id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1509.09138
Manish Kumar
Manish Kumar, Shubham Kaul
Technical Report on Intruder Detection and Alert System
Submitted to CII Innovation 2015, India and NI Engineering Impact Awards 2015, India. arXiv admin note: text overlap with arXiv:1508.03479
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a smart trespasser detection and alert system which aims to increase the amount of security as well as the likelihood of positively identifying or stopping trespassers and intruders as compared to other commonly deployed home security system. Using multiple sensors, this system can gauge the extent of danger exhibited by a person or animal in or around the home premises, and can forward certain critical information regarding the same to home owners as well as other specified persons such as relevant security authorities.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 12:00:23 GMT" } ]
2015-10-01T00:00:00
[ [ "Kumar", "Manish", "" ], [ "Kaul", "Shubham", "" ] ]
new_dataset
0.99277
1509.09187
Xiuyuan Cheng
Xiuyuan Cheng, Xu Chen, Stephane Mallat
Deep Haar Scattering Networks
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An orthogonal Haar scattering transform is a deep network, computed with a hierarchy of additions, subtractions and absolute values, over pairs of coefficients. It provides a simple mathematical model for unsupervised deep network learning. It implements non-linear contractions, which are optimized for classification, with an unsupervised pair matching algorithm, of polynomial complexity. A structured Haar scattering over graph data computes permutation invariant representations of groups of connected points in the graph. If the graph connectivity is unknown, unsupervised Haar pair learning can provide a consistent estimation of connected dyadic groups of points. Classification results are given on image data bases, defined on regular grids or graphs, with a connectivity which may be known or unknown.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 14:20:29 GMT" } ]
2015-10-01T00:00:00
[ [ "Cheng", "Xiuyuan", "" ], [ "Chen", "Xu", "" ], [ "Mallat", "Stephane", "" ] ]
new_dataset
0.970662
1509.09211
Jarek Duda dr
Jarek Duda
Normalized rotation shape descriptors and lossy compression of molecular shape
10 pages, 10 figures
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a common need to search of molecular databases for compounds resembling some shape, what suggests having similar biological activity while searching for new drugs. The large size of the databases requires fast methods for such initial screening, for example based on feature vectors constructed to fulfill the requirement that similar molecules should correspond to close vectors. Ultrafast Shape Recognition (USR) is a popular approach of this type. It uses vectors of 12 real number as 3 first moments of distances from 4 emphasized points. These coordinates might contain unnecessary correlations and does not allow to reconstruct the approximated shape. In contrast, spherical harmonic (SH) decomposition uses orthogonal coordinates, suggesting their independence and so lager informational content of the feature vector. There is usually considered rotationally invariant SH descriptors, what means discarding of some essential information. This article discusses framework for descriptors with normalized rotation, for example by using principal component analysis (PCA-SH). As one of the most interesting are ligands which have to slide into a protein, we will introduce descriptors optimized for such flat elongated shapes. Bent deformed cylinder (BDC) describes the molecule as a cylinder which was first bent, then deformed such that its cross-sections became ellipses of evolving shape. Legendre polynomials are used to describe the central axis of such bent cylinder. Additional polynomials are used to define evolution of such elliptic cross-section along the main axis. There will be also discussed bent cylindrical harmonics (BCH), which uses cross-sections described by cylindrical harmonics instead of ellipses. All these normalized rotation descriptors allow to reconstruct (decode) the approximated representation of the shape, hence can be also used for lossy compression purposes.
[ { "version": "v1", "created": "Wed, 30 Sep 2015 15:11:33 GMT" } ]
2015-10-01T00:00:00
[ [ "Duda", "Jarek", "" ] ]
new_dataset
0.977573
1408.5069
Amitabha Bagchi
Amitabha Bagchi, Cristina Pinotti, Sainyam Galhotra, Tarun Mangla
Optimal Radius for Connectivity in Duty-Cycled Wireless Sensor Networks
To appear in ACM Transactions on Sensor Networks. Brief version appeared in Proc. of ACM MSWIM 2013
ACM T Sensor Network 11(2):36, (February 2015)
10.1145/2663353
null
cs.NI math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the condition on transmission radius needed to achieve connectivity in duty-cycled wireless sensor networks (briefly, DC-WSN). First, we settle a conjecture of Das et. al. (2012) and prove that the connectivity condition on Random Geometric Graphs (RGG), given by Gupta and Kumar (1989), can be used to derive a weak sufficient condition to achieve connectivity in DC-WSN. To find a stronger result, we define a new vertex-based random connection model which is of independent interest. Following a proof technique of Penrose (1991) we prove that when the density of the nodes approaches infinity then a finite component of size greater than 1 exists with probability 0 in this model. We use this result to obtain an optimal condition on node transmission radius which is both necessary and sufficient to achieve connectivity and is hence optimal. The optimality of such a radius is also tested via simulation for two specific duty-cycle schemes, called the contiguous and the random selection duty-cycle scheme. Finally, we design a minimum-radius duty-cycling scheme that achieves connectivity with a transmission radius arbitrarily close to the one required in Random Geometric Graphs. The overhead in this case is that we have to spend some time computing the schedule.
[ { "version": "v1", "created": "Thu, 21 Aug 2014 17:03:53 GMT" }, { "version": "v2", "created": "Thu, 28 Aug 2014 13:13:44 GMT" } ]
2015-09-30T00:00:00
[ [ "Bagchi", "Amitabha", "" ], [ "Pinotti", "Cristina", "" ], [ "Galhotra", "Sainyam", "" ], [ "Mangla", "Tarun", "" ] ]
new_dataset
0.988312
1504.06247
Tiben Che
Tiben Che, Jingwei Xu and Gwan Choi
TC: Throughput Centric Successive Cancellation Decoder Hardware Implementation for Polar Codes
submitted to ICASSP 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a hardware architecture of fast simplified successive cancellation (fast-SSC) algorithm for polar codes, which significantly reduces the decoding latency and dramatically increases the throughput. Algorithmically, fast-SSC algorithm suffers from the fact that its decoder scheduling and the consequent architecture depends on the code rate; this is a challenge for rate-compatible system. However, by exploiting the homogeneousness between the decoding processes of fast constituent polar codes and regular polar codes, the presented design is compatible with any rate. The scheduling plan and the intendedly designed process core are also described. Results show that, compared with the state-of-art decoder, proposed design can achieve at least 60% latency reduction for the codes with length N = 1024. By using Nangate FreePDK 45nm process, proposed design can reach throughput up to 5.81 Gbps and 2.01 Gbps for (1024, 870) and (1024, 512) polar code, respectively.
[ { "version": "v1", "created": "Thu, 23 Apr 2015 16:37:23 GMT" }, { "version": "v2", "created": "Mon, 28 Sep 2015 20:02:37 GMT" } ]
2015-09-30T00:00:00
[ [ "Che", "Tiben", "" ], [ "Xu", "Jingwei", "" ], [ "Choi", "Gwan", "" ] ]
new_dataset
0.999383
1509.04221
Sarika Kushwaha
Pramod Kumar Kewat, Sarika Kushwaha
Cyclic codes over the ring $\mathbb{F}_p[u,v,w]/\langle u^2, v^2, w^2, uv-vu, vw-wv, uw-wu \rangle$
Rewriting of Section 4. arXiv admin note: substantial text overlap with arXiv:1508.07034, arXiv:1405.5981
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate cyclic codes over the ring $ \mathbb{F}_p[u,v,w]\langle u^2,$ $v^2, w^2$, $uv-vu, vw-wv, uw-wu \rangle$, where $p$ is a prime number. Which is a part of family of Frobenius rings. We find a unique set of generators for these codes and characterize the free cyclic codes. We also study the rank and the Hamming distance of these codes. We also constructs some good $p-ary$ codes as the Gray images of these cyclic codes.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 17:45:02 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2015 13:39:45 GMT" } ]
2015-09-30T00:00:00
[ [ "Kewat", "Pramod Kumar", "" ], [ "Kushwaha", "Sarika", "" ] ]
new_dataset
0.999477
1509.08388
Chawanat Nakasan
Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida, Putchong Uthayopas
A Simple Multipath OpenFlow Controller using topology-based algorithm for Multipath TCP
8 pages, submitted for PRAGMA-ICDS 2015
null
10.6084/m9.figshare.1558361
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
Multipath TCP, or MPTCP, is a widely-researched mechanism that allows a single application-level connection to be split to more than one TCP stream, and consequently more than one network interface, as opposed to the traditional TCP/IP model. Being a transport layer protocol, MPTCP can easily interact between the application using it and the network supporting it. However, MPTCP does not have control of its own route. Default IP routing behavior generally takes all traffic through the shortest or best-metric path. However, this behavior may actually cause paths to collide with each other, creating contention for bandwidth in a number of edges. This can result in a bottleneck which limits the throughput of the network. Therefore, a multipath routing mechanism is necessary to ensure smooth operation of MPTCP. We created smoc, a Simple Multipath OpenFlow Controller, that uses only topology information of the network to avoid collision where possible. Evaluation of smoc in a virtual local-area and a physical wide-area SDNs showed favorable results as smoc provided better performance than simple or spanning-tree routing mechanisms.
[ { "version": "v1", "created": "Mon, 28 Sep 2015 16:49:30 GMT" } ]
2015-09-30T00:00:00
[ [ "Nakasan", "Chawanat", "" ], [ "Ichikawa", "Kohei", "" ], [ "Iida", "Hajimu", "" ], [ "Uthayopas", "Putchong", "" ] ]
new_dataset
0.998908
1509.08647
Eduardo M. Pereira
Eduardo M. Pereira, Jaime S. Cardoso, Ricardo Morla
Long-Range Trajectories from Global and Local Motion Representations
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motion is a fundamental cue for scene analysis and human activity understan- ding in videos. It can be encoded in trajectories for tracking objects and for action recognition, or in form of flow to address behaviour analysis in crowded scenes. Each approach can only be applied on limited scenarios. We propose a motion-based system that represents the spatial and temporal features of the flow in terms of long-range trajectories. The novelty resides on the system formulation, its generic approach to handle scene variability and motion variations, motion integration from local and global representations, and the resulting long-range trajectories that overcome trajectory-based approach problems. We report the results and conclusions that state its pertinence on different scenarios, comparing and correlating the extracted trajectories of individual pedestrians, manually annotated. We also propose an evaluation framework and stress the diverse system characteristics that can be used for human activity tasks, namely on motion segmentation.
[ { "version": "v1", "created": "Tue, 29 Sep 2015 09:02:57 GMT" } ]
2015-09-30T00:00:00
[ [ "Pereira", "Eduardo M.", "" ], [ "Cardoso", "Jaime S.", "" ], [ "Morla", "Ricardo", "" ] ]
new_dataset
0.987615
1401.3682
Minglai Cai
Holger Boche, Minglai Cai, and Christian Deppe
Broadcast Classical-Quantum Capacity Region of Two-Phase Bidirectional Relaying Channel
null
Quantum Information Processing: Volume 14, Issue 10 (2015), Page 3879-3897
10.1007/s11128-015-1065-2
null
cs.IT math.IT math.QA quant-ph
http://creativecommons.org/licenses/by/4.0/
We study a three-node quantum network which enables bidirectional communication between two nodes with a half-duplex relay node. A decode-and-forward protocol is used to perform the communication in two phases. In the first phase, the messages of two nodes are transmitted to the relay node. In the second phase, the relay node broadcasts a re-encoded composition to the two nodes. We determine the capacity region of the broadcast phase.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 17:29:23 GMT" }, { "version": "v2", "created": "Tue, 21 Jan 2014 10:27:07 GMT" }, { "version": "v3", "created": "Mon, 27 Jul 2015 13:02:18 GMT" }, { "version": "v4", "created": "Mon, 28 Sep 2015 15:23:00 GMT" } ]
2015-09-29T00:00:00
[ [ "Boche", "Holger", "" ], [ "Cai", "Minglai", "" ], [ "Deppe", "Christian", "" ] ]
new_dataset
0.999307
1412.3480
M. H. van Emden
M.H. van Emden
Logic programming beyond Prolog
19 pages, 5 figures
null
null
DCS-355-IR
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A logic program is an executable specification. For example, merge sort in pure Prolog is a logical formula, yet shows creditable performance on long linked lists. But such executable specifications are a compromise: the logic is distorted by algorithmic considerations, yet only indirectly executable via an abstract machine. This paper introduces relational programming, a method that solves the difficulty with logic programming by a separation of concerns. It requires three texts: (1) the axioms, a logical formula that specifies the problem and is not compromised by algorithmic considerations, (2) the theorem, a logical formula that expresses the idea of the algorithm and follows from the axioms, and (3) the code, a transcription of the theorem to a procedural language. Correctness of the code relies on the logical relationship of the theorem with the axioms and relies on an accurate transcription of the theorem to the procedural language. Sorting is an example where relational programming has the advantage of a higher degree of abstractness: the data to be sorted can be any data type in C++ (the procedural language we use in our examples) that satisfies the axioms of linear order, while the pure-Prolog version is limited to data structures in the form of linked cells. We show another advantage of relational programs: they have a model-theoretic and fixpoint semantics equivalent to each other and analogous to those of pure Prolog programs.
[ { "version": "v1", "created": "Wed, 10 Dec 2014 21:45:04 GMT" }, { "version": "v2", "created": "Tue, 23 Dec 2014 04:27:31 GMT" }, { "version": "v3", "created": "Sat, 26 Sep 2015 01:43:26 GMT" } ]
2015-09-29T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
new_dataset
0.990067
1412.7415
Jestin Joy
Jestin Joy, Kannan Balakrishnan
A prototype Malayalam to Sign Language Automatic Translator
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Sign language, which is a medium of communication for deaf people, uses manual communication and body language to convey meaning, as opposed to using sound. This paper presents a prototype Malayalam text to sign language translation system. The proposed system takes Malayalam text as input and generates corresponding Sign Language. Output animation is rendered using a computer generated model. This system will help to disseminate information to the deaf people in public utility places like railways, banks, hospitals etc. This will also act as an educational tool in learning Sign Language.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 15:51:41 GMT" }, { "version": "v2", "created": "Sat, 26 Sep 2015 04:52:42 GMT" } ]
2015-09-29T00:00:00
[ [ "Joy", "Jestin", "" ], [ "Balakrishnan", "Kannan", "" ] ]
new_dataset
0.999837
1505.00880
Hang Su
Hang Su, Subhransu Maji, Evangelos Kalogerakis, Erik Learned-Miller
Multi-view Convolutional Neural Networks for 3D Shape Recognition
v1: Initial version. v2: An updated ModelNet40 training/test split is used; results with low-rank Mahalanobis metric learning are added. v3 (ICCV 2015): A second camera setup without the upright orientation assumption is added; some accuracy and mAP numbers are changed slightly because a small issue in mesh rendering related to specularities is fixed
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A longstanding question in computer vision concerns the representation of 3D shapes for recognition: should 3D shapes be represented with descriptors operating on their native 3D formats, such as voxel grid or polygon mesh, or can they be effectively represented with view-based descriptors? We address this question in the context of learning to recognize 3D shapes from a collection of their rendered views on 2D images. We first present a standard CNN architecture trained to recognize the shapes' rendered views independently of each other, and show that a 3D shape can be recognized even from a single view at an accuracy far higher than using state-of-the-art 3D shape descriptors. Recognition rates further increase when multiple views of the shapes are provided. In addition, we present a novel CNN architecture that combines information from multiple views of a 3D shape into a single and compact shape descriptor offering even better recognition performance. The same architecture can be applied to accurately recognize human hand-drawn sketches of shapes. We conclude that a collection of 2D views can be highly informative for 3D shape recognition and is amenable to emerging CNN architectures and their derivatives.
[ { "version": "v1", "created": "Tue, 5 May 2015 04:51:19 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2015 18:16:01 GMT" }, { "version": "v3", "created": "Sun, 27 Sep 2015 20:42:16 GMT" } ]
2015-09-29T00:00:00
[ [ "Su", "Hang", "" ], [ "Maji", "Subhransu", "" ], [ "Kalogerakis", "Evangelos", "" ], [ "Learned-Miller", "Erik", "" ] ]
new_dataset
0.998868
1509.02010
Alex Olieman
Alex Olieman, Jaap Kamps, and Rosa Merino Claros
LocLinkVis: A Geographic Information Retrieval-Based System for Large-Scale Exploratory Search
SEM'15
Proc. Posters and Demos Track of 11th Int. Conf. on Semantic Systems (2015) 30-33
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present LocLinkVis (Locate-Link-Visualize); a system which supports exploratory information access to a document collection based on geo-referencing and visualization. It uses a gazetteer which contains representations of places ranging from countries to buildings, and that is used to recognize toponyms, disambiguate them into places, and to visualize the resulting spatial footprints.
[ { "version": "v1", "created": "Mon, 7 Sep 2015 12:36:19 GMT" }, { "version": "v2", "created": "Sat, 26 Sep 2015 15:16:54 GMT" } ]
2015-09-29T00:00:00
[ [ "Olieman", "Alex", "" ], [ "Kamps", "Jaap", "" ], [ "Claros", "Rosa Merino", "" ] ]
new_dataset
0.999761
1509.08071
Hsin-Mu Tsai
Hao-Min Lin and Hsin-Mu Tsai and Mate Boban
Scooter-to-X Communications: Antenna Placement, Human Body Shadowing, and Channel Modeling
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In countries such as Taiwan, with a high percentage of scooters, scooter-related accidents are responsible for most injuries and deaths of all traffic accidents. One viable approach to reduce the number of accidents is to utilize short-range wireless communications between the scooter and other vehicles. This would help neighboring vehicles to detect the scooter and vice-versa, thus reducing the probability of a collision. In this paper, we perform extensive measurements to characterize communication links between a scooter and other vehicles. Our results suggest that, when the line-of-sight propagation path is blocked by the body of the scooter driver (and possibly also a passenger), shadowing of the human body results in significant signal attenuation, ranging from 9 to 18 dB on average, presenting challenging channel characteristics unique to scooters. In addition, we perform simulations, which show that it is imperative to incorporate the body shadowing effect to obtain realistic simulation results. We also develop a model to determine whether human body shadowing is in effect, given the relative positions of the transmitter and the receiver.
[ { "version": "v1", "created": "Sun, 27 Sep 2015 09:02:41 GMT" } ]
2015-09-29T00:00:00
[ [ "Lin", "Hao-Min", "" ], [ "Tsai", "Hsin-Mu", "" ], [ "Boban", "Mate", "" ] ]
new_dataset
0.996894
1509.08194
Abhishek Sinha
Abhishek Sinha, Pradeepkumar Mani, Jie Liu, Ashley Flavel and David A. Maltz
Distributed Load Management in Anycast-based CDNs
To appear in Allerton, 2015
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anycast is an internet addressing protocol where multiple hosts share the same IP-address. A popular architecture for modern Content Distribution Networks (CDNs) for geo-replicated HTTP-services consists of multiple layers of proxy nodes for service and co-located DNS-servers for load-balancing on different proxies. Both the proxies and the DNS-servers use anycast addressing, which offers simplicity of design and high availability of service at the cost of partial loss of routing control. Due to the very nature of anycast, load-management decisions by a co-located DNS-server also affects loads at nearby proxies in the network. This makes the problem of distributed load management highly challenging. In this paper, we propose an analytical framework to formulate and solve the load-management problem in this context. We consider two distinct algorithms. In the first half of the paper, we pose the load-management problem as a convex optimization problem. Following a dual decomposition technique, we propose a fully-distributed load management algorithm by introducing FastControl packets. This algorithm utilizes the underlying anycast mechanism itself to enable effective coordination among the nodes, thus obviating the need for any external control channel. In the second half of the paper, we consider an alternative greedy load-management heuristic, currently in production in a major commercial CDN. We study its dynamical characteristics and analytically identify its operational and stability properties. Finally, we critically evaluate both the algorithms and explore their optimality-vs-complexity trade-off using trace-driven simulations.
[ { "version": "v1", "created": "Mon, 28 Sep 2015 04:47:05 GMT" } ]
2015-09-29T00:00:00
[ [ "Sinha", "Abhishek", "" ], [ "Mani", "Pradeepkumar", "" ], [ "Liu", "Jie", "" ], [ "Flavel", "Ashley", "" ], [ "Maltz", "David A.", "" ] ]
new_dataset
0.999118
1509.08215
Hosny Abbas
Hosny Abbas, Samir Shaheen, Mohammed Amin
Adaptive Agent-Based SCADA System
10
Int'l Journal of Computing, Communications & Instrumentation Engg. (IJCCIE) Vol. 2, Issue 1 (2015) ISSN 2349-1469 EISSN 2349-1477
null
null
cs.SY cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern supervisory control and data acquisition (SCADA) systems comprise variety of industrial equipment such as physical control processes, logical control systems, communication networks, computers, and communication protocols. They are concerned with control and supervision of production control processes. Modern SCADA networks contain highly distributed information, control, and location. Moreover, they contain large number of heterogeneous components situated in highly changing and uncertain environments. As a result, engineering modern SCADA is a challenging issue and conventional engineering approaches are no longer suitable for them because of their increasing complexity and highly distribution. In this research, Multi-Agent Systems (MAS) are used to enable building adaptive agent-based SCADA system by modeling system components as agents in the micro level and as organizations or societies of agents in the macro level. A prototype has been implemented and evaluated within a simulation environment for demonstrating the adaptive behavior of the system-to-be, which results in continuous improvement of system performance.
[ { "version": "v1", "created": "Mon, 28 Sep 2015 07:05:12 GMT" } ]
2015-09-29T00:00:00
[ [ "Abbas", "Hosny", "" ], [ "Shaheen", "Samir", "" ], [ "Amin", "Mohammed", "" ] ]
new_dataset
0.979126
1509.08257
Tingshao Zhu
Zhen Li, Jianjun Xu, Tingshao Zhu
Recognition of Brain Waves of Left and Right Hand Movement Imagery with Portable Electroencephalographs
13 pages,4 figures,4 tables. arXiv admin note: substantial text overlap with arXiv:1509.07642
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the development of the modern society, mind control applied to both the recovery of disabled individuals and auxiliary control of normal people has obtained great attention in numerous researches. In our research, we attempt to recognize the brain waves of left and right hand movement imagery with portable electroencephalographs. Considering the inconvenience of wearing traditional multiple-electrode electroencephalographs, we choose Muse to collect data which is a portable headband launched lately with a number of useful functions and channels and it is much easier for the public to use. Additionally, previous researches generally focused on discrimination of EEG of left and right hand movement imagery by using data from C3 and C4 electrodes which locate on the top of the head. However, we choose the gamma wave channels of F7 and F8 and obtain data when subjects imagine their left or right hand to move with their eyeballs rotated in the corresponding direction. With the help of the Common Space Pattern algorithm to extract features of brain waves between left and right hand movement imagery, we make use of the Support Vector Machine to classify different brain waves. Traditionally, the accuracy rate of classification was approximately 90% using the EEG data from C3 and C4 electrode poles; however, the accuracy rate reaches 95.1% by using the gamma wave data from F7 and F8 in our experiment. Finally, we design a plane program in Python where a plane can be controlled to go left or right when users imagine their left or right hand to move. 8 subjects are tested and all of them can control the plane flexibly which reveals that our model can be applied to control hardware which is useful for disabled individuals and normal people.
[ { "version": "v1", "created": "Mon, 28 Sep 2015 09:58:55 GMT" } ]
2015-09-29T00:00:00
[ [ "Li", "Zhen", "" ], [ "Xu", "Jianjun", "" ], [ "Zhu", "Tingshao", "" ] ]
new_dataset
0.998026
1509.08439
Sanath Narayan
Sanath Narayan, Kalpathi R. Ramakrishnan
Hyper-Fisher Vectors for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel encoding scheme combining Fisher vector and bag-of-words encodings has been proposed for recognizing action in videos. The proposed Hyper-Fisher vector encoding is sum of local Fisher vectors which are computed based on the traditional Bag-of-Words (BoW) encoding. Thus, the proposed encoding is simple and yet an effective representation over the traditional Fisher Vector encoding. By extensive evaluation on challenging action recognition datasets, viz., Youtube, Olympic Sports, UCF50 and HMDB51, we show that the proposed Hyper-Fisher Vector encoding improves the recognition performance by around 2-3% compared to the improved Fisher Vector encoding. We also perform experiments to show that the performance of the Hyper-Fisher Vector is robust to the dictionary size of the BoW encoding.
[ { "version": "v1", "created": "Mon, 28 Sep 2015 19:25:34 GMT" } ]
2015-09-29T00:00:00
[ [ "Narayan", "Sanath", "" ], [ "Ramakrishnan", "Kalpathi R.", "" ] ]
new_dataset
0.991431
1010.5624
Aline Parreau
Louis Esperet (G-SCOP), Sylvain Gravier (IF), Mickael Montassier (LaBRI), Pascal Ochem (LRI), Aline Parreau (IF)
Locally identifying coloring of graphs
21 pages
Electron. J. Combin. 19(2) (2012), #P40
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of locally identifying coloring of a graph. A proper vertex-coloring c of a graph G is said to be locally identifying, if for any adjacent vertices u and v with distinct closed neighborhood, the sets of colors that appear in the closed neighborhood of u and v are distinct. Let $\chi_{lid}(G)$ be the minimum number of colors used in a locally identifying vertex-coloring of G. In this paper, we give several bounds on $\chi_{lid}$ for different families of graphs (planar graphs, some subclasses of perfect graphs, graphs with bounded maximum degree) and prove that deciding whether $\chi_{lid}(G)=3$ for a subcubic bipartite graph $G$ with large girth is an NP-complete problem.
[ { "version": "v1", "created": "Wed, 27 Oct 2010 09:34:56 GMT" }, { "version": "v2", "created": "Sat, 5 May 2012 05:31:30 GMT" } ]
2015-09-28T00:00:00
[ [ "Esperet", "Louis", "", "G-SCOP" ], [ "Gravier", "Sylvain", "", "IF" ], [ "Montassier", "Mickael", "", "LaBRI" ], [ "Ochem", "Pascal", "", "LRI" ], [ "Parreau", "Aline", "", "IF" ] ]
new_dataset
0.959585
1509.07326
Pascal Potvin
Pascal Potvin, Mario Bonja, Gordon Bailey, Pierre Busnel
An IMS DSL Developed at Ericsson
19 pages, 2 figures, 1 table, oral presentation at SDL 2013: Model-Driven Dependability Engineering conference
SDL 2013: Model-Driven Dependability Engineering Volume 7916 of the series Lecture Notes in Computer Science pp 144-162
10.1007/978-3-642-38911-5
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present how we created a Domain Specific Language (DSL) dedicated to IP Multimedia Subsystem (IMS) at Ericsson. First, we introduce IMS and how developers are burdened by its complexity when integrating it in their application. Then we describe the principles we followed to create our new IMS DSL from its core in the Scala language to its syntax. We then present how we integrated it in two existing projects and show how it can save time for developers and how readable the syntax of the IMS DSL is.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 11:46:20 GMT" } ]
2015-09-28T00:00:00
[ [ "Potvin", "Pascal", "" ], [ "Bonja", "Mario", "" ], [ "Bailey", "Gordon", "" ], [ "Busnel", "Pierre", "" ] ]
new_dataset
0.991673
1509.07600
Yuya Higashikawa
Yuya Higashikawa, Siu-Wing Cheng, Tsunehiko Kameda, Naoki Katoh, and Shun Saburi
Minimax Regret 1-Median Problem in Dynamic Path Networks
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the minimax regret 1-median problem in dynamic path networks. In our model, we are given a dynamic path network consisting of an undirected path with positive edge lengths, uniform positive edge capacity, and nonnegative vertex supplies. Here, each vertex supply is unknown but only an interval of supply is known. A particular assignment of supply to each vertex is called a scenario. Given a scenario s and a sink location x in a dynamic path network, let us consider the evacuation time to x of a unit supply given on a vertex by s. The cost of x under s is defined as the sum of evacuation times to x for all supplies given by s, and the median under s is defined as a sink location which minimizes this cost. The regret for x under s is defined as the cost of x under s minus the cost of the median under s. Then, the problem is to find a sink location such that the maximum regret for all possible scenarios is minimized. We propose an O(n^3) time algorithm for the minimax regret 1-median problem in dynamic path networks with uniform capacity, where n is the number of vertices in the network.
[ { "version": "v1", "created": "Fri, 25 Sep 2015 06:46:36 GMT" } ]
2015-09-28T00:00:00
[ [ "Higashikawa", "Yuya", "" ], [ "Cheng", "Siu-Wing", "" ], [ "Kameda", "Tsunehiko", "" ], [ "Katoh", "Naoki", "" ], [ "Saburi", "Shun", "" ] ]
new_dataset
0.997701
1509.07741
Manuel Bl\'azquez-Ochando
Manuel Bl\'azquez Ochando
A vulnerability in Google AdSense: Automatic extraction of links to ads
8 figures
null
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On the basis of the XSS (Cross Site Scripting) and Web Crawler techniques it is possible to go through the barriers of the Google Adsense advertising system by obtaining the validated links of the ads published on a website. Such method involves obtaining the source code built for the Google java applet for publishing and handling ads and for the final link retrieval. Once the links of the ads have been obtained, you can use the user sessions visiting other websites to load such links, in the background, by a simple re-direction, through a hidden iframe, so that the IP addresses clicking are different in each case.
[ { "version": "v1", "created": "Fri, 25 Sep 2015 14:48:43 GMT" } ]
2015-09-28T00:00:00
[ [ "Ochando", "Manuel Blázquez", "" ] ]
new_dataset
0.998639
1509.07821
Robert Escriva
Robert Escriva, Emin G\"un Sirer
The Design and Implementation of the Wave Transactional Filesystem
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the Wave Transactional Filesystem (WTF), a novel, transactional, POSIX-compatible filesystem based on a new file slicing API that enables efficient file transformations. WTF provides transactional access to a distributed filesystem, eliminating the possibility of inconsistencies across multiple files. Further, the file slicing API enables applications to construct files from the contents of other files without having to rewrite or relocate data. Combined, these enable a new class of high-performance applications. Experiments show that WTF can qualitatively outperform the industry-standard HDFS distributed filesystem, up to a factor of four in a sorting benchmark, by reducing I/O costs. Microbenchmarks indicate that the new features of WTF impose only a modest overhead on top of the POSIX-compatible API.
[ { "version": "v1", "created": "Fri, 25 Sep 2015 18:19:53 GMT" } ]
2015-09-28T00:00:00
[ [ "Escriva", "Robert", "" ], [ "Sirer", "Emin Gün", "" ] ]
new_dataset
0.956605
1509.07857
Boris Pritychenko
B. Pritychenko
Fractional Authorship in Nuclear Physics
8 pages, 4 Figures
null
null
Brookhaven National Laboratory Report BNL-108445-2015-JA
cs.DL nucl-th physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large, multi-institutional groups or collaborations of scientists are engaged in nuclear physics research projects, and the number of research facilities is dwindling. These collaborations have their own authorship rules, and they produce a large number of highly-cited papers. Multiple authorship of nuclear physics publications creates a problem with the assessment of an individual author's productivity relative to his/her colleagues and renders ineffective a performance metrics solely based on annual publication and citation counts. Many institutions are increasingly relying on the total number of first-author papers; however, this approach becomes counterproductive for large research collaborations with an alphabetical order of authors. A concept of fractional authorship (the claiming of credit for authorship by more than one individual) helps to clarify this issue by providing a more complete picture of research activities. In the present work, nuclear physics fractional and total authorships have been investigated using nuclear data mining techniques. Historic total and fractional authorship averages have been extracted from the Nuclear Science References (NSR) database, and the current range of fractional contributions has been deduced. The results of this study and their implications are discussed and conclusions presented.
[ { "version": "v1", "created": "Fri, 25 Sep 2015 19:51:35 GMT" } ]
2015-09-28T00:00:00
[ [ "Pritychenko", "B.", "" ] ]
new_dataset
0.981762
1301.0975
Yan-yu Zhang
Yan-Yu Zhang, Hong-Yi Yu, Yi-Jun Zhu and Jin-Long Wang
Multiple layer Phase Shift Linear Space-time Block Code for High-speed Visible Light Communications
This paper has been withdrawn by the author due to a crucial error in the performance analysis
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, we consider intensity modulation/direct detection (IM/DD) channel in the visible light communication (VLC) systems with multiple transmitter phosphor-based white light emitting diodes (LED) and single receiver avalanche photo diode (APD). We proposed a Multiple Layer Phase Shift Linear Space-time Block Code (MLPS-LSTBC). We show that our proposed code for VLC has the following main features: (a) The symbol transmission rate is $N/(N+M-1)$, where $N$ is the number of transmitter LED and $M$ denotes the number of shift intervals contained by a single codeword per layer; (b) zero-forcing receiver can transform the virtual MIMO matrix channel into parallel sub-channels even without channel state information at the receiver side (CSIR); (c) Our MLPS-LSTBC can asymptotically enhance the spectral efficiency by $\min (M\text{,}N)$, which is attractive for LED-based VLC with limited electrical modulation bandwidth. By simulations, we achieve the record data rate of 1.5 Gb/s with the bit error rate performance below the FEC limit of $2\times10^{-3}$ via multiple 100-MBaud transmission of OOK signal.
[ { "version": "v1", "created": "Sun, 6 Jan 2013 04:54:06 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2015 18:45:08 GMT" } ]
2015-09-25T00:00:00
[ [ "Zhang", "Yan-Yu", "" ], [ "Yu", "Hong-Yi", "" ], [ "Zhu", "Yi-Jun", "" ], [ "Wang", "Jin-Long", "" ] ]
new_dataset
0.992413
1501.04504
Xiangyao Yu
Xiangyao Yu, Srinivas Devadas
TARDIS: Timestamp based Coherence Algorithm for Distributed Shared Memory
16 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new memory coherence protocol, Tardis, is proposed. Tardis uses timestamp counters representing logical time as well as physical time to order memory operations and enforce sequential consistency in any type of shared memory system. Tardis is unique in that as compared to the widely-adopted directory coherence protocol, and its variants, it completely avoids multicasting and only requires O(log N) storage per cache block for an N-core system rather than O(N) sharer information. Tardis is simpler and easier to reason about, yet achieves similar performance to directory protocols on a wide range of benchmarks run on 16, 64 and 256 cores.
[ { "version": "v1", "created": "Mon, 19 Jan 2015 14:38:00 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2015 22:04:50 GMT" } ]
2015-09-25T00:00:00
[ [ "Yu", "Xiangyao", "" ], [ "Devadas", "Srinivas", "" ] ]
new_dataset
0.996114
1505.07237
Gabriele Nebe
Gabriele Nebe and Wolfgang Willems
On self-dual MRD codes
Improved exposition according to the referees' comments
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We determine the automorphism group of Gabidulin codes of full length and characterise when these codes are equivalent to self-dual codes.
[ { "version": "v1", "created": "Wed, 27 May 2015 09:38:04 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2015 09:19:36 GMT" } ]
2015-09-25T00:00:00
[ [ "Nebe", "Gabriele", "" ], [ "Willems", "Wolfgang", "" ] ]
new_dataset
0.997905
1506.08959
Linjie Yang
Linjie Yang, Ping Luo, Chen Change Loy, Xiaoou Tang
A Large-Scale Car Dataset for Fine-Grained Categorization and Verification
An extension to our conference paper in CVPR 2015
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Updated on 24/09/2015: This update provides preliminary experiment results for fine-grained classification on the surveillance data of CompCars. The train/test splits are provided in the updated dataset. See details in Section 6.
[ { "version": "v1", "created": "Tue, 30 Jun 2015 06:47:50 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2015 09:04:24 GMT" } ]
2015-09-25T00:00:00
[ [ "Yang", "Linjie", "" ], [ "Luo", "Ping", "" ], [ "Loy", "Chen Change", "" ], [ "Tang", "Xiaoou", "" ] ]
new_dataset
0.999885
1509.07204
EPTCS
Lauri Hella (University of Tampere), Johanna Stumpf (TU Darmstadt)
The expressive power of modal logic with inclusion atoms
In Proceedings GandALF 2015, arXiv:1509.06858
EPTCS 193, 2015, pp. 129-143
10.4204/EPTCS.193.10
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modal inclusion logic is the extension of basic modal logic with inclusion atoms, and its semantics is defined on Kripke models with teams. A team of a Kripke model is just a subset of its domain. In this paper we give a complete characterisation for the expressive power of modal inclusion logic: a class of Kripke models with teams is definable in modal inclusion logic if and only if it is closed under k-bisimulation for some integer k, it is closed under unions, and it has the empty team property. We also prove that the same expressive power can be obtained by adding a single unary nonemptiness operator to modal logic. Furthermore, we establish an exponential lower bound for the size of the translation from modal inclusion logic to modal logic with the nonemptiness operator.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 01:53:29 GMT" } ]
2015-09-25T00:00:00
[ [ "Hella", "Lauri", "", "University of Tampere" ], [ "Stumpf", "Johanna", "", "TU Darmstadt" ] ]
new_dataset
0.989681
1509.07345
Olivier Beaude
Olivier Beaude and Cheng Wan and Samson Lasaulce
Composite charging games in networks of electric vehicles
8 pages, 6 figures, keywords: EV charging - Electricity Distribution Networks - Composite game - Composite Equilibrium
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important scenario for smart grids which encompass distributed electrical networks is given by the simultaneous presence of aggregators and individual consumers. In this work, an aggregator is seen as an entity (a coalition) which is able to manage jointly the energy demand of a large group of consumers or users. More precisely, the demand consists in charging an electrical vehicle (EV) battery. The way the EVs user charge their batteries matters since it strongly impacts the network, especially the distribution network costs (e.g., in terms of Joule losses or transformer ageing). Since the charging policy is chosen by the users or the aggregators, the charging problem is naturally distributed. It turns out that one of the tools suited to tackle this heterogenous scenario has been introduced only recently namely, through the notion of composite games. This paper exploits for the first time in the literature of smart grids the notion of composite game and equilibrium. By assuming a rectangular charging profile for an EV, a composite equilibrium analysis is conducted, followed by a detailed analysis of a case study which assumes three possible charging periods or time-slots. Both the provided analytical and numerical results allow one to better understand the relationship between the size (which is a measure) of the coalition and the network sum-cost. In particular, a social dilemma, a situation where everybody prefers unilaterally defecting to cooperating, while the consequence is the worst for all, is exhibited.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 12:40:48 GMT" } ]
2015-09-25T00:00:00
[ [ "Beaude", "Olivier", "" ], [ "Wan", "Cheng", "" ], [ "Lasaulce", "Samson", "" ] ]
new_dataset
0.987052
1509.07349
Olivier Beaude
Olivier Beaude and Samson Lasaulce and Martin Hennebel
Charging Games in Networks of Electrical Vehicles
8 pages, 4 figures, keywords: Charging games - electrical vehicle - distribution networks - potential games - Nash equilibrium - price of anarchy
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a static non-cooperative game formulation of the problem of distributed charging in electrical vehicle (EV) networks is proposed. This formulation allows one to model the interaction between several EV which are connected to a common residential distribution transformer. Each EV aims at choosing the time at which it starts charging its battery in order to minimize an individual cost which is mainly related to the total power delivered by the transformer, the location of the time interval over which the charging operation is performed, and the charging duration needed for the considered EV to have its battery fully recharged. As individual cost functions are assumed to be memoryless, it is possible to show that the game of interest is always an ordinal potential game. More precisely, both an atomic and nonatomic versions of the charging game are considered. In both cases, equilibrium analysis is conducted. In particular, important issues such as equilibrium uniqueness and efficiency are tackled. Interestingly, both analytical and numerical results show that the efficiency loss due to decentralization (e.g., when cost functions such as distribution network Joule losses or life of residential distribution transformers when no thermal inertia is assumed) induced by charging is small and the corresponding "efficiency", a notion close to the Price of Anarchy, tends to one when the number of EV increases.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 13:03:28 GMT" } ]
2015-09-25T00:00:00
[ [ "Beaude", "Olivier", "" ], [ "Lasaulce", "Samson", "" ], [ "Hennebel", "Martin", "" ] ]
new_dataset
0.997802
1509.07470
Yan-yu Zhang
Yan-Yu Zhang, Hong-Yi Yu, Jian-Kang Zhang, Yi-Jun Zhu, Jin-Long Wang and Tao Wang
Space Codes for MIMO Optical Wireless Communications: Error Performance Criterion and Code Construction
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a multiple-input-multiple-output optical wireless communication (MIMO-OWC) system in the presence of log-normal fading. In this scenario, a general criterion for the design of full-diversity space code (FDSC) with the maximum likelihood (ML) detector is developed. This criterion reveals that in a high signal-to-noise ratio (SNR) regime, MIMO-OWC offers both large-scale diversity gain, governing the exponential decaying of the error curve, and small-scale diversity gain, producing traditional power-law decaying. Particularly for a two by two MIMO-OWC system with unipolar pulse amplitude modulation (PAM), a closed-form solution to the design problem of a linear FDSC optimizing both diversity gains is attained by taking advantage of the available properties on the successive terms of Farey sequences in number theory as well as by developing new properties on the disjoint intervals formed by the Farey sequence terms to attack the continuous and discrete variables mixed max-min design problem. In fact, this specific design not only proves that a repetition code (RC) is the optimal linear FDSC optimizing both the diversity gains, but also uncovers a significant difference between MIMO radio frequency (RF) communications and MIMO-OWC that space dimension alone is sufficient for a full large-scale diversity achievement. Computer simulations demonstrate that FDSC substantially outperforms uncoded spatial multiplexing with the same total optical power and spectral efficiency, and the latter provides only the small-scale diversity gain.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 18:42:14 GMT" } ]
2015-09-25T00:00:00
[ [ "Zhang", "Yan-Yu", "" ], [ "Yu", "Hong-Yi", "" ], [ "Zhang", "Jian-Kang", "" ], [ "Zhu", "Yi-Jun", "" ], [ "Wang", "Jin-Long", "" ], [ "Wang", "Tao", "" ] ]
new_dataset
0.992837
0905.0440
Willie Harrison
Willie K Harrison and Steven W. McLaughlin
Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis
11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)
null
10.1109/ISIT.2009.5205606
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both channel and cryptographic codes under the wiretap channel model in a way that enhances the \emph{information-theoretic} security for the friendly parties by keeping the information transfer to the eavesdropper small. We consider a secret-key cryptographic system with a linear feedback shift register (LFSR)-based keystream generator and observe the mutual information between an LFSR-generated sequence and the received noise-corrupted ciphertext sequence under a known-plaintext scenario. The effectiveness of a noniterative fast correlation attack, which reduces the search time in a brute-force attack, is shown to be correlated with this mutual information. For an iterative fast correlation attack on this cryptographic system, it is shown that an EXIT chart and mutual information are very good predictors of decoding success and failure by a passive eavesdropper.
[ { "version": "v1", "created": "Mon, 4 May 2009 17:54:18 GMT" } ]
2015-09-24T00:00:00
[ [ "Harrison", "Willie K", "" ], [ "McLaughlin", "Steven W.", "" ] ]
new_dataset
0.994277
1508.05497
S. Akshay
Ajith K. John, Shetal Shah, Supratik Chakraborty, Ashutosh Trivedi, S. Akshay
Skolem Functions for Factored Formulas
Full version of FMCAD 2015 conference publication
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a propositional formula F(x,y), a Skolem function for x is a function \Psi(y), such that substituting \Psi(y) for x in F gives a formula semantically equivalent to \exists F. Automatically generating Skolem functions is of significant interest in several applications including certified QBF solving, finding strategies of players in games, synthesising circuits and bit-vector programs from specifications, disjunctive decomposition of sequential circuits etc. In many such applications, F is given as a conjunction of factors, each of which depends on a small subset of variables. Existing algorithms for Skolem function generation ignore any such factored form and treat F as a monolithic function. This presents scalability hurdles in medium to large problem instances. In this paper, we argue that exploiting the factored form of F can give significant performance improvements in practice when computing Skolem functions. We present a new CEGAR style algorithm for generating Skolem functions from factored propositional formulas. In contrast to earlier work, our algorithm neither requires a proof of QBF satisfiability nor uses composition of monolithic conjunctions of factors. We show experimentally that our algorithm generates smaller Skolem functions and outperforms state-of-the-art approaches on several large benchmarks.
[ { "version": "v1", "created": "Sat, 22 Aug 2015 11:23:27 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2015 18:41:26 GMT" } ]
2015-09-24T00:00:00
[ [ "John", "Ajith K.", "" ], [ "Shah", "Shetal", "" ], [ "Chakraborty", "Supratik", "" ], [ "Trivedi", "Ashutosh", "" ], [ "Akshay", "S.", "" ] ]
new_dataset
0.994937
1509.00025
Markus Vogt
Markus Vogt, Gerald Hempel, Jeronimo Castrillon, Christian Hochberger
GCC-Plugin for Automated Accelerator Generation and Integration on Hybrid FPGA-SoCs
Presented at Second International Workshop on FPGAs for Software Programmers (FSP 2015) (arXiv:1508.06320)
null
null
FSP/2015/17
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, architectures combining a reconfigurable fabric and a general purpose processor on a single chip became increasingly popular. Such hybrid architectures allow extending embedded software with application specific hardware accelerators to improve performance and/or energy efficiency. Aiding system designers and programmers at handling the complexity of the required process of hardware/software (HW/SW) partitioning is an important issue. Current methods are often restricted, either to bare-metal systems, to subsets of mainstream programming languages, or require special coding guidelines, e.g., via annotations. These restrictions still represent a high entry barrier for the wider community of programmers that new hybrid architectures are intended for. In this paper we revisit HW/SW partitioning and present a seamless programming flow for unrestricted, legacy C code. It consists of a retargetable GCC plugin that automatically identifies code sections for hardware acceleration and generates code accordingly. The proposed workflow was evaluated on the Xilinx Zynq platform using unmodified code from an embedded benchmark suite.
[ { "version": "v1", "created": "Fri, 28 Aug 2015 09:15:49 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2015 11:35:57 GMT" } ]
2015-09-24T00:00:00
[ [ "Vogt", "Markus", "" ], [ "Hempel", "Gerald", "" ], [ "Castrillon", "Jeronimo", "" ], [ "Hochberger", "Christian", "" ] ]
new_dataset
0.989389
1509.06774
Zhihan Lv
Zhihan Lv
Preprint: Bringing immersive enjoyment to hyperbaric oxygen chamber users using virtual reality glasses
This is the preprint version of our paper on REHAB2015
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the preprint version of our paper on REHAB2015. This paper proposed a novel immersive entertainment system for the users of hyperbaric oxygen therapy chamber. The system is a hybrid of hardware and software, the scheme is described in this paper. The hardware is combined by a HMD (i.e. virtual reality glasses shell), a smartphone and a waterproof bag. The software is able to transfer the stereoscopic images of the 3D game to the screen of the smartphone synchronously. The comparison and selection of the hardware are discussed according to the practical running scene of the clinical hyperbaric oxygen treatment. Finally, a preliminary guideline for designing this kind of system is raised accordingly.
[ { "version": "v1", "created": "Tue, 22 Sep 2015 20:35:54 GMT" } ]
2015-09-24T00:00:00
[ [ "Lv", "Zhihan", "" ] ]
new_dataset
0.964499
1509.06813
Kim-Kwang Raymond Choo
Junghyun Nam and Kim-Kwang Raymond Choo and Sangchul Han and Moonseong Kim and Juryon Paik and Dongho Won
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
null
PLoS ONE 10(4): e0116709, 2015
10.1371/journal.pone.0116709
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
[ { "version": "v1", "created": "Wed, 23 Sep 2015 00:08:31 GMT" } ]
2015-09-24T00:00:00
[ [ "Nam", "Junghyun", "" ], [ "Choo", "Kim-Kwang Raymond", "" ], [ "Han", "Sangchul", "" ], [ "Kim", "Moonseong", "" ], [ "Paik", "Juryon", "" ], [ "Won", "Dongho", "" ] ]
new_dataset
0.981968
1509.06874
Dmitry Namiot
Dmitry Namiot
Twitter as a Transport Layer Platform
submitted to Fruct conference
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet messengers and social networks have become an integral part of modern digital life. We have in mind not only the interaction between individual users but also a variety of applications that exist in these applications. Typically, applications for social networks use the universal login system and rely on data from social networks. Also, such applications are likely to get more traction when they are inside of the big social network like Facebook. At the same time, less attention is paid to communication capabilities of social networks. In this paper, we target Twitter as a messaging system at the first hand. We describe the way information systems can use Twitter as a transport layer for own services. Our work introduces a programmable service called 411 for Twitter, which supports user-defined and application-specific commands through tweets.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 08:13:30 GMT" } ]
2015-09-24T00:00:00
[ [ "Namiot", "Dmitry", "" ] ]
new_dataset
0.986781
1509.06889
Jia Liu
Jia Liu, Min Sheng, Yang Xu, Hongguang Sun, Xijun Wang and Xiaohong Jiang
Throughput capacity of two-hop relay MANETs under finite buffers
null
null
10.1109/PIMRC.2014.7136358
null
cs.PF cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the seminal work of Grossglauser and Tse [1], the two-hop relay algorithm and its variants have been attractive for mobile ad hoc networks (MANETs) due to their simplicity and efficiency. However, most literature assumed an infinite buffer size for each node, which is obviously not applicable to a realistic MANET. In this paper, we focus on the exact throughput capacity study of two-hop relay MANETs under the practical finite relay buffer scenario. The arrival process and departure process of the relay queue are fully characterized, and an ergodic Markov chain-based framework is also provided. With this framework, we obtain the limiting distribution of the relay queue and derive the throughput capacity under any relay buffer size. Extensive simulation results are provided to validate our theoretical framework and explore the relationship among the throughput capacity, the relay buffer size and the number of nodes.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 08:57:32 GMT" } ]
2015-09-24T00:00:00
[ [ "Liu", "Jia", "" ], [ "Sheng", "Min", "" ], [ "Xu", "Yang", "" ], [ "Sun", "Hongguang", "" ], [ "Wang", "Xijun", "" ], [ "Jiang", "Xiaohong", "" ] ]
new_dataset
0.972035
1509.06921
Jia Liu
Jia Liu, Yang Xu and Xiaohong Jiang
End-to-end delay in two hop relay MANETs with limited buffer
null
null
10.1109/CANDAR.2014.13
null
cs.PF cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite lots of literature has been dedicated to researching the delay performance in two-hop relay (2HR) mobile ad hoc networks (MANETs), however, they usually assume the buffer size of each node is infinite, so these studies are not applicable to and thus may not reflect the real delay performance of a practical MANET with limited buffer. To address this issue, in this paper we explore the packet end-to-end delay in a 2HR MANET, where each node is equipped with a bounded and shared relay-buffer for storing and forwarding packets of all other flows. The transmission range of each node can be adjusted and a group-based scheduling scheme is adopted to avoid interference between simultaneous transmissions, meanwhile a handshake mechanism is added to the 2HR routing algorithm to avoid packet loss. With the help of Markov Chain Theory and Queuing Theory, we develop a new framework to fully characterize the packet delivery processes, and obtain the relay-buffer blocking probability (RBP) under any given exogenous packet input rate. Based on the RBP, we can compute the packet queuing delay in its source node and delivery delay respectively, and further derive the end-to-end delay in such a MANET with limited buffer.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 11:05:34 GMT" } ]
2015-09-24T00:00:00
[ [ "Liu", "Jia", "" ], [ "Xu", "Yang", "" ], [ "Jiang", "Xiaohong", "" ] ]
new_dataset
0.999392
1509.06937
Tobias Kuhn
Kurt Winkler and Tobias Kuhn
Fully automatic multi-language translation with a catalogue of phrases - successful employment for the Swiss avalanche bulletin
Extended version of a previous workshop paper (arXiv:1405.6103), accepted for the journal Language Resources and Evaluation, Springer
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Swiss avalanche bulletin is produced twice a day in four languages. Due to the lack of time available for manual translation, a fully automated translation system is employed, based on a catalogue of predefined phrases and predetermined rules of how these phrases can be combined to produce sentences. Because this catalogue of phrases is limited to a small sublanguage, the system is able to automatically translate such sentences from German into the target languages French, Italian and English without subsequent proofreading or correction. Having been operational for two winter seasons, we assess here the quality of the produced texts based on two different surveys where participants rated texts from real avalanche bulletins from both origins, the catalogue of phrases versus manually written and translated texts. With a mean recognition rate of 55%, users can hardly distinguish between thetwo types of texts, and give very similar ratings with respect to their language quality. Overall, the output from the catalogue system can be considered virtually equivalent to a text written by avalanche forecasters and then manually translated by professional translators. Furthermore, forecasters declared that all relevant situations were captured by the system with sufficient accuracy. Forecaster's working load did not change with the introduction of the catalogue: the extra time to find matching sentences is compensated by the fact that they no longer need to double-check manually translated texts. The reduction of daily translation costs is expected to offset the initial development costs within a few years.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 12:09:07 GMT" } ]
2015-09-24T00:00:00
[ [ "Winkler", "Kurt", "" ], [ "Kuhn", "Tobias", "" ] ]
new_dataset
0.952373
1509.06948
Konrad Kulakowski
Konrad Ku{\l}akowski
Dynamic concurrent van Emde Boas array
18 pages, 4 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growing popularity of shared-memory multiprocessor machines has caused significant changes in the design of concurrent software. In this approach, the concurrently running threads communicate and synchronize with each other through data structures in shared memory. Hence, the efficiency of these structures is essential for the performance of concurrent applications. The need to find new concurrent data structures prompted the author some time ago to propose the cvEB array modeled on the van Emde Boas Tree structure as a dynamic set alternative. This paper describes an improved version of that structure - the dcvEB array (Dynamic Concurrent van Emde Boas Array). One of the improvements involves memory usage optimization. This enhancement required the design of a tree which grows and shrinks at both: the top (root) and the bottom (leaves) level. Another enhancement concerns the successor (and predecessor) search strategy. The tests performed seem to confirm the high performance of the dcvEB array. They are especially visible when the range of keys is significantly larger than the number of elements in the collection.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 12:53:59 GMT" } ]
2015-09-24T00:00:00
[ [ "Kułakowski", "Konrad", "" ] ]
new_dataset
0.994183
1509.07075
Siddhant Ahuja
Siddhant Ahuja, Peter Iles, Steven L. Waslander
3D Scan Registration using Curvelet Features in Planetary Environments
27 pages in Journal of Field Robotics, 2015
null
10.1002/rob.21616
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topographic mapping in planetary environments relies on accurate 3D scan registration methods. However, most global registration algorithms relying on features such as FPFH and Harris-3D show poor alignment accuracy in these settings due to the poor structure of the Mars-like terrain and variable resolution, occluded, sparse range data that is hard to register without some a-priori knowledge of the environment. In this paper, we propose an alternative approach to 3D scan registration using the curvelet transform that performs multi-resolution geometric analysis to obtain a set of coefficients indexed by scale (coarsest to finest), angle and spatial position. Features are detected in the curvelet domain to take advantage of the directional selectivity of the transform. A descriptor is computed for each feature by calculating the 3D spatial histogram of the image gradients, and nearest neighbor based matching is used to calculate the feature correspondences. Correspondence rejection using Random Sample Consensus identifies inliers, and a locally optimal Singular Value Decomposition-based estimation of the rigid-body transformation aligns the laser scans given the re-projected correspondences in the metric space. Experimental results on a publicly available data-set of planetary analogue indoor facility, as well as simulated and real-world scans from Neptec Design Group's IVIGMS 3D laser rangefinder at the outdoor CSA Mars yard demonstrates improved performance over existing methods in the challenging sparse Mars-like terrain.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 17:51:03 GMT" } ]
2015-09-24T00:00:00
[ [ "Ahuja", "Siddhant", "" ], [ "Iles", "Peter", "" ], [ "Waslander", "Steven L.", "" ] ]
new_dataset
0.996155
1506.00950
Zoltan Gingl
Gergely Vadai, Robert Mingesz and Zoltan Gingl
Generalized Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system using arbitrary resistors
null
Scientific Reports 5, 13653 (2015)
10.1038/srep13653
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange system has been introduced as a simple, very low cost and efficient classical physical alternative to quantum key distribution systems. The ideal system uses only a few electronic components - identical resistor pairs, switches and interconnecting wires - to guarantee perfectly protected data transmission. We show that a generalized KLJN system can provide unconditional security even if it is used with significantly less limitations. The more universal conditions ease practical realizations considerably and support more robust protection against attacks. Our theoretical results are confirmed by numerical simulations.
[ { "version": "v1", "created": "Tue, 2 Jun 2015 16:34:36 GMT" } ]
2015-09-23T00:00:00
[ [ "Vadai", "Gergely", "" ], [ "Mingesz", "Robert", "" ], [ "Gingl", "Zoltan", "" ] ]
new_dataset
0.994477
1506.08259
Afshin Rahimi
Afshin Rahimi, Trevor Cohn, and Timothy Baldwin
Twitter User Geolocation Using a Unified Text and Network Prediction Model
To appear in ACL 2015, Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics (ACL 2015)
null
null
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a label propagation approach to geolocation prediction based on Modified Adsorption, with two enhancements:(1) the removal of "celebrity" nodes to increase location homophily and boost tractability, and (2) he incorporation of text-based geolocation priors for test users. Experiments over three Twitter benchmark datasets achieve state-of-the-art results, and demonstrate the effectiveness of the enhancements.
[ { "version": "v1", "created": "Sat, 27 Jun 2015 04:51:18 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2015 00:43:39 GMT" }, { "version": "v3", "created": "Tue, 22 Sep 2015 01:14:20 GMT" } ]
2015-09-23T00:00:00
[ [ "Rahimi", "Afshin", "" ], [ "Cohn", "Trevor", "" ], [ "Baldwin", "Timothy", "" ] ]
new_dataset
0.99157
1509.06524
Maurizio Naldi
Maurizio Naldi, Giuseppe D'Acquisto
Option contracts for a privacy-aware market
null
null
null
null
cs.CR q-fin.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppliers (including companies and individual prosumers) may wish to protect their private information when selling items they have in stock. A market is envisaged where private information can be protected through the use of differential privacy and option contracts, while privacy-aware suppliers deliver their stock at a reduced price. In such a marketplace a broker acts as intermediary between privacy-aware suppliers and end customers, providing the extra items possibly needed to fully meet the customers' demand, while end customers book the items they need through an option contract. All stakeholders may benefit from such a marketplace. A formula is provided for the option price, and a budget equation is set for the mechanism to be profitable for the broker/producer.
[ { "version": "v1", "created": "Tue, 22 Sep 2015 09:34:39 GMT" } ]
2015-09-23T00:00:00
[ [ "Naldi", "Maurizio", "" ], [ "D'Acquisto", "Giuseppe", "" ] ]
new_dataset
0.998604
1404.5501
Min Ye
Min Ye, Alexander Barg
Polar Codes for Distributed Hierarchical Source Coding
14 pages
Advances in Mathematics of Communication, 9, no.1, 2015, 87-103
10.3934/amc.2015.9.87
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that polar codes can be used to achieve the rate-distortion functions in the problem of hierarchical source coding also known as the successive refinement problem. We also analyze the distributed version of this problem, constructing a polar coding scheme that achieves the rate distortion functions for successive refinement with side information.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 14:00:54 GMT" } ]
2015-09-22T00:00:00
[ [ "Ye", "Min", "" ], [ "Barg", "Alexander", "" ] ]
new_dataset
0.999507
1404.6822
Steve Schneider
Chris Culnane, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague
vVote: a Verifiable Voting System
Previously titled "Draft Technical Report for VEC vVote System"
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human processes. We explain the problems, present solutions, then analyse their security properties and explain how they tie in to other design decisions. We hope this will be an interesting case study on the application of end-to-end verifiable voting protocols to real elections. A preliminary version of this paper appeared as the 10th February 2014 version of "Draft Technical Report for VEC vVote System". The team involved in developing the vVote design described in this report were: Craig Burton, Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve Schneider and Vanessa Teague.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 20:28:25 GMT" }, { "version": "v2", "created": "Tue, 24 Jun 2014 23:06:15 GMT" }, { "version": "v3", "created": "Tue, 30 Sep 2014 11:30:23 GMT" }, { "version": "v4", "created": "Sun, 20 Sep 2015 22:18:07 GMT" } ]
2015-09-22T00:00:00
[ [ "Culnane", "Chris", "" ], [ "Ryan", "Peter Y. A.", "" ], [ "Schneider", "Steve", "" ], [ "Teague", "Vanessa", "" ] ]
new_dataset
0.989772
1409.8563
Daniel Ruprecht
Andrea Arteaga, Daniel Ruprecht, Rolf Krause
A stencil-based implementation of Parareal in the C++ domain specific embedded language STELLA
null
Applied Mathematics and Computation 267, pp. 727-741, 2015
10.1016/j.amc.2014.12.055
null
cs.DC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In view of the rapid rise of the number of cores in modern supercomputers, time-parallel methods that introduce concurrency along the temporal axis are becoming increasingly popular. For the solution of time-dependent partial differential equations, these methods can add another direction for concurrency on top of spatial parallelization. The paper presents an implementation of the time-parallel Parareal method in a C++ domain specific language for stencil computations (STELLA). STELLA provides both an OpenMP and a CUDA backend for a shared memory parallelization, using the CPU or GPU inside a node for the spatial stencils. Here, we intertwine this node-wise spatial parallelism with the time-parallel Parareal. This is done by adding an MPI-based implementation of Parareal, which allows us to parallelize in time across nodes. The performance of Parareal with both backends is analyzed in terms of speedup, parallel efficiency and energy-to-solution for an advection-diffusion problem with a time-dependent diffusion coefficient.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 14:34:13 GMT" }, { "version": "v2", "created": "Wed, 3 Dec 2014 12:55:41 GMT" } ]
2015-09-22T00:00:00
[ [ "Arteaga", "Andrea", "" ], [ "Ruprecht", "Daniel", "" ], [ "Krause", "Rolf", "" ] ]
new_dataset
0.987
1502.01188
Jimmy Nielsen
Jimmy J. Nielsen, Germ\'an C. Madue\~no, Nuno K. Pratas, Ren\'e B. S{\o}rensen, \v{C}edomir Stefanovi\'c, Petar Popovski
What Can Wireless Cellular Technologies Do about the Upcoming Smart Metering Traffic?
Submitted; change: corrected location of eSM box in Fig. 1; May 22, 2015: Major revision after review; v4: revised, accepted for publication
null
10.1109/MCOM.2015.7263371
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of smart electricity meters with cellular radio interface puts an additional load on the wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates a low-rate sporadic traffic. As the number of distributed energy resources increases, the household power will become more variable and thus unpredictable from the viewpoint of the Distribution System Operator (DSO). It is therefore expected, in the near future, to have an increased number of Wide Area Measurement System (WAMS) devices with Phasor Measurement Unit (PMU)-like capabilities in the distribution grid, thus allowing the utilities to monitor the low voltage grid quality while providing information required for tighter grid control. From a communication standpoint, the traffic profile will change drastically towards higher data volumes and higher rates per device. In this paper, we characterize the current traffic generated by smart electricity meters and supplement it with the potential traffic requirements brought by introducing enhanced Smart Meters, i.e., meters with PMU-like capabilities. Our study shows how GSM/GPRS and LTE cellular system performance behaves with the current and next generation smart meters traffic, where it is clearly seen that the PMU data will seriously challenge these wireless systems. We conclude by highlighting the possible solutions for upgrading the cellular standards, in order to cope with the upcoming smart metering traffic.
[ { "version": "v1", "created": "Wed, 4 Feb 2015 13:21:06 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2015 14:41:46 GMT" }, { "version": "v3", "created": "Fri, 22 May 2015 08:21:29 GMT" }, { "version": "v4", "created": "Wed, 1 Jul 2015 12:43:50 GMT" } ]
2015-09-22T00:00:00
[ [ "Nielsen", "Jimmy J.", "" ], [ "Madueño", "Germán C.", "" ], [ "Pratas", "Nuno K.", "" ], [ "Sørensen", "René B.", "" ], [ "Stefanović", "Čedomir", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.99641
1504.02789
Ashesh Jain
Ashesh Jain, Hema S. Koppula, Bharad Raghavan, Shane Soh, Ashutosh Saxena
Car that Knows Before You Do: Anticipating Maneuvers via Learning Temporal Driving Models
ICCV 2015, http://brain4cars.com
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advanced Driver Assistance Systems (ADAS) have made driving safer over the last decade. They prepare vehicles for unsafe road conditions and alert drivers if they perform a dangerous maneuver. However, many accidents are unavoidable because by the time drivers are alerted, it is already too late. Anticipating maneuvers beforehand can alert drivers before they perform the maneuver and also give ADAS more time to avoid or prepare for the danger. In this work we anticipate driving maneuvers a few seconds before they occur. For this purpose we equip a car with cameras and a computing device to capture the driving context from both inside and outside of the car. We propose an Autoregressive Input-Output HMM to model the contextual information alongwith the maneuvers. We evaluate our approach on a diverse data set with 1180 miles of natural freeway and city driving and show that we can anticipate maneuvers 3.5 seconds before they occur with over 80\% F1-score in real-time.
[ { "version": "v1", "created": "Fri, 10 Apr 2015 20:52:40 GMT" }, { "version": "v2", "created": "Sat, 19 Sep 2015 05:30:47 GMT" } ]
2015-09-22T00:00:00
[ [ "Jain", "Ashesh", "" ], [ "Koppula", "Hema S.", "" ], [ "Raghavan", "Bharad", "" ], [ "Soh", "Shane", "" ], [ "Saxena", "Ashutosh", "" ] ]
new_dataset
0.989776
1504.04319
John Baillieul
John Baillieul, Bowen Zhang, Shuai Wang
The Kirchhoff-Braess Paradox and Its Implications for Smart Microgrids
11 pages, 7 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Well known in the theory of network flows, Braess paradox states that in a congested network, it may happen that adding a new path between destinations can increase the level of congestion. In transportation networks the phenomenon results from the decisions of network participants who selfishly seek to optimize their own performance metrics. In an electric power distribution network, an analogous increase in congestion can arise as a consequence Kirchhoff's laws. Even for the simplest linear network of resistors and voltage sources, the sudden appearance of congestion due to an additional conductive line is a nonlinear phenomenon that results in a discontinuous change in the network state. It is argued that the phenomenon can occur in almost any grid in which they are loops, and with the increasing penetration of small-scale distributed generation it suggests challenges ahead in the operation of microgrids.
[ { "version": "v1", "created": "Thu, 16 Apr 2015 17:44:26 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2015 14:53:21 GMT" } ]
2015-09-22T00:00:00
[ [ "Baillieul", "John", "" ], [ "Zhang", "Bowen", "" ], [ "Wang", "Shuai", "" ] ]
new_dataset
0.962424
1509.03870
Mortaza Doulaty
Raymond W. M. Ng, Mortaza Doulaty, Rama Doddipatla, Wilker Aziz, Kashif Shah, Oscar Saz, Madina Hasan, Ghada AlHarbi, Lucia Specia, Thomas Hain
The USFD Spoken Language Translation System for IWSLT 2014
null
Proc. of 11th International Workshop on Spoken Language Translation (SLT 2014) 86-91, Lake Tahoe, USA, December 4th and 5th, 2014
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The University of Sheffield (USFD) participated in the International Workshop for Spoken Language Translation (IWSLT) in 2014. In this paper, we will introduce the USFD SLT system for IWSLT. Automatic speech recognition (ASR) is achieved by two multi-pass deep neural network systems with adaptation and rescoring techniques. Machine translation (MT) is achieved by a phrase-based system. The USFD primary system incorporates state-of-the-art ASR and MT techniques and gives a BLEU score of 23.45 and 14.75 on the English-to-French and English-to-German speech-to-text translation task with the IWSLT 2014 data. The USFD contrastive systems explore the integration of ASR and MT by using a quality estimation system to rescore the ASR outputs, optimising towards better translation. This gives a further 0.54 and 0.26 BLEU improvement respectively on the IWSLT 2012 and 2014 evaluation data.
[ { "version": "v1", "created": "Sun, 13 Sep 2015 16:58:41 GMT" } ]
2015-09-22T00:00:00
[ [ "Ng", "Raymond W. M.", "" ], [ "Doulaty", "Mortaza", "" ], [ "Doddipatla", "Rama", "" ], [ "Aziz", "Wilker", "" ], [ "Shah", "Kashif", "" ], [ "Saz", "Oscar", "" ], [ "Hasan", "Madina", "" ], [ "AlHarbi", "Ghada", "" ], [ "Specia", "Lucia", "" ], [ "Hain", "Thomas", "" ] ]
new_dataset
0.971385
1509.05807
Vincent Vajnovszki
Sergey Avgustinovich, Sergey Kitaev, Vladimir N. Potapov, Vincent Vajnovszki
Gray coding planar maps
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea of (combinatorial) Gray codes is to list objects in question in such a way that two successive objects differ in some pre-specified small way. In this paper, we utilize beta-description trees to cyclicly Gray code three classes of cubic planar maps, namely, bicubic planar maps, 3-connected cubic planar maps, and cubic non-separable planar maps.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 21:50:18 GMT" } ]
2015-09-22T00:00:00
[ [ "Avgustinovich", "Sergey", "" ], [ "Kitaev", "Sergey", "" ], [ "Potapov", "Vladimir N.", "" ], [ "Vajnovszki", "Vincent", "" ] ]
new_dataset
0.986234
1509.05897
Xu Yang
Xu Yang
Face Photo Sketch Synthesis via Larger Patch and Multiresolution Spline
null
null
null
null
cs.CV
http://creativecommons.org/publicdomain/zero/1.0/
Face photo sketch synthesis has got some researchers' attention in recent years because of its potential applications in digital entertainment and law enforcement. Some patches based methods have been proposed to solve this problem. These methods usually focus more on how to get a sketch patch for a given photo patch than how to blend these generated patches. However, without appropriately blending method, some jagged parts and mottled points will appear in the entire face sketch. In order to get a smoother sketch, we propose a new method to reduce such jagged parts and mottled points. In our system, we resort to an existed method, which is Markov Random Fields (MRF), to train a crude face sketch firstly. Then this crude sketch face sketch will be divided into some larger patches again and retrained by Non-Negative Matrix Factorization (NMF). At last, we use Multiresolution Spline and a blend trick named full-coverage trick to blend these retrained patches. The experiment results show that compared with some previous method, we can get a smoother face sketch.
[ { "version": "v1", "created": "Sat, 19 Sep 2015 14:20:50 GMT" } ]
2015-09-22T00:00:00
[ [ "Yang", "Xu", "" ] ]
new_dataset
0.99248
1509.05935
Shang-Tse Chen
Paras Jain, Shang-Tse Chen, Mozhgan Azimpourkivi, Duen Horng Chau, Bogdan Carbunar
Spotting Suspicious Reviews via (Quasi-)clique Extraction
Appeared in IEEE Symposium on Security and Privacy 2015
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How to tell if a review is real or fake? What does the underworld of fraudulent reviewing look like? Detecting suspicious reviews has become a major issue for many online services. We propose the use of a clique-finding approach to discover well-organized suspicious reviewers. From a Yelp dataset with over one million reviews, we construct multiple Reviewer Similarity graphs to link users that have unusually similar behavior: two reviewers are connected in the graph if they have reviewed the same set of venues within a few days. From these graphs, our algorithms extracted many large cliques and quasi-cliques, the largest one containing a striking 11 users who coordinated their review activities in identical ways. Among the detected cliques, a large portion contain Yelp Scouts who are paid by Yelp to review venues in new areas. Our work sheds light on their little-known operation.
[ { "version": "v1", "created": "Sat, 19 Sep 2015 21:01:38 GMT" } ]
2015-09-22T00:00:00
[ [ "Jain", "Paras", "" ], [ "Chen", "Shang-Tse", "" ], [ "Azimpourkivi", "Mozhgan", "" ], [ "Chau", "Duen Horng", "" ], [ "Carbunar", "Bogdan", "" ] ]
new_dataset
0.968545
1509.06019
Abraham Kabore Wendyida
Abraham Kabore, Vahid Meghdadi, Jean-Pierre Cances
LT Codes Combined with Network Coding for Multihop Powerline Smart Grid Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a novel approach for combining Luby Transform (LT) codes and Network Coding (NC) in the context of PowerLine Communications (PLC) smart grid networks. Multihop transmissions of LT-encoded data on PLC networks are considered and algorithms to combine data at relay nodes are proposed. Without the need to decode and then re-encode the total received data stream, the relay nodes can forward the received data stream while adding at the same time their own data. Simulation results are provided confirming the good performance of the proposed algorithms.
[ { "version": "v1", "created": "Sun, 20 Sep 2015 14:15:25 GMT" } ]
2015-09-22T00:00:00
[ [ "Kabore", "Abraham", "" ], [ "Meghdadi", "Vahid", "" ], [ "Cances", "Jean-Pierre", "" ] ]
new_dataset
0.981475
1509.06080
EPTCS
Alessandro Coglio
Second-Order Functions and Theorems in ACL2
In Proceedings ACL2 2015, arXiv:1509.05526
EPTCS 192, 2015, pp. 17-33
10.4204/EPTCS.192.3
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SOFT ('Second-Order Functions and Theorems') is a tool to mimic second-order functions and theorems in the first-order logic of ACL2. Second-order functions are mimicked by first-order functions that reference explicitly designated uninterpreted functions that mimic function variables. First-order theorems over these second-order functions mimic second-order theorems universally quantified over function variables. Instances of second-order functions and theorems are systematically generated by replacing function variables with functions. SOFT can be used to carry out program refinement inside ACL2, by constructing a sequence of increasingly stronger second-order predicates over one or more target functions: the sequence starts with a predicate that specifies requirements for the target functions, and ends with a predicate that provides executable definitions for the target functions.
[ { "version": "v1", "created": "Mon, 21 Sep 2015 00:34:48 GMT" } ]
2015-09-22T00:00:00
[ [ "Coglio", "Alessandro", "" ] ]
new_dataset
0.989663
1509.06081
EPTCS
John Cowles (University of Wyoming), Ruben Gamboa (University of Wyoming)
Perfect Numbers in ACL2
In Proceedings ACL2 2015, arXiv:1509.05526
EPTCS 192, 2015, pp. 53-59
10.4204/EPTCS.192.5
null
cs.LO math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A perfect number is a positive integer n such that n equals the sum of all positive integer divisors of n that are less than n. That is, although n is a divisor of n, n is excluded from this sum. Thus 6 = 1 + 2 + 3 is perfect, but 12 < 1 + 2 + 3 + 4 + 6 is not perfect. An ACL2 theory of perfect numbers is developed and used to prove, in ACL2(r), this bit of mathematical folklore: Even if there are infinitely many perfect numbers the series of the reciprocals of all perfect numbers converges.
[ { "version": "v1", "created": "Mon, 21 Sep 2015 00:35:06 GMT" } ]
2015-09-22T00:00:00
[ [ "Cowles", "John", "", "University of Wyoming" ], [ "Gamboa", "Ruben", "", "University of\n Wyoming" ] ]
new_dataset
0.998917
1509.06109
Dustin Freeman
Dustin Freeman, Ricardo Jota, Daniel Vogel, Daniel Wigdor, Ravin Balakrishnan
A Dataset of Naturally Occurring, Whole-Body Background Activity to Reduce Gesture Conflicts
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In real settings, natural body movements can be erroneously recognized by whole-body input systems as explicit input actions. We call body activity not intended as input actions "background activity." We argue that understanding background activity is crucial to the success of always-available whole-body input in the real world. To operationalize this argument, we contribute a reusable study methodology and software tools to generate standardized background activity datasets composed of data from multiple Kinect cameras, a Vicon tracker, and two high-definition video cameras. Using our methodology, we create an example background activity dataset for a television-oriented living room setting. We use this dataset to demonstrate how it can be used to redesign a gestural interaction vocabulary to minimize conflicts with the real world. The software tools and initial living room dataset are publicly available (http://www.dgp.toronto.edu/~dustin/backgroundactivity/).
[ { "version": "v1", "created": "Mon, 21 Sep 2015 04:40:31 GMT" } ]
2015-09-22T00:00:00
[ [ "Freeman", "Dustin", "" ], [ "Jota", "Ricardo", "" ], [ "Vogel", "Daniel", "" ], [ "Wigdor", "Daniel", "" ], [ "Balakrishnan", "Ravin", "" ] ]
new_dataset
0.999698
1509.06110
Jianqing Zhang Master
Yang Yi, Zhou Geng, Zhang Jianqing, Cheng Siyuan, Fu Mengyin
Design, Modeling and Control of A Novel Amphibious Robot with Dual-swing-legs Propulsion Mechanism
8 pages
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a novel amphibious robot, which adopts a dual-swing-legs propulsion mechanism, proposing a new locomotion mode. The robot is called FroBot, since its structure and locomotion are similar to frogs. Our inspiration comes from the frog scooter and breaststroke. Based on its swing leg mechanism, an unusual universal wheel structure is used to generate propulsion on land, while a pair of flexible caudal fins functions like the foot flippers of a frog to generate similar propulsion underwater. On the basis of the prototype design and the dynamic model of the robot, some locomotion control simulations and experiments were conducted for the purpose of adjusting the parameters that affect the propulsion of the robot. Finally, a series of underwater experiments were performed to verify the design feasibility of FroBot and the rationality of the control algorithm.
[ { "version": "v1", "created": "Mon, 21 Sep 2015 04:44:26 GMT" } ]
2015-09-22T00:00:00
[ [ "Yi", "Yang", "" ], [ "Geng", "Zhou", "" ], [ "Jianqing", "Zhang", "" ], [ "Siyuan", "Cheng", "" ], [ "Mengyin", "Fu", "" ] ]
new_dataset
0.973446
1311.6331
Colm \'O D\'unlaing
Colm \'O D\'unlaing
Compact families of Jordan curves and convex hulls in three dimensions
49 pages, 20 figures
null
null
TCDMATH 13-15
cs.CG math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that for certain families of semi-algebraic convex bodies in 3 dimensions, the convex hull of $n$ disjoint bodies has $O(n\lambda_s(n))$ features, where $s$ is a constant depending on the family: $\lambda_s(n)$ is the maximum length of order-$s$ Davenport-Schinzel sequences with $n$ letters. The argument is based on an apparently new idea of `compact families' of convex bodies or discs, and of `crossing content' of disc intersections.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 15:20:34 GMT" }, { "version": "v2", "created": "Thu, 28 Nov 2013 17:39:13 GMT" }, { "version": "v3", "created": "Fri, 18 Sep 2015 09:13:49 GMT" } ]
2015-09-21T00:00:00
[ [ "Dúnlaing", "Colm Ó", "" ] ]
new_dataset
0.99581
1504.04859
\"Ozlem Salehi
\"Ozlem Salehi, A.C. Cem Say
Homing Vector Automata
NCMA'15
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce homing vector automata, which are finite automata augmented by a vector that is multiplied at each step by a matrix determined by the current transition, and have to return the vector to its original setting in order to accept the input. The computational power of the deterministic, nondeterministic and blind versions of these real-time machines are examined and compared to various related types of automata. A generalized version of the Stern-Brocot encoding method, suitable for representing strings on arbitrary alphabets, is also developed.
[ { "version": "v1", "created": "Sun, 19 Apr 2015 17:04:31 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 2015 09:41:08 GMT" } ]
2015-09-21T00:00:00
[ [ "Salehi", "Özlem", "" ], [ "Say", "A. C. Cem", "" ] ]
new_dataset
0.995226
1507.08467
David Sousa-Rodrigues
Cristian Jimenez-Romero and David Sousa-Rodrigues and Jeffrey H. Johnson and Vitorino Ramos
A Model for Foraging Ants, Controlled by Spiking Neural Networks and Double Pheromones
This work has been accepted for presentation at the UK Workshop on Computational Intelligence --- University of Exeter, September 2015 http://www.ukci2015.ex.ac.uk/
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A model of an Ant System where ants are controlled by a spiking neural circuit and a second order pheromone mechanism in a foraging task is presented. A neural circuit is trained for individual ants and subsequently the ants are exposed to a virtual environment where a swarm of ants performed a resource foraging task. The model comprises an associative and unsupervised learning strategy for the neural circuit of the ant. The neural circuit adapts to the environment by means of classical conditioning. The initially unknown environment includes different types of stimuli representing food and obstacles which, when they come in direct contact with the ant, elicit a reflex response in the motor neural system of the ant: moving towards or away from the source of the stimulus. The ants are released on a landscape with multiple food sources where one ant alone would have difficulty harvesting the landscape to maximum efficiency. The introduction of a double pheromone mechanism yields better results than traditional ant colony optimization strategies. Traditional ant systems include mainly a positive reinforcement pheromone. This approach uses a second pheromone that acts as a marker for forbidden paths (negative feedback). This blockade is not permanent and is controlled by the evaporation rate of the pheromones. The combined action of both pheromones acts as a collective stigmergic memory of the swarm, which reduces the search space of the problem. This paper explores how the adaptation and learning abilities observed in biologically inspired cognitive architectures is synergistically enhanced by swarm optimization strategies. The model portraits two forms of artificial intelligent behaviour: at the individual level the spiking neural network is the main controller and at the collective level the pheromone distribution is a map towards the solution emerged by the colony.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 11:57:54 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2015 09:25:03 GMT" }, { "version": "v3", "created": "Fri, 18 Sep 2015 14:17:39 GMT" } ]
2015-09-21T00:00:00
[ [ "Jimenez-Romero", "Cristian", "" ], [ "Sousa-Rodrigues", "David", "" ], [ "Johnson", "Jeffrey H.", "" ], [ "Ramos", "Vitorino", "" ] ]
new_dataset
0.950606
1508.02052
Farooq Khan
Farooq Khan
Coreless 5G Mobile Network
7 pages, 5 Figures, 1 Table
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Todays mobile networks contain an increasing variety of proprietary hardware stifling innovation and leading to longer time-to-market for introduction of new services. We propose to replace the mobile core network nodes and interfaces with an Open Source SW implementation running on general purpose commodity hardware. The proposed open source approach referred to as coreless mobile network is expected to reduce cost, increase flexibility, improve innovation speed and accelerate time-to-market for introduction of new features and functionalities. A common Open Source SW framework will also enable automatic discovery and selection, seamless data mobility as well as unified charging and billing across cellular, WiFi, UAV and satellite access networks.
[ { "version": "v1", "created": "Sun, 9 Aug 2015 17:38:06 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 2015 14:58:59 GMT" } ]
2015-09-21T00:00:00
[ [ "Khan", "Farooq", "" ] ]
new_dataset
0.998543
1509.02200
Mojtaba Vaezi
Mojtaba Vaezi and H. Vincent Poor
The Capacity Region of the One-Sided Gaussian Interference Channel
This paper has been withdrawn due to a flaw in the proof of the outer bound
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of the one-sided Gaussian interference channel is established in the weak interference regime. To characterize this region, a new representation of the Han-Kobayashi inner bound for the one-sided Gaussian interference channel is first given. Next, a new outer bound on the capacity region of this channel is introduced which is tight in the weak interference regime. This is the first capacity region for any variant of the interference channel in the weak interference regime.
[ { "version": "v1", "created": "Mon, 7 Sep 2015 21:27:47 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 2015 15:24:46 GMT" } ]
2015-09-21T00:00:00
[ [ "Vaezi", "Mojtaba", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.997762
1509.04207
Lse Lse
Mart\'in Dias (RMOD), Guillermo Polito (RMOD), Damien Cassou (RMOD), St\'ephane Ducasse (RMOD)
DeltaImpactFinder: Assessing Semantic Merge Conflicts with Dependency Analysis
International Workshop on Smalltalk Technologies 2015, Jul 2015, Brescia, Italy
null
10.1145/2811237.2811299
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In software development, version control systems (VCS) provide branching and merging support tools. Such tools are popular among developers to concurrently change a code-base in separate lines and reconcile their changes automatically afterwards. However, two changes that are correct independently can introduce bugs when merged together. We call semantic merge conflicts this kind of bugs. Change impact analysis (CIA) aims at estimating the effects of a change in a codebase. In this paper, we propose to detect semantic merge conflicts using CIA. On a merge, DELTAIMPACTFINDER analyzes and compares the impact of a change in its origin and destination branches. We call the difference between these two impacts the delta-impact. If the delta-impact is empty, then there is no indicator of a semantic merge conflict and the merge can continue automatically. Otherwise, the delta-impact contains what are the sources of possible conflicts.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 17:10:45 GMT" } ]
2015-09-21T00:00:00
[ [ "Dias", "Martín", "", "RMOD" ], [ "Polito", "Guillermo", "", "RMOD" ], [ "Cassou", "Damien", "", "RMOD" ], [ "Ducasse", "Stéphane", "", "RMOD" ] ]
new_dataset
0.979993
1509.05421
Jason Koh
Jason Koh, Bharathan Balaji, Rajesh Gupta, and Yuvraj Agarwal
HVACMeter: Apportionment of HVAC Power to Thermal Zones and Air Handler Units
null
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Heating, Ventilation and Air Conditioning (HVAC) systems consume almost half of the total energy use of commercial buildings. To optimize HVAC energy usage, it is important to understand the energy consumption of individual HVAC components at fine granularities. However, buildings typically only have aggregate building level power and thermal meters. We present HVACMeter, a system which leverages existing sensors in commercial HVAC systems to estimate the energy consumed by individual components of the HVAC system, as well by each thermal zone in buildings. HVACMeter can be generalized to any HVAC system as it uses the basic understanding of HVAC operation, heat transfer equations, and historical sensor data to estimate energy. We deploy HVACMeter to three buildings on our campus, to identify the set of sensors that are important for accurately disaggregating energy use at the level of each Air Handler Unit and each thermal zone within these buildings. HVACMeter power estimations have on an average 44.5 % less RMSE than that of mean power estimates. Furthermore, we highlight the usefulness of HVACMeter energy estimation model for a building fault detection application by quantifying the amount of energy that can be saved by fixing particular faults.
[ { "version": "v1", "created": "Thu, 17 Sep 2015 20:17:56 GMT" } ]
2015-09-21T00:00:00
[ [ "Koh", "Jason", "" ], [ "Balaji", "Bharathan", "" ], [ "Gupta", "Rajesh", "" ], [ "Agarwal", "Yuvraj", "" ] ]
new_dataset
0.996753
1509.05452
Anant Baijal
Anant Baijal, Julia Kim, Carmen Branje, Frank Russo, Deborah I. Fels
Composing vibrotactile music: A multisensory experience with the Emoti-chair
IEEE HAPTICS Symposium 2012
null
10.1109/HAPTIC.2012.6183839
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Emoti-Chair is a novel technology to enhance entertainment through vibrotactile stimulation. We assessed the experience of this technology in two workshops. In the first workshop, deaf film-makers experimented with creating vibetracks for a movie clip using a professional movie editing software. In the second workshop, trained opera singers sang and felt their voice through the Emoti-Chair. Participants in both workshops generally found the overall experience to be exciting and they were motivated to use the Chair for upcoming projects.
[ { "version": "v1", "created": "Thu, 17 Sep 2015 21:52:12 GMT" } ]
2015-09-21T00:00:00
[ [ "Baijal", "Anant", "" ], [ "Kim", "Julia", "" ], [ "Branje", "Carmen", "" ], [ "Russo", "Frank", "" ], [ "Fels", "Deborah I.", "" ] ]
new_dataset
0.999645
1509.05505
Abhinav Jauhri
Abhinav Jauhri, Martin Griss, Hakan Erdogmus
Small Polygon Compression For Integer Coordinates
Publised at 3rd Conference on Weather Warnings and Communication 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe several polygon compression techniques to enable efficient transmission of polygons representing geographical targets. The main application is to embed compressed polygons to emergency alert messages that have strict length restrictions, as in the case of Wireless Emergency Alert messages. We are able to compress polygons to between 9.7% and 23.6% of original length, depending on characteristics of the specific polygons, reducing original polygon lengths from 43-331 characters to 8-55 characters. The best techniques apply several heuristics to perform initial compression, and then other algorithmic techniques, including higher base encoding. Further, these methods are respectful of computation and storage constraints typical of cell phones. Two of the best techniques include a \enquote{bignum} quadratic combination of integer coordinates and a variable length encoding, which takes advantage of a strongly skewed polygon coordinate distribution. Both techniques applied to one of two \enquote{delta} representations of polygons are on average able to reduce the size of polygons by some 80%. A repeated substring dictionary can provide further compression, and a merger of these techniques into a \enquote{polyalgorithm} can also provide additional improvements.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 04:49:55 GMT" } ]
2015-09-21T00:00:00
[ [ "Jauhri", "Abhinav", "" ], [ "Griss", "Martin", "" ], [ "Erdogmus", "Hakan", "" ] ]
new_dataset
0.99941
1509.05526
EPTCS
Matt Kaufmann, David L. Rager
Proceedings Thirteenth International Workshop on the ACL2 Theorem Prover and Its Applications
Celebrating the 25th anniversary of ACL2
EPTCS 192, 2015
10.4204/EPTCS.192
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the Thirteenth International Workshop on the ACL2 Theorem Prover and Its Applications, ACL2 2015, a two-day workshop held in Austin, Texas, USA, on October 1-2, 2015. ACL2 workshops occur at approximately 18-month intervals and provide a major technical forum for researchers to present and discuss improvements and extensions to the theorem prover, comparisons of ACL2 with other systems, and applications of ACL2 in formal verification. ACL2 is a state-of-the-art automated reasoning system that has been successfully applied in academia, government, and industry for specification and verification of computing systems and in teaching computer science courses. In 2005, Boyer, Kaufmann, and Moore were awarded the 2005 ACM Software System Award for their work on ACL2 and the other theorem provers in the Boyer-Moore family.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 07:40:46 GMT" } ]
2015-09-21T00:00:00
[ [ "Kaufmann", "Matt", "" ], [ "Rager", "David L.", "" ] ]
new_dataset
0.998695
1509.05589
Lorenzo Saino
Ioannis Psaras, Konstantinos V. Katsaros, Lorenzo Saino and George Pavlou
LIRA: A Location Independent Routing Layer based on Source-Provided Ephemeral Names
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We identify the obstacles hindering the deployment of Information Centric Networking (ICN) and the shift from the current IP architecture. In particular, we argue that scalability of name resolution and the lack of control of content access from content providers are two important barriers that keep ICN away from deployment. We design solutions to incentivise ICN deployment and present a new network architecture that incorporates an extra layer in the protocol stack (the Location Independent Routing Layer, LIRA) to integrate location-independent content delivery. According to our design, content names need not (and should not) be permanent, but rather should be ephemeral. Resolution of non-permanent names requires the involvement of content providers, enabling desirable features such as request logging and cache purging, while avoiding the need for the deployment of a new name resolution infrastructure. Our results show that with half of the network's nodes operating under the LIRA framework, we can get the full gain of the ICN mode of operation.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 11:12:58 GMT" } ]
2015-09-21T00:00:00
[ [ "Psaras", "Ioannis", "" ], [ "Katsaros", "Konstantinos V.", "" ], [ "Saino", "Lorenzo", "" ], [ "Pavlou", "George", "" ] ]
new_dataset
0.999522
1509.05736
Issa Atoum
Issa Atoum, Chih How Bong, Narayanan Kulathuramaiyer
Building a Pilot Software Quality-in-Use Benchmark Dataset
6 pages,3 figures, conference Proceedings of 9th International Conference on IT in Asia CITA (2015)
null
null
null
cs.SE cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Prepared domain specific datasets plays an important role to supervised learning approaches. In this article a new sentence dataset for software quality-in-use is proposed. Three experts were chosen to annotate the data using a proposed annotation scheme. Then the data were reconciled in a (no match eliminate) process to reduce bias. The Kappa, k statistics revealed an acceptable level of agreement; moderate to substantial agreement between the experts. The built data can be used to evaluate software quality-in-use models in sentiment analysis models. Moreover, the annotation scheme can be used to extend the current dataset.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 18:19:48 GMT" } ]
2015-09-21T00:00:00
[ [ "Atoum", "Issa", "" ], [ "Bong", "Chih How", "" ], [ "Kulathuramaiyer", "Narayanan", "" ] ]
new_dataset
0.987992
1509.05739
Matthew Thill
Matthew Thill and Babak Hassibi
Low-Coherence Frames from Group Fourier Matrices
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many problems in areas such as compressive sensing and coding theory seek to design a set of equal-norm vectors with large angular separation. This idea is essentially equivalent to constructing a frame with low coherence. The elements of such frames can in turn be used to build high-performance spherical codes, quantum measurement operators, and compressive sensing measurement matrices, to name a few applications. In this work, we allude to the group-frame construction first described by Slepian and further explored in the works of Vale and Waldron. We present a method for selecting representations of a finite group to construct a group frame that achieves low coherence. Our technique produces a tight frame with a small number of distinct inner product values between the frame elements, in a sense approximating a Grassmanian frame. We identify special cases in which our construction yields some previously-known frames with optimal coherence meeting the Welch lower bound, and other cases in which the entries of our frame vectors come from small alphabets. In particular, we apply our technique to the problem choosing a subset of rows of a Hadamard matrix so that the resulting columns form a low-coherence frame. Finally, we give an explicit calculation of the average coherence of our frames, and find regimes in which they satisfy the Strong Coherence Property described by Mixon, Bajwa, and Calderbank.
[ { "version": "v1", "created": "Fri, 18 Sep 2015 18:25:39 GMT" } ]
2015-09-21T00:00:00
[ [ "Thill", "Matthew", "" ], [ "Hassibi", "Babak", "" ] ]
new_dataset
0.996645
1411.2852
Junaid Qadir
Aqsa Malik, Junaid Qadir, Basharat Ahmad, Kok-Lim Alvin Yau, Ubaid Ullah
QoS in IEEE 802.11-based Wireless Networks: A Contemporary Survey
null
null
10.1016/j.jnca.2015.04.016
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Apart from mobile cellular networks, IEEE 802.11-based wireless local area networks (WLANs) represent the most widely deployed wireless networking technology. With the migration of critical applications onto data networks, and the emergence of multimedia applications such as digital audio/video and multimedia games, the success of IEEE 802.11 depends critically on its ability to provide quality of service (QoS). A lot of research has focused on equipping IEEE 802.11 WLANs with features to support QoS. In this survey, we provide an overview of these techniques. We discuss the QoS features incorporated by the IEEE 802.11 standard at both physical (PHY) and media access control (MAC) layers, as well as other higher-layer proposals. We also focus on how the new architectural developments of software-defined networking (SDN) and cloud networking can be used to facilitate QoS provisioning in IEEE 802.11-based networks. We conclude this paper by identifying some open research issues for future consideration.
[ { "version": "v1", "created": "Tue, 11 Nov 2014 15:29:28 GMT" } ]
2015-09-18T00:00:00
[ [ "Malik", "Aqsa", "" ], [ "Qadir", "Junaid", "" ], [ "Ahmad", "Basharat", "" ], [ "Yau", "Kok-Lim Alvin", "" ], [ "Ullah", "Ubaid", "" ] ]
new_dataset
0.998204
1509.05054
Paul Irofti
Paul Irofti and Bogdan Dumitrescu
Overcomplete Dictionary Learning with Jacobi Atom Updates
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dictionary learning for sparse representations is traditionally approached with sequential atom updates, in which an optimized atom is used immediately for the optimization of the next atoms. We propose instead a Jacobi version, in which groups of atoms are updated independently, in parallel. Extensive numerical evidence for sparse image representation shows that the parallel algorithms, especially when all atoms are updated simultaneously, give better dictionaries than their sequential counterparts.
[ { "version": "v1", "created": "Wed, 16 Sep 2015 20:23:06 GMT" } ]
2015-09-18T00:00:00
[ [ "Irofti", "Paul", "" ], [ "Dumitrescu", "Bogdan", "" ] ]
new_dataset
0.965144
1509.05265
Farshad Ghassemi Toosi
Farshad Ghassemi Toosi and Nikola S. Nikolov
Sync-and-Burst: Force-Directed Graph Drawing with Uniform Force Magnitudes
12 pages
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a force-directed algorithm, called Sync-and-Burst, which falls into the category of classical force-directed graph drawing algorithms. A distinct feature in Sync-and-Burst is the use of simplified forces of attraction and repulsion whose magnitude does not depend on the distance between vertices. Instead, magnitudes are uniform throughout the graph at each iteration and monotonically increase as the number of iterations grows. The Sync-and-Burst layouts are always circular in shape with relatively even distribution of vertices throughout the drawing area. We demonstrate that aesthetically pleasing layouts are achieved in O(n) iterations.
[ { "version": "v1", "created": "Thu, 17 Sep 2015 14:07:47 GMT" } ]
2015-09-18T00:00:00
[ [ "Toosi", "Farshad Ghassemi", "" ], [ "Nikolov", "Nikola S.", "" ] ]
new_dataset
0.981231
1509.05330
Harry Boyer
Ali Hamada Fakra (PIMENT), Fr\'ed\'eric Miranville (PIMENT), Dimitri Bigot (PIMENT), Harry Boyer (PIMENT)
Elements of Validation of Artificial Lighting through the Software CODYRUN: Application to a Test Case of the International Commission on Illumination (CIE)
IASTED Power and Energy Systems 2010, Sep 2010, Gaborone, Botswana. 2010
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CODYRUN is a software for computational aeraulic and thermal simulation in buildings developed by the Laboratory of Building Physics and Systems (L.P.B.S). Numerical simulation codes of artificial lighting have been introduced to extend the tool capacity. These calculation codes are able to predict the amount of light received by any point of a given working plane and from one or more sources installed on the ceiling of the room. The model used for these calculations is original and semi-detailed (simplified). The test case references of the task-3 TC-33 International Commission on Illumination (CIE) were applied to the software to ensure reliability to properly handle this photometric aspect. This allowed having a precise idea about the reliability of the results of numerical simulations.
[ { "version": "v1", "created": "Tue, 15 Sep 2015 09:32:17 GMT" } ]
2015-09-18T00:00:00
[ [ "Fakra", "Ali Hamada", "", "PIMENT" ], [ "Miranville", "Frédéric", "", "PIMENT" ], [ "Bigot", "Dimitri", "", "PIMENT" ], [ "Boyer", "Harry", "", "PIMENT" ] ]
new_dataset
0.983641
1509.05351
Hojjat Mostafanasab
Hojjat Mostafanasab
Triple cyclic codes over $\mathbb{Z}_2$
15 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $r,s,t$ be three positive integers and $\mathcal{C}$ be a binary linear code of lenght $r+s+t$. We say that $\mathcal{C}$ is a triple cyclic code of lenght $(r,s,t)$ over $\mathbb{Z}_2$ if the set of coordinates can be partitioned into three parts that any cyclic shift of the coordinates of the parts leaves invariant the code. These codes can be considered as $\mathbb{Z}_2[x]$-submodules of $\frac{\mathbb{Z}_2[x]}{\langle x^r-1\rangle}\times\frac{\mathbb{Z}_2[x]}{\langle x^s-1\rangle}\times\frac{\mathbb{Z}_2[x]}{\langle x^t-1\rangle}$. We give the minimal generating sets of this kind of codes. Also, we determine the relationship between the generators of triple cyclic codes and their duals.
[ { "version": "v1", "created": "Thu, 17 Sep 2015 18:09:40 GMT" } ]
2015-09-18T00:00:00
[ [ "Mostafanasab", "Hojjat", "" ] ]
new_dataset
0.998827
1502.06195
Sebastian Morr
Alon Baram, Efi Fogel, Michael Hemmer, Dan Halperin, Sebastian Morr
Exact Minkowski Sums of Polygons With Holes
13 pages, 7 figures. Submitted to ESA 2015
null
10.1007/978-3-662-48350-3_7
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an efficient algorithm that computes the Minkowski sum of two polygons, which may have holes. The new algorithm is based on the convolution approach. Its efficiency stems in part from a property for Minkowski sums of polygons with holes, which in fact holds in any dimension: Given two polygons with holes, for each input polygon we can fill up the holes that are relatively small compared to the other polygon. Specifically, we can always fill up all the holes of at least one polygon, transforming it into a simple polygon, and still obtain exactly the same Minkowski sum. Obliterating holes in the input summands speeds up the computation of Minkowski sums. We introduce a robust implementation of the new algorithm, which follows the Exact Geometric Computation paradigm and thus guarantees exact results. We also present an empirical comparison of the performance of Minkowski sum construction of various input examples, where we show that the implementation of the new algorithm exhibits better performance than several other implementations in many cases. In particular, we compared the implementation of the new algorithm, an implementation of the standard convolution algorithm, and an implementation of the decomposition approach using various convex decomposition methods, including two new methods that handle polygons with holes - one is based on vertical decomposition and the other is based on triangulation. The software has been developed as an extension of the "2D Minkowski Sums" package of CGAL (Computational Geometry Algorithms Library). Additional information and supplementary material is available at our project page http://acg.cs.tau.ac.il/projects/rc
[ { "version": "v1", "created": "Sun, 22 Feb 2015 09:03:07 GMT" }, { "version": "v2", "created": "Sat, 21 Mar 2015 08:23:50 GMT" }, { "version": "v3", "created": "Tue, 28 Apr 2015 08:49:45 GMT" } ]
2015-09-17T00:00:00
[ [ "Baram", "Alon", "" ], [ "Fogel", "Efi", "" ], [ "Hemmer", "Michael", "" ], [ "Halperin", "Dan", "" ], [ "Morr", "Sebastian", "" ] ]
new_dataset
0.953905
1509.04745
Muxi Yan
Muxi Yan, Jasson Casey, Prithviraj Shome, Alex Sprintson and Andrew Sutton
{\AE}therFlow: Principled Wireless Support in SDN
This paper is to appear in the CoolSDN Workshop of ICNP 2015
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software Defined Networking (SDN) drastically changes the meaning and process of designing, building, testing, and operating networks. The current support for wireless net- working in SDN technologies has lagged behind its development and deployment for wired networks. The purpose of this work is to bring principled support for wireless access networks so that they can receive the same level of programmability as wireline interfaces. Specifically we aim to integrate wireless protocols into the general SDN framework by proposing a new set of abstractions in wireless devices and the interfaces to manipulate them. We validate our approach by implementing our design as an extension of an existing OpenFlow data plane and deploying it in an IEEE 802.11 access point. We demonstrate the viability of software-defined wireless access networks by developing and testing a wireless handoff application. The results of the exper- iment show that our framework is capable of providing new capabilities in an efficient manner.
[ { "version": "v1", "created": "Tue, 15 Sep 2015 21:31:49 GMT" } ]
2015-09-17T00:00:00
[ [ "Yan", "Muxi", "" ], [ "Casey", "Jasson", "" ], [ "Shome", "Prithviraj", "" ], [ "Sprintson", "Alex", "" ], [ "Sutton", "Andrew", "" ] ]
new_dataset
0.99711
1509.04751
Cheng-I Wang
Tammuz Dubnov and Cheng-i Wang
Free-body Gesture Tracking and Augmented Reality Improvisation for Floor and Aerial Dance
8 pages. Technical paper
null
null
null
cs.MM cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes an updated interactive performance system for floor and Aerial Dance that controls visual and sonic aspects of the presentation via a depth sensing camera (MS Kinect). In order to detect, measure and track free movement in space, 3 degree of freedom (3-DOF) tracking in space (on the ground and in the air) is performed using IR markers with a method for multi target tracking capabilities added and described in detail. An improved gesture tracking and recognition system, called Action Graph (AG), is described in the paper. Action Graph uses an efficient incremental construction from a single long sequence of movement features and automatically captures repeated sub-segments in the movement from start to finish with no manual interaction needed with other advanced capabilities discussed as well. By using the new model for the gesture we can unify an entire choreography piece by dynamically tracking and recognizing gestures and sub-portions of the piece. This gives the performer the freedom to improvise based on a set of recorded gestures/portions of the choreography and have the system dynamically respond in relation to the performer within a set of related rehearsed actions, an ability that has not been seen in any other system to date.
[ { "version": "v1", "created": "Tue, 15 Sep 2015 21:54:21 GMT" } ]
2015-09-17T00:00:00
[ [ "Dubnov", "Tammuz", "" ], [ "Wang", "Cheng-i", "" ] ]
new_dataset
0.97511
1509.04806
Francisco Su\'arez-Ruiz
Francisco Su\'arez-Ruiz and Quang-Cuong Pham
A Framework for Fine Robotic Assembly
8 pages, 7 figures, 2 tables
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fine robotic assembly, in which the parts to be assembled are small and fragile and lie in an unstructured environment, is still out of reach of today's industrial robots. The main difficulties arise in the precise localization of the parts in an unstructured environment and the control of contact interactions. Our contribution in this paper is twofold. First, we propose a taxonomy of the manipulation primitives that are specifically involved in fine assembly. Such a taxonomy is crucial for designing a scalable robotic system (both hardware and software) given the complexity of real-world assembly tasks. Second, we present a hardware and software architecture where we have addressed, in an integrated way, a number of issues arising in fine assembly, such as workspace optimization, external wrench compensation, position-based force control, etc. Finally, we show the above taxonomy and architecture in action on a highly dexterous task -- bimanual pin insertion -- which is one of the key steps in our long term project, the autonomous assembly of an IKEA chair.
[ { "version": "v1", "created": "Wed, 16 Sep 2015 03:55:33 GMT" } ]
2015-09-17T00:00:00
[ [ "Suárez-Ruiz", "Francisco", "" ], [ "Pham", "Quang-Cuong", "" ] ]
new_dataset
0.993492
1509.04811
Tadele Damessie T
Tadele Tedla
amLite: Amharic Transliteration Using Key Map Dictionary
6 pages
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
amLite is a framework developed to map ASCII transliterated Amharic texts back to the original Amharic letter texts. The aim of such a framework is to make existing Amharic linguistic data consistent and interoperable among researchers. For achieving the objective, a key map dictionary is constructed using the possible ASCII combinations actively in use for transliterating Amharic letters; and a mapping of the combinations to the corresponding Amharic letters is done. The mapping is then used to replace the Amharic linguistic text back to form the original Amharic letters text. The framework indicated 97.7, 99.7 and 98.4 percentage accuracy on converting the three sample random test data. It is; however, possible to improve the accuracy of the framework by adding an exception to the implementation of the algorithm, or by preprocessing the input text prior to conversion. This paper outlined the rationales behind the need for developing the framework and the processes undertaken in the development.
[ { "version": "v1", "created": "Wed, 16 Sep 2015 05:00:59 GMT" } ]
2015-09-17T00:00:00
[ [ "Tedla", "Tadele", "" ] ]
new_dataset
0.999241
1509.04956
J. Miguel Diaz-Banez
Francisco G\'omez, Joaqu\'in Mora, Emilia G\'omez, Jos\'e Miguel D\'iaz-B\'a\~nez
Melodic Contour and Mid-Level Global Features Applied to the Analysis of Flamenco Cantes
null
null
null
null
cs.SD cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work focuses on the topic of melodic characterization and similarity in a specific musical repertoire: a cappella flamenco singing, more specifically in debla and martinete styles. We propose the combination of manual and automatic description. First, we use a state-of-the-art automatic transcription method to account for general melodic similarity from music recordings. Second, we define a specific set of representative mid-level melodic features, which are manually labeled by flamenco experts. Both approaches are then contrasted and combined into a global similarity measure. This similarity measure is assessed by inspecting the clusters obtained through phylogenetic algorithms algorithms and by relating similarity to categorization in terms of style. Finally, we discuss the advantage of combining automatic and expert annotations as well as the need to include repertoire-specific descriptions for meaningful melodic characterization in traditional music collections.
[ { "version": "v1", "created": "Wed, 16 Sep 2015 15:56:22 GMT" } ]
2015-09-17T00:00:00
[ [ "Gómez", "Francisco", "" ], [ "Mora", "Joaquín", "" ], [ "Gómez", "Emilia", "" ], [ "Díaz-Báñez", "José Miguel", "" ] ]
new_dataset
0.997774
1507.00576
Jeffrey Pawlick
Jeffrey Pawlick, Sadegh Farhang, and Quanyan Zhu
Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats
To be presented at the 2015 Conference on Decision and Game Theory for Security (GameSec 2015)
null
10.13140/RG.2.1.3128.9446
null
cs.CR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access to the cloud has the potential to provide scalable and cost effective enhancements of physical devices through the use of advanced computational processes run on apparently limitless cyber infrastructure. On the other hand, cyber-physical systems and cloud-controlled devices are subject to numerous design challenges; among them is that of security. In particular, recent advances in adversary technology pose Advanced Persistent Threats (APTs) which may stealthily and completely compromise a cyber system. In this paper, we design a framework for the security of cloud-based systems that specifies when a device should trust commands from the cloud which may be compromised. This interaction can be considered as a game between three players: a cloud defender/administrator, an attacker, and a device. We use traditional signaling games to model the interaction between the cloud and the device, and we use the recently proposed FlipIt game to model the struggle between the defender and attacker for control of the cloud. Because attacks upon the cloud can occur without knowledge of the defender, we assume that strategies in both games are picked according to prior commitment. This framework requires a new equilibrium concept, which we call Gestalt Equilibrium, a fixed-point that expresses the interdependence of the signaling and FlipIt games. We present the solution to this fixed-point problem under certain parameter cases, and illustrate an example application of cloud control of an unmanned vehicle. Our results contribute to the growing understanding of cloud-controlled systems.
[ { "version": "v1", "created": "Thu, 2 Jul 2015 13:41:17 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2015 20:10:13 GMT" } ]
2015-09-16T00:00:00
[ [ "Pawlick", "Jeffrey", "" ], [ "Farhang", "Sadegh", "" ], [ "Zhu", "Quanyan", "" ] ]
new_dataset
0.989362
1508.02063
Farooq Khan
Farooq Khan
Multi-Comm-Core Architecture for Terabit/s Wireless
arXiv admin note: text overlap with arXiv:1508.02383
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communications along with the Internet has been the most transformative technology in the past 50 years. We expect that wireless data growth driven by new mobile applications, need to connect all humankind (not just 1/3) as well as Billions of things to the Internet will require Terabit/s shared links for ground based local area and wide area wireless access, for wireless backhaul as well as access via unmanned aerial vehicles (UAVs) and satellites. We present a new scalable radio architecture that we refer to multi-comm-core (MCC) to enable low-cost ultra-high speed wireless communications using both traditional and millimeter wave spectrum.
[ { "version": "v1", "created": "Sun, 9 Aug 2015 18:17:48 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 2015 19:54:07 GMT" } ]
2015-09-16T00:00:00
[ [ "Khan", "Farooq", "" ] ]
new_dataset
0.999496
1509.03934
Sam Maloney
Sam Maloney
Dpush: A scalable decentralized spam resistant unsolicited messaging protocol
Newest paper/design; signature was moved inside encrypted data for anonymity of sender to non recipients, grammar improvements
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Herein this paper is presented a novel invention - called Dpush - that enables truly scalable spam resistant uncensorable automatically encrypted and inherently authenticated messaging; thus restoring our ability to exert our right to private communication, and thus a step forward in restoring an uncorrupted democracy. Using a novel combination of a distributed hash table[1] (DHT) and a proof of work[2] (POW), combined in a way that can only be called a synergy, the emergent property of a scalable and spam resistant unsolicited messaging protocol elegantly emerges. Notable is that the receiver does not need to be online at the time the message is sent. This invention is already implemented and operating within the package that is called MORPHiS - which is a Sybil[3] resistant enhanced Kademlia[1] DHT implementation combined with an already functioning implementation of Dpush, as well as a polished HTTP Dmail interface to send and receive such messages today. MORPHiS is available for free (GPLv2) at the https://morph.is website.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 02:56:52 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 2015 07:44:01 GMT" } ]
2015-09-16T00:00:00
[ [ "Maloney", "Sam", "" ] ]
new_dataset
0.987619
1509.04268
Kota Naga Srinivasarao Batta
Batta Kota Naga Srinivasarao and Indrajit Chakrabarti
High Speed VLSI Architecture for 3-D Discrete Wavelet Transform
Submitting to IET CDS. arXiv admin note: substantial text overlap with arXiv:1509.03836
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a memory efficient, high throughput parallel lifting based running three dimensional discrete wavelet transform (3-D DWT) architecture. 3-D DWT is constructed by combining the two spatial and four temporal processors. Spatial processor (SP) apply the two dimensional DWT on a frame, using lifting based 9/7 filter bank through the row rocessor (RP) in row direction and then apply in the colum direction through column processor (CP). To reduce the temporal memory and the latency, the temporal processor (TP) has been designed with lifting based 1-D Haar wavelet filter. The proposed architecture replaced the multiplications by pipeline shift-add operations to reduce the CPD. Two spatial processors works simultaneously on two adjacent frames and provide 2-D DWT coefficients as inputs to the temporal processors. TPs apply the one dimensional DWT in temporal direction and provide eight 3-D DWT coefficients per clock (throughput). Higher throughput reduces the computing cycles per frame and enable the lower power consumption. Implementation results shows that the proposed architecture has the advantage in reduced memory, low power consumption, low latency, and high throughput over the existing designs. The RTL of the proposed architecture is described using verilog and synthesized using 90-nm technology CMOS standard cell library and results show that it consumes 43.42 mW power and occupies an area equivalent to 231.45 K equivalent gate at frequency of 200 MHz. The proposed architecture has also been synthesised for the Xilinx zynq 7020 series field programmable gate array (FPGA).
[ { "version": "v1", "created": "Mon, 14 Sep 2015 03:46:00 GMT" } ]
2015-09-16T00:00:00
[ [ "Srinivasarao", "Batta Kota Naga", "" ], [ "Chakrabarti", "Indrajit", "" ] ]
new_dataset
0.970478
1509.04335
Hyeji Kim
Hyeji Kim and Abbas El Gamal
Capacity Theorems for Broadcast Channels with Two Channel State Components Known at the Receivers
18 pages, 6 figures, submitted to IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1401.6738
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish the capacity region of several classes of broadcast channels with random state in which the channel to each user is selected from two possible channel state components and the state is known only at the receivers. When the channel components are deterministic, we show that the capacity region is achieved via Marton coding. This channel model does not belong to any class of broadcast channels for which the capacity region was previously known and is useful in studying wireless communication channels when the fading state is known only at the receivers. We then establish the capacity region when the channel components are ordered, e.g., degraded. In particular we show that the capacity region for the broadcast channel with degraded Gaussian vector channel components is attained via Gaussian input distribution. Finally, we extend the results on ordered channels to two broadcast channel examples with more than two channel components, but show that these extensions do not hold in general.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 21:29:08 GMT" } ]
2015-09-16T00:00:00
[ [ "Kim", "Hyeji", "" ], [ "Gamal", "Abbas El", "" ] ]
new_dataset
0.985895
1509.04636
Mehul S Raval
Dhruv Gupta, Gunvantsinh Gohil, Mehul S. Raval
Driver Friendly Headlight Controller for Driving in Developing Countries
null
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/4.0/
In developing countries, night driving is extremely unsafe mainly due to; 1). Poorly followed traffic rules and 2) bad road conditions. The number of accidents is increasing at a frightening pace, necessitating the development of a low cost automatic headlight control system to ensure safety. In most accident cases, fatal collisions take place due to glare generated by excessive headlight intensity (high beam) of the oncoming vehicle. In this paper, a user friendly controller for headlight intensity control for driving on highway at night has been proposed. Aim is to design simple and affordable system that can alleviate effect of blind spot due to high glare on the vehicle windscreen. Controller is based on Fuzzy inference system (FIS) and used incoming light intensity as criteria. Also, relative distance and speed is derived using incoming intensity of the oncoming vehicles. The system is designed considering human tolerance levels of light intensity as the boundary values. The system controls headlight beam voltage such that; a) intensity is maintained in human visual comfort zone and b) blind spot is avoided. The super user feature incorporated in the intensity controller offers personalized preferences to the driver. Due to the use of the single parameter (intensity) for control, system can be implemented using simplified hardware.
[ { "version": "v1", "created": "Tue, 15 Sep 2015 16:53:33 GMT" } ]
2015-09-16T00:00:00
[ [ "Gupta", "Dhruv", "" ], [ "Gohil", "Gunvantsinh", "" ], [ "Raval", "Mehul S.", "" ] ]
new_dataset
0.99946
1211.5787
Amos Korman
Ofer Feinerman and Amos Korman and Shay Kutten and Yoav Rodeh
Fast Rendezvous on a Cycle by Agents with Different Speeds
null
null
null
null
cs.DC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The difference between the speed of the actions of different processes is typically considered as an obstacle that makes the achievement of cooperative goals more difficult. In this work, we aim to highlight potential benefits of such asynchrony phenomena to tasks involving symmetry breaking. Specifically, in this paper, identical (except for their speeds) mobile agents are placed at arbitrary locations on a cycle of length $n$ and use their speed difference in order to rendezvous fast. We normalize the speed of the slower agent to be 1, and fix the speed of the faster agent to be some $c>1$. (An agent does not know whether it is the slower agent or the faster one.) The straightforward distributed-race DR algorithm is the one in which both agents simply start walking until rendezvous is achieved. It is easy to show that, in the worst case, the rendezvous time of DR is $n/(c-1)$. Note that in the interesting case, where $c$ is very close to 1 this bound becomes huge. Our first result is a lower bound showing that, up to a multiplicative factor of 2, this bound is unavoidable, even in a model that allows agents to leave arbitrary marks, even assuming sense of direction, and even assuming $n$ and $c$ are known to agents. That is, we show that under such assumptions, the rendezvous time of any algorithm is at least $\frac{n}{2(c-1)}$ if $c\leq 3$ and slightly larger if $c>3$. We then construct an algorithm that precisely matches the lower bound for the case $c\leq 2$, and almost matches it when $c>2$. Moreover, our algorithm performs under weaker assumptions than those stated above, as it does not assume sense of direction, and it allows agents to leave only a single mark (a pebble) and only at the place where they start the execution. Finally, we investigate the setting in which no marks can be used at all, and show tight bounds for $c\leq 2$, and almost tight bounds for $c>2$.
[ { "version": "v1", "created": "Sun, 25 Nov 2012 17:49:28 GMT" }, { "version": "v2", "created": "Sun, 13 Sep 2015 16:35:47 GMT" } ]
2015-09-15T00:00:00
[ [ "Feinerman", "Ofer", "" ], [ "Korman", "Amos", "" ], [ "Kutten", "Shay", "" ], [ "Rodeh", "Yoav", "" ] ]
new_dataset
0.976292
1410.5414
Vasileios Kapinas
Panagiotis G. Tsalaportas, Vasileios M. Kapinas, George K. Karagiannidis
Solar Lab Notebook (SLN): An Ultra-Portable Web-Based System for Heliophysics and High-Security Labs
10 pages, 7 figures, 1 table. Final content
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 8, no. 8, pp. 4141-4150, August 2015
10.1109/JSTARS.2015.2444332
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the Solar Lab Notebook (SLN), an electronic lab notebook for improving the process of recording and sharing solar related digital information in an organized manner. SLN is a pure web-based application (available online: http://umbra.nascom.nasa.gov/sln) that runs client-side only, employing a clean and very friendly graphical user interface design, and thus providing a true cross-platform user experience. Furthermore, SLN leverages unique technologies offered by modern web browsers, such as the FileReader API, the Blob interface and Local Storage mechanism; it is coded entirely using HTML5, CSS3, and JavaScript, and powered by the extremely well documented XML file format. For high-security labs, it can be utilized as an ultra-portable and secure digital notebook solution, since it is functionally self-contained, and does not require any server-side process running on either the local or a remote system. Finally, the W3C XML Schema language is used to define a list of rules, namely a data standard, that an SLN file must conform to in order to be valid. In this way, developers are able to implement their own validation functions in their projects, or use one of the freely available tools to check if a data file is properly structured. Similarly, scientific groups at different labs can easily share information, being confident about the integrity of the exchanged data.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 22:58:18 GMT" }, { "version": "v2", "created": "Sun, 16 Nov 2014 00:50:19 GMT" }, { "version": "v3", "created": "Thu, 5 Mar 2015 02:54:15 GMT" }, { "version": "v4", "created": "Sat, 6 Jun 2015 01:32:00 GMT" }, { "version": "v5", "created": "Fri, 19 Jun 2015 18:10:43 GMT" } ]
2015-09-15T00:00:00
[ [ "Tsalaportas", "Panagiotis G.", "" ], [ "Kapinas", "Vasileios M.", "" ], [ "Karagiannidis", "George K.", "" ] ]
new_dataset
0.988031
1509.01549
Matthew Lai
Matthew Lai
Giraffe: Using Deep Reinforcement Learning to Play Chess
MSc Dissertation
null
null
null
cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report presents Giraffe, a chess engine that uses self-play to discover all its domain-specific knowledge, with minimal hand-crafted knowledge given by the programmer. Unlike previous attempts using machine learning only to perform parameter-tuning on hand-crafted evaluation functions, Giraffe's learning system also performs automatic feature extraction and pattern recognition. The trained evaluation function performs comparably to the evaluation functions of state-of-the-art chess engines - all of which containing thousands of lines of carefully hand-crafted pattern recognizers, tuned over many years by both computer chess experts and human chess masters. Giraffe is the most successful attempt thus far at using end-to-end machine learning to play chess.
[ { "version": "v1", "created": "Fri, 4 Sep 2015 18:21:52 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2015 15:42:35 GMT" } ]
2015-09-15T00:00:00
[ [ "Lai", "Matthew", "" ] ]
new_dataset
0.998218
1509.03677
Maziar Izadi
Sasi Prabhakaran Viswanathan, Amit Kumar Sanyal, Maziar Izadi
Mechatronics Architecture of Smartphone-Based Spacecraft ADCS using VSCMG Actuators
null
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hardware and software architecture of a novel spacecraft Attitude Determination and Control System (ADCS) based on smartphones using Variable Speed Control Moment Gyroscope (VSCMG) as actuator is proposed here. A spacecraft ground simulator testbed for Hardware-in-the-loop (HIL) attitude estimation and control with VSCMG is also described. The sensor breakouts with independent micro-controller units are used in the conventional ADCS units, which are replaced by a single integrated off-the-shelf smartphone. On-board sensing, data acquisition, data uplink/downlink, state estimation and real-time feedback control objectives can be performed using this novel spacecraft ADCS. The attitude control and attitude determination (estimation) schemes have appeared in prior publications, but are presented in brief here. Experimental results from running the attitude estimation (filtering) scheme with the "onboard" sensors of the smartphone in the HIL simulator are given. These results, obtained in the Spacecraft Guidance, Navigation and Control Laboratory at NMSU, demonstrate the excellent performance of this estimation scheme with the noisy raw data from the smartphone sensors.
[ { "version": "v1", "created": "Fri, 11 Sep 2015 21:58:31 GMT" } ]
2015-09-15T00:00:00
[ [ "Viswanathan", "Sasi Prabhakaran", "" ], [ "Sanyal", "Amit Kumar", "" ], [ "Izadi", "Maziar", "" ] ]
new_dataset
0.999119
1509.03700
Peter Kovesi
Peter Kovesi
Good Colour Maps: How to Design Them
42 pages, 25 figures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many colour maps provided by vendors have highly uneven perceptual contrast over their range. It is not uncommon for colour maps to have perceptual flat spots that can hide a feature as large as one tenth of the total data range. Colour maps may also have perceptual discontinuities that induce the appearance of false features. Previous work in the design of perceptually uniform colour maps has mostly failed to recognise that CIELAB space is only designed to be perceptually uniform at very low spatial frequencies. The most important factor in designing a colour map is to ensure that the magnitude of the incremental change in perceptual lightness of the colours is uniform. The specific requirements for linear, diverging, rainbow and cyclic colour maps are developed in detail. To support this work two test images for evaluating colour maps are presented. The use of colour maps in combination with relief shading is considered and the conditions under which colour can enhance or disrupt relief shading are identified. Finally, a set of new basis colours for the construction of ternary images are presented. Unlike the RGB primaries these basis colours produce images whereby the salience of structures are consistent irrespective of the assignment of basis colours to data channels.
[ { "version": "v1", "created": "Sat, 12 Sep 2015 03:35:20 GMT" } ]
2015-09-15T00:00:00
[ [ "Kovesi", "Peter", "" ] ]
new_dataset
0.965522
1509.03721
Mohsen Ghasempour
Mohsen Ghasempour, Jim Garside, Aamer Jaleel and Mikel Luj\'an
DReAM: Dynamic Re-arrangement of Address Mapping to Improve the Performance of DRAMs
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The initial location of data in DRAMs is determined and controlled by the 'address-mapping' and even modern memory controllers use a fixed and run-time-agnostic address mapping. On the other hand, the memory access pattern seen at the memory interface level will dynamically change at run-time. This dynamic nature of memory access pattern and the fixed behavior of address mapping process in DRAM controllers, implied by using a fixed address mapping scheme, means that DRAM performance cannot be exploited efficiently. DReAM is a novel hardware technique that can detect a workload-specific address mapping at run-time based on the application access pattern which improves the performance of DRAMs. The experimental results show that DReAM outperforms the best evaluated address mapping on average by 9%, for mapping-sensitive workloads, by 2% for mapping-insensitive workloads, and up to 28% across all the workloads. DReAM can be seen as an insurance policy capable of detecting which scenarios are not well served by the predefined address mapping.
[ { "version": "v1", "created": "Sat, 12 Sep 2015 08:02:39 GMT" } ]
2015-09-15T00:00:00
[ [ "Ghasempour", "Mohsen", "" ], [ "Garside", "Jim", "" ], [ "Jaleel", "Aamer", "" ], [ "Luján", "Mikel", "" ] ]
new_dataset
0.970686
1509.03843
Derrick Newton Dr
Derrick Newton
Attack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe's attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS protocol. The attack has been confirmed through initial protocol modelling using a automated theorem prover, ProVerif.
[ { "version": "v1", "created": "Sun, 13 Sep 2015 12:57:25 GMT" } ]
2015-09-15T00:00:00
[ [ "Newton", "Derrick", "" ] ]
new_dataset
0.984325
1509.04219
Afroze Ibrahim Baqapuri
Afroze Ibrahim Baqapuri
Twitter Sentiment Analysis
Bachelors Thesis Report
null
null
null
cs.CL cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This project addresses the problem of sentiment analysis in twitter; that is classifying tweets according to the sentiment expressed in them: positive, negative or neutral. Twitter is an online micro-blogging and social-networking platform which allows users to write short status updates of maximum length 140 characters. It is a rapidly expanding service with over 200 million registered users - out of which 100 million are active users and half of them log on twitter on a daily basis - generating nearly 250 million tweets per day. Due to this large amount of usage we hope to achieve a reflection of public sentiment by analysing the sentiments expressed in the tweets. Analysing the public sentiment is important for many applications such as firms trying to find out the response of their products in the market, predicting political elections and predicting socioeconomic phenomena like stock exchange. The aim of this project is to develop a functional classifier for accurate and automatic sentiment classification of an unknown tweet stream.
[ { "version": "v1", "created": "Mon, 14 Sep 2015 17:39:37 GMT" } ]
2015-09-15T00:00:00
[ [ "Baqapuri", "Afroze Ibrahim", "" ] ]
new_dataset
0.958865
1412.7148
Tarmo Uustalu
Thosten Altenkirch (University of Nottingham), James Chapman (Institute of Cybernetics), Tarmo Uustalu (Institute of Cybernetics)
Monads need not be endofunctors
null
Logical Methods in Computer Science, Volume 11, Issue 1 (March 6, 2015) lmcs:928
10.2168/LMCS-11(1:3)2015
null
cs.PL cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a generalization of monads, called relative monads, allowing for underlying functors between different categories. Examples include finite-dimensional vector spaces, untyped and typed lambda-calculus syntax and indexed containers. We show that the Kleisli and Eilenberg-Moore constructions carry over to relative monads and are related to relative adjunctions. Under reasonable assumptions, relative monads are monoids in the functor category concerned and extend to monads, giving rise to a coreflection between relative monads and monads. Arrows are also an instance of relative monads.
[ { "version": "v1", "created": "Mon, 22 Dec 2014 20:53:17 GMT" }, { "version": "v2", "created": "Wed, 4 Mar 2015 21:10:14 GMT" } ]
2015-09-14T00:00:00
[ [ "Altenkirch", "Thosten", "", "University of Nottingham" ], [ "Chapman", "James", "", "Institute of Cybernetics" ], [ "Uustalu", "Tarmo", "", "Institute of Cybernetics" ] ]
new_dataset
0.956011