|
47 pages, 5 figures, Journal of Information Security and
Applications, 2015
| null |
10.1016/j.jisa.2015.11.004.
| null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The Austrian eID system constitutes a main pillar within the Austrian
e-Government strategy. The eID system ensures unique identification and secure
authentication for citizens protecting access to applications where sensitive
and personal data is involved. In particular, the Austrian eID system supports
three main use cases: Identification and authentication of Austrian citizens,
electronic representation, and foreign citizen authentication at Austrian
public sector applications. For supporting all these use cases, several
components -- either locally deployed in the applications' domain or centrally
deployed -- need to communicate with each other. While local deployments have
some advantages in terms of scalability, still a central deployment of all
involved components would be advantageous, e.g. due to less maintenance
efforts. However, a central deployment can easily lead to load bottlenecks
because theoretically the whole Austrian population as well as -- for foreign
citizens -- the whole EU population could use the provided services. To
mitigate the issue on scalability, in this paper we propose the migration of
main components of the ecosystem into a public cloud. However, a move of
trusted services into a public cloud brings up new obstacles, particular with
respect to privacy. To bypass the issue on privacy, in this paper we propose an
approach on how the complete Austrian eID ecosystem can be moved into a public
cloud in a privacy-preserving manner by applying selected cryptographic
technologies (in particular using proxy re-encryption and redactable
signatures). Applying this approach, no sensitive data will be disclosed to a
public cloud provider by still supporting all three main eID system use cases.
We finally discuss our approach based on selected criteria.
|
[
{
"version": "v1",
"created": "Thu, 14 Jan 2016 10:08:58 GMT"
}
] | 2016-01-15T00:00:00 |
[
[
"Zwattendorfer",
"Bernd",
""
],
[
"Slamanig",
"Daniel",
""
]
] |
new_dataset
| 0.997615 |
1601.03633
|
Joris Van Der Geer
|
Joris van der Geer
|
Transit directions at global scale
|
13 pages, 3 tables
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
A novel approach to integrated ground and air public transport journey
planning, operating at continent scale. Flexible date search, prerequisite for
long distance trips given their typical low and irregular service frequencies,
is core functionality. The algorithm is especially suited for irregular and
poorly structured networks. Almost all of the described functionality is
implemented in a working prototype. Using ground transport only, the system is
on par with Google Transit on random country-wide trips in the US.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2016 00:49:49 GMT"
}
] | 2016-01-15T00:00:00 |
[
[
"van der Geer",
"Joris",
""
]
] |
new_dataset
| 0.998136 |
1512.07767
|
Mateusz Dawid Miotk
|
Mateusz Miotk, Jerzy Topp
|
Hangable Graphs
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $G=(V_G,E_G)$ be a connected graph. The distance $d_G(u,v)$ between
vertices $u$ and $v$ in $G$ is the length of a shortest $u-v$ path in $G$. The
eccentricity of a vertex $v$ in $G$ is the integer $e_G(v)= \max\{ d_G(v,u)
\colon u\in V_G\}$. The diameter of $G$ is the integer $d(G)=
\max\{e_G(v)\colon v\in V_G\}$. The periphery of a~vertex $v$ of $G$ is the set
$P_G(v)= \{u\in V_G\colon d_G(v,u)= e_G(v)\}$, while the periphery of $G$ is
the set $P(G)= \{v\in V_G\colon e_G(v)=d(G)\}$. We say that graph $G$ is
hangable if $P_G(v)\subequal P(G)$ for every vertex $v$ of $G$. In this paper
we prove that every block graph is hangable and discuss the hangability of
products of graphs.
|
[
{
"version": "v1",
"created": "Thu, 24 Dec 2015 09:31:14 GMT"
}
] | 2016-01-14T00:00:00 |
[
[
"Miotk",
"Mateusz",
""
],
[
"Topp",
"Jerzy",
""
]
] |
new_dataset
| 0.991165 |
1601.01232
|
Edmond Boyer
|
Benjamin Allain, Li Wang, Jean-Sebastien Franco, Franck Hetroy, and
Edmond Boyer
|
Shape Animation with Combined Captured and Simulated Dynamics
| null | null | null | null |
cs.GR cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel volumetric animation generation framework to create new
types of animations from raw 3D surface or point cloud sequence of captured
real performances. The framework considers as input time incoherent 3D
observations of a moving shape, and is thus particularly suitable for the
output of performance capture platforms. In our system, a suitable virtual
representation of the actor is built from real captures that allows seamless
combination and simulation with virtual external forces and objects, in which
the original captured actor can be reshaped, disassembled or reassembled from
user-specified virtual physics. Instead of using the dominant surface-based
geometric representation of the capture, which is less suitable for volumetric
effects, our pipeline exploits Centroidal Voronoi tessellation decompositions
as unified volumetric representation of the real captured actor, which we show
can be used seamlessly as a building block for all processing stages, from
capture and tracking to virtual physic simulation. The representation makes no
human specific assumption and can be used to capture and re-simulate the actor
with props or other moving scenery elements. We demonstrate the potential of
this pipeline for virtual reanimation of a real captured event with various
unprecedented volumetric visual effects, such as volumetric distortion,
erosion, morphing, gravity pull, or collisions.
|
[
{
"version": "v1",
"created": "Wed, 6 Jan 2016 16:30:27 GMT"
}
] | 2016-01-14T00:00:00 |
[
[
"Allain",
"Benjamin",
""
],
[
"Wang",
"Li",
""
],
[
"Franco",
"Jean-Sebastien",
""
],
[
"Hetroy",
"Franck",
""
],
[
"Boyer",
"Edmond",
""
]
] |
new_dataset
| 0.998082 |
1601.03225
|
Davide Frey
|
Davide Frey, Hicham Lakhlef, Michel Raynal
|
Optimal Collision/Conflict-free Distance-2 Coloring in Synchronous
Broadcast/Receive Tree Networks
|
19 pages including one appendix. One Figure
| null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article is on message-passing systems where communication is (a)
synchronous and (b) based on the "broadcast/receive" pair of communication
operations. "Synchronous" means that time is discrete and appears as a sequence
of time slots (or rounds) such that each message is received in the very same
round in which it is sent. "Broadcast/receive" means that during a round a
process can either broadcast a message to its neighbors or receive a message
from one of them. In such a communication model, no two neighbors of the same
process, nor a process and any of its neighbors, must be allowed to broadcast
during the same time slot (thereby preventing message collisions in the first
case, and message conflicts in the second case). From a graph theory point of
view, the allocation of slots to processes is know as the distance-2 coloring
problem: a color must be associated with each process (defining the time slots
in which it will be allowed to broadcast) in such a way that any two processes
at distance at most 2 obtain different colors, while the total number of colors
is "as small as possible". The paper presents a parallel message-passing
distance-2 coloring algorithm suited to trees, whose roots are dynamically
defined. This algorithm, which is itself collision-free and conflict-free, uses
$\Delta + 1$ colors where $\Delta$ is the maximal degree of the graph (hence
the algorithm is color-optimal). It does not require all processes to have
different initial identities, and its time complexity is $O(d \Delta)$, where d
is the depth of the tree. As far as we know, this is the first distributed
distance-2 coloring algorithm designed for the broadcast/receive round-based
communication model, which owns all the previous properties.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2016 13:13:49 GMT"
}
] | 2016-01-14T00:00:00 |
[
[
"Frey",
"Davide",
""
],
[
"Lakhlef",
"Hicham",
""
],
[
"Raynal",
"Michel",
""
]
] |
new_dataset
| 0.997934 |
1601.03230
|
Pawan Kumar
|
Pawan Kumar
|
An Optimal Block Diagonal Preconditioner for Heterogeneous Saddle Point
Problems in Phase Separation
|
2 figures
| null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The phase separation processes are typically modeled by Cahn-Hilliard
equations. This equation was originally introduced to model phase separation in
binary alloys, where phase stands for concentration of different components in
alloy. When the binary alloy under preparation is subjected to a rapid
reduction in temperature below a critical temperature, it has been
experimentally observed that the concentration changes from a mixed state to a
visibly distinct spatially separated two phase for binary alloy. This rapid
reduction in the temperature, the so-called "deep quench limit", is modeled
effectively by obstacle potential. The discretization of Cahn-Hilliard equation
with obstacle potential leads to a block $2 \times 2$ {\em non-linear} system,
where the $(1,1)$ block has a non-linear and non-smooth term. Recently a
globally convergent Newton Schur method was proposed for the non-linear Schur
complement corresponding to this non-linear system. The proposed method is
similar to an inexact active set method in the sense that the active sets are
first approximately identified by solving a quadratic obstacle problem
corresponding to the $(1,1)$ block of the block $2 \times 2$ system, and later
solving a reduced linear system by annihilating the rows and columns
corresponding to identified active sets. For solving the quadratic obstacle
problem, various optimal multigrid like methods have been proposed. In this
paper, we study a non-standard norm that is equivalent to applying a block
diagonal preconditioner to the reduced linear systems. Numerical experiments
confirm the optimality of the solver and convergence independent of problem
parameters on sufficiently fine mesh.
|
[
{
"version": "v1",
"created": "Wed, 13 Jan 2016 13:18:24 GMT"
}
] | 2016-01-14T00:00:00 |
[
[
"Kumar",
"Pawan",
""
]
] |
new_dataset
| 0.984012 |
1409.0610
|
Anna-Lena Horlemann-Trautmann
|
Anna-Lena Horlemann-Trautmann
|
Message Encoding and Retrieval for Spread and Cyclic Orbit Codes
|
This is an extension of the previous work "Message Encoding for
Spread and Orbit Codes", which appeared in the Proceedings of the 2014 IEEE
International Symposium on Information Theory 2014 (Honolulu, USA)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spread codes and cyclic orbit codes are special families of constant
dimension subspace codes. These codes have been well-studied for their error
correction capability, transmission rate and decoding methods, but the question
of how to encode and retrieve messages has not been investigated. In this work
we show how a message set of consecutive integers can be encoded and retrieved
for these two code families.
|
[
{
"version": "v1",
"created": "Tue, 2 Sep 2014 06:10:54 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Mar 2015 08:55:29 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Jan 2016 13:28:56 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Horlemann-Trautmann",
"Anna-Lena",
""
]
] |
new_dataset
| 0.999082 |
1501.05371
|
Seongah Jeong
|
Seongah Jeong, Shahrouz Khalili, Osvaldo Simeone, Alexander Haimovich,
and Joonhyuk Kang
|
Multistatic Cloud Radar Systems: Joint Sensing and Communication Design
|
13 pages, 8 figures, Transactions on Emerging Telecommunications
Technologies
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a multistatic cloud radar system, receive sensors measure signals sent by
a transmit element and reflected from a target and possibly clutter, in the
presence of interference and noise. The receive sensors communicate over
non-ideal backhaul links with a fusion center, or cloud processor, where the
presence or absence of the target is determined. The backhaul architecture can
be characterized either by an orthogonal-access channel or by a non-orthogonal
multiple-access channel. Two backhaul transmission strategies are considered,
namely compress-and-forward (CF), which is well suited for the
orthogonal-access backhaul, and amplify-and-forward (AF), which leverages the
superposition property of the non-orthogonal multiple-access channel. In this
paper, the joint optimization of the sensing and backhaul communication
functions of the cloud radar system is studied. Specifically, the transmitted
waveform is jointly optimized with backhaul quantization in the case of CF
backhaul transmission and with the amplifying gains of the sensors for the AF
backhaul strategy. In both cases, the information-theoretic criterion of the
Bhattacharyya distance is adopted as a metric for the detection performance.
Algorithmic solutions based on successive convex approximation are developed
under different assumptions on the available channel state information (CSI).
Numerical results demonstrate that the proposed schemes outperform conventional
solutions that perform separate optimizations of the waveform and backhaul
operation, as well as the standard distributed detection approach.
|
[
{
"version": "v1",
"created": "Thu, 22 Jan 2015 02:27:24 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2016 09:01:22 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Jeong",
"Seongah",
""
],
[
"Khalili",
"Shahrouz",
""
],
[
"Simeone",
"Osvaldo",
""
],
[
"Haimovich",
"Alexander",
""
],
[
"Kang",
"Joonhyuk",
""
]
] |
new_dataset
| 0.997282 |
1502.04918
|
Yifei Jin
|
Jian Li, Yifei Jin
|
A PTAS for the Weighted Unit Disk Cover Problem
|
We fixed several typos in this version. 37 pages. 15 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are given a set of weighted unit disks and a set of points in Euclidean
plane. The minimum weight unit disk cover (\UDC) problem asks for a subset of
disks of minimum total weight that covers all given points. \UDC\ is one of the
geometric set cover problems, which have been studied extensively for the past
two decades (for many different geometric range spaces, such as (unit) disks,
halfspaces, rectangles, triangles). It is known that the unweighted \UDC\
problem is NP-hard and admits a polynomial-time approximation scheme (PTAS).
For the weighted \UDC\ problem, several constant approximations have been
developed. However, whether the problem admits a PTAS has been an open
question. In this paper, we answer this question affirmatively by presenting
the first PTAS for \UDC. Our result implies the first PTAS for the minimum
weight dominating set problem in unit disk graphs. Combining with existing
ideas, our result can also be used to obtain the first PTAS for the maxmimum
lifetime coverage problem and an improved constant approximation ratio for the
connected dominating set problem in unit disk graphs.
|
[
{
"version": "v1",
"created": "Tue, 17 Feb 2015 15:18:40 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Mar 2015 04:06:45 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Jan 2016 09:23:23 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Li",
"Jian",
""
],
[
"Jin",
"Yifei",
""
]
] |
new_dataset
| 0.998323 |
1504.05905
|
O-joung Kwon
|
Mamadou Moustapha Kant\'e, Eun Jung Kim, O-joung Kwon, Christophe Paul
|
An FPT algorithm and a polynomial kernel for Linear Rankwidth-1 Vertex
Deletion
|
29 pages, 9 figures, An extended abstract appeared in IPEC2015
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear rankwidth is a linearized variant of rankwidth, introduced by Oum and
Seymour [Approximating clique-width and branch-width. J. Combin. Theory Ser. B,
96(4):514--528, 2006]. Motivated from recent development on graph modification
problems regarding classes of graphs of bounded treewidth or pathwidth, we
study the Linear Rankwidth-1 Vertex Deletion problem (shortly, LRW1-Vertex
Deletion). In the LRW1-Vertex Deletion problem, given an $n$-vertex graph $G$
and a positive integer $k$, we want to decide whether there is a set of at most
$k$ vertices whose removal turns $G$ into a graph of linear rankwidth at most
$1$ and find such a vertex set if one exists. While the meta-theorem of
Courcelle, Makowsky, and Rotics implies that LRW1-Vertex Deletion can be solved
in time $f(k)\cdot n^3$ for some function $f$, it is not clear whether this
problem allows a running time with a modest exponential function.
We first establish that LRW1-Vertex Deletion can be solved in time $8^k\cdot
n^{\mathcal{O}(1)}$. The major obstacle to this end is how to handle a long
induced cycle as an obstruction. To fix this issue, we define necklace graphs
and investigate their structural properties. Later, we reduce the polynomial
factor by refining the trivial branching step based on a cliquewidth expression
of a graph, and obtain an algorithm that runs in time $2^{\mathcal{O}(k)}\cdot
n^4$. We also prove that the running time cannot be improved to $2^{o(k)}\cdot
n^{\mathcal{O}(1)}$ under the Exponential Time Hypothesis assumption. Lastly,
we show that the LRW1-Vertex Deletion problem admits a polynomial kernel.
|
[
{
"version": "v1",
"created": "Wed, 22 Apr 2015 17:59:22 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2016 21:54:41 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Kanté",
"Mamadou Moustapha",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Kwon",
"O-joung",
""
],
[
"Paul",
"Christophe",
""
]
] |
new_dataset
| 0.999659 |
1506.04832
|
Shweta Shinde
|
Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
|
Preventing Your Faults From Telling Your Secrets: Defenses Against
Pigeonhole Attacks
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New hardware primitives such as Intel SGX secure a user-level process in
presence of an untrusted or compromised OS. Such "enclaved execution" systems
are vulnerable to several side-channels, one of which is the page fault
channel. In this paper, we show that the page fault side-channel has sufficient
channel capacity to extract bits of encryption keys from commodity
implementations of cryptographic routines in OpenSSL and Libgcrypt --- leaking
27% on average and up to 100% of the secret bits in many case-studies. To
mitigate this, we propose a software-only defense that masks page fault
patterns by determinising the program's memory access behavior. We show that
such a technique can be built into a compiler, and implement it for a subset of
C which is sufficient to handle the cryptographic routines we study. This
defense when implemented generically can have significant overhead of up to
4000X, but with help of developer-assisted compiler optimizations, the overhead
reduces to at most 29.22% in our case studies. Finally, we discuss scope for
hardware-assisted defenses, and show one solution that can reduce overheads to
6.77% with support from hardware changes.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2015 04:28:11 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2016 07:33:47 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Shinde",
"Shweta",
""
],
[
"Chua",
"Zheng Leong",
""
],
[
"Narayanan",
"Viswesh",
""
],
[
"Saxena",
"Prateek",
""
]
] |
new_dataset
| 0.997858 |
1601.02328
|
Sukhamoy Pattanayak
|
Sukhamoy Pattanayak, Abhay Kumar Singh and Pratyush Kumar
|
On Quantum Codes Obtained From Cyclic Codes Over
$\mathbb{F}_2+u\mathbb{F}_2+u^2\mathbb{F}_2$
|
9 pages. arXiv admin note: text overlap with arXiv:1407.1232 by other
authors
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $R=\mathbb{F}_2+u\mathbb{F}_2+u^2\mathbb{F}_2$ be a non-chain finite
commutative ring, where $u^3=u$. In this paper, we mainly study the
construction of quantum codes from cyclic codes over $R$. We obtained
self-orthogonal codes over $\mathbb{F}_2$ as gray images of linear and cyclic
codes over $R$. The parameters of quantum codes which are obtained from cyclic
code over $R$ are discussed.
|
[
{
"version": "v1",
"created": "Mon, 11 Jan 2016 05:51:32 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2016 05:16:32 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Pattanayak",
"Sukhamoy",
""
],
[
"Singh",
"Abhay Kumar",
""
],
[
"Kumar",
"Pratyush",
""
]
] |
new_dataset
| 0.973876 |
1601.02605
|
Sunil Kumar Kopparapu Dr
|
Vinod K. Pandey, Arun Pande, Sunil Kumar Kopparapu
|
A Mobile Phone based Speech Therapist
|
6 pages, 6 figures, SimPe. [2011] Remote Speech Therapist Vinod
Pandey, Arun Pande, Sunil Kopparapu SiMPE 2011, Stockholm, Sweden, Aug 2011
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Patients with articulatory disorders often have difficulty in speaking. These
patients need several speech therapy sessions to enable them speak normally.
These therapy sessions are conducted by a specialized speech therapist. The
goal of speech therapy is to develop good speech habits as well as to teach how
to articulate sounds the right way. Speech therapy is critical for continuous
improvement to regain normal speech. Speech therapy sessions require a patient
to travel to a hospital or a speech therapy center for extended periods of time
regularly; this makes the process of speech therapy not only time consuming but
also very expensive. Additionally, there is a severe shortage of trained speech
therapists around the globe in general and in developing countries in
particular. In this paper, we propose a low cost mobile speech therapist, a
system that enables speech therapy using a mobile phone which eliminates the
need of the patient to frequently travel to a speech therapist in a far away
hospital. The proposed system, which is being built, enables both synchronous
and asynchronous interaction between the speech therapist and the patient
anytime anywhere
|
[
{
"version": "v1",
"created": "Mon, 11 Jan 2016 18:12:53 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Pandey",
"Vinod K.",
""
],
[
"Pande",
"Arun",
""
],
[
"Kopparapu",
"Sunil Kumar",
""
]
] |
new_dataset
| 0.999083 |
1601.02763
|
Alexander Zeh
|
Alexander Zeh, Eitan Yaakobi
|
Bounds and Constructions of Codes with Multiple Localities
| null | null | null | null |
cs.IT cs.DM cs.NI math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies bounds and constructions of locally repairable codes
(LRCs) with multiple localities so-called multiple-locality LRCs (ML-LRCs). In
the simplest case of two localities some code symbols of an ML-LRC have a
certain locality while the remaining code symbols have another one. We extend
two bounds, the Singleton and the alphabet-dependent upper bound on the
dimension of Cadambe--Mazumdar for LRCs, to the case of ML-LRCs with more than
two localities. Furthermore, we construct Singleton-optimal ML-LRCs as well as
codes that achieve the extended alphabet-dependent bound. We give a family of
binary ML-LRCs based on generalized code concatenation that is optimal with
respect to the alphabet-dependent bound.
|
[
{
"version": "v1",
"created": "Tue, 12 Jan 2016 08:27:06 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Zeh",
"Alexander",
""
],
[
"Yaakobi",
"Eitan",
""
]
] |
new_dataset
| 0.996427 |
1601.03027
|
Michael Roland
|
Michael Roland and Michael H\"olzl
|
Open Mobile API: Accessing the UICC on Android Devices
|
University of Applied Sciences Upper Austria, JR-Center u'smile,
Technical report, 76 pages, 12 figures
| null | null | null |
cs.CR cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report gives an overview of secure element integration into Android
devices. It focuses on the Open Mobile API as an open interface to access
secure elements from Android applications. The overall architecture of the Open
Mobile API is described and current Android devices are analyzed with regard to
the availability of this API. Moreover, this report summarizes our efforts of
reverse engineering the stock ROM of a Samsung Galaxy S3 in order to analyze
the integration of the Open Mobile API and the interface that is used to
perform APDU-based communication with the UICC (Universal Integrated Circuit
Card). It further provides a detailed explanation on how to integrate this
functionality into CyanogenMod (an after-market firmware for Android devices).
|
[
{
"version": "v1",
"created": "Tue, 12 Jan 2016 20:46:07 GMT"
}
] | 2016-01-13T00:00:00 |
[
[
"Roland",
"Michael",
""
],
[
"Hölzl",
"Michael",
""
]
] |
new_dataset
| 0.997171 |
1402.2664
|
Ren\'e van Bevern
|
Ren\'e van Bevern and Robert Bredereck and Jiehua Chen and Vincent
Froese and Rolf Niedermeier and Gerhard J. Woeginger
|
Network-Based Vertex Dissolution
|
Version accepted at SIAM Journal on Discrete Mathematics
|
SIAM Journal on Discrete Mathematics 29(2):888-914, 2015
|
10.1137/140978880
| null |
cs.DM cs.DS cs.SI math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a graph-theoretic vertex dissolution model that applies to a
number of redistribution scenarios such as gerrymandering in political
districting or work balancing in an online situation. The central aspect of our
model is the deletion of certain vertices and the redistribution of their load
to neighboring vertices in a completely balanced way.
We investigate how the underlying graph structure, the knowledge of which
vertices should be deleted, and the relation between old and new vertex loads
influence the computational complexity of the underlying graph problems. Our
results establish a clear borderline between tractable and intractable cases.
|
[
{
"version": "v1",
"created": "Tue, 11 Feb 2014 21:12:04 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2014 16:19:03 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Mar 2015 21:21:59 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"van Bevern",
"René",
""
],
[
"Bredereck",
"Robert",
""
],
[
"Chen",
"Jiehua",
""
],
[
"Froese",
"Vincent",
""
],
[
"Niedermeier",
"Rolf",
""
],
[
"Woeginger",
"Gerhard J.",
""
]
] |
new_dataset
| 0.986266 |
1406.4824
|
Nitu Kumari
|
Rana D. Parshad, Vineeta Chand, Neha Sinha, Nitu Kumari
|
What is India speaking: The "Hinglish" invasion
|
This paper has been withdrawan as the model has now been modified and
the existing model has some errors
| null | null | null |
cs.CL math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While language competition models of diachronic language shift are
increasingly sophisticated, drawing on sociolinguistic components like variable
language prestige, distance from language centers and intermediate bilingual
transitionary populations, in one significant way they fall short. They fail to
consider contact-based outcomes resulting in mixed language practices, e.g.
outcome scenarios such as creoles or unmarked code switching as an emergent
communicative norm. On these lines something very interesting is uncovered in
India, where traditionally there have been monolingual Hindi speakers and
Hindi/English bilinguals, but virtually no monolingual English speakers. While
the Indian census data reports a sharp increase in the proportion of
Hindi/English bilinguals, we argue that the number of Hindi/English bilinguals
in India is inaccurate, given a new class of urban individuals speaking a mixed
lect of Hindi and English, popularly known as "Hinglish". Based on
predator-prey, sociolinguistic theories, salient local ecological factors and
the rural-urban divide in India, we propose a new mathematical model of
interacting monolingual Hindi speakers, Hindi/English bilinguals and Hinglish
speakers. The model yields globally asymptotic stable states of coexistence, as
well as bilingual extinction. To validate our model, sociolinguistic data from
different Indian classes are contrasted with census reports: We see that
purported urban Hindi/English bilinguals are unable to maintain fluent Hindi
speech and instead produce Hinglish, whereas rural speakers evidence
monolingual Hindi. Thus we present evidence for the first time where an
unrecognized mixed lect involving English but not "English", has possibly taken
over a sizeable faction of a large global population.
|
[
{
"version": "v1",
"created": "Thu, 12 Jun 2014 21:20:46 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Dec 2015 20:57:25 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Parshad",
"Rana D.",
""
],
[
"Chand",
"Vineeta",
""
],
[
"Sinha",
"Neha",
""
],
[
"Kumari",
"Nitu",
""
]
] |
new_dataset
| 0.987323 |
1504.06355
|
Normann Decker
|
Normann Decker and Daniel Thoma
|
On Freeze LTL with Ordered Attributes
|
Extended version of article published in proceedings of FoSSaCS 2016
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with Freeze LTL, a temporal logic on data words with
registers. In a (multi-attributed) data word each position carries a letter
from a finite alphabet and assigns a data value to a fixed, finite set of
attributes. The satisfiability problem of Freeze LTL is undecidable if more
than one register is available or tuples of data values can be stored and
compared arbitrarily. Starting from the decidable one-register fragment we
propose an extension that allows for specifying a dependency relation on
attributes. This restricts in a flexible way how collections of attribute
values can be stored and compared. This conceptual dimension is orthogonal to
the number of registers or the available temporal operators. The extension is
strict. Admitting arbitrary dependency relations satisfiability becomes
undecidable. Tree-like relations, however, induce a family of decidable
fragments escalating the ordinal-indexed hierarchy of fast-growing complexity
classes, a recently introduced framework for non-primitive recursive
complexities. This results in completeness for the class ${\bf
F}_{\epsilon_0}$. We employ nested counter systems and show that they relate to
the hierarchy in terms of the nesting depth.
|
[
{
"version": "v1",
"created": "Thu, 23 Apr 2015 22:09:18 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Jan 2016 14:58:00 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Decker",
"Normann",
""
],
[
"Thoma",
"Daniel",
""
]
] |
new_dataset
| 0.979821 |
1507.01444
|
Vladimir Garcia-Morales
|
Vladimir Garcia-Morales
|
Fractal surfaces from simple arithmetic operations
|
15 pages, 6 figures, minor corrections. Published in Physica A
|
Physica A 447, 535 (2016)
|
10.1016/j.physa.2015.12.028
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fractal surfaces ('patchwork quilts') are shown to arise under most general
circumstances involving simple bitwise operations between real numbers. A
theory is presented for all deterministic bitwise operations on a finite
alphabet. It is shown that these models give rise to a roughness exponent $H$
that shapes the resulting spatial patterns, larger values of the exponent
leading to coarser surfaces.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 06:14:31 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Nov 2015 14:11:37 GMT"
},
{
"version": "v3",
"created": "Sun, 10 Jan 2016 15:27:21 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Garcia-Morales",
"Vladimir",
""
]
] |
new_dataset
| 0.999702 |
1509.08605
|
Bj\"orn Engelmann
|
Bj\"orn Engelmann and Ernst-R\"udiger Olderog
|
A Sound and Complete Hoare Logic for Dynamically-Typed, Object-Oriented
Programs -- Extended Version --
|
Extended Version -- contains all proofs, proof rules and additional
information; new version -- elaborated explanations in section 7, added
reference, minor visual improvements; new version -- incorporated reviews &
improved formalizations
| null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple dynamically-typed, (purely) object-oriented language is defined. A
structural operational semantics as well as a Hoare-style program logic for
reasoning about programs in the language in multiple notions of correctness are
given. The Hoare logic is proved to be both sound and (relative) complete and
is -- to the best of our knowledge -- the first such logic presented for a
dynamically-typed language.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2015 06:38:40 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2015 22:10:59 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Jan 2016 23:06:08 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Engelmann",
"Björn",
""
],
[
"Olderog",
"Ernst-Rüdiger",
""
]
] |
new_dataset
| 0.997933 |
1601.02117
|
Chathura Sarathchandra Magurawalage
|
Chathura Sarathchandra Magurawalage, Kun Yang
|
LAPPS: Location Aware Password Protection System
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Location Aware Password Protection System (LAPPS) is designed to strengthen
the security of traditional password protection systems. This is achieved by
adding several layers of protection to the passwords that most traditional
password protection systems generate. The current implementation looks at the
Password/Pin numbers of Credit/Debit cards that are used on Automated Teller
Machine (ATM),though the underlying design of the system can be used in many
other scenarios. A password that is generated will be allocated to a particular
user and to the ATM that is nearest to the user. LAPPS ensures the following
qualities of the passwords that it generates. Location Awareness: The passwords
are generated according to the users' geographical area, that they request
their passwords from. So a password will only be active in just one location.
Time Awareness: A password will only be valid for five minutes. The unused
passwords will be discarded. Dynamic: The user has to have a new password each
time he/she logs in. A password is generated to be used only once. User
Oriented/Specific: The received password can only be used by the requester, and
can only be used on its allocated ATM. Two Factor Authenticity: The
confidential information will be secured using two-factor authentication. For
extra security, a Pin generating device has been introduced. This will produce
an eight digit number that the user has to supply to the mobile application,
before requesting for a password. The user can obtain a pin number by inserting
his/her Debit/Credit card and the fixed password that has been allocated when
the user registers with the system.
|
[
{
"version": "v1",
"created": "Sat, 9 Jan 2016 14:36:19 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Magurawalage",
"Chathura Sarathchandra",
""
],
[
"Yang",
"Kun",
""
]
] |
new_dataset
| 0.999122 |
1601.02130
|
Luis Veiga
|
Pradeeban Kathiravelu and Lu\'is Veiga
|
SENDIM for Incremental Development of Cloud Networks
| null | null | null |
INESC-ID Tec. Rep. 23/2015, October 2015
|
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the limited and varying availability of cheap infrastructure and
resources, cloud network systems and applications are tested in simulation and
emulation environments prior to physical deployments, at different stages of
development. Configuration management tools manage deployments and migrations
across different cloud platforms, mitigating tedious system administration
efforts. However, currently a cloud networking simulation cannot be migrated as
an emulation, or vice versa, without rewriting and manually re-deploying the
simulated application. This paper presents SENDIM (Sendim is a northeastern
Portuguese town close to the Spanish border, where the rare Mirandese language
is spoken), a Simulation, Emulation, aNd Deployment Integration Middleware for
cloud networks. As an orchestration platform for incrementally building
Software-Defined Cloud Networks (SDCN), SENDIM manages the development and
deployment of algorithms and architectures the entire length from
visualization, simulation, emulation, to physical deployments. Hence, SENDIM
optimizes the evaluation of cloud networks.
|
[
{
"version": "v1",
"created": "Sat, 9 Jan 2016 16:52:23 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Kathiravelu",
"Pradeeban",
""
],
[
"Veiga",
"Luís",
""
]
] |
new_dataset
| 0.995226 |
1601.02204
|
Hyeonbeom Lee
|
Hyeonbeom Lee and Suseong Kim and H. Jin Kim
|
Control of an Aerial Manipulator using On-line Parameter Estimator for
an Unknown Payload
|
2015 IEEE International Conference on Automation Science and
Engineering
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an estimation and control algorithm for an aerial
manipulator using a hexacopter with a 2-DOF robotic arm. The unknown parameters
of a payload are estimated by an on-line estimator based on parametrization of
the aerial manipulator dynamics. With the estimated mass information and the
augmented passivity-based controller, the aerial manipulator can fly with the
unknown object. Simulation for an aerial manipulator is performed to compare
estimation performance between the proposed control algorithm and conventional
adaptive sliding mode controller. Experimental results show a successful flight
of a custom-made aerial manipulator while the unknown parameters related to an
additional payload were estimated satisfactorily.
|
[
{
"version": "v1",
"created": "Sun, 10 Jan 2016 12:07:09 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Lee",
"Hyeonbeom",
""
],
[
"Kim",
"Suseong",
""
],
[
"Kim",
"H. Jin",
""
]
] |
new_dataset
| 0.984713 |
1601.02372
|
Luka \v{C}ehovin
|
Jernej Kos and Mitar Milutinovi\'c and Luka \v{C}ehovin
|
nodewatcher: A Substrate for Growing Your own Community Network
| null |
Computer Networks, Volume 93, Part 2, 24 December 2015
|
10.1016/j.comnet.2015.09.021
| null |
cs.SI
|
http://creativecommons.org/licenses/by/4.0/
|
Community networks differ from regular networks by their organic growth
patterns -- there is no central planning body that would decide how the network
is built. Instead, the network grows in a bottom-up fashion as more people
express interest in participating in the community and connect with their
neighbours. People who participate in community networks are usually volunteers
with limited free time. Due to these factors, making the management of
community networks simpler and easier for all participants is the key component
in boosting their growth. Specifics of individual networks often force
communities to develop their own sets of tools and best practices which are
hard to share and do not interoperate well with others. We propose a new
general community network management platform nodewatcher that is built around
the core principle of modularity and extensibility, making it suitable for
reuse by different community networks. Devices are configured using
platform-independent configuration which nodewatcher can transform into
deployable firmware images, eliminating any manual device configuration,
reducing errors, and enabling participation of novice maintainers. An embedded
monitoring system enables live overview and validation of the whole community
network. We show how the system successfully operates in an actual community
wireless network, wlan Slovenija.
|
[
{
"version": "v1",
"created": "Mon, 11 Jan 2016 09:44:03 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Kos",
"Jernej",
""
],
[
"Milutinović",
"Mitar",
""
],
[
"Čehovin",
"Luka",
""
]
] |
new_dataset
| 0.998734 |
1601.02487
|
Ahmed Bassiouny
|
Abubakrelsedik Karali, Ahmad Bassiouny and Motaz El-Saban
|
Facial Expression Recognition in the Wild using Rich Deep Features
|
in International Conference in Image Processing, 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Facial Expression Recognition is an active area of research in computer
vision with a wide range of applications. Several approaches have been
developed to solve this problem for different benchmark datasets. However,
Facial Expression Recognition in the wild remains an area where much work is
still needed to serve real-world applications. To this end, in this paper we
present a novel approach towards facial expression recognition. We fuse rich
deep features with domain knowledge through encoding discriminant facial
patches. We conduct experiments on two of the most popular benchmark datasets;
CK and TFE. Moreover, we present a novel dataset that, unlike its precedents,
consists of natural - not acted - expression images. Experimental results show
that our approach achieves state-of-the-art results over standard benchmarks
and our own dataset
|
[
{
"version": "v1",
"created": "Mon, 11 Jan 2016 15:52:27 GMT"
}
] | 2016-01-12T00:00:00 |
[
[
"Karali",
"Abubakrelsedik",
""
],
[
"Bassiouny",
"Ahmad",
""
],
[
"El-Saban",
"Motaz",
""
]
] |
new_dataset
| 0.997084 |
1402.4466
|
Daniel Lemire
|
Owen Kaser and Daniel Lemire
|
Compressed bitmap indexes: beyond unions and intersections
|
Accepted for publication in Software: Practice and Experience on
August 14th 2014. Note that arXiv:1402.4073 [cs:DB] is a companion to this
paper; while they share some text, each contains many results not in the
other
|
Software: Practice & Experience 46 (2), 2016
|
10.1002/spe.2289
| null |
cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compressed bitmap indexes are used to speed up simple aggregate queries in
databases. Indeed, set operations like intersections, unions and complements
can be represented as logical operations (AND,OR,NOT) that are ideally suited
for bitmaps. However, it is less obvious how to apply bitmaps to more advanced
queries. For example, we might seek products in a store that meet some, but
maybe not all, criteria. Such threshold queries generalize intersections and
unions; they are often used in information-retrieval and data-mining
applications. We introduce new algorithms that are sometimes three orders of
magnitude faster than a naive approach. Our work shows that bitmap indexes are
more broadly applicable than is commonly believed.
|
[
{
"version": "v1",
"created": "Tue, 18 Feb 2014 20:41:33 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2014 18:28:14 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Aug 2014 13:45:47 GMT"
}
] | 2016-01-11T00:00:00 |
[
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] |
new_dataset
| 0.996083 |
1509.07395
|
Eitan Zahavi
|
Eitan Zahavi, Alex Shpiner, Ori Rottenstreich, Avinoam Kolodny and
Isaac Keslassy
|
Links as a Service (LaaS): Feeling Alone in the Shared Cloud
|
CCIT Report 888 September 2015, EE Pub No. 1845, Technion, Israel
| null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The most demanding tenants of shared clouds require complete isolation from
their neighbors, in order to guarantee that their application performance is
not affected by other tenants. Unfortunately, while shared clouds can offer an
option whereby tenants obtain dedicated servers, they do not offer any network
provisioning service, which would shield these tenants from network
interference. In this paper, we introduce Links as a Service, a new abstraction
for cloud service that provides physical isolation of network links. Each
tenant gets an exclusive set of links forming a virtual fat tree, and is
guaranteed to receive the exact same bandwidth and delay as if it were alone in
the shared cloud. Under simple assumptions, we derive theoretical conditions
for enabling LaaS without capacity over-provisioning in fat-trees. New tenants
are only admitted in the network when they can be allocated hosts and links
that maintain these conditions. Using experiments on real clusters as well as
simulations with real-life tenant sizes, we show that LaaS completely avoids
the performance degradation caused by traffic from concurrent tenants on shared
links. Compared to mere host isolation, LaaS can improve the application
performance by up to 200%, at the cost of a 10% reduction in the cloud
utilization.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2015 14:49:45 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Jan 2016 12:39:35 GMT"
}
] | 2016-01-11T00:00:00 |
[
[
"Zahavi",
"Eitan",
""
],
[
"Shpiner",
"Alex",
""
],
[
"Rottenstreich",
"Ori",
""
],
[
"Kolodny",
"Avinoam",
""
],
[
"Keslassy",
"Isaac",
""
]
] |
new_dataset
| 0.998914 |
1601.01754
|
Shizuo Kaji
|
Genki Matsuda, Shizuo Kaji, Hiroyuki Ochiai
|
Anti-commutative Dual Complex Numbers and 2D Rigid Transformation
| null | null | null | null |
cs.GR cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new presentation of the two dimensional rigid transformation
which is more concise and efficient than the standard matrix presentation. By
modifying the ordinary dual number construction for the complex numbers, we
define the ring of the anti-commutative dual complex numbers, which
parametrizes two dimensional rotation and translation all together. With this
presentation, one can easily interpolate or blend two or more rigid
transformations at a low computational cost. We developed a library for C++
with the MIT-licensed source code and demonstrate its facility by an
interactive deformation tool developed for iPad.
|
[
{
"version": "v1",
"created": "Fri, 8 Jan 2016 02:56:57 GMT"
}
] | 2016-01-11T00:00:00 |
[
[
"Matsuda",
"Genki",
""
],
[
"Kaji",
"Shizuo",
""
],
[
"Ochiai",
"Hiroyuki",
""
]
] |
new_dataset
| 0.998597 |
1601.01923
|
Andrea Goldsmith
|
M. S. Alouini, E. Biglieri, D. Divsalar, S. Dolinar, A. Goldsmith, L.
Milstein
|
The life and work of Marvin Kenneth Simon
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is a measure of the importance and profundity of Marvin Kenneth Simon's
contributions to communication theory that this tribute article and tutorial
about his life and work is of current research relevance in spite of the
continually accelerating rate of evolution in this area. Marv, as the entire
community affectionately knew him, was one of the most prolific and influential
communications researchers of his generation. Moreover, he laid the foundation
for many of the techniques used in communication systems today. Marv's tragic
death on September 23, 2007 continues to engender pangs not only of sadness at
the passing of a great friend to many in our community, but also of regret that
he is no longer with us to help in resolving the many challenges facing
communication systems today.
|
[
{
"version": "v1",
"created": "Fri, 8 Jan 2016 16:10:42 GMT"
}
] | 2016-01-11T00:00:00 |
[
[
"Alouini",
"M. S.",
""
],
[
"Biglieri",
"E.",
""
],
[
"Divsalar",
"D.",
""
],
[
"Dolinar",
"S.",
""
],
[
"Goldsmith",
"A.",
""
],
[
"Milstein",
"L.",
""
]
] |
new_dataset
| 0.994025 |
1601.01983
|
Ozgun Bursalioglu
|
Ozgun Y. Bursalioglu, Chenwei Wang, Haralabos Papadopoulos, Giuseppe
Caire
|
RRH based Massive MIMO with "on the Fly" Pilot Contamination Control
|
7 pages, 9 figures, extension of ICC 2016 submission
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dense large-scale antenna deployments are one of the most promising
technologies for delivering very large throughputs per unit area in the
downlink (DL) of cellular networks. We consider such a dense deployment
involving a distributed system formed by multi-antenna remote radio head (RRH)
units connected to the same fronthaul serving a geographical area. Knowledge of
the DL channel between each active user and its nearby RRH antennas is most
efficiently obtained at the RRHs via reciprocity based training, that is, by
estimating a user's channel using uplink (UL) pilots transmitted by the user,
and exploiting the UL/DL channel reciprocity.
We consider aggressive pilot reuse across an RRH system, whereby a single
pilot dimension is simultaneously assigned to multiple active users. We
introduce a novel coded pilot approach, which allows each RRH unit to detect
pilot collisions, i.e., when more than a single user in its proximity uses the
same pilot dimensions. Thanks to the proposed coded pilot approach, pilot
contamination can be substantially avoided. As shown, such strategy can yield
densification benefits in the form of increased multiplexing gain per UL pilot
dimension with respect to conventional reuse schemes and some recent approaches
assigning pseudorandom pilot vectors to the active users.
|
[
{
"version": "v1",
"created": "Fri, 8 Jan 2016 19:23:23 GMT"
}
] | 2016-01-11T00:00:00 |
[
[
"Bursalioglu",
"Ozgun Y.",
""
],
[
"Wang",
"Chenwei",
""
],
[
"Papadopoulos",
"Haralabos",
""
],
[
"Caire",
"Giuseppe",
""
]
] |
new_dataset
| 0.991853 |
1308.4316
|
Abouzar Ghavami
|
Abouzar Ghavami, Koushik Kar and Aparna Gupta
|
Decentralized Charging of Plug-In Electric Vehicles with Distribution
Feeder Overload Control
|
25 pages, 6 Figures, Journal
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the number of charging Plug-in Electric Vehicles (PEVs) increase, due to
the limited power capacity of the distribution feeders and the sensitivity of
the mid-way distribution transformers to the excessive load, it is crucial to
control the amount of power through each specific distribution feeder to avoid
system overloads that may lead to breakdowns. In this paper we develop, analyze
and evaluate charging algorithms for PEVs with feeder overload constraints in
the distribution grid. The algorithms we propose jointly minimize the variance
of the aggregate load and prevent overloading of the distribution feeders.
|
[
{
"version": "v1",
"created": "Tue, 20 Aug 2013 14:17:24 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Aug 2013 13:49:30 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Jan 2016 04:17:23 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Ghavami",
"Abouzar",
""
],
[
"Kar",
"Koushik",
""
],
[
"Gupta",
"Aparna",
""
]
] |
new_dataset
| 0.993496 |
1408.4113
|
Costas Constantinou Ph.D.
|
Costas K. Constantinou, Georgios Ellinas, Christos Panayiotou and
Marios Polycarpou
|
Fast Shortest Path Routing in Transportation Networks with
Time-Dependent Road Speeds
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The current paper deals with the subject of shortest path routing in
transportation networks (in terms of travelling time), where the speed in
several of the network's roads is a function of the time interval. The main
contribution of the paper is a procedure that is faster compared to the
conventional approaches, that derives the road's traversal time according to
the time instant of departure, for the case where the road's speed has a
constant value inside each time interval (in general, different value for each
time interval). Furthermore, the case where the road's speed is a linear
function of time inside each time interval (in general, different linear
function for each time interval) is investigated. A procedure that derives the
road's traversal time according to the time instant of departure is proposed
for this case as well. The proposed procedures are combined with Dijkstra's
algorithm and the resulting algorithms, that are practically applicable and of
low complexity, provide optimal shortest path routing in the networks under
investigation.
|
[
{
"version": "v1",
"created": "Sun, 17 Aug 2014 18:07:08 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Sep 2014 14:11:22 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Sep 2014 14:32:53 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Sep 2014 09:22:30 GMT"
},
{
"version": "v5",
"created": "Tue, 5 May 2015 12:17:58 GMT"
},
{
"version": "v6",
"created": "Thu, 7 Jan 2016 00:36:34 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Constantinou",
"Costas K.",
""
],
[
"Ellinas",
"Georgios",
""
],
[
"Panayiotou",
"Christos",
""
],
[
"Polycarpou",
"Marios",
""
]
] |
new_dataset
| 0.999066 |
1501.07319
|
Su Min Kim Prof.
|
Su Min Kim and Mats Bengtsson
|
Virtual Full-Duplex Buffer-Aided Relaying in the Presence of Inter-Relay
Interference
|
Accepted for publication to IEEE Transactions on Wireless
Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study virtual full-duplex (FD) buffer-aided relaying to
recover the loss of multiplexing gain caused by half-duplex (HD) relaying in a
multiple relay network, where each relay is equipped with a buffer and multiple
antennas, through joint opportunistic relay selection (RS) and beamforming (BF)
design. The main idea of virtual FD buffer-aided relaying is that the source
and one of the relays simultaneously transmit their own information to another
relay and the destination, respectively. In such networks, inter-relay
interference (IRI) is a crucial problem which has to be resolved like
self-interference in the FD relaying. In contrast to previous work that
neglected IRI, we propose joint RS and BF schemes taking IRI into consideration
by using multiple antennas at the relays. In order to maximize average
end-to-end rate, we propose a weighted sum-rate maximization strategy assuming
that adaptive rate transmission is employed in both the source to relay and
relay to destination links. Then, we propose several BF schemes cancelling or
suppressing IRI in order to maximize the weighted sum-rate. Numerical results
show that our proposed optimal, zero forcing, and minimum mean square error
BF-based RS schemes asymptotically approach the ideal FD relaying upper bound
when increasing the number of antennas and/or the number of relays.
|
[
{
"version": "v1",
"created": "Thu, 29 Jan 2015 00:49:28 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jul 2015 11:40:31 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Jan 2016 17:57:13 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Kim",
"Su Min",
""
],
[
"Bengtsson",
"Mats",
""
]
] |
new_dataset
| 0.993541 |
1506.05920
|
Tsuyoshi Kato
|
Tsuyoshi Kato, Raissa Relator, Hayliang Ngouv, Yoshihiro Hirohashi,
Tetsuhiro Kakimoto, Kinya Okada
|
New Descriptor for Glomerulus Detection in Kidney Microscopy Image
| null |
BMC Bioinformatics, 16:316, 2015
|
10.1186/s12859-015-0739-1
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Glomerulus detection is a key step in histopathological evaluation of
microscopy images of kidneys. However, the task of automatic detection of
glomeruli poses challenges due to the disparity in sizes and shapes of
glomeruli in renal sections. Moreover, extensive variations of their
intensities due to heterogeneity in immunohistochemistry staining are also
encountered. Despite being widely recognized as a powerful descriptor for
general object detection, the rectangular histogram of oriented gradients
(Rectangular HOG) suffers from many false positives due to the aforementioned
difficulties in the context of glomerulus detection.
A new descriptor referred to as Segmental HOG is developed to perform a
comprehensive detection of hundreds of glomeruli in images of whole kidney
sections. The new descriptor possesses flexible blocks that can be adaptively
fitted to input images to acquire robustness to deformations of glomeruli.
Moreover, the novel segmentation technique employed herewith generates high
quality segmentation outputs and the algorithm is assured to converge to an
optimal solution. Consequently, experiments using real world image data reveal
that Segmental HOG achieves significant improvements in detection performance
compared to Rectangular HOG.
The proposed descriptor and method for glomeruli detection present promising
results and is expected to be useful in pathological evaluation.
|
[
{
"version": "v1",
"created": "Fri, 19 Jun 2015 09:03:48 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Kato",
"Tsuyoshi",
""
],
[
"Relator",
"Raissa",
""
],
[
"Ngouv",
"Hayliang",
""
],
[
"Hirohashi",
"Yoshihiro",
""
],
[
"Kakimoto",
"Tetsuhiro",
""
],
[
"Okada",
"Kinya",
""
]
] |
new_dataset
| 0.997347 |
1510.02696
|
Cristina Basescu
|
Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian
Perrig, Yao Zhang, Hsu-Chun Hsiao, Ayumu Kubota and Jumpei Urakawa
|
SIBRA: Scalable Internet Bandwidth Reservation Architecture
|
To appear in Proceedings of Symposium on Network and Distributed
System Security (NDSS) 2016
| null |
10.14722/ndss.2016.23132
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a Scalable Internet Bandwidth Reservation Architecture
(SIBRA) as a new approach against DDoS attacks, which, until now, continue to
be a menace on today's Internet. SIBRA provides scalable inter-domain resource
allocations and botnet-size independence, an important property to realize why
previous defense approaches are insufficient. Botnet-size independence enables
two end hosts to set up communication regardless of the size of distributed
botnets in any Autonomous System in the Internet. SIBRA thus ends the arms race
between DDoS attackers and defenders. Furthermore, SIBRA is based on purely
stateless operations for reservation renewal, flow monitoring, and policing,
resulting in highly efficient router operation, which is demonstrated with a
full implementation. Finally, SIBRA supports Dynamic Interdomain Leased Lines
(DILLs), offering new business opportunities for ISPs.
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2015 15:09:11 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jan 2016 14:33:24 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Basescu",
"Cristina",
""
],
[
"Reischuk",
"Raphael M.",
""
],
[
"Szalachowski",
"Pawel",
""
],
[
"Perrig",
"Adrian",
""
],
[
"Zhang",
"Yao",
""
],
[
"Hsiao",
"Hsu-Chun",
""
],
[
"Kubota",
"Ayumu",
""
],
[
"Urakawa",
"Jumpei",
""
]
] |
new_dataset
| 0.950802 |
1510.04413
|
Khan Muhammad
|
Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad Zubair
|
Secure Image Steganography using Cryptography and Image Transposition
|
A simple but effective image steganographic method, providing secure
transmission of secret data over Internet. The final published version of the
paper can be downloaded from the link:
(http://www.neduet.edu.pk/NED-Journal/2015/15vol4paper3.html). Please contact
me at [email protected] if you need the final formatted published
version of the paper
|
NED University Journal of Research 12.4 (2015): 81-91
| null | null |
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information security is one of the most challenging problems in today's
technological world. In order to secure the transmission of secret data over
the public network (Internet), various schemes have been presented over the
last decade. Steganography combined with cryptography, can be one of the best
choices for solving this problem. This paper proposes a new steganographic
method based on gray-level modification for true colour images using image
transposition, secret key and cryptography. Both the secret key and secret
information are initially encrypted using multiple encryption algorithms
(bitxor operation, bits shuffling, and stego key-based encryption); these are,
subsequently, hidden in the host image pixels. In addition, the input image is
transposed before data hiding. Image transposition, bits shuffling, bitxoring,
stego key-based encryption, and gray-level modification introduce five
different security levels to the proposed scheme, making the data recovery
extremely difficult for attackers. The proposed technique is evaluated by
objective analysis using various image quality assessment metrics, producing
promising results in terms of imperceptibility and security. Moreover, the high
quality stego images and its minimal histogram changeability, also validate the
effectiveness of the proposed approach.
|
[
{
"version": "v1",
"created": "Thu, 15 Oct 2015 06:27:29 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Muhammad",
"Khan",
""
],
[
"Ahmad",
"Jamil",
""
],
[
"Sajjad",
"Muhammad",
""
],
[
"Zubair",
"Muhammad",
""
]
] |
new_dataset
| 0.970278 |
1511.07401
|
Sainbayar Sukhbaatar
|
Sainbayar Sukhbaatar, Arthur Szlam, Gabriel Synnaeve, Soumith
Chintala, Rob Fergus
|
MazeBase: A Sandbox for Learning from Games
| null | null | null | null |
cs.LG cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces MazeBase: an environment for simple 2D games, designed
as a sandbox for machine learning approaches to reasoning and planning. Within
it, we create 10 simple games embodying a range of algorithmic tasks (e.g.
if-then statements or set negation). A variety of neural models (fully
connected, convolutional network, memory network) are deployed via
reinforcement learning on these games, with and without a procedurally
generated curriculum. Despite the tasks' simplicity, the performance of the
models is far from optimal, suggesting directions for future development. We
also demonstrate the versatility of MazeBase by using it to emulate small
combat scenarios from StarCraft. Models trained on the MazeBase version can be
directly applied to StarCraft, where they consistently beat the in-game AI.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 20:23:53 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jan 2016 18:41:14 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Sukhbaatar",
"Sainbayar",
""
],
[
"Szlam",
"Arthur",
""
],
[
"Synnaeve",
"Gabriel",
""
],
[
"Chintala",
"Soumith",
""
],
[
"Fergus",
"Rob",
""
]
] |
new_dataset
| 0.999542 |
1601.00894
|
Daniel Bates
|
Daniel Bates, Alex Chadwick and Robert Mullins
|
Configurable memory systems for embedded many-core processors
|
Presented at HIP3ES, 2016
| null | null |
HIP3ES/2016/2
|
cs.AR cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The memory system of a modern embedded processor consumes a large fraction of
total system energy. We explore a range of different configuration options and
show that a reconfigurable design can make better use of the resources
available to it than any fixed implementation, and provide large improvements
in both performance and energy consumption. Reconfigurability becomes
increasingly useful as resources become more constrained, so is particularly
relevant in the embedded space.
For an optimised architectural configuration, we show that a configurable
cache system performs an average of 20% (maximum 70%) better than the best
fixed implementation when two programs are competing for the same resources,
and reduces cache miss rate by an average of 70% (maximum 90%). We then present
a case study of AES encryption and decryption, and find that a custom memory
configuration can almost double performance, with further benefits being
achieved by specialising the task of each core when parallelising the program.
|
[
{
"version": "v1",
"created": "Tue, 5 Jan 2016 16:29:17 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jan 2016 12:12:42 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Bates",
"Daniel",
""
],
[
"Chadwick",
"Alex",
""
],
[
"Mullins",
"Robert",
""
]
] |
new_dataset
| 0.990933 |
1601.01398
|
Vibhutesh Kumar Singh Mr.
|
Vibhutesh Kumar Singh, Hardik Chawla, Vivek Ashok Bohara
|
A Proof-of-Concept Device-to-Device Communication Testbed
|
8th International Conference on COMmunication Systems & NETworkS
(COMSNETS 2016), Demos & Exhibits Session
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the design and development of proof-of-concept
Device-to-Device (D2D) Communication testbed. This testbed also seeks to
address the design issues involved in the implementation of a D2D network in a
realistic scenario. The performance of this testbed has been validated by
emulating a Cellular network consisting of a Base Staion (BTS) and many D2D
devices in its proximity. The devices and the BTS coordinate and communicate
with each other to select the optimum communication range, mode of
communication and transmit parameters. Through the experimental results it has
been shown that the proposed testbed has a communication radius of 120m and a
D2D communication range of 62m with over 90% efficiency.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 04:40:21 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Singh",
"Vibhutesh Kumar",
""
],
[
"Chawla",
"Hardik",
""
],
[
"Bohara",
"Vivek Ashok",
""
]
] |
new_dataset
| 0.992527 |
1601.01405
|
Charles Noyes
|
Charles Noyes
|
BitAV: Fast Anti-Malware by Distributed Blockchain Consensus and
Feedforward Scanning
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I present the design and implementation of a novel anti-malware environment
called BitAV. BitAV allows for the decentralization of the update and
maintenance mechanisms of the software, traditionally performed by a central
host, and uses a staggered scanning mechanism in order to improve performance.
The peer-to-peer network maintenance mechanism lowered the average update
propagation speed by 500% and is far less susceptible to targeted
denial-of-service attacks. The feedforward scanning mechanism significantly
improved end-to-end performance of the malware matching system, to a degree of
an average 14x increase, by decomposing the file matching process into
efficient queries that operate in verifiably constant time.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 06:02:16 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Noyes",
"Charles",
""
]
] |
new_dataset
| 0.999331 |
1601.01463
|
Ajay Agrawal
|
Ajay Agrawal and R. S. Gamad
|
Design of a Low-Power 1.65 Gbps Data Channel for HDMI Transmitter
|
TMDS, HDMI, USB, Gbps, data-dependent jitter, supply current, UMC180,
low-power consumption, single serial clock
|
International Journal of VLSI Design & Communication Systems
(VLSICS), December 2015, Volume 6, Number 6
|
10.5121/vlsic.2015.6603
| null |
cs.AR
|
http://creativecommons.org/licenses/by/4.0/
|
This paper presents a design of low power data channel for application in
High Definition Multimedia Interface (HDMI) Transmitter circuit. The input is
10 bit parallel data and output is serial data at 1.65 Gbps. This circuit uses
only a single frequency of serial clock input. All other timing signals are
derived within the circuit from the serial clock. This design has dedicated
lines to disable and enable all its channels within two pixel-clock periods
only. A pair of disable and enable functions performed immediately after
power-on of the circuit serves as the reset function. The presented design is
immune to data-dependent switching spikes in supply current and pushes them in
the range of serial frequency and its multiples. Thus filtering requirements
are relaxed. The output stage uses a bias voltage of 2.8 volts for a receiver
pull-up voltage of 3.3 volts. The reported data channel is designed using UMC
180 nm CMOS Technology. The design is modifiable for other inter-board serial
interfaces like USB and LAN with different number of bits at the parallel
input.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 10:12:25 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Agrawal",
"Ajay",
""
],
[
"Gamad",
"R. S.",
""
]
] |
new_dataset
| 0.998481 |
1601.01527
|
Chuka Oham
|
Chuka Oham and Milena Radenkovic
|
Congestion Aware Spray And Wait Protocol: A Congestion Control Mechanism
For The Vehicular Delay Tolerant Network
|
13 pages, 9 figures
|
IJCSIT Vol 7, No 6, December 2015, pp. 83-95
|
10.5121/ijcsit.2015.7607
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last few years, the Vehicular Ad-hoc Network (VANET) has come to be an
important area of research. Significant research has been conducted to improve
the performance of VANETS. One output of further research conducted on VANET is
the Vehicular Delay Tolerant Network (VDTN). It is an application of the mobile
DTN where nodes relay messages in the network using a store-carry-forward
approach. Due to its high mobility, it suffers frequent disconnections and also
congestions at nodes which leads to message drops. To minimize the rate of
message drops and so optimize the probability of message delivery so that
drivers are increasingly aware of the situation of the road, we propose a
congestion control mechanism: Congestion Aware Spray and Wait (CASaW) protocol
in this work so as to optimize the rate of message delivery to its destination
and so increase the awareness of drivers in the vehicular environment thereby
improve road safety. The results have shown that our proposition performed
better than other classical VDTN protocols in terms of message delivery
probability and rate of packet drops performance measures. We used the
Opportunistic Networking Environment (ONE) simulator to implement the classical
VDTN protocols: the PROPHET protocol, the Epidemic protocol, the MaxProp
protocol and the Spray and Wait Protocol. The simulation scenarios shows a
better performance for the congestion control mechanism we propose as it
maintains a good message delivery rate as well as minimize the rate of packet
losses thereby optimizing the chances of messages getting to their destinations
and so improve road safety.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 13:06:47 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Oham",
"Chuka",
""
],
[
"Radenkovic",
"Milena",
""
]
] |
new_dataset
| 0.987257 |
1601.01586
|
Ranald Clouston
|
Ale\v{s} Bizjak, Hans Bugge Grathwohl, Ranald Clouston, Rasmus E.
M{\o}gelberg, Lars Birkedal
|
Guarded Dependent Type Theory with Coinductive Types
|
This is the technical report version of a paper to appear in the
proceedings of FoSSaCS 2016
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present guarded dependent type theory, gDTT, an extensional dependent type
theory with a `later' modality and clock quantifiers for programming and
proving with guarded recursive and coinductive types. The later modality is
used to ensure the productivity of recursive definitions in a modular, type
based, way. Clock quantifiers are used for controlled elimination of the later
modality and for encoding coinductive types using guarded recursive types. Key
to the development of gDTT are novel type and term formers involving what we
call `delayed substitutions'. These generalise the applicative functor rules
for the later modality considered in earlier work, and are crucial for
programming and proving with dependent types. We show soundness of the type
theory with respect to a denotational model.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 16:26:14 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Bizjak",
"Aleš",
""
],
[
"Grathwohl",
"Hans Bugge",
""
],
[
"Clouston",
"Ranald",
""
],
[
"Møgelberg",
"Rasmus E.",
""
],
[
"Birkedal",
"Lars",
""
]
] |
new_dataset
| 0.975736 |
1601.01598
|
Philipp Kindermann
|
Stefan Felsner, Alexander Igamberdiev, Philipp Kindermann, Boris
Klemz, Tamara Mchedlidze, Manfred Scheucher
|
Strongly Monotone Drawings of Planar Graphs
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A straight-line drawing of a graph is a monotone drawing if for each pair of
vertices there is a path which is monotonically increasing in some direction,
and it is called a strongly monotone drawing if the direction of monotonicity
is given by the direction of the line segment connecting the two vertices.
We present algorithms to compute crossing-free strongly monotone drawings for
some classes of planar graphs; namely, 3-connected planar graphs, outerplanar
graphs, and 2-trees. The drawings of 3-connected planar graphs are based on
primal-dual circle packings. Our drawings of outerplanar graphs are based on a
new algorithm that constructs strongly monotone drawings of trees which are
also convex. For irreducible trees, these drawings are strictly convex.
|
[
{
"version": "v1",
"created": "Thu, 7 Jan 2016 16:57:56 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Felsner",
"Stefan",
""
],
[
"Igamberdiev",
"Alexander",
""
],
[
"Kindermann",
"Philipp",
""
],
[
"Klemz",
"Boris",
""
],
[
"Mchedlidze",
"Tamara",
""
],
[
"Scheucher",
"Manfred",
""
]
] |
new_dataset
| 0.999779 |
1601.01612
|
Wieslaw Marszalek
|
Wieslaw Marszalek
|
Memristive fingerprints of electric arcs
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the memristive fingerprints of the hybrid Cassie-Mayr model of
electric arcs. In particular, it is shown that (i) the voltage-current
characteristic of the model has the pinched hysteresis nature, (ii) the voltage
and current zero crossings occur at the same instants, and, (iii) when the
frequency $f$ of the power supply increases, the voltage-current pinched
hysteresis characteristic tends closer to a single-valued one, meaning that the
voltage-current graph becomes that of a resistor (with an increased linearity
for $f\rightarrow \infty$). The conductance $g$ of the Cassie-Mayr model
decreases when the frequency increases. The hybrid Cassie-Mayr model describes
therefore an interesting case of a memristive phenomenon.
|
[
{
"version": "v1",
"created": "Thu, 31 Dec 2015 00:59:32 GMT"
}
] | 2016-01-08T00:00:00 |
[
[
"Marszalek",
"Wieslaw",
""
]
] |
new_dataset
| 0.998795 |
1410.5778
|
Sergio Cabello
|
Sergio Cabello, David Gajser
|
Simple PTAS's for families of graphs excluding a minor
|
To appear in Discrete Applied Mathematics
|
Discrete Applied Mathematics, 189, p. 41-48, 2015
|
10.1016/j.dam.2015.03.004
| null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that very simple algorithms based on local search are polynomial-time
approximation schemes for Maximum Independent Set, Minimum Vertex Cover and
Minimum Dominating Set, when the input graphs have a fixed forbidden minor.
|
[
{
"version": "v1",
"created": "Tue, 21 Oct 2014 18:32:28 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Mar 2015 01:15:32 GMT"
}
] | 2016-01-07T00:00:00 |
[
[
"Cabello",
"Sergio",
""
],
[
"Gajser",
"David",
""
]
] |
new_dataset
| 0.999476 |
1502.01271
|
Gregory Grefenstette
|
Gregory Grefenstette (TAO)
|
INRIASAC: Simple Hypernym Extraction Methods
|
SemEval 2015, Jun 2015, Denver, United States
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a set of terms from a given domain, how can we structure them into a
taxonomy without manual intervention? This is the task 17 of SemEval 2015. Here
we present our simple taxonomy structuring techniques which, despite their
simplicity, ranked first in this 2015 benchmark. We use large quantities of
text (English Wikipedia) and simple heuristics such as term overlap and
document and sentence co-occurrence to produce hypernym lists. We describe
these techniques and pre-sent an initial evaluation of results.
|
[
{
"version": "v1",
"created": "Wed, 4 Feb 2015 17:53:01 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2016 09:05:18 GMT"
}
] | 2016-01-07T00:00:00 |
[
[
"Grefenstette",
"Gregory",
"",
"TAO"
]
] |
new_dataset
| 0.994233 |
1505.06258
|
Cesar Ghali
|
Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood
|
Interest-Based Access Control for Content Centric Networks (extended
version)
|
11 pages, 2 figures
| null |
10.1145/2810156.2810174
| null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content-Centric Networking (CCN) is an emerging network architecture designed
to overcome limitations of the current IP-based Internet. One of the
fundamental tenets of CCN is that data, or content, is a named and addressable
entity in the network. Consumers request content by issuing interest messages
with the desired content name. These interests are forwarded by routers to
producers, and the resulting content object is returned and optionally cached
at each router along the path. In-network caching makes it difficult to enforce
access control policies on sensitive content outside of the producer since
routers only use interest information for forwarding decisions. To that end, we
propose an Interest-Based Access Control (IBAC) scheme that enables access
control enforcement using only information contained in interest messages,
i.e., by making sensitive content names unpredictable to unauthorized parties.
Our IBAC scheme supports both hash- and encryption-based name obfuscation. We
address the problem of interest replay attacks by formulating a mutual trust
framework between producers and consumers that enables routers to perform
authorization checks when satisfying interests from their cache. We assess the
computational, storage, and bandwidth overhead of each IBAC variant. Our design
is flexible and allows producers to arbitrarily specify and enforce any type of
access control on content, without having to deal with the problems of content
encryption and key distribution. This is the first comprehensive design for CCN
access control using only information contained in interest messages.
|
[
{
"version": "v1",
"created": "Sat, 23 May 2015 01:50:39 GMT"
}
] | 2016-01-07T00:00:00 |
[
[
"Ghali",
"Cesar",
""
],
[
"Schlosberg",
"Marc A.",
""
],
[
"Tsudik",
"Gene",
""
],
[
"Wood",
"Christopher A.",
""
]
] |
new_dataset
| 0.992945 |
1511.02147
|
Liang-Ting Chen
|
Liang-Ting Chen and Jiri Adamek and Stefan Milius and Henning Urbat
|
Profinite Monads, Profinite Equations, and Reiterman's Theorem
|
Accepted for presentation at FoSSaCS'16
| null | null | null |
cs.FL math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Profinite equations are an indispensable tool for the algebraic
classification of formal languages. Reiterman's theorem states that they
precisely specify pseudovarieties, i.e. classes of finite algebras closed under
finite products, subalgebras and quotients. In this paper Reiterman's theorem
is generalised to finite Eilenberg-Moore algebras for a monad T on a variety D
of (ordered) algebras: a class of finite T-algebras is a pseudovariety iff it
is presentable by profinite (in-)equations. As an application, quasivarieties
of finite algebras are shown to be presentable by profinite implications. Other
examples include finite ordered algebras, finite categories, finite
infinity-monoids, etc.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2015 16:40:14 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2016 15:21:57 GMT"
}
] | 2016-01-07T00:00:00 |
[
[
"Chen",
"Liang-Ting",
""
],
[
"Adamek",
"Jiri",
""
],
[
"Milius",
"Stefan",
""
],
[
"Urbat",
"Henning",
""
]
] |
new_dataset
| 0.999119 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.