id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1512.03251
|
Evgeny Nikulchev
|
V.N. Petrushin, E.V. Nikulchev, D.A. Korolev
|
Histogram Arithmetic under Uncertainty of Probability Density Function
|
10 pages
|
Applied Mathematical Sciences 9(2015) 7043-7052
|
10.12988/ams.2015.510644
| null |
cs.NA stat.CO
|
http://creativecommons.org/licenses/by-sa/4.0/
|
In this article we propose a method of performing arithmetic operations on
varia-bles with unknown distribution. The approach to the evaluation results of
arithme-tic operations can select probability intervals of the algebraic
equations and their systems solutions, of differential equations and their
systems in case of histogram evaluation of the empirical density distributions
of random parameters.
|
[
{
"version": "v1",
"created": "Thu, 10 Dec 2015 13:42:35 GMT"
}
] | 2015-12-11T00:00:00 |
[
[
"Petrushin",
"V. N.",
""
],
[
"Nikulchev",
"E. V.",
""
],
[
"Korolev",
"D. A.",
""
]
] |
new_dataset
| 0.951571 |
1512.03324
|
Yunshu Liu
|
Yunshu Liu and John MacLaren Walsh
|
Mapping the Region of Entropic Vectors with Support Enumeration &
Information Geometry
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The region of entropic vectors is a convex cone that has been shown to be at
the core of many fundamental limits for problems in multiterminal data
compression, network coding, and multimedia transmission. This cone has been
shown to be non-polyhedral for four or more random variables, however its
boundary remains unknown for four or more discrete random variables. Methods
for specifying probability distributions that are in faces and on the boundary
of the convex cone are derived, then utilized to map optimized inner bounds to
the unknown part of the entropy region. The first method utilizes tools and
algorithms from abstract algebra to efficiently determine those supports for
the joint probability mass functions for four or more random variables that
can, for some appropriate set of non-zero probabilities, yield entropic vectors
in the gap between the best known inner and outer bounds. These supports are
utilized, together with numerical optimization over non-zero probabilities, to
provide inner bounds to the unknown part of the entropy region. Next,
information geometry is utilized to parameterize and study the structure of
probability distributions on these supports yielding entropic vectors in the
faces of entropy and in the unknown part of the entropy region.
|
[
{
"version": "v1",
"created": "Thu, 10 Dec 2015 16:57:59 GMT"
}
] | 2015-12-11T00:00:00 |
[
[
"Liu",
"Yunshu",
""
],
[
"Walsh",
"John MacLaren",
""
]
] |
new_dataset
| 0.973515 |
cs/0512073
|
Vladimir V Kisil
|
Vladimir V. Kisil
|
Schwerdtfeger-Fillmore-Springer-Cnops Construction Implemented in GiNaC
|
LaTeX, 82 p; 11 PS graphics in two figures, the full source files and
ISO image of Live DVD are included; v9: library update for the book on
Moebius transformations; v10: an ISO image of a Live DVD is attached to the
paper; v11: a bug is fixed; v12: Library is uupdated, the reference to a
larger project is added
|
Adv. Appl. Clifford Algebr. v.17 (2007), no.1, 59-70
|
10.1007/s00006-006-0017-4
|
LEEDS-MATH-PURE-2005-29
|
cs.MS cs.CG cs.SC
|
http://creativecommons.org/licenses/by/4.0/
|
This paper presents an implementation of the
Schwerdtfeger-Fillmore-Springer-Cnops construction (SFSCc) along with
illustrations of its usage. SFSCc linearises the linear-fraction action of the
Moebius group in R^n. This has clear advantages in several theoretical and
applied fields including engineering. Our implementation is based on the
Clifford algebra capacities of the GiNaC computer algebra system
(http://www.ginac.de/), which were described in cs.MS/0410044.
The core of this realisation of SFSCc is done for an arbitrary dimension of
R^n with a metric given by an arbitrary bilinear form. We also present a
subclass for two dimensional cycles (i.e. circles, parabolas and hyperbolas),
which add some 2D specific routines including a visualisation to PostScript
files through the MetaPost (http://www.tug.org/metapost.html) or Asymptote
(http://asymptote.sourceforge.net/) packages.
This software is the backbone of many results published in math.CV/0512416
and we use its applications their for demonstration. The library can be ported
(with various level of required changes) to other CAS with Clifford algebras
capabilities similar to GiNaC.
There is an ISO image of a Live Debian DVD attached to this paper as an
auxiliary file, a copy is stored on Google Drive as well.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2005 15:09:11 GMT"
},
{
"version": "v10",
"created": "Sun, 16 Oct 2011 17:03:58 GMT"
},
{
"version": "v11",
"created": "Wed, 10 Jul 2013 16:49:13 GMT"
},
{
"version": "v12",
"created": "Thu, 10 Dec 2015 20:53:25 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Dec 2005 10:12:50 GMT"
},
{
"version": "v3",
"created": "Thu, 18 May 2006 18:39:35 GMT"
},
{
"version": "v4",
"created": "Mon, 17 Jul 2006 12:32:29 GMT"
},
{
"version": "v5",
"created": "Sun, 23 Jul 2006 12:36:54 GMT"
},
{
"version": "v6",
"created": "Mon, 26 Feb 2007 09:05:10 GMT"
},
{
"version": "v7",
"created": "Fri, 27 Jul 2007 13:02:23 GMT"
},
{
"version": "v8",
"created": "Thu, 9 Sep 2010 17:53:33 GMT"
},
{
"version": "v9",
"created": "Sat, 8 Oct 2011 20:37:25 GMT"
}
] | 2015-12-11T00:00:00 |
[
[
"Kisil",
"Vladimir V.",
""
]
] |
new_dataset
| 0.977991 |
1507.05282
|
Kumar Sankar Ray
|
Kingshuk Chatterjee, Kumar Sankar Ray
|
Watson-Crick Quantum Finite Automata
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
1-way quantum finite automata are deterministic and reversible in nature,
which greatly reduces its accepting property. In fact the set of languages
accepted by 1-way quantum finite automata is a proper subset of regular
languages. In this paper we replace the tape head of 1-way quantum finite
automata with DNA double strand and name the model Watson-Crick quantum finite
automata. The non-injective complementarity relation of Watson-Crick automata
introduces non-determinism in the quantum model. We show that this introduction
of non-determinism increases the computational power of 1-way Quantum finite
automata significantly. We establish that Watson-Crick quantum finite automata
can accept all regular languages and that it also accepts some languages not
accepted by any multihead deterministic finite automata. Exploiting the
superposition property of quantum finite automata we show that Watson-Crick
quantum finite automata accept the language L=ww where w belongs to {a,b}*.
|
[
{
"version": "v1",
"created": "Sun, 19 Jul 2015 12:57:44 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2015 08:07:19 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Chatterjee",
"Kingshuk",
""
],
[
"Ray",
"Kumar Sankar",
""
]
] |
new_dataset
| 0.999558 |
1507.05283
|
Kumar Sankar Ray
|
Kingshuk Chatterjee, Kumar Sankar Ray
|
Reversible Watson-Crick Automata
|
arXiv admin note: text overlap with arXiv:1507.05282
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Watson-Crick automata are finite automata working on double strands.
Extensive research work has already been done on non-deterministic Watson-Crick
automata and on deterministic Watson-Crick automata. In this paper, we
introduce a new model of Watson-Crick automata which is reversible in nature
named reversible Watson-Crick automata and explore its computational power. We
show even though the model is reversible and one way it accepts all regular
languages and also analyze the state complexity of the above stated model with
respect to non-deterministic block automata and non-deterministic finite
automata and establish its superiority. We further explore the relation of the
reversible model with twin-shuffle language and recursively enumerable
languages.
|
[
{
"version": "v1",
"created": "Sun, 19 Jul 2015 13:00:59 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2015 07:54:05 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Chatterjee",
"Kingshuk",
""
],
[
"Ray",
"Kumar Sankar",
""
]
] |
new_dataset
| 0.979631 |
1510.04016
|
Kumar Sankar Ray
|
Kingshuk Chatterjee, Kumar Sankar Ray
|
Multi-head Watson-Crick automata
|
arXiv admin note: text overlap with arXiv:1507.05284,
arXiv:1510.02070
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by multi-head finite automata and Watson-Crick automata in this
paper, we introduce new structure namely multi-head Watson-Crick automata where
we replace the single tape of multi-head finite automaton by a DNA double
strand. The content of the second tape is determined using a complementarity
relation similar to Watson-Crick complementarity relation. We establish the
superiority of our model over multi-head finite automata and also show that
both the deterministic and non-deterministic variant of the model can accept
non-regular unary languages. We also compare our model with parallel
communicating Watson-Crick automata systems and prove that both of them have
the same computational power.
|
[
{
"version": "v1",
"created": "Wed, 14 Oct 2015 09:21:33 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2015 07:46:00 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Chatterjee",
"Kingshuk",
""
],
[
"Ray",
"Kumar Sankar",
""
]
] |
new_dataset
| 0.994383 |
1512.02730
|
Ahmad Biniaz
|
Ahmad Biniaz, Prosenjit Bose, Anil Maheshwari, and Michiel Smid
|
Plane Bichromatic Trees of Low Degree
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $R$ and $B$ be two disjoint sets of points in the plane such that
$|B|\leqslant |R|$, and no three points of $R\cup B$ are collinear. We show
that the geometric complete bipartite graph $K(R,B)$ contains a non-crossing
spanning tree whose maximum degree is at most $\max\left\{3, \left\lceil
\frac{|R|-1}{|B|}\right\rceil + 1\right\}$; this is the best possible upper
bound on the maximum degree. This solves an open problem posed by Abellanas et
al. at the Graph Drawing Symposium, 1996.
|
[
{
"version": "v1",
"created": "Wed, 9 Dec 2015 02:51:42 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Biniaz",
"Ahmad",
""
],
[
"Bose",
"Prosenjit",
""
],
[
"Maheshwari",
"Anil",
""
],
[
"Smid",
"Michiel",
""
]
] |
new_dataset
| 0.951367 |
1512.02881
|
Gaurav Srivastava
|
Shankarjee Krishnamoorthi, Gaurav Srivastava, Amar Mandhyan
|
Web application for size and topology optimization of trusses and gusset
plates
|
17 pages, 8 figures, submitted to Structural Engineering and
Mechanics
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With its ever growing popularity, providing Internet based applications tuned
towards practical applications is on the rise. Advantages such as no external
plugins and additional software, ease of use, updating and maintenance have
increased the popularity of web applications. In this work, a web-based
application has been developed which can perform size optimization of truss
structure as a whole as well as topology optimization of individual gusset
plate of each joint based on specified joint displacements and load conditions.
This application is developed using cutting-edge web technologies such as
Three.js and HTML5. The client side boasts of an intuitive interface which in
addition to its modeling capabilities also recommends configurations based on
user input, provides analysis options and finally displays the results. The
server side, using a combination of Scilab and DAKOTA, computes solution and
also provides the user with comparisons of the optimal design with that
conforming to Indian Standard (IS 800-2007). It is a freely available one-stop
web-based application to perform optimal and/or code based design of trusses.
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2015 05:45:32 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Krishnamoorthi",
"Shankarjee",
""
],
[
"Srivastava",
"Gaurav",
""
],
[
"Mandhyan",
"Amar",
""
]
] |
new_dataset
| 0.978053 |
1512.02922
|
Misha Sra
|
Misha Sra, Chris Schmandt
|
MetaSpace II: Object and full-body tracking for interaction and
navigation in social VR
|
10 pages, 9 figures. Video:
http://living.media.mit.edu/projects/metaspace-ii/
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
MetaSpace II (MS2) is a social Virtual Reality (VR) system where multiple
users can not only see and hear but also interact with each other, grasp and
manipulate objects, walk around in space, and get tactile feedback. MS2 allows
walking in physical space by tracking each user's skeleton in real-time and
allows users to feel by employing passive haptics i.e., when users touch or
manipulate an object in the virtual world, they simultaneously also touch or
manipulate a corresponding object in the physical world. To enable these
elements in VR, MS2 creates a correspondence in spatial layout and object
placement by building the virtual world on top of a 3D scan of the real world.
Through the association between the real and virtual world, users are able to
walk freely while wearing a head-mounted device, avoid obstacles like walls and
furniture, and interact with people and objects. Most current virtual reality
(VR) environments are designed for a single user experience where interactions
with virtual objects are mediated by hand-held input devices or hand gestures.
Additionally, users are only shown a representation of their hands in VR
floating in front of the camera as seen from a first person perspective. We
believe, representing each user as a full-body avatar that is controlled by
natural movements of the person in the real world (see Figure 1d), can greatly
enhance believability and a user's sense immersion in VR.
|
[
{
"version": "v1",
"created": "Wed, 9 Dec 2015 16:13:34 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Sra",
"Misha",
""
],
[
"Schmandt",
"Chris",
""
]
] |
new_dataset
| 0.999045 |
1512.02968
|
Suhas Ranganath
|
Suhas Ranganath, Fred Morstatter, Xia Hu, Jiliang Tang, Huan Liu
|
Predicting Online Protest Participation of Social Media Users
| null | null | null | null |
cs.SI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Social media has emerged to be a popular platform for people to express their
viewpoints on political protests like the Arab Spring. Millions of people use
social media to communicate and mobilize their viewpoints on protests. Hence,
it is a valuable tool for organizing social movements. However, the mechanisms
by which protest affects the population is not known, making it difficult to
estimate the number of protestors. In this paper, we are inspired by
sociological theories of protest participation and propose a framework to
predict from the user's past status messages and interactions whether the next
post of the user will be a declaration of protest. Drawing concepts from these
theories, we model the interplay between the user's status messages and
messages interacting with him over time and predict whether the next post of
the user will be a declaration of protest. We evaluate the framework using data
from the social media platform Twitter on protests during the recent Nigerian
elections and demonstrate that it can effectively predict whether the next post
of a user is a declaration of protest.
|
[
{
"version": "v1",
"created": "Wed, 9 Dec 2015 17:49:18 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Ranganath",
"Suhas",
""
],
[
"Morstatter",
"Fred",
""
],
[
"Hu",
"Xia",
""
],
[
"Tang",
"Jiliang",
""
],
[
"Liu",
"Huan",
""
]
] |
new_dataset
| 0.987474 |
1512.03012
|
Manolis Savva
|
Angel X. Chang, Thomas Funkhouser, Leonidas Guibas, Pat Hanrahan,
Qixing Huang, Zimo Li, Silvio Savarese, Manolis Savva, Shuran Song, Hao Su,
Jianxiong Xiao, Li Yi, and Fisher Yu
|
ShapeNet: An Information-Rich 3D Model Repository
| null | null | null | null |
cs.GR cs.AI cs.CG cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present ShapeNet: a richly-annotated, large-scale repository of shapes
represented by 3D CAD models of objects. ShapeNet contains 3D models from a
multitude of semantic categories and organizes them under the WordNet taxonomy.
It is a collection of datasets providing many semantic annotations for each 3D
model such as consistent rigid alignments, parts and bilateral symmetry planes,
physical sizes, keywords, as well as other planned annotations. Annotations are
made available through a public web-based interface to enable data
visualization of object attributes, promote data-driven geometric analysis, and
provide a large-scale quantitative benchmark for research in computer graphics
and vision. At the time of this technical report, ShapeNet has indexed more
than 3,000,000 models, 220,000 models out of which are classified into 3,135
categories (WordNet synsets). In this report we describe the ShapeNet effort as
a whole, provide details for all currently available datasets, and summarize
future plans.
|
[
{
"version": "v1",
"created": "Wed, 9 Dec 2015 19:42:48 GMT"
}
] | 2015-12-10T00:00:00 |
[
[
"Chang",
"Angel X.",
""
],
[
"Funkhouser",
"Thomas",
""
],
[
"Guibas",
"Leonidas",
""
],
[
"Hanrahan",
"Pat",
""
],
[
"Huang",
"Qixing",
""
],
[
"Li",
"Zimo",
""
],
[
"Savarese",
"Silvio",
""
],
[
"Savva",
"Manolis",
""
],
[
"Song",
"Shuran",
""
],
[
"Su",
"Hao",
""
],
[
"Xiao",
"Jianxiong",
""
],
[
"Yi",
"Li",
""
],
[
"Yu",
"Fisher",
""
]
] |
new_dataset
| 0.99941 |
1412.4365
|
Norihiro Nakashima
|
Norihiro Nakashima, Hajime Matsui
|
Decoding of Projective Reed-Muller Codes by Dividing a Projective Space
into Affine Spaces
|
17 pages, 4 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A projective Reed-Muller (PRM) code, obtained by modifying a (classical)
Reed-Muller code with respect to a projective space, is a doubly extended
Reed-Solomon code when the dimension of the related projective space is equal
to 1. The minimum distance and dual code of a PRM code are known, and some
decoding examples have been represented for low-dimensional projective space.
In this study, we construct a decoding algorithm for all PRM codes by dividing
a projective space into a union of affine spaces. In addition, we determine the
computational complexity and the number of errors correctable of our algorithm.
Finally, we compare the codeword error rate of our algorithm with that of
minimum distance decoding.
|
[
{
"version": "v1",
"created": "Sun, 14 Dec 2014 14:32:12 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Dec 2014 12:08:22 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Dec 2015 07:52:24 GMT"
}
] | 2015-12-09T00:00:00 |
[
[
"Nakashima",
"Norihiro",
""
],
[
"Matsui",
"Hajime",
""
]
] |
new_dataset
| 0.968562 |
1509.07761
|
Igor Mozeti\v{c}
|
Petra Kralj Novak, Jasmina Smailovi\'c, Borut Sluban, Igor Mozeti\v{c}
|
Sentiment of Emojis
| null |
PLoS ONE 10(12): e0144296, 2015
|
10.1371/journal.pone.0144296
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a new generation of emoticons, called emojis, that is increasingly
being used in mobile communications and social media. In the past two years,
over ten billion emojis were used on Twitter. Emojis are Unicode graphic
symbols, used as a shorthand to express concepts and ideas. In contrast to the
small number of well-known emoticons that carry clear emotional contents, there
are hundreds of emojis. But what are their emotional contents? We provide the
first emoji sentiment lexicon, called the Emoji Sentiment Ranking, and draw a
sentiment map of the 751 most frequently used emojis. The sentiment of the
emojis is computed from the sentiment of the tweets in which they occur. We
engaged 83 human annotators to label over 1.6 million tweets in 13 European
languages by the sentiment polarity (negative, neutral, or positive). About 4%
of the annotated tweets contain emojis. The sentiment analysis of the emojis
allows us to draw several interesting conclusions. It turns out that most of
the emojis are positive, especially the most popular ones. The sentiment
distribution of the tweets with and without emojis is significantly different.
The inter-annotator agreement on the tweets with emojis is higher. Emojis tend
to occur at the end of the tweets, and their sentiment polarity increases with
the distance. We observe no significant differences in the emoji rankings
between the 13 languages and the Emoji Sentiment Ranking. Consequently, we
propose our Emoji Sentiment Ranking as a European language-independent resource
for automated sentiment analysis. Finally, the paper provides a formalization
of sentiment and a novel visualization in the form of a sentiment bar.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2015 15:41:13 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2015 10:02:47 GMT"
}
] | 2015-12-09T00:00:00 |
[
[
"Novak",
"Petra Kralj",
""
],
[
"Smailović",
"Jasmina",
""
],
[
"Sluban",
"Borut",
""
],
[
"Mozetič",
"Igor",
""
]
] |
new_dataset
| 0.99932 |
1512.02086
|
Joseph O'Rourke
|
Giovanna Diaz, Joseph O'Rourke
|
Hypercube Unfoldings that Tile R^3 and R^2
|
20 pages, 18 figures, 10 refs. Version 2: Corrected a typo, added a
reference
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the hypercube has a face-unfolding that tiles space, and that
unfolding has an edge-unfolding that tiles the plane. So the hypercube is a
"dimension-descending tiler." We also show that the hypercube cross unfolding
made famous by Dali tiles space, but we leave open the question of whether or
not it has an edge-unfolding that tiles the plane.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 15:20:45 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2015 13:22:25 GMT"
}
] | 2015-12-09T00:00:00 |
[
[
"Diaz",
"Giovanna",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
new_dataset
| 0.998681 |
1512.02372
|
Nahla Khalil
|
Nahla Khalil
|
The 3D virtual environment online for real shopping
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The development of information technology and Internet has led to rapidly
progressed in e-commerce and online shopping, due to the convenience that they
provide consumers. E-commerce and online shopping are still not able to fully
replace onsite shopping. In contrast, conventional online shopping websites
often cannot provide enough information about a product for the customer to
make an informed decision before checkout. 3D virtual shopping environment show
great potential for enhancing e-commerce systems and provide customers
information about a product and real shopping environment. This paper presents
a new type of e-commerce system, which obviously brings virtual environment
online with an active 3D model that allows consumers to access products into
real physical environments for user interaction. Such system with easy process
can helps customers make better purchasing decisions that allows users to
manipulate 3D virtual models online. The stores participate in the 3D virtual
mall by communicating with a mall management. The 3D virtual mall allows
shoppers to perform actions across multiple stores simultaneously such as
viewing product availability. The mall management can authenticate clients on
all stores participating in the 3D virtual mall while only requiring clients to
provide authentication information once. 3D virtual shopping online mall
convenient and easy process allow consumers directly buy goods or services from
a seller in real-time, without an intermediary service, over the Internet. The
virtual mall with an active 3D model is implemented by using 3D Language (VRML)
and asp.net as the script language for shopping online pages
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2015 09:10:41 GMT"
}
] | 2015-12-09T00:00:00 |
[
[
"Khalil",
"Nahla",
""
]
] |
new_dataset
| 0.999152 |
1512.02443
|
Mehrdad Ghadiri
|
Saieed Akbari, Khashayar Etemadi, Peyman Ezzati, Mehrdad Ghadiri
|
Even and Odd Cycles Passing a Given Edge or a Vertex
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we provide some sufficient conditions for the existence of an
odd or even cycle that passing a given vertex or an edge in $2$-connected or
$2$-edge connected graphs. We provide some similar conditions for the existence
of an odd or even circuit that passing a given vertex or an edge in 2-edge
connected graphs. We show that if $G$ is a $2$-connected $k$-regular graph, $k
\geq 3$, then every edge of $G$ is contained in an even cycle. We also prove
that in a $2$-edge connected graph, if a vertex has odd degree, then there is
an even cycle containing this vertex.
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2015 12:59:12 GMT"
}
] | 2015-12-09T00:00:00 |
[
[
"Akbari",
"Saieed",
""
],
[
"Etemadi",
"Khashayar",
""
],
[
"Ezzati",
"Peyman",
""
],
[
"Ghadiri",
"Mehrdad",
""
]
] |
new_dataset
| 0.997887 |
1504.03880
|
Martin Zimmermann
|
Peter Faymonville and Martin Zimmermann
|
Parametric Linear Dynamic Logic (full version)
|
Accepted for publication at Information and Computation. A
preliminary version of this work appeared in GandALF 2014 (arXiv:1408.5957)
| null | null | null |
cs.LO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce Parametric Linear Dynamic Logic (PLDL), which extends Linear
Dynamic Logic (LDL) by temporal operators equipped with parameters that bound
their scope. LDL itself was proposed as an extension of Linear Temporal Logic
(LTL) that is able to express all omega-regular specifications while still
maintaining many of LTL's desirable properties like intuitive syntax and
semantics and a translation into non-deterministic B\"uchi automata of
exponential size. But LDL lacks capabilities to express timing constraints. By
adding parameterized operators to LDL, we obtain a logic that is able to
express all omega-regular properties and that subsumes parameterized extensions
of LTL like Parametric LTL and PROMPT-LTL.
Our main technical contribution is a translation of PLDL formulas into
non-deterministic B\"uchi automata of exponential size via alternating
automata. This yields polynomial space algorithms for model checking and
assume-guarantee model checking and a realizability algorithm with
doubly-exponential running time. All three problems are also shown to be
complete for these complexity classes. Moreover, we give tight upper and lower
bounds on optimal parameter values for model checking and realizability. Using
these bounds, we present a polynomial space procedure for model checking
optimization and an algorithm with triply-exponential running time for
realizability optimization. Our results show that PLDL model checking and
realizability are no harder than their respective (parametric) LTL
counterparts.
|
[
{
"version": "v1",
"created": "Wed, 15 Apr 2015 12:19:52 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Dec 2015 14:57:53 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Faymonville",
"Peter",
""
],
[
"Zimmermann",
"Martin",
""
]
] |
new_dataset
| 0.997563 |
1507.01546
|
Sukhpal Singh Gill
|
Sukhpal Singh Gill
|
Autonomic Cloud Computing: Research Perspective
|
Author's Viewpoint on Autonomic Cloud Computing and Uploaded on
Research Gate [https://www.researchgate.net/profile/Sukhpal_Gill]
| null |
10.13140/RG.2.1.4453.4881
| null |
cs.DC
|
http://creativecommons.org/publicdomain/zero/1.0/
|
Cloud computing is an evolving utility computing mechanism in which cloud
consumer can detect, choose and utilize the resources (infrastructure, software
and platform) and provide service to user based on pay per use model as
computing utilities. Current computing mechanism is effective, particular for
medium and small cloud based companies, in which it permits easy and reliable
access to cloud services like infrastructure, software and platform. Present
cloud computing is almost similar to the existing models: cluster computing and
grid computing. The important key technical features of cloud computing which
includes autonomic service, rapid elasticity, end-to-end virtualization
support, on-demand resource pooling and transparency in cloud billing. Further,
non-technical features of cloud computing includes environment friendliness,
little maintenance overhead, lower upfront costs, faster time to deployments,
Service Level Agreement (SLA) and pay-as-you-go-model. In distributed computing
environment, unpredictability of service is a fact, so same possible in cloud
also. The success of next-generation Cloud Computing infrastructures will
depend on how capably these infrastructures will discover and dynamically
tolerate computing platforms, which meet randomly varying resource and service
requirements of Cloud costumer applications.
|
[
{
"version": "v1",
"created": "Mon, 6 Jul 2015 17:27:04 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Dec 2015 13:40:07 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Gill",
"Sukhpal Singh",
""
]
] |
new_dataset
| 0.954091 |
1507.02519
|
Jianwen Li
|
Jianwen Li, Shufang Zhu, Geguang Pu, Moshe Vardi
|
SAT-based Explicit LTL Reasoning
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present here a new explicit reasoning framework for linear temporal logic
(LTL), which is built on top of propositional satisfiability (SAT) solving. As
a proof-of-concept of this framework, we describe a new LTL satisfiability
tool, Aalta\_v2.0, which is built on top of the MiniSAT SAT solver. We test the
effectiveness of this approach by demonnstrating that Aalta\_v2.0 significantly
outperforms all existing LTL satisfiability solvers. Furthermore, we show that
the framework can be extended from propositional LTL to assertional LTL (where
we allow theory atoms), by replacing MiniSAT with the Z3 SMT solver, and
demonstrating that this can yield an exponential improvement in performance.
|
[
{
"version": "v1",
"created": "Thu, 9 Jul 2015 14:14:35 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2015 22:30:11 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Dec 2015 23:33:32 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Li",
"Jianwen",
""
],
[
"Zhu",
"Shufang",
""
],
[
"Pu",
"Geguang",
""
],
[
"Vardi",
"Moshe",
""
]
] |
new_dataset
| 0.997199 |
1509.05251
|
Mauricio Delbracio
|
Mauricio Delbracio, Guillermo Sapiro
|
Hand-held Video Deblurring via Efficient Fourier Aggregation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Videos captured with hand-held cameras often suffer from a significant amount
of blur, mainly caused by the inevitable natural tremor of the photographer's
hand. In this work, we present an algorithm that removes blur due to camera
shake by combining information in the Fourier domain from nearby frames in a
video. The dynamic nature of typical videos with the presence of multiple
moving objects and occlusions makes this problem of camera shake removal
extremely challenging, in particular when low complexity is needed. Given an
input video frame, we first create a consistent registered version of
temporally adjacent frames. Then, the set of consistently registered frames is
block-wise fused in the Fourier domain with weights depending on the Fourier
spectrum magnitude. The method is motivated from the physiological fact that
camera shake blur has a random nature and therefore, nearby video frames are
generally blurred differently. Experiments with numerous videos recorded in the
wild, along with extensive comparisons, show that the proposed algorithm
achieves state-of-the-art results while at the same time being much faster than
its competitors.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2015 13:37:39 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2015 18:37:40 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Dec 2015 15:22:25 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Delbracio",
"Mauricio",
""
],
[
"Sapiro",
"Guillermo",
""
]
] |
new_dataset
| 0.990443 |
1512.01581
|
Swaroop Ghosh
|
Anirudh Iyengar and Swaroop Ghosh
|
Threshold Voltage-Defined Switches for Programmable Gates
| null | null | null | null |
cs.CR cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semiconductor supply chain is increasingly getting exposed to variety of
security attacks such as Trojan insertion, cloning, counterfeiting, reverse
engineering (RE), piracy of Intellectual Property (IP) or Integrated Circuit
(IC) and side-channel analysis due to involvement of untrusted parties. In this
paper, we propose transistor threshold voltage-defined switches to camouflage
the logic gate both logically and physically to resist against RE and IP
piracy. The proposed gate can function as NAND, AND, NOR, OR, XOR, XNOR, INV
and BUF robustly using threshold-defined switches. The camouflaged design
operates at nominal voltage and obeys conventional reliability limits. The
proposed gate can also be used to personalize the design during manufacturing.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2015 22:10:23 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Iyengar",
"Anirudh",
""
],
[
"Ghosh",
"Swaroop",
""
]
] |
new_dataset
| 0.991488 |
1512.01639
|
Krzysztof Wo{\l}k
|
Krzysztof Wo{\l}k, Krzysztof Marasek
|
PJAIT Systems for the IWSLT 2015 Evaluation Campaign Enhanced by
Comparable Corpora
| null |
Proceedings of the 12th International Workshop on Spoken Language
Translation, Da Nang, Vietnam, December 3-4, 2015, p.101-104
| null | null |
cs.CL stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we attempt to improve Statistical Machine Translation (SMT)
systems on a very diverse set of language pairs (in both directions): Czech -
English, Vietnamese - English, French - English and German - English. To
accomplish this, we performed translation model training, created adaptations
of training settings for each language pair, and obtained comparable corpora
for our SMT systems. Innovative tools and data adaptation techniques were
employed. The TED parallel text corpora for the IWSLT 2015 evaluation campaign
were used to train language models, and to develop, tune, and test the system.
In addition, we prepared Wikipedia-based comparable corpora for use with our
SMT system. This data was specified as permissible for the IWSLT 2015
evaluation. We explored the use of domain adaptation techniques, symmetrized
word alignment models, the unsupervised transliteration models and the KenLM
language modeling tool. To evaluate the effects of different preparations on
translation results, we conducted experiments and used the BLEU, NIST and TER
metrics. Our results indicate that our approach produced a positive impact on
SMT quality.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2015 08:55:31 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Wołk",
"Krzysztof",
""
],
[
"Marasek",
"Krzysztof",
""
]
] |
new_dataset
| 0.969368 |
1512.01681
|
Tomasz Gogacz
|
Tomasz Gogacz, Jerzy Marcinkowski
|
Red Spider Meets a Rainworm: Conjunctive Query Finite Determinacy Is
Undecidable
| null | null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We solve a well known and long-standing open problem in database theory,
proving that Conjunctive Query Finite Determinacy Problem is undecidable. The
technique we use builds on the top of our Red Spider method which we developed
in our paper [GM15] to show undecidability of the same problem in the
"unrestricted case" -- when database instances are allowed to be infinite. We
also show a specific instance $Q_0$, ${\cal Q}= \{Q_1, Q_2, \ldots Q_k\}$ such
that the set $\cal Q$ of CQs does not determine CQ $Q_0$ but finitely
determines it. Finally, we claim that while $Q_0$ is finitely determined by
$\cal Q$, there is no FO-rewriting of $Q_0$, with respect to $\cal Q$, and we
outline a proof of this claim
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2015 15:54:19 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Gogacz",
"Tomasz",
""
],
[
"Marcinkowski",
"Jerzy",
""
]
] |
new_dataset
| 0.978498 |
1512.01701
|
Kamal Ahmat
|
Kamal Ahmat
|
Emerging Cloud Computing Security Threats
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing is one of the latest emerging innovations of the modern
internet and technological landscape. With everyone from the White house to
major online technological leaders like Amazon and Google using or offering
cloud computing services it is truly presents itself as an exciting and
innovative method to store and use data on the internet.
|
[
{
"version": "v1",
"created": "Sat, 5 Dec 2015 20:55:58 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Ahmat",
"Kamal",
""
]
] |
new_dataset
| 0.951252 |
1512.01871
|
Andrew Adamatzky
|
Andrew Adamatzky and Georgios Ch. Sirakoulis
|
Building exploration with leeches Hirudo verbana
| null |
Biosystems Volume 134, August 2015, Pages 48--55
|
10.1016/j.biosystems.2015.06.004
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Safe evacuation of people from building and outdoor environments, and search
and rescue operations, always will remain actual in course of all
socio-technological developments. Modern facilities offer a range of automated
systems to guide residents towards emergency exists. The systems are assumed to
be infallible. But what if they fail? How occupants not familiar with a
building layout will be looking for exits in case of very limited visibility
where tactile sensing is the only way to assess the environment? Analogous
models of human behaviour, and socio-dynamics in general, are provided to be
fruitful ways to explore alternative, or would-be scenarios. Crowd, or a single
person, dynamics could be imitated using particle systems, reaction-diffusion
chemical medium, electro-magnetic fields, or social insects. Each type of
analogous model offer unique insights on behavioural patterns of natural
systems in constrained geometries. In this particular paper we have chosen
leeches to analyse patterns of exploration. Reasons are two-fold. First, when
deprived from other stimuli leeches change their behavioural modes in an
automated regime in response to mechanical stimulation. Therefore leeches can
give us invaluable information on how human beings might behave under stress
and limited visibility. Second, leeches are ideal blueprints of future
soft-bodied rescue robots. Leeches have modular nervous circuitry with a rich
behavioral spectrum. Leeches are multi-functional, fault-tolerant with
autonomous inter-segment coordination and adaptive decision-making. We aim to
answer the question: how efficiently a real building can be explored and
whether there any dependencies on the pathways of exploration and geometrical
complexity of the building. In our case studies we use templates made on the
floor plan of real building.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 01:32:09 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
],
[
"Sirakoulis",
"Georgios Ch.",
""
]
] |
new_dataset
| 0.998926 |
1512.01878
|
Andrew Adamatzky
|
Andrew Adamatzky
|
On exploration of geometrically constrained space by medicinal leeches
Hirudo verbana
| null |
Biosystems. Volume 130, April 2015, Pages 28--36
|
10.1016/j.biosystems.2015.02.005
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Leeches are fascinating creatures: they have simple modular nervous circuitry
m yet exhibit a rich spectrum of behavioural modes. Leeches could be ideal
blue-prints for designing flexible soft robots which are modular,
multi-functional, fault-tolerant, easy to control, capable for navigating using
optical, mechanical and chemical sensorial inputs, have autonomous
inter-segmental coordination and adaptive decision-making. With future designs
of leech-robots in mind we study how leeches behave in geometrically
constrained spaces. Core results of the paper deal with leeches exploring a row
of rooms arranged along a narrow corridor. In laboratory experiments we find
that rooms closer to ends of the corridor are explored by leeches more often
than rooms in the middle of the corridor. Also, in series of scoping
experiments, we evaluate leeches capabilities to navigating in mazes towards
sources of vibration and chemo-attraction. We believe our results lay
foundation for future developments of robots mimicking behaviour of leeches.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 02:00:37 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.986234 |
1512.02100
|
Tim Taylor
|
Tim Taylor, Alan Dorin, Kevin Korb
|
Digital Genesis: Computers, Evolution and Artificial Life
|
Extended abstract of talk presented at the 7th Munich-Sydney-Tilburg
Philosophy of Science Conference: Evolutionary Thinking, University of
Sydney, 20-22 March 2014. Presentation slides from talk available at
http://www.tim-taylor.com/papers/digital-genesis-presentation.pdf
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The application of evolution in the digital realm, with the goal of creating
artificial intelligence and artificial life, has a history as long as that of
the digital computer itself. We illustrate the intertwined history of these
ideas, starting with the early theoretical work of John von Neumann and the
pioneering experimental work of Nils Aall Barricelli. We argue that
evolutionary thinking and artificial life will continue to play an integral
role in the future development of the digital world.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 15:53:48 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Taylor",
"Tim",
""
],
[
"Dorin",
"Alan",
""
],
[
"Korb",
"Kevin",
""
]
] |
new_dataset
| 0.988573 |
1512.02110
|
Vadim Holodovsky
|
Vadim Holodovsky, Yoav Y. Schechner, Anat Levin, Aviad Levis, Amit
Aides
|
In-situ multi-scattering tomography
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To recover the three dimensional (3D) volumetric distribution of matter in an
object, images of the object are captured from multiple directions and
locations. Using these images tomographic computations extract the
distribution. In highly scattering media and constrained, natural irradiance,
tomography must explicitly account for off-axis scattering. Furthermore, the
tomographic model and recovery must function when imaging is done in-situ, as
occurs in medical imaging and ground-based atmospheric sensing. We formulate
tomography that handles arbitrary orders of scattering, using a monte-carlo
model. Moreover, the model is highly parallelizable in our formulation. This
enables large scale rendering and recovery of volumetric scenes having a large
number of variables. We solve stability and conditioning problems that stem
from radiative transfer (RT) modeling in-situ.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 16:24:48 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Holodovsky",
"Vadim",
""
],
[
"Schechner",
"Yoav Y.",
""
],
[
"Levin",
"Anat",
""
],
[
"Levis",
"Aviad",
""
],
[
"Aides",
"Amit",
""
]
] |
new_dataset
| 0.996374 |
1512.02183
|
Shiyin Zhong
|
Shiyin Zhong, (Student Member IEEE), Robert Broadwater (Senior Member,
IEEE), Steve Steffel, (Senior Member)
|
Wavelet Based Load Models from AMI Data
| null | null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A major challenge of using AMI data in power system analysis is the large
size of the data sets. For rapid analysis that addresses historical behavior of
systems consisting of a few hundred feeders, all of the AMI load data can be
loaded into memory and used in a power flow analysis. However, if a system
contains thousands of feeders then the handling of the AMI data in the analysis
becomes more challenging. The work here seeks to demonstrate that the
information contained in large AMI data sets can be compressed into accurate
load models using wavelets. Two types of wavelet based load models are
considered, the multi-resolution wavelet load model for each individual
customer and the classified wavelet load model for customers that share similar
load patterns. The multi-resolution wavelet load model compresses the data, and
the classified wavelet load model further compresses the data. The method of
grouping customers into classes using the wavelet based classification
technique is illustrated.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 19:34:58 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Zhong",
"Shiyin",
"",
"Senior Member,\n IEEE"
],
[
"Broadwater",
"Robert",
"",
"Senior Member,\n IEEE"
],
[
"Steffel",
"Steve",
""
]
] |
new_dataset
| 0.954055 |
1512.02196
|
Marmik Pandya
|
Marmik Pandya
|
Securing Cloud - The Quantum Way
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Confidentiality, Integrity, and Availability are basic goals of security
architecture. To ensure CIA, many authentication scheme has been introduced in
several years. Currently deployment of Public Key Infrastructure (PKI) is a
most significant solution. PKI involving exchange key using certificates via a
public channel to a authenticate users in the cloud infrastructure. It is
exposed to widespread security threats such as eavesdropping, the man in the
middle attack, masquerade et al. Quantum cryptography is of the most prominent
fields in the modern world of information security. Quantum cryptography is
considered to be a future replica of classical cryptography along with a vital
stance to break existing classical cryptography. This paper aims to look into
basic security architecture in place currently and further it tries to
introduce a new proposed security architecture for cloud computing environment,
which makes use of the knowledge of Quantum Mechanics and current advances in
research in Quantum Computing, to provide a more secure architecture.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 20:33:17 GMT"
}
] | 2015-12-08T00:00:00 |
[
[
"Pandya",
"Marmik",
""
]
] |
new_dataset
| 0.982923 |
1407.4027
|
Peter Banda
|
Peter Banda, Drew Blount and Christof Teuscher
|
COEL: A Web-based Chemistry Simulation Framework
|
23 pages, 12 figures, 1 table
|
CoSMoS 2014: Proceedings of the 7th Workshop on Complex Systems
Modelling and Simulation, 35-60, 2014
| null | null |
cs.CE physics.chem-ph q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The chemical reaction network (CRN) is a widely used formalism to describe
macroscopic behavior of chemical systems. Available tools for CRN modelling and
simulation require local access, installation, and often involve local file
storage, which is susceptible to loss, lacks searchable structure, and does not
support concurrency. Furthermore, simulations are often single-threaded, and
user interfaces are non-trivial to use. Therefore there are significant hurdles
to conducting efficient and collaborative chemical research. In this paper, we
introduce a new enterprise chemistry simulation framework, COEL, which
addresses these issues. COEL is the first web-based framework of its kind. A
visually pleasing and intuitive user interface, simulations that run on a large
computational grid, reliable database storage, and transactional services make
COEL ideal for collaborative research and education. COEL's most prominent
features include ODE-based simulations of chemical reaction networks and
multicompartment reaction networks, with rich options for user interactions
with those networks. COEL provides DNA-strand displacement transformations and
visualization (and is to our knowledge the first CRN framework to do so), GA
optimization of rate constants, expression validation, an application-wide
plotting engine, and SBML/Octave/Matlab export. We also present an overview of
the underlying software and technologies employed and describe the main
architectural decisions driving our development. COEL is available at
http://coel-sim.org for selected research teams only. We plan to provide a part
of COEL's functionality to the general public in the near future.
|
[
{
"version": "v1",
"created": "Tue, 15 Jul 2014 15:45:00 GMT"
}
] | 2015-12-07T00:00:00 |
[
[
"Banda",
"Peter",
""
],
[
"Blount",
"Drew",
""
],
[
"Teuscher",
"Christof",
""
]
] |
new_dataset
| 0.999715 |
1504.02205
|
Rui Han
|
Rui Han, Shulin Zhan, Chenrong Shao, Junwei Wang, Lizy K. John,
Jiangtao Xu, Gang Lu, Lei Wang
|
BigDataBench-MT: A Benchmark Tool for Generating Realistic Mixed Data
Center Workloads
|
12 pages, 5 figures
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Long-running service workloads (e.g. web search engine) and short-term data
analysis workloads (e.g. Hadoop MapReduce jobs) co-locate in today's data
centers. Developing realistic benchmarks to reflect such practical scenario of
mixed workload is a key problem to produce trustworthy results when evaluating
and comparing data center systems. This requires using actual workloads as well
as guaranteeing their submissions to follow patterns hidden in real-world
traces. However, existing benchmarks either generate actual workloads based on
probability models, or replay real-world workload traces using basic I/O
operations. To fill this gap, we propose a benchmark tool that is a first step
towards generating a mix of actual service and data analysis workloads on the
basis of real workload traces. Our tool includes a combiner that enables the
replaying of actual workloads according to the workload traces, and a
multi-tenant generator that flexibly scales the workloads up and down according
to users' requirements. Based on this, our demo illustrates the workload
customization and generation process using a visual interface. The proposed
tool, called BigDataBench-MT, is a multi-tenant version of our comprehensive
benchmark suite BigDataBench and it is publicly available from
http://prof.ict.ac.cn/BigDataBench/multi-tenancyversion/.
|
[
{
"version": "v1",
"created": "Thu, 9 Apr 2015 07:15:24 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Apr 2015 10:45:53 GMT"
},
{
"version": "v3",
"created": "Fri, 4 Dec 2015 09:41:03 GMT"
}
] | 2015-12-07T00:00:00 |
[
[
"Han",
"Rui",
""
],
[
"Zhan",
"Shulin",
""
],
[
"Shao",
"Chenrong",
""
],
[
"Wang",
"Junwei",
""
],
[
"John",
"Lizy K.",
""
],
[
"Xu",
"Jiangtao",
""
],
[
"Lu",
"Gang",
""
],
[
"Wang",
"Lei",
""
]
] |
new_dataset
| 0.959803 |
1512.01364
|
Amelia Carolina Sparavigna
|
A.C. Sparavigna and R. Marazzato
|
Using Google Ngram Viewer for Scientific Referencing and History of
Science
|
Keywords: Computers and Society, Literary works, Time-series,
Referencing
| null | null | null |
cs.DL cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today, several universal digital libraries exist such as Google Books,
Project Gutenberg, Internet Archive libraries, which possess texts from general
collections, and many other archives are available, concerning more specific
subjects. On the digitalized texts available from these libraries, we can
perform several analyses, from those typically used for time-series to those of
network theory. For what concerns time-series, an interesting tool provided by
Google Books exists, which can help us in bibliographical and reference
researches. This tool is the Ngram Viewer, based on yearly count of n-grams. As
we will show in this paper, although it seems suitable just for literary works,
it can be useful for scientific researches, not only for history of science,
but also for acquiring references often unknown to researchers.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2015 10:48:35 GMT"
}
] | 2015-12-07T00:00:00 |
[
[
"Sparavigna",
"A. C.",
""
],
[
"Marazzato",
"R.",
""
]
] |
new_dataset
| 0.987238 |
1512.01438
|
EPTCS
|
Oleg Kiselyov (Tohoku University, Japan), Jacques Garrigue (Nagoya
University, Japan)
|
Proceedings ML Family/OCaml Users and Developers workshops
| null |
EPTCS 198, 2015
|
10.4204/EPTCS.198
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume collects the extended versions of selected papers originally
presented at the two ACM SIGPLAN workshops: ML Family Workshop 2014 and OCaml
2014. Both were affiliated with ICFP 2014 and took place on two consecutive
days, on September 4 and 5, 2014 in Gothenburg, Sweden.
The ML Family workshop aims to recognize the entire extended family of ML and
ML-like languages: languages that are Higher-order, Typed, Inferred, and
Strict. It provides the forum to discuss common issues, both practical
(compilation techniques, implementations of concurrency and parallelism,
programming for the Web) and theoretical (fancy types, module systems,
metaprogramming). The scope of the workshop includes all aspects of the design,
semantics, theory, application, implementation, and teaching of the members of
the ML family.
The OCaml workshop is more specifically targeted at the OCaml community, with
an emphasis on new proposals and tools aiming to improve OCaml, its
environment, and the functioning of the community. As such, it is interested in
works on the type system, language extensions, compiler and optimizations,
applications, tools, and experience reports of exciting uses.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2015 01:00:15 GMT"
}
] | 2015-12-07T00:00:00 |
[
[
"Kiselyov",
"Oleg",
"",
"Tohoku University, Japan"
],
[
"Garrigue",
"Jacques",
"",
"Nagoya\n University, Japan"
]
] |
new_dataset
| 0.993505 |
1512.01533
|
Camille Goudeseune
|
Camille Goudeseune
|
Motion trails from time-lapse video
|
7 pages, 6 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From an image sequence captured by a stationary camera, background
subtraction can detect moving foreground objects in the scene. Distinguishing
foreground from background is further improved by various heuristics. Then each
object's motion can be emphasized by duplicating its positions as a motion
trail. These trails clarify the objects' spatial relationships. Also, adding
motion trails to a video before previewing it at high speed reduces the risk of
overlooking transient events.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2015 20:28:27 GMT"
}
] | 2015-12-07T00:00:00 |
[
[
"Goudeseune",
"Camille",
""
]
] |
new_dataset
| 0.9865 |
1411.7277
|
Martin Derka
|
Therese Biedl, Martin Derka
|
$1$-String $B_2$-VPG Representation of Planar Graphs
|
arXiv admin note: text overlap with arXiv:1409.5816
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we prove that every planar graph has a 1-string $B_2$-VPG
representation---a string representation using paths in a rectangular grid that
contain at most two bends. Furthermore, two paths representing vertices $u,v$
intersect precisely once whenever there is an edge between $u$ and $v$.
|
[
{
"version": "v1",
"created": "Wed, 26 Nov 2014 15:59:43 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2015 14:25:28 GMT"
}
] | 2015-12-04T00:00:00 |
[
[
"Biedl",
"Therese",
""
],
[
"Derka",
"Martin",
""
]
] |
new_dataset
| 0.98644 |
1511.05490
|
Carmelo Cascone
|
Carmelo Cascone, Luca Pollini, Davide Sanvito, Antonio Capone,
Brunilde Sans\`o
|
SPIDER: Fault Resilient SDN Pipeline with Recovery Delay Guarantees
|
8 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When dealing with node or link failures in Software Defined Networking (SDN),
the network capability to establish an alternative path depends on controller
reachability and on the round trip times (RTTs) between controller and involved
switches. Moreover, current SDN data plane abstractions for failure detection
(e.g. OpenFlow "Fast-failover") do not allow programmers to tweak switches'
detection mechanism, thus leaving SDN operators still relying on proprietary
management interfaces (when available) to achieve guaranteed detection and
recovery delays. We propose SPIDER, an OpenFlow-like pipeline design that
provides i) a detection mechanism based on switches' periodic link probing and
ii) fast reroute of traffic flows even in case of distant failures, regardless
of controller availability. SPIDER can be implemented using stateful data plane
abstractions such as OpenState or Open vSwitch, and it offers guaranteed short
(i.e. ms) failure detection and recovery delays, with a configurable trade off
between overhead and failover responsiveness. We present here the SPIDER
pipeline design, behavioral model, and analysis on flow tables' memory impact.
We also implemented and experimentally validated SPIDER using OpenState (an
OpenFlow 1.3 extension for stateful packet processing), showing numerical
results on its performance in terms of recovery latency and packet losses.
|
[
{
"version": "v1",
"created": "Tue, 17 Nov 2015 17:55:13 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2015 21:47:58 GMT"
}
] | 2015-12-04T00:00:00 |
[
[
"Cascone",
"Carmelo",
""
],
[
"Pollini",
"Luca",
""
],
[
"Sanvito",
"Davide",
""
],
[
"Capone",
"Antonio",
""
],
[
"Sansò",
"Brunilde",
""
]
] |
new_dataset
| 0.988562 |
1512.00727
|
Roy Friedman
|
Gil Einziger, Roy Friedman, Ben Manes
|
TinyLFU: A Highly Efficient Cache Admission Policy
|
A much earlier and shorter version of this work appeared in the
Euromicro PDP 2014 conference
| null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes to use a frequency based cache admission policy in order
to boost the effectiveness of caches subject to skewed access distributions.
Given a newly accessed item and an eviction candidate from the cache, our
scheme decides, based on the recent access history, whether it is worth
admitting the new item into the cache at the expense of the eviction candidate.
Realizing this concept is enabled through a novel approximate LFU structure
called TinyLFU, which maintains an approximate representation of the access
frequency of a large sample of recently accessed items. TinyLFU is very compact
and light-weight as it builds upon Bloom filter theory.
We study the properties of TinyLFU through simulations of both synthetic
workloads as well as multiple real traces from several sources. These
simulations demonstrate the performance boost obtained by enhancing various
replacement policies with the TinyLFU eviction policy. Also, a new combined
replacement and eviction policy scheme nicknamed W-TinyLFU is presented.
W-TinyLFU is demonstrated to obtain equal or better hit-ratios than other state
of the art replacement policies on these traces. It is the only scheme to
obtain such good results on all traces.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 15:05:46 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2015 10:38:11 GMT"
}
] | 2015-12-04T00:00:00 |
[
[
"Einziger",
"Gil",
""
],
[
"Friedman",
"Roy",
""
],
[
"Manes",
"Ben",
""
]
] |
new_dataset
| 0.974073 |
1512.01058
|
Anke Brock
|
Anke Brock (Potioc), Christophe Jouffrais (CNRS, IRIT)
|
Interactive audio-tactile maps for visually impaired people
|
\<http://dl.acm.org/citation.cfm?id=J956\&CFID=730680571\&CFTOKEN=17044974\>.
\<10.1145/2850440.2850441\>
|
ACM SIGACCESS Accessibility and Computing (ACM Digital Library),
Association for Computing Machinery (ACM), 2015, pp.3-12.
|
10.1145/2850440.2850441
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visually impaired people face important challenges related to orientation and
mobility. Indeed, 56% of visually impaired people in France declared having
problems concerning autonomous mobility. These problems often mean that
visually impaired people travel less, which influences their personal and
professional life and can lead to exclusion from society. Therefore this issue
presents a social challenge as well as an important research area. Accessible
geographic maps are helpful for acquiring knowledge about a city's or
neighborhood's configuration, as well as selecting a route to reach a
destination. Traditionally, raised-line paper maps with braille text have been
used. These maps have proved to be efficient for the acquisition of spatial
knowledge by visually impaired people. Yet, these maps possess significant
limitations. For instance, due to the specificities of the tactile sense only a
limited amount of information can be displayed on a single map, which
dramatically increases the number of maps that are needed. For the same reason,
it is difficult to represent specific information such as distances. Finally,
braille labels are used for textual descriptions but only a small percentage of
the visually impaired population reads braille. In France 15% of blind people
are braille readers and only 10% can read and write. In the United States,
fewer than 10% of the legally blind people are braille readers and only 10% of
blind children actually learn braille. Recent technological advances have
enabled the design of interactive maps with the aim to overcome these
limitations. Indeed, interactive maps have the potential to provide a broad
spectrum of the population with spatial knowledge, irrespective of age,
impairment, skill level, or other factors. To this regard, they might be an
efficient means for providing visually impaired people with access to
geospatial information. In this paper we give an overview of our research on
making geographic maps accessible to visually impaired people.
|
[
{
"version": "v1",
"created": "Thu, 3 Dec 2015 12:33:54 GMT"
}
] | 2015-12-04T00:00:00 |
[
[
"Brock",
"Anke",
"",
"Potioc"
],
[
"Jouffrais",
"Christophe",
"",
"CNRS, IRIT"
]
] |
new_dataset
| 0.982488 |
1504.08167
|
Orly Avner
|
Orly Avner and Shie Mannor
|
Multi-user lax communications: a multi-armed bandit approach
| null | null | null | null |
cs.LG cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by cognitive radio networks, we consider a setting where multiple
users share several channels modeled as a multi-user multi-armed bandit (MAB)
problem. The characteristics of each channel are unknown and are different for
each user. Each user can choose between the channels, but her success depends
on the particular channel chosen as well as on the selections of other users:
if two users select the same channel their messages collide and none of them
manages to send any data. Our setting is fully distributed, so there is no
central control. As in many communication systems, the users cannot set up a
direct communication protocol, so information exchange must be limited to a
minimum. We develop an algorithm for learning a stable configuration for the
multi-user MAB problem. We further offer both convergence guarantees and
experiments inspired by real communication networks, including comparison to
state-of-the-art algorithms.
|
[
{
"version": "v1",
"created": "Thu, 30 Apr 2015 11:11:54 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2015 08:50:37 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Avner",
"Orly",
""
],
[
"Mannor",
"Shie",
""
]
] |
new_dataset
| 0.999268 |
1512.00521
|
Cameron McGarry
|
Pedro M. Aguiar, Robert Hornby, Cameron McGarry, Simon O'Keefe,
Angelika Sebald
|
Discrete and Continuous Systems of Logic in Nuclear Magnetic Resonance
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We implement several non-binary logic systems using the spin dynamics of
nuclear spins in nuclear magnetic resonance (NMR). The NMR system is a suitable
test system because of its high degree of experimental control; findings from
NMR implementations are relevant for other computational platforms exploiting
particles with spin, such as electrons or photons. While we do not expect the
NMR system to become a practical computational device, it is uniquely useful to
explore strengths and weaknesses of unconventional computational approaches,
such as non-binary logic.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2015 23:35:34 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Aguiar",
"Pedro M.",
""
],
[
"Hornby",
"Robert",
""
],
[
"McGarry",
"Cameron",
""
],
[
"O'Keefe",
"Simon",
""
],
[
"Sebald",
"Angelika",
""
]
] |
new_dataset
| 0.990897 |
1512.00596
|
Ira Kemelmacher-Shlizerman
|
Ira Kemelmacher-Shlizerman and Steve Seitz and Daniel Miller and Evan
Brossard
|
The MegaFace Benchmark: 1 Million Faces for Recognition at Scale
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent face recognition experiments on a major benchmark LFW show stunning
performance--a number of algorithms achieve near to perfect score, surpassing
human recognition rates. In this paper, we advocate evaluations at the million
scale (LFW includes only 13K photos of 5K people). To this end, we have
assembled the MegaFace dataset and created the first MegaFace challenge. Our
dataset includes One Million photos that capture more than 690K different
individuals. The challenge evaluates performance of algorithms with increasing
numbers of distractors (going from 10 to 1M) in the gallery set. We present
both identification and verification performance, evaluate performance with
respect to pose and a person's age, and compare as a function of training data
size (number of photos and people). We report results of state of the art and
baseline algorithms. Our key observations are that testing at the million scale
reveals big performance differences (of algorithms that perform similarly well
on smaller scale) and that age invariant recognition as well as pose are still
challenging for most. The MegaFace dataset, baseline code, and evaluation
scripts, are all publicly released for further experimentations at:
megaface.cs.washington.edu.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 07:17:54 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Kemelmacher-Shlizerman",
"Ira",
""
],
[
"Seitz",
"Steve",
""
],
[
"Miller",
"Daniel",
""
],
[
"Brossard",
"Evan",
""
]
] |
new_dataset
| 0.999811 |
1512.00665
|
Weidong Wang
|
Weidong Wang, Chunhua Liao, Liqiang Wang, Daniel J. Quinlan, Wei Lu
|
HBTM: A Heartbeat-based Behavior Detection Mechanism for POSIX Threads
and OpenMP Applications
|
7 pages, 7 figures
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Extreme-scale computing involves hundreds of millions of threads with
multi-level parallelism running on large-scale hierarchical and heterogeneous
hardware. In POSIX threads and OpenMP applications, some key behaviors
occurring in runtime such as thread failure, busy waiting, and exit need to be
accurately and timely detected. However, for the most of these applications,
there are lack of unified and efficient detection mechanisms to do this. In
this paper, a heartbeat-based behavior detection mechanism for POSIX threads
(Pthreads) and OpenMP applications (HBTM) is proposed. In the design, two types
of implementations are conducted, centralized and decentralized respectively.
In both implementations, unified API has been designed to guarantee the
generality of the mechanism. Meanwhile, a ring-based detection algorithm is
designed to ease the burden of the centra thread at runtime. To evaluate the
mechanism, the NAS Parallel Benchmarks (NPB) are used to test the performance
of the HBTM. The experimental results show that the HBTM supports detection of
behaviors of POSIX threads and OpenMP applications while acquiring a short
latency and near 1% overhead.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 12:24:06 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Wang",
"Weidong",
""
],
[
"Liao",
"Chunhua",
""
],
[
"Wang",
"Liqiang",
""
],
[
"Quinlan",
"Daniel J.",
""
],
[
"Lu",
"Wei",
""
]
] |
new_dataset
| 0.999118 |
1512.00728
|
David Bamman
|
Philip Massey, Patrick Xia, David Bamman and Noah A. Smith
|
Annotating Character Relationships in Literary Texts
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We present a dataset of manually annotated relationships between characters
in literary texts, in order to support the training and evaluation of automatic
methods for relation type prediction in this domain (Makazhanov et al., 2014;
Kokkinakis, 2013) and the broader computational analysis of literary character
(Elson et al., 2010; Bamman et al., 2014; Vala et al., 2015; Flekova and
Gurevych, 2015). In this work, we solicit annotations from workers on Amazon
Mechanical Turk for 109 texts ranging from Homer's _Iliad_ to Joyce's _Ulysses_
on four dimensions of interest: for a given pair of characters, we collect
judgments as to the coarse-grained category (professional, social, familial),
fine-grained category (friend, lover, parent, rival, employer), and affinity
(positive, negative, neutral) that describes their primary relationship in a
text. We do not assume that this relationship is static; we also collect
judgments as to whether it changes at any point in the course of the text.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 15:09:31 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Massey",
"Philip",
""
],
[
"Xia",
"Patrick",
""
],
[
"Bamman",
"David",
""
],
[
"Smith",
"Noah A.",
""
]
] |
new_dataset
| 0.951808 |
1512.00779
|
Andrew Winslow
|
Dhananjay Ipparthi, Massimo Mastrangeli, Andrew Winslow
|
Dipole Codes Attractively Encode Glue Functions
|
To appear in Theoretical Computer Science
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dipole words are sequences of magnetic dipoles, in which alike elements repel
and opposite elements attract. Magnetic dipoles contrast with more general sets
of bonding types, called glues, in which pairwise bonding strength is specified
by a glue function. We prove that every glue function $g$ has a set of dipole
words, called a dipole code, that attractively encodes $g$: the pairwise
attractions (positive or non-positive bond strength) between the words are
identical to those of $g$. Moreover, we give such word sets of asymptotically
optimal length. Similar results are obtained for a commonly used subclass of
glue functions.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 17:23:50 GMT"
}
] | 2015-12-03T00:00:00 |
[
[
"Ipparthi",
"Dhananjay",
""
],
[
"Mastrangeli",
"Massimo",
""
],
[
"Winslow",
"Andrew",
""
]
] |
new_dataset
| 0.999454 |
1504.05679
|
Shih-Chun Lin
|
Shih-Chun Lin and I-Hsiang Wang
|
On Two-Pair Two-Way Relay Channel with an Intermittently Available Relay
|
extended version of ISIT 2015 paper
| null |
10.1109/ISIT.2015.7282786
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When multiple users share the same resource for physical layer cooperation
such as relay terminals in their vicinities, this shared resource may not be
always available for every user, and it is critical for transmitting terminals
to know whether other users have access to that common resource in order to
better utilize it. Failing to learn this critical piece of information may
cause severe issues in the design of such cooperative systems. In this paper,
we address this problem by investigating a two-pair two-way relay channel with
an intermittently available relay. In the model, each pair of users need to
exchange their messages within their own pair via the shared relay. The shared
relay, however, is only intermittently available for the users to access. The
accessing activities of different pairs of users are governed by independent
Bernoulli random processes. Our main contribution is the characterization of
the capacity region to within a bounded gap in a symmetric setting, for both
delayed and instantaneous state information at transmitters. An interesting
observation is that the bottleneck for information flow is the quality of state
information (delayed or instantaneous) available at the relay, not those at the
end users. To the best of our knowledge, our work is the first result regarding
how the shared intermittent relay should cooperate with multiple pairs of users
in such a two-way cooperative network.
|
[
{
"version": "v1",
"created": "Wed, 22 Apr 2015 07:45:47 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Lin",
"Shih-Chun",
""
],
[
"Wang",
"I-Hsiang",
""
]
] |
new_dataset
| 0.997216 |
1510.03567
|
Georg Nawratil
|
Georg Nawratil
|
On the line-symmetry of self-motions of linear pentapods
|
16 pages, 7 figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that all self-motions of pentapods with linear platform of Type 1 and
Type 2 can be generated by line-symmetric motions. Thus this paper closes a gap
between the more than 100 year old works of Duporcq and Borel and the extensive
study of line-symmetric motions done by Krames in the 1930's. As a consequence
we also get a new solution set for the Borel Bricard problem. Moreover we
discuss the reality of self-motions and give a sufficient condition for the
design of linear pentapods of Type 1 and Type 2, which have a self-motion free
workspace.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2015 08:11:15 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2015 10:36:32 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Nawratil",
"Georg",
""
]
] |
new_dataset
| 0.998 |
1510.08662
|
Robert J. Mokken
|
Steven Laan, Maarten Marx and Robert J. Mokken
|
Close Communities in Social Networks: Boroughs and 2-Clubs
|
Keywords: Social networks, close communication, close communities,
boroughs, 2-clubs, diameter 2, ego-networks
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The structure of close communication, contacts and association in social
networks is studied in the form of maximal subgraphs of diameter 2 (2-clubs),
corresponding to three types of close communities: hamlets, social circles and
coteries. The concept of borough of a graph is defined and introduced. Each
borough is a chained union of 2-clubs of the network and any 2-club of the
network belongs to one borough. Thus the set of boroughs of a network, together
with the 2-clubs held by them, are shown to contain the structure of close
communication in a network. Applications are given with examples from real
world network data.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2015 12:16:40 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2015 15:29:58 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Nov 2015 13:59:33 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Nov 2015 16:58:23 GMT"
},
{
"version": "v5",
"created": "Tue, 1 Dec 2015 15:54:49 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Laan",
"Steven",
""
],
[
"Marx",
"Maarten",
""
],
[
"Mokken",
"Robert J.",
""
]
] |
new_dataset
| 0.999577 |
1511.08310
|
Mayank Singh
|
Mayank Singh, Rajdeep Sarkar, Pawan Goyal, Animesh Mukherjee, Soumen
Chakrabarti
|
Sic Transit Gloria Manuscriptum: Two Views of the Aggregate Fate of
Ancient Papers
| null | null | null | null |
cs.DL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When PageRank began to be used for ranking in Web search, a concern soon
arose that older pages have an inherent --- and potentially unfair ---
advantage over emerging pages of high quality, because they have had more time
to acquire hyperlink citations. Algorithms were then proposed to compensate for
this effect. Curiously, in bibliometry, the opposite concern has often been
raised: that a growing body of recent papers crowds out older papers, resulting
in a collective amnesia in research communities, which potentially leads to
reinventions, redundancies, and missed opportunities to connect ideas. A recent
paper by Verstak et al. reported experiments on Google Scholar data, which
seemed to refute the amnesia, or aging, hypothesis. They claimed that more
recently written papers have a larger fraction of outbound citations targeting
papers that are older by a fixed number of years, indicating that ancient
papers are alive and well-loved and increasingly easily found, thanks in part
to Google Scholar. In this paper we show that the full picture is considerably
more nuanced. Specifically, the fate of a fixed sample of papers, as they age,
is rather different from what Verstak et al.'s study suggests: there is clear
and steady abandonment in favor of citations to newer papers. The two
apparently contradictory views are reconciled by the realization that, as time
passes, the number of papers older than a fixed number of years grows rapidly.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2015 07:52:37 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2015 06:00:30 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Singh",
"Mayank",
""
],
[
"Sarkar",
"Rajdeep",
""
],
[
"Goyal",
"Pawan",
""
],
[
"Mukherjee",
"Animesh",
""
],
[
"Chakrabarti",
"Soumen",
""
]
] |
new_dataset
| 0.986424 |
1512.00047
|
Florentin Smarandache
|
Florentin Smarandache
|
Symbolic Neutrosophic Theory
|
195 pages, several graphs, Published as book in Bruxelles, 2015
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Symbolic (or Literal) Neutrosophic Theory is referring to the use of abstract
symbols (i.e. the letters T, I, F, or their refined indexed letters Tj, Ik, Fl)
in neutrosophics. We extend the dialectical triad thesis-antithesis-synthesis
to the neutrosophic tetrad thesis-antithesis-neutrothesis-neutrosynthesis. The
we introduce the neutrosophic system that is a quasi or (t,i,f) classical
system, in the sense that the neutrosophic system deals with quasi-terms
(concepts, attributes, etc.). Then the notions of Neutrosophic Axiom,
Neutrosophic Deducibility, Degree of Contradiction (Dissimilarity) of Two
Neutrosophic Axioms, etc. Afterwards a new type of structures, called (t, i, f)
Neutrosophic Structures, and we show particular cases of such structures in
geometry and in algebra. Also, a short history of the neutrosophic set,
neutrosophic numerical components and neutrosophic literal components,
neutrosophic numbers, etc. We construct examples of splitting the literal
indeterminacy (I) into literal subindeterminacies (I1, I2, and so on, Ir), and
to define a multiplication law of these literal subindeterminacies in order to
be able to build refined I neutrosophic algebraic structures. We define three
neutrosophic actions and their properties. We then introduce the prevalence
order on T,I,F with respect to a given neutrosophic operator. And the
refinement of neutrosophic entities A, neutA, and antiA. Then we extend the
classical logical operators to neutrosophic literal (symbolic) logical
operators and to refined literal (symbolic) logical operators, and we define
the refinement neutrosophic literal (symbolic) space. We introduce the
neutrosophic quadruple numbers (a+bT+cI+dF) and the refined neutrosophic
quadruple numbers. Then we define an absorbance law, based on a prevalence
order, in order to multiply the neutrosophic quadruple numbers.
|
[
{
"version": "v1",
"created": "Sun, 18 Oct 2015 00:32:31 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
]
] |
new_dataset
| 0.999474 |
1512.00067
|
Syed (Shawon) Rahman
|
Lee Rice and Shawon Rahman
|
Non-profit Organizations' Need to Address Security for Effective
Government Contacting
| null | null |
10.5121/ijnsa.2012.4404
| null |
cs.CR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The need for information security within small to mid-size companies is
increasing. The risks of information security breach, data loss, and disaster
are growing. The impact of IT outages and issues on the company are
unacceptable to any size business and their clients. There are many ways to
address the security for IT departments. The need to address risks of attacks
as well as disasters is important to the IT security policies and procedures.
The IT departments of small to medium companies have to address these security
concerns within their budgets and other limited resources.Security planning,
design, and employee training that is needed requires input and agreement from
all levels of the company and management. This paper will discuss security
needs and methods to implement them into a corporate infrastructure.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2015 22:12:59 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Rice",
"Lee",
""
],
[
"Rahman",
"Shawon",
""
]
] |
new_dataset
| 0.992883 |
1512.00126
|
Alex Zhavoronkov
|
Yuri Nikolsky, Roman Gurinovich, Oleg Kuryan, Aleksandr Pashuk, Alexej
Scherbakov, Konstantin Romantsov, Leslie C. Jellen, Alex Zhavoronkov
|
GrantMed: a new, international system for tracking grants and funding
trends in the life sciences
| null | null | null | null |
cs.DL cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite the success of PubMed and other search engines in managing the
massive volume of biomedical literature and the retrieval of individual
publications, grant-related data remains scattered and relatively inaccessible.
This is problematic, as project and funding data has significant analytical
value and could be integral to publication retrieval. Here, we introduce
GrantMed, a searchable international database of biomedical grants that
integrates some 20 million publications with the nearly 1.4 million research
projects and 650 billion dollars of funding that made them possible. For any
given topic in the life sciences, Grantmed provides instantaneous visualization
of the past 30 years of dollars spent and projects awarded, along with detailed
individual project descriptions, funding amounts, and links to investigators,
research organizations, and resulting publications. It summarizes trends in
funding and publication rates for areas of interest and merges data from
various national grant databases to create one international grant tracking
system. This information will benefit the research community and funding
entities alike. Users can view trends over time or current projects underway
and use this information to navigate the decision-making process in moving
forward. They can view projects prior to publication and records of previous
projects. Convenient access to this data for analytical purposes will be
beneficial in many ways, helping to prevent project overlap, reduce funding
redundancy, identify areas of success, accelerate dissemination of ideas, and
expose knowledge gaps in moving forward. It is our hope that this will be a
central resource for international life sciences research communities and the
funding organizations that support them, ultimately streamlining progress.
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2015 03:06:47 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Nikolsky",
"Yuri",
""
],
[
"Gurinovich",
"Roman",
""
],
[
"Kuryan",
"Oleg",
""
],
[
"Pashuk",
"Aleksandr",
""
],
[
"Scherbakov",
"Alexej",
""
],
[
"Romantsov",
"Konstantin",
""
],
[
"Jellen",
"Leslie C.",
""
],
[
"Zhavoronkov",
"Alex",
""
]
] |
new_dataset
| 0.98967 |
1512.00360
|
Alexander Kott
|
Alexander Kott, David S. Alberts, Cliff Wang
|
War of 2050: a Battle for Information, Communications, and Computer
Security
|
A shorter version of this paper has been accepted for publication in
IEEE Computer, December 2015
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As envisioned in a recent future-casting workshop, warfare will continue to
be transformed by advances in information technologies. In fact, information
itself will become the decisive domain of warfare. Four developments will
significantly change the nature of the battle. The first of these will be a
proliferation of intelligent systems; the second, augmented humans; the third,
the decisive battle for the information domain; and the fourth, the
introduction of new, networked approaches to command and control. Each of these
new capabilities possesses the same critical vulnerability - attacks on the
information, communications and computers that will enable human-robot teams to
make sense of the battlefield and act decisively. Hence, the largely unseen
battle for information, communications and computer security will determine the
extent to which adversaries will be able to function and succeed on the
battlefield of 2050.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2015 18:54:58 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Kott",
"Alexander",
""
],
[
"Alberts",
"David S.",
""
],
[
"Wang",
"Cliff",
""
]
] |
new_dataset
| 0.998589 |
1512.00411
|
Christoph Studer
|
Nihat Engin Tunali, Michael Wu, Chris Dick, Christoph Studer
|
Linear Large-Scale MIMO Data Detection for 5G Multi-Carrier Waveform
Candidates
|
Presented at the Asilomar Conference on Signals, Systems, and
Computers
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fifth generation (5G) wireless systems are expected to combine emerging
transmission technologies, such as large-scale multiple-input multiple-output
(MIMO) and non-orthogonal multi-carrier waveforms, to improve the spectral
efficiency and to reduce out-of-band (OOB) emissions. This paper investigates
the efficacy of two promising multi-carrier waveforms that reduce OOB emissions
in combination with large-scale MIMO, namely filter bank multi-carrier (FBMC)
and generalized frequency division multiplexing (GFDM). We develop novel,
low-complexity data detection algorithms for both of these waveforms. We
investigate the associated performance/complexity trade-offs in the context of
large-scale MIMO, and we study the peak-to-average power ratio (PAPR). Our
results show that reducing the OOB emissions with FBMC and GFDM leads to higher
computational complexity and PAPR compared to that of orthogonal
frequency-division multiplexing (OFDM) and single-carrier frequency division
multiple access (SC-FDMA).
|
[
{
"version": "v1",
"created": "Tue, 1 Dec 2015 20:01:48 GMT"
}
] | 2015-12-02T00:00:00 |
[
[
"Tunali",
"Nihat Engin",
""
],
[
"Wu",
"Michael",
""
],
[
"Dick",
"Chris",
""
],
[
"Studer",
"Christoph",
""
]
] |
new_dataset
| 0.989218 |
1412.0779
|
Sariel Har-Peled
|
Sariel Har-Peled
|
Shortest Path in a Polygon using Sublinear Space
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
$\renewcommand{\Re}{{\rm I\!\hspace{-0.025em} R}}
\newcommand{\SetX}{\mathsf{X}} \newcommand{\VorX}[1]{\mathcal{V} \pth{#1}}
\newcommand{\Polygon}{\mathsf{P}} \newcommand{\Space}{\overline{\mathsf{m}}}
\newcommand{\pth}[2][\!]{#1\left({#2}\right)}$ We resolve an open problem due
to Tetsuo Asano, showing how to compute the shortest path in a polygon, given
in a read only memory, using sublinear space and subquadratic time.
Specifically, given a simple polygon $\Polygon$ with $n$ vertices in a read
only memory, and additional working memory of size $\Space$, the new algorithm
computes the shortest path (in $\Polygon$) in $O( n^2 /\, \Space )$ expected
time. This requires several new tools, which we believe to be of independent
interest.
|
[
{
"version": "v1",
"created": "Tue, 2 Dec 2014 04:12:05 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Nov 2015 22:14:23 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Har-Peled",
"Sariel",
""
]
] |
new_dataset
| 0.99808 |
1503.04444
|
Muhammad Masood Tahir Mr.
|
Muhammad Masood Tahir, Ayyaz Hussain
|
Pattern Recognition of Bearing Faults using Smoother Statistical
Features
|
This paper has been withdrawn by the author due to a crucial errors
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A pattern recognition (PR) based diagnostic scheme is presented to identify
bearing faults, using time domain features. Vibration data is acquired from
faulty bearings using a test rig. The features are extracted from the data, and
processed prior to utilize in the PR process. The processing involves smoothing
of feature distributions. This reduces the undesired impact of vibration
randomness on the PR process, and thus enhances the diagnostic accuracy of the
model.
|
[
{
"version": "v1",
"created": "Sun, 15 Mar 2015 16:05:24 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Nov 2015 15:04:15 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Tahir",
"Muhammad Masood",
""
],
[
"Hussain",
"Ayyaz",
""
]
] |
new_dataset
| 0.990317 |
1508.02074
|
Jeffrey Shallit
|
Luke Schaeffer and Jeffrey Shallit
|
Closed, Palindromic, Rich, Privileged, Trapezoidal, and Balanced Words
in Automatic Sequences
| null | null | null | null |
cs.FL cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that the property of being closed (resp., palindromic, rich,
privileged trapezoidal, balanced) is expressible in first-order logic for
automatic (and some related) sequences. It therefore follows that the
characteristic function of those n for which an automatic sequence x has a
closed (resp., palindromic, privileged, rich, trape- zoidal, balanced) factor
of length n is automatic. For privileged words this requires a new
characterization of the privileged property. We compute the corresponding
characteristic functions for various famous sequences, such as the Thue-Morse
sequence, the Rudin-Shapiro sequence, the ordinary paperfolding sequence, the
period-doubling sequence, and the Fibonacci sequence. Finally, we also show
that the function counting the total number of palindromic factors in a prefix
of length n of a k-automatic sequence is not k-synchronized.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2015 19:28:45 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Nov 2015 12:25:24 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Schaeffer",
"Luke",
""
],
[
"Shallit",
"Jeffrey",
""
]
] |
new_dataset
| 0.99127 |
1511.07907
|
Wei Yuan
|
Wei Yuan, Jianwei Huang, Ying Jun Zhang
|
Competitive Charging Station Pricing for Plug-in Electric Vehicles
|
15 pages, 21 figures
| null | null | null |
cs.GT cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the problem of charging station pricing and plug-in
electric vehicles (PEVs) station selection. When a PEV needs to be charged, it
selects a charging station by considering the charging prices, waiting times,
and travel distances. Each charging station optimizes its charging price based
on the prediction of the PEVs' charging station selection decisions and the
other station's pricing decision, in order to maximize its profit. To obtain
insights of such a highly coupled system, we consider a one-dimensional system
with two competing charging stations and Poisson arriving PEVs. We propose a
multi-leader-multi-follower Stackelberg game model, in which the charging
stations (leaders) announce their charging prices in Stage I, and the PEVs
(followers) make their charging station selections in Stage II. We show that
there always exists a unique charging station selection equilibrium in Stage
II, and such equilibrium depends on the charging stations' service capacities
and the price difference between them. We then characterize the sufficient
conditions for the existence and uniqueness of the pricing equilibrium in Stage
I. We also develop a low complexity algorithm that efficiently computes the
pricing equilibrium and the subgame perfect equilibrium of the two-stage
Stackelberg game.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 22:45:32 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Nov 2015 01:15:07 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Yuan",
"Wei",
""
],
[
"Huang",
"Jianwei",
""
],
[
"Zhang",
"Ying Jun",
""
]
] |
new_dataset
| 0.961777 |
1511.08827
|
Luiz Capretz Dr.
|
Arif Raza, Luiz Fernando Capretz, Faheem Ahmed
|
Maintenance Support in Open Source Software Projects
| null | null |
10.1109/ICDIM.2013.6694005
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Easy and mostly free access to the internet has resulted in the growing use
of open source software (OSS). However, it is a common perception that closed
proprietary software is still superior in areas such as software maintenance
and management. The research model of this study establishes a relationship
between maintenance issues (such as user requests and error handling) and
support provided by open source software through project forums, mailing lists
and trackers. To conduct this research, we have used a dataset consisting of
120 open source software projects, covering a wide range of categories. The
results of the study show that project forums and mailing lists play a
significant role in addressing user requests in open source software. However
according to the empirical investigation, it has been explored that trackers
are used as an effective medium for error reporting as well as user requests.
|
[
{
"version": "v1",
"created": "Fri, 27 Nov 2015 21:43:39 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Raza",
"Arif",
""
],
[
"Capretz",
"Luiz Fernando",
""
],
[
"Ahmed",
"Faheem",
""
]
] |
new_dataset
| 0.999577 |
1511.08857
|
Rajkumar Buyya
|
Rajkumar Buyya and Diana Barreto
|
Multi-Cloud Resource Provisioning with Aneka: A Unified and Integrated
Utilisation of Microsoft Azure and Amazon EC2 Instances
|
14 pages, 12 figures. Conference paper, Proceedings of the 2015
International Conference on Computing and Network Communications (CoCoNet
2015, IEEE Press, USA), Trivandrum, India, December 16-19, 2015
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many vendors are offering computing services on subscription basis via
Infrastructure-as-a-Service (IaaS) model. Users can acquire resources from
different providers and get the best of each of them to run their applications.
However, deploying applications in multi-cloud environments is a complex task.
Therefore, application platforms are needed to help developers to succeed.
Aneka is one such platform that supports developers to program and deploy
distributed applications in multi-cloud environments. It can be used to
provision resources from different cloud providers and can be configured to
request resources dynamically according to the needs of specific applications.
This paper presents extensions incorporated in Aneka to support the deployment
of applications in multi-cloud environments. The first extension shows the
flexibility of Aneka architecture to add cloud providers. Specifically, we
describe the addition of Microsoft Azure IaaS cloud provider. We also discuss
the inclusion of public IPs to communicate resources located in different
networks and the functionality of using PowerShell to automatize installation
of Aneka on remote resources. We demonstrate how an application composed of
independent tasks improves its total execution time when it is deployed in the
multi-cloud environment created by Aneka using resources provisioned from Azure
and EC2.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2015 01:06:11 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Buyya",
"Rajkumar",
""
],
[
"Barreto",
"Diana",
""
]
] |
new_dataset
| 0.994215 |
1511.08865
|
Khan Muhammad
|
Khan Muhammad
|
Steganography: A Secure way for Transmission in Wireless Sensor Networks
| null | null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Addressing the security concerns in wireless sensor networks (WSN) is a
challenging task, which has attracted the attention of many researchers from
the last few decades. Researchers have presented various schemes in WSN,
addressing the problems of processing, bandwidth, load balancing, and efficient
routing. However, little work has been done on security aspects of WSN. In a
typical WSN network, the tiny nodes installed on different locations sense the
surrounding environment, send the collected data to their neighbors, which in
turn is forwarded to a sink node. The sink node aggregate the data received
from different sensors and send it to the base station for further processing
and necessary actions. In highly critical sensor networks such as military and
law enforcement agencies networks, the transmission of such aggregated data via
the public network Internet is very sensitive and vulnerable to various attacks
and risks. Therefore, this paper provides a solution for addressing these
security issues based on steganography, where the aggregated data can be
embedded as a secret message inside an innocent-looking cover image. The stego
image containing the embedded data can be then sent to fusion center using
Internet. At the fusion center, the hidden data is extracted from the image,
the required processing is performed and decision is taken accordingly.
Experimentally, the proposed method is evaluated by objective analysis using
peak signal-to-noise ratio (PSNR), mean square error (MSE), normalized cross
correlation (NCC), and structural similarity index metric (SSIM), providing
promising results in terms of security and image quality, thus validating its
superiority.
|
[
{
"version": "v1",
"created": "Sat, 28 Nov 2015 04:00:05 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Muhammad",
"Khan",
""
]
] |
new_dataset
| 0.998242 |
1511.08986
|
Rajkumar Buyya
|
Sukhpal Singh, Inderveer Chana and Rajkumar Buyya
|
Agri-Info: Cloud Based Autonomic System for Delivering Agriculture as a
Service
|
31 pages, 28 figures
| null | null |
Technical Report CLOUDS-TR-2015-2, Cloud Computing and Distributed
Systems Laboratory, The University of Melbourne, Nov. 27, 2015
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing has emerged as an important paradigm for managing and
delivering services efficiently over the Internet. Convergence of cloud
computing with technologies such as wireless sensor networking and mobile
computing offers new applications of cloud services but this requires
management of Quality of Service (QoS) parameters to efficiently monitor and
measure the delivered services. This paper presents a QoS-aware Cloud Based
Autonomic Information System for delivering agriculture related information as
a service through the use of latest Cloud technologies which manage various
types of agriculture related data based on different domains. Proposed system
gathers information from various users through preconfigured devices and
manages and provides required information to users automatically. Further,
Cuckoo Optimization Algorithm has been used for efficient resource allocation
at infrastructure level for effective utilization of resources. We have
evaluated the performance of the proposed approach in Cloud environment and
experimental results show that the proposed system performs better in terms of
resource utilization, execution time, cost and computing capacity along with
other QoS parameters.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2015 09:51:36 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Singh",
"Sukhpal",
""
],
[
"Chana",
"Inderveer",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
new_dataset
| 0.996917 |
1511.09072
|
Mrigank Sharad
|
Tathagata Srimani, Bibhas Manna, Anand Kumar Mukhopadhyay, Kaushik
Roy, Mrigank Sharad
|
High Sensitivity Biosensor using Injection Locked Spin Torque
Nano-Oscillators
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With ever increasing research on magnetic nano systems it is shown to have
great potential in the areas of magnetic storage, biosensing, magnetoresistive
insulation etc. In the field of biosensing specifically Spin Valve sensors
coupled with Magnetic Nanolabels is showing great promise due to noise immunity
and energy efficiency [1]. In this paper we present the application of
injection locked based Spin Torque Nano Oscillator (STNO) suitable for high
resolution energy efficient labeled DNA Detection. The proposed STNO microarray
consists of 20 such devices oscillating at different frequencies making it
possible to multiplex all the signals using capacitive coupling. Frequency
Division Multiplexing can be aided with Time division multiplexing to increase
the device integration and decrease the readout time while maintaining the same
efficiency in presence of constant input referred noise.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2015 19:34:06 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Srimani",
"Tathagata",
""
],
[
"Manna",
"Bibhas",
""
],
[
"Mukhopadhyay",
"Anand Kumar",
""
],
[
"Roy",
"Kaushik",
""
],
[
"Sharad",
"Mrigank",
""
]
] |
new_dataset
| 0.994259 |
1511.09074
|
Mrigank Sharad
|
Sohail Ahasan, Saurav Maji, Kauhsik Roy, Mrigank Sharad
|
Digital LDO with Time-Interleaved Comparators for Fast Response and Low
Ripple
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
On-chip voltage regulation using distributed Digital Low Drop Out (LDO)
voltage regulators has been identified as a promising technique for efficient
power-management for emerging multi-core processors. Digital LDOs (DLDO) can
offer low voltage operation, faster transient response, and higher current
efficiency. Response time as well as output voltage ripple can be reduced by
increasing the speed of the dynamic comparators. However, the comparator offset
steeply increases for high clock frequencies, thereby leading to enhanced
variations in output voltage. In this work we explore the design of digital
LDOs with multiple dynamic comparators that can overcome this bottleneck. In
the proposed topology, we apply time-interleaved comparators with the same
voltage threshold and uniform current step in order to accomplish the
aforementioned features. Simulation based analysis shows that the DLDO with
time-interleaved comparators can achieve better overall performance in terms of
current efficiency, ripple and settling time. For a load step of 50mA, a DLDO
with 8 time-interleaved comparators could achieve an output ripple of less than
5mV, while achieving a settling time of less than 0.5us. Load current dependant
dynamic adjustment of clock frequency is proposed to maintain high current
efficiency of ~97%.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2015 19:42:09 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Ahasan",
"Sohail",
""
],
[
"Maji",
"Saurav",
""
],
[
"Roy",
"Kauhsik",
""
],
[
"Sharad",
"Mrigank",
""
]
] |
new_dataset
| 0.968125 |
1511.09079
|
Vladimir Gusev
|
Vladimir V. Gusev and Elena V. Pribavkina
|
Synchronizing automata and principal eigenvectors of the underlying
digraphs
|
11 pages, preliminary version
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A coloring of a digraph with a fixed out-degree k is a distribution of k
labels over the edges resulting in a deterministic finite automaton. An
automaton is called synchronizing if there exists a word which sends all states
of the automaton to a single state. In the present paper we study connections
between spectral and synchronizing properties of digraphs. We show that if a
coloring of a digraph is not synchronizing, then the stationary distribution of
an associated Markov chain has a partition of coordinates into blocks of equal
sum. Moreover, if there exists such a partition, then there exists a
non-synchronizing automaton with such stationary distribution. We extend these
results to bound the number of non-synchronizing colorings for digraphs with
particular eigenvectors. We also demonstrate that the length of the shortest
synchronizing word of any coloring is at most $w^2 - 3w + 3$, where $w$ is the
sum of the coordinates of the integer principal eigenvector of the digraph.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2015 20:02:02 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Gusev",
"Vladimir V.",
""
],
[
"Pribavkina",
"Elena V.",
""
]
] |
new_dataset
| 0.99582 |
1511.09101
|
Pedro Saleiro
|
Pedro Saleiro, S\'ilvio Amir, M\'ario J. Silva, Carlos Soares
|
POPmine: Tracking Political Opinion on the Web
|
2015 IEEE International Conference on Computer and Information
Technology, Ubiquitous Computing and Communications
| null |
10.1109/CIT/IUCC/DASC/PICOM.2015.228
| null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The automatic content analysis of mass media in the social sciences has
become necessary and possible with the raise of social media and computational
power. One particularly promising avenue of research concerns the use of
opinion mining. We design and implement the POPmine system which is able to
collect texts from web-based conventional media (news items in mainstream media
sites) and social media (blogs and Twitter) and to process those texts,
recognizing topics and political actors, analyzing relevant linguistic units,
and generating indicators of both frequency of mention and polarity
(positivity/negativity) of mentions to political actors across sources, types
of sources, and across time.
|
[
{
"version": "v1",
"created": "Sun, 29 Nov 2015 22:16:58 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Saleiro",
"Pedro",
""
],
[
"Amir",
"Sílvio",
""
],
[
"Silva",
"Mário J.",
""
],
[
"Soares",
"Carlos",
""
]
] |
new_dataset
| 0.996149 |
1511.09139
|
Jaime A. Moreno
|
Jaime A. Moreno
|
Discontinuous integral control for mechanical systems
|
8 pages, 4 figures.Previous version was submitted to CDC2015
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For mechanical systems we present a controller able to track an unknown
smooth signal, converging in finite time and by means of a continuous control
signal. The control scheme is insensitive against unknown perturbations with
bounded derivative. The controller consists of a non locally Lipschitz state
feedback control law, and a discontinuous integral controller, that is able to
estimate the unknown perturbation and to compensate for it. To complete an
output feedback control a continuous observer for the velocity is added. It is
shown that the closed loop consisting of state feedback, state observer and
discontinuous integral controller has an equilibrium point that is globally,
finite time stable, despite of perturbations with bounded derivative. The proof
is based on a new smooth Lyapunov function.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2015 02:55:42 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Moreno",
"Jaime A.",
""
]
] |
new_dataset
| 0.999656 |
1511.09368
|
Shihua Zhang
|
Shihua Zhang, Guanghua Hu, Wenwen Min
|
A neurodynamic framework for local community extraction in networks
|
4 figures
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To understand the structure and organization of a large-scale social,
biological or technological network, it can be helpful to describe and extract
local communities or modules of the network. In this article, we develop a
neurodynamic framework to describe the local communities which correspond to
the stable states of a neuro-system built based on the network. The
quantitative criteria to describe the neurodynamic system can cover a large
range of objective functions. The resolution limit of these functions enable us
to propose a generic criterion to explore multi-resolution local communities.
We explain the advantages of this framework and illustrate them by testing on a
number of model and real-world networks.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2015 16:17:42 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Zhang",
"Shihua",
""
],
[
"Hu",
"Guanghua",
""
],
[
"Min",
"Wenwen",
""
]
] |
new_dataset
| 0.996598 |
1511.09402
|
Elena Galbally
|
Elena Galbally, Frank Small, Ivan Zanco
|
Retractable Prosthesis for Transfemoral Amputees Using Series Elastic
Actuators and Force Control
|
7 pages, 10 figures. arXiv admin note: text overlap with
arXiv:0912.3956 by other authors
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a highly functional and cost-effective prosthesis for transfemoral
amputees that uses series elastic actuators. These actuators allow for accurate
force control, low impedance and large dynamic range. The design involves one
active joint at the knee and a passive joint at the ankle. Additionally, the
socket was designed using mirroring of compliances to ensure maximum comfort.
|
[
{
"version": "v1",
"created": "Mon, 30 Nov 2015 17:39:49 GMT"
}
] | 2015-12-01T00:00:00 |
[
[
"Galbally",
"Elena",
""
],
[
"Small",
"Frank",
""
],
[
"Zanco",
"Ivan",
""
]
] |
new_dataset
| 0.988098 |
1505.06784
|
Xinhua Wang
|
Xinhua Wang, Lilong Cai
|
Mathematical modeling and control of a tilt-rotor aircraft
| null |
Aerospace Science and Technology, vol. 47, no. 12, 2015, 473-492
|
10.1016/j.ast.2015.10.012
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel model of large-size tilt-rotor aircraft, which
can operate as a helicopter as well as being capable of transition to
fixed-wing flight. Aerodynamics of the dynamic large-size tilt-rotors based on
blade element method is analyzed during mode transition. For the large-size
aircraft with turboshaft engines, the blade pitch angles of the rotors are
regulated to vary according to the desired level of thrust, and the following
expressions are formulated explicitly: rotor thrust and blade pitch angle, drag
torque and blade pitch angle. A finite-time convergent observer based on
Lyapunov function is developed to reconstruct the unknown variables and
uncertainties during mode transitions. The merits of this design include the
modeling of dynamic large-size tilt-rotor, ease of the uncertainties estimation
during the tilting and the widely applications. Moreover, a switched logic
controller based on the finite-time convergent observer is proposed to drive
the aircraft to implement the mode transition with invariant flying height.
|
[
{
"version": "v1",
"created": "Tue, 26 May 2015 00:49:14 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2015 05:29:39 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Wang",
"Xinhua",
""
],
[
"Cai",
"Lilong",
""
]
] |
new_dataset
| 0.999497 |
1509.03542
|
Shervin Minaee
|
Shervin Minaee and Yao Wang
|
Fingerprint Recognition Using Translation Invariant Scattering Network
|
IEEE Signal Processing in Medicine and Biology Symposium, 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fingerprint recognition has drawn a lot of attention during last decades.
Different features and algorithms have been used for fingerprint recognition in
the past. In this paper, a powerful image representation called scattering
transform/network, is used for recognition. Scattering network is a
convolutional network where its architecture and filters are predefined wavelet
transforms. The first layer of scattering representation is similar to sift
descriptors and the higher layers capture higher frequency content of the
signal. After extraction of scattering features, their dimensionality is
reduced by applying principal component analysis (PCA). At the end, multi-class
SVM is used to perform template matching for the recognition task. The proposed
scheme is tested on a well-known fingerprint database and has shown promising
results with the best accuracy rate of 98\%.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2015 15:04:35 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Sep 2015 14:51:06 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Nov 2015 01:48:13 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Minaee",
"Shervin",
""
],
[
"Wang",
"Yao",
""
]
] |
new_dataset
| 0.963075 |
1511.07727
|
Atilim Gunes Baydin
|
Atilim Gunes Baydin, Barak A. Pearlmutter, Jeffrey Mark Siskind
|
DiffSharp: Automatic Differentiation Library
|
5 pages, 1 figure, minor fixes, added coauthor
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce DiffSharp, an automatic differentiation (AD)
library designed with machine learning in mind. AD is a family of techniques
that evaluate derivatives at machine precision with only a small constant
factor of overhead, by systematically applying the chain rule of calculus at
the elementary operator level. DiffSharp aims to make an extensive array of AD
techniques available, in convenient form, to the machine learning community.
These including arbitrary nesting of forward/reverse AD operations, AD with
linear algebra primitives, and a functional API that emphasizes the use of
higher-order functions and composition. The library exposes this functionality
through an API that provides gradients, Hessians, Jacobians, directional
derivatives, and matrix-free Hessian- and Jacobian-vector products. Bearing the
performance requirements of the latest machine learning techniques in mind, the
underlying computations are run through a high-performance BLAS/LAPACK backend,
using OpenBLAS by default. GPU support is currently being implemented.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 14:28:13 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2015 16:32:40 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Baydin",
"Atilim Gunes",
""
],
[
"Pearlmutter",
"Barak A.",
""
],
[
"Siskind",
"Jeffrey Mark",
""
]
] |
new_dataset
| 0.951568 |
1511.08307
|
Kimio Kuramitsu
|
Kimio Kuramitsu
|
Nez: practical open grammar language
|
unpublished draft work (11 pages)
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nez is a PEG(Parsing Expressing Grammar)-based open grammar language that
allows us to describe complex syntax constructs without action code. Since open
grammars are declarative and free from a host programming language of parsers,
software engineering tools and other parser applications can reuse once-defined
grammars across programming languages.
A key challenge to achieve practical open grammars is the expressiveness of
syntax constructs and the resulting parser performance, as the traditional
action code approach has provided very pragmatic solutions to these two issues.
In Nez, we extend the symbol-based state management to recognize
context-sensitive language syntax, which often appears in major programming
languages. In addition, the Abstract Syntax Tree constructor allows us to make
flexible tree structures, including the left-associative pair of trees. Due to
these extensions, we have demonstrated that Nez can parse not all but many
grammars.
Nez can generate various types of parsers since all Nez operations are
independent of a specific parser language. To highlight this feature, we have
implemented Nez with dynamic parsing, which allows users to integrate a Nez
parser as a parser library that loads a grammar at runtime. To achieve its
practical performance, Nez operators are assembled into low-level virtual
machine instructions, including automated state modifications when
backtracking, transactional controls of AST construction, and efficient
memoization in packrat parsing. We demonstrate that Nez dynamic parsers achieve
very competitive performance compared to existing efficient parser generators.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2015 07:37:10 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Kuramitsu",
"Kimio",
""
]
] |
new_dataset
| 0.998745 |
1511.08355
|
Jihong Yu
|
Jihong Yu and Lin Chen
|
From Static to Dynamic Tag Population Estimation: An Extended Kalman
Filter Perspective
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tag population estimation has recently attracted significant research
attention due to its paramount importance on a variety of radio frequency
identification (RFID) applications. However, most, if not all, of existing
estimation mechanisms are proposed for the static case where tag population
remains constant during the estimation process, thus leaving the more
challenging dynamic case unaddressed, despite the fundamental importance of the
latter case on both theoretical analysis and practical application. In order to
bridge this gap, %based on \textit{dynamic framed-slotted ALOHA} (DFSA)
protocol, we devote this paper to designing a generic framework of stable and
accurate tag population estimation schemes based on Kalman filter for both
static and dynamic RFID systems. %The objective is to devise estimation schemes
and analyze the boundedness of estimation error. Technically, we first model
the dynamics of RFID systems as discrete stochastic processes and leverage the
techniques in extended Kalman filter (EKF) and cumulative sum control chart
(CUSUM) to estimate tag population for both static and dynamic systems. By
employing Lyapunov drift analysis, we mathematically characterise the
performance of the proposed framework in terms of estimation accuracy and
convergence speed by deriving the closed-form conditions on the design
parameters under which our scheme can stabilise around the real population size
with bounded relative estimation error that tends to zero with exponential
convergence rate.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2015 11:03:21 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Yu",
"Jihong",
""
],
[
"Chen",
"Lin",
""
]
] |
new_dataset
| 0.972641 |
1511.08413
|
Sven Puchinger
|
Sven Puchinger, Sven M\"uelich, Karim Ishak, Martin Bossert
|
Code-Based Cryptosystems Using Generalized Concatenated Codes
|
Submitted to Springer Proceedings in Mathematics & Statistics,
special issue devoted to the conference Application of Computer Algebra (ACA)
2015
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The security of public-key cryptosystems is mostly based on number theoretic
problems like factorization and the discrete logarithm. There exists an
algorithm which solves these problems in polynomial time using a quantum
computer. Hence, these cryptosystems will be broken as soon as quantum
computers emerge. Code-based cryptography is an alternative which resists
quantum computers since its security is based on an NP-complete problem, namely
decoding of random linear codes. The McEliece cryptosystem is the most
prominent scheme to realize code-based cryptography. Many codeclasses were
proposed for the McEliece cryptosystem, but most of them are broken by now.
Sendrier suggested to use ordinary concatenated codes, however, he also
presented an attack on such codes. This work investigates generalized
concatenated codes to be used in the McEliece cryptosystem. We examine the
application of Sendrier's attack on generalized concatenated codes and present
alternative methods for both partly finding the code structure and recovering
the plaintext from a cryptogram. Further, we discuss modifications of the
cryptosystem making it resistant against these attacks.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2015 15:14:56 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Puchinger",
"Sven",
""
],
[
"Müelich",
"Sven",
""
],
[
"Ishak",
"Karim",
""
],
[
"Bossert",
"Martin",
""
]
] |
new_dataset
| 0.998076 |
1511.08522
|
Mohak Sukhwani
|
Mohak Sukhwani, C.V. Jawahar
|
TennisVid2Text: Fine-grained Descriptions for Domain Specific Videos
|
BMVC 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automatically describing videos has ever been fascinating. In this work, we
attempt to describe videos from a specific domain - broadcast videos of lawn
tennis matches. Given a video shot from a tennis match, we intend to generate a
textual commentary similar to what a human expert would write on a sports
website. Unlike many recent works that focus on generating short captions, we
are interested in generating semantically richer descriptions. This demands a
detailed low-level analysis of the video content, specially the actions and
interactions among subjects. We address this by limiting our domain to the game
of lawn tennis. Rich descriptions are generated by leveraging a large corpus of
human created descriptions harvested from Internet. We evaluate our method on a
newly created tennis video data set. Extensive analysis demonstrate that our
approach addresses both semantic correctness as well as readability aspects
involved in the task.
|
[
{
"version": "v1",
"created": "Thu, 26 Nov 2015 22:21:44 GMT"
}
] | 2015-11-30T00:00:00 |
[
[
"Sukhwani",
"Mohak",
""
],
[
"Jawahar",
"C. V.",
""
]
] |
new_dataset
| 0.999673 |
1511.07847
|
Ulrich Pferschy
|
Andreas Darmann and Ulrich Pferschy and Joachim Schauer
|
The Shortest Connection Game
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce Shortest Connection Game, a two-player game played on a directed
graph with edge costs. Given two designated vertices in which they start, the
players take turns in choosing edges emanating from the vertex they are
currently located at. In this way, each of the players forms a path that
origins from its respective starting vertex. The game ends as soon as the two
paths meet, i.e., a connection between the players is established. Each player
has to carry the cost of its chosen edges and thus aims at minimizing its own
total cost.
In this work we analyze the computational complexity of Shortest Connection
Game. On the negative side, the game turns out to be computationally hard even
on restricted graph classes such as bipartite, acyclic and cactus graphs. On
the positive side, we can give a polynomial time algorithm for cactus graphs
when the game is restricted to simple paths.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 19:55:50 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Nov 2015 15:13:06 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Darmann",
"Andreas",
""
],
[
"Pferschy",
"Ulrich",
""
],
[
"Schauer",
"Joachim",
""
]
] |
new_dataset
| 0.999059 |
1511.07915
|
Richard Mayne Mr.
|
James G. H. Whiting, Richard Mayne, Nadine Moody, Ben de Lacy
Costello, Andrew Adamatzky
|
Practical circuits with Physarum Wires
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose: Protoplasmic tubes of Physarum polycephalum, also know as Physarum
Wires (PW), have been previously suggested as novel bio- electronic components.
Until recently, practical examples of electronic circuits using PWs have been
limited. These PWs have been shown to be self repairing, offering significant
advantage over traditional electronic components. This article documents work
performed to produce practical circuits using PWs. Method: We have demonstrated
through manufacture and testing of hybrid circuits that PWs can be used to
produce a variety of practical electronic circuits. A purality of different
applications of PWs have been tested to show the universality of PWs in
analogue and digital electronics. Results: Voltage dividers can be produced
using a pair of PWs in series with an output voltage accurate to within 12%.
PWs can also transmit analogue and digital data with a frequency of up to 19
kHz, which with the addition of a buffer, can drive high current circuits. We
have demonstrated that PWs can last approximately two months, a 4 fold increase
on previous literature. Protoplasmic tubes can be modified with the addition of
conductive or magnetic nano-particles to provide changes in functionality.
Conclusion This work has documented novel macro-scale data transmission through
biological material; it has advanced the field of bio-electronics by providing
a cheap and easy to grow conducting bio-material which may be used in future
hybrid electronic technology.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 23:19:18 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Whiting",
"James G. H.",
""
],
[
"Mayne",
"Richard",
""
],
[
"Moody",
"Nadine",
""
],
[
"Costello",
"Ben de Lacy",
""
],
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.99901 |
1511.07951
|
Vittal Premachandran
|
Vittal Premachandran, Boyan Bonev, Alan L. Yuille
|
PASCAL Boundaries: A Class-Agnostic Semantic Boundary Dataset
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the boundary detection task motivated by the
ambiguities in current definition of edge detection. To this end, we generate a
large database consisting of more than 10k images (which is 20x bigger than
existing edge detection databases) along with ground truth boundaries between
459 semantic classes including both foreground objects and different types of
background, and call it the PASCAL Boundaries dataset, which will be released
to the community. In addition, we propose a novel deep network-based
multi-scale semantic boundary detector and name it Multi-scale Deep Semantic
Boundary Detector (M-DSBD). We provide baselines using models that were trained
on edge detection and show that they transfer reasonably to the task of
boundary detection. Finally, we point to various important research problems
that this dataset can be used for.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2015 05:12:38 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Premachandran",
"Vittal",
""
],
[
"Bonev",
"Boyan",
""
],
[
"Yuille",
"Alan L.",
""
]
] |
new_dataset
| 0.999201 |
1511.07983
|
Teng Li
|
Teng Li, Vikram K. Narayana, Tarek El-Ghazawi
|
Reordering GPU Kernel Launches to Enable Efficient Concurrent Execution
|
2 Pages
| null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Contemporary GPUs allow concurrent execution of small computational kernels
in order to prevent idling of GPU resources. Despite the potential concurrency
between independent kernels, the order in which kernels are issued to the GPU
will significantly influence the application performance. A technique for
deriving suitable kernel launch orders is therefore presented, with the aim of
reducing the total execution time. Experimental results indicate that the
proposed method yields solutions that are well above the 90 percentile mark in
the design space of all possible permutations of the kernel launch sequences.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2015 08:01:18 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Li",
"Teng",
""
],
[
"Narayana",
"Vikram K.",
""
],
[
"El-Ghazawi",
"Tarek",
""
]
] |
new_dataset
| 0.950895 |
1511.07992
|
Lingfei Jin
|
Keqin Feng, Lingfei Jin, Chaoping Xing and Chen Yuan
|
Multipartite entangled states, symmetric matrices and error-correcting
codes
| null | null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A pure quantum state is called $k$-uniform if all its reductions to $k$-qudit
are maximally mixed. We investigate the general constructions of $k$-uniform
pure quantum states of $n$ subsystems with $d$ levels. We provide one
construction via symmetric matrices and the second one through classical
error-correcting codes. There are three main results arising from our
constructions. Firstly, we show that for any given even $n\ge 2$, there always
exists an $n/2$-uniform $n$-qudit quantum state of level $p$ for sufficiently
large prime $p$. Secondly, both constructions show that their exist $k$-uniform
$n$-qudit pure quantum states such that $k$ is proportional to $n$, i.e.,
$k=\Omega(n)$ although the construction from symmetric matrices outperforms the
one by error-correcting codes. Thirdly, our symmetric matrix construction
provides a positive answer to the open question in \cite{DA} on whether there
exists $3$-uniform $n$-qudit pure quantum state for all $n\ge 8$. In fact, we
can further prove that, for every $k$, there exists a constant $M_k$ such that
there exists a $k$-uniform $n$-qudit quantum state for all $n\ge M_k$. In
addition, by using concatenation of algebraic geometry codes, we give an
explicit construction of $k$-uniform quantum state when $k$ tends to infinity.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2015 08:32:48 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Feng",
"Keqin",
""
],
[
"Jin",
"Lingfei",
""
],
[
"Xing",
"Chaoping",
""
],
[
"Yuan",
"Chen",
""
]
] |
new_dataset
| 0.999813 |
1511.08166
|
Chandrayee Basu
|
Chandrayee Basu, Anthony Rowe
|
Tracking Motion and Proxemics using Thermal-sensor Array
|
6 pages, 6 figures, Machine Learning for Signal Processing Class
project
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Indoor tracking has all-pervasive applications beyond mere surveillance, for
example in education, health monitoring, marketing, energy management and so
on. Image and video based tracking systems are intrusive. Thermal array sensors
on the other hand can provide coarse-grained tracking while preserving privacy
of the subjects. The goal of the project is to facilitate motion detection and
group proxemics modeling using an 8 x 8 infrared sensor array. Each of the 8 x
8 pixels is a temperature reading in Fahrenheit. We refer to each 8 x 8 matrix
as a scene. We collected approximately 902 scenes with different configurations
of human groups and different walking directions. We infer direction of motion
of a subject across a set of scenes as left-to-right, right-to-left, up-to-down
and down-to-up using cross-correlation analysis. We used features from
connected component analysis of each background subtracted scene and performed
Support Vector Machine classification to estimate number of instances of human
subjects in the scene.
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2015 19:14:49 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Basu",
"Chandrayee",
""
],
[
"Rowe",
"Anthony",
""
]
] |
new_dataset
| 0.995646 |
1511.08177
|
Saurabh Gupta
|
Saurabh Gupta, Bharath Hariharan, Jitendra Malik
|
Exploring Person Context and Local Scene Context for Object Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we explore two ways of using context for object detection. The
first model focusses on people and the objects they commonly interact with,
such as fashion and sports accessories. The second model considers more general
object detection and uses the spatial relationships between objects and between
objects and scenes. Our models are able to capture precise spatial
relationships between the context and the object of interest, and make
effective use of the appearance of the contextual region. On the newly released
COCO dataset, our models provide relative improvements of up to 5% over
CNN-based state-of-the-art detectors, with the gains concentrated on hard cases
such as small objects (10% relative improvement).
|
[
{
"version": "v1",
"created": "Wed, 25 Nov 2015 19:45:03 GMT"
}
] | 2015-11-26T00:00:00 |
[
[
"Gupta",
"Saurabh",
""
],
[
"Hariharan",
"Bharath",
""
],
[
"Malik",
"Jitendra",
""
]
] |
new_dataset
| 0.997995 |
1505.07814
|
Xinyu Wu
|
Xinyu Wu, Vishal Saxena, Kehan Zhu, Sakkarapani Balagopal
|
A CMOS Spiking Neuron for Brain-Inspired Neural Networks with Resistive
Synapses and In-Situ Learning
| null |
IEEE Transactions on Circuits and Systems II: Express Briefs,
62(11), 1088-1092, 2015
|
10.1109/TCSII.2015.2456372
| null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nanoscale resistive memories are expected to fuel dense integration of
electronic synapses for large-scale neuromorphic system. To realize such a
brain-inspired computing chip, a compact CMOS spiking neuron that performs
in-situ learning and computing while driving a large number of resistive
synapses is desired. This work presents a novel leaky integrate-and-fire neuron
design which implements the dual-mode operation of current integration and
synaptic drive, with a single opamp and enables in-situ learning with crossbar
resistive synapses. The proposed design was implemented in a 0.18 $\mu$m CMOS
technology. Measurements show neuron's ability to drive a thousand resistive
synapses, and demonstrate an in-situ associative learning. The neuron circuit
occupies a small area of 0.01 mm$^2$ and has an energy-efficiency of 9.3
pJ$/$spike$/$synapse.
|
[
{
"version": "v1",
"created": "Thu, 28 May 2015 19:30:32 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2015 18:50:33 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Wu",
"Xinyu",
""
],
[
"Saxena",
"Vishal",
""
],
[
"Zhu",
"Kehan",
""
],
[
"Balagopal",
"Sakkarapani",
""
]
] |
new_dataset
| 0.998424 |
1511.03371
|
Jack Hessel
|
Jack Hessel, Alexandra Schofield, Lillian Lee, David Mimno
|
What do Vegans do in their Spare Time? Latent Interest Detection in
Multi-Community Networks
|
NIPS 2015 Network Workshop
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most social network analysis works at the level of interactions between
users. But the vast growth in size and complexity of social networks enables us
to examine interactions at larger scale. In this work we use a dataset of 76M
submissions to the social network Reddit, which is organized into distinct
sub-communities called subreddits. We measure the similarity between entire
subreddits both in terms of user similarity and topical similarity. Our goal is
to find community pairs with similar userbases, but dissimilar content; we
refer to this type of relationship as a "latent interest." Detection of latent
interests not only provides a perspective on individual users as they shift
between roles (student, sports fan, political activist) but also gives insight
into the dynamics of Reddit as a whole. Latent interest detection also has
potential applications for recommendation systems and for researchers examining
community evolution.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2015 03:07:00 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2015 05:11:11 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Hessel",
"Jack",
""
],
[
"Schofield",
"Alexandra",
""
],
[
"Lee",
"Lillian",
""
],
[
"Mimno",
"David",
""
]
] |
new_dataset
| 0.971293 |
1511.07536
|
Shayak Sen Shayak Sen
|
Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak
Sen
|
A Symbolic Logic with Concrete Bounds for Cryptographic Protocols
| null | null | null | null |
cs.LO cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a formal logic for quantitative reasoning about security
properties of network protocols. The system allows us to derive concrete
security bounds that can be used to choose key lengths and other security
parameters. We provide axioms for reasoning about digital signatures and random
nonces, with security properties based on the concrete security of signature
schemes and pseudorandom number generators (PRG). The formal logic supports
first-order reasoning and reasoning about protocol invariants, taking concrete
security bounds into account. Proofs constructed in our logic also provide
conventional asymptotic security guarantees because of the way that concrete
bounds accumulate in proofs. As an illustrative example, we use the formal
logic to prove an authentication property with concrete bounds of a
signature-based challenge-response protocol.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 01:52:04 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Datta",
"Anupam",
""
],
[
"Halpern",
"Joseph Y.",
""
],
[
"Mitchell",
"John C.",
""
],
[
"Roy",
"Arnab",
""
],
[
"Sen",
"Shayak",
""
]
] |
new_dataset
| 0.997969 |
1511.07542
|
Mingyue Ji
|
Mingyue Ji, Antonia Tulino, Jaime Llorca, Giuseppe Caire
|
Caching-Aided Coded Multicasting with Multiple Random Requests
|
5 pages, 1 figure, published in ITW 2015. arXiv admin note: text
overlap with arXiv:1402.4572
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The capacity of caching networks has received considerable attention in the
past few years. A particularly studied setting is the shared link caching
network, in which a single source with access to a file library communicates
with multiple users, each having the capability to store segments (packets) of
the library files, over a shared multicast link. Each user requests one file
from the library according to a common demand distribution and the server sends
a coded multicast message to satisfy all users at once. The problem consists of
finding the smallest possible average codeword length to satisfy such requests.
In this paper, we consider the generalization to the case where each user
places L >= 1 independent requests according to the same common demand
distribution. We propose an achievable scheme based on random vector
(packetized) caching placement and multiple groupcast index coding, shown to be
order-optimal in the asymptotic regime in which the number of packets per file
B goes to infinity. We then show that the scalar (B = 1) version of the
proposed scheme can still preserve order-optimality when the number of per-user
requests L is large enough. Our results provide the first order-optimal
characterization of the shared link caching network with multiple random
requests, revealing the key effects of L on the performance of caching-aided
coded multicast schemes.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 02:20:47 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Ji",
"Mingyue",
""
],
[
"Tulino",
"Antonia",
""
],
[
"Llorca",
"Jaime",
""
],
[
"Caire",
"Giuseppe",
""
]
] |
new_dataset
| 0.997212 |
1511.07714
|
Mark Riedl
|
Mark O. Riedl
|
A Python Engine for Teaching Artificial Intelligence in Games
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computer games play an important role in our society and motivate people to
learn computer science. Since artificial intelligence is integral to most
games, they can also be used to teach artificial intelligence. We introduce the
Game AI Game Engine (GAIGE), a Python game engine specifically designed to
teach about how AI is used in computer games. A progression of seven
assignments builds toward a complete, working Multi-User Battle Arena (MOBA)
game. We describe the engine, the assignments, and our experiences using it in
a class on Game Artificial Intelligence.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 14:13:33 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Riedl",
"Mark O.",
""
]
] |
new_dataset
| 0.953545 |
1511.07788
|
Krzysztof Wo{\l}k
|
Krzysztof Marasek, {\L}ukasz Brocki, Danijel Korzinek, Krzysztof
Wo{\l}k, Ryszard Gubrynowicz
|
Spoken Language Translation for Polish
|
Marasek K., Wo{\l}k K., Korzinek D., Brocki {\L}., Spoken Language
Translation for Polish, Proceedings of Forum Acuscticum 2014, Krak\'ow. arXiv
admin note: substantial text overlap with arXiv:1509.08909
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spoken language translation (SLT) is becoming more important in the
increasingly globalized world, both from a social and economic point of view.
It is one of the major challenges for automatic speech recognition (ASR) and
machine translation (MT), driving intense research activities in these areas.
While past research in SLT, due to technology limitations, dealt mostly with
speech recorded under controlled conditions, today's major challenge is the
translation of spoken language as it can be found in real life. Considered
application scenarios range from portable translators for tourists, lectures
and presentations translation, to broadcast news and shows with live
captioning. We would like to present PJIIT's experiences in the SLT gained from
the Eu-Bridge 7th framework project and the U-Star consortium activities for
the Polish/English language pair. Presented research concentrates on ASR
adaptation for Polish (state-of-the-art acoustic models: DBN-BLSTM training,
Kaldi: LDA+MLLT+SAT+MMI), language modeling for ASR & MT (text normalization,
RNN-based LMs, n-gram model domain interpolation) and statistical translation
techniques (hierarchical models, factored translation models, automatic casing
and punctuation, comparable and bilingual corpora preparation). While results
for the well-defined domains (phrases for travelers, parliament speeches,
medical documentation, movie subtitling) are very encouraging, less defined
domains (presentation, lectures) still form a challenge. Our progress in the
IWSLT TED task (MT only) will be presented, as well as current progress in the
Polish ASR.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 16:28:16 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Marasek",
"Krzysztof",
""
],
[
"Brocki",
"Łukasz",
""
],
[
"Korzinek",
"Danijel",
""
],
[
"Wołk",
"Krzysztof",
""
],
[
"Gubrynowicz",
"Ryszard",
""
]
] |
new_dataset
| 0.963142 |
1511.07792
|
Elena Dubrova
|
Elena Dubrova and Mats N\"aslund and Gunnar Carlsson and John Fornehed
and Ben Smeets
|
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero
Aliasing Probability of BIST
|
16 pages, 5 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The threat of hardware Trojans has been widely recognized by academia,
industry, and government agencies. A Trojan can compromise security of a system
in spite of cryptographic protection. The damage caused by a Trojan may not be
limited to a business or reputation, but could have a severe impact on public
safety, national economy, or national security. An extremely stealthy way of
implementing hardware Trojans has been presented by Becker et al. at CHES'2012.
Their work have shown that it is possible to inject a Trojan in a random number
generator compliant with FIPS 140-2 and NIST SP800-90 standards by exploiting
non-zero aliasing probability of Logic Built-In-Self-Test (LBIST). In this
paper, we present two methods for modifying LBIST to prevent such an attack.
The first method makes test patterns dependent on a configurable key which is
programed into a chip after the manufacturing stage. The second method uses a
remote test management system which can execute LBIST using a different set of
test patterns at each test cycle.
|
[
{
"version": "v1",
"created": "Tue, 24 Nov 2015 16:40:08 GMT"
}
] | 2015-11-25T00:00:00 |
[
[
"Dubrova",
"Elena",
""
],
[
"Näslund",
"Mats",
""
],
[
"Carlsson",
"Gunnar",
""
],
[
"Fornehed",
"John",
""
],
[
"Smeets",
"Ben",
""
]
] |
new_dataset
| 0.996071 |
1507.04110
|
Khalid Khan
|
Khalid Khan, D.K. Lobiyal and Adem Kilicman
|
A de Casteljau Algorithm for Bernstein type Polynomials based on
(p,q)-integers
|
16 pages, 7 figures, basis function revised. arXiv admin note:
substantial text overlap with arXiv:1505.01810
| null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a de Casteljau algorithm to compute (p,q)-Bernstein Bezier
curves based on (p,q)-integers is introduced. We study the nature of degree
elevation and degree reduction for (p,q)-Bezier Bernstein functions. The new
curves have some properties similar to q-Bezier curves. Moreover, we construct
the corresponding tensor product surfaces over the rectangular domain (u, v)
\in [0, 1] \times [0, 1] depending on four parameters. We also study the de
Casteljau algorithm and degree evaluation properties of the surfaces for these
generalization over the rectangular domain. Furthermore, some fundamental
properties for (p,q)-Bernstein Bezier curves are discussed. We get q-Bezier
curves and surfaces for (u, v) \in [0, 1] \times [0, 1] when we set the
parameter p1 = p2 = 1.
|
[
{
"version": "v1",
"created": "Wed, 15 Jul 2015 07:57:26 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Aug 2015 12:31:22 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Oct 2015 14:09:30 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Nov 2015 10:30:39 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Khan",
"Khalid",
""
],
[
"Lobiyal",
"D. K.",
""
],
[
"Kilicman",
"Adem",
""
]
] |
new_dataset
| 0.995183 |
1507.05138
|
Shaoshi Yang Dr.
|
Shaoshi Yang, Lajos Hanzo
|
Fifty Years of MIMO Detection: The Road to Large-Scale MIMOs
|
51 pages, 36 figures, 10 tables, 659 references, accepted to appear
on IEEE Communications Surveys & Tutorials, June 2015
|
IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp.
1941-1988, Fourth Quarter 2015
|
10.1109/COMST.2015.2475242
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The emerging massive/large-scale MIMO (LS-MIMO) systems relying on very large
antenna arrays have become a hot topic of wireless communications. Compared to
the LTE based 4G mobile communication system that allows for up to 8 antenna
elements at the base station (BS), the LS-MIMO system entails an unprecedented
number of antennas, say 100 or more, at the BS. The huge leap in the number of
BS antennas opens the door to a new research field in communication theory,
propagation and electronics, where random matrix theory begins to play a
dominant role.
In this paper, we provide a recital on the historic heritages and novel
challenges facing LS-MIMOs from a detection perspective. Firstly, we highlight
the fundamentals of MIMO detection, including the nature of co-channel
interference, the generality of the MIMO detection problem, the received signal
models of both linear memoryless MIMO channels and dispersive MIMO channels
exhibiting memory, as well as the complex-valued versus real-valued MIMO system
models. Then, an extensive review of the representative MIMO detection methods
conceived during the past 50 years (1965-2015) is presented, and relevant
insights as well as lessons are inferred for designing complexity-scalable MIMO
detection algorithms that are potentially applicable to LS-MIMO systems.
Furthermore, we divide the LS-MIMO systems into two types, and elaborate on the
distinct detection strategies suitable for each of them. The type-I LS-MIMO
corresponds to the case where the number of active users is much smaller than
the number of BS antennas, which is currently the mainstream definition of
LS-MIMO. The type-II LS-MIMO corresponds to the case where the number of active
users is comparable to the number of BS antennas. Finally, we discuss the
applicability of existing MIMO detection algorithms in LS-MIMO systems, and
review some of the recent advances in LS-MIMO detection.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2015 02:05:08 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Yang",
"Shaoshi",
""
],
[
"Hanzo",
"Lajos",
""
]
] |
new_dataset
| 0.999384 |
1509.00552
|
Bing Shuai
|
Bing Shuai, Zhen Zuo, Gang Wang, Bing Wang
|
DAG-Recurrent Neural Networks For Scene Labeling
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In image labeling, local representations for image units are usually
generated from their surrounding image patches, thus long-range contextual
information is not effectively encoded. In this paper, we introduce recurrent
neural networks (RNNs) to address this issue. Specifically, directed acyclic
graph RNNs (DAG-RNNs) are proposed to process DAG-structured images, which
enables the network to model long-range semantic dependencies among image
units. Our DAG-RNNs are capable of tremendously enhancing the discriminative
power of local representations, which significantly benefits the local
classification. Meanwhile, we propose a novel class weighting function that
attends to rare classes, which phenomenally boosts the recognition accuracy for
non-frequent classes. Integrating with convolution and deconvolution layers,
our DAG-RNNs achieve new state-of-the-art results on the challenging SiftFlow,
CamVid and Barcelona benchmarks.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2015 03:09:23 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2015 12:27:52 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Shuai",
"Bing",
""
],
[
"Zuo",
"Zhen",
""
],
[
"Wang",
"Gang",
""
],
[
"Wang",
"Bing",
""
]
] |
new_dataset
| 0.996208 |
1510.03081
|
Mathew Samimi
|
Mathew K. Samimi and Theodore S. Rappaport
|
Statistical Channel Model with Multi-Frequency and Arbitrary Antenna
Beamwidth for Millimeter-Wave Outdoor Communications
|
7 pages, 7 figures, accepted in 2015 IEEE Global Communications
Conference, Exhibition & Industry Forum (GLOBECOM) Workshop, Dec. 6-10, 2015
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a 3-dimensional millimeter-wave statistical channel
impulse response model from 28 GHz and 73 GHz ultrawideband propagation
measurements. An accurate 3GPP-like channel model that supports arbitrary
carrier frequency, RF bandwidth, and antenna beamwidth (for both
omnidirectional and arbitrary directional antennas), is provided. Time cluster
and spatial lobe model parameters are extracted from empirical distributions
from field measurements. A step-by-step modeling procedure for generating
channel coefficients is shown to agree with statistics from the field
measurements, thus confirming that the statistical channel model faithfully
recreates spatial and temporal channel impulse responses for use in
millimeter-wave 5G air interface designs.
|
[
{
"version": "v1",
"created": "Sun, 11 Oct 2015 17:31:45 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Oct 2015 21:48:06 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Nov 2015 02:28:08 GMT"
},
{
"version": "v4",
"created": "Sat, 21 Nov 2015 23:17:50 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Samimi",
"Mathew K.",
""
],
[
"Rappaport",
"Theodore S.",
""
]
] |
new_dataset
| 0.966288 |
1511.06759
|
Safeeullah Soomro
|
Tanesh Kumar, Faizan Khan, Safeeullah Soomro, Areez Khalil Memon
|
WLAN Specific IoT Enable Power Efficient RAM Design on 40nm FPGA
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Increasing the speed of computer is one of the important aspects of the
Random Access Memory (RAM) and for better and fast processing it should be
efficient. In this work, the main focus is to design energy efficient RAM and
it also can be accessed through internet. A 128-bit IPv6 address is added to
the RAM in order to control it via internet. Four different types of Low
Voltage CMOS (LCVMOS) IO standards are used to make it low power under five
different WLAN frequencies is taken. At WLAN frequency 2.4GHz, there is maximum
power reduction of 85% is achieved when LVCMOS12 is taken in place of LVCMOS25.
This design is implemented using Virtex-6 FPGA, Device xc6vlx75t and Package
FF484
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2015 18:44:37 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Kumar",
"Tanesh",
""
],
[
"Khan",
"Faizan",
""
],
[
"Soomro",
"Safeeullah",
""
],
[
"Memon",
"Areez Khalil",
""
]
] |
new_dataset
| 0.997803 |
1511.06825
|
Nguyen Quang-Hung
|
Nguyen Quang-Hung, Nam Thoai
|
EMinRET: Heuristic for Energy-Aware VM Placement with Fixed Intervals
and Non-preemption
|
8 pages, 4 figures, The International Conference on Advanced
Computing and Applications (ACOMP)
| null | null | null |
cs.NI cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Infrastructure-as-a-Service (IaaS) clouds have become more popular enabling
users to run applications under virtual machines. This paper investigates the
energy-aware virtual machine (VM) allocation problems in IaaS clouds along
characteristics: multiple resources, and fixed interval times and
non-preemption of virtual machines. Many previous works proposed to use a
minimum number of physical machines, however, this is not necessarily a good
solution to minimize total energy consumption in the VM placement with multiple
resources, fixed interval times and non-preemption. We observed that minimizing
total energy consumption of physical machines is equivalent to minimize the sum
of total completion time of all physical machines. Based on the observation, we
propose EMinRET algorithm. The EMinRET algorithm swaps an allocating VM with a
suitable overlapped VM, which is of the same VM type and is allocated on the
same physical machine, to minimize total completion time of all physical
machines. The EMinRET uses resource utilization during executing time period of
a physical machine as the evaluation metric, and will then choose a host that
minimizes the metric to allocate a new VM. In addition, this work studies some
heuristics for sorting the list of virtual machines (e.g., sorting by the
earliest starting time, or the longest duration time first, etc.) to allocate
VM. Using the realistic log-trace in the Parallel Workloads Archive, our
simulation results show that the EMinRET algorithm could reduce from 25% to 45%
energy consumption compared with power-aware best-fit decreasing (PABFD)) and
vector bin-packing norm-based greedy algorithms. Moreover, the EMinRET
heuristic has also less total energy consumption than our previous heuristics
(e.g. MinDFT and EPOBF) in the simulations (using same virtual machines sorting
method).
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2015 03:40:56 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Quang-Hung",
"Nguyen",
""
],
[
"Thoai",
"Nam",
""
]
] |
new_dataset
| 0.993861 |
1511.06968
|
Raghu Prabhakar
|
Raghu Prabhakar, David Koeplinger, Kevin Brown, HyoukJoong Lee,
Christopher De Sa, Christos Kozyrakis, Kunle Olukotun
|
Generating Configurable Hardware from Parallel Patterns
| null | null | null | null |
cs.DC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years the computing landscape has seen an in- creasing shift
towards specialized accelerators. Field pro- grammable gate arrays (FPGAs) are
particularly promising as they offer significant performance and energy
improvements compared to CPUs for a wide class of applications and are far more
flexible than fixed-function ASICs. However, FPGAs are difficult to program.
Traditional programming models for reconfigurable logic use low-level hardware
description languages like Verilog and VHDL, which have none of the pro-
ductivity features of modern software development languages but produce very
efficient designs, and low-level software lan- guages like C and OpenCL coupled
with high-level synthesis (HLS) tools that typically produce designs that are
far less efficient. Functional languages with parallel patterns are a better
fit for hardware generation because they both provide high-level abstractions
to programmers with little experience in hard- ware design and avoid many of
the problems faced when gen- erating hardware from imperative languages. In
this paper, we identify two optimizations that are important when using par-
allel patterns to generate hardware: tiling and metapipelining. We present a
general representation of tiled parallel patterns, and provide rules for
automatically tiling patterns and gen- erating metapipelines. We demonstrate
experimentally that these optimizations result in speedups up to 40x on a set
of benchmarks from the data analytics domain.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2015 05:57:27 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Prabhakar",
"Raghu",
""
],
[
"Koeplinger",
"David",
""
],
[
"Brown",
"Kevin",
""
],
[
"Lee",
"HyoukJoong",
""
],
[
"De Sa",
"Christopher",
""
],
[
"Kozyrakis",
"Christos",
""
],
[
"Olukotun",
"Kunle",
""
]
] |
new_dataset
| 0.99371 |
1511.07008
|
Mikhail Malt M.
|
Mikhail Malt, Marta Gentilucci
|
Real Time Vowel Tremolo Detection Using Low Level Audio Descriptors
|
6 pages, 6 figures, 2 tables, lab report
| null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper resumes the results of a research conducted in a music production
situation Therefore, it is more a final lab report, a prospective methodology
then a scientific experience. The methodology we are presenting was developed
as an answer to a musical problem raised by the Italian composer Marta
Gentilucci. The problem was "how to extract a temporal structure from a vowel
tremolo, on a tenuto (steady state) pitch." The musical goal was to apply, in a
compositional context the vowel tremolo time structure on a tenuto pitch chord,
as a transposition control.In this context we decide to follow, to explore the
potential of low-level MPEG7 audio descriptors to build event detection
functions. One of the main problems using low-level audio descriptors in audio
analysis is the redundancy of information among them. We describe an "ad hoc"
interactive methodology, based on side effect use of dimensionality reduction
by PCA, to choose a feature from a set of low-level audio descriptors, to be
used to detect a vowel tremolo rhythm. This methodology is supposed to be
interactive and easy enough to be used in a live creative context.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2015 13:05:05 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Malt",
"Mikhail",
""
],
[
"Gentilucci",
"Marta",
""
]
] |
new_dataset
| 0.999055 |
1511.07093
|
Nalin Asanka Gamagedara Arachchilage
|
Nalin Asanka Gamagedara Arachchilage, Ali Tarhini, Steve Love
|
Designing a mobile game to thwarts malicious IT threats: A phishing
threat avoidance perspective
|
9, International Journal for Infonomics (IJI), Volume 8 Issues 3/4,
September/December 2015. arXiv admin note: text overlap with arXiv:1511.01622
| null | null | null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Phishing is an online identity theft, which aims to steal sensitive
information such as username, password and online banking details from victims.
To prevent this, phishing education needs to be considered. Game based
education is becoming more and more popular. This paper introduces a mobile
game prototype for the android platform based on a story, which simplifies and
exaggerates real life. The elements of a game design framework for avoiding
phishing attacks were used to address the game design issues and game design
principles were used as a set of guidelines for structuring and presenting
information. The overall mobile game design was aimed to enhance the user's
avoidance behaviour through motivation to protect themselves against phishing
threats. The prototype mobile game design was presented on MIT App Inventor
Emulator.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 01:32:59 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Arachchilage",
"Nalin Asanka Gamagedara",
""
],
[
"Tarhini",
"Ali",
""
],
[
"Love",
"Steve",
""
]
] |
new_dataset
| 0.963415 |
1511.07353
|
Ahmed Bin Shafaat Ahmed Bin Shafaat
|
Kamran Shaukat, Nayyer Masood, Ahmed Bin Shafaat, Kamran Jabbar,
Hassan Shabbir and Shakir Shabbir
|
Dengue Fever in Perspective of Clustering Algorithms
| null | null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
Dengue fever is a disease which is transmitted and caused by Aedes Aegypti
mosquitos. Dengue has become a serious health issue in all over the world
especially in those countries who are situated in tropical or subtropical
regions because rain is an important factor for growth and increase in the
population of dengue transmitting mosquitos. For a long time, data mining
algorithms have been used by the scientists for the diagnosis and prognosis of
different diseases which includes dengue as well. This was a study to analyses
the attack of dengue fever in different areas of district Jhelum, Pakistan in
2011. As per our knowledge, we are unaware of any kind of research study in the
area of district Jhelum for diagnosis or analysis of dengue fever. According to
our information, we are the first one researching and analyzing dengue fever in
this specific area. Dataset was obtained from the office of Executive District
Officer EDO (health) District Jhelum. We applied DBSCAN algorithm for the
clustering of dengue fever. First we showed overall behavior of dengue in the
district Jhelum. Then we explained dengue fever at tehsil level with the help
of geographical pictures. After that we have elaborated comparison of different
clustering algorithms with the help of graphs based on our dataset. Those
algorithms include k-means, K-mediods, DBSCAN and OPTICS.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 18:27:21 GMT"
}
] | 2015-11-24T00:00:00 |
[
[
"Shaukat",
"Kamran",
""
],
[
"Masood",
"Nayyer",
""
],
[
"Shafaat",
"Ahmed Bin",
""
],
[
"Jabbar",
"Kamran",
""
],
[
"Shabbir",
"Hassan",
""
],
[
"Shabbir",
"Shakir",
""
]
] |
new_dataset
| 0.993476 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.