id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1510.07864
Thomas Marcel Ender
Thomas Marcel Ender, Patrick Vananti
Dignit\'e - DIGital Network Information & Traces Extraction
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web-based criminality like counterfeiting uses web applications which are hosted on web servers. Those servers contain a lot of information which can be used to identify the owner and other connected persons like hosters, shipping partners, money mules and more. These pieces of information reveal insights on the owner or provider of a fraud website, thus we can call them traces. These traces can then be used by the police, law enforcement authorities or the legal representatives of the victim. In our project 2 we had identified a vast range of possible traces. We had also considered their information content and existing limitations. During our Bachelor thesis, we have selected several traces and started the implementation of the API with its underlying library. After the successful implementation of the selected traces, we have created a graphical user interface to allow the use of our solution without using a command-line interface. To do so, we have learned to use the Scala Programming Language and its integration with Java code. The graphical user interface of our example application is built using Scala Swing, the Scala adoption of the Swing Framework. The test cases are defined using ScalaTest with FlatSpec and Matchers and executed using the JUnit Runner.
[ { "version": "v1", "created": "Tue, 27 Oct 2015 11:15:48 GMT" } ]
2015-10-28T00:00:00
[ [ "Ender", "Thomas Marcel", "" ], [ "Vananti", "Patrick", "" ] ]
new_dataset
0.999256
1503.06264
Tao Zhao
Tao Zhao, Liumeng Wang, Xi Zheng, Sheng Zhou, Zhisheng Niu
HyCell: Enabling GREEN Base Station Operations in Software-Defined Radio Access Networks
6 pages, 4 figures, accepted by IEEE ICC 2015 Workshop on Next Generation Green ICT
null
10.1109/ICCW.2015.7247614
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The radio access networks (RANs) need to support massive and diverse data traffic with limited spectrum and energy. To cope with this challenge, software-defined radio access network (SDRAN) architectures have been proposed to renovate the RANs. However, current researches lack the design and evaluation of network protocols. In this paper, we address this problem by presenting the protocol design and evaluation of hyper-cellular networks (HyCell), an SDRAN framework making base station (BS) operations globally resource-optimized and energy-efficient (GREEN). Specifically, we first propose a separation scheme to realize the decoupled air interface in HyCell. Then we design a BS dispatching protocol which determines and assigns the optimal BS for serving mobile users, and a BS sleeping protocol to improve the network energy efficiency. Finally, we evaluate the proposed design in our HyCell testbed. Our evaluation validates the feasibility of the proposed separation scheme, demonstrates the effectiveness of BS dispatching, and shows great potential in energy saving through BS sleeping control.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 05:09:39 GMT" } ]
2015-10-27T00:00:00
[ [ "Zhao", "Tao", "" ], [ "Wang", "Liumeng", "" ], [ "Zheng", "Xi", "" ], [ "Zhou", "Sheng", "" ], [ "Niu", "Zhisheng", "" ] ]
new_dataset
0.996937
1510.07247
Samuel Bucheli
Samuel Bucheli
Some Notes on Temporal Justification Logic
null
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Justification logics are modal-like logics with the additional capability of recording the reason, or justification, for modalities in syntactic structures, called justification terms. Justification logics can be seen as explicit counterparts to modal logic. The behavior and interaction of agents in distributed system is often modeled using logics of knowledge and time. In this paper, we sketch some preliminary ideas on how the modal knowledge part of such logics of knowledge and time could be replaced with an appropriate justification logic.
[ { "version": "v1", "created": "Sun, 25 Oct 2015 13:52:36 GMT" } ]
2015-10-27T00:00:00
[ [ "Bucheli", "Samuel", "" ] ]
new_dataset
0.994038
1510.07510
Chenrong Xiong
Chenrong Xiong, Jun Lin, and Zhiyuan Yan
A multi-mode area-efficient SCL polar decoder
13 pages, 9 figures, submitted to TVLSI
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are of great interest since they are the first provably capacity-achieving forward error correction codes. To improve throughput and to reduce decoding latency of polar decoders, maximum likelihood (ML) decoding units are used by successive cancellation list (SCL) decoders as well as successive cancellation (SC) decoders. This paper proposes an approximate ML (AML) decoding unit for SCL decoders first. In particular, we investigate the distribution of frozen bits of polar codes designed for both the binary erasure and additive white Gaussian noise channels, and take advantage of the distribution to reduce the complexity of the AML decoding unit, improving the area efficiency of SCL decoders. Furthermore, a multi-mode SCL decoder with variable list sizes and parallelism is proposed. If high throughput or small latency is required, the decoder decodes multiple received codewords in parallel with a small list size. However, if error performance is of higher priority, the multi-mode decoder switches to a serial mode with a bigger list size. Therefore, the multi-mode SCL decoder provides a flexible tradeoff between latency, throughput and error performance, and adapts to different throughput and latency requirements at the expense of small overhead. Hardware implementation and synthesis results show that our polar decoders not only have a better area efficiency but also easily adapt to different communication channels and applications.
[ { "version": "v1", "created": "Mon, 26 Oct 2015 15:22:19 GMT" } ]
2015-10-27T00:00:00
[ [ "Xiong", "Chenrong", "" ], [ "Lin", "Jun", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.992464
1510.07595
Steven Lessard
Steven Lessard, Jonathan Bruce, Erik Jung, Mircea Teodorescu, Vytas SunSpiral, and Adrian Agogino
A light-weight, multi-axis compliant tensegrity joint
Initial submission
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a light-weight, multi- axis compliant tenegrity joint that is biologically inspired by the human elbow. This tensegrity elbow actuates by shortening and lengthening cable in a method inspired by muscular actuation in a person. Unlike many series elastic actuators, this joint is structurally compliant not just along each axis of rotation, but along other axes as well. Compliant robotic joints are indispensable in unpredictable environments, including ones where the robot must interface with a person. The joint also addresses the need for functional redundancy and flexibility, traits which are required for many applications that investigate the use of biologically accurate robotic models.
[ { "version": "v1", "created": "Mon, 26 Oct 2015 18:57:10 GMT" } ]
2015-10-27T00:00:00
[ [ "Lessard", "Steven", "" ], [ "Bruce", "Jonathan", "" ], [ "Jung", "Erik", "" ], [ "Teodorescu", "Mircea", "" ], [ "SunSpiral", "Vytas", "" ], [ "Agogino", "Adrian", "" ] ]
new_dataset
0.997653
1510.06535
Uri Zwick
Thomas Dueholm Hansen, Haim Kaplan, Robert E. Tarjan, Uri Zwick
Hollow Heaps
27 pages, 7 figures, preliminary version appeared in ICALP 2015
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the hollow heap, a very simple data structure with the same amortized efficiency as the classical Fibonacci heap. All heap operations except delete and delete-min take $O(1)$ time, worst case as well as amortized; delete and delete-min take $O(\log n)$ amortized time on a heap of $n$ items. Hollow heaps are by far the simplest structure to achieve this. Hollow heaps combine two novel ideas: the use of lazy deletion and re-insertion to do decrease-key operations, and the use of a dag (directed acyclic graph) instead of a tree or set of trees to represent a heap. Lazy deletion produces hollow nodes (nodes without items), giving the data structure its name.
[ { "version": "v1", "created": "Thu, 22 Oct 2015 09:09:11 GMT" } ]
2015-10-23T00:00:00
[ [ "Hansen", "Thomas Dueholm", "" ], [ "Kaplan", "Haim", "" ], [ "Tarjan", "Robert E.", "" ], [ "Zwick", "Uri", "" ] ]
new_dataset
0.954249
1510.06541
Yueling Che
Yueling Che, Jie Xu, Lingjie Duan, and Rui Zhang
Multi-antenna Wireless Powered Communication with Co-channel Energy and Information Transfer
IEEE Communications Letters. Accepted. 9 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter studies a multi-antenna wireless powered communication (WPC) system with co-channel energy and information transfer, where a wireless device (WD), powered up by wireless energy transfer (WET) from an energy transmitter (ET), communicates to an information receiver (IR) over the same frequency band. We maximize the achievable data rate from the WD to the IR by jointly optimizing the energy beamforming at the ET and the information beamforming at the WD, subject to their individual transmit power constraints. We obtain the optimal solution to this problem in closed-form, where the optimal energy beamforming at the ET achieves a best energy/interference tradeoff between maximizing the energy transfer efficiency to the WD and minimizing the co-channel interference to the IR. Numerical results show that our proposed optimal co-channel design is superior to other reference schemes.
[ { "version": "v1", "created": "Thu, 22 Oct 2015 09:20:46 GMT" } ]
2015-10-23T00:00:00
[ [ "Che", "Yueling", "" ], [ "Xu", "Jie", "" ], [ "Duan", "Lingjie", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.992186
1510.06074
Pedro Otao Pereira
Pedro O.Pereira and Dimos V. Dimarogonas
Bounded Control for Double Integrator in Quadrotor Dynamics
Companion article submitted to ECC 2016
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a trajectory tracking controller for a quadrotor system by finding a coordinate change which transforms the quadrotor's vector field into that of a thrust propelled system. In a thrust propelled system, the goal is to stabilize its position around the origin, while the system is actuated by a one dimensional acceleration/thrust along a direction vector, by a time-varying gravity, and by the angular acceleration of the direction vector. For this system, a solution has been proposed in a companion article, submitted to ECC 2016, based on the implicit knowledge of a bounded controller for a double integrator system, and on the implicit knowledge of a Lyapunov function that guarantees the origin is asymptotically stable for the double integrator controlled by the bounded controller. We present two alternative bounded controllers for a double integrator system, and corresponding Lyapunov functions.
[ { "version": "v1", "created": "Tue, 20 Oct 2015 22:02:47 GMT" } ]
2015-10-22T00:00:00
[ [ "Pereira", "Pedro O.", "" ], [ "Dimarogonas", "Dimos V.", "" ] ]
new_dataset
0.987133
1510.06359
Tadilo E Bogale
Tadilo Endeshaw Bogale and Long Bao Le
Massive MIMO and Millimeter Wave for 5G Wireless HetNet: Potentials and Challenges
IEEE Vehicular Technology Magazine (To appear)
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There have been active research activities worldwide in developing the next-generation 5G wireless network. The 5G network is expected to support significantly large amount of mobile data traffic and huge number of wireless connections, achieve better cost- and energy-efficiency as well as quality of service (QoS) in terms of communication delay, reliability and security. To this end, the 5G wireless network should exploit potential gains in different network dimensions including super dense and heterogeneous deployment of cells and massive antenna arrays (i.e., massive multiple input multiple output (MIMO) technologies) and utilization of higher frequencies, in particular millimeter wave (mmWave) frequencies. This article discusses potentials and challenges of the 5G heterogeneous wireless network (HetNet) which incorporates massive MIMO and mmWave technologies. We will first provide the typical requirements of the 5G wireless network. Then, the significance of massive MIMO and mmWave in engineering the future 5G HetNet is discussed in detail. Potential challenges associated with the design of such 5G HetNet are discussed. Finally, we provide some case studies, which illustrate the potential benefits of the considered technologies.
[ { "version": "v1", "created": "Wed, 21 Oct 2015 18:34:40 GMT" } ]
2015-10-22T00:00:00
[ [ "Bogale", "Tadilo Endeshaw", "" ], [ "Le", "Long Bao", "" ] ]
new_dataset
0.994267
1405.7178
Katsutoshi Yoshida
Katsutoshi Yoshida, Shigeki Matsumoto and Yoichi Matsue
Artificial Wrestling: A Dynamical Formulation of Autonomous Agents Fighting in a Coupled Inverted Pendula Framework
The 12th International Conference on Motion and Vibration Control (MOVIC 2014), August 3-7, 2014, Sapporo, Japan. This article was selected as an article of Mechanical Engineering Journal after minor revisions; the final version is available at http://dx.doi.org/10.1299/mej.14-00518
null
null
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop autonomous agents fighting with each other, inspired by human wrestling. For this purpose, we propose a coupled inverted pendula (CIP) framework in which: 1) tips of two inverted pendulums are linked by a connection rod, 2) each pendulum is primarily stabilized by a PD-controller, 3) and is additionally equipped with an intelligent controller. Based on this framework, we dynamically formulate an intelligent controller designed to store dynamical correspondence from initial states to final states of the CIP model, to receive state vectors of the model, and to output impulsive control forces to produce desired final states of the model. Developing a quantized and reduced order design of this controller, we have a practical control procedure based on an off-line learning method. We then conduct numerical simulations to investigate individual performance of the intelligent controller, showing that the performance can be improved by adding a delay element into the intelligent controller. The result shows that the performance depends not only on quantization resolutions of learning data but also on delay time of the delay element. Finally, we install the intelligent controllers into both pendulums in the proposed framework to demonstrate autonomous competitive behavior between inverted pendulums.
[ { "version": "v1", "created": "Wed, 28 May 2014 10:06:17 GMT" }, { "version": "v2", "created": "Sun, 1 Jun 2014 23:53:00 GMT" }, { "version": "v3", "created": "Tue, 20 Oct 2015 03:41:35 GMT" } ]
2015-10-21T00:00:00
[ [ "Yoshida", "Katsutoshi", "" ], [ "Matsumoto", "Shigeki", "" ], [ "Matsue", "Yoichi", "" ] ]
new_dataset
0.996957
1510.05700
Fl\'avio Souza
Fl\'avio Souza and Diego de Las Casas and Vin\'icius Flores and SunBum Youn and Meeyoung Cha and Daniele Quercia and Virg\'ilio Almeida
Dawn of the Selfie Era: The Whos, Wheres, and Hows of Selfies on Instagram
ACM Conference on Online Social Networks 2015, Stanford University, California, USA
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online interactions are increasingly involving images, especially those containing human faces, which are naturally attention grabbing and more effective at conveying feelings than text. To understand this new convention of digital culture, we study the collective behavior of sharing selfies on Instagram and present how people appear in selfies and which patterns emerge from such interactions. Analysis of millions of photos shows that the amount of selfies has increased by 900 times from 2012 to 2014. Selfies are an effective medium to grab attention; they generate on average 1.1--3.2 times more likes and comments than other types of content on Instagram. Compared to other content, interactions involving selfies exhibit variations in homophily scores (in terms of age and gender) that suggest they are becoming more widespread. Their style also varies by cultural boundaries in that the average age and majority gender seen in selfies differ from one country to another. We provide explanations of such country-wise variations based on cultural and socioeconomic contexts.
[ { "version": "v1", "created": "Mon, 19 Oct 2015 21:47:16 GMT" } ]
2015-10-21T00:00:00
[ [ "Souza", "Flávio", "" ], [ "Casas", "Diego de Las", "" ], [ "Flores", "Vinícius", "" ], [ "Youn", "SunBum", "" ], [ "Cha", "Meeyoung", "" ], [ "Quercia", "Daniele", "" ], [ "Almeida", "Virgílio", "" ] ]
new_dataset
0.998175
1510.05705
Ella Gale
Ella Gale
Single Memristor Logic Gates: From NOT to a Full Adder
null
null
null
null
cs.ET cond-mat.mes-hall cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Memristors have been suggested as a novel route to neuromorphic computing based on the similarity between them and neurons (specifically synapses and ion pumps). The d.c. action of the memristor is a current spike which imparts a short-term memory to the device. Here it is demonstrated that this short-term memory works exactly like habituation (e.g. in \emph{Aplysia}). We elucidate the physical rules, based on energy conservation, governing the interaction of these current spikes: summation, `bounce-back', directionality and `diminishing returns'. Using these rules, we introduce 4 different logical systems to implement sequential logic in the memristor and demonstrate how sequential logic works by instantiating a NOT gate, an AND gate, an XOR gate and a Full Adder with a single memristor. The Full Adder makes use of the memristor's short-term memory to add together three binary values and outputs the sum, the carry digit and even the order they were input in. A memristor full adder also outputs the arithmetical sum of bits, allowing for a logically (but not physically) reversible system. Essentially, we can replace an input/output port with an extra time-step, allowing a single memristor to do a hither-to unexpectedly large amount of computation. This makes up for the memristor's slow operation speed and may relate to how neurons do a similarly-large computation with such slow operations speeds. We propose that using spiking logic, either in gates or as neuron-analogues, with plastic rewritable connections between them, would allow the building of a neuromorphic computer.
[ { "version": "v1", "created": "Mon, 19 Oct 2015 22:20:42 GMT" } ]
2015-10-21T00:00:00
[ [ "Gale", "Ella", "" ] ]
new_dataset
0.990188
1510.05828
Prateek Dewan
Prateek Dewan and Ponnurangam Kumaraguru
Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages
11 pages, 9 figures, 6 tables
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Facebook is the world's largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine domain reputations of URLs published by pages, and identified 627 pages publishing untrustworthy information, misleading content, adult and child unsafe content, scams, etc. which are deemed as "Page Spam" by Facebook, and do not comply with Facebook's community standards. Our findings revealed dominant presence of politically polarized entities engaging in spreading content from untrustworthy web domains. Anger and religion were the most prominent topics in the textual content published by these pages. We found that at least 8% of all malicious pages were dedicated to promote a single malicious domain. Studying the temporal posting activity of pages revealed that malicious pages were more active than benign pages. We further identified collusive behavior within a set of malicious pages spreading adult and pornographic content. We believe our findings will enable technologists to devise efficient automated solutions to identify and curb the spread of malicious content through such pages. To the best of our knowledge, this is the first attempt in literature, focused exclusively on characterizing malicious Facebook pages.
[ { "version": "v1", "created": "Tue, 20 Oct 2015 10:42:48 GMT" } ]
2015-10-21T00:00:00
[ [ "Dewan", "Prateek", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
new_dataset
0.998268
1510.05891
Muhammad Jawaherul Alam
Md. Jawaherul Alam, Franz J. Brandenburg and Stephen G. Kobourov
On the Book Thickness of 1-Planar Graphs
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a book embedding of a graph G, the vertices of G are placed in order along a straight-line called spine of the book, and the edges of G are drawn on a set of half-planes, called the pages of the book, such that two edges drawn on a page do not cross each other. The minimum number of pages in which a graph can be embedded is called the book-thickness or the page-number of the graph. It is known that every planar graph has a book embedding on at most four pages. Here we investigate the book-embeddings of 1-planar graphs. A graph is 1-planar if it can be drawn in the plane such that each edge is crossed at most once. We prove that every 1-planar graph has a book embedding on at most 16 pages and every 3-connected 1-planar graph has a book embedding on at most 12 pages. The drawings can be computed in linear time from any given 1-planar embedding of the graph.
[ { "version": "v1", "created": "Tue, 20 Oct 2015 13:40:33 GMT" } ]
2015-10-21T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Brandenburg", "Franz J.", "" ], [ "Kobourov", "Stephen G.", "" ] ]
new_dataset
0.991739
1510.05938
Antonis Gotsis
Antonis G. Gotsis, Stelios Stefanatos, Angeliki Alexiou
Ultra Dense Networks: The New Wireless Frontier for Enabling 5G Access
to appear in IEEE Vehicular Technology Magazine
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The extreme traffic load that future wireless networks are expected to accommodate requires a re-thinking of the system design. Initial estimations indicate that, different from the evolutionary path of previous cellular generations that was based on spectral efficiency improvements, the most substantial amount of future system performance gains will be obtained by means of network infrastructure densification. By increasing the density of operator-deployed infrastructure elements, along with incorporation of user-deployed access nodes and mobile user devices acting as "infrastructure prosumers", it is expected that having one or more access nodes exclusively dedicated to each user will become feasible, introducing the ultra dense network (UDN) paradigm. Although it is clear that UDNs are able to take advantage of the significant benefits provided by proximal transmissions and increased spatial reuse of system resources, at the same time, large node density and irregular deployment introduce new challenges, mainly due to the interference environment characteristics that are vastly different from previous cellular deployments. This article attempts to provide insights on fundamental issues related to UDN deployment, such as determining the infrastructure density required to support given traffic load requirements and the benefits of network-wise coordination, demonstrating the potential of UDNs for 5G wireless networks.
[ { "version": "v1", "created": "Tue, 20 Oct 2015 15:50:39 GMT" } ]
2015-10-21T00:00:00
[ [ "Gotsis", "Antonis G.", "" ], [ "Stefanatos", "Stelios", "" ], [ "Alexiou", "Angeliki", "" ] ]
new_dataset
0.972644
1410.4688
Ibrahim Abdelaziz
Ibrahim Abdelaziz and Sherif Abdou and Hassanin Al-Barhamtoshy
Large Vocabulary Arabic Online Handwriting Recognition System
Preprint submitted to Pattern Analysis and Applications Journal
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arabic handwriting is a consonantal and cursive writing. The analysis of Arabic script is further complicated due to obligatory dots/strokes that are placed above or below most letters and usually written delayed in order. Due to ambiguities and diversities of writing styles, recognition systems are generally based on a set of possible words called lexicon. When the lexicon is small, recognition accuracy is more important as the recognition time is minimal. On the other hand, recognition speed as well as the accuracy are both critical when handling large lexicons. Arabic is rich in morphology and syntax which makes its lexicon large. Therefore, a practical online handwriting recognition system should be able to handle a large lexicon with reasonable performance in terms of both accuracy and time. In this paper, we introduce a fully-fledged Hidden Markov Model (HMM) based system for Arabic online handwriting recognition that provides solutions for most of the difficulties inherent in recognizing the Arabic script. A new preprocessing technique for handling the delayed strokes is introduced. We use advanced modeling techniques for building our recognition system from the training data to provide more detailed representation for the differences between the writing units, minimize the variances between writers in the training data and have a better representation for the features space. System results are enhanced using an additional post-processing step with a higher order language model and cross-word HMM models. The system performance is evaluated using two different databases covering small and large lexicons. Our system outperforms the state-of-art systems for the small lexicon database. Furthermore, it shows promising results (accuracy and time) when supporting large lexicon with the possibility for adapting the models for specific writers to get even better results.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 11:09:35 GMT" }, { "version": "v2", "created": "Sat, 8 Nov 2014 14:31:48 GMT" }, { "version": "v3", "created": "Sat, 17 Oct 2015 09:47:28 GMT" } ]
2015-10-20T00:00:00
[ [ "Abdelaziz", "Ibrahim", "" ], [ "Abdou", "Sherif", "" ], [ "Al-Barhamtoshy", "Hassanin", "" ] ]
new_dataset
0.999625
1505.00487
Subhashini Venugopalan
Subhashini Venugopalan, Marcus Rohrbach, Jeff Donahue, Raymond Mooney, Trevor Darrell, Kate Saenko
Sequence to Sequence -- Video to Text
ICCV 2015 camera-ready. Includes code, project page and LSMDC challenge results
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-world videos often have complex dynamics; and methods for generating open-domain video descriptions should be sensitive to temporal structure and allow both input (sequence of frames) and output (sequence of words) of variable length. To approach this problem, we propose a novel end-to-end sequence-to-sequence model to generate captions for videos. For this we exploit recurrent neural networks, specifically LSTMs, which have demonstrated state-of-the-art performance in image caption generation. Our LSTM model is trained on video-sentence pairs and learns to associate a sequence of video frames to a sequence of words in order to generate a description of the event in the video clip. Our model naturally is able to learn the temporal structure of the sequence of frames as well as the sequence model of the generated sentences, i.e. a language model. We evaluate several variants of our model that exploit different visual features on a standard set of YouTube videos and two movie description datasets (M-VAD and MPII-MD).
[ { "version": "v1", "created": "Sun, 3 May 2015 22:32:00 GMT" }, { "version": "v2", "created": "Tue, 12 May 2015 16:08:57 GMT" }, { "version": "v3", "created": "Mon, 19 Oct 2015 18:01:06 GMT" } ]
2015-10-20T00:00:00
[ [ "Venugopalan", "Subhashini", "" ], [ "Rohrbach", "Marcus", "" ], [ "Donahue", "Jeff", "" ], [ "Mooney", "Raymond", "" ], [ "Darrell", "Trevor", "" ], [ "Saenko", "Kate", "" ] ]
new_dataset
0.96183
1505.06605
Ravi Kiran Sarvadevabhatla
Ravi Kiran Sarvadevabhatla, R. Venkatesh Babu
Expresso : A user-friendly GUI for Designing, Training and Exploring Convolutional Neural Networks
Project page : http://val.serc.iisc.ernet.in/expresso/
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With a view to provide a user-friendly interface for designing, training and developing deep learning frameworks, we have developed Expresso, a GUI tool written in Python. Expresso is built atop Caffe, the open-source, prize-winning framework popularly used to develop Convolutional Neural Networks. Expresso provides a convenient wizard-like graphical interface which guides the user through various common scenarios -- data import, construction and training of deep networks, performing various experiments, analyzing and visualizing the results of these experiments. The multi-threaded nature of Expresso enables concurrent execution and notification of events related to the aforementioned scenarios. The GUI sub-components and inter-component interfaces in Expresso have been designed with extensibility in mind. We believe Expresso's flexibility and ease of use will come in handy to researchers, newcomers and seasoned alike, in their explorations related to deep learning.
[ { "version": "v1", "created": "Mon, 25 May 2015 12:12:30 GMT" }, { "version": "v2", "created": "Sun, 18 Oct 2015 07:06:35 GMT" } ]
2015-10-20T00:00:00
[ [ "Sarvadevabhatla", "Ravi Kiran", "" ], [ "Babu", "R. Venkatesh", "" ] ]
new_dataset
0.982893
1506.06830
Zhengchun Zhou
Zhengchun Zhou and Nian Li and Cuiling Fan and Tor Helleseth
Linear Codes with Two or Three Weights From Quadratic Bent Functions
arXiv admin note: text overlap with arXiv:1503.06512 by other authors
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes with few weights have applications in secrete sharing, authentication codes, association schemes, and strongly regular graphs. In this paper, several classes of $p$-ary linear codes with two or three weights are constructed from quadratic Bent functions over the finite field $\gf_p$, where $p$ is an odd prime. They include some earlier linear codes as special cases. The weight distributions of these linear codes are also determined.
[ { "version": "v1", "created": "Tue, 23 Jun 2015 00:17:57 GMT" }, { "version": "v2", "created": "Fri, 16 Oct 2015 23:26:37 GMT" } ]
2015-10-20T00:00:00
[ [ "Zhou", "Zhengchun", "" ], [ "Li", "Nian", "" ], [ "Fan", "Cuiling", "" ], [ "Helleseth", "Tor", "" ] ]
new_dataset
0.999642
1507.07629
Garrick Orchard
Garrick Orchard and Ajinkya Jayawant and Gregory Cohen and Nitish Thakor
Converting Static Image Datasets to Spiking Neuromorphic Datasets Using Saccades
10 pages, 6 figures in Frontiers in Neuromorphic Engineering, special topic on Benchmarks and Challenges for Neuromorphic Engineering, 2015 (under review)
null
null
null
cs.DB q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Creating datasets for Neuromorphic Vision is a challenging task. A lack of available recordings from Neuromorphic Vision sensors means that data must typically be recorded specifically for dataset creation rather than collecting and labelling existing data. The task is further complicated by a desire to simultaneously provide traditional frame-based recordings to allow for direct comparison with traditional Computer Vision algorithms. Here we propose a method for converting existing Computer Vision static image datasets into Neuromorphic Vision datasets using an actuated pan-tilt camera platform. Moving the sensor rather than the scene or image is a more biologically realistic approach to sensing and eliminates timing artifacts introduced by monitor updates when simulating motion on a computer monitor. We present conversion of two popular image datasets (MNIST and Caltech101) which have played important roles in the development of Computer Vision, and we provide performance metrics on these datasets using spike-based recognition algorithms. This work contributes datasets for future use in the field, as well as results from spike-based algorithms against which future works can compare. Furthermore, by converting datasets already popular in Computer Vision, we enable more direct comparison with frame-based approaches.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 03:23:25 GMT" } ]
2015-10-20T00:00:00
[ [ "Orchard", "Garrick", "" ], [ "Jayawant", "Ajinkya", "" ], [ "Cohen", "Gregory", "" ], [ "Thakor", "Nitish", "" ] ]
new_dataset
0.99467
1510.05028
Won So
Peter Shah and Won So
Lamassu: Storage-Efficient Host-Side Encryption
13 pages, 11 figures, 2015 USENIX Annual Technical Conference (USENIX ATC 15)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many storage customers are adopting encryption solutions to protect critical data. Most existing encryption solutions sit in, or near, the application that is the source of critical data, upstream of the primary storage system. Placing encryption near the source ensures that data remains encrypted throughout the storage stack, making it easier to use untrusted storage, such as public clouds. Unfortunately, such a strategy also prevents downstream storage systems from applying content-based features, such as deduplication, to the data. In this paper, we present Lamassu, an encryption solution that uses block-oriented, host-based, convergent encryption to secure data, while preserving storage-based data deduplication. Unlike past convergent encryption systems, which typically store encryption metadata in a dedicated store, our system transparently inserts its metadata into each file's data stream. This allows us to add Lamassu to an application stack without modifying either the client application or the storage controller. In this paper, we lay out the architecture and security model used in our system, and present a new model for maintaining metadata consistency and data integrity in a convergent encryption environment. We also evaluate its storage efficiency and I/O performance by using a variety of microbenchmarks, showing that Lamassu provides excellent storage efficiency, while achieving I/O throughput on par with similar conventional encryption systems.
[ { "version": "v1", "created": "Fri, 16 Oct 2015 21:26:49 GMT" } ]
2015-10-20T00:00:00
[ [ "Shah", "Peter", "" ], [ "So", "Won", "" ] ]
new_dataset
0.984061
1510.05041
Linnan Wang
Linnan Wang, Wei Wu, Jianxiong Xiao, Yi Yang
BLASX: A High Performance Level-3 BLAS Library for Heterogeneous Multi-GPU Computing
under review for IPDPS 2016
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Basic Linear Algebra Subprograms (BLAS) are a set of low level linear algebra kernels widely adopted by applications involved with the deep learning and scientific computing. The massive and economic computing power brought forth by the emerging GPU architectures drives interest in implementation of compute-intensive level 3 BLAS on multi-GPU systems. In this paper, we investigate existing multi-GPU level 3 BLAS and present that 1) issues, such as the improper load balancing, inefficient communication, insufficient GPU stream level concurrency and data caching, impede current implementations from fully harnessing heterogeneous computing resources; 2) and the inter-GPU Peer-to-Peer(P2P) communication remains unexplored. We then present BLASX: a highly optimized multi-GPU level-3 BLAS. We adopt the concepts of algorithms-by-tiles treating a matrix tile as the basic data unit and operations on tiles as the basic task. Tasks are guided with a dynamic asynchronous runtime, which is cache and locality aware. The communication cost under BLASX becomes trivial as it perfectly overlaps communication and computation across multiple streams during asynchronous task progression. It also takes the current tile cache scheme one step further by proposing an innovative 2-level hierarchical tile cache, taking advantage of inter-GPU P2P communication. As a result, linear speedup is observable with BLASX under multi-GPU configurations; and the extensive benchmarks demonstrate that BLASX consistently outperforms the related leading industrial and academic projects such as cuBLAS-XT, SuperMatrix, MAGMA and PaRSEC.
[ { "version": "v1", "created": "Fri, 16 Oct 2015 22:34:24 GMT" } ]
2015-10-20T00:00:00
[ [ "Wang", "Linnan", "" ], [ "Wu", "Wei", "" ], [ "Xiao", "Jianxiong", "" ], [ "Yang", "Yi", "" ] ]
new_dataset
0.992876
1510.05075
Huseyin Birkan Yilmaz
Nariman Farsad and H. Birkan Yilmaz and Chan-Byoung Chae and Andrea Goldsmith
Energy Model for Vesicle-Based Active Transport Molecular Communication
null
null
null
null
cs.ET cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In active transport molecular communication (ATMC), information particles are actively transported from a transmitter to a receiver using special proteins. Prior work has demonstrated that ATMC can be an attractive and viable solution for on-chip applications. The energy consumption of an ATMC system plays a central role in its design and engineering. In this work, an energy model is presented for ATMC and the model is used to provide guidelines for designing energy efficient systems. The channel capacity per unit energy is analyzed and maximized. It is shown that based on the size of the symbol set and the symbol duration, there is a vesicle size that maximizes rate per unit energy. It is also demonstrated that maximizing rate per unit energy yields very different system parameters compared to maximizing the rate only.
[ { "version": "v1", "created": "Sat, 17 Oct 2015 06:02:18 GMT" } ]
2015-10-20T00:00:00
[ [ "Farsad", "Nariman", "" ], [ "Yilmaz", "H. Birkan", "" ], [ "Chae", "Chan-Byoung", "" ], [ "Goldsmith", "Andrea", "" ] ]
new_dataset
0.99124
1510.05129
Henk Moed
Henk F. Moed and Gali Halevi
On full text download and citation distributions in scientific-scholarly journals
Author copy of an article accepted for publication in JASIST, posted on 17 Oct 2015
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A statistical analysis of full text downloads of articles in Elseviers ScienceDirect covering all disciplines reveals large differences in download frequencies, their skewness, and their correlation with Scopus-based citation counts, between disciplines, journals, and document types. Download counts tend to be two orders of magnitude higher and less skewedly distributed than citations. A mathematical model based on the sum of two exponentials does not adequately capture monthly download counts. The degree of correlation at the article level within a journal is similar to that at the journal level in the discipline covered by that journal, suggesting that the differences between journals are to a large extent discipline specific. Despite the fact that in all study journals download and citation counts per article positively correlate, little overlap may exist between the set of articles appearing in the top of the citation distribution and that with the most frequently downloaded ones. Usage and citation leaks, bulk downloading, differences between reader and author populations in a subject field, the type of document or its content, differences in obsolescence patterns between downloads and citations, different functions of reading and citing in the research process, all provide possible explanations of differences between download and citation distributions.
[ { "version": "v1", "created": "Sat, 17 Oct 2015 14:16:31 GMT" } ]
2015-10-20T00:00:00
[ [ "Moed", "Henk F.", "" ], [ "Halevi", "Gali", "" ] ]
new_dataset
0.99417
1510.05205
An Liu Dr
An Liu and Vincent Lau
Asymptotic Scaling Laws of Wireless Adhoc Network with Physical Layer Caching
15 pages, 12 figures, accepted by IEEE Transactions on Wireless Communications
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a physical layer (PHY) caching scheme for wireless adhoc networks. The PHY caching exploits cache-assisted multihop gain and cache-induced dual-layer CoMP gain, which substantially improves the throughput of wireless adhoc networks. In particular, the PHY caching scheme contains a novel PHY transmission mode called the cache-induced dual-layer CoMP which can support homogeneous opportunistic CoMP in the wireless adhoc network. Compared with traditional per-node throughput scaling results of \Theta\left(1/\sqrt{N}\right), we can achieve O(1) per node throughput for a cached wireless adhoc network with N nodes. Moreover, we analyze the throughput of the PHY caching scheme for regular wireless adhoc networks and study the impact of various system parameters on the PHY caching gain.
[ { "version": "v1", "created": "Sun, 18 Oct 2015 07:39:49 GMT" } ]
2015-10-20T00:00:00
[ [ "Liu", "An", "" ], [ "Lau", "Vincent", "" ] ]
new_dataset
0.996641
1510.05405
Mira Sarkis
Mira Sarkis (LTCI), Cyril Concolato (LTCI), Jean-Claude Dufourd (LTCI)
The Virtual Splitter: Refactoring Web Applications for the Multiscreen Environment
null
DocEng'14: ACM Symposium on Document Engineering, ACM, 2014, pp.Pages139-142 \<10.1145/2644866.2644893\>
10.1145/2644866.2644893
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Creating web applications for the multiscreen environment is still a challenge. One approach is to transform existing single-screen applications but this has not been done yet automatically or generically. This paper proposes a refactor-ing system. It consists of a generic and extensible mapping phase that automatically analyzes the application content based on a semantic or a visual criterion determined by the author or the user, and prepares it for the splitting process. The system then splits the application and as a result delivers two instrumented applications ready for distribution across devices. During runtime, the system uses a mirroring phase to maintain the functionality of the distributed application and to support a dynamic splitting process. Developed as a Chrome extension, our approach is validated on several web applications, including a YouTube page and a video application from Mozilla.
[ { "version": "v1", "created": "Mon, 19 Oct 2015 09:40:17 GMT" } ]
2015-10-20T00:00:00
[ [ "Sarkis", "Mira", "", "LTCI" ], [ "Concolato", "Cyril", "", "LTCI" ], [ "Dufourd", "Jean-Claude", "", "LTCI" ] ]
new_dataset
0.955864
1510.05546
Bei Wang
Bei Wang and Stephane Ethier and William Tang and Khaled Ibrahim and Kamesh Madduri and Samuel Williams and Leonid Oliker
Modern Gyrokinetic Particle-In-Cell Simulation of Fusion Plasmas on Top Supercomputers
submitted to International Journal of High Performance Computing Applications
null
null
null
cs.DC physics.comp-ph physics.plasm-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Gyrokinetic Toroidal Code at Princeton (GTC-P) is a highly scalable and portable particle-in-cell (PIC) code. It solves the 5D Vlasov-Poisson equation featuring efficient utilization of modern parallel computer architectures at the petascale and beyond. Motivated by the goal of developing a modern code capable of dealing with the physics challenge of increasing problem size with sufficient resolution, new thread-level optimizations have been introduced as well as a key additional domain decomposition. GTC-P's multiple levels of parallelism, including inter-node 2D domain decomposition and particle decomposition, as well as intra-node shared memory partition and vectorization have enabled pushing the scalability of the PIC method to extreme computational scales. In this paper, we describe the methods developed to build a highly parallelized PIC code across a broad range of supercomputer designs. This particularly includes implementations on heterogeneous systems using NVIDIA GPU accelerators and Intel Xeon Phi (MIC) co-processors and performance comparisons with state-of-the-art homogeneous HPC systems such as Blue Gene/Q. New discovery science capabilities in the magnetic fusion energy application domain are enabled, including investigations of Ion-Temperature-Gradient (ITG) driven turbulence simulations with unprecedented spatial resolution and long temporal duration. Performance studies with realistic fusion experimental parameters are carried out on multiple supercomputing systems spanning a wide range of cache capacities, cache-sharing configurations, memory bandwidth, interconnects and network topologies. These performance comparisons using a realistic discovery-science-capable domain application code provide valuable insights on optimization techniques across one of the broadest sets of current high-end computing platforms worldwide.
[ { "version": "v1", "created": "Mon, 19 Oct 2015 15:55:00 GMT" } ]
2015-10-20T00:00:00
[ [ "Wang", "Bei", "" ], [ "Ethier", "Stephane", "" ], [ "Tang", "William", "" ], [ "Ibrahim", "Khaled", "" ], [ "Madduri", "Kamesh", "" ], [ "Williams", "Samuel", "" ], [ "Oliker", "Leonid", "" ] ]
new_dataset
0.99771
1407.6126
Georg Nawratil
Georg Nawratil and Josef Schicho
Self-motions of pentapods with linear platform
28 pages, 5 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a full classification of all pentapods with linear platform possessing a self-motion beside the trivial rotation about the platform. Recent research necessitates a contemporary and accurate re-examination of old results on this topic given by Darboux, Mannheim, Duporcq and Bricard, which also takes the coincidence of platform anchor points into account. For our study we use bond theory with respect to a novel kinematic mapping for pentapods with linear platform, beside the method of singular-invariant leg-rearrangements. Based on our results we design pentapods with linear platform, which have a simplified direct kinematics concerning their number of (real) solutions.
[ { "version": "v1", "created": "Wed, 23 Jul 2014 08:09:06 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2015 07:19:49 GMT" }, { "version": "v3", "created": "Mon, 14 Sep 2015 09:40:04 GMT" }, { "version": "v4", "created": "Fri, 16 Oct 2015 10:56:54 GMT" } ]
2015-10-19T00:00:00
[ [ "Nawratil", "Georg", "" ], [ "Schicho", "Josef", "" ] ]
new_dataset
0.957245
1510.04880
Vishal Midya
Anirban Patranabis, Kaushik Banerjee, Vishal Midya, Sneha Chakraborty, Shankha Sanyal, Archi Banerjee, Ranjan Sengupta and Dipak Ghosh
Harmonic and Timbre Analysis of Tabla Strokes
14 pages
null
null
null
cs.SD physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indian twin drums mainly bayan and dayan (tabla) are the most important percussion instruments in India popularly used for keeping rhythm. It is a twin percussion/drum instrument of which the right hand drum is called dayan and the left hand drum is called bayan. Tabla strokes are commonly called as `bol', constitutes a series of syllables. In this study we have studied the timbre characteristics of nine strokes from each of five different tablas. Timbre parameters were calculated from LTAS of each stroke signals. Study of timbre characteristics is one of the most important deterministic approach for analyzing tabla and its stroke characteristics. Statistical correlations among timbre parameters were measured and also through factor analysis we get to know about the parameters of timbre analysis which are closely related. Tabla strokes have unique harmonic and timbral characteristics at mid frequency range and have no uniqueness at low frequency ranges.
[ { "version": "v1", "created": "Thu, 15 Oct 2015 18:42:04 GMT" } ]
2015-10-19T00:00:00
[ [ "Patranabis", "Anirban", "" ], [ "Banerjee", "Kaushik", "" ], [ "Midya", "Vishal", "" ], [ "Chakraborty", "Sneha", "" ], [ "Sanyal", "Shankha", "" ], [ "Banerjee", "Archi", "" ], [ "Sengupta", "Ranjan", "" ], [ "Ghosh", "Dipak", "" ] ]
new_dataset
0.993812
1510.04929
Z\'ador D\'aniel Kelemen
Z\'ador D\'aniel Kelemen, Bal\'azs T\'odor, S\'andor Hodosi, \'Akos Somfai
Refactoring Technical Support to Reduce Interrupts of Developers
9 pages. arXiv admin note: substantial text overlap with arXiv:1503.05533
EuroAsiaSPI 2015, Ankara, Turkey
null
null
cs.SI cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper an analysis of a technical support data with the goal of identifying process improvement actions for reducing interrupts is presented. A technical support chat is established and used to provide internal developer support to other development teams which use the software code developed by a core team. The paper shows how data analysis of a 6 months support time helped to identify gaps and action items for improving the technical support process to minimize interrupts from other developer teams. The paper also shows effects (advantages and drawbacks) of refactor actions taken based on this analysis.
[ { "version": "v1", "created": "Fri, 16 Oct 2015 16:19:05 GMT" } ]
2015-10-19T00:00:00
[ [ "Kelemen", "Zádor Dániel", "" ], [ "Tódor", "Balázs", "" ], [ "Hodosi", "Sándor", "" ], [ "Somfai", "Ákos", "" ] ]
new_dataset
0.990522
1510.04951
Dmitry Namiot
Dmitry Namiot, Manfred Sneps-Sneppe
The Physical Web in Smart Cities
null
null
null
null
cs.NI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss the physical web projects based on network proximity for Smart Cities. In general, the Physical Web is an approach for connecting any physical object to the web. With this approach, we can navigate and control physical objects in the world surrounding mobile devices. Alternatively, we can execute services on mobile devices, depending on the surrounding physical objects. Technically, there are different ways to enumerate physical objects. In this paper, we will target the models based on the wireless proximity.
[ { "version": "v1", "created": "Fri, 16 Oct 2015 17:07:37 GMT" } ]
2015-10-19T00:00:00
[ [ "Namiot", "Dmitry", "" ], [ "Sneps-Sneppe", "Manfred", "" ] ]
new_dataset
0.999627
1502.06648
Marcus Rohrbach
Marcus Rohrbach and Anna Rohrbach and Michaela Regneri and Sikandar Amin and Mykhaylo Andriluka and Manfred Pinkal and Bernt Schiele
Recognizing Fine-Grained and Composite Activities using Hand-Centric Features and Script Data
in International Journal of Computer Vision (IJCV) 2015
null
10.1007/s11263-015-0851-8
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Activity recognition has shown impressive progress in recent years. However, the challenges of detecting fine-grained activities and understanding how they are combined into composite activities have been largely overlooked. In this work we approach both tasks and present a dataset which provides detailed annotations to address them. The first challenge is to detect fine-grained activities, which are defined by low inter-class variability and are typically characterized by fine-grained body motions. We explore how human pose and hands can help to approach this challenge by comparing two pose-based and two hand-centric features with state-of-the-art holistic features. To attack the second challenge, recognizing composite activities, we leverage the fact that these activities are compositional and that the essential components of the activities can be obtained from textual descriptions or scripts. We show the benefits of our hand-centric approach for fine-grained activity classification and detection. For composite activity recognition we find that decomposition into attributes allows sharing information across composites and is essential to attack this hard task. Using script data we can recognize novel composites without having training data for them.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 22:48:17 GMT" }, { "version": "v2", "created": "Thu, 15 Oct 2015 16:02:19 GMT" } ]
2015-10-16T00:00:00
[ [ "Rohrbach", "Marcus", "" ], [ "Rohrbach", "Anna", "" ], [ "Regneri", "Michaela", "" ], [ "Amin", "Sikandar", "" ], [ "Andriluka", "Mykhaylo", "" ], [ "Pinkal", "Manfred", "" ], [ "Schiele", "Bernt", "" ] ]
new_dataset
0.9982
1509.00154
Jalil Rasekhi
Jalil Rasekhi
Tumor Motion Tracking in Liver Ultrasound Images Using Mean Shift and Active Contour
This paper has been withdrawn by the author due to a crucial sign error in equation 5,6
null
null
null
cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new method for motion tracking of tumors in liver ultrasound image sequences. Our algorithm has two main steps. In the first step, we apply mean shift algorithm with multiple features to estimate the center of the target in each frame. Target in the first frame is defined using an ellipse. Edge, texture, and intensity features are extracted from the first frame, and then mean shift algorithm is applied to each feature separately to find the center of ellipse related to that feature in the next frame. The center of ellipse will be the weighted average of these centers. By using mean shift actually we estimate the target movement between two consecutive frames. Once the correct ellipsoid in each frame is known, in the second step we apply the Dynamic Directional Gradient Vector Flow (DDGVF) version of active contour models, in order to find the correct boundary of tumors. We sample a few points on the boundary of active contour then translate those points based on the translation of the center of ellipsoid in two consecutive frames to determine the target movement. We use these translated sample points as an initial guess for active contour in the next frame. Our experimental results show that, the suggested method provides a reliable performance for liver tumor tracking in ultrasound image sequences.
[ { "version": "v1", "created": "Tue, 1 Sep 2015 06:21:44 GMT" }, { "version": "v2", "created": "Sun, 20 Sep 2015 11:22:42 GMT" }, { "version": "v3", "created": "Wed, 30 Sep 2015 21:09:05 GMT" }, { "version": "v4", "created": "Wed, 14 Oct 2015 23:15:38 GMT" } ]
2015-10-16T00:00:00
[ [ "Rasekhi", "Jalil", "" ] ]
new_dataset
0.982411
1510.02818
Wolfgang John
Rebecca Steinert, Wolfgang John, Pontus Sk\"oldstr\"om, Bertrand Pechenot, Andr\'as Guly\'as, Istv\'an Pelle, Tam\'as L\'evai, Felici\'an N\'emeth, Juhoon Kim, Catalin Meirosu, Xuejun Cai, Chunyan Fu, Kostas Pentikousis, Sachin Sharma, Ioanna Papafili, Guido Marchetto, Riccardo Sisto, Fulvio Risso, Per Kreuger, Jan Ekman, Shaoteng Liu, Antonio Manzalini, Apoorv Shukla, Stefan Schmid
Service Provider DevOps network capabilities and tools
This is the public deliverable D4.2 of the EU FP7 UNIFY project (ICT-619609) - "Proposal for SP-DevOps network capabilities and tools". Original Deliverable published at https://www.fp7-unify.eu/files/fp7-unify-eu-docs/UNIFY-WP4-D4.2%20Proposal%20for%20SP-DevOps%20network%20capabilities%20and%20tools.pdf
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report provides an understanding of how the UNIFY Service Provider (SP)-DevOps concept can be applied and integrated with a combined cloud and transport network NFV architecture. Specifically, the report contains technical descriptions of a set of novel SP-DevOps tools and support functions that facilitate observability, troubleshooting, verification, and VNF development processes. The tools and support functions are described in detail together with their architectural mapping, giving a wider understanding of the SP-DevOps concept as a whole, and how SP-DevOps tools can be used for supporting orchestration and programmability in the UNIFY NFV framework. The concept is further exemplified in a case study for deployment and scaling of an Elastic Firewall.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 20:32:52 GMT" }, { "version": "v2", "created": "Thu, 15 Oct 2015 14:59:35 GMT" } ]
2015-10-16T00:00:00
[ [ "Steinert", "Rebecca", "" ], [ "John", "Wolfgang", "" ], [ "Sköldström", "Pontus", "" ], [ "Pechenot", "Bertrand", "" ], [ "Gulyás", "András", "" ], [ "Pelle", "István", "" ], [ "Lévai", "Tamás", "" ], [ "Németh", "Felicián", "" ], [ "Kim", "Juhoon", "" ], [ "Meirosu", "Catalin", "" ], [ "Cai", "Xuejun", "" ], [ "Fu", "Chunyan", "" ], [ "Pentikousis", "Kostas", "" ], [ "Sharma", "Sachin", "" ], [ "Papafili", "Ioanna", "" ], [ "Marchetto", "Guido", "" ], [ "Sisto", "Riccardo", "" ], [ "Risso", "Fulvio", "" ], [ "Kreuger", "Per", "" ], [ "Ekman", "Jan", "" ], [ "Liu", "Shaoteng", "" ], [ "Manzalini", "Antonio", "" ], [ "Shukla", "Apoorv", "" ], [ "Schmid", "Stefan", "" ] ]
new_dataset
0.998118
1510.04336
Avinash Malik
Avinash Malik, Partha S Roop, Sidharta Andalam, Eugene Yip, and Mark Trew
A synchronous rendering of hybrid systems for designing Plant-on-a-Chip (PoC)
18 pages
null
null
null
cs.FL cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hybrid systems are discrete controllers that are used for controlling a physical process (plant) exhibiting continuous dynamics. A hybrid automata (HA) is a well known and widely used formal model for the specification of such systems. While many methods exist for simulating hybrid automata, there are no known approaches for the automatic code generation from HA that are semantic preserving. If this were feasible, it would enable the design of a plant-on-a-chip (PoC) system that could be used for the emulation of the plant to validate discrete controllers. Such an approach would need to be mathematically sound and should not rely on numerical solvers. We propose a method of PoC design for plant emulation, not possible before. The approach restricts input/output (I/O) HA models using a set of criteria for well-formedness which are statically verified. Following verification, we use an abstraction based on a synchronous approach to facilitate code generation. This is feasible through a sound transformation to synchronous HA. We compare our method (the developed tool called Piha) to the widely used Simulink R simulation framework and show that our method is superior in both execution time and code size. Our approach to the PoC problem paves the way for the emulation of physical plants in diverse domains such as robotics, automation, medical devices, and intelligent transportation systems.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 22:24:00 GMT" } ]
2015-10-16T00:00:00
[ [ "Malik", "Avinash", "" ], [ "Roop", "Partha S", "" ], [ "Andalam", "Sidharta", "" ], [ "Yip", "Eugene", "" ], [ "Trew", "Mark", "" ] ]
new_dataset
0.96062
1510.04489
H\"useyin Af\c{s}er
H\"useyin Af\c{s}er and Hakan Deli\c{c}
Polar Codes With Higher-Order Memory
15 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the design of a set of code sequences $ \{ {\mathscr C}_{n}^{(m)} : n\geq 1, m \geq 1 \}$, with memory order $m$ and code-length $N=O(\phi^n)$, where $ \phi \in (1,2]$ is the largest real root of the polynomial equation $F(m,\rho)=\rho^m-\rho^{m-1}-1$ and $\phi$ is decreasing in $m$. $\{ {\mathscr C}_{n}^{(m)}\}$ is based on the channel polarization idea, where $ \{ {\mathscr C}_{n}^{(1)} \}$ coincides with the polar codes presented by Ar\i kan and can be encoded and decoded with complexity $O(N \log N)$. $ \{ {\mathscr C}_{n}^{(m)} \}$ achieves the symmetric capacity, $I(W)$, of an arbitrary binary-input, discrete-output memoryless channel, $W$, for any fixed $m$ and its encoding and decoding complexities decrease with growing $m$. We obtain an achievable bound on the probability of block-decoding error, $P_e$, of $\{ {\mathscr C}_{n}^{(m)} \}$ and showed that $P_e = O (2^{-N^\beta} )$ is achievable for $\beta < \frac{\phi-1}{1+m(\phi-1)}$.
[ { "version": "v1", "created": "Thu, 15 Oct 2015 12:09:11 GMT" } ]
2015-10-16T00:00:00
[ [ "Afşer", "Hüseyin", "" ], [ "Deliç", "Hakan", "" ] ]
new_dataset
0.998712
1510.04686
Daniel Lemus
Robert Andrawis, Jose David Bermeo, James Charles, Jianbin Fang, Jim Fonseca, Yu He, Gerhard Klimeck, Zhengping Jiang, Tillmann Kubis, Daniel Mejia, Daniel Lemus, Michael Povolotskyi, Santiago Alonso Perez Rubiano, Prasad Sarangapani, Lang Zeng
NEMO5: Achieving High-end Internode Communication for Performance Projection Beyond Moore's Law
null
null
null
null
cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electronic performance predictions of modern nanotransistors require nonequilibrium Green's functions including incoherent scattering on phonons as well as inclusion of random alloy disorder and surface roughness effects. The solution of all these effects is numerically extremely expensive and has to be done on the world's largest supercomputers due to the large memory requirement and the high performance demands on the communication network between the compute nodes. In this work, it is shown that NEMO5 covers all required physical effects and their combination. Furthermore, it is also shown that NEMO5's implementation of the algorithm scales very well up to about 178176CPUs with a sustained performance of about 857 TFLOPS. Therefore, NEMO5 is ready to simulate future nanotransistors.
[ { "version": "v1", "created": "Thu, 15 Oct 2015 19:56:55 GMT" } ]
2015-10-16T00:00:00
[ [ "Andrawis", "Robert", "" ], [ "Bermeo", "Jose David", "" ], [ "Charles", "James", "" ], [ "Fang", "Jianbin", "" ], [ "Fonseca", "Jim", "" ], [ "He", "Yu", "" ], [ "Klimeck", "Gerhard", "" ], [ "Jiang", "Zhengping", "" ], [ "Kubis", "Tillmann", "" ], [ "Mejia", "Daniel", "" ], [ "Lemus", "Daniel", "" ], [ "Povolotskyi", "Michael", "" ], [ "Rubiano", "Santiago Alonso Perez", "" ], [ "Sarangapani", "Prasad", "" ], [ "Zeng", "Lang", "" ] ]
new_dataset
0.965405
1504.03923
Sangxia Huang
Sangxia Huang
$2^{(\log N)^{1/10-o(1)}}$ Hardness for Hypergraph Coloring
The main theorem of Section 4 in the previous version contains a bug, replaced with a new construction. This gives a weaker hardness of 2^{(logn)^{1/10}} than the 2^{(logn)^{1/4}} in the previous version
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that it is quasi-NP-hard to color 2-colorable 8-uniform hypergraphs with $2^{(\log N)^{1/10-o(1)}}$ colors, where $N$ is the number of vertices. There has been much focus on hardness of hypergraph coloring recently. Guruswami, H{\aa}stad, Harsha, Srinivasan and Varma showed that it is quasi-NP-hard to color 2-colorable 8-uniform hypergraphs with $2^{2^{\Omega(\sqrt{\log\log N})}}$ colors. Their result is obtained by composing standard Label Cover with an inner-verifier based on Low Degree Long Code, using Reed-Muller code testing results by Dinur and Guruswami. Using a different approach, Khot and Saket constructed a new variant of Label Cover, and composed it with Quadratic Code to show quasi-NP-hardness of coloring 2-colorable 12-uniform hypergraphs with $2^{(\log N)^c}$ colors, for some $c$ around 1/20. Their construction of Label Cover is based on a new notion of superposition complexity for CSP instances. The composition with inner-verifier was subsequently improved by Varma, giving the same hardness result for 8-uniform hypergraphs. Our construction uses both Quadratic Code and Low Degree Long Code, and builds upon the work by Khot and Saket. We present a different approach to construct CSP instances with superposition hardness by observing that when the number of assignments is odd, satisfying a constraint in superposition is the same as "odd-covering" the constraint. We employ Low Degree Long Code in order to keep the construction efficient. In the analysis, we also adapt and generalize one of the key theorems by Dinur and Guruswami in the context of analyzing probabilistically checkable proof systems.
[ { "version": "v1", "created": "Wed, 15 Apr 2015 14:12:58 GMT" }, { "version": "v2", "created": "Sun, 27 Sep 2015 20:19:00 GMT" }, { "version": "v3", "created": "Wed, 14 Oct 2015 07:42:35 GMT" } ]
2015-10-15T00:00:00
[ [ "Huang", "Sangxia", "" ] ]
new_dataset
0.99358
1510.04026
Huandong Wang
Huandong Wang, Fengli Xu, Yong Li, Pengyu Zhang, Depeng Jin
Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment
To appear at IMC 2015
null
10.1145/2815675.2815680
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding mobile traffic patterns of large scale cellular towers in urban environment is extremely valuable for Internet service providers, mobile users, and government managers of modern metropolis. This paper aims at extracting and modeling the traffic patterns of large scale towers deployed in a metropolitan city. To achieve this goal, we need to address several challenges, including lack of appropriate tools for processing large scale traffic measurement data, unknown traffic patterns, as well as handling complicated factors of urban ecology and human behaviors that affect traffic patterns. Our core contribution is a powerful model which combines three dimensional information (time, locations of towers, and traffic frequency spectrum) to extract and model the traffic patterns of thousands of cellular towers. Our empirical analysis reveals the following important observations. First, only five basic time-domain traffic patterns exist among the 9,600 cellular towers. Second, each of the extracted traffic pattern maps to one type of geographical locations related to urban ecology, including residential area, business district, transport, entertainment, and comprehensive area. Third, our frequency-domain traffic spectrum analysis suggests that the traffic of any tower among the 9,600 can be constructed using a linear combination of four primary components corresponding to human activity behaviors. We believe that the proposed traffic patterns extraction and modeling methodology, combined with the empirical analysis on the mobile traffic, pave the way toward a deep understanding of the traffic patterns of large scale cellular towers in modern metropolis.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 10:01:07 GMT" } ]
2015-10-15T00:00:00
[ [ "Wang", "Huandong", "" ], [ "Xu", "Fengli", "" ], [ "Li", "Yong", "" ], [ "Zhang", "Pengyu", "" ], [ "Jin", "Depeng", "" ] ]
new_dataset
0.987383
1510.04029
Nadine Kroher
Nadine Kroher, Jos\'e-Miguel D\'iaz-B\'a\~nez, Joaquin Mora, Emilia G\'omez
Corpus COFLA: A research corpus for the Computational study of Flamenco Music
24 pages, submitted to the ACM Journal of Computing and Cultural Heritage
null
null
null
cs.SD cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flamenco is a music tradition from Southern Spain which attracts a growing community of enthusiasts around the world. Its unique melodic and rhythmic elements, the typically spontaneous and improvised interpretation and its diversity regarding styles make this still largely undocumented art form a particularly interesting material for musicological studies. In prior works it has already been demonstrated that research on computational analysis of flamenco music, despite it being a relatively new field, can provide powerful tools for the discovery and diffusion of this genre. In this paper we present corpusCOFLA, a data framework for the development of such computational tools. The proposed collection of audio recordings and meta-data serves as a pool for creating annotated subsets which can be used in development and evaluation of algorithms for specific music information retrieval tasks. First, we describe the design criteria for the corpus creation and then provide various examples of subsets drawn from the corpus. We showcase possible research applications in the context of computational study of flamenco music and give perspectives regarding further development of the corpus.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 10:14:29 GMT" } ]
2015-10-15T00:00:00
[ [ "Kroher", "Nadine", "" ], [ "Díaz-Báñez", "José-Miguel", "" ], [ "Mora", "Joaquin", "" ], [ "Gómez", "Emilia", "" ] ]
new_dataset
0.999662
1510.04074
Marian George
Marian George, Dejan Mircic, G\'abor S\"or\"os, Christian Floerkemeier, Friedemann Mattern
Fine-Grained Product Class Recognition for Assisted Shopping
Accepted at ICCV Workshop on Assistive Computer Vision and Robotics (ICCV-ACVR) 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assistive solutions for a better shopping experience can improve the quality of life of people, in particular also of visually impaired shoppers. We present a system that visually recognizes the fine-grained product classes of items on a shopping list, in shelves images taken with a smartphone in a grocery store. Our system consists of three components: (a) We automatically recognize useful text on product packaging, e.g., product name and brand, and build a mapping of words to product classes based on the large-scale GroceryProducts dataset. When the user populates the shopping list, we automatically infer the product class of each entered word. (b) We perform fine-grained product class recognition when the user is facing a shelf. We discover discriminative patches on product packaging to differentiate between visually similar product classes and to increase the robustness against continuous changes in product design. (c) We continuously improve the recognition accuracy through active learning. Our experiments show the robustness of the proposed method against cross-domain challenges, and the scalability to an increasing number of products with minimal re-training.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 13:07:05 GMT" } ]
2015-10-15T00:00:00
[ [ "George", "Marian", "" ], [ "Mircic", "Dejan", "" ], [ "Sörös", "Gábor", "" ], [ "Floerkemeier", "Christian", "" ], [ "Mattern", "Friedemann", "" ] ]
new_dataset
0.997426
1510.04122
Mikhail Tsitsvero
Sergio Barbarossa and Mikhail Tsitsvero
Eigenfunctions of Underspread Linear Communication Systems
13 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show that the eigenfunctions can be found exactly for systems whose delay-Doppler spread function is concentrated along a straight line and they can be found in approximate sense for systems having a spread function maximally concentrated in regions of the Doppler-delay plane whose area is smaller than one. The interesting results are that: i) the instantaneous frequency of the eigenfunctions is dictated by the contour level of the time-varying transfer function; ii) the eigenvalues are restricted between the minimum and maximum value of the system time-varying transfer function, but not all values are possible, as the system exhibits an inherent quantization.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 14:42:00 GMT" } ]
2015-10-15T00:00:00
[ [ "Barbarossa", "Sergio", "" ], [ "Tsitsvero", "Mikhail", "" ] ]
new_dataset
0.972772
1510.04240
Dongsoo Har
Dongsoo Har
Dementia assistive system as a dense network
null
null
null
null
cs.CY cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As elderly population increases, portion of dementia patients becomes larger. Thus social cost of caring dementia patients has been a major concern to many nations. This article introduces a dementia assistive system operated by various sensors and devices installed in body area and activity area of patients. Since this system is served based on a network which includes a number of nodes, it requires techniques to reduce the network performance degradation caused by densely composed sensors and devices. This article introduces existing protocols for communications of sensors and devices at both low rate and high rate transmission.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 19:05:18 GMT" } ]
2015-10-15T00:00:00
[ [ "Har", "Dongsoo", "" ] ]
new_dataset
0.992586
1510.04241
Naveen Kadayinti
Naveen Kadayinti and Maryam Shojaei Baghini and Dinesh K. Sharma
A Clock Synchronizer for Repeaterless Low Swing On-Chip Links
11 pages, 25 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A clock synchronizing circuit for repeaterless low swing interconnects is presented in this paper. The circuit uses a delay locked loop (DLL) to generate multiple phases of the clock, of which the one closest to the center of the eye is picked by a phase detector loop. The picked phase is then further fine tuned by an analog voltage controlled delay to position the sampling clock at the center of the eye. A clock domain transfer circuit then transfers the sampled data to the receiver clock domain with a maximum latency of three clock cycles. The proposed synchronizer has been designed and fabricated in 130 nm UMC MM CMOS technology. The circuit consumes 1.4 mW from a 1.2 V supply at a data rate of 1.3 Gbps. Further, the proposed synchronizer has been designed and simulated in TSMC 65 nm CMOS technology. Post layout simulations show that the synchronizer consumes 1.5 mW from a 1 V supply, at a data rate of 4 Gbps in this technology.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 19:09:21 GMT" } ]
2015-10-15T00:00:00
[ [ "Kadayinti", "Naveen", "" ], [ "Baghini", "Maryam Shojaei", "" ], [ "Sharma", "Dinesh K.", "" ] ]
new_dataset
0.999675
1410.6685
Christopher M. Poskitt
Alexey Kolesnichenko, Christopher M. Poskitt, Sebastian Nanz, Bertrand Meyer
Contract-Based General-Purpose GPU Programming
null
Proc. International Conference on Generative Programming: Concepts and Experiences (GPCE 2015), pages 75-84. ACM, 2015
10.1145/2814204.2814216
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using GPUs as general-purpose processors has revolutionized parallel computing by offering, for a large and growing set of algorithms, massive data-parallelization on desktop machines. An obstacle to widespread adoption, however, is the difficulty of programming them and the low-level control of the hardware required to achieve good performance. This paper suggests a programming library, SafeGPU, that aims at striking a balance between programmer productivity and performance, by making GPU data-parallel operations accessible from within a classical object-oriented programming language. The solution is integrated with the design-by-contract approach, which increases confidence in functional program correctness by embedding executable program specifications into the program text. We show that our library leads to modular and maintainable code that is accessible to GPGPU non-experts, while providing performance that is comparable with hand-written CUDA code. Furthermore, runtime contract checking turns out to be feasible, as the contracts can be executed on the GPU.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 14:03:04 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2015 12:36:46 GMT" }, { "version": "v3", "created": "Tue, 16 Jun 2015 17:42:43 GMT" }, { "version": "v4", "created": "Fri, 21 Aug 2015 16:15:39 GMT" } ]
2015-10-14T00:00:00
[ [ "Kolesnichenko", "Alexey", "" ], [ "Poskitt", "Christopher M.", "" ], [ "Nanz", "Sebastian", "" ], [ "Meyer", "Bertrand", "" ] ]
new_dataset
0.999534
1503.01034
Vladimir Zamdzhiev
Aleks Kissinger and Vladimir Zamdzhiev
Quantomatic: A Proof Assistant for Diagrammatic Reasoning
International Conference on Automated Deduction, CADE 2015 (CADE-25). The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-21401-6_22
null
10.1007/978-3-319-21401-6_22
null
cs.LO cs.MS math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monoidal algebraic structures consist of operations that can have multiple outputs as well as multiple inputs, which have applications in many areas including categorical algebra, programming language semantics, representation theory, algebraic quantum information, and quantum groups. String diagrams provide a convenient graphical syntax for reasoning formally about such structures, while avoiding many of the technical challenges of a term-based approach. Quantomatic is a tool that supports the (semi-)automatic construction of equational proofs using string diagrams. We briefly outline the theoretical basis of Quantomatic's rewriting engine, then give an overview of the core features and architecture and give a simple example project that computes normal forms for commutative bialgebras.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 18:20:39 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2015 15:30:29 GMT" } ]
2015-10-14T00:00:00
[ [ "Kissinger", "Aleks", "" ], [ "Zamdzhiev", "Vladimir", "" ] ]
new_dataset
0.984977
1504.02716
Vladimir Zamdzhiev
Aleks Kissinger, Vladimir Zamdzhiev
Equational reasoning with context-free families of string diagrams
International Conference on Graph Transformation, ICGT 2015. The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-21145-9_9
null
10.1007/978-3-319-21145-9_9
null
cs.LO cs.FL math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
String diagrams provide an intuitive language for expressing networks of interacting processes graphically. A discrete representation of string diagrams, called string graphs, allows for mechanised equational reasoning by double-pushout rewriting. However, one often wishes to express not just single equations, but entire families of equations between diagrams of arbitrary size. To do this we define a class of context-free grammars, called B-ESG grammars, that are suitable for defining entire families of string graphs, and crucially, of string graph rewrite rules. We show that the language-membership and match-enumeration problems are decidable for these grammars, and hence that there is an algorithm for rewriting string graphs according to B-ESG rewrite patterns. We also show that it is possible to reason at the level of grammars by providing a simple method for transforming a grammar by string graph rewriting, and showing admissibility of the induced B-ESG rewrite pattern.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 15:36:13 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2015 14:35:06 GMT" } ]
2015-10-14T00:00:00
[ [ "Kissinger", "Aleks", "" ], [ "Zamdzhiev", "Vladimir", "" ] ]
new_dataset
0.996772
1510.02856
Jos Wetzels
Jos Wetzels, Wouter Bokslag
Sponges and Engines: An introduction to Keccak and Keyak
30 pages Revision: corrected minor terminology error
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
In this document we present an introductory overview of the algorithms and design components underlying the Keccac cryptographic primitive and the Keyak encryption scheme for authenticated (session-supporting) encryption. This document aims to familiarize readers with the basic principles of authenticated encryption, the Sponge and Duplex constructions (full-state, keyed as well as regular versions), the permutation functions underlying Keccak and Keyak as well as Keyak v2's Motorist mode of operation.
[ { "version": "v1", "created": "Sat, 10 Oct 2015 00:19:29 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2015 02:17:02 GMT" } ]
2015-10-14T00:00:00
[ [ "Wetzels", "Jos", "" ], [ "Bokslag", "Wouter", "" ] ]
new_dataset
0.990325
1510.03247
Jason Dou
Lucy Chenyun Wu, Jason Xiaotian Dou, Danny Sleator, Alan Frieze, David Miller
Impartial Redistricting: A Markov Chain Approach
about authorship naming problem, will fix soon
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The gerrymandering problem is a worldwide problem which sets great threat to democracy and justice in district based elections. Thanks to partisan redistricting commissions, district boundaries are often manipulated to benefit incumbents. Since an independent commission is hard to come by, the possibility of impartially generating districts with a computer is explored in this thesis. We have developed an algorithm to randomly produce legal redistricting schemes for Pennsylvania.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 12:11:51 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2015 12:26:31 GMT" } ]
2015-10-14T00:00:00
[ [ "Wu", "Lucy Chenyun", "" ], [ "Dou", "Jason Xiaotian", "" ], [ "Sleator", "Danny", "" ], [ "Frieze", "Alan", "" ], [ "Miller", "David", "" ] ]
new_dataset
0.995575
1510.03510
Sarah Johnson
Sarah J. Johnson, Vikram A. Chandrasetty and Andrew M. Lance
Repeat-Accumulate Codes for Reconciliation in Continuous Variable Quantum Key Distribution
null
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the design of low-complexity error correction codes for the verification step in continuous variable quantum key distribution (CVQKD) systems. We design new coding schemes based on quasi-cyclic repeat-accumulate codes which demonstrate good performances for CVQKD reconciliation.
[ { "version": "v1", "created": "Tue, 13 Oct 2015 02:35:56 GMT" } ]
2015-10-14T00:00:00
[ [ "Johnson", "Sarah J.", "" ], [ "Chandrasetty", "Vikram A.", "" ], [ "Lance", "Andrew M.", "" ] ]
new_dataset
0.981809
1510.02828
Mauricio Toro
Mauricio Toro and Camilo Rueda and Carlos Ag\'on and G\'erard Assayag
Gelisp: A Library to Represent Musical CSPs and Search Strategies
7 pages, 2 figures, not published
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present Gelisp, a new library to represent musical Constraint Satisfaction Problems and search strategies intuitively. Gelisp has two interfaces, a command-line one for Common Lisp and a graphical one for OpenMusic. Using Gelisp, we solved a problem of automatic music generation proposed by composer Michael Jarrell and we found solutions for the All-interval series.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 21:32:13 GMT" } ]
2015-10-13T00:00:00
[ [ "Toro", "Mauricio", "" ], [ "Rueda", "Camilo", "" ], [ "Agón", "Carlos", "" ], [ "Assayag", "Gérard", "" ] ]
new_dataset
0.998872
1510.02840
Mauricio Toro
Mauricio Toro
Concurrent Constraint Machine Improvisation: Models and Implementation
8 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine improvisation creates music either by explicit coding of rules or by applying machine learning methods. We deal with the latter case. An improvisation system capable of real-time must execute two process concurrently: one to apply machine learning methods to musical sequences in order to capture prominent musical features, and one to produce musical sequences stylistically consistent with the learned material. As an example, the Concurrent Constraint Factor Oracle Model for Music Improvisation (ccfomi), based upon Non-deterministic Timed Concurrent Constraint (ntcc) calculus, uses the Factor Oracle to store the learned sequences.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 22:22:01 GMT" } ]
2015-10-13T00:00:00
[ [ "Toro", "Mauricio", "" ] ]
new_dataset
0.990992
1510.02983
Becky Passonneau
Boyi Xie and Rebecca J. Passonneau
OmniGraph: Rich Representation and Graph Kernel Learning
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OmniGraph, a novel representation to support a range of NLP classification tasks, integrates lexical items, syntactic dependencies and frame semantic parses into graphs. Feature engineering is folded into the learning through convolution graph kernel learning to explore different extents of the graph. A high-dimensional space of features includes individual nodes as well as complex subgraphs. In experiments on a text-forecasting problem that predicts stock price change from news for company mentions, OmniGraph beats several benchmarks based on bag-of-words, syntactic dependencies, and semantic trees. The highly expressive features OmniGraph discovers provide insights into the semantics across distinct market sectors. To demonstrate the method's generality, we also report its high performance results on a fine-grained sentiment corpus.
[ { "version": "v1", "created": "Sat, 10 Oct 2015 21:22:00 GMT" } ]
2015-10-13T00:00:00
[ [ "Xie", "Boyi", "" ], [ "Passonneau", "Rebecca J.", "" ] ]
new_dataset
0.978304
1510.03023
Dani Lischinski
Haisen Zhao, Lin Lu, Yuan Wei, Dani Lischinski, Andrei Sharf, Daniel Cohen-Or, Baoquan Chen
Printed Perforated Lampshades for Continuous Projective Images
10 pages
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a technique for designing 3D-printed perforated lampshades, which project continuous grayscale images onto the surrounding walls. Given the geometry of the lampshade and a target grayscale image, our method computes a distribution of tiny holes over the shell, such that the combined footprints of the light emanating through the holes form the target image on a nearby diffuse surface. Our objective is to approximate the continuous tones and the spatial detail of the target image, to the extent possible within the constraints of the fabrication process. To ensure structural integrity, there are lower bounds on the thickness of the shell, the radii of the holes, and the minimal distances between adjacent holes. Thus, the holes are realized as thin tubes distributed over the lampshade surface. The amount of light passing through a single tube may be controlled by the tube's radius and by its direction (tilt angle). The core of our technique thus consists of determining a suitable configuration of the tubes: their distribution across the relevant portion of the lampshade, as well as the parameters (radius, tilt angle) of each tube. This is achieved by computing a capacity-constrained Voronoi tessellation over a suitably defined density function, and embedding a tube inside the maximal inscribed circle of each tessellation cell. The density function for a particular target image is derived from a series of simulated images, each corresponding to a different uniform density tube pattern on the lampshade.
[ { "version": "v1", "created": "Sun, 11 Oct 2015 08:13:38 GMT" } ]
2015-10-13T00:00:00
[ [ "Zhao", "Haisen", "" ], [ "Lu", "Lin", "" ], [ "Wei", "Yuan", "" ], [ "Lischinski", "Dani", "" ], [ "Sharf", "Andrei", "" ], [ "Cohen-Or", "Daniel", "" ], [ "Chen", "Baoquan", "" ] ]
new_dataset
0.9982
1510.03191
Nikola Zlatanov
Nikola Zlatanov and Vahid Jamali and Robert Schober
On the Capacity of the Two-Hop Half-Duplex Relay Channel
Proc. of the IEEE Global Telecomm. Conf. (Globecom), San Diego, Dec. 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although extensively investigated, the capacity of the two-hop half-duplex (HD) relay channel is not fully understood. In particular, a capacity expression which can be evaluated straightforwardly is not available and an explicit coding scheme which achieves the capacity is not known either. In this paper, we derive a new expression for the capacity of the two-hop HD relay channel based on a simplified converse. Compared to previous results, this capacity expression can be easily evaluated. Moreover, we propose an explicit coding scheme which achieves the capacity. To achieve the capacity, the relay does not only send information to the destination by transmitting information-carrying symbols but also with the zero symbols resulting from the relay's silence during reception. As examples, we compute the capacities of the two-hop HD relay channel for the cases when the source-relay and relay-destination links are both binary-symmetric channels (BSCs) and additive white Gaussian noise (AWGN) channels, respectively, and numerically compare the capacities with the rates achieved by conventional relaying where the relay receives and transmits in a codeword-by-codeword fashion and switches between reception and transmission in a strictly alternating manner. Our numerical results show that the capacities of the two-hop HD relay channel for BSC and AWGN links are significantly larger than the rates achieved with conventional relaying.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 09:17:08 GMT" } ]
2015-10-13T00:00:00
[ [ "Zlatanov", "Nikola", "" ], [ "Jamali", "Vahid", "" ], [ "Schober", "Robert", "" ] ]
new_dataset
0.99315
1510.03231
Olena Prianychnykova
Igor Potapov, Olena Prianychnykova, Sergey Verlan
On insertion-deletion systems over relational words
24 pages, 8 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new notion of a relational word as a finite totally ordered set of positions endowed with three binary relations that describe which positions are labeled by equal data, by unequal data and those having an undefined relation between their labels. We define the operations of insertion and deletion on relational words generalizing corresponding operations on strings. We prove that the transitive and reflexive closure of these operations has a decidable membership problem for the case of short insertion-deletion rules (of size two/three and three/two). At the same time, we show that in the general case such systems can produce a coding of any recursively enumerable language leading to undecidabilty of reachability questions.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 11:14:51 GMT" } ]
2015-10-13T00:00:00
[ [ "Potapov", "Igor", "" ], [ "Prianychnykova", "Olena", "" ], [ "Verlan", "Sergey", "" ] ]
new_dataset
0.99071
1510.03250
Dan Adam
Yael Petrank, Nahum Smirin, Yossi Tsadok, Zvi Friedman, Peter Lysiansky, Dan Adam
Using Anatomical Markers for Left Ventricular Segmentation of Long Axis Ultrasound Images
11 pages, 17 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Left ventricular segmentation is essential for measuring left ventricular function indices. Segmentation of one or several images requires an initial guess of the contour. It is hypothesized here that creating an initial guess by first detecting anatomical markers, would lead to correct detection of the endocardium. The first step of the algorithm presented here includes automatic detection of the mitral valve. Next, the apex is detected in the same frame. The valve is then tracked throughout the cardiac cycle. Contours passing from the apex to each valve corner are then found using a dynamic programming algorithm. The resulting contour is used as an input to an active contour algorithm. The algorithm was tested on 21 long axis ultrasound clips and showed good agreement with manually traced contours. Thus, this study demonstrates that detection of anatomic markers leads to a reliable initial guess of the left ventricle border.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 12:20:23 GMT" } ]
2015-10-13T00:00:00
[ [ "Petrank", "Yael", "" ], [ "Smirin", "Nahum", "" ], [ "Tsadok", "Yossi", "" ], [ "Friedman", "Zvi", "" ], [ "Lysiansky", "Peter", "" ], [ "Adam", "Dan", "" ] ]
new_dataset
0.995975
1510.03253
Elmar Rueckert
Elmar Rueckert, Rudolf Lioutikov, Roberto Calandra, Marius Schmidt, Philipp Beckerle and Jan Peters
Low-cost Sensor Glove with Force Feedback for Learning from Demonstrations using Probabilistic Trajectory Representations
3 pages, 3 figures. Workshop paper of the International Conference on Robotics and Automation (ICRA 2015)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor gloves are popular input devices for a large variety of applications including health monitoring, control of music instruments, learning sign language, dexterous computer interfaces, and tele-operating robot hands. Many commercial products as well as low-cost open source projects have been developed. We discuss here how low-cost (approx. 250 EUROs) sensor gloves with force feedback can be build, provide an open source software interface for Matlab and present first results in learning object manipulation skills through imitation learning on the humanoid robot iCub.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 12:37:57 GMT" } ]
2015-10-13T00:00:00
[ [ "Rueckert", "Elmar", "" ], [ "Lioutikov", "Rudolf", "" ], [ "Calandra", "Roberto", "" ], [ "Schmidt", "Marius", "" ], [ "Beckerle", "Philipp", "" ], [ "Peters", "Jan", "" ] ]
new_dataset
0.996456
1510.03277
Xiaoping Li
Xiaoping Li, Xiang-Gen Xia, Wenjie Wang, Wei Wang
A Robust Generalized Chinese Remainder Theorem for Two Integers
36 pages
null
null
null
cs.IT math.IT
http://creativecommons.org/publicdomain/zero/1.0/
A generalized Chinese remainder theorem (CRT) for multiple integers from residue sets has been studied recently, where the correspondence between the remainders and the integers in each residue set modulo several moduli is not known. A robust CRT has also been proposed lately for robustly reconstruct a single integer from its erroneous remainders. In this paper, we consider the reconstruction problem of two integers from their residue sets, where the remainders are not only out of order but also may have errors. We prove that two integers can be robustly reconstructed if their remainder errors are less than $M/8$, where $M$ is the greatest common divisor (gcd) of all the moduli. We also propose an efficient reconstruction algorithm. Finally, we present some simulations to verify the efficiency of the proposed algorithm. The study is motivated and has applications in the determination of multiple frequencies from multiple undersampled waveforms.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 03:43:49 GMT" } ]
2015-10-13T00:00:00
[ [ "Li", "Xiaoping", "" ], [ "Xia", "Xiang-Gen", "" ], [ "Wang", "Wenjie", "" ], [ "Wang", "Wei", "" ] ]
new_dataset
0.998399
1510.03370
Scott Garrabrant
Scott Garrabrant, Siddharth Bhaskar, Abram Demski, Joanna Garrabrant, George Koleszarik, Evan Lloyd
Asymptotic Logical Uncertainty and The Benford Test
null
null
null
2015--11
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an algorithm A which assigns probabilities to logical sentences. For any simple infinite sequence of sentences whose truth-values appear indistinguishable from a biased coin that outputs "true" with probability p, we have that the sequence of probabilities that A assigns to these sentences converges to p.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 17:14:44 GMT" } ]
2015-10-13T00:00:00
[ [ "Garrabrant", "Scott", "" ], [ "Bhaskar", "Siddharth", "" ], [ "Demski", "Abram", "" ], [ "Garrabrant", "Joanna", "" ], [ "Koleszarik", "George", "" ], [ "Lloyd", "Evan", "" ] ]
new_dataset
0.992058
1510.02484
Muhammad Jawaherul Alam
Md. Jawaherul Alam, Michael Kaufmann, and Stephen G. Kobourov
On Contact Graphs with Cubes and Proportional Boxes
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study two variants of the problem of contact representation of planar graphs with axis-aligned boxes. In a cube-contact representation we realize each vertex with a cube, while in a proportional box-contact representation each vertex is an axis-aligned box with a prespecified volume. We present algorithms for constructing cube-contact representation and proportional box-contact representation for several classes of planar graphs.
[ { "version": "v1", "created": "Thu, 8 Oct 2015 20:06:34 GMT" } ]
2015-10-12T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Kaufmann", "Michael", "" ], [ "Kobourov", "Stephen G.", "" ] ]
new_dataset
0.999292
1510.02552
Haryono Haryono
Haryono Haryono
Multitasking Programming of OBDH Satellite Based On PC-104
8 pages
International Journal of advanced studies in Computer Science and Engineering IJASCSE Volume 4, Issue 8, 2015
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On Board Data Handling (OBDH) has functions to monitor, control, acquire, analyze, take a decision, and execute the command. OBDH should organize the task between sub system. OBDH like a heart which has a vital function. Because the function is seriously important therefore designing and implementing the OBDH should be carefully, in order to have a good reliability. Many OBDHs have been made to support the satellite mission using primitive programming. In handling the data from various input, OBDH should always be available to all sub systems, when the tasks are many, it is not easy to program using primitive programming. Sometimes the data become corrupt because the data which come to the OBDH is in the same time. Therefore it is required to have a way to handle the data safely and also easy in programming perspective. In this research, OBDH is programmed using multi tasking programming perspective has been created. The Operating System (OS) has been implemented so that can run the tasks simultaneously. The OS is prepared by configuring the Linux Kernel for the specific processor, creating Root File System (RFS), installing the BusyBox. In order to do the above method, preparing the environment in our machine has been done, they are installing the Cross Tool Chain, U-Boot, GNU-Linux Kernel Source etc. After that, programming using c code with multitasking programming can be implemented. By using above method, it is found that programming is easier and the corruption data because of reentrancy can be minimized. Keywords- Operating System, PC-104, Kernel, C Programming
[ { "version": "v1", "created": "Fri, 9 Oct 2015 02:58:40 GMT" } ]
2015-10-12T00:00:00
[ [ "Haryono", "Haryono", "" ] ]
new_dataset
0.977112
1510.02588
Nima Beygi
Nima Beygi, Maani Beigy, Mehdi Siahi
Design of Fuzzy self-tuning PID controller for pitch control system of aircraft autopilot
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A variety of control systems have been proposed for aircraft autopilot systems. Traditional approaches such as proportional controller and conventional PID (CPID) controller are widely used. PID controller has a good static performance especially for linear and time-invariant systems, but a weak dynamic performance and discouraging function on nonlinear, time-varying, and uncertain systems. Fuzzy control theory can improve dynamic response in various conditions of system performance. This paper designs fuzzy self-tuning PID (FSPID) controller to improve disadvantages of conventional PID in aircraft autopilots. We apply proposed controller to pitch angle of aircraft then the abilities of proposed controller will be compared to the conventional PID and proportional controller. Inner feedback loop acts as oscillation damper in traditional schemes, but here is removed to compare the capabilities of Fuzzy self-tuning PID, conventional PID, and proportional controller. Based on the simulations, both of Conventional and Fuzzy self-tuning PID controllers can properly damp oscillations in lack of the inner feedback loop, but proportional controller cannot do. Then short-period approximation is assumed to assess the function of FSPID and CPID controllers in confront with abrupt and continuous disturbances, in addition to inappropriate tuning of parameters. Simulation results of short-period approximation show a better anti-disturbance function for Fuzzy self-tuning PID compare to the conventional type. Fuzzy self-tuning PID can tune the PID parameters for achieving the optimal response in view of speed, overshoot, and steady-state error in conditions of inappropriate tuning of PID parameters, based on the results of simulation in short-period approximation, the proposed controller can adaptively improve the system response by on-line setting of PID parameters.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 08:06:08 GMT" } ]
2015-10-12T00:00:00
[ [ "Beygi", "Nima", "" ], [ "Beigy", "Maani", "" ], [ "Siahi", "Mehdi", "" ] ]
new_dataset
0.96344
1510.02710
Daisuke Iwai
Kosuke Sato, Daisuke Iwai, Sei Ikeda, Noriko Takemura
Procams-Based Cybernetics
2 pages, 2 figures, IEEE VR 2015 Lab/Project presentation
null
null
null
cs.CV cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Procams-based cybernetics is a unique, emerging research field, which aims at enhancing and supporting our activities by naturally connecting human and computers/machines as a cooperative integrated system via projector-camera systems (procams). It rests on various research domains such as virtual/augmented reality, computer vision, computer graphics, projection display, human computer interface, human robot interaction and so on. This laboratory presentation provides a brief history including recent achievements of our procams-based cybernetics project.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 15:47:00 GMT" } ]
2015-10-12T00:00:00
[ [ "Sato", "Kosuke", "" ], [ "Iwai", "Daisuke", "" ], [ "Ikeda", "Sei", "" ], [ "Takemura", "Noriko", "" ] ]
new_dataset
0.997912
1410.0589
Mateus de Oliveira Oliveira
Mateus de Oliveira Oliveira
An Algorithmic Metatheorem for Directed Treewidth
41 pages, 6 figures, Accepted to Discrete Applied Mathematics
null
null
null
cs.DS cs.CC cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of directed treewidth was introduced by Johnson, Robertson, Seymour and Thomas [Journal of Combinatorial Theory, Series B, Vol 82, 2001] as a first step towards an algorithmic metatheory for digraphs. They showed that some NP-complete properties such as Hamiltonicity can be decided in polynomial time on digraphs of constant directed treewidth. Nevertheless, despite more than one decade of intensive research, the list of hard combinatorial problems that are known to be solvable in polynomial time when restricted to digraphs of constant directed treewidth has remained scarce. In this work we enrich this list by providing for the first time an algorithmic metatheorem connecting the monadic second order logic of graphs to directed treewidth. We show that most of the known positive algorithmic results for digraphs of constant directed treewidth can be reformulated in terms of our metatheorem. Additionally, we show how to use our metatheorem to provide polynomial time algorithms for two classes of combinatorial problems that have not yet been studied in the context of directed width measures. More precisely, for each fixed $k,w \in \mathbb{N}$, we show how to count in polynomial time on digraphs of directed treewidth $w$, the number of minimum spanning strong subgraphs that are the union of $k$ directed paths, and the number of maximal subgraphs that are the union of $k$ directed paths and satisfy a given minor closed property. To prove our metatheorem we devise two technical tools which we believe to be of independent interest. First, we introduce the notion of tree-zig-zag number of a digraph, a new directed width measure that is at most a constant times directed treewidth. Second, we introduce the notion of $z$-saturated tree slice language, a new formalism for the specification and manipulation of infinite sets of digraphs.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 15:27:00 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2015 07:16:23 GMT" } ]
2015-10-09T00:00:00
[ [ "Oliveira", "Mateus de Oliveira", "" ] ]
new_dataset
0.99759
1510.01288
Erik Str\"om
Erik G. Str\"om, Petar Popovski, Joachim Sachs
5G Ultra-Reliable Vehicular Communication
Fixed typos. Last paragraph of Sec. 3 modified to stress applicability to V2X comm. Submitted to IEEE Communications Magazine, July 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications enabled by Cooperative Intelligent Transport Systems (C-ITS) represent a major step towards making the road transport system safer and more efficient (green), and thus suited for a sustainable future. Wireless communication between vehicles and road infrastructure is an enabler for high-performance C-ITS applications. State-of-the-art communication systems for supporting low-latency C-ITS applications are based on IEEE 802.11 medium access control (MAC) and physical (PHY) layers. In this paper, we argue that a well-designed 5G system can complement or even replace these systems. We will review the C-ITS application requirements and explain how these are well aligned with the foreseen generic 5G service of ultra-reliable machine-type communication (uMTC). Key technology components suitable for constructing the uMTC service are identified: reliable service composition (RSC) and device-to-device (D2D) links for all-to-all broadcast communication, operational at high mobility and with varying degree of network assistance. Important problems for future studies, including radio-resource management, medium access control, and physical layer challenges, are discussed.
[ { "version": "v1", "created": "Mon, 5 Oct 2015 19:17:08 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2015 18:05:34 GMT" } ]
2015-10-09T00:00:00
[ [ "Ström", "Erik G.", "" ], [ "Popovski", "Petar", "" ], [ "Sachs", "Joachim", "" ] ]
new_dataset
0.997137
1510.02342
Stella Lee Miss
Stella Lee, Martin Walda, Delimpasi Vasiliki
Born In Bradford Mobile Application
4 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Born In Bradford mobile application is an Android mobile application and a working prototype that enables interaction with a sample cohort of the Born in Bradford study. It provides an interface and visualization for several surveys participated in by mothers and their children. This data is stored in the Born In Bradford database. A subset of this data is provided for mothers and children. The mobile application provides a way to engage the mothers and promote their consistency in participating in subsequent surveys. It has been designed to allow selected mothers to participate in the visualization of their babies data. Samsung mobile phones have been provided with the application loaded on the phone to limit and control its use and access to data. Mothers login to interact with the data. This includes the ability to compare children data through infographics and graphs and comparing their children data with the average child. This comparison is done at different stages of the children ages as provided in the dataset.
[ { "version": "v1", "created": "Thu, 8 Oct 2015 14:42:42 GMT" } ]
2015-10-09T00:00:00
[ [ "Lee", "Stella", "" ], [ "Walda", "Martin", "" ], [ "Vasiliki", "Delimpasi", "" ] ]
new_dataset
0.999203
1303.3934
Feng Tan
Feng Tan and Jean-Jacques Slotine
A Quorum Sensing Inspired Algorithm for Dynamic Clustering
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quorum sensing is a decentralized biological process, through which a community of cells with no global awareness coordinate their functional behaviors based solely on cell-medium interactions and local decisions. This paper draws inspirations from quorum sensing and colony competition to derive a new algorithm for data clustering. The algorithm treats each data as a single cell, and uses knowledge of local connectivity to cluster cells into multiple colonies simultaneously. It simulates auto-inducers secretion in quorum sensing to tune the influence radius for each cell. At the same time, sparsely distributed core cells spread their influences to form colonies, and interactions between colonies eventually determine each cell's identity. The algorithm has the flexibility to analyze not only static but also time-varying data, which surpasses the capacity of many existing algorithms. Its stability and convergence properties are established. The algorithm is tested on several applications, including both synthetic and real benchmarks data sets, alleles clustering, community detection, image segmentation. In particular, the algorithm's distinctive capability to deal with time-varying data allows us to experiment it on novel applications such as robotic swarms grouping and switching model identification. We believe that the algorithm's promising performance would stimulate many more exciting applications.
[ { "version": "v1", "created": "Sat, 16 Mar 2013 00:49:56 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2015 21:12:52 GMT" } ]
2015-10-08T00:00:00
[ [ "Tan", "Feng", "" ], [ "Slotine", "Jean-Jacques", "" ] ]
new_dataset
0.989278
1507.08355
Hao Chen
Xianmang He, Liqing Xu and Hao Chen
New $q$-ary Quantum MDS Codes with Distances Bigger than $\frac{q}{2}$
19 pages, submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constructions of quantum MDS codes have been studied by many authors. We refer to the table in page 1482 of [3] for known constructions. However there are only few $q$-ary quantum MDS $[[n,n-2d+2,d]]_q$ codes with minimum distances $d>\frac{q}{2}$ for sparse lengths $n>q+1$. In the case $n=\frac{q^2-1}{m}$ where $m|q+1$ or $m|q-1$ there are complete results. In the case $n=\frac{q^2-1}{m}$ where $m|q^2-1$ is not a factor of $q-1$ or $q+1$, there is no $q$-ary quantum MDS code with $d> \frac{q}{2}$ has been constructed. In this paper we propose a direct approch to construct Hermitian self-orthogonal codes over ${\bf F}_{q^2}$. Thus we give some new $q$-ary quantum codes in this case. Moreover we present many new $q$-ary quantum MDS codes with lengths of the form $\frac{w(q^2-1)}{u}$ and minimum distances $d > \frac{q}{2}$.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 01:06:42 GMT" }, { "version": "v2", "created": "Wed, 7 Oct 2015 11:28:24 GMT" } ]
2015-10-08T00:00:00
[ [ "He", "Xianmang", "" ], [ "Xu", "Liqing", "" ], [ "Chen", "Hao", "" ] ]
new_dataset
0.998794
1509.02796
Johannes K\"oster
Johannes K\"oster
Rust-Bio - a fast and safe bioinformatics library
null
null
10.1093/bioinformatics/btv573
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Rust-Bio, the first general purpose bioinformatics library for the innovative Rust programming language. Rust-Bio leverages the unique combination of speed, memory safety and high-level syntax offered by Rust to provide a fast and safe set of bioinformatics algorithms and data structures with a focus on sequence analysis.
[ { "version": "v1", "created": "Wed, 9 Sep 2015 14:53:02 GMT" } ]
2015-10-08T00:00:00
[ [ "Köster", "Johannes", "" ] ]
new_dataset
0.998056
1510.01823
Pei-Chuan Tsai
Pei-Chuan Tsai, Chih-Ming Chen, Ying-ping Chen
Multiple Configurations LT Codes
11 pages, 8 figures, 3 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new scheme of LT codes, named multiple configurations. In multiple configurations LT codes (MC-LT codes), multiple sets of output symbols are simultaneously provided to receivers for recovering the source data. Each receiver, without the need to send information back to the sender, is capable of receiving the output symbols generated by some configuration chosen according to its own decoding phase. Aiming at the broadcasting scenarios without feedback channels, the proposed MC-LT codes are shown to outperform the optimal pure LT codes at the cost of encoding and transmitting units. In this paper, the inspiration of MC-LT codes is presented, how MC-LT codes work is described by giving examples, in which the optimal pure LT codes are outperformed, and a practical design of MC-LT codes, which is analytically proved to have at least the same performance bound as the pure LT codes, is proposed. The results of numerical simulation experiments demonstrate that the proposed practical design of MC-LT codes can deliver better performance than the LT codes in comparison. In summary, this paper creates new potential research directions for LT codes, and MC-LT codes are a promising variant of LT codes, especially for broadcasting scenarios.
[ { "version": "v1", "created": "Wed, 7 Oct 2015 04:53:59 GMT" } ]
2015-10-08T00:00:00
[ [ "Tsai", "Pei-Chuan", "" ], [ "Chen", "Chih-Ming", "" ], [ "Chen", "Ying-ping", "" ] ]
new_dataset
0.997615
1510.02055
Akshaya Mishra Dr
Justin A. Eichel, Akshaya Mishra, Nicholas Miller, Nicholas Jankovic, Mohan A. Thomas, Tyler Abbott, Douglas Swanson, Joel Keller
Diverse Large-Scale ITS Dataset Created from Continuous Learning for Real-Time Vehicle Detection
13 pages, 11 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In traffic engineering, vehicle detectors are trained on limited datasets resulting in poor accuracy when deployed in real world applications. Annotating large-scale high quality datasets is challenging. Typically, these datasets have limited diversity; they do not reflect the real-world operating environment. There is a need for a large-scale, cloud based positive and negative mining (PNM) process and a large-scale learning and evaluation system for the application of traffic event detection. The proposed positive and negative mining process addresses the quality of crowd sourced ground truth data through machine learning review and human feedback mechanisms. The proposed learning and evaluation system uses a distributed cloud computing framework to handle data-scaling issues associated with large numbers of samples and a high-dimensional feature space. The system is trained using AdaBoost on $1,000,000$ Haar-like features extracted from $70,000$ annotated video frames. The trained real-time vehicle detector achieves an accuracy of at least $95\%$ for $1/2$ and about $78\%$ for $19/20$ of the time when tested on approximately $7,500,000$ video frames. At the end of 2015, the dataset is expect to have over one billion annotated video frames.
[ { "version": "v1", "created": "Wed, 7 Oct 2015 18:34:36 GMT" } ]
2015-10-08T00:00:00
[ [ "Eichel", "Justin A.", "" ], [ "Mishra", "Akshaya", "" ], [ "Miller", "Nicholas", "" ], [ "Jankovic", "Nicholas", "" ], [ "Thomas", "Mohan A.", "" ], [ "Abbott", "Tyler", "" ], [ "Swanson", "Douglas", "" ], [ "Keller", "Joel", "" ] ]
new_dataset
0.979823
1310.1197
Vincent Tan
Jonathan Scarlett and Vincent Y. F. Tan
Second-Order Asymptotics for the Gaussian MAC with Degraded Message Sets
27 pages, 5 figures, IEEE Transactions on Information Theory, 2015
null
10.1109/TIT.2015.2487340
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the second-order asymptotics of the Gaussian multiple-access channel with degraded message sets. For a fixed average error probability $\varepsilon \in (0,1)$ and an arbitrary point on the boundary of the capacity region, we characterize the speed of convergence of rate pairs that converge to that boundary point for codes that have asymptotic error probability no larger than $\varepsilon$. As a stepping stone to this local notion of second-order asymptotics, we study a global notion, and establish relationships between the two. We provide a numerical example to illustrate how the angle of approach to a boundary point affects the second-order coding rate. This is the first conclusive characterization of the second-order asymptotics of a network information theory problem in which the capacity region is not a polygon.
[ { "version": "v1", "created": "Fri, 4 Oct 2013 08:20:07 GMT" }, { "version": "v2", "created": "Fri, 18 Oct 2013 12:56:40 GMT" }, { "version": "v3", "created": "Tue, 6 Oct 2015 12:02:55 GMT" } ]
2015-10-07T00:00:00
[ [ "Scarlett", "Jonathan", "" ], [ "Tan", "Vincent Y. F.", "" ] ]
new_dataset
0.982634
1411.3506
Alireza Mesri
Alireza Mesri, Mahmoud Mahdipour Pirbazari, Khayrollah Hadidi, and Abdollah Khoei
High gain two-stage amplifier with positive capacitive feedback compensation
26 pages, 12 figures, 7 tables Accepted for publication in IET Circuits, Devices and Systems
Circuits, Devices & Systems, IET (Volume:9 , Issue: 3 ), 2015
10.1049/iet-cds.2014.0139
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel topology for a high gain two-stage amplifier is proposed. The proposed circuit is designed in a way that the non-dominant pole is at output of the first stage. A positive capacitive feedback (PCF) around the second stage introduces a left half plane (LHP) zero which cancels the phase shift introduced by the non-dominant pole, considerably. The dominant pole is at the output node which means that increasing the load capacitance has minimal effect on stability. Moreover, a simple and effective method is proposed to enhance slew rate. Simulation shows that slew rate is improved by a factor of 2.44 using the proposed method. The proposed amplifier is designed in a 0.18um CMOS process. It consumes 0.86mW power from a 1.8V power supply and occupies 3038.5um2 of chip area. The DC gain is 82.7dB and gain bandwidth (GBW) is 88.9 MHz when driving a 5pF capacitive load. Also low frequency CMRR and PSRR+ are 127dB and 83.2dB, respectively. They are 24.8dB and 24.2dB at GBW frequency, which are relatively high and are other important properties of the proposed amplifier. Moreover, Simulations show convenient performance of the circuit in process corners and also presence of mismatch.
[ { "version": "v1", "created": "Thu, 13 Nov 2014 11:31:03 GMT" } ]
2015-10-07T00:00:00
[ [ "Mesri", "Alireza", "" ], [ "Pirbazari", "Mahmoud Mahdipour", "" ], [ "Hadidi", "Khayrollah", "" ], [ "Khoei", "Abdollah", "" ] ]
new_dataset
0.984008
1510.01537
Pablo Rauzy
Lionel Rivi\`ere, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage
High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures
HOST 2015: IEEE International Symposium on Hardware-Oriented Security and Trust, May 2015, Washington, United States
null
10.1109/HST.2015.7140238
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hardware and software of secured embedded systems are prone to physical attacks. In particular, fault injection attacks revealed vulnerabilities on the data and the control flow allowing an attacker to break cryptographic or secured algorithms implementations. While many research studies concentrated on successful attacks on the data flow, only a few targets the instruction flow. In this paper, we focus on electromagnetic fault injection (EMFI) on the control flow, especially on the instruction cache. We target the very widespread (smartphones, tablets, settop-boxes, health-industry monitors and sensors, etc.) ARMv7-M architecture. We describe a practical EMFI platform and present a methodology providing high control level and high reproducibility over fault injections. Indeed, we observe that a precise fault model occurs in up to 96% of the cases. We then characterize and exhibit this practical fault model on the cache that is not yet considered in the literature. We comprehensively describe its effects and show how it can be used to reproduce well known fault attacks. Finally, we describe how it can benefits attackers to mount new powerful attacks or simplify existing ones.
[ { "version": "v1", "created": "Tue, 6 Oct 2015 11:46:42 GMT" } ]
2015-10-07T00:00:00
[ [ "Rivière", "Lionel", "" ], [ "Najm", "Zakaria", "" ], [ "Rauzy", "Pablo", "" ], [ "Danger", "Jean-Luc", "" ], [ "Bringer", "Julien", "" ], [ "Sauvage", "Laurent", "" ] ]
new_dataset
0.964253
1510.01554
Markus Bajones
Markus Bajones, Daniel Wolf, Johann Prankl, Markus Vincze
Where to look first? Behaviour control for fetch-and-carry missions of service robots
Part of the Austrian Robotics Workshop 2014 proceedings
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the behaviour control of a service robot for intelligent object search in a domestic environment. A major challenge in service robotics is to enable fetch-and-carry missions that are satisfying for the user in terms of efficiency and human-oriented perception. The proposed behaviour controller provides an informed intelligent search based on a semantic segmentation framework for indoor scenes and integrates it with object recognition and grasping. Instead of manually annotating search positions in the environment, the framework automatically suggests likely locations to search for an object based on contextual information, e.g. next to tables and shelves. In a preliminary set of experiments we demonstrate that this behaviour control is as efficient as using manually annotated locations. Moreover, we argue that our approach will reduce the intensity of labour associated with programming fetch-and-carry tasks for service robots and that it will be perceived as more human-oriented.
[ { "version": "v1", "created": "Tue, 6 Oct 2015 12:43:52 GMT" } ]
2015-10-07T00:00:00
[ [ "Bajones", "Markus", "" ], [ "Wolf", "Daniel", "" ], [ "Prankl", "Johann", "" ], [ "Vincze", "Markus", "" ] ]
new_dataset
0.991293
1510.01557
Amer Mouawad
Akanksha Agrawal, Daniel Lokshtanov, Amer E. Mouawad, Saket Saurabh
Simultaneous Feedback Vertex Set: A Parameterized Perspective
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a family of graphs $\mathcal{F}$, a graph $G$, and a positive integer $k$, the $\mathcal{F}$-Deletion problem asks whether we can delete at most $k$ vertices from $G$ to obtain a graph in $\mathcal{F}$. $\mathcal{F}$-Deletion generalizes many classical graph problems such as Vertex Cover, Feedback Vertex Set, and Odd Cycle Transversal. A graph $G = (V, \cup_{i=1}^{\alpha} E_{i})$, where the edge set of $G$ is partitioned into $\alpha$ color classes, is called an $\alpha$-edge-colored graph. A natural extension of the $\mathcal{F}$-Deletion problem to edge-colored graphs is the $\alpha$-Simultaneous $\mathcal{F}$-Deletion problem. In the latter problem, we are given an $\alpha$-edge-colored graph $G$ and the goal is to find a set $S$ of at most $k$ vertices such that each graph $G_i \setminus S$, where $G_i = (V, E_i)$ and $1 \leq i \leq \alpha$, is in $\mathcal{F}$. In this work, we study $\alpha$-Simultaneous $\mathcal{F}$-Deletion for $\mathcal{F}$ being the family of forests. In other words, we focus on the $\alpha$-Simultaneous Feedback Vertex Set ($\alpha$-SimFVS) problem. Algorithmically, we show that, like its classical counterpart, $\alpha$-SimFVS parameterized by $k$ is fixed-parameter tractable (FPT) and admits a polynomial kernel, for any fixed constant $\alpha$. In particular, we give an algorithm running in $2^{O(\alpha k)}n^{O(1)}$ time and a kernel with $O(\alpha k^{3(\alpha + 1)})$ vertices. The running time of our algorithm implies that $\alpha$-SimFVS is FPT even when $\alpha \in o(\log n)$. We complement this positive result by showing that for $\alpha \in O(\log n)$, where $n$ is the number of vertices in the input graph, $\alpha$-SimFVS becomes W[1]-hard. Our positive results answer one of the open problems posed by Cai and Ye (MFCS 2014).
[ { "version": "v1", "created": "Tue, 6 Oct 2015 12:49:14 GMT" } ]
2015-10-07T00:00:00
[ [ "Agrawal", "Akanksha", "" ], [ "Lokshtanov", "Daniel", "" ], [ "Mouawad", "Amer E.", "" ], [ "Saurabh", "Saket", "" ] ]
new_dataset
0.996782
1510.01574
Gabriele Fici
Luc Boasson, Paola Bonizzoni, Clelia De Felice, Isabelle Fagnot, Gabriele Fici, Rocco Zaccagnino, Rosalba Zizza
Splicing Systems from Past to Future: Old and New Challenges
Appeared in: Discrete Mathematics and Computer Science. Papers in Memoriam Alexandru Mateescu (1952-2005). The Publishing House of the Romanian Academy, 2014. arXiv admin note: text overlap with arXiv:1112.4897 by other authors
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A splicing system is a formal model of a recombinant behaviour of sets of double stranded DNA molecules when acted on by restriction enzymes and ligase. In this survey we will concentrate on a specific behaviour of a type of splicing systems, introduced by P\u{a}un and subsequently developed by many researchers in both linear and circular case of splicing definition. In particular, we will present recent results on this topic and how they stimulate new challenging investigations.
[ { "version": "v1", "created": "Tue, 6 Oct 2015 13:49:45 GMT" } ]
2015-10-07T00:00:00
[ [ "Boasson", "Luc", "" ], [ "Bonizzoni", "Paola", "" ], [ "De Felice", "Clelia", "" ], [ "Fagnot", "Isabelle", "" ], [ "Fici", "Gabriele", "" ], [ "Zaccagnino", "Rocco", "" ], [ "Zizza", "Rosalba", "" ] ]
new_dataset
0.974776
1101.2245
Michael Goodrich
Michael T. Goodrich and Michael Mitzenmacher
Invertible Bloom Lookup Tables
contains 4 figures, showing experimental performance
null
null
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a version of the Bloom filter data structure that supports not only the insertion, deletion, and lookup of key-value pairs, but also allows a complete listing of its contents with high probability, as long the number of key-value pairs is below a designed threshold. Our structure allows the number of key-value pairs to greatly exceed this threshold during normal operation. Exceeding the threshold simply temporarily prevents content listing and reduces the probability of a successful lookup. If later entries are deleted to return the structure below the threshold, everything again functions appropriately. We also show that simple variations of our structure are robust to certain standard errors, such as the deletion of a key without a corresponding insertion or the insertion of two distinct values for a key. The properties of our structure make it suitable for several applications, including database and networking applications that we highlight.
[ { "version": "v1", "created": "Wed, 12 Jan 2011 00:30:10 GMT" }, { "version": "v2", "created": "Tue, 3 May 2011 23:29:38 GMT" }, { "version": "v3", "created": "Sun, 4 Oct 2015 00:10:28 GMT" } ]
2015-10-06T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Mitzenmacher", "Michael", "" ] ]
new_dataset
0.964541
1411.3962
David Darais
David Darais, Matthew Might, David Van Horn
Galois Transformers and Modular Abstract Interpreters
OOPSLA '15, October 25-30, 2015, Pittsburgh, PA, USA
null
10.1145/2814270.2814308
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design and implementation of static analyzers has become increasingly systematic. Yet for a given language or analysis feature, it often requires tedious and error prone work to implement an analyzer and prove it sound. In short, static analysis features and their proofs of soundness do not compose well, causing a dearth of reuse in both implementation and metatheory. We solve the problem of systematically constructing static analyzers by introducing Galois transformers: monad transformers that transport Galois connection properties. In concert with a monadic interpreter, we define a library of monad transformers that implement building blocks for classic analysis parameters like context, path, and heap (in)sensitivity. Moreover, these can be composed together independent of the language being analyzed. Significantly, a Galois transformer can be proved sound once and for all, making it a reusable analysis component. As new analysis features and abstractions are developed and mixed in, soundness proofs need not be reconstructed, as the composition of a monad transformer stack is sound by virtue of its constituents. Galois transformers provide a viable foundation for reusable and composable metatheory for program analysis. Finally, these Galois transformers shift the level of abstraction in analysis design and implementation to a level where non-specialists have the ability to synthesize sound analyzers over a number of parameters.
[ { "version": "v1", "created": "Fri, 14 Nov 2014 16:33:11 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2015 21:05:45 GMT" }, { "version": "v3", "created": "Sun, 23 Aug 2015 17:04:07 GMT" }, { "version": "v4", "created": "Wed, 26 Aug 2015 05:57:29 GMT" }, { "version": "v5", "created": "Mon, 5 Oct 2015 13:04:01 GMT" } ]
2015-10-06T00:00:00
[ [ "Darais", "David", "" ], [ "Might", "Matthew", "" ], [ "Van Horn", "David", "" ] ]
new_dataset
0.997407
1502.07545
Feng Pan Dr
Feng Pan
SAT problem and statistical distance
15 pages. arXiv admin note: text overlap with arXiv:quant-ph/0311110 by other authors without attribution
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper with two equivalent representations of the information contained by a SAT formula, the reason why string generated by succinct SAT formula can be greatly compressed is firstly presented based on Kolmogorov complexity theory. Then what strings can be greatly compressed were classified and discussed. In this way we discovered the SAT problem was composed of a basic distinguish problem: distinguish two different distributions induced under the computer with certain SAT formula ensemble. We then tried to map this problem into quantum mechanics, or the quantum version basic distinguish problem: this time two different distributions are induced under quantum mechanics. Based on the equivalence of statistical distance between probability space and Hilbert space, in the same time this distance is invariant under all unitary transformations. The quantum version basic problem cannot be efficiently solved by any quantum computer. In the worst case, any quantum computer must perform exponential times measurement in order to solve it. In the end we proposed the main theorem : The statistical distance in program space and probability space are identical. We tried to prove it using the relationship of Kolmogorov complexity and entropy. It showed there is no difference to solve the basic problem in SAT formula space or probability space. In the worst case, exponential trials must be performed to solve it. NP!=P.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 13:28:06 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2015 01:38:04 GMT" }, { "version": "v3", "created": "Tue, 22 Sep 2015 00:22:04 GMT" } ]
2015-10-06T00:00:00
[ [ "Pan", "Feng", "" ] ]
new_dataset
0.97495
1510.00726
Yoav Goldberg
Yoav Goldberg
A Primer on Neural Network Models for Natural Language Processing
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past few years, neural networks have re-emerged as powerful machine-learning models, yielding state-of-the-art results in fields such as image recognition and speech processing. More recently, neural network models started to be applied also to textual natural language signals, again with very promising results. This tutorial surveys neural network models from the perspective of natural language processing research, in an attempt to bring natural-language researchers up to speed with the neural techniques. The tutorial covers input encoding for natural language tasks, feed-forward networks, convolutional networks, recurrent networks and recursive networks, as well as the computation graph abstraction for automatic gradient computation.
[ { "version": "v1", "created": "Fri, 2 Oct 2015 20:17:33 GMT" } ]
2015-10-06T00:00:00
[ [ "Goldberg", "Yoav", "" ] ]
new_dataset
0.969061
1510.00745
Eric Orenstein
Eric C. Orenstein, Oscar Beijbom, Emily E. Peacock and Heidi M. Sosik
WHOI-Plankton- A Large Scale Fine Grained Visual Recognition Benchmark Dataset for Plankton Classification
2 pages, 1 figure, presented at the Third Workshop on Fine-Grained Visual Categorization at CVPR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Planktonic organisms are of fundamental importance to marine ecosystems: they form the basis of the food web, provide the link between the atmosphere and the deep ocean, and influence global-scale biogeochemical cycles. Scientists are increasingly using imaging-based technologies to study these creatures in their natural habit. Images from such systems provide an unique opportunity to model and understand plankton ecosystems, but the collected datasets can be enormous. The Imaging FlowCytobot (IFCB) at Woods Hole Oceanographic Institution, for example, is an \emph{in situ} system that has been continuously imaging plankton since 2006. To date, it has generated more than 700 million samples. Manual classification of such a vast image collection is impractical due to the size of the data set. In addition, the annotation task is challenging due to the large space of relevant classes, intra-class variability, and inter-class similarity. Methods for automated classification exist, but the accuracy is often below that of human experts. Here we introduce WHOI-Plankton: a large scale, fine-grained visual recognition dataset for plankton classification, which comprises over 3.4 million expert-labeled images across 70 classes. The labeled image set is complied from over 8 years of near continuous data collection with the IFCB at the Martha's Vineyard Coastal Observatory (MVCO). We discuss relevant metrics for evaluation of classification performance and provide results for a traditional method based on hand-engineered features and two methods based on convolutional neural networks.
[ { "version": "v1", "created": "Fri, 2 Oct 2015 22:06:52 GMT" } ]
2015-10-06T00:00:00
[ [ "Orenstein", "Eric C.", "" ], [ "Beijbom", "Oscar", "" ], [ "Peacock", "Emily E.", "" ], [ "Sosik", "Heidi M.", "" ] ]
new_dataset
0.999844
1510.00759
Afshin Rahimi
Afshin Rahimi, Moharram Eslami, Bahram Vazirnezhad
It is not all downhill from here: Syllable Contact Law in Persian
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Syllable contact pairs crosslinguistically tend to have a falling sonority slope a constraint which is called the Syllable Contact Law SCL In this study the phonotactics of syllable contacts in 4202 CVCCVC words of Persian lexicon is investigated The consonants of Persian were divided into five sonority categories and the frequency of all possible sonority slopes is computed both in lexicon type frequency and in corpus token frequency Since an unmarked phonological structure has been shown to diachronically become more frequent we expect to see the same pattern for syllable contact pairs with falling sonority slope The correlation of sonority categories of the two consonants in a syllable contact pair is measured using Pointwise Mutual Information
[ { "version": "v1", "created": "Sat, 3 Oct 2015 00:08:18 GMT" } ]
2015-10-06T00:00:00
[ [ "Rahimi", "Afshin", "" ], [ "Eslami", "Moharram", "" ], [ "Vazirnezhad", "Bahram", "" ] ]
new_dataset
0.999215
1510.01008
Hiram H. L\'opez
Javier de la Cruz, Elisa Gorla, Hiram H. Lopez, Alberto Ravagnani
Rank distribution of Delsarte codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In analogy with the Singleton defect for classical codes, we propose a definition of rank defect for Delsarte rank-metric codes. We characterize codes whose rank defect and dual rank defect are both zero, and prove that the rank distribution of such codes is determined by their parameters. This extends a result by Delsarte on the rank distribution of MRD codes. In the general case of codes of positive defect, we show that the rank distribution is determined by the parameters of the code, together the number of codewords of small rank. Moreover, we prove that if the rank defect of a code and its dual are both one, and the dimension satisfies a divisibility condition, then the number of minimum-rank codewords and dual minimum-rank codewords is the same. Finally, we discuss how our results specialize to Gabidulin codes.
[ { "version": "v1", "created": "Mon, 5 Oct 2015 00:50:09 GMT" } ]
2015-10-06T00:00:00
[ [ "de la Cruz", "Javier", "" ], [ "Gorla", "Elisa", "" ], [ "Lopez", "Hiram H.", "" ], [ "Ravagnani", "Alberto", "" ] ]
new_dataset
0.998299
1510.01022
Tongjiang Yan
Tongjiang Yan, Yanyan Liu, Yuhua Sun
Cyclic Codes from Two-Prime Generalized Cyclotomic Sequences of Order 6
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes have wide applications in data storage systems and communication systems. Employing two-prime Whiteman generalized cyclotomic sequences of order 6, we construct several classes of cyclic codes over the finite field GF}(q) and give their generator polynomials. And we also calculate the minimum distance of some cyclic codes and give lower bounds of the minimum distance for some other cyclic codes.
[ { "version": "v1", "created": "Mon, 5 Oct 2015 04:03:03 GMT" } ]
2015-10-06T00:00:00
[ [ "Yan", "Tongjiang", "" ], [ "Liu", "Yanyan", "" ], [ "Sun", "Yuhua", "" ] ]
new_dataset
0.999873
1510.01140
Hokky Situngkir
Hokky Situngkir
Deconstructing Bataknese Gorga Computationally
10 pages, 4 figures
BFI Working Paper Series, WP072012, 2012
null
null
cs.CG cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The carved and painted decorations in traditional Batak houses and buildings, gorga, are the source of their exoticism. There are no identical patterns of the ornaments within Batak houses and the drawings are closely related to the way ancient Batak capture the dynamicity of the growing 'tree of life', one of central things within their cosmology and mythology. The survey of ornaments of Batak houses and buildings in Northern Sumatera Indonesia has made us possible to observe the complex pattern. The fractal dimensions of the geometrical shapes in gorga are calculated and they are conjectured into 1.5-1.6, between the dimensional of a line and a plane. The way gorga is drawn is captured by using some modification to the turtle geometry of L-System model, a popular model to model the dynamics of growing plants. The result is a proposal to see Bataknese gorga as one of traditional heritage that may enrich the studies to the generative art.
[ { "version": "v1", "created": "Mon, 24 Aug 2015 07:37:22 GMT" } ]
2015-10-06T00:00:00
[ [ "Situngkir", "Hokky", "" ] ]
new_dataset
0.96843
1503.02504
Vasileios Iliopoulos DR
Vasileios Iliopoulos
The Quicksort algorithm and related topics
PhD thesis. Reference [23] was missing in first version. It now reads correctly in page 142, Section 5.6
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sorting algorithms have attracted a great deal of attention and study, as they have numerous applications to Mathematics, Computer Science and related fields. In this thesis, we first deal with the mathematical analysis of the Quicksort algorithm and its variants. Specifically, we study the time complexity of the algorithm and we provide a complete demonstration of the variance of the number of comparisons required, a known result but one whose detailed proof is not easy to read out of the literature. We also examine variants of Quicksort, where multiple pivots are chosen for the partitioning of the array. The rest of this work is dedicated to the analysis of finding the true order by further pairwise comparisons when a partial order compatible with the true order is given in advance. We discuss a number of cases where the partially ordered sets arise at random. To this end, we employ results from Graph and Information Theory. Finally, we obtain an alternative bound on the number of linear extensions when the partially ordered set arises from a random graph, and discuss the possible application of Shellsort in merging chains.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 15:04:30 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2015 23:14:27 GMT" }, { "version": "v3", "created": "Thu, 1 Oct 2015 12:47:21 GMT" }, { "version": "v4", "created": "Fri, 2 Oct 2015 12:51:33 GMT" } ]
2015-10-05T00:00:00
[ [ "Iliopoulos", "Vasileios", "" ] ]
new_dataset
0.98564
1503.05456
Luca Giuzzi DPhil
Ilaria Cardinali, Luca Giuzzi
Minimum distance of Symplectic Grassmann codes
Revised contents and biblography
Linear Algebra and its Applications 488: 124-134 (2016)
10.1016/j.laa.2015.09.031
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Symplectic Grassmann codes as projective codes defined by symplectic Grassmannians, in analogy with the orthogonal Grassmann codes introduced in [4]. Note that the Lagrangian-Grassmannian codes are a special class of Symplectic Grassmann codes. We describe the weight enumerator of the Lagrangian--Grassmannian codes of rank $2$ and $3$ and we determine the minimum distance of the line Symplectic Grassmann codes.
[ { "version": "v1", "created": "Tue, 17 Mar 2015 10:01:08 GMT" }, { "version": "v2", "created": "Mon, 30 Mar 2015 14:02:44 GMT" }, { "version": "v3", "created": "Wed, 9 Sep 2015 14:12:24 GMT" } ]
2015-10-05T00:00:00
[ [ "Cardinali", "Ilaria", "" ], [ "Giuzzi", "Luca", "" ] ]
new_dataset
0.999135
1507.08906
Laszlo Kish
Laszlo B. Kish, Claes G. Granqvist, Sunil P. Khatri, Ferdinand Peper
Zero and negative energy dissipation at information-theoretic erasure
accepted for publication and is in press at the Journal of Computational Electronics
Journal of Computational Electronics 14 (2015) 1-5
10.1007/s10825-015-0754-5
null
cs.ET
http://creativecommons.org/licenses/by/4.0/
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and it may be the reason why the brain can forget things effortlessly. We also demonstrate a new non-volatile, charge-based memory scheme wherein the erasure can be associated with even negative energy dissipation; this implies that the memory's environment is cooled during information erasure and contradicts Landauer's principle of erasure dissipation. On the other hand, writing new information into the memory always requires positive energy dissipation in our schemes. Finally, we show a simple system where even a classical erasure process yields negative energy dissipation of arbitrarily large energy.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 13:38:27 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2015 15:08:28 GMT" } ]
2015-10-05T00:00:00
[ [ "Kish", "Laszlo B.", "" ], [ "Granqvist", "Claes G.", "" ], [ "Khatri", "Sunil P.", "" ], [ "Peper", "Ferdinand", "" ] ]
new_dataset
0.992805
1510.00651
Mark Scanlon
Jason Farina, M-Tahar Kechadi and Mark Scanlon
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser
null
Journal of Digital Forensics, Security and Law (Proc. of 10th International Conference on Systematic Approaches to Digital Forensic Engineering, SADFE 2015)
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website's source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores the application, its protocol, sharing Maelstrom content and its new visitor powered "web-hosting" paradigm.
[ { "version": "v1", "created": "Fri, 2 Oct 2015 17:25:27 GMT" } ]
2015-10-05T00:00:00
[ [ "Farina", "Jason", "" ], [ "Kechadi", "M-Tahar", "" ], [ "Scanlon", "Mark", "" ] ]
new_dataset
0.998378
1510.00684
Martin Pergel
Martin Pergel
A Note on Graphs with 2 Bends
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show NP-completeness for the recognition problem of 2-line-bend graphs.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 17:55:32 GMT" } ]
2015-10-05T00:00:00
[ [ "Pergel", "Martin", "" ] ]
new_dataset
0.979873
1509.04172
Hossein Shokri Ghadikolaei
Hossein Shokri-Ghadikolaei and Carlo Fischione
Millimeter Wave Ad Hoc Networks: Noise-limited or Interference-limited?
accepted in IEEE GLOBECOM'15
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In millimeter wave (mmWave) communication systems, narrow beam operations overcome severe channel attenuations, reduce multiuser interference, and thus introduce the new concept of noise-limited mmWave wireless networks. The regime of the network, whether noise-limited or interference-limited, heavily reflects on the medium access control (MAC) layer throughput and on proper resource allocation and interference management strategies. Yet, alternating presence of these regimes and, more importantly, their dependence on the mmWave design parameters are ignored in the current approaches to mmWave MAC layer design, with the potential disastrous consequences on the throughput/delay performance. In this paper, tractable closed-form expressions for collision probability and MAC layer throughput of mmWave networks, operating under slotted ALOHA and TDMA, are derived. The new analysis reveals that mmWave networks may exhibit a non-negligible transitional behavior from a noise-limited regime to an interference-limited regime, depending on the density of the transmitters, density and size of obstacles, transmission probability, beamwidth, and transmit power. It is concluded that a new framework of adaptive hybrid resource allocation procedure, containing a proactive contention-based phase followed by a reactive contention-free one with dynamic phase durations, is necessary to cope with such transitional behavior.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 15:57:00 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2015 16:53:05 GMT" } ]
2015-10-02T00:00:00
[ [ "Shokri-Ghadikolaei", "Hossein", "" ], [ "Fischione", "Carlo", "" ] ]
new_dataset
0.997824
1510.00116
Smruti Ranjan Sarangi
Seep Goel, Pooja Aggarwal, Smruti R. Sarangi
A Wait-Free Stack
21 pages, 5 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe a novel algorithm to create a con- current wait-free stack. To the best of our knowledge, this is the first wait-free algorithm for a general purpose stack. In the past, researchers have proposed restricted wait-free implementations of stacks, lock-free implementations, and efficient universal constructions that can support wait-free stacks. The crux of our wait-free implementation is a fast pop operation that does not modify the stack top; instead, it walks down the stack till it finds a node that is unmarked. It marks it but does not delete it. Subsequently, it is lazily deleted by a cleanup operation. This operation keeps the size of the stack in check by not allowing the size of the stack to increase beyond a factor of W as compared to the actual size. All our operations are wait-free and linearizable.
[ { "version": "v1", "created": "Thu, 1 Oct 2015 06:14:42 GMT" } ]
2015-10-02T00:00:00
[ [ "Goel", "Seep", "" ], [ "Aggarwal", "Pooja", "" ], [ "Sarangi", "Smruti R.", "" ] ]
new_dataset
0.989673
1510.00322
Oya Rieger
Oya Y. Rieger
Sustainability: Scholarly Repository as an Enterprise
null
ASIS&T Bulletin, October/November 2012, Volume 39, Number 1
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The expanding need for an open information sharing infrastructure to promote scholarly communication led to the pioneering establishment of arXiv.org, now maintained by the Cornell University Library. To be sustainable, the repository requires careful, long term planning for services, management and funding. The library is developing a sustainability model for arXiv.org, based on voluntary contributions and the ongoing participation and support of 200 libraries and research laboratories around the world. The sustainability initiative is based on a membership model and builds on arXiv's technical, service, financial and policy infrastructure. Five principles for sustainability drive development, starting with deep integration into the scholarly community. Also key are a clearly defined mandate and governance structure, a stable yet innovative technology platform, systematic creation of content policies and strong business planning strategies. Repositories like arXiv must consider usability and life cycle alongside values and trends in scholarly communication. To endure, they must also support and enhance their service by securing and managing resources and demonstrating responsible stewardship.
[ { "version": "v1", "created": "Thu, 1 Oct 2015 17:25:25 GMT" } ]
2015-10-02T00:00:00
[ [ "Rieger", "Oya Y.", "" ] ]
new_dataset
0.992086
1405.1499
Abdul Quamar
Abdul Quamar and Amol Deshpande and Jimmy Lin
NScale: Neighborhood-centric Large-Scale Graph Analytics in the Cloud
26 pages, 15 figures, 5 tables
null
null
null
cs.DB cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is an increasing interest in executing complex analyses over large graphs, many of which require processing a large number of multi-hop neighborhoods or subgraphs. Examples include ego network analysis, motif counting, personalized recommendations, and others. These tasks are not well served by existing vertex-centric graph processing frameworks, where user programs are only able to directly access the state of a single vertex. This paper introduces NSCALE, a novel end-to-end graph processing framework that enables the distributed execution of complex subgraph-centric analytics over large-scale graphs in the cloud. NSCALE enables users to write programs at the level of subgraphs rather than at the level of vertices. Unlike most previous graph processing frameworks, which apply the user program to the entire graph, NSCALE allows users to declaratively specify subgraphs of interest. Our framework includes a novel graph extraction and packing (GEP) module that utilizes a cost-based optimizer to partition and pack the subgraphs of interest into memory on as few machines as possible. The distributed execution engine then takes over and runs the user program in parallel, while respecting the scope of the various subgraphs. Our experimental results show orders-of-magnitude improvements in performance and drastic reductions in the cost of analytics compared to vertex-centric approaches.
[ { "version": "v1", "created": "Wed, 7 May 2014 03:41:53 GMT" }, { "version": "v2", "created": "Fri, 14 Nov 2014 20:17:45 GMT" }, { "version": "v3", "created": "Wed, 30 Sep 2015 12:44:58 GMT" } ]
2015-10-01T00:00:00
[ [ "Quamar", "Abdul", "" ], [ "Deshpande", "Amol", "" ], [ "Lin", "Jimmy", "" ] ]
new_dataset
0.998758
1509.08955
Kensworth Subratie
Kensworth Subratie, Saumitra Aditya, Renato Figueiredo, Cayelan C. Carey and Paul Hanson
GRAPLEr: A Distributed Collaborative Environment for Lake Ecosystem Modeling that Integrates Overlay Networks, High-throughput Computing, and Web Services
8 pages, 7 figures. PRAGMA29
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The GLEON Research And PRAGMA Lake Expedition -- GRAPLE -- is a collaborative effort between computer science and lake ecology researchers. It aims to improve our understanding and predictive capacity of the threats to the water quality of our freshwater resources, including climate change. This paper presents GRAPLEr, a distributed computing system used to address the modeling needs of GRAPLE researchers. GRAPLEr integrates and applies overlay virtual network, high-throughput computing, and Web service technologies in a novel way. First, its user-level IP-over-P2P (IPOP) overlay network allows compute and storage resources distributed across independently-administered institutions (including private and public clouds) to be aggregated into a common virtual network, despite the presence of firewalls and network address translators. Second, resources aggregated by the IPOP virtual network run unmodified high-throughput computing middleware (HTCondor) to enable large numbers of model simulations to be executed concurrently across the distributed computing resources. Third, a Web service interface allows end users to submit job requests to the system using client libraries that integrate with the R statistical computing environment. The paper presents the GRAPLEr architecture, describes its implementation and reports on its performance for batches of General Lake Model (GLM) simulations across three cloud infrastructures (University of Florida, CloudLab, and Microsoft Azure).
[ { "version": "v1", "created": "Tue, 29 Sep 2015 21:17:56 GMT" } ]
2015-10-01T00:00:00
[ [ "Subratie", "Kensworth", "" ], [ "Aditya", "Saumitra", "" ], [ "Figueiredo", "Renato", "" ], [ "Carey", "Cayelan C.", "" ], [ "Hanson", "Paul", "" ] ]
new_dataset
0.998098
1509.09057
Murad Kablan
Murad Kablan, Carlee Joe-Won, Sangtae Ha, Hani Jamjoom, Eric Keller
The Cloud Needs a Reputation System
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's cloud apps are built from many diverse services that are managed by different parties. At the same time, these parties, which consume and/or provide services, continue to rely on arcane static security and entitlements models. In this paper, we introduce Seit, an inter-tenant framework that manages the interactions between cloud services. Seit is a software-defined reputation-based framework. It consists of two primary components: (1) a set of integration and query interfaces that can be easily integrated into cloud and service providers' management stacks, and (2) a controller that maintains reputation information using a mechanism that is adaptive to the highly dynamic environment of the cloud. We have fully implemented Seit, and integrated it into an SDN controller, a load balancer, a cloud service broker, an intrusion detection system, and a monitoring framework. We evaluate the efficacy of Seit using both an analytical model and a Mininet-based emulated environment. Our analytical model validate the isolation and stability properties of Seit. Using our emulated environment, we show that Seit can provide improved security by isolating malicious tenants, reduced costs by adapting the infrastructure without compromising security, and increased revenues for high quality service providers by enabling reputation to impact discovery.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 08:13:35 GMT" } ]
2015-10-01T00:00:00
[ [ "Kablan", "Murad", "" ], [ "Joe-Won", "Carlee", "" ], [ "Ha", "Sangtae", "" ], [ "Jamjoom", "Hani", "" ], [ "Keller", "Eric", "" ] ]
new_dataset
0.950735
1509.09089
Yanwei Pang
Yanwei Pang, Li Ye, Xuelong Li, and Jing Pan
Moving Object Detection in Video Using Saliency Map and Subspace Learning
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Moving object detection is a key to intelligent video analysis. On the one hand, what moves is not only interesting objects but also noise and cluttered background. On the other hand, moving objects without rich texture are prone not to be detected. So there are undesirable false alarms and missed alarms in many algorithms of moving object detection. To reduce the false alarms and missed alarms, in this paper, we propose to incorporate a saliency map into an incremental subspace analysis framework where the saliency map makes estimated background has less chance than foreground (i.e., moving objects) to contain salient objects. The proposed objective function systematically takes account into the properties of sparsity, low-rank, connectivity, and saliency. An alternative minimization algorithm is proposed to seek the optimal solutions. Experimental results on the Perception Test Images Sequences demonstrate that the proposed method is effective in reducing false alarms and missed alarms.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 09:13:20 GMT" } ]
2015-10-01T00:00:00
[ [ "Pang", "Yanwei", "" ], [ "Ye", "Li", "" ], [ "Li", "Xuelong", "" ], [ "Pan", "Jing", "" ] ]
new_dataset
0.978144
1509.09092
David Monniaux
David Monniaux (VERIMAG - IMAG), Laure Gonnord (LIP)
An encoding of array verification problems into array-free Horn clauses
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatically verifying safety properties of programs is hard, and it is even harder if the program acts upon arrays or other forms of maps. Many approaches exist for verifying programs operating upon Boolean and integer values (e.g. abstract interpretation, counterexample-guided abstraction refinement using interpolants), but transposing them to array properties has been fraught with difficulties.In contrast to most preceding approaches, we do not introduce a new abstract domain or a new interpolation procedure for arrays. Instead, we generate an abstraction as a scalar problem and feed it to a preexisting solver, with tunable precision.Our transformed problem is expressed using Horn clauses, a common format with clear and unambiguous logical semantics for verification problems. An important characteristic of our encoding is that it creates a nonlinear Horn problem, with tree unfoldings, even though following "flatly" the control-graph structure ordinarily yields a linear Horn problem, with linear unfoldings. That is, our encoding cannot be expressed by an encoding into another control-flow graph problem, and truly leverages the capacity of the Horn clause format.We illustrate our approach with a completely automated proof of the functional correctness of selection sort.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 09:29:09 GMT" } ]
2015-10-01T00:00:00
[ [ "Monniaux", "David", "", "VERIMAG - IMAG" ], [ "Gonnord", "Laure", "", "LIP" ] ]
new_dataset
0.97966