id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1508.04515
Wei Zhang
Wei Zhang, Judith Gelernter
Exploring Metaphorical Senses and Word Representations for Identifying Metonyms
9 pages, 8 pages content
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A metonym is a word with a figurative meaning, similar to a metaphor. Because metonyms are closely related to metaphors, we apply features that are used successfully for metaphor recognition to the task of detecting metonyms. On the ACL SemEval 2007 Task 8 data with gold standard metonym annotations, our system achieved 86.45% accuracy on the location metonyms. Our code can be found on GitHub.
[ { "version": "v1", "created": "Wed, 19 Aug 2015 03:26:05 GMT" } ]
2015-08-20T00:00:00
[ [ "Zhang", "Wei", "" ], [ "Gelernter", "Judith", "" ] ]
new_dataset
0.997076
1508.04586
Veronica Vilaplana
Ver\'onica Vilaplana
Saliency maps on image hierarchies
Accepted for publication in Signal Processing: Image Communications, 2015
null
10.1016/j.image.2015.07.012
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose two saliency models for salient object segmentation based on a hierarchical image segmentation, a tree-like structure that represents regions at different scales from the details to the whole image (e.g. gPb-UCM, BPT). The first model is based on a hierarchy of image partitions. The saliency at each level is computed on a region basis, taking into account the contrast between regions. The maps obtained for the different partitions are then integrated into a final saliency map. The second model directly works on the structure created by the segmentation algorithm, computing saliency at each node and integrating these cues in a straightforward manner into a single saliency map. We show that the proposed models produce high quality saliency maps. Objective evaluation demonstrates that the two methods achieve state-of-the-art performance in several benchmark datasets.
[ { "version": "v1", "created": "Wed, 19 Aug 2015 10:07:07 GMT" } ]
2015-08-20T00:00:00
[ [ "Vilaplana", "Verónica", "" ] ]
new_dataset
0.987556
1508.04753
Gerhard Dueck
Kim T. Briggs, Baoguo Zhou, Gerhard W. Dueck
Cold Object Identification in the Java Virtual Machine
For submission to `Software: Practice and Experience'
null
null
null
cs.PL cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many Java applications instantiate objects within the Java heap that are persistent but seldom if ever referenced by the application. Examples include strings, such as error messages, and collections of value objects that are preloaded for fast access but they may include objects that are seldom referenced. This paper describes a stack-based framework for detecting these "cold" objects at runtime, with a view to marshaling and sequestering them in designated regions of the heap where they may be preferentially paged out to a backing store, thereby freeing physical memory pages for occupation by more active objects. Furthermore, we evaluate the correctness and efficiency of stack-based approach with an Access Barrier. The experimental results from a series of SPECjvm2008 benchmarks are presented.
[ { "version": "v1", "created": "Tue, 18 Aug 2015 19:50:17 GMT" } ]
2015-08-20T00:00:00
[ [ "Briggs", "Kim T.", "" ], [ "Zhou", "Baoguo", "" ], [ "Dueck", "Gerhard W.", "" ] ]
new_dataset
0.967678
1405.1359
Michael Kai Petersen
Michael Kai Petersen
Latent semantics of action verbs reflect phonetic parameters of intensity and emotional content
15 pages
null
10.1371/journal.pone.0121575
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conjuring up our thoughts, language reflects statistical patterns of word co-occurrences which in turn come to describe how we perceive the world. Whether counting how frequently nouns and verbs combine in Google search queries, or extracting eigenvectors from term document matrices made up of Wikipedia lines and Shakespeare plots, the resulting latent semantics capture not only the associative links which form concepts, but also spatial dimensions embedded within the surface structure of language. As both the shape and movements of objects have been found to be associated with phonetic contrasts already in toddlers, this study explores whether articulatory and acoustic parameters may likewise differentiate the latent semantics of action verbs. Selecting 3 x 20 emotion, face, and hand related verbs known to activate premotor areas in the brain, their mutual cosine similarities were computed using latent semantic analysis LSA, and the resulting adjacency matrices were compared based on two different large scale text corpora; HAWIK and TASA. Applying hierarchical clustering to identify common structures across the two text corpora, the verbs largely divide into combined mouth and hand movements versus emotional expressions. Transforming the verbs into their constituent phonemes, the clustered small and large size movements appear differentiated by front versus back vowels corresponding to increasing levels of arousal. Whereas the clustered emotional verbs seem characterized by sequences of close versus open jaw produced phonemes, generating up- or downwards shifts in formant frequencies that may influence their perceived valence. Suggesting, that the latent semantics of action verbs reflect parameters of intensity and emotional polarity that appear correlated with the articulatory contrasts and acoustic characteristics of phonemes
[ { "version": "v1", "created": "Tue, 6 May 2014 16:52:34 GMT" }, { "version": "v2", "created": "Sun, 31 Aug 2014 14:21:10 GMT" }, { "version": "v3", "created": "Sat, 29 Nov 2014 21:14:29 GMT" } ]
2015-08-19T00:00:00
[ [ "Petersen", "Michael Kai", "" ] ]
new_dataset
0.95209
1409.0926
Yaar Solomon
David Simmons and Yaar Solomon
A Danzer set for Axis Parallel Boxes
null
null
null
null
cs.CG cs.DM math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present concrete constructions of discrete sets in $\mathbb{R}^d$ ($d\ge 2$) that intersect every aligned box of volume $1$ in $\mathbb{R}^d$, and which have optimal growth rate $O(T^d)$.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 00:06:34 GMT" }, { "version": "v2", "created": "Wed, 21 Jan 2015 17:54:44 GMT" }, { "version": "v3", "created": "Tue, 18 Aug 2015 14:41:44 GMT" } ]
2015-08-19T00:00:00
[ [ "Simmons", "David", "" ], [ "Solomon", "Yaar", "" ] ]
new_dataset
0.999268
1411.0001
Abhijit Chandra
Abhijit Chandra, Oliva Kar, Kuan-Chuen Wu, Michelle Hall and Jason Gillette
Prognosis of Anterior Cruciate Ligament (ACL) Reconstruction: A Data Driven Approach
arXiv admin note: substantial text overlap with arXiv:1410.8616
null
10.1098/rspa.2014.0526
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Individuals who suffer anterior cruciate ligament (ACL) injury are at higher risk of developing knee osteoarthritis (OA) and almost 50% display symptoms 10 to 20 years post injury. Anterior cruciate ligament reconstruction (ACLR) often does not protect against knee OA development. Accordingly, a multiscale formulation for Data Driven Prognosis (DDP) of post ACLR is developed. Unlike traditional predictive strategies that require controlled off-line measurements or training for determination of constitutive parameters to derive the transitional statistics, the proposed DDP algorithm relies solely on in situ measurements. The proposed DDP scheme is capable of predicting onset of instabilities. Since the need for off line testing (or training) is obviated, it can be easily implemented for ACLR, where such controlled a priori testing is almost impossible to conduct. The DDP algorithm facilitates hierarchical handling of the large data set, and can assess the state of recovery in post ACLR conditions based on data collected from stair ascent and descent exercises of subjects. The DDP algorithm identifies inefficient knee varus motion and knee rotation as primary difficulties experienced by some of the post ACLR population. In such cases, levels of energy dissipation rate at the knee, and its fluctuation may be used as measures for assessing progress after ACL reconstruction.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 22:54:07 GMT" } ]
2015-08-19T00:00:00
[ [ "Chandra", "Abhijit", "" ], [ "Kar", "Oliva", "" ], [ "Wu", "Kuan-Chuen", "" ], [ "Hall", "Michelle", "" ], [ "Gillette", "Jason", "" ] ]
new_dataset
0.995308
1502.03182
Yan Michalevsky
Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian and Dan Boneh
PowerSpy: Location Tracking using Mobile Device Power Analysis
Usenix Security 2015
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone's aggregate power consumption over a period of a few minutes an application can learn information about the user's location. Aggregate phone power consumption data is extremely noisy due to the multitude of components and applications that simultaneously consume power. Nevertheless, by using machine learning algorithms we are able to successfully infer the phone's location. We discuss several ways in which this privacy leak can be remedied.
[ { "version": "v1", "created": "Wed, 11 Feb 2015 02:46:50 GMT" }, { "version": "v2", "created": "Tue, 24 Feb 2015 22:17:04 GMT" }, { "version": "v3", "created": "Sat, 15 Aug 2015 07:50:24 GMT" }, { "version": "v4", "created": "Tue, 18 Aug 2015 01:02:34 GMT" } ]
2015-08-19T00:00:00
[ [ "Michalevsky", "Yan", "" ], [ "Nakibly", "Gabi", "" ], [ "Schulman", "Aaron", "" ], [ "Veerapandian", "Gunaa Arumugam", "" ], [ "Boneh", "Dan", "" ] ]
new_dataset
0.986219
1505.06494
Serap Savari
Narendra Chaudhary, Yao Luo, Serap A. Savari, and Roger McCay
Lossless Layout Image Compression Algorithms for Electron-Beam Direct-Write Lithography
This is the source file for the paper which was published in the Journal of Vacuum Science & Technology B (volume 33, 06FD01) on 5 August 2015
Journal of Vacuum Science & Technology B (Vol.33, Issue 6), 06FD01 (2015)
10.1116/1.4927639
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electron-beam direct-write (EBDW) lithography systems must in the future transmit terabits of information per second to be viable for commercial semiconductor manufacturing. Lossless layout image compression algorithms with high decoding throughputs and modest decoding resources are tools to address the data transfer portion of the throughput problem. The earlier lossless layout image compression algorithm Corner2 is designed for binary layout images on raster-scanning systems. We propose variations of Corner2 collectively called Corner2-EPC and Paeth-EPC which apply to electron-beam proximity corrected layout images and offer interesting trade-offs between compression ratios and decoding speeds. Most of our algorithms achieve better overall compression performance than PNG, Block C4 and LineDiffEntropy while having low decoding times and resources.
[ { "version": "v1", "created": "Sun, 24 May 2015 22:48:00 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2015 15:40:19 GMT" } ]
2015-08-19T00:00:00
[ [ "Chaudhary", "Narendra", "" ], [ "Luo", "Yao", "" ], [ "Savari", "Serap A.", "" ], [ "McCay", "Roger", "" ] ]
new_dataset
0.991321
1506.01792
Philipp Sommer
Philipp Sommer, Branislav Kusy, Philip Valencia, Ross Dungavell, Raja Jurdak
Delay-Tolerant Networking for Long-Term Animal Tracking
14 pages, 5 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enabling Internet connectivity for mobile objects that do not have a permanent home or regular movements is a challenge due to their varying energy budget, intermittent wireless connectivity, and inaccessibility. We present a hardware and software framework that offers robust data collection, adaptive execution of sensing tasks, and flexible remote reconfiguration of devices deployed on nomadic mobile objects such as animals. The framework addresses the overall complexity through a multi-tier architecture with low tier devices operating on a tight energy harvesting budget and high tier cloud services offering seamless delay-tolerant presentation of data to end users. Based on our multi-year experience of applying this framework to animal tracking and monitoring applications, we present the main challenges that we have encountered, the design of software building blocks that address these challenges, and examples of the data we collected on flying foxes.
[ { "version": "v1", "created": "Fri, 5 Jun 2015 06:37:23 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2015 19:31:46 GMT" } ]
2015-08-19T00:00:00
[ [ "Sommer", "Philipp", "" ], [ "Kusy", "Branislav", "" ], [ "Valencia", "Philip", "" ], [ "Dungavell", "Ross", "" ], [ "Jurdak", "Raja", "" ] ]
new_dataset
0.97734
1507.08094
Sebastian E. Schmittner
Sebastian E. Schmittner
A SAT-based Public Key Cryptography Scheme
7 pages + appendix, 1 figure + 6 in appendix
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A homomorphic public key crypto-scheme based on the Boolean Satisfiability Problem is proposed. The public key is a SAT formula satisfied by the private key. Probabilistic encryption generates functions implied to be false by the public key XOR the message bits. A zero-knowledge proof is used to provide signatures.
[ { "version": "v1", "created": "Wed, 29 Jul 2015 10:24:59 GMT" }, { "version": "v2", "created": "Tue, 11 Aug 2015 18:36:36 GMT" }, { "version": "v3", "created": "Tue, 18 Aug 2015 08:55:28 GMT" } ]
2015-08-19T00:00:00
[ [ "Schmittner", "Sebastian E.", "" ] ]
new_dataset
0.998183
1508.04234
Amitabh Trehan
Armando Castaneda, Danny Dolev and Amitabh Trehan
Compact Routing Messages in Self-Healing Trees
Under Submission
null
null
null
cs.DC cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing compact routing schemes, e.g., Thorup and Zwick [SPAA 2001] and Chechik [PODC 2013], often have no means to tolerate failures, once the system has been setup and started. This paper presents, to our knowledge, the first self-healing compact routing scheme. Besides, our schemes are developed for low memory nodes, i.e., nodes need only $O(\log^2 n)$ memory, and are thus, compact schemes. We introduce two algorithms of independent interest: The first is CompactFT, a novel compact version (using only $O(\log n)$ local memory) of the self-healing algorithm Forgiving Tree of Hayes et al. [PODC 2008]. The second algorithm (CompactFTZ) combines CompactFT with Thorup-Zwick's tree-based compact routing scheme [SPAA 2001] to produce a fully compact self-healing routing scheme. In the self-healing model, the adversary deletes nodes one at a time with the affected nodes self-healing locally by adding few edges. CompactFT recovers from each attack in only $O(1)$ time and $\Delta$ messages, with only +3 degree increase and $O(log \Delta)$ graph diameter increase, over any sequence of deletions ($\Delta$ is the initial maximum degree). Additionally, CompactFTZ guarantees delivery of a packet sent from sender s as long as the receiver t has not been deleted, with only an additional $O(y \log \Delta)$ latency, where $y$ is the number of nodes that have been deleted on the path between $s$ and $t$. If $t$ has been deleted, $s$ gets informed and the packet removed from the network.
[ { "version": "v1", "created": "Tue, 18 Aug 2015 07:47:55 GMT" } ]
2015-08-19T00:00:00
[ [ "Castaneda", "Armando", "" ], [ "Dolev", "Danny", "" ], [ "Trehan", "Amitabh", "" ] ]
new_dataset
0.999255
1210.1935
Chung-Chieh Fang
Chung-Chieh Fang
Saddle-Node Bifurcation Associated with Parasitic Inductor Resistance in Boost Converters
Minor revision from a manuscript dated in 2010
Some parts of this manuscript are published in International Journal of Electronics, 100(8), pp. 1147-1174, Aug. 2013
10.1080/00207217.2012.743072
null
cs.SY math.DS nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saddle-node bifurcation occurs in a boost converter when parasitic inductor resistance is modeled. Closed-form critical conditions of the bifurcation are derived. If the parasitic inductor resistance is modeled, the saddle-node bifurcation occurs in the voltage mode control or in the current mode control with the voltage loop closed, but not in the current mode control with the voltage loop open. If the parasitic inductor resistance is not modeled, the saddle-node bifurcation does not occur, and one may be misled by the wrong dynamics and the wrong steady-state solutions. The saddle-node bifurcation still exists even in a boost converter with a popular type-III compensator. When the saddle-node bifurcation occurs, multiple steady-state solutions may coexist. The converter may operate with a voltage jump from one solution to another. Care should be taken in the compensator design to ensure that only the desired solution is stabilized. In industry practice, the solution with a higher duty cycle (and thus the saddle-node bifurcation) may be prevented by placing a limitation on the maximum duty cycle.
[ { "version": "v1", "created": "Sat, 6 Oct 2012 08:56:46 GMT" } ]
2015-08-18T00:00:00
[ [ "Fang", "Chung-Chieh", "" ] ]
new_dataset
0.99935
1407.6954
Robert Kl\"ofkorn
Martin Alk\"amper, Andreas Dedner, Robert Kl\"ofkorn, and Martin Nolte
The DUNE-ALUGrid Module
25 pages, 11 figures
null
null
null
cs.MS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the new DUNE-ALUGrid module. This module contains a major overhaul of the sources from the ALUgrid library and the binding to the DUNE software framework. The main changes include user defined load balancing, parallel grid construction, and an redesign of the 2d grid which can now also be used for parallel computations. In addition many improvements have been introduced into the code to increase the parallel efficiency and to decrease the memory footprint. The original ALUGrid library is widely used within the DUNE community due to its good parallel performance for problems requiring local adaptivity and dynamic load balancing. Therefore, this new model will benefit a number of DUNE users. In addition we have added features to increase the range of problems for which the grid manager can be used, for example, introducing a 3d tetrahedral grid using a parallel newest vertex bisection algorithm for conforming grid refinement. In this paper we will discuss the new features, extensions to the DUNE interface, and explain for various examples how the code is used in parallel environments.
[ { "version": "v1", "created": "Fri, 25 Jul 2014 16:12:26 GMT" }, { "version": "v2", "created": "Wed, 30 Jul 2014 08:02:59 GMT" }, { "version": "v3", "created": "Sat, 15 Aug 2015 11:23:22 GMT" } ]
2015-08-18T00:00:00
[ [ "Alkämper", "Martin", "" ], [ "Dedner", "Andreas", "" ], [ "Klöfkorn", "Robert", "" ], [ "Nolte", "Martin", "" ] ]
new_dataset
0.998449
1508.03649
Hokky Situngkir
Hokky Situngkir
Borobudur was Built Algorithmically
9 pages, 6 figures
null
null
BFI Working Paper Series, WP082010
cs.CY cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The self-similarity of Indonesian Borobudur Temple is observed through the dimensionality of stupa that is hypothetically closely related to whole architectural body. Fractal dimension is calculated by using the cube counting method and found that the dimension is 2.325, which is laid between the two-dimensional plane and three dimensional space. The applied fractal geometry and self-similarity of the building is emerged as the building process implement the metric rules, since there is no universal metric standard known in ancient traditional Javanese culture thus the architecture is not based on final master plan. The paper also proposes how the hypothetical algorithmic architecture might be applied computationally in order to see some experimental generations of similar building. The paper ends with some conjectures for further challenge and insights related to fractal geometry in Javanese traditional cultural heritages.
[ { "version": "v1", "created": "Thu, 13 Aug 2015 04:08:27 GMT" } ]
2015-08-18T00:00:00
[ [ "Situngkir", "Hokky", "" ] ]
new_dataset
0.995834
1508.03653
Kazutaka Kurihara
Koji Tsukada, Maho Oki, Kazutaka Kurihara, Yuko Furudate
AnimalCatcher: a digital camera to capture various reactions of animals
Written in Japanese, 6 pages
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People often have difficulty to take pictures of animals, since animals usually do not react with cameras nor understand verbal directions. To solve this problem, we developed a new interaction technique, AnimalCatcher, which can attract animals' attention easily. The AnimalCatcher shoots various sounds using directional speaker to capture various reactions of animals. This paper describes concepts, implementation, and example pictures taken in a zoo.
[ { "version": "v1", "created": "Sat, 25 Apr 2015 01:08:32 GMT" } ]
2015-08-18T00:00:00
[ [ "Tsukada", "Koji", "" ], [ "Oki", "Maho", "" ], [ "Kurihara", "Kazutaka", "" ], [ "Furudate", "Yuko", "" ] ]
new_dataset
0.96575
1508.03755
Team Lear
Danila Potapov (LEAR), Matthijs Douze (LEAR), Jerome Revaud (LEAR), Zaid Harchaoui (LEAR, CIMS), Cordelia Schmid (LEAR)
Beat-Event Detection in Action Movie Franchises
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While important advances were recently made towards temporally localizing and recognizing specific human actions or activities in videos, efficient detection and classification of long video chunks belonging to semantically defined categories such as "pursuit" or "romance" remains challenging.We introduce a new dataset, Action Movie Franchises, consisting of a collection of Hollywood action movie franchises. We define 11 non-exclusive semantic categories - called beat-categories - that are broad enough to cover most of the movie footage. The corresponding beat-events are annotated as groups of video shots, possibly overlapping.We propose an approach for localizing beat-events based on classifying shots into beat-categories and learning the temporal constraints between shots. We show that temporal constraints significantly improve the classification performance. We set up an evaluation protocol for beat-event localization as well as for shot classification, depending on whether movies from the same franchise are present or not in the training data.
[ { "version": "v1", "created": "Sat, 15 Aug 2015 17:04:50 GMT" } ]
2015-08-18T00:00:00
[ [ "Potapov", "Danila", "", "LEAR" ], [ "Douze", "Matthijs", "", "LEAR" ], [ "Revaud", "Jerome", "", "LEAR" ], [ "Harchaoui", "Zaid", "", "LEAR, CIMS" ], [ "Schmid", "Cordelia", "", "LEAR" ] ]
new_dataset
0.993059
1508.03838
Hern\'an Vanzetto
Stephan Merz and Hern\'an Vanzetto
Encoding TLA+ set theory into many-sorted first-order logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an encoding of Zermelo-Fraenkel set theory into many-sorted first-order logic, the input language of state-of-the-art SMT solvers. This translation is the main component of a back-end prover based on SMT solvers in the TLA+ Proof System.
[ { "version": "v1", "created": "Sun, 16 Aug 2015 15:47:07 GMT" } ]
2015-08-18T00:00:00
[ [ "Merz", "Stephan", "" ], [ "Vanzetto", "Hernán", "" ] ]
new_dataset
0.972264
1508.03840
Ibrahim Adeyanju
Ibrahim Adeyanju and Comfort Babalola and Kareemat Salaudeen and Biola Oyediran
3D-Computer Animation for a Yoruba Native Folktale
9 pages
International Journal of Computer Graphics & Animation (IJCGA) Vol.5, No.3, July 2015
10.5121/ijcga.2015.5302
null
cs.GR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer graphics has wide range of applications which are implemented into computer animation, computer modeling among others. Since the invention of computer graphics researchers have not paid much of attentions toward the possibility of converting oral tales otherwise known as folktales into possible cartoon animated videos. This paper is based on how to develop cartoons of local folktales that will be of huge benefits to Nigerians. The activities were divided into 5 stages; analysis, design, development, implementation and evaluation which involved various processes and use of various specialized software and hardware. After the implementation of this project, the video characteristics were evaluated using likert scale. Analysis of 30 user responses indicated that 17 users (56.7 percent) rated the image quality as excellent, the video and image synchronization was rated as excellent by 9 users (30 percent), the Background noise was rated excellent by 18 users (60 percent), the Character Impression was rated Excellent by 11 users (36.67 percent), the general assessment of the storyline was rated excellent by 17 users (56.7 percent), the video Impression was rated excellent by 11 users (36.67 percent) and the voice quality was rated by 10 users (33.33 percent) as excellent.
[ { "version": "v1", "created": "Sun, 16 Aug 2015 15:58:11 GMT" } ]
2015-08-18T00:00:00
[ [ "Adeyanju", "Ibrahim", "" ], [ "Babalola", "Comfort", "" ], [ "Salaudeen", "Kareemat", "" ], [ "Oyediran", "Biola", "" ] ]
new_dataset
0.99898
1508.03863
Mark Levin
Mark Sh. Levin
Discrete Route/Trajectory Decision Making Problems
25 pages, 34 figures, 16 tables
null
null
null
cs.AI cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper focuses on composite multistage decision making problems which are targeted to design a route/trajectory from an initial decision situation (origin) to goal (destination) decision situation(s). Automobile routing problem is considered as a basic physical metaphor. The problems are based on a discrete (combinatorial) operations/states design/solving space (e.g., digraph). The described types of discrete decision making problems can be considered as intelligent design of a route (trajectory, strategy) and can be used in many domains: (a) education (planning of student educational trajectory), (b) medicine (medical treatment), (c) economics (trajectory of start-up development). Several types of the route decision making problems are described: (i) basic route decision making, (ii) multi-goal route decision making, (iii) multi-route decision making, (iv) multi-route decision making with route/trajectory change(s), (v) composite multi-route decision making (solution is a composition of several routes/trajectories at several corresponding domains), and (vi) composite multi-route decision making with coordinated routes/trajectories. In addition, problems of modeling and building the design spaces are considered. Numerical examples illustrate the suggested approach. Three applications are considered: educational trajectory (orienteering problem), plan of start-up company (modular three-stage design), and plan of medical treatment (planning over digraph with two-component vertices).
[ { "version": "v1", "created": "Sun, 16 Aug 2015 20:37:35 GMT" } ]
2015-08-18T00:00:00
[ [ "Levin", "Mark Sh.", "" ] ]
new_dataset
0.974517
1508.03908
EPTCS
Nosheen Gul (University of Leicester, England)
A Calculus of Mobility and Communication for Ubiquitous Computing
In Proceedings WWV 2015, arXiv:1508.03389
EPTCS 188, 2015, pp. 6-22
10.4204/EPTCS.188.3
null
cs.DC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a Calculus of Mobility and Communication (CMC) for the modelling of mobility, communication and context-awareness in the setting of ubiquitous computing. CMC is an ambient calculus with the in and out capabilities of Cardelli and Gordon's Mobile Ambients. The calculus has a new form of global communication similar to that in Milner's CCS. In CMC an ambient is tagged with a set of ports that agents executing inside the ambient are allowed to communicate on. It also has a new context-awareness feature that allows ambients to query their location. We present reduction semantics and labelled transition system semantics of CMC and prove that the semantics coincide. A new notion of behavioural equivalence is given by defining capability barbed bisimulation and congruence which is proved to coincide with barbed bisimulation congruence. The expressiveness of the calculus is illustrated by two case studies.
[ { "version": "v1", "created": "Mon, 17 Aug 2015 01:59:25 GMT" } ]
2015-08-18T00:00:00
[ [ "Gul", "Nosheen", "", "University of Leicester, England" ] ]
new_dataset
0.999303
1508.03931
Michael Goodrich
Michael T. Goodrich and Timothy Johnson and Manuel Torres
Knuthian Drawings of Series-Parallel Flowcharts
Full version
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by a classic paper by Knuth, we revisit the problem of drawing flowcharts of loop-free algorithms, that is, degree-three series-parallel digraphs. Our drawing algorithms show that it is possible to produce Knuthian drawings of degree-three series-parallel digraphs with good aspect ratios and small numbers of edge bends.
[ { "version": "v1", "created": "Mon, 17 Aug 2015 05:59:27 GMT" } ]
2015-08-18T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Johnson", "Timothy", "" ], [ "Torres", "Manuel", "" ] ]
new_dataset
0.997808
1407.1386
Agi Kurucz
Christopher Hampson and Agi Kurucz
Undecidable propositional bimodal logics and one-variable first-order linear temporal logics with counting
null
ACM TOCL vol. 16(3) (2015), 27:1-27:36
10.1145/2757285
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First-order temporal logics are notorious for their bad computational behaviour. It is known that even the two-variable monadic fragment is highly undecidable over various linear timelines, and over branching time even one-variable fragments might be undecidable. However, there have been several attempts on finding well-behaved fragments of first-order temporal logics and related temporal description logics, mostly either by restricting the available quantifier patterns, or considering sub-Boolean languages. Here we analyse seemingly `mild' extensions of decidable one-variable fragments with counting capabilities, interpreted in models with constant, decreasing, and expanding first-order domains. We show that over most classes of linear orders these logics are (sometimes highly) undecidable, even without constant and function symbols, and with the sole temporal operator `eventually'. We establish connections with bimodal logics over 2D product structures having linear and `difference' (inequality) component relations, and prove our results in this bimodal setting. We show a general result saying that satisfiability over many classes of bimodal models with commuting linear and difference relations is undecidable. As a by-product, we also obtain new examples of finitely axiomatisable but Kripke incomplete bimodal logics. Our results generalise similar lower bounds on bimodal logics over products of two linear relations, and our proof methods are quite different from the proofs of these results. Unlike previous proofs that first `diagonally encode' an infinite grid, and then use reductions of tiling or Turing machine problems, here we make direct use of the grid-like structure of product frames and obtain undecidability by reductions of counter (Minsky) machine problems.
[ { "version": "v1", "created": "Sat, 5 Jul 2014 10:45:41 GMT" }, { "version": "v2", "created": "Sat, 7 Feb 2015 10:55:40 GMT" }, { "version": "v3", "created": "Mon, 8 Jun 2015 16:11:17 GMT" } ]
2015-08-17T00:00:00
[ [ "Hampson", "Christopher", "" ], [ "Kurucz", "Agi", "" ] ]
new_dataset
0.950942
1507.06148
Chunming Tang
Chunming Tang, Nian Li, Yanfeng Qi, Zhengchun Zhou, Tor Helleseth
Linear codes with two or three weights from weakly regular bent functions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes with few weights have applications in consumer electronics, communication, data storage system, secret sharing, authentication codes, association schemes, and strongly regular graphs. This paper first generalizes the method of constructing two-weight and three-weight linear codes of Ding et al. \cite{DD2015} and Zhou et al. \cite{ZLFH2015} to general weakly regular bent functions and determines the weight distributions of these linear codes. It solves the open problem of Ding et al. \cite{DD2015}. Further, this paper constructs new linear codes with two or three weights and presents the weight distributions of these codes. They contains some optimal codes meeting certain bound on linear codes.
[ { "version": "v1", "created": "Wed, 22 Jul 2015 12:16:58 GMT" }, { "version": "v2", "created": "Tue, 11 Aug 2015 14:12:31 GMT" }, { "version": "v3", "created": "Fri, 14 Aug 2015 00:25:28 GMT" } ]
2015-08-17T00:00:00
[ [ "Tang", "Chunming", "" ], [ "Li", "Nian", "" ], [ "Qi", "Yanfeng", "" ], [ "Zhou", "Zhengchun", "" ], [ "Helleseth", "Tor", "" ] ]
new_dataset
0.980006
1508.03374
Vida Vakilian
Vida Vakilian, Jean-Francois Frigon, and Sebastien Roy
Space-Frequency Block Code for MIMO-OFDM Communication Systems with Reconfigurable Antennas
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a space-frequency (SF) block coding scheme for a multiple-input multiple-output (MIMO) orthogonal frequency-division multiplexing (OFDM) system using antennas with reconfigurable radiation patterns. In this system, each element of the antenna array at the transmitter side is assumed to be reconfigurable so that it can independently change the physical characteristics of its radiation pattern. The proposed block code is full rate and benefits from spatial, frequency, and reconfigurable radiation pattern state diversity over frequency-selective fading channels. We provide simulation results to demonstrate the performance of the proposed block coding technique and make comparisons with that of the previous SF coding schemes in MIMO-OFDM systems. The results indicate that the proposed code achieves higher diversity and coding gain compared to other available SF codes.
[ { "version": "v1", "created": "Thu, 13 Aug 2015 22:14:33 GMT" } ]
2015-08-17T00:00:00
[ [ "Vakilian", "Vida", "" ], [ "Frigon", "Jean-Francois", "" ], [ "Roy", "Sebastien", "" ] ]
new_dataset
0.999229
1508.03479
Vibhutesh Kumar Singh Mr.
Manish Kumar, Shubham Kaul, Vibhutesh Kumar Singh, Vivek Ashok Bohara
iDART-Intruder Detection and Alert in Real Time
Submitted as an entry to India Innovation Initiative - i3, 2015. 2 Page demo paper
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we design and develop a smart intruder detection and alert system which aims to elevate the security as well as the likelihood of true positive identification of trespassers and intruders as compared to other commonly deployed electronic security systems. Using multiple sensors, this system can gauge the extent of danger exhibited by a person or animal in or around the home premises, and can forward various critical information regarding the event to home owners as well as other specified entities, such as relevant security authorities.
[ { "version": "v1", "created": "Fri, 14 Aug 2015 12:32:49 GMT" } ]
2015-08-17T00:00:00
[ [ "Kumar", "Manish", "" ], [ "Kaul", "Shubham", "" ], [ "Singh", "Vibhutesh Kumar", "" ], [ "Bohara", "Vivek Ashok", "" ] ]
new_dataset
0.999095
1508.03583
Timothy Barker Mr
Timothy Barker, Chao Zhai, Mario di Bernardo
A Coverage Based Decentralised Routing Algorithm for Vehicular Traffic Networks
8 Pages, 10 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple yet effective routing strategy inspired by coverage control, which delays the onset of congestion on traffic networks, by introducing a control parameter. The routing algorithm allows a trade-off between the congestion level and the distance to the destination. Numerical verification of the strategy is provided on a number of representative examples in SUMO, a well known micro agent simulator used for the analysis of traffic networks. We find that it is crucial in many cases to tune the given control parameters to some optimal value in order to reduce congestion in the most effective way. The effects of different network structural properties are connected to the level of congestion and the optimal range for setting the control parameters.
[ { "version": "v1", "created": "Fri, 14 Aug 2015 18:01:39 GMT" } ]
2015-08-17T00:00:00
[ [ "Barker", "Timothy", "" ], [ "Zhai", "Chao", "" ], [ "di Bernardo", "Mario", "" ] ]
new_dataset
0.979149
1508.03592
O\u{g}uz Sunay
Kyoomars Alizadeh Noghani, M. Oguz Sunay
Streaming Multicast Video over Software-Defined Networks
6 pages, 5 figures, 1 table, First Workshop on Software-Defined Internets of the Future - WSDIF 2014. Proceedings of the 11th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS) 2014 - Philadelphia, Pennsylvania - October 28 - 30, 2014
null
10.1109/MASS.2014.125
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many of the video streaming applications in today's Internet involve the distribution of content from a CDN source to a large population of interested clients. However, widespread support of IP multicast is unavailable due to technical and economical reasons, leaving the floor to application layer multicast which introduces excessive delays for the clients and increased traffic load for the network. This paper is concerned with the introduction of an SDN-based framework that allows the network controller to not only deploy IP multicast between a source and subscribers, but also control, via a simple northbound interface, the distributed set of sources where multiple- description coded (MDC) video content is available. We observe that for medium to heavy network loads, relative to the state-of-the-art, the SDN-based streaming multicast video framework increases the PSNR of the received video significantly, from a level that is practically unwatchable to one that has good quality.
[ { "version": "v1", "created": "Fri, 14 Aug 2015 18:18:57 GMT" } ]
2015-08-17T00:00:00
[ [ "Noghani", "Kyoomars Alizadeh", "" ], [ "Sunay", "M. Oguz", "" ] ]
new_dataset
0.978337
1505.06506
Edward Haeusler
Edward Hermann Haeusler
Every super-polynomial proof in purely implicational minimal logic has a polynomially sized proof in classical implicational propositional logic
This paper has been withdrawn by the author due to a fatal error in the general form of the deduction used for proved the main proposition
null
null
null
cs.CC cs.LO
http://creativecommons.org/licenses/by/3.0/
In this article we show how any formula A with a proof in minimal implicational logic that is super-polynomially sized has a polynomially-sized proof in classical implicational propositional logic . This fact provides an argument in favor that any classical propositional tautology has short proofs, i.e., NP=CoNP.
[ { "version": "v1", "created": "Mon, 25 May 2015 01:02:14 GMT" }, { "version": "v2", "created": "Fri, 12 Jun 2015 01:16:00 GMT" }, { "version": "v3", "created": "Thu, 13 Aug 2015 16:55:32 GMT" } ]
2015-08-14T00:00:00
[ [ "Haeusler", "Edward Hermann", "" ] ]
new_dataset
0.997582
1508.03174
Victor Hernandez-Urbina
Victor Hernandez-Urbina
Logical N-AND Gate on a Molecular Turing Machine
null
null
null
null
cs.ET cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Boolean algebra, it is known that the logical function that corresponds to the negation of the conjunction --NAND-- is universal in the sense that any other logical function can be built based on it. This property makes it essential to modern digital electronics and computer processor design. Here, we design a molecular Turing machine that computes the NAND function over binary strings of arbitrary length. For this purpose, we will perform a mathematical abstraction of the kind of operations that can be done over a double-stranded DNA molecule, as well as presenting a molecular encoding of the input symbols for such a machine.
[ { "version": "v1", "created": "Thu, 13 Aug 2015 11:08:28 GMT" } ]
2015-08-14T00:00:00
[ [ "Hernandez-Urbina", "Victor", "" ] ]
new_dataset
0.99929
1508.02868
Hokky Situngkir
Hokky Situngkir
Cellular-Automata and Innovation within Indonesian Traditional Weaving Crafts: A Discourse of Human-Computer Interaction
8 pages, 5 figures
null
null
BFI Working Paper Series WP-2013-03
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper reports the possibility of Indonesian traditional artisans of weaving designs and crafts to explore the cellular automata, a dynamical model in computation that may yield similar patterns. The reviews of the cellular automata due to the perspective of weaving process reveals that the latter would focus on macro-properties, i.e.: the strength of structural construction beside the aesthetic patterns and designs. The meeting of traditional weaving practice and the computational model is delivered and open the door for interesting discourse of computer-aided designs for the traditional artists and designers to come.
[ { "version": "v1", "created": "Wed, 12 Aug 2015 10:20:56 GMT" } ]
2015-08-13T00:00:00
[ [ "Situngkir", "Hokky", "" ] ]
new_dataset
0.999566
1508.02383
Farooq Khan
Farooq Khan
Mobile Internet from the Heavens
arXiv admin note: substantial text overlap with arXiv:1508.02063
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Almost two-thirds of the humankind currently does not have access to the Internet, wired or wireless. We present a Space Internet proposal capable of providing Zetabyte/ month capacity which is equivalent to 200GB/month for 5 Billion users Worldwide. Our proposal is based on deploying thousands of low-cost micro-satellites in Low-Earth Orbit (LEO), each capable of providing Terabit/s data rates with signal latencies better than or equal to ground based systems.
[ { "version": "v1", "created": "Sun, 9 Aug 2015 18:28:50 GMT" } ]
2015-08-12T00:00:00
[ [ "Khan", "Farooq", "" ] ]
new_dataset
0.991424
1508.02495
Hamidreza Arjmandi
Hamidreza Arjmandi, Mohammad Movahednasab, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri
On ISI-free Modulations for Diffusion based Molecular Communication
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are sufficiently far apart. This ensures that molecules of a previous transmission are faded in the environment, before molecules of the same type are reused for signaling. In this paper, we consider ISI-free time-slotted modulation schemes. The maximum reliable transmission rate for these modulations is given by the constrained coding capacity of the graph that represents the permissible transmission sequences. However, achieving the constrained coding capacity requires long blocklengths and delays at the decoder, making it impractical for simple nanomachines. The main contribution of this paper is to consider modulations with small delay (short blocklength) and show that they get very close to constrained coding capacity.
[ { "version": "v1", "created": "Tue, 11 Aug 2015 06:29:11 GMT" } ]
2015-08-12T00:00:00
[ [ "Arjmandi", "Hamidreza", "" ], [ "Movahednasab", "Mohammad", "" ], [ "Gohari", "Amin", "" ], [ "Mirmohseni", "Mahtab", "" ], [ "Kenari", "Masoumeh Nasiri", "" ], [ "Fekri", "Faramarz", "" ] ]
new_dataset
0.969506
1508.02557
Sanjay Chakraborty
Neha Bothra, Kritika Jain, Sanjay Chakraborty
Can JSP Code be Generated Using XML Tags?
null
null
10.15864/ajac.v2i3.138
null
cs.OH
http://creativecommons.org/licenses/by/4.0/
Over the years, a variety of web services have started using server-side scripting to deliver results back to a client as a paid or free service; one such server-side scripting language is Java Server Pages (JSP). Also Extensible markup language (XML), is being adopted by most web developers as a tool to describe data.Therefore, we present a conversion method which uses predefined XML tags as input and generates the corresponding JSP code. However, the end users are required to have a basic experience with web pages. This conversion method aims to reduce the time and effort spent by the user (web developer) to get acquainted with JSP. The conversion process abstracts the user from the intricacies of JSP and enables him to focus on the business logic.
[ { "version": "v1", "created": "Tue, 11 Aug 2015 11:16:31 GMT" } ]
2015-08-12T00:00:00
[ [ "Bothra", "Neha", "" ], [ "Jain", "Kritika", "" ], [ "Chakraborty", "Sanjay", "" ] ]
new_dataset
0.999847
1508.02606
Hainan Cui
Hao Hu, Hainan Cui
InAR:Inverse Augmented Reality
2 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Augmented reality is the art to seamlessly fuse virtual objects into real ones. In this short note, we address the opposite problem, the inverse augmented reality, that is, given a perfectly augmented reality scene where human is unable to distinguish real objects from virtual ones, how the machine could help do the job. We show by structure from motion (SFM), a simple 3D reconstruction technique from images in computer vision, the real and virtual objects can be easily separated in the reconstructed 3D scene.
[ { "version": "v1", "created": "Tue, 11 Aug 2015 14:17:28 GMT" } ]
2015-08-12T00:00:00
[ [ "Hu", "Hao", "" ], [ "Cui", "Hainan", "" ] ]
new_dataset
0.997481
1202.4232
Chung-Chieh Fang
Chung-Chieh Fang
Boundary Conditions of Subharmonic Oscillations in Fixed-Switching-Frequency DC-DC Converters
Title changed. Submitted to a journal on 2/24/11, and resubmitted to IJCTA on 8/10/11. Added: S-plot to determine the required ramp slope, V2 control, a counterexample (Example 5) of the ripple index hypothesis. The key results traced back from my 1997 PhD thesis, available: http://www.lib.umd.edu/drum/. My five IJCTA papers in arXiv have two common reviewers
Nonlinear Dynamics, 77(1-2), pp. 185-208, Jul. 2014
10.1007/s11071-014-1283-7
null
cs.SY math.DS nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Design-oriented boundary conditions for subharmonic oscillations are of great interest recently. Based on a subharmonic oscillation boundary condition reported in a PhD thesis more than a decade ago, extended new boundary conditions are derived in closed forms for general switching DC-DC converters. Sampled-data and harmonic balance analyses are applied and generate equivalent results. It is shown that equivalent series resistance causes the boundary conditions for voltage/current mode control to have similar forms. Some recently reported boundary conditions become special cases in view of the general boundary conditions derived. New Nyquist-like design-oriented plots are proposed to predict or prevent the occurrence of the subharmonic oscillation. The relation between the crossover frequency and the subharmonic oscillation is also analyzed.
[ { "version": "v1", "created": "Mon, 20 Feb 2012 06:03:06 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2012 06:10:40 GMT" } ]
2015-08-11T00:00:00
[ [ "Fang", "Chung-Chieh", "" ] ]
new_dataset
0.977157
1407.5068
Marek Szyku{\l}a
Marek Szyku{\l}a
Checking Whether an Automaton Is Monotonic Is NP-complete
13 pages, 4 figures. CIAA 2015. The final publication is available at http://link.springer.com/chapter/10.1007/978-3-319-22360-5_23
In Implementation and Application of Automata, volume 9223 of LNCS, pages 279-291, Springer, 2015
10.1007/978-3-319-22360-5_23
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An automaton is monotonic if its states can be arranged in a linear order that is preserved by the action of every letter. We prove that the problem of deciding whether a given automaton is monotonic is NP-complete. The same result is obtained for oriented automata, whose states can be arranged in a cyclic order. Moreover, both problems remain hard under the restriction to binary input alphabets.
[ { "version": "v1", "created": "Fri, 18 Jul 2014 17:40:44 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2014 17:58:51 GMT" }, { "version": "v3", "created": "Mon, 10 Aug 2015 06:04:19 GMT" } ]
2015-08-11T00:00:00
[ [ "Szykuła", "Marek", "" ] ]
new_dataset
0.957711
1502.03426
Murray Elder
Laura Ciobanu and Volker Diekert and Murray Elder
Solution sets for equations over free groups are EDT0L languages -- ICALP 2015 version
37 pages, 2 figures
null
null
null
cs.LO cs.DM cs.FL math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that, given a word equation over a finitely generated free group, the set of all solutions in reduced words forms an EDT0L language. In particular, it is an indexed language in the sense of Aho. The question of whether a description of solution sets in reduced words as an indexed language is possible has been been open for some years, apparently without much hope that a positive answer could hold. Nevertheless, our answer goes far beyond: they are EDT0L, which is a proper subclass of indexed languages. We can additionally handle the existential theory of equations with rational constraints in free products $\star_{1 \leq i \leq s}F_i$, where each $F_i$ is either a free or finite group, or a free monoid with involution. In all cases the result is the same: the set of all solutions in reduced words is EDT0L. This was known only for quadratic word equations by Fert\'e, Marin and S\'enizergues (ToCS 2014), which is a very restricted case. Our general result became possible due to the recent recompression technique of Je\.z. In this paper we use a new method to integrate solutions of linear Diophantine equations into the process and obtain more general results than in the related paper (arXiv 1405.5133). For example, we improve the complexity from quadratic nondeterministic space in (arXiv 1405.5133) to quasi-linear nondeterministic space here. This implies an improved complexity for deciding the existential theory of non-abelian free groups: NSPACE($n\log n$). The conjectured complexity is NP, however, we believe that our results are optimal with respect to space complexity, independent of the conjectured NP.
[ { "version": "v1", "created": "Wed, 11 Feb 2015 20:23:41 GMT" }, { "version": "v2", "created": "Mon, 4 May 2015 03:24:25 GMT" }, { "version": "v3", "created": "Sat, 8 Aug 2015 09:11:26 GMT" } ]
2015-08-11T00:00:00
[ [ "Ciobanu", "Laura", "" ], [ "Diekert", "Volker", "" ], [ "Elder", "Murray", "" ] ]
new_dataset
0.973609
1505.06524
Hao Chen
Liqing Xu and Hao Chen
New Explicit Binary Constant Weight Codes from Reed-Solomon Codes
15 pages, submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary constant weight codes have important applications and have been studied for many years. Optimal or near-optimal binary constant weight codes of small lengths have been determined. In this paper we propose a new construction of explicit binary constant weight codes from $q$-ary Reed-Solomon codes. Some of our binary constant weight codes are optimal or new. In particular new binary constant weight codes $A(64, 10, 8) \geq 4108$ and $A(64, 12, 8) \geq 522$ are constructed. We also give explicitly constructed binary constant weight codes which improve Gilbert and Graham-Sloane lower bounds in some range of parameters. An extension to algebraic geometric codes is also presented.
[ { "version": "v1", "created": "Mon, 25 May 2015 02:14:47 GMT" }, { "version": "v2", "created": "Sat, 30 May 2015 00:58:20 GMT" }, { "version": "v3", "created": "Sat, 25 Jul 2015 11:47:29 GMT" }, { "version": "v4", "created": "Fri, 7 Aug 2015 22:11:14 GMT" } ]
2015-08-11T00:00:00
[ [ "Xu", "Liqing", "" ], [ "Chen", "Hao", "" ] ]
new_dataset
0.99981
1508.00375
Hamed Haddadi
Hamed Haddadi, Ferda Ofli, Yelena Mejova, Ingmar Weber, Jaideep Srivastava
360 Quantified Self
QCRI Technical Report
null
null
QCRI-TR-2015-004
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wearable devices with a wide range of sensors have contributed to the rise of the Quantified Self movement, where individuals log everything ranging from the number of steps they have taken, to their heart rate, to their sleeping patterns. Sensors do not, however, typically sense the social and ambient environment of the users, such as general life style attributes or information about their social network. This means that the users themselves, and the medical practitioners, privy to the wearable sensor data, only have a narrow view of the individual, limited mainly to certain aspects of their physical condition. In this paper we describe a number of use cases for how social media can be used to complement the check-up data and those from sensors to gain a more holistic view on individuals' health, a perspective we call the 360 Quantified Self. Health-related information can be obtained from sources as diverse as food photo sharing, location check-ins, or profile pictures. Additionally, information from a person's ego network can shed light on the social dimension of wellbeing which is widely acknowledged to be of utmost importance, even though they are currently rarely used for medical diagnosis. We articulate a long-term vision describing the desirable list of technical advances and variety of data to achieve an integrated system encompassing Electronic Health Records (EHR), data from wearable devices, alongside information derived from social media data.
[ { "version": "v1", "created": "Mon, 3 Aug 2015 11:11:15 GMT" }, { "version": "v2", "created": "Sun, 9 Aug 2015 08:22:10 GMT" } ]
2015-08-11T00:00:00
[ [ "Haddadi", "Hamed", "" ], [ "Ofli", "Ferda", "" ], [ "Mejova", "Yelena", "" ], [ "Weber", "Ingmar", "" ], [ "Srivastava", "Jaideep", "" ] ]
new_dataset
0.985565
1508.01813
Kaarthik Sundar
Kaarthik Sundar and Sivakumar Rathinam
Generalized multiple depot traveling salesmen problem - polyhedral study and exact algorithm
26 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The generalized multiple depot traveling salesmen problem (GMDTSP) is a variant of the multiple depot traveling salesmen problem (MDTSP), where each salesman starts at a distinct depot, the targets are partitioned into clusters and at least one target in each cluster is visited by some salesman. The GMDTSP is an NP-hard problem as it generalizes the MDTSP and has practical applications in design of ring networks, vehicle routing, flexible manufacturing scheduling and postal routing. We present an integer programming formulation for the GMDTSP and valid inequalities to strengthen the linear programming relaxation. Furthermore, we present a polyhedral analysis of the convex hull of feasible solutions to the GMDTSP and derive facet-defining inequalities that strengthen the linear programming relaxation of the GMDTSP. All these results are then used to develop a branch-and-cut algorithm to obtain optimal solutions to the problem. The performance of the algorithm is evaluated through extensive computational experiments on several benchmark instances.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 20:42:18 GMT" } ]
2015-08-11T00:00:00
[ [ "Sundar", "Kaarthik", "" ], [ "Rathinam", "Sivakumar", "" ] ]
new_dataset
0.997534
1508.02015
Abhay Kumar Singh
Sukhamoy Pattanayak and Abhay Kumar Singh
On cyclic DNA codes over the Ring $\Z_4 + u \Z_4$
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the theory for constructing DNA cyclic codes of odd length over $\Z_4[u]/\langle u^2 \rangle$ which play an important role in DNA computing. Cyclic codes of odd length over $\Z_4 + u \Z_4$ satisfy the reverse constraint and the reverse-complement constraint are studied in this paper. The structure and existence of such codes are also studied. The paper concludes with some DNA example obtained via the family of cyclic codes.
[ { "version": "v1", "created": "Sun, 9 Aug 2015 12:13:51 GMT" } ]
2015-08-11T00:00:00
[ [ "Pattanayak", "Sukhamoy", "" ], [ "Singh", "Abhay Kumar", "" ] ]
new_dataset
0.989418
1508.02027
Oliver Knill
Oliver Knill
The graph spectrum of barycentric refinements
20 pages 12 figures
null
null
null
cs.DM math.CO math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a finite simple graph G, let G' be its barycentric refinement: it is the graph in which the vertices are the complete subgraphs of G and in which two such subgraphs are connected, if one is contained into the other. If L(0)=0<L(1) <= L(2) ... <= L(n) are the eigenvalues of the Laplacian of G, define the spectral function F(x) as the function F(x) = L([n x]) on the interval [0,1], where [r] is the floor function giving the largest integer smaller or equal than r. The graph G' is known to be homotopic to G with Euler characteristic chi(G')=chi(G) and dim(G') >= dim(G). Let G(m) be the sequence of barycentric refinements of G=G(0). We prove that for any finite simple graph G, the spectral functions F(G(m)) of successive refinements converge for m to infinity uniformly on compact subsets of (0,1) and exponentially fast to a universal limiting eigenvalue distribution function F which only depends on the clique number respectively the dimension d of the largest complete subgraph of G and not on the starting graph G. In the case d=1, where we deal with graphs without triangles, the limiting distribution is the smooth function F(x) = 4 sin^2(pi x/2). This is related to the Julia set of the quadratic map T(z) = 4z-z^2 which has the one dimensional Julia set [0,4] and F satisfies T(F(k/n))=F(2k/n) as the Laplacians satisfy such a renormalization recursion. The spectral density in the d=1 case is then the arc-sin distribution which is the equilibrium measure on the Julia set. In higher dimensions, where the limiting function F still remains unidentified, F' appears to have a discrete or singular component.
[ { "version": "v1", "created": "Sun, 9 Aug 2015 14:20:48 GMT" } ]
2015-08-11T00:00:00
[ [ "Knill", "Oliver", "" ] ]
new_dataset
0.997305
1305.3021
Ijaz Bukhari ijaz bukhari
Ijaz Bukhari, Nuhman-ul-Haq and Khizar Hyat
Wave Atom Based Watermarking
I want to withdraw the paper due to serious error
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Watermarking helps in ensuring originality, ownership and copyrights of a digital image. This paper aims at embedding a Watermark in an image using Wave Atom Transform. Preference of Wave Atoms on other transformations has been due to its sparser expansion, adaptability to the direction of local pattern, and sharp frequency localization. In this scheme, we had tried to spread the watermark in an image so that the information at one place is very small and undetectable. In order to extract the watermark and verify ownership of an image, one would have the advantage of prior knowledge of embedded locations. A noise of high amplitude will be needed to be added to the image for watermark distortion. Furthermore, the information spread will ensure the robustness of the watermark data. The proposed scheme has the ability to withstand malicious operations and attacks.
[ { "version": "v1", "created": "Tue, 14 May 2013 05:27:52 GMT" }, { "version": "v2", "created": "Fri, 7 Aug 2015 13:06:09 GMT" } ]
2015-08-10T00:00:00
[ [ "Bukhari", "Ijaz", "" ], [ "Nuhman-ul-Haq", "", "" ], [ "Hyat", "Khizar", "" ] ]
new_dataset
0.997635
1508.01571
Humberto Corona
Humberto Corona, Michael P. O'Mahony
A Mood-based Genre Classification of Television Content
in ACM Workshop on Recommendation Systems for Television and Online Video 2014 Foster City, California USA
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classification of television content helps users organise and navigate through the large list of channels and programs now available. In this paper, we address the problem of television content classification by exploiting text information extracted from program transcriptions. We present an analysis which adapts a model for sentiment that has been widely and successfully applied in other fields such as music or blog posts. We use a real-world dataset obtained from the Boxfish API to compare the performance of classifiers trained on a number of different feature sets. Our experiments show that, over a large collection of television content, program genres can be represented in a three-dimensional space of valence, arousal and dominance, and that promising classification results can be achieved using features based on this representation. This finding supports the use of the proposed representation of television content as a feature space for similarity computation and recommendation generation.
[ { "version": "v1", "created": "Thu, 6 Aug 2015 23:53:30 GMT" } ]
2015-08-10T00:00:00
[ [ "Corona", "Humberto", "" ], [ "O'Mahony", "Michael P.", "" ] ]
new_dataset
0.997458
1508.01575
Lei Zhang
Lei Zhang, Chuanyan Hu, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In [3], the authors proposed a highly efficient secure and privacy-preserving scheme for secure vehicular communications. The proposed scheme consists of four protocols: system setup, protocol for STP and STK distribution, protocol for common string synchronization, and protocol for vehicular communications. Here we define the security models for the protocol for STP and STK distribution, and the protocol for vehicular communications,respectively. We then prove that these two protocols are secure in our models.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 00:30:17 GMT" } ]
2015-08-10T00:00:00
[ [ "Zhang", "Lei", "" ], [ "Hu", "Chuanyan", "" ], [ "Wu", "Qianhong", "" ], [ "Domingo-Ferrer", "Josep", "" ], [ "Qin", "Bo", "" ] ]
new_dataset
0.98113
1508.01667
Limin Wang
Limin Wang, Sheng Guo, Weilin Huang, Yu Qiao
Places205-VGGNet Models for Scene Recognition
2 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
VGGNets have turned out to be effective for object recognition in still images. However, it is unable to yield good performance by directly adapting the VGGNet models trained on the ImageNet dataset for scene recognition. This report describes our implementation of training the VGGNets on the large-scale Places205 dataset. Specifically, we train three VGGNet models, namely VGGNet-11, VGGNet-13, and VGGNet-16, by using a Multi-GPU extension of Caffe toolbox with high computational efficiency. We verify the performance of trained Places205-VGGNet models on three datasets: MIT67, SUN397, and Places205. Our trained models achieve the state-of-the-art performance on these datasets and are made public available.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 12:11:06 GMT" } ]
2015-08-10T00:00:00
[ [ "Wang", "Limin", "" ], [ "Guo", "Sheng", "" ], [ "Huang", "Weilin", "" ], [ "Qiao", "Yu", "" ] ]
new_dataset
0.998857
1508.01668
Natarajan Meghanathan
Natarajan Meghanathan
Distribution of maximal clique size of the vertices for theoretical small-world networks and real-world networks
20 pages, 13 figures, 3 tables
International Journal of Computer Networks and Communications, vol. 7, no. 4, pp. 21-41, July 2015
10.5121/ijcnc.2015.7402
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our primary objective in this paper is to study the distribution of the maximal clique size of the vertices in complex networks. We define the maximal clique size for a vertex as the maximum size of the clique that the vertex is part of and such a clique need not be the maximum size clique for the entire network. We determine the maximal clique size of the vertices using a modified version of a branch-and-bound based exact algorithm that has been originally proposed to determine the maximum size clique for an entire network graph. We then run this algorithm on two categories of complex networks: One category of networks capture the evolution of small-world networks from regular network (according to the wellknown Watts-Strogatz model) and their subsequent evolution to random networks; we show that the distribution of the maximal clique size of the vertices follows a Poisson-style distribution at different stages of the evolution of the small-world network to a random network; on the other hand, the maximal clique size of the vertices is observed to be in-variant and to be very close to that of the maximum clique size for the entire network graph as the regular network is transformed to a small-world network. The second category of complex networks studied are real-world networks (ranging from random networks to scale-free networks) and we observe the maximal clique size of the vertices in five of the six real-world networks to follow a Poisson-style distribution. In addition to the above case studies, we also analyze the correlation between the maximal clique size and clustering coefficient as well as analyze the assortativity index of the vertices with respect to maximal clique size and node degree.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 12:19:04 GMT" } ]
2015-08-10T00:00:00
[ [ "Meghanathan", "Natarajan", "" ] ]
new_dataset
0.995546
1508.01703
Kasra Madadipouya
Mohammad Ahmadi, Mostafa Vali, Farez Moghaddam, Aida Hakemi, Kasra Madadipouya
A Reliable User Authentication and Data Protection Model in Cloud Computing Environments
4 pages in International Conference on Information, System and Convergence Applications June 24-27, 2015 in Kuala Lumpur, Malaysia
null
null
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security issues are the most challenging problems in cloud computing environments as an emerging technology. Regarding to this importance, an efficient and reliable user authentication and data protection model has been presented in this paper to increase the rate of reliability cloud-based environments. Accordingly, two encryption procedures have been established in an independent middleware (Agent) to perform the process of user authentication, access control, and data protection in cloud servers. AES has been used as a symmetric cryptography algorithm in cloud servers and RSA has been used as an asymmetric cryptography algorithm in Agent servers. The theoretical evaluation of the proposed model shows that the ability of resistance in face with possible attacks and unpredictable events has been enhanced considerably in comparison with similar models because of using dual encryption and an independent middleware during user authentication and data protection procedures.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 14:24:14 GMT" } ]
2015-08-10T00:00:00
[ [ "Ahmadi", "Mohammad", "" ], [ "Vali", "Mostafa", "" ], [ "Moghaddam", "Farez", "" ], [ "Hakemi", "Aida", "" ], [ "Madadipouya", "Kasra", "" ] ]
new_dataset
0.998225
1508.01719
Daniel Fett
Daniel Fett and Ralf Kuesters and Guido Schmitz
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Parts of this work extend the web model presented in arXiv:1411.7210 and arXiv:1403.1866
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as Facebook or Google. These systems are very popular, as they provide a convenient means for users to log in at RPs and move much of the burden of user authentication from RPs to IdPs. There is, however, a downside to current systems, as they do not respect users' privacy: IdPs learn at which RP a user logs in. With one exception, namely Mozilla's BrowserID system (a.k.a. Mozilla Persona), current SSO systems were not even designed with user privacy in mind. Unfortunately, recently discovered attacks, which exploit design flaws of BrowserID, show that BrowserID does not provide user privacy either. In this paper, we therefore propose the first privacy-respecting SSO system for the web, called SPRESSO (for Secure Privacy-REspecting Single Sign-On). The system is easy to use, decentralized, and platform independent. It is based solely on standard HTML5 and web features and uses no browser extensions, plug-ins, or other executables. Existing SSO systems and the numerous attacks on such systems illustrate that the design of secure SSO systems is highly non-trivial. We therefore also carry out a formal analysis of SPRESSO based on an expressive model of the web in order to formally prove that SPRESSO enjoys strong authentication and privacy properties.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 15:12:53 GMT" } ]
2015-08-10T00:00:00
[ [ "Fett", "Daniel", "" ], [ "Kuesters", "Ralf", "" ], [ "Schmitz", "Guido", "" ] ]
new_dataset
0.999665
1508.01727
Daniele Bartoli
Daniele Bartoli and Matteo Bonini and Massimo Giulietti
Constant dimension codes from Riemann-Roch spaces
10 pages
null
null
null
cs.IT math.AG math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some families of constant dimension codes arising from Riemann-Roch spaces associated to particular divisors of a curve $\X$ are constructed. These families are generalizations of the one constructed by Hansen
[ { "version": "v1", "created": "Thu, 6 Aug 2015 07:29:07 GMT" } ]
2015-08-10T00:00:00
[ [ "Bartoli", "Daniele", "" ], [ "Bonini", "Matteo", "" ], [ "Giulietti", "Massimo", "" ] ]
new_dataset
0.951885
1508.01761
Gerardo Vega
Gerardo Vega
Reducible Cyclic Codes Constructed as the Direct Sum of Two Semiprimitive Cyclic Codes
13 pages, 4 weight distribution tables. Creation date April 10, 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a family of reducible cyclic codes constructed as the direct sum of two different semiprimitive two-weight irreducible cyclic codes. This family generalizes the class of reducible cyclic codes that was reported in the main result of B. Wang, {\em et al.} \cite{once}. Moreover, despite of what was stated therein, we show that, at least for the codes studied here, it is still possible to compute the frequencies of their weight distributions through the cyclotomic numbers in a very easy way.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 17:04:25 GMT" } ]
2015-08-10T00:00:00
[ [ "Vega", "Gerardo", "" ] ]
new_dataset
0.980745
1508.01786
Daniel Romero
Daniel M. Romero, Roderick I. Swaab, Brian Uzzi, and Adam D. Galinsky
Mimicry Is Presidential: Linguistic Style Matching in Presidential Debates and Improved Polling Numbers
in the Personality and Social Psychology Bulletin (2015)
null
10.1177/0146167215591168
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current research used the contexts of U.S. presidential debates and negotiations to examine whether matching the linguistic style of an opponent in a two-party exchange affects the reactions of third-party observers. Building off communication accommodation theory (CAT), interaction alignment theory (IAT), and processing fluency, we propose that language style matching (LSM) will improve subsequent third-party evaluations because matching an opponent's linguistic style reflects greater perspective taking and will make one's arguments easier to process. In contrast, research on status inferences predicts that LSM will negatively impact third-party evaluations because LSM implies followership. We conduct two studies to test these competing hypotheses. Study 1 analyzed transcripts of U.S. presidential debates between 1976 and 2012 and found that candidates who matched their opponent's linguistic style increased their standing in the polls. Study 2 demonstrated a causal relationship between LSM and third-party observer evaluations using negotiation transcripts.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 19:35:52 GMT" } ]
2015-08-10T00:00:00
[ [ "Romero", "Daniel M.", "" ], [ "Swaab", "Roderick I.", "" ], [ "Uzzi", "Brian", "" ], [ "Galinsky", "Adam D.", "" ] ]
new_dataset
0.951078
1401.5311
Dacheng Tao
Changxing Ding, Jonghyun Choi, Dacheng Tao and Larry S. Davis
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
accepted version to IEEE TPAMI
null
10.1109/TPAMI.2015.2462338
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To perform unconstrained face recognition robust to variations in illumination, pose and expression, this paper presents a new scheme to extract "Multi-Directional Multi-Level Dual-Cross Patterns" (MDML-DCPs) from face images. Specifically, the MDMLDCPs scheme exploits the first derivative of Gaussian operator to reduce the impact of differences in illumination and then computes the DCP feature at both the holistic and component levels. DCP is a novel face image descriptor inspired by the unique textural structure of human faces. It is computationally efficient and only doubles the cost of computing local binary patterns, yet is extremely robust to pose and expression variations. MDML-DCPs comprehensively yet efficiently encodes the invariant characteristics of a face image from multiple levels into patterns that are highly discriminative of inter-personal differences but robust to intra-personal variations. Experimental results on the FERET, CAS-PERL-R1, FRGC 2.0, and LFW databases indicate that DCP outperforms the state-of-the-art local descriptors (e.g. LBP, LTP, LPQ, POEM, tLBP, and LGXP) for both face identification and face verification tasks. More impressively, the best performance is achieved on the challenging LFW and FRGC 2.0 databases by deploying MDML-DCPs in a simple recognition scheme.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 13:24:16 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2015 02:28:49 GMT" } ]
2015-08-07T00:00:00
[ [ "Ding", "Changxing", "" ], [ "Choi", "Jonghyun", "" ], [ "Tao", "Dacheng", "" ], [ "Davis", "Larry S.", "" ] ]
new_dataset
0.95509
1410.6122
Matteo Dell'Amico Ph.D.
Matteo Dell'Amico, Damiano Carra, Pietro Michiardi
PSBS: Practical Size-Based Scheduling
arXiv admin note: substantial text overlap with arXiv:1403.5996
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Size-based schedulers have very desirable performance properties: optimal or near-optimal response time can be coupled with strong fairness guarantees. Despite this, such systems are very rarely implemented in practical settings, because they require knowing a priori the amount of work needed to complete jobs: this assumption is very difficult to satisfy in concrete systems. It is definitely more likely to inform the system with an estimate of the job sizes, but existing studies point to somewhat pessimistic results if existing scheduler policies are used based on imprecise job size estimations. We take the goal of designing scheduling policies that are explicitly designed to deal with inexact job sizes: first, we show that existing size-based schedulers can have bad performance with inexact job size information when job sizes are heavily skewed; we show that this issue, and the pessimistic results shown in the literature, are due to problematic behavior when large jobs are underestimated. Once the problem is identified, it is possible to amend existing size-based schedulers to solve the issue. We generalize FSP -- a fair and efficient size-based scheduling policy -- in order to solve the problem highlighted above; in addition, our solution deals with different job weights (that can be assigned to a job independently from its size). We provide an efficient implementation of the resulting protocol, which we call Practical Size-Based Scheduler (PSBS). Through simulations evaluated on synthetic and real workloads, we show that PSBS has near-optimal performance in a large variety of cases with inaccurate size information, that it performs fairly and it handles correctly job weights. We believe that this work shows that PSBS is indeed pratical, and we maintain that it could inspire the design of schedulers in a wide array of real-world use cases.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 17:57:22 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2014 14:25:56 GMT" }, { "version": "v3", "created": "Mon, 23 Mar 2015 17:47:46 GMT" }, { "version": "v4", "created": "Thu, 6 Aug 2015 16:09:04 GMT" } ]
2015-08-07T00:00:00
[ [ "Dell'Amico", "Matteo", "" ], [ "Carra", "Damiano", "" ], [ "Michiardi", "Pietro", "" ] ]
new_dataset
0.998334
1508.01321
Jaderick Pabico
Fatima M. Moncada and Jaderick P. Pabico
On Gobbledygook and Mood of the Philippine Senate: An Exploratory Study on the Readability and Sentiment of Selected Philippine Senators' Microposts
13 pages, 6 figures, submitted to the Asia Pacific Journal on Education, Arts, and Sciences
null
null
null
cs.CL cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper presents the findings of a readability assessment and sentiment analysis of selected six Philippine senators' microposts over the popular Twitter microblog. Using the Simple Measure of Gobbledygook (SMOG), tweets of Senators Cayetano, Defensor-Santiago, Pangilinan, Marcos, Guingona, and Escudero were assessed. A sentiment analysis was also done to determine the polarity of the senators' respective microposts. Results showed that on the average, the six senators are tweeting at an eight to ten SMOG level. This means that, at least a sixth grader will be able to understand the senators' tweets. Moreover, their tweets are mostly neutral and their sentiments vary in unison at some period of time. This could mean that a senator's tweet sentiment is affected by specific Philippine-based events.
[ { "version": "v1", "created": "Thu, 6 Aug 2015 08:39:20 GMT" } ]
2015-08-07T00:00:00
[ [ "Moncada", "Fatima M.", "" ], [ "Pabico", "Jaderick P.", "" ] ]
new_dataset
0.99597
1508.01324
Nisha Panwar
Shlomi Dolev, Lukasz Krzywiecki, Nisha Panwar, Michael Segal
Vehicle to Vehicle Authentication
This is a version that appeared as a brief announcement in 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS, 2015)
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent future, vehicles will establish a spontaneous connection over a wireless radio channel, coordinating actions and information. Vehicles will exchange warning messages over the wireless radio channel through Dedicated Short Range Communication (IEEE 1609) over the Wireless Access in Vehicular Environment (802.11p). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. Therefore, the warning messages being exchanged must incorporate an authentic factor such that recipient is willing to verify and accept the message in a timely manner
[ { "version": "v1", "created": "Thu, 6 Aug 2015 08:49:28 GMT" } ]
2015-08-07T00:00:00
[ [ "Dolev", "Shlomi", "" ], [ "Krzywiecki", "Lukasz", "" ], [ "Panwar", "Nisha", "" ], [ "Segal", "Michael", "" ] ]
new_dataset
0.999741
1508.01360
Anatoly Anisimov
Anatoly V. Anisimov, Igor O. Zavadskyi
Variable-length Splittable Codes with Multiple Delimiters
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variable-length splittable codes are derived from encoding sequences of ordered integer pairs, where one of the pair's components is upper bounded by some constant, and the other one is any positive integer. Each pair is encoded by the concatenation of two fixed independent prefix encoding functions applied to the corresponding components of a pair. The codeword of such a sequence of pairs consists of the sequential concatenation of corresponding pair's encodings. We call such codes splittable. We show that Fibonacci codes of higher orders and codes with multiple delimiters of the form 011...10 are splittable. Completeness and universality of multi-delimiter codes are proved. Encoding of integers by multi-delimiter codes is considered in detail. For these codes, a fast byte aligned decoding algorithm is constructed. The comparative compression performance of Fibonacci codes and different multi-delimiter codes is presented. By many useful properties, multi-delimiter codes are superior to Fibonacci codes.
[ { "version": "v1", "created": "Thu, 6 Aug 2015 11:02:56 GMT" } ]
2015-08-07T00:00:00
[ [ "Anisimov", "Anatoly V.", "" ], [ "Zavadskyi", "Igor O.", "" ] ]
new_dataset
0.999548
1508.00974
Tao Zhang
Tao Zhang and Gennian Ge
Quantum Block and Synchronizable Codes Derived from Certain Classes of Polynomials
9 pages. arXiv admin note: text overlap with arXiv:1403.6192, arXiv:1311.3416 by other authors
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One central theme in quantum error-correction is to construct quantum codes that have a large minimum distance. In this paper, we first present a construction of classical codes based on certain class of polynomials. Through these classical codes, we are able to obtain some new quantum codes. It turns out that some of quantum codes exhibited here have better parameters than the ones available in the literature. Meanwhile, we give a new class of quantum synchronizable codes with highest possible tolerance against misalignment from duadic codes.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 05:18:02 GMT" } ]
2015-08-06T00:00:00
[ [ "Zhang", "Tao", "" ], [ "Ge", "Gennian", "" ] ]
new_dataset
0.999764
1508.00978
Tao Zhang
Tao Zhang and Gennian Ge
Quantum Codes from Generalized Reed-Solomon Codes and Matrix-Product Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the central tasks in quantum error-correction is to construct quantum codes that have good parameters. In this paper, we construct three new classes of quantum MDS codes from classical Hermitian self-orthogonal generalized Reed-Solomon codes. We also present some classes of quantum codes from matrix-product codes. It turns out that many of our quantum codes are new in the sense that the parameters of quantum codes cannot be obtained from all previous constructions.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 05:39:43 GMT" } ]
2015-08-06T00:00:00
[ [ "Zhang", "Tao", "" ], [ "Ge", "Gennian", "" ] ]
new_dataset
0.999802
1508.01076
Peter Palfrader
Oswin Aichholzer and Therese Biedl and Thomas Hackl and Martin Held and Stefan Huber and Peter Palfrader and Birgit Vogtenhuber
Representing Directed Trees as Straight Skeletons
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The straight skeleton of a polygon is the geometric graph obtained by tracing the vertices during a mitered offsetting process. It is known that the straight skeleton of a simple polygon is a tree, and one can naturally derive directions on the edges of the tree from the propagation of the shrinking process. In this paper, we ask the reverse question: Given a tree with directed edges, can it be the straight skeleton of a polygon? And if so, can we find a suitable simple polygon? We answer these questions for all directed trees where the order of edges around each node is fixed.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 13:58:59 GMT" } ]
2015-08-06T00:00:00
[ [ "Aichholzer", "Oswin", "" ], [ "Biedl", "Therese", "" ], [ "Hackl", "Thomas", "" ], [ "Held", "Martin", "" ], [ "Huber", "Stefan", "" ], [ "Palfrader", "Peter", "" ], [ "Vogtenhuber", "Birgit", "" ] ]
new_dataset
0.993234
1508.01177
Melanie JI M\"uller
Lucas Bernardi and Jaap Kamps and Julia Kiseleva and Melanie JI M\"uller
The Continuous Cold Start Problem in e-Commerce Recommender Systems
6 pages, 3 figures. 2nd Workshop on New Trends in Content-Based Recommender Systems, RecSys 2015
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many e-commerce websites use recommender systems to recommend items to users. When a user or item is new, the system may fail because not enough information is available on this user or item. Various solutions to this `cold-start problem' have been proposed in the literature. However, many real-life e-commerce applications suffer from an aggravated, recurring version of cold-start even for known users or items, since many users visit the website rarely, change their interests over time, or exhibit different personas. This paper exposes the `Continuous Cold Start' (CoCoS) problem and its consequences for content- and context-based recommendation from the viewpoint of typical e-commerce applications, illustrated with examples from a major travel recommendation website, Booking.com.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 19:03:49 GMT" } ]
2015-08-06T00:00:00
[ [ "Bernardi", "Lucas", "" ], [ "Kamps", "Jaap", "" ], [ "Kiseleva", "Julia", "" ], [ "Müller", "Melanie JI", "" ] ]
new_dataset
0.99158
1306.2068
Steffen Lewitzka
Steffen Lewitzka
A modal logic amalgam of classical and intuitionistic propositional logic
18 pages
null
10.1093/logcom/exv048
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A famous result, conjectured by G\"odel in 1932 and proved by McKinsey and Tarski in 1948, says that $\varphi$ is a theorem of intuitionistic propositional logic IPC iff its G\"odel-translation $\varphi'$ is a theorem of modal logic S4. In this paper, we extend an intuitionistic version of modal logic S1+SP, introduced in our previous paper (S. Lewitzka, Algebraic semantics for a modal logic close to S1, J. Logic and Comp., doi:10.1093/logcom/exu067) to a classical modal logic L and prove the following: a propositional formula $\varphi$ is a theorem of IPC iff $\square\varphi$ is a theorem of L (actually, we show: $\Phi\vdash_{IPC}\varphi$ iff $\square\Phi\vdash_L\square\varphi$, for propositional $\Phi,\varphi$). Thus, the map $\varphi\mapsto\square\varphi$ is an embedding of IPC into L, i.e. L contains a copy of IPC. Moreover, L is a conservative extension of classical propositional logic CPC. In this sense, L is an amalgam of CPC and IPC. We show that L is sound and complete w.r.t. a class of special Heyting algebras with a (non-normal) modal operator.
[ { "version": "v1", "created": "Sun, 9 Jun 2013 22:27:04 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2015 23:01:42 GMT" } ]
2015-08-05T00:00:00
[ [ "Lewitzka", "Steffen", "" ] ]
new_dataset
0.990296
1507.07969
Rogerio de Carvalho A
Rogerio Atem de Carvalho, Hudson Silva, Rafael Ferreira Toledo, Milena Silveira de Azevedo
TDD for Embedded Systems: A Basic Approach and Toolset
07 pages, 05 figures, work in progress
null
null
null
cs.SE
http://creativecommons.org/licenses/by-sa/4.0/
The evolution of information technology and electronics in general has been consistently increasing the use of embedded systems. While hardware development for these systems is already consistent, software development for embedded systems still lacks a consolidated methodology. This paper describes a process and toolset for Embedded Systems Validation and Verification using FSM (Finite State Machines) and TDD (Test Driven Development).
[ { "version": "v1", "created": "Tue, 28 Jul 2015 21:50:06 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2015 21:37:56 GMT" } ]
2015-08-05T00:00:00
[ [ "de Carvalho", "Rogerio Atem", "" ], [ "Silva", "Hudson", "" ], [ "Toledo", "Rafael Ferreira", "" ], [ "de Azevedo", "Milena Silveira", "" ] ]
new_dataset
0.971039
1503.03790
Nikolaos Karapanos
Nikolaos Karapanos, Claudio Marforio, Claudio Soriente and Srdjan Capkun
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
16 pages
null
null
null
cs.CR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-factor authentication protects online accounts even if passwords are leaked. Most users, however, prefer password-only authentication. One reason why two-factor authentication is so unpopular is the extra steps that the user must complete in order to log in. Currently deployed two-factor authentication mechanisms require the user to interact with his phone to, for example, copy a verification code to the browser. Two-factor authentication schemes that eliminate user-phone interaction exist, but require additional software to be deployed. In this paper we propose Sound-Proof, a usable and deployable two-factor authentication mechanism. Sound-Proof does not require interaction between the user and his phone. In Sound-Proof the second authentication factor is the proximity of the user's phone to the device being used to log in. The proximity of the two devices is verified by comparing the ambient noise recorded by their microphones. Audio recording and comparison are transparent to the user, so that the user experience is similar to the one of password-only authentication. Sound-Proof can be easily deployed as it works with current phones and major browsers without plugins. We build a prototype for both Android and iOS. We provide empirical evidence that ambient noise is a robust discriminant to determine the proximity of two devices both indoors and outdoors, and even if the phone is in a pocket or purse. We conduct a user study designed to compare the perceived usability of Sound-Proof with Google 2-Step Verification. Participants ranked Sound-Proof as more usable and the majority would be willing to use Sound-Proof even for scenarios in which two-factor authentication is optional.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 16:06:59 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2015 13:23:25 GMT" }, { "version": "v3", "created": "Mon, 3 Aug 2015 11:52:39 GMT" } ]
2015-08-04T00:00:00
[ [ "Karapanos", "Nikolaos", "" ], [ "Marforio", "Claudio", "" ], [ "Soriente", "Claudio", "" ], [ "Capkun", "Srdjan", "" ] ]
new_dataset
0.99815
1505.03340
Tomas Balyo
Tomas Balyo, Peter Sanders, Carsten Sinz
HordeSat: A Massively Parallel Portfolio SAT Solver
Accepted for SAT 2015
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple yet successful approach to parallel satisfiability (SAT) solving is to run several different (a portfolio of) SAT solvers on the input problem at the same time until one solver finds a solution. The SAT solvers in the portfolio can be instances of a single solver with different configuration settings. Additionally the solvers can exchange information usually in the form of clauses. In this paper we investigate whether this approach is applicable in the case of massively parallel SAT solving. Our solver is intended to run on clusters with thousands of processors, hence the name HordeSat. HordeSat is a fully distributed portfolio-based SAT solver with a modular design that allows it to use any SAT solver that implements a given interface. HordeSat has a decentralized design and features hierarchical parallelism with interleaved communication and search. We experimentally evaluated it using all the benchmark problems from the application tracks of the 2011 and 2014 International SAT Competitions. The experiments demonstrate that HordeSat is scalable up to hundreds or even thousands of processors achieving significant speedups especially for hard instances.
[ { "version": "v1", "created": "Wed, 13 May 2015 11:52:25 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2015 14:01:14 GMT" } ]
2015-08-04T00:00:00
[ [ "Balyo", "Tomas", "" ], [ "Sanders", "Peter", "" ], [ "Sinz", "Carsten", "" ] ]
new_dataset
0.98558
1507.07246
Georg Struth
Georg Struth
On the Expressive Power of Kleene Algebra with Domain
Typos have been corrected
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that antidomain semirings are more expressive than test semirings and that Kleene algebras with domain are more expressive than Kleene algebras with tests. It is also shown that Kleene algebras with domain are expressive for propositional Hoare logic whereas Kleene algebras with tests are not.
[ { "version": "v1", "created": "Sun, 26 Jul 2015 20:25:52 GMT" }, { "version": "v2", "created": "Sun, 2 Aug 2015 15:17:09 GMT" } ]
2015-08-04T00:00:00
[ [ "Struth", "Georg", "" ] ]
new_dataset
0.993041
1508.00055
Peter Gloor
Peter A. Gloor, Joao Marcos, Patrick M. de Boer, Hauke Fuehres, Wei Lo, Keiichi Nemoto
Cultural Anthropology through the Lens of Wikipedia: Historical Leader Networks, Gender Bias, and News-based Sentiment
null
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the differences in historical World View between Western and Eastern cultures, represented through the English, the Chinese, Japanese, and German Wikipedia. In particular, we analyze the historical networks of the World's leaders since the beginning of written history, comparing them in the different Wikipedias and assessing cultural chauvinism. We also identify the most influential female leaders of all times in the English, German, Spanish, and Portuguese Wikipedia. As an additional lens into the soul of a culture we compare top terms, sentiment, emotionality, and complexity of the English, Portuguese, Spanish, and German Wikinews.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 23:46:30 GMT" } ]
2015-08-04T00:00:00
[ [ "Gloor", "Peter A.", "" ], [ "Marcos", "Joao", "" ], [ "de Boer", "Patrick M.", "" ], [ "Fuehres", "Hauke", "" ], [ "Lo", "Wei", "" ], [ "Nemoto", "Keiichi", "" ] ]
new_dataset
0.986356
1508.00068
Heping Jiang
Heping Jiang
A New Property of Hamilton Graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Hamilton cycle is a cycle containing every vertex of a graph. A graph is called Hamiltonian if it contains a Hamilton cycle. The Hamilton cycle problem is to find the sufficient and necessary condition that a graph is Hamiltonian. In this paper, we give out some new kind of definitions of the subgraphs and determine the Hamiltoncity of edges according to the existence of the subgraphs in a graph, and then obtain a new property of Hamilton graphs as being a necessary and sufficient condition characterized in the connectivity of the subgraph that induced from the cycle structure of a given graph.
[ { "version": "v1", "created": "Sat, 1 Aug 2015 01:56:14 GMT" } ]
2015-08-04T00:00:00
[ [ "Jiang", "Heping", "" ] ]
new_dataset
0.999119
1508.00307
Weilin Huang
Sheng Guo and Weilin Huang and Yu Qiao
Local Color Contrastive Descriptor for Image Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image representation and classification are two fundamental tasks towards multimedia content retrieval and understanding. The idea that shape and texture information (e.g. edge or orientation) are the key features for visual representation is ingrained and dominated in current multimedia and computer vision communities. A number of low-level features have been proposed by computing local gradients (e.g. SIFT, LBP and HOG), and have achieved great successes on numerous multimedia applications. In this paper, we present a simple yet efficient local descriptor for image classification, referred as Local Color Contrastive Descriptor (LCCD), by leveraging the neural mechanisms of color contrast. The idea originates from the observation in neural science that color and shape information are linked inextricably in visual cortical processing. The color contrast yields key information for visual color perception and provides strong linkage between color and shape. We propose a novel contrastive mechanism to compute the color contrast in both spatial location and multiple channels. The color contrast is computed by measuring \emph{f}-divergence between the color distributions of two regions. Our descriptor enriches local image representation with both color and contrast information. We verified experimentally that it can compensate strongly for the shape based descriptor (e.g. SIFT), while keeping computationally simple. Extensive experimental results on image classification show that our descriptor improves the performance of SIFT substantially by combinations, and achieves the state-of-the-art performance on three challenging benchmark datasets. It improves recent Deep Learning model (DeCAF) [1] largely from the accuracy of 40.94% to 49.68% in the large scale SUN397 database. Codes for the LCCD will be available.
[ { "version": "v1", "created": "Mon, 3 Aug 2015 03:29:50 GMT" } ]
2015-08-04T00:00:00
[ [ "Guo", "Sheng", "" ], [ "Huang", "Weilin", "" ], [ "Qiao", "Yu", "" ] ]
new_dataset
0.956921
1508.00504
Matilde Marcolli
Karthik Siva, Jim Tao, Matilde Marcolli
Spin Glass Models of Syntax and Language Evolution
19 pages, LaTeX, 20 png figures
null
null
null
cs.CL cond-mat.dis-nn physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using the SSWL database of syntactic parameters of world languages, and the MIT Media Lab data on language interactions, we construct a spin glass model of language evolution. We treat binary syntactic parameters as spin states, with languages as vertices of a graph, and assigned interaction energies along the edges. We study a rough model of syntax evolution, under the assumption that a strong interaction energy tends to cause parameters to align, as in the case of ferromagnetic materials. We also study how the spin glass model needs to be modified to account for entailment relations between syntactic parameters. This modification leads naturally to a generalization of Potts models with external magnetic field, which consists of a coupling at the vertices of an Ising model and a Potts model with q=3, that have the same edge interactions. We describe the results of simulations of the dynamics of these models, in different temperature and energy regimes. We discuss the linguistic interpretation of the parameters of the physical model.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 16:21:17 GMT" } ]
2015-08-04T00:00:00
[ [ "Siva", "Karthik", "" ], [ "Tao", "Jim", "" ], [ "Marcolli", "Matilde", "" ] ]
new_dataset
0.966509
1402.6779
Aleksandrs Slivkins
Ashwinkumar Badanidiyuru and John Langford and Aleksandrs Slivkins
Resourceful Contextual Bandits
This is the full version of a paper in COLT 2014. Version history: (v2) Added some details to one of the proofs, (v3) a big revision following comments from COLT reviewers (but no new results), (v4) edits in related work, minor edits elsewhere. (v6) A correction for Theorem 3, corollary for contextual dynamic pricing with discretization; updated follow-up work & open questions
null
null
null
cs.LG cs.DS cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study contextual bandits with ancillary constraints on resources, which are common in real-world applications such as choosing ads or dynamic pricing of items. We design the first algorithm for solving these problems that handles constrained resources other than time, and improves over a trivial reduction to the non-contextual case. We consider very general settings for both contextual bandits (arbitrary policy sets, e.g. Dudik et al. (UAI'11)) and bandits with resource constraints (bandits with knapsacks, Badanidiyuru et al. (FOCS'13)), and prove a regret guarantee with near-optimal statistical properties.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 03:17:19 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2014 22:00:13 GMT" }, { "version": "v3", "created": "Mon, 19 May 2014 23:01:03 GMT" }, { "version": "v4", "created": "Tue, 1 Jul 2014 14:55:01 GMT" }, { "version": "v5", "created": "Mon, 13 Jul 2015 00:12:19 GMT" }, { "version": "v6", "created": "Fri, 31 Jul 2015 18:31:27 GMT" } ]
2015-08-03T00:00:00
[ [ "Badanidiyuru", "Ashwinkumar", "" ], [ "Langford", "John", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
new_dataset
0.95438
1507.08495
Maurice Margenstern
Maurice Margenstern
About embedded quarters and points at infinity in the hyperbolic plane
17 pages, 5 figures
null
null
null
cs.CG math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove two results. First, there is a family of sequences of embedded quarters of the hyperbolic plane such that any sequence converges to a limit which is an end of the hyperbolic plane. Second, there is no algorithm which would allow us to check whether two given ends are equal or not.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 13:33:05 GMT" } ]
2015-08-03T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
new_dataset
0.992013
1507.08599
Pablo Arag\'on
Pablo Arag\'on, Yana Volkovich, David Laniado, Andreas Kaltenbrunner
When a Movement Becomes a Party: The 2015 Barcelona City Council Election
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Barcelona en Com\'u, an emerging grassroots movement-party, won the 2015 Barcelona City Council election. This candidacy was devised by activists involved in the 15M movement in order to turn citizen outrage into political change. On the one hand, the 15M movement is based on a decentralized structure. On the other hand, political science literature postulates that parties historically develop oligarchical leadership structures. This tension motivates us to examine whether Barcelona en Com\'u preserved a decentralizated structure or adopted a conventional centralized organization. In this article we analyse the Twitter networks of the parties that ran for this election by measuring their hierarchical structure, information efficiency and social resilience. Our results show that in Barcelona en Com\'u two well-defined groups co-exist: a cluster dominated by the leader and the collective accounts, and another cluster formed by the movement activists. While the former group is highly centralized like the other major parties, the latter one stands out for its decentralized, cohesive and resilient structure.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 17:54:29 GMT" } ]
2015-08-03T00:00:00
[ [ "Aragón", "Pablo", "" ], [ "Volkovich", "Yana", "" ], [ "Laniado", "David", "" ], [ "Kaltenbrunner", "Andreas", "" ] ]
new_dataset
0.999438
1507.08694
Lim Binjie Benjamin
Benjamin Lim
Android Tapjacking Vulnerability
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Android is an open source mobile operating system that is developed mainly by Google. It is used on a significant portion of mobile devices worldwide. In this paper, I will be looking at an attack commonly known as tapjacking. I will be taking the attack apart and walking through each individual step required to implement the attack. I will then explore the various payload options available to an attacker. Lastly, I will touch on the feasibility of the attack as well as mitigation strategies.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 21:28:03 GMT" } ]
2015-08-03T00:00:00
[ [ "Lim", "Benjamin", "" ] ]
new_dataset
0.991792
1507.08718
EPTCS
Mark Adams (Proof Technologies Ltd, UK and Radboud University, Nijmegen, The Netherlands)
The Common HOL Platform
In Proceedings PxTP 2015, arXiv:1507.08375
EPTCS 186, 2015, pp. 42-56
10.4204/EPTCS.186.6
null
cs.LO cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Common HOL project aims to facilitate porting source code and proofs between members of the HOL family of theorem provers. At the heart of the project is the Common HOL Platform, which defines a standard HOL theory and API that aims to be compatible with all HOL systems. So far, HOL Light and hol90 have been adapted for conformance, and HOL Zero was originally developed to conform. In this paper we provide motivation for a platform, give an overview of the Common HOL Platform's theory and API components, and show how to adapt legacy systems. We also report on the platform's successful application in the hand-translation of a few thousand lines of source code from HOL Light to HOL Zero.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 00:58:52 GMT" } ]
2015-08-03T00:00:00
[ [ "Adams", "Mark", "", "Proof Technologies Ltd, UK and Radboud University,\n Nijmegen, The Netherlands" ] ]
new_dataset
0.992988
1507.08719
EPTCS
Rapha\"el Cauderlier (Inria), Pierre Halmagrand (Inria)
Checking Zenon Modulo Proofs in Dedukti
In Proceedings PxTP 2015, arXiv:1507.08375
EPTCS 186, 2015, pp. 57-73
10.4204/EPTCS.186.7
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dedukti has been proposed as a universal proof checker. It is a logical framework based on the lambda Pi calculus modulo that is used as a backend to verify proofs coming from theorem provers, especially those implementing some form of rewriting. We present a shallow embedding into Dedukti of proofs produced by Zenon Modulo, an extension of the tableau-based first-order theorem prover Zenon to deduction modulo and typing. Zenon Modulo is applied to the verification of programs in both academic and industrial projects. The purpose of our embedding is to increase the confidence in automatically generated proofs by separating untrusted proof search from trusted proof verification.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 00:59:08 GMT" } ]
2015-08-03T00:00:00
[ [ "Cauderlier", "Raphaël", "", "Inria" ], [ "Halmagrand", "Pierre", "", "Inria" ] ]
new_dataset
0.997157
1507.08720
EPTCS
Ali Assaf (Inria, Ecole Polytechnique), Guillaume Burel (ENSIIE/C\'edric)
Translating HOL to Dedukti
In Proceedings PxTP 2015, arXiv:1507.08375
EPTCS 186, 2015, pp. 74-88
10.4204/EPTCS.186.8
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dedukti is a logical framework based on the lambda-Pi-calculus modulo rewriting, which extends the lambda-Pi-calculus with rewrite rules. In this paper, we show how to translate the proofs of a family of HOL proof assistants to Dedukti. The translation preserves binding, typing, and reduction. We implemented this translation in an automated tool and used it to successfully translate the OpenTheory standard library.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 00:59:11 GMT" } ]
2015-08-03T00:00:00
[ [ "Assaf", "Ali", "", "Inria, Ecole Polytechnique" ], [ "Burel", "Guillaume", "", "ENSIIE/Cédric" ] ]
new_dataset
0.99217
1507.08721
EPTCS
Ali Assaf (Inria, Ecole Polytechnique), Rapha\"el Cauderlier (Inria, CNAM)
Mixing HOL and Coq in Dedukti (Extended Abstract)
In Proceedings PxTP 2015, arXiv:1507.08375
EPTCS 186, 2015, pp. 89-96
10.4204/EPTCS.186.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use Dedukti as a logical framework for interoperability. We use automated tools to translate different developments made in HOL and in Coq to Dedukti, and we combine them to prove new results. We illustrate our approach with a concrete example where we instantiate a sorting algorithm written in Coq with the natural numbers of HOL.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 00:59:19 GMT" } ]
2015-08-03T00:00:00
[ [ "Assaf", "Ali", "", "Inria, Ecole Polytechnique" ], [ "Cauderlier", "Raphaël", "", "Inria,\n CNAM" ] ]
new_dataset
0.981749
1507.08733
Hirosuke Yamamoto
Hirosuke Yamamoto, Masato Tsuchihashi, and Junya Honda
Almost Instantaneous Fix-to-Variable Length Codes
Submitted to the IEEE Transactions on Information Theory in October 2014, and revised in July 205
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose almost instantaneous fixed-to-variable-length (AIFV) codes such that two (resp. $K-1$) code trees are used if code symbols are binary (resp. $K$-ary for $K \geq 3$), and source symbols are assigned to incomplete internal nodes in addition to leaves. Although the AIFV codes are not instantaneous codes, they are devised such that the decoding delay is at most two bits (resp. one code symbol) in the case of binary (resp. $K$-ary) code alphabet. The AIFV code can attain better average compression rate than the Huffman code at the expenses of a little decoding delay and a little large memory size to store multiple code trees. We also show for the binary and ternary AIFV codes that the optimal AIFV code can be obtained by solving 0-1 integer programming problems.
[ { "version": "v1", "created": "Fri, 31 Jul 2015 02:42:08 GMT" } ]
2015-08-03T00:00:00
[ [ "Yamamoto", "Hirosuke", "" ], [ "Tsuchihashi", "Masato", "" ], [ "Honda", "Junya", "" ] ]
new_dataset
0.999442
1503.01981
Andr\'e Platzer
Andr\'e Platzer
A Uniform Substitution Calculus for Differential Dynamic Logic
null
null
10.1007/978-3-319-21401-6_32
null
cs.LO cs.PL math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new proof calculus for differential dynamic logic (dL) that is entirely based on uniform substitution, a proof rule that substitutes a formula for a predicate symbol everywhere. Uniform substitutions make it possible to rely on axioms rather than axiom schemata, substantially simplifying implementations. Instead of nontrivial schema variables and soundness-critical side conditions on the occurrence patterns of variables, the resulting calculus adopts only a finite number of ordinary dL formulas as axioms. The static semantics of differential dynamic logic is captured exclusively in uniform substitutions and bound variable renamings as opposed to being spread in delicate ways across the prover implementation. In addition to sound uniform substitutions, this paper introduces differential forms for differential dynamic logic that make it possible to internalize differential invariants, differential substitutions, and derivations as first-class axioms in dL.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 15:05:30 GMT" }, { "version": "v2", "created": "Wed, 25 Mar 2015 15:23:32 GMT" }, { "version": "v3", "created": "Wed, 29 Apr 2015 19:53:19 GMT" }, { "version": "v4", "created": "Fri, 15 May 2015 02:22:37 GMT" }, { "version": "v5", "created": "Thu, 30 Jul 2015 19:18:02 GMT" } ]
2015-07-31T00:00:00
[ [ "Platzer", "André", "" ] ]
new_dataset
0.956702
1504.01379
Zhihan Lv
Zhihan Lv and Xiaoming Li and Baoyun Zhang and Weixi Wang and Shengzhong Feng and Jinxing Hu
Preprint Big City 3D Visual Analysis
This is the preprint version of our paper on EUROGRAPHICS 2015
null
null
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the preprint version of our paper on EUROGRAPHICS 2015. A big city visual analysis platform based on Web Virtual Reality Geographical Information System (WEBVRGIS) is presented. Extensive model editing functions and spatial analysis functions are available, including terrain analysis, spatial analysis, sunlight analysis, traffic analysis, population analysis and community analysis.
[ { "version": "v1", "created": "Mon, 6 Apr 2015 15:53:09 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2015 20:57:06 GMT" } ]
2015-07-31T00:00:00
[ [ "Lv", "Zhihan", "" ], [ "Li", "Xiaoming", "" ], [ "Zhang", "Baoyun", "" ], [ "Wang", "Weixi", "" ], [ "Feng", "Shengzhong", "" ], [ "Hu", "Jinxing", "" ] ]
new_dataset
0.996192
1507.08447
Minati Mishra Dr.
Minati Mishra
Ethical, Legal and Social aspects of Information and Communication Technology
Proceedings of UGC sponsored Seminar on Ethics and Human Values,Sept 2007, 66-71
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this era of computers and communication technology where computers and internet have made their ways to every sphere of life from offices to residences, reservation counters to banks to post offices, small retail shops to big organizations, health care units to entertainment industries etc., there emerged numerous questions regarding the ethical and legal uses of Information and Communication Technology (ICT). Like any other technological inventions ICT too has created both positive and negative impacts on the society. This paper aims at exploring some of these issues in brief.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 10:48:59 GMT" } ]
2015-07-31T00:00:00
[ [ "Mishra", "Minati", "" ] ]
new_dataset
0.998052
1507.08475
Ana Barroso
Ana Barroso
aDTN - Undetectable Communication in Wireless Delay-tolerant Networks (Working Draft)
null
null
null
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-sa/4.0/
This document describes a best-effort delay-tolerant communication system that protects the privacy of users in wireless ad-hoc networks by making their communication undetectable. The proposed system is a wireless broadcast-based adaptation of mix networks where each user belongs to at least one group it trusts, and each group acts as a mix node. Assuming encryption is not broken, it provides undetectability of all users and messages against external adversaries, as well as undetectability of users and messages in non-compromised groups against internal adversaries.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 12:22:38 GMT" } ]
2015-07-31T00:00:00
[ [ "Barroso", "Ana", "" ] ]
new_dataset
0.98814
1507.08569
Mohsen Yaghoubi Suraki
Mohsen Yaghoubi Suraki, Morteza Yaghoubi Suraki, Leila SourakiAzad
HMIoT: A New Healthcare Model Based on Internet of Things
8 pages, 9 figures, Journal
IJCSI International Journal of Computer Science Issues, Volume 12, Issue 1, No 1, January 2015 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent century, with developing of equipment, using of the internet and things connected to the internet is growing. Therefore, the need for informing in the process of expanding the scope of its application is very necessary and important. These days, using intelligent and autonomous devices in our daily lives has become commonplace and the Internet is the most important part of the relationship between these tools and even at close distances also. Things connected to the Internet that are currently in use and can be inclusive of all the sciences as a step to develop and coordinate of them. In this paper we investigate application and using of Internet of things from the perspective of various sciences. We show that how this phenomenon can influence on future health of people.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 20:18:18 GMT" } ]
2015-07-31T00:00:00
[ [ "Suraki", "Mohsen Yaghoubi", "" ], [ "Suraki", "Morteza Yaghoubi", "" ], [ "SourakiAzad", "Leila", "" ] ]
new_dataset
0.970432
1507.08582
Giovanni Pighizzini
Giovanni Pighizzini
One-Tape Turing Machine Variants and Language Recognition
20 pages. This article will appear in the Complexity Theory Column of the September 2015 issue of SIGACT News
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two restricted versions of one-tape Turing machines. Both characterize the class of context-free languages. In the first version, proposed by Hibbard in 1967 and called limited automata, each tape cell can be rewritten only in the first $d$ visits, for a fixed constant $d\geq 2$. Furthermore, for $d=2$ deterministic limited automata are equivalent to deterministic pushdown automata, namely they characterize deterministic context-free languages. Further restricting the possible operations, we consider strongly limited automata. These models still characterize context-free languages. However, the deterministic version is less powerful than the deterministic version of limited automata. In fact, there exist deterministic context-free languages that are not accepted by any deterministic strongly limited automaton.
[ { "version": "v1", "created": "Thu, 30 Jul 2015 16:58:23 GMT" } ]
2015-07-31T00:00:00
[ [ "Pighizzini", "Giovanni", "" ] ]
new_dataset
0.980252
1504.01030
Zhihan Lv
Zhihan Lv, Chantal Esteve, Javier Chirivella, Pablo Gagliardo
Preprint A Game Based Assistive Tool for Rehabilitation of Dysphonic Patients
This is the preprint version of our paper on 3rd International Workshop on Virtual and Augmented Assistive Technology (VAAT) at IEEE Virtual Reality 2015 (VR2015)
null
null
null
cs.HC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the preprint version of our paper on 3rd International Workshop on Virtual and Augmented Assistive Technology (VAAT) at IEEE Virtual Reality 2015 (VR2015). An assistive training tool for rehabilitation of dysphonic patients is designed and developed according to the practical clinical needs. The assistive tool employs a space flight game as the attractive logic part, and microphone arrays as input device, which is getting rid of ambient noise by setting a specific orientation. The therapist can guide the patient to play the game as well as the voice training simultaneously side by side, while not interfere the patient voice. The voice information can be recorded and extracted for evaluating the long-time rehabilitation progress. This paper outlines a design science approach for the development of an initial useful software prototype of such a tool, considering 'Intuitive', 'Entertainment', 'Incentive' as main design factors.
[ { "version": "v1", "created": "Sat, 4 Apr 2015 17:43:54 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2015 08:47:30 GMT" } ]
2015-07-30T00:00:00
[ [ "Lv", "Zhihan", "" ], [ "Esteve", "Chantal", "" ], [ "Chirivella", "Javier", "" ], [ "Gagliardo", "Pablo", "" ] ]
new_dataset
0.995021
1505.01056
Zhihan Lv
Xiaoming Li, Zhihan Lv, Weixi Wang, Chen Wu, Jinxing Hu
Preprint Virtual Reality GIS and Cloud Service Based Traffic Analysis Platform
This is the preprint version of our paper on The 23rd International Conference on Geoinformatics (Geoinformatics2015)
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the preprint version of our paper on The 23rd International Conference on Geoinformatics (Geoinformatics2015). City traffic data has several characteristics, such as large scale, diverse predictable and real-time, which falls in the range of definition of Big Data. This paper proposed a cloud service platform which targets for wise transportation is to carry out unified management and mining analysis of the huge number of the multivariate and heterogeneous dynamic transportation information, provides real-time transportation information, increase the utilization efficiency of transportation, promote transportation management and service level of travel information and provide decision support of transportation management by virtual reality as visual.
[ { "version": "v1", "created": "Tue, 5 May 2015 15:57:36 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2015 08:32:30 GMT" } ]
2015-07-30T00:00:00
[ [ "Li", "Xiaoming", "" ], [ "Lv", "Zhihan", "" ], [ "Wang", "Weixi", "" ], [ "Wu", "Chen", "" ], [ "Hu", "Jinxing", "" ] ]
new_dataset
0.969282
1507.06711
Shitao Weng
Shitao Weng, Shushan Chen, Lei Yu, Xuewei Wu, Weicheng Cai, Zhi Liu, Ming Li
The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
5 pages, 1 figure
null
null
null
cs.SD cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many existing speaker verification systems are reported to be vulnerable against different spoofing attacks, for example speaker-adapted speech synthesis, voice conversion, play back, etc. In order to detect these spoofed speech signals as a countermeasure, we propose a score level fusion approach with several different i-vector subsystems. We show that the acoustic level Mel-frequency cepstral coefficients (MFCC) features, the phase level modified group delay cepstral coefficients (MGDCC) and the phonetic level phoneme posterior probability (PPP) tandem features are effective for the countermeasure. Furthermore, feature level fusion of these features before i-vector modeling also enhance the performance. A polynomial kernel support vector machine is adopted as the supervised classifier. In order to enhance the generalizability of the countermeasure, we also adopted the cosine similarity and PLDA scoring as one-class classifications methods. By combining the proposed i-vector subsystems with the OpenSMILE baseline which covers the acoustic and prosodic information further improves the final performance. The proposed fusion system achieves 0.29% and 3.26% EER on the development and test set of the database provided by the INTERSPEECH 2015 automatic speaker verification spoofing and countermeasures challenge.
[ { "version": "v1", "created": "Fri, 24 Jul 2015 00:36:01 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2015 15:41:04 GMT" } ]
2015-07-30T00:00:00
[ [ "Weng", "Shitao", "" ], [ "Chen", "Shushan", "" ], [ "Yu", "Lei", "" ], [ "Wu", "Xuewei", "" ], [ "Cai", "Weicheng", "" ], [ "Liu", "Zhi", "" ], [ "Li", "Ming", "" ] ]
new_dataset
0.983652
1507.08052
EPTCS
Amy Felty (University of Ottawa), Alberto Momigliano (Universita degli Studi di Milano), Brigitte Pientka (McGill University)
An Open Challenge Problem Repository for Systems Supporting Binders
In Proceedings LFMTP 2015, arXiv:1507.07597
EPTCS 185, 2015, pp. 18-32
10.4204/EPTCS.185.2
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A variety of logical frameworks support the use of higher-order abstract syntax in representing formal systems; however, each system has its own set of benchmarks. Even worse, general proof assistants that provide special libraries for dealing with binders offer a very limited evaluation of such libraries, and the examples given often do not exercise and stress-test key aspects that arise in the presence of binders. In this paper we design an open repository ORBI (Open challenge problem Repository for systems supporting reasoning with BInders). We believe the field of reasoning about languages with binders has matured, and a common set of benchmarks provides an important basis for evaluation and qualitative comparison of different systems and libraries that support binders, and it will help to advance the field.
[ { "version": "v1", "created": "Wed, 29 Jul 2015 08:20:55 GMT" } ]
2015-07-30T00:00:00
[ [ "Felty", "Amy", "", "University of Ottawa" ], [ "Momigliano", "Alberto", "", "Universita degli\n Studi di Milano" ], [ "Pientka", "Brigitte", "", "McGill University" ] ]
new_dataset
0.988022
1507.08055
EPTCS
Ronan Saillard (MINES ParisTech, PSL Research University, France)
Rewriting Modulo \beta in the \lambda\Pi-Calculus Modulo
In Proceedings LFMTP 2015, arXiv:1507.07597
EPTCS 185, 2015, pp. 87-101
10.4204/EPTCS.185.6
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The lambda-Pi-calculus Modulo is a variant of the lambda-calculus with dependent types where beta-conversion is extended with user-defined rewrite rules. It is an expressive logical framework and has been used to encode logics and type systems in a shallow way. Basic properties such as subject reduction or uniqueness of types do not hold in general in the lambda-Pi-calculus Modulo. However, they hold if the rewrite system generated by the rewrite rules together with beta-reduction is confluent. But this is too restrictive. To handle the case where non confluence comes from the interference between the beta-reduction and rewrite rules with lambda-abstraction on their left-hand side, we introduce a notion of rewriting modulo beta for the lambda-Pi-calculus Modulo. We prove that confluence of rewriting modulo beta is enough to ensure subject reduction and uniqueness of types. We achieve our goal by encoding the lambda-Pi-calculus Modulo into Higher-Order Rewrite System (HRS). As a consequence, we also make the confluence results for HRSs available for the lambda-Pi-calculus Modulo.
[ { "version": "v1", "created": "Wed, 29 Jul 2015 08:21:36 GMT" } ]
2015-07-30T00:00:00
[ [ "Saillard", "Ronan", "", "MINES ParisTech, PSL Research University, France" ] ]
new_dataset
0.98947
1507.08109
Alexander Evako V
Alexander V. Evako
Parabolic equations on digital spaces. Solutions on the digital Moebius strip and the digital projective plane
10 pages, 6 figures
null
null
null
cs.DM math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we define a parabolic equation on digital spaces and study its properties. The equation can be used in investigation of mechanical, aerodynamic, structural and technological properties of a Moebius strip, which is used as a basic element of a new configuration of an airplane wing. Condition for existence of exact solutions by a matrix method and a method of separation of variables are studied and determined. As examples, numerical solutions on Moebius strip and projective plane are presented.
[ { "version": "v1", "created": "Wed, 29 Jul 2015 12:02:48 GMT" } ]
2015-07-30T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
new_dataset
0.994482
1507.08233
Marc-Olivier Arsenault
Marc-Olivier Arsenault, Hanen Garcia Gamardo, Kim-Khoa Nguyen, Mohamed Cheriet
Session-based Communication for Vital Machine-to-Machine Applications
12 pages, S2CT
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the machine to machine (M2M) communication has been emerging in recent years, many vendors' specific proprietary solutions are not suitable for vital M2M applications. While the main focus of those solutions is management and provisioning of machines, real-time monitoring and communication control are also required to handle a variety of access technologies, like WiFi and LTE, and unleash machine deployment. In this paper, we present a new architecture addressing these issues by leveraging the IP Multimedia Subsystem (IMS) deployed in operator's networks for RCS and VoLTE.
[ { "version": "v1", "created": "Wed, 29 Jul 2015 17:37:29 GMT" } ]
2015-07-30T00:00:00
[ [ "Arsenault", "Marc-Olivier", "" ], [ "Gamardo", "Hanen Garcia", "" ], [ "Nguyen", "Kim-Khoa", "" ], [ "Cheriet", "Mohamed", "" ] ]
new_dataset
0.98677
1409.5141
Xishuo Liu
Xishuo Liu, Stark C. Draper
ADMM LP decoding of non-binary LDPC codes in $\mathbb{F}_{2^m}$
This work was supported by the National Science Foundation (NSF) under Grants CCF-1217058 and by a Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Research Grant. This paper was submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we develop efficient decoders for non-binary low-density parity-check (LDPC) codes using the alternating direction method of multipliers (ADMM). We apply ADMM to two decoding problems. The first problem is linear programming (LP) decoding. In order to develop an efficient algorithm, we focus on non-binary codes in fields of characteristic two. This allows us to transform each constraint in $\mathbb{F}_{2^m}$ to a set of constraints in $\mathbb{F}_{2}$ that has a factor graph representation. Applying ADMM to the LP decoding problem results in two types of non-trivial sub-routines. The first type requires us to solve an unconstrained quadratic program. We solve this problem efficiently by leveraging new results obtained from studying the above factor graphs. The second type requires Euclidean projection onto polytopes that are studied in the literature, a projection that can be solved efficiently using off-the-shelf techniques, which scale linearly in the dimension of the vector to project. ADMM LP decoding scales linearly with block length, linearly with check degree, and quadratically with field size. The second problem we consider is a penalized LP decoding problem. This problem is obtained by incorporating a penalty term into the LP decoding objective. The purpose of the penalty term is to make non-integer solutions (pseudocodewords) more expensive and hence to improve decoding performance. The ADMM algorithm for the penalized LP problem requires Euclidean projection onto a polytope formed by embedding the constraints specified by the non-binary single parity-check code, which can be solved by applying the ADMM technique to the resulting quadratic program. Empirically, this decoder achieves a much reduced error rate than LP decoding at low signal-to-noise ratios.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 20:40:47 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2015 03:10:00 GMT" } ]
2015-07-29T00:00:00
[ [ "Liu", "Xishuo", "" ], [ "Draper", "Stark C.", "" ] ]
new_dataset
0.973394
1507.07628
Xishuo Liu
Xishuo Liu, Stark C. Draper
LP-decodable multipermutation codes
This work was supported by the National Science Foundation (NSF) under Grants CCF-1217058 and by a Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Research Grant. This paper was submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new way of constructing and decoding multipermutation codes. Multipermutations are permutations of a multiset that generally consist of duplicate entries. We first introduce a class of binary matrices called multipermutation matrices, each of which corresponds to a unique and distinct multipermutation. By enforcing a set of linear constraints on these matrices, we define a new class of codes that we term LP-decodable multipermutation codes. In order to decode these codes using a linear program (LP), thereby enabling soft decoding, we characterize the convex hull of multipermutation matrices. This characterization allows us to relax the coding constraints to a polytope and to derive two LP decoding problems. These two problems are respectively formulated by relaxing the maximum likelihood decoding problem and the minimum Chebyshev distance decoding problem. Because these codes are non-linear, we also study efficient encoding and decoding algorithms. We first describe an algorithm that maps consecutive integers, one by one, to an ordered list of multipermutations. Based on this algorithm, we develop an encoding algorithm for a code proposed by Shieh and Tsai, a code that falls into our class of LP-decodable multipermutation codes. Regarding decoding algorithms, we propose an efficient distributed decoding algorithm based on the alternating direction method of multipliers (ADMM). Finally, we observe from simulation results that the soft decoding techniques we introduce can significantly outperform hard decoding techniques that are based on quantized channel outputs.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 03:22:48 GMT" } ]
2015-07-29T00:00:00
[ [ "Liu", "Xishuo", "" ], [ "Draper", "Stark C.", "" ] ]
new_dataset
0.998838
1507.07632
Kristina Lerman
Luciano Gallegos, Kristina Lerman, Arthur Huang and David Garcia
Geography of Emotion: Where in a City are People Happier?
submitted to WSDM
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Location-sharing services were built upon people's desire to share their activities and locations with others. By "checking-in" to a place, such as a restaurant, a park, gym, or train station, people disclose where they are, thereby providing valuable information about land use and utilization of services in urban areas. This information may, in turn, be used to design smarter, happier, more equitable cities. We use data from Foursquare location-sharing service to identify areas within a major US metropolitan area with many check-ins, i.e., areas that people like to use. We then use data from the Twitter microblogging platform to analyze the properties of these areas. Specifically, we have extracted a large corpus of geo-tagged messages, called tweets, from a major metropolitan area and linked them US Census data through their locations. This allows us to measure the sentiment expressed in tweets that are posted from a specific area, and also use that area's demographic properties in analysis. Our results reveal that areas with many check-ins are different from other areas within the metropolitan region. In particular, these areas have happier tweets, which also encourage people from other areas to commute longer distances to these places. These findings shed light on human mobility patterns, as well as how physical environment influences human emotions.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 03:46:21 GMT" } ]
2015-07-29T00:00:00
[ [ "Gallegos", "Luciano", "" ], [ "Lerman", "Kristina", "" ], [ "Huang", "Arthur", "" ], [ "Garcia", "David", "" ] ]
new_dataset
0.998894
1507.07662
Chandrashekhar Pomu Chavan cPc
Chandrashekhar Pomu Chavan and Pallapa Venkataram
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
18 pages, 13 figures, Fifth International Conference on Advances in Computing and Information Technology (ACITY 2015), July 25-26-2015, Chennai, India
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have designed a novel Event-Condition-Action(ECA) scheme based Ad hoc On-demand Distance Vector(ECA-AODV) routing protocol for a Ubiquitous Network(UbiNet). ECA-AODV is designed to make routing decision dynamically and quicker response to dynamic network conditions as and when event occur. ECA scheme essentially consists of three modules to make runtime routing decision quicker. First, event module receive event that occur in a UbiNet and split up event into event type and event attributes. Second, condition module obtain event details from event module split up each condition into condition attributes that matches event and fire the rule as soon as condition hold. Third, action module make runtime decisions based on event obtained and condition applied. We have simulated and tested the designed ECA scheme by considering ubiquitous museum environment as a case study with nodes range from 10 to 100. The simulation results show the time efficient with minimal operations
[ { "version": "v1", "created": "Tue, 28 Jul 2015 06:37:13 GMT" } ]
2015-07-29T00:00:00
[ [ "Chavan", "Chandrashekhar Pomu", "" ], [ "Venkataram", "Pallapa", "" ] ]
new_dataset
0.99195
1507.07815
Svebor Karaman
Giuseppe Lisanti and Svebor Karaman and Daniele Pezzatini and Alberto Del Bimbo
A Multi-Camera Image Processing and Visualization System for Train Safety Assessment
11 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a machine vision system to efficiently monitor, analyze and present visual data acquired with a railway overhead gantry equipped with multiple cameras. This solution aims to improve the safety of daily life railway transportation in a two- fold manner: (1) by providing automatic algorithms that can process large imagery of trains (2) by helping train operators to keep attention on any possible malfunction. The system is designed with the latest cutting edge, high-rate visible and thermal cameras that ob- serve a train passing under an railway overhead gantry. The machine vision system is composed of three principal modules: (1) an automatic wagon identification system, recognizing the wagon ID according to the UIC classification of railway coaches; (2) a temperature monitoring system; (3) a system for the detection, localization and visualization of the pantograph of the train. These three machine vision modules process batch trains sequences and their resulting analysis are presented to an operator using a multitouch user interface. We detail all technical aspects of our multi-camera portal: the hardware requirements, the software developed to deal with the high-frame rate cameras and ensure reliable acquisition, the algorithms proposed to solve each computer vision task, and the multitouch interaction and visualization interface. We evaluate each component of our system on a dataset recorded in an ad-hoc railway test-bed, showing the potential of our proposed portal for train safety assessment.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 15:36:24 GMT" } ]
2015-07-29T00:00:00
[ [ "Lisanti", "Giuseppe", "" ], [ "Karaman", "Svebor", "" ], [ "Pezzatini", "Daniele", "" ], [ "Del Bimbo", "Alberto", "" ] ]
new_dataset
0.989626
1507.07888
Randall Berry
Thanh Nguyen, Hang Zhou, Randall A. Berry, Michael L. Honig, and Rakesh Vohra
The Cost of Free Spectrum
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been growing interest in increasing the amount of radio spectrum available for unlicensed broad-band wireless access. That includes "prime" spectrum at lower frequencies, which is also suitable for wide area coverage by licensed cellular providers. While additional unlicensed spectrum would allow for market expansion, it could influence competition among providers and increase congestion (interference) among consumers of wireless services. We study the value (social welfare and consumer surplus) obtained by adding unlicensed spectrum to an existing allocation of licensed spectrum among incumbent service providers. We assume a population of customers who choose a provider based on the minimum delivered price, given by the weighted sum of the price of the service and a congestion cost, which depends on the number of subscribers in a band. We consider models in which this weighting is uniform across the customer population and where the weighting is either high or low, reflecting different sensitivities to latency. For the models considered, we find that the social welfare depends on the amount of additional unlicensed spectrum, and can actually decrease over a significant range of unlicensed bandwidths. Furthermore, with nonuniform weighting, introducing unlicensed spectrum can also reduce consumer welfare.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 18:32:29 GMT" } ]
2015-07-29T00:00:00
[ [ "Nguyen", "Thanh", "" ], [ "Zhou", "Hang", "" ], [ "Berry", "Randall A.", "" ], [ "Honig", "Michael L.", "" ], [ "Vohra", "Rakesh", "" ] ]
new_dataset
0.991118
1307.7867
Daniel Ruprecht
Robert Speck, Daniel Ruprecht, Matthew Emmett, Matthias Bolten, Rolf Krause
A space-time parallel solver for the three-dimensional heat equation
10 pages
Advances in Parallel Computing 25, IOS Press, pages 263 - 272, 2014
10.3233/978-1-61499-381-0-263
null
cs.NA cs.DC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a combination of the time-parallel "parallel full approximation scheme in space and time" (PFASST) with a parallel multigrid method (PMG) in space, resulting in a mesh-based solver for the three-dimensional heat equation with a uniquely high degree of efficient concurrency. Parallel scaling tests are reported on the Cray XE6 machine "Monte Rosa" on up to 16,384 cores and on the IBM Blue Gene/Q system "JUQUEEN" on up to 65,536 cores. The efficacy of the combined spatial- and temporal parallelization is shown by demonstrating that using PFASST in addition to PMG significantly extends the strong-scaling limit. Implications of using spatial coarsening strategies in PFASST's multi-level hierarchy in large-scale parallel simulations are discussed.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 08:21:13 GMT" }, { "version": "v2", "created": "Mon, 14 Jul 2014 14:19:53 GMT" } ]
2015-07-28T00:00:00
[ [ "Speck", "Robert", "" ], [ "Ruprecht", "Daniel", "" ], [ "Emmett", "Matthew", "" ], [ "Bolten", "Matthias", "" ], [ "Krause", "Rolf", "" ] ]
new_dataset
0.977806
1504.03632
Kyatsandra Nagananda
B. N. Bharath and K. G. Nagananda
Caching with Unknown Popularity Profiles in Small Cell Networks
6 pages, Proceedings of IEEE Global Communications Conference, 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A heterogenous network is considered where the base stations (BSs), small base stations (SBSs) and users are distributed according to independent Poisson point processes (PPPs). We let the SBS nodes to posses high storage capacity and are assumed to form a distributed caching network. Popular data files are stored in the local cache of SBS, so that users can download the desired files from one of the SBS in the vicinity subject to availability. The offloading-loss is captured via a cost function that depends on a random caching strategy proposed in this paper. The cost function depends on the popularity profile, which is, in general, unknown. In this work, the popularity profile is estimated at the BS using the available instantaneous demands from the users in a time interval $[0,\tau]$. This is then used to find an estimate of the cost function from which the optimal random caching strategy is devised. The main results of this work are the following: First it is shown that the waiting time $\tau$ to achieve an $\epsilon>0$ difference between the achieved and optimal costs is finite, provided the user density is greater than a predefined threshold. In this case, $\tau$ is shown to scale as $N^2$, where $N$ is the support of the popularity profile. Secondly, a transfer learning-based approach is proposed to obtain an estimate of the popularity profile used to compute the empirical cost function. A condition is derived under which the proposed transfer learning-based approach performs better than the random caching strategy.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 17:29:27 GMT" }, { "version": "v2", "created": "Sun, 26 Jul 2015 11:52:35 GMT" } ]
2015-07-28T00:00:00
[ [ "Bharath", "B. N.", "" ], [ "Nagananda", "K. G.", "" ] ]
new_dataset
0.971263