id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1507.06988
Luiz Capretz Dr.
Lihua Wang, Luz Fernando Capretz
A Binary Data Stream Scripting Language
null
Transactions on Information Science and Applications, 3(2):291-298, 2006
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Any file is fundamentally a binary data stream. A practical solution was achieved to interpret binary data stream. A new scripting language named Data Format Scripting Language (DFSL) was developed to describe the physical layout of the data in a structural, more intelligible way. On the basis of the solution, a generic software application was implemented; it parses various binary data streams according to their respective DFSL scripts and generates human-readable result and XML document for data sharing. Our solution helps eliminate the error-prone low-level programming, especially in the hardware devices or network protocol development/debugging processes.
[ { "version": "v1", "created": "Fri, 24 Jul 2015 18:26:21 GMT" } ]
2015-07-28T00:00:00
[ [ "Wang", "Lihua", "" ], [ "Capretz", "Luz Fernando", "" ] ]
new_dataset
0.992925
1507.07200
Jaderick Pabico
Jaderick P. Pabico, Jose Rene L. Micor and Elmer Rico E. Mojica
A Neural Prototype for a Virtual Chemical Spectrophotometer
5 pages, 3 figures, appeared in Proceedings (CDROM) of the 6th National Conference on IT in Education (NCITE 2008), University of the Philippines Los Ba\~nos, 23-24 October 2008
Philippine Computing Journal, 4(2):39-42, 2009
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/4.0/
A virtual chemical spectrophotometer for the simultaneous analysis of nickel (Ni) and cobalt (Co) was developed based on an artificial neural network (ANN). The developed ANN correlates the respective concentrations of Co and Ni given the absorbance profile of a Co-Ni mixture based on the Beer's Law. The virtual chemical spectrometer was trained using a 3-layer jump connection neural network model (NNM) with 126 input nodes corresponding to the 126 absorbance readings from 350 nm to 600 nm, 70 nodes in the hidden layer using a logistic activation function, and 2 nodes in the output layer with a logistic function. Test result shows that the NNM has correlation coefficients of 0.9953 and 0.9922 when predicting [Co] and [Ni], respectively. We observed, however, that the NNM has a duality property and that there exists a real-world practical application in solving the dual problem: Predict the Co-Ni mixture's absorbance profile given [Co] and [Ni]. It turns out that the dual problem is much harder to solve because the intended output has a much bigger cardinality than that of the input. Thus, we trained the dual ANN, a 3-layer jump connection nets with 2 input nodes corresponding to [Co] and [Ni], 70-logistic-activated nodes in the hidden layer, and 126 output nodes corresponding to the 126 absorbance readings from 250 nm to 600 nm. Test result shows that the dual NNM has correlation coefficients that range from 0.9050 through 0.9980 at 356 nm through 578 nm with the maximum coefficient observed at 480 nm. This means that the dual ANN can be used to predict the absorbance profile given the respective Co-Ni concentrations which can be of importance in creating academic models for a virtual chemical spectrophotometer.
[ { "version": "v1", "created": "Sun, 26 Jul 2015 14:13:29 GMT" } ]
2015-07-28T00:00:00
[ [ "Pabico", "Jaderick P.", "" ], [ "Micor", "Jose Rene L.", "" ], [ "Mojica", "Elmer Rico E.", "" ] ]
new_dataset
0.99248
1507.07292
Huseyin Birkan Yilmaz
Weisi Guo and Taufiq Asyhari and Nariman Farsad and H. Birkan Yilmaz and Bin Li and Andrew Eckford and Chan-Byoung Chae
Molecular Communications: Channel Model and Physical Layer Techniques
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article examines recent research in molecular communications from a telecommunications system design perspective. In particular, it focuses on channel models and state-of-the-art physical layer techniques. The goal is to provide a foundation for higher layer research and motivation for research and development of functional prototypes. In the first part of the article, we focus on the channel and noise model, comparing molecular and radio-wave pathloss formulae. In the second part, the article examines, equipped with the appropriate channel knowledge, the design of appropriate modulation and error correction coding schemes. The third reviews transmitter and receiver side signal processing methods that suppress inter-symbol-interference. Taken together, the three parts present a series of physical layer techniques that are necessary to producing reliable and practical molecular communications.
[ { "version": "v1", "created": "Mon, 27 Jul 2015 03:42:59 GMT" } ]
2015-07-28T00:00:00
[ [ "Guo", "Weisi", "" ], [ "Asyhari", "Taufiq", "" ], [ "Farsad", "Nariman", "" ], [ "Yilmaz", "H. Birkan", "" ], [ "Li", "Bin", "" ], [ "Eckford", "Andrew", "" ], [ "Chae", "Chan-Byoung", "" ] ]
new_dataset
0.997855
1507.06946
Sandip Roy Mr.
Rajesh Bose, Sandip Roy and Debabrata Sarddar
Mobile-Based Video Caching Architecture Based on Billboard Manager
8 pages, 1 figure, GridCom-2015
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video streaming services are very popular today. Increasingly, users can now access multimedia applications and video playback wirelessly on their mobile devices. However, a significant challenge remains in ensuring smooth and uninterrupted transmission of almost any size of video file over a 3G network, and as quickly as possible in order to optimize bandwidth consumption. In this paper, we propose to position our Billboard Manager to provide an optimal transmission rate to enable smooth video playback to a mobile device user connected to a 3G network. Our work focuses on serving user requests by mobile operators from cached resource managed by Billboard Manager, and transmitting the video files from this pool. The aim is to reduce the load placed on bandwidth resources of a mobile operator by routing away as much user requests away from the internet for having to search a video and, subsequently, if located, have it transferred back to the user.
[ { "version": "v1", "created": "Fri, 24 Jul 2015 18:27:59 GMT" } ]
2015-07-27T00:00:00
[ [ "Bose", "Rajesh", "" ], [ "Roy", "Sandip", "" ], [ "Sarddar", "Debabrata", "" ] ]
new_dataset
0.999103
1507.06952
Luiz Capretz Dr.
Faheem Ahmed, Luiz Fernando Capretz
Framework for Version Control & Dependency Link of Components & Products in a Software Product Line
null
Transactions on Computers, 3(6):1782-1787, 2004
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software product line deals with the assembly of products from existing core assets commonly known as components and continuous growth in the core assets as we proceed with production. This idea has emerged as vital in terms of software development from component-based architecture. Since in software product line one has to deal with number of products and components simultaneous therefore there is a need to develop a strategy, which will help to store components and products information in such a way that they can be traced easily for further development. This storage strategy should reflect a relationship between products and components so that product history with reference to components can be traced and vise versa. In this paper we have presented a tree structure based storage strategy for components and products in software product line. This strategy will enable us to store the vital information about components and products with a relationship of their composition and utilization. We implemented this concept and simulated the software product line environment.
[ { "version": "v1", "created": "Fri, 24 Jul 2015 18:40:32 GMT" } ]
2015-07-27T00:00:00
[ [ "Ahmed", "Faheem", "" ], [ "Capretz", "Luiz Fernando", "" ] ]
new_dataset
0.953949
1507.06368
Jos Wetzels
Jos Wetzels, Wouter Bokslag
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
20 pages
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
In this paper we will present various hardware architecture designs for implementing the SIMON 64/128 block cipher as a cryptographic component offering encryption, decryption and self-contained key-scheduling capabilities and discuss the issues and design options we encountered and the tradeoffs we made in implementing them. Finally, we will present the results of our hardware architectures' implementation performances on the Xilinx Spartan-6 FPGA series.
[ { "version": "v1", "created": "Thu, 23 Jul 2015 01:26:27 GMT" } ]
2015-07-24T00:00:00
[ [ "Wetzels", "Jos", "" ], [ "Bokslag", "Wouter", "" ] ]
new_dataset
0.997507
1507.06469
Rakhi Gupta Mrs
Rakhi Misuriya Gupta
MOBISPA: A Reference Framework for Mobile as a Personal Assistant
12 pages, 4 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile is taking center stage and becoming the device of preference for all aspects of communication because of our increasingly on the go lifestyles. With this the demands on mobile capability to execute increasingly complex operations are also on the rise. However, despite improvements in device computing power in the last couple of years a mobile device continues to have limitations. Mobile driven everyday use cases are increasingly raising expectations that rest on mobile technologies that are still evolving. A number of fragmented approaches and solutions have been created that address various requirements unique to mobility, however there is a lack of a single framework that serves as a unifying reference for industry and solution architectures. The paper addresses this concern through the specification of a comprehensive reference framework for mobility that is generic and vendor neutral.
[ { "version": "v1", "created": "Thu, 23 Jul 2015 12:45:34 GMT" } ]
2015-07-24T00:00:00
[ [ "Gupta", "Rakhi Misuriya", "" ] ]
new_dataset
0.999364
1409.8104
Shixin Luo
Shixin Luo, Jie Xu, Teng Joon Lim, and Rui Zhang
Capacity Region of MISO Broadcast Channel for Simultaneous Wireless Information and Power Transfer
32 pages, 5 figures, submitted for possible journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a multiple-input single-output (MISO) broadcast channel (BC) featuring simultaneous wireless information and power transfer (SWIPT), where a multi-antenna access point (AP) delivers both information and energy via radio signals to multiple single-antenna receivers simultaneously, and each receiver implements either information decoding (ID) or energy harvesting (EH). In particular, pseudo-random sequences that are {\it a priori} known and therefore can be cancelled at each ID receiver is used as the energy signals, and the information-theoretically optimal dirty paper coding (DPC) is employed for the information transmission. We characterize the capacity region for ID receivers under given energy requirements for EH receivers, by solving a sequence of weighted sum-rate (WSR) maximization (WSRMax) problems subject to a maximum sum-power constraint for the AP, and a set of minimum harvested power constraints for individual EH receivers. The problem corresponds to a new form of WSRMax problem in MISO-BC with combined maximum and minimum linear transmit covariance constraints (MaxLTCCs and MinLTCCs), which differs from the celebrated capacity region characterization problem for MISO-BC under a set of MaxLTCCs only and is challenging to solve. By extending the general BC-multiple access channel (MAC) duality, which is only applicable to WSRMax problems with MaxLTCCs, and applying the ellipsoid method, we propose an efficient algorithm to solve this problem globally optimally. Furthermore, we also propose two suboptimal algorithms with lower complexity by assuming that the information and energy signals are designed separately. Finally, numerical results are provided to validate our proposed algorithms.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 12:49:47 GMT" }, { "version": "v2", "created": "Sun, 5 Oct 2014 02:24:22 GMT" }, { "version": "v3", "created": "Wed, 7 Jan 2015 08:44:56 GMT" }, { "version": "v4", "created": "Tue, 26 May 2015 05:40:08 GMT" }, { "version": "v5", "created": "Wed, 22 Jul 2015 09:18:03 GMT" } ]
2015-07-23T00:00:00
[ [ "Luo", "Shixin", "" ], [ "Xu", "Jie", "" ], [ "Lim", "Teng Joon", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.971752
1507.05964
Pavel Naumov
Pavel G. Naumov and Jia Tao
The Budget-Constrained Functional Dependency
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Armstrong's axioms of functional dependency form a well-known logical system that captures properties of functional dependencies between sets of database attributes. This article assumes that there are costs associated with attributes and proposes an extension of Armstrong's system for reasoning about budget-constrained functional dependencies in such a setting. The main technical result of this article is the completeness theorem for the proposed logical system. Although the proposed axioms are obtained by just adding cost subscript to the original Armstrong's axioms, the proof of the completeness for the proposed system is significantly more complicated than that for the Armstrong's system.
[ { "version": "v1", "created": "Tue, 21 Jul 2015 20:00:40 GMT" } ]
2015-07-23T00:00:00
[ [ "Naumov", "Pavel G.", "" ], [ "Tao", "Jia", "" ] ]
new_dataset
0.996859
1507.05717
Cong Yao
Baoguang Shi and Xiang Bai and Cong Yao
An End-to-End Trainable Neural Network for Image-based Sequence Recognition and Its Application to Scene Text Recognition
5 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image-based sequence recognition has been a long-standing research topic in computer vision. In this paper, we investigate the problem of scene text recognition, which is among the most important and challenging tasks in image-based sequence recognition. A novel neural network architecture, which integrates feature extraction, sequence modeling and transcription into a unified framework, is proposed. Compared with previous systems for scene text recognition, the proposed architecture possesses four distinctive properties: (1) It is end-to-end trainable, in contrast to most of the existing algorithms whose components are separately trained and tuned. (2) It naturally handles sequences in arbitrary lengths, involving no character segmentation or horizontal scale normalization. (3) It is not confined to any predefined lexicon and achieves remarkable performances in both lexicon-free and lexicon-based scene text recognition tasks. (4) It generates an effective yet much smaller model, which is more practical for real-world application scenarios. The experiments on standard benchmarks, including the IIIT-5K, Street View Text and ICDAR datasets, demonstrate the superiority of the proposed algorithm over the prior arts. Moreover, the proposed algorithm performs well in the task of image-based music score recognition, which evidently verifies the generality of it.
[ { "version": "v1", "created": "Tue, 21 Jul 2015 06:26:32 GMT" } ]
2015-07-22T00:00:00
[ [ "Shi", "Baoguang", "" ], [ "Bai", "Xiang", "" ], [ "Yao", "Cong", "" ] ]
new_dataset
0.998568
1507.05732
Shudi Yang
Shudi Yang and Zhang-An Yao and Chang-An Zhao
Complete Weight Enumerator of a Family of Linear Codes from Cyclotomy
13 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes have been an interesting topic in both theory and practice for many years. In this paper, for a prime $p$, we determine the explicit complete weight enumerators of a family of linear codes over $\mathbb{F}_p$ with defining set related to cyclotomy. These codes may have applications in cryptography and secret sharing schemes.
[ { "version": "v1", "created": "Tue, 21 Jul 2015 07:54:58 GMT" } ]
2015-07-22T00:00:00
[ [ "Yang", "Shudi", "" ], [ "Yao", "Zhang-An", "" ], [ "Zhao", "Chang-An", "" ] ]
new_dataset
0.999631
1501.00102
Natalia Neverova
Natalia Neverova and Christian Wolf and Graham W. Taylor and Florian Nebout
ModDrop: adaptive multi-modal gesture recognition
14 pages, 7 figures
null
null
null
cs.CV cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method for gesture detection and localisation based on multi-scale and multi-modal deep learning. Each visual modality captures spatial information at a particular spatial scale (such as motion of the upper body or a hand), and the whole system operates at three temporal scales. Key to our technique is a training strategy which exploits: i) careful initialization of individual modalities; and ii) gradual fusion involving random dropping of separate channels (dubbed ModDrop) for learning cross-modality correlations while preserving uniqueness of each modality-specific representation. We present experiments on the ChaLearn 2014 Looking at People Challenge gesture recognition track, in which we placed first out of 17 teams. Fusing multiple modalities at several spatial and temporal scales leads to a significant increase in recognition rates, allowing the model to compensate for errors of the individual classifiers as well as noise in the separate channels. Futhermore, the proposed ModDrop training technique ensures robustness of the classifier to missing signals in one or several channels to produce meaningful predictions from any number of available modalities. In addition, we demonstrate the applicability of the proposed fusion scheme to modalities of arbitrary nature by experiments on the same dataset augmented with audio.
[ { "version": "v1", "created": "Wed, 31 Dec 2014 09:55:43 GMT" }, { "version": "v2", "created": "Sat, 6 Jun 2015 14:46:33 GMT" } ]
2015-07-21T00:00:00
[ [ "Neverova", "Natalia", "" ], [ "Wolf", "Christian", "" ], [ "Taylor", "Graham W.", "" ], [ "Nebout", "Florian", "" ] ]
new_dataset
0.995386
1504.03824
Yawei Hu
Yawei Hu, Mingjun Xiao, Liusheng Huang, Ruhong Cheng and Hualin Mao
Nearly Optimal Probabilistic Coverage for Roadside Advertisement Dissemination in Urban VANETs
This paper has been withdrawn by the author due to a crucial error in the proof of theorem 2
null
null
null
cs.NI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advertisement disseminations based on Roadside Access Points (RAPs) in vehicular ad-hoc networks (VANETs) attract lots of attentions and have a promising prospect. In this paper, we focus on a roadside advertisement dissemination, including three basic elements: RAP Service Provider (RSP), mobile vehicles and shops. The RSP has deployed many RAPs at different locations in a city. A shop wants to rent some RAPs, which can disseminate advertisements to vehicles with some probabilites. Then, it tries to select the minimal number of RAPs to finish the advertisement dissemination, in order to save the expenses. Meanwhile, the selected RAPs need to ensure that each vehicle's probability of receiving advertisement successfully is not less than a threshold. We prove that this RAP selection problem is NP-hard. In order to solve this problem, we propose a greedy approximation algorithm, and give the corresponding approximation ratio. Further, we conduct extensive simulations on real world data sets to prove the good performance of this algorithm.
[ { "version": "v1", "created": "Wed, 15 Apr 2015 08:56:59 GMT" }, { "version": "v2", "created": "Mon, 20 Jul 2015 03:11:13 GMT" } ]
2015-07-21T00:00:00
[ [ "Hu", "Yawei", "" ], [ "Xiao", "Mingjun", "" ], [ "Huang", "Liusheng", "" ], [ "Cheng", "Ruhong", "" ], [ "Mao", "Hualin", "" ] ]
new_dataset
0.998573
1505.06326
Shudi Yang
Shudi Yang and Zheng-An Yao
Complete Weight Enumerators of Some Linear Codes
11 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes have been an interesting topic in both theory and practice for many years. In this paper, for an odd prime $p$, we determine the explicit complete weight enumerators of two classes of linear codes over $\mathbb{F}_p$ and they may have applications in cryptography and secret sharing schemes. Moreover, some examples are included to illustrate our results.
[ { "version": "v1", "created": "Sat, 23 May 2015 13:27:58 GMT" }, { "version": "v2", "created": "Sat, 18 Jul 2015 01:55:33 GMT" } ]
2015-07-21T00:00:00
[ [ "Yang", "Shudi", "" ], [ "Yao", "Zheng-An", "" ] ]
new_dataset
0.998808
1507.03274
Yeounoh Chung
Yeounoh Chung and Erfan Zamanian
Using RDMA for Lock Management
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we aim to evaluate different Distributed Lock Management service designs with Remote Direct Memory Access (RDMA). In specific, we implement and evaluate the centralized and the RDMA-enabled lock manager designs for fast network settings. Experimental results confirms a couple of hypotheses. First, in the traditional centralized lock manager design, CPU is the bottleneck and bypassing CPU on client-to-server communication using RDMA results in better lock service perofrmance. Second, different lock manager designs with RDMA in consideration result in even better performance; we need to re-design lock management system for RDMA and fast networks.
[ { "version": "v1", "created": "Sun, 12 Jul 2015 21:28:34 GMT" }, { "version": "v2", "created": "Mon, 20 Jul 2015 19:02:31 GMT" } ]
2015-07-21T00:00:00
[ [ "Chung", "Yeounoh", "" ], [ "Zamanian", "Erfan", "" ] ]
new_dataset
0.992424
1507.04614
Olaf Hartig
Olaf Hartig and Jorge P\'erez
LDQL: A Query Language for the Web of Linked Data (Extended Version)
39 pages, Extended version of a paper published in ISWC 2015
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Web of Linked Data is composed of tons of RDF documents interlinked to each other forming a huge repository of distributed semantic data. Effectively querying this distributed data source is an important open problem in the Semantic Web area. In this paper, we propose LDQL, a declarative language to query Linked Data on the Web. One of the novelties of LDQL is that it expresses separately (i) patterns that describe the expected query result, and (ii) Web navigation paths that select the data sources to be used for computing the result. We present a formal syntax and semantics, prove equivalence rules, and study the expressiveness of the language. In particular, we show that LDQL is strictly more expressive than the query formalisms that have been proposed previously for Linked Data on the Web. The high expressiveness allows LDQL to define queries for which a complete execution is not computationally feasible over the Web. We formally study this issue and provide a syntactic sufficient condition to avoid this problem; queries satisfying this condition are ensured to have a procedure to be effectively evaluated over the Web of Linked Data.
[ { "version": "v1", "created": "Thu, 16 Jul 2015 15:19:03 GMT" }, { "version": "v2", "created": "Sun, 19 Jul 2015 09:14:16 GMT" } ]
2015-07-21T00:00:00
[ [ "Hartig", "Olaf", "" ], [ "Pérez", "Jorge", "" ] ]
new_dataset
0.998313
1507.05215
Fan Du
Fan Du, Joshua Brul\'e, Peter Enns, Varun Manjunatha, Yoav Segev
MetroViz: Visual Analysis of Public Transportation Data
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding the quality and usage of public transportation resources is important for schedule optimization and resource allocation. Ridership and adherence are the two main dimensions for evaluating the quality of service. Using Automatic Vehicle Location (AVL), Automatic Passenger Count (APC), and Global Positioning System (GPS) data, ridership data and adherence data of public transportation can be collected. In this paper, we discuss the development of a visualization tool for exploring public transportation data. We introduce "map view" and "route view" to help users locate stops in the context of geography and route information. To visualize ridership and adherence information over several years, we introduce "calendar view" - a miniaturized calendar that provides an overview of data where users can interactively select specific days to explore individual trips and stops ("trip subview" and "stop subview"). MetroViz was evaluated via a series of usability tests that included researchers from the Center for Advanced Transportation Technology (CATT) and students from the University of Maryland - College Park in which test participants used the tool to explore three years of bus transit data from Blacksburg, Virginia.
[ { "version": "v1", "created": "Sat, 18 Jul 2015 18:38:42 GMT" } ]
2015-07-21T00:00:00
[ [ "Du", "Fan", "" ], [ "Brulé", "Joshua", "" ], [ "Enns", "Peter", "" ], [ "Manjunatha", "Varun", "" ], [ "Segev", "Yoav", "" ] ]
new_dataset
0.986738
1507.05243
Jayati Ghosh Dastidar
Jonathan Fidelis Paul, Dibyabiva Seth, Cijo Paul, Jayati Ghosh Dastidar
Hand Gesture Recognition Library
null
International Journal of Science and Applied Information Technology, Volume 3, No.2, March - April 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have presented a hand gesture recognition library. Various functions include detecting cluster count, cluster orientation, finger pointing direction, etc. To use these functions first the input image needs to be processed into a logical array for which a function has been developed. The library has been developed keeping flexibility in mind and thus provides application developers a wide range of options to develop custom gestures.
[ { "version": "v1", "created": "Sun, 19 Jul 2015 03:10:28 GMT" } ]
2015-07-21T00:00:00
[ [ "Paul", "Jonathan Fidelis", "" ], [ "Seth", "Dibyabiva", "" ], [ "Paul", "Cijo", "" ], [ "Dastidar", "Jayati Ghosh", "" ] ]
new_dataset
0.999232
1507.05245
Gautam Thakur
Gautam S. Thakur, Budhendra L. Bhaduri, Jesse O. Piburn, Kelly M. Sims, Robert N. Stewart, Marie L. Urban
PlanetSense: A Real-time Streaming and Spatio-temporal Analytics Platform for Gathering Geo-spatial Intelligence from Open Source Data
null
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geospatial intelligence has traditionally relied on the use of archived and unvarying data for planning and exploration purposes. In consequence, the tools and methods that are architected to provide insight and generate projections only rely on such datasets. Albeit, if this approach has proven effective in several cases, such as land use identification and route mapping, it has severely restricted the ability of researchers to inculcate current information in their work. This approach is inadequate in scenarios requiring real-time information to act and to adjust in ever changing dynamic environments, such as evacuation and rescue missions. In this work, we propose PlanetSense, a platform for geospatial intelligence that is built to harness the existing power of archived data and add to that, the dynamics of real-time streams, seamlessly integrated with sophisticated data mining algorithms and analytics tools for generating operational intelligence on the fly. The platform has four main components - i. GeoData Cloud - a data architecture for storing and managing disparate datasets; ii. Mechanism to harvest real-time streaming data; iii. Data analytics framework; iv. Presentation and visualization through web interface and RESTful services. Using two case studies, we underpin the necessity of our platform in modeling ambient population and building occupancy at scale.
[ { "version": "v1", "created": "Sun, 19 Jul 2015 03:19:03 GMT" } ]
2015-07-21T00:00:00
[ [ "Thakur", "Gautam S.", "" ], [ "Bhaduri", "Budhendra L.", "" ], [ "Piburn", "Jesse O.", "" ], [ "Sims", "Kelly M.", "" ], [ "Stewart", "Robert N.", "" ], [ "Urban", "Marie L.", "" ] ]
new_dataset
0.976393
1507.05408
Tobias Kuhn
Juan M. Banda and Tobias Kuhn and Nigam H. Shah and Michel Dumontier
Provenance-Centered Dataset of Drug-Drug Interactions
In Proceedings of the 14th International Semantic Web Conference (ISWC) 2015
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the years several studies have demonstrated the ability to identify potential drug-drug interactions via data mining from the literature (MEDLINE), electronic health records, public databases (Drugbank), etc. While each one of these approaches is properly statistically validated, they do not take into consideration the overlap between them as one of their decision making variables. In this paper we present LInked Drug-Drug Interactions (LIDDI), a public nanopublication-based RDF dataset with trusty URIs that encompasses some of the most cited prediction methods and sources to provide researchers a resource for leveraging the work of others into their prediction methods. As one of the main issues to overcome the usage of external resources is their mappings between drug names and identifiers used, we also provide the set of mappings we curated to be able to compare the multiple sources we aggregate in our dataset.
[ { "version": "v1", "created": "Mon, 20 Jul 2015 07:53:56 GMT" } ]
2015-07-21T00:00:00
[ [ "Banda", "Juan M.", "" ], [ "Kuhn", "Tobias", "" ], [ "Shah", "Nigam H.", "" ], [ "Dumontier", "Michel", "" ] ]
new_dataset
0.996227
1507.05472
Marco Netto
Kiran Mantripragada, Leonardo P. Tizzei, Alecio P. D. Binotto, Marco A. S. Netto
An SLA-based Advisor for Placement of HPC Jobs on Hybrid Clouds
16 pages, 7 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several scientific and industry applications require High Performance Computing (HPC) resources to process and/or simulate complex models. Not long ago, companies, research institutes, and universities used to acquire and maintain on-premise computer clusters; but, recently, cloud computing has emerged as an alternative for a subset of HPC applications. This poses a challenge to end-users, who have to decide where to run their jobs: on local clusters or burst to a remote cloud service provider. While current research on HPC cloud has focused on comparing performance of on-premise clusters against cloud resources, we build on top of existing efforts and introduce an advisory service to help users make this decision considering the trade-offs of resource costs, performance, and availability on hybrid clouds. We evaluated our service using a real test-bed with a seismic processing application based on Full Waveform Inversion; a technique used by geophysicists in the oil & gas industry and earthquake prediction. We also discuss how the advisor can be used for other applications and highlight the main lessons learned constructing this service to reduce costs and turnaround times.
[ { "version": "v1", "created": "Mon, 20 Jul 2015 12:41:32 GMT" } ]
2015-07-21T00:00:00
[ [ "Mantripragada", "Kiran", "" ], [ "Tizzei", "Leonardo P.", "" ], [ "Binotto", "Alecio P. D.", "" ], [ "Netto", "Marco A. S.", "" ] ]
new_dataset
0.989015
1406.5581
Anh Nguyen
Anh Nguyen, Amy Banic
3DTouch: A wearable 3D input device with an optical sensor and a 9-DOF inertial measurement unit
8 pages, 7 figures
null
null
null
cs.HC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present 3DTouch, a novel 3D wearable input device worn on the fingertip for 3D manipulation tasks. 3DTouch is designed to fill the missing gap of a 3D input device that is self-contained, mobile, and universally working across various 3D platforms. This paper presents a low-cost solution to designing and implementing such a device. Our approach relies on relative positioning technique using an optical laser sensor and a 9-DOF inertial measurement unit. 3DTouch is self-contained, and designed to universally work on various 3D platforms. The device employs touch input for the benefits of passive haptic feedback, and movement stability. On the other hand, with touch interaction, 3DTouch is conceptually less fatiguing to use over many hours than 3D spatial input devices. We propose a set of 3D interaction techniques including selection, translation, and rotation using 3DTouch. An evaluation also demonstrates the device's tracking accuracy of 1.10 mm and 2.33 degrees for subtle touch interaction in 3D space. Modular solutions like 3DTouch opens up a whole new design space for interaction techniques to further develop on.
[ { "version": "v1", "created": "Sat, 21 Jun 2014 06:32:35 GMT" }, { "version": "v2", "created": "Fri, 17 Jul 2015 07:17:44 GMT" } ]
2015-07-20T00:00:00
[ [ "Nguyen", "Anh", "" ], [ "Banic", "Amy", "" ] ]
new_dataset
0.999381
1507.03664
Jos\'e Mart\'in Castro-Manzano
Jos\'e Mart\'in Castro-Manzano, Ver\'onica Reyes-Meza, Jorge Medina-Delgadillo
{dasasap}, an App for Syllogisms
Proceedings of the Fourth International Conference on Tools for Teaching Logic (TTL2015), Rennes, France, June 9-12, 2015. Editors: M. Antonia Huertas, Jo\~ao Marcos, Mar\'ia Manzano, Sophie Pinchinat, Fran\c{c}ois Schwarzentruber
null
null
null
cs.CY cs.LO
http://creativecommons.org/licenses/by/4.0/
The main goal of this contribution is to introduce a cross-platform application to learn-teach syllogistic. We call this application \textit{dasasap} for \textit{develop all syllogisms as soon as possible}. To introduce this application we show the logical foundations for the game with a system we call $\mathcal{L}_\square$, and its interface developed with LiveCode.
[ { "version": "v1", "created": "Tue, 14 Jul 2015 00:47:59 GMT" }, { "version": "v2", "created": "Fri, 17 Jul 2015 01:22:52 GMT" } ]
2015-07-20T00:00:00
[ [ "Castro-Manzano", "José Martín", "" ], [ "Reyes-Meza", "Verónica", "" ], [ "Medina-Delgadillo", "Jorge", "" ] ]
new_dataset
0.999277
1507.04314
Imrul Kayes
Imrul Kayes, Nicolas Kourtellis, Daniele Quercia, Adriana Iamnitchi, Francesco Bonchi
The Social World of Content Abusers in Community Question Answering
Published in the proceedings of the 24th International World Wide Web Conference (WWW 2015)
null
10.1145/2736277.2741674
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community-based question answering platforms can be rich sources of information on a variety of specialized topics, from finance to cooking. The usefulness of such platforms depends heavily on user contributions (questions and answers), but also on respecting the community rules. As a crowd-sourced service, such platforms rely on their users for monitoring and flagging content that violates community rules. Common wisdom is to eliminate the users who receive many flags. Our analysis of a year of traces from a mature Q&A site shows that the number of flags does not tell the full story: on one hand, users with many flags may still contribute positively to the community. On the other hand, users who never get flagged are found to violate community rules and get their accounts suspended. This analysis, however, also shows that abusive users are betrayed by their network properties: we find strong evidence of homophilous behavior and use this finding to detect abusive users who go under the community radar. Based on our empirical observations, we build a classifier that is able to detect abusive users with an accuracy as high as 83%.
[ { "version": "v1", "created": "Wed, 15 Jul 2015 18:20:23 GMT" } ]
2015-07-19T00:00:00
[ [ "Kayes", "Imrul", "" ], [ "Kourtellis", "Nicolas", "" ], [ "Quercia", "Daniele", "" ], [ "Iamnitchi", "Adriana", "" ], [ "Bonchi", "Francesco", "" ] ]
new_dataset
0.989244
1406.0650
Fernando Hernando
Carlos Galindo, Fernando Hernando and Diego Ruano
New Quantum Codes from Evaluation and Matrix-Product Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stabilizer codes obtained via CSS code construction and Steane's enlargement of subfield-subcodes and matrix-product codes coming from generalized Reed-Muller, hyperbolic and affine variety codes are studied. Stabilizer codes with good quantum parameters are supplied, in particular, some binary codes of lengths 127 and 128 improve the parameters of the codes in http://www.codetables.de. Moreover, non-binary codes are presented either with parameters better than or equal to the quantum codes obtained from BCH codes by La Guardia or with lengths that can not be reached by them.
[ { "version": "v1", "created": "Tue, 3 Jun 2014 10:05:48 GMT" }, { "version": "v2", "created": "Fri, 6 Jun 2014 10:59:19 GMT" }, { "version": "v3", "created": "Thu, 16 Jul 2015 15:15:51 GMT" } ]
2015-07-17T00:00:00
[ [ "Galindo", "Carlos", "" ], [ "Hernando", "Fernando", "" ], [ "Ruano", "Diego", "" ] ]
new_dataset
0.988167
1503.08847
William Gasarch
Richard Beigel and William Gasarch
On the Sizes of DPDAs, PDAs, LBAs
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are languages A such that there is a Pushdown Automata (PDA) that recognizes A which is much smaller than any Deterministic Pushdown Automata (DPDA) that recognizes A. There are languages A such that there is a Linear Bounded Automata (Linear Space Turing Machine, henceforth LBA) that recognizes A which is much smaller than ny PDA that recognizes A. There are languages A such that both A and compliment(A) are recognizable by a PDA, but the PDA for A is much smaller than the PDA for compliment(A). There are languages A1, A2 such that A1,A2,A1 INTERSECT A_2 are recognizable by a PDA, but the PDA for A1 and A2 are much smaller than the PDA for A1 INTERSECT A2. We investigate these phenomenon and show that, in all these cases, the size difference is captured by a function whose Turing degree is on the second level of the arithmetic hierarchy. Our theorems lead to infinitely-often results. For example: for infinitely many $n$ there exists a language An recognized by a DPDA such that there is a small PDA for An, but any DPDA for An is large. We look at cases where we can get almost-all results, though with much smaller size differences.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 20:38:23 GMT" }, { "version": "v2", "created": "Fri, 10 Apr 2015 19:54:43 GMT" }, { "version": "v3", "created": "Thu, 16 Jul 2015 00:29:56 GMT" } ]
2015-07-17T00:00:00
[ [ "Beigel", "Richard", "" ], [ "Gasarch", "William", "" ] ]
new_dataset
0.999791
1507.04417
Bishnu Lamichhane
Bishnu P. Lamichhane
A quadrilateral 'mini' finite element for the Stokes problem using a single bubble function
11 pages, 2 figures
null
null
null
cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a quadrilateral 'mini' finite element for approximating the solution of Stokes equations using a quadrilateral mesh. We use the standard bilinear finite element space enriched with element-wise defined bubble functions for the velocity and the standard bilinear finite element space for the pressure space. With a simple modification of the standard bubble function we show that a single bubble function is sufficient to ensure the inf-sup condition. We have thus improved an earlier result on the quadrilateral 'mini' element, where more than one bubble function are used to get the stability.
[ { "version": "v1", "created": "Thu, 16 Jul 2015 00:16:02 GMT" } ]
2015-07-17T00:00:00
[ [ "Lamichhane", "Bishnu P.", "" ] ]
new_dataset
0.993869
1507.04578
David Aspinall
Bela Gor and David Aspinall
Accessible Banking: Experiences and Future Directions
3 pages, presented at Workshop on Inclusive Privacy and Security (WIPS): Privacy and Security for Everyone, Anytime, Anywhere, held as part of Symposium on Usable Privacy and Security (SOUPS) 2015, July 22-24, 2015, Ottawa, Canada
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a short position paper drawing on experience working with the UK banking industry and their disabled and ageing customers in the Business Disability Forum, a UK non-profit member organisation funded by a large body of UK private and public sector businesses. We describe some commonly reported problems of disabled customers who use modern banking technologies, relating them to UK law and best practice. We describe some of the recent banking industry innovations and the hope they may offer for improved inclusive and accessible multi-channel banking.
[ { "version": "v1", "created": "Thu, 16 Jul 2015 13:55:14 GMT" } ]
2015-07-17T00:00:00
[ [ "Gor", "Bela", "" ], [ "Aspinall", "David", "" ] ]
new_dataset
0.999141
0904.3741
David Eppstein
David Eppstein and Emma S. Spiro
The h-Index of a Graph and its Application to Dynamic Subgraph Statistics
To appear at Algorithms and Data Structures Symposium, Banff, Canada, August 2009. 18 pages, 4 figures. Includes six pages of appendices that will not be included in the conference proceedings version
J. Graph Algorithms & Applications 16(2): 543-567, 2012
10.7155/jgaa.00273
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a data structure that maintains the number of triangles in a dynamic undirected graph, subject to insertions and deletions of edges and of degree-zero vertices. More generally it can be used to maintain the number of copies of each possible three-vertex subgraph in time O(h) per update, where h is the h-index of the graph, the maximum number such that the graph contains $h$ vertices of degree at least h. We also show how to maintain the h-index itself, and a collection of h high-degree vertices in the graph, in constant time per update. Our data structure has applications in social network analysis using the exponential random graph model (ERGM); its bound of O(h) time per edge is never worse than the Theta(sqrt m) time per edge necessary to list all triangles in a static graph, and is strictly better for graphs obeying a power law degree distribution. In order to better understand the behavior of the h-index statistic and its implications for the performance of our algorithms, we also study the behavior of the h-index on a set of 136 real-world networks.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 18:37:36 GMT" } ]
2015-07-16T00:00:00
[ [ "Eppstein", "David", "" ], [ "Spiro", "Emma S.", "" ] ]
new_dataset
0.992281
1009.0045
David Eppstein
David Eppstein, Maarten L\"offler, Elena Mumford, Martin N\"ollenburg
Optimal 3D Angular Resolution for Low-Degree Graphs
18 pages, 10 figures. Extended version of paper to appear in Proc. 18th Int. Symp. Graph Drawing, Konstanz, Germany, 2010
J. Graph Algorithms & Applications 17(3): 173-200, 2013
10.7155/jgaa.00290
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that every graph of maximum degree three can be drawn in three dimensions with at most two bends per edge, and with 120-degree angles between any two edge segments meeting at a vertex or a bend. We show that every graph of maximum degree four can be drawn in three dimensions with at most three bends per edge, and with 109.5-degree angles, i.e., the angular resolution of the diamond lattice, between any two edge segments meeting at a vertex or bend.
[ { "version": "v1", "created": "Tue, 31 Aug 2010 22:50:32 GMT" } ]
2015-07-16T00:00:00
[ [ "Eppstein", "David", "" ], [ "Löffler", "Maarten", "" ], [ "Mumford", "Elena", "" ], [ "Nöllenburg", "Martin", "" ] ]
new_dataset
0.997051
1308.0403
Zhanpeng Cheng
Michael J. Bannister and Zhanpeng Cheng and William E. Devanny and David Eppstein
Superpatterns and Universal Point Sets
GD 2013 special issue of JGAA
J. Graph Algorithms & Applications 18(2): 177-209, 2014
10.7155/jgaa.00318
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An old open problem in graph drawing asks for the size of a universal point set, a set of points that can be used as vertices for straight-line drawings of all n-vertex planar graphs. We connect this problem to the theory of permutation patterns, where another open problem concerns the size of superpatterns, permutations that contain all patterns of a given size. We generalize superpatterns to classes of permutations determined by forbidden patterns, and we construct superpatterns of size n^2/4 + Theta(n) for the 213-avoiding permutations, half the size of known superpatterns for unconstrained permutations. We use our superpatterns to construct universal point sets of size n^2/4 - Theta(n), smaller than the previous bound by a 9/16 factor. We prove that every proper subclass of the 213-avoiding permutations has superpatterns of size O(n log^O(1) n), which we use to prove that the planar graphs of bounded pathwidth have near-linear universal point sets.
[ { "version": "v1", "created": "Fri, 2 Aug 2013 04:37:23 GMT" }, { "version": "v2", "created": "Thu, 3 Apr 2014 00:12:29 GMT" } ]
2015-07-16T00:00:00
[ [ "Bannister", "Michael J.", "" ], [ "Cheng", "Zhanpeng", "" ], [ "Devanny", "William E.", "" ], [ "Eppstein", "David", "" ] ]
new_dataset
0.9996
1410.5326
Linglong Dai
Shuangfeng Han, Chih-Lin I, Linglong Dai, Qi Sun, and Zhikun Xu
Full Duplex Networking: Mission Impossible?
This paper has been withdrawn by the author due to there are some errors in this paper
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile traffic is projected to increase 1000 times from 2010 to 2020. This poses significant challenges on the 5th generation (5G) wireless communication system design, including network structure, air interface, key transmission schemes, multiple access, and duplexing schemes. In this paper, full duplex networking issues are discussed, aiming to provide some insights on the design and possible future deployment for 5G. Particularly, the interference scenarios in full duplex are analyzed, followed by discussions on several candidate interference mitigation approaches, interference proof frame structures, transceiver structures for channel reciprocity recovery, and super full duplex base station where each sector operates in time division duplex (TDD) mode. The extension of TDD and frequency division duplex (FDD) to full duplex is also examined. It is anticipated that with future standardization and deployment of full duplex systems, TDD and FDD will be harmoniously integrated, supporting all the existing half duplex mobile phones efficiently, and leading to a substantially enhanced 5G system performance.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 15:49:58 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2015 10:01:04 GMT" } ]
2015-07-16T00:00:00
[ [ "Han", "Shuangfeng", "" ], [ "I", "Chih-Lin", "" ], [ "Dai", "Linglong", "" ], [ "Sun", "Qi", "" ], [ "Xu", "Zhikun", "" ] ]
new_dataset
0.99538
1507.04086
Vinit Kumar
Vinit Kumar and Ajay Agarwal
HT-Ring Paxos: Theory of High Throughput State-Machine Replication for Clustered Data Centers
18 pages. arXiv admin note: substantial text overlap with arXiv:1407.1237
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Implementations of state-machine replication (SMR) prevalently use the variants of Paxos. Some of the recent variants of Paxos like, Ring Paxos, Multi-Ring Paxos, S-Paxos and HT-Paxos achieve significantly high throughput. However, to meet the growing demand of high throughput, we are proposing HT-Ring Paxos, a variant of Paxos that is basically derived from the classical Paxos. Moreover, it also adopts some fundamental concepts of Ring Paxos, S-Paxos and HT-Paxos for increasing throughput. Furthermore, HT-Ring Paxos is best suitable for clustered data centers and achieves comparatively high throughput among all variants of Paxos. However, similar to Ring Paxos, latency of the HT-Ring Paxos is quite high as compared with other variants of Paxos.
[ { "version": "v1", "created": "Wed, 15 Jul 2015 05:17:50 GMT" } ]
2015-07-16T00:00:00
[ [ "Kumar", "Vinit", "" ], [ "Agarwal", "Ajay", "" ] ]
new_dataset
0.998621
1507.04180
S\"oren Auer
Ali Ismayilov and Dimitris Kontokostas and S\"oren Auer and Jens Lehmann and Sebastian Hellmann
Wikidata through the Eyes of DBpedia
8 pages
null
null
null
cs.DB
http://creativecommons.org/licenses/by/4.0/
DBpedia is one of the first and most prominent nodes of the Linked Open Data cloud. It provides structured data for more than 100 Wikipedia language editions as well as Wikimedia Commons, has a mature ontology and a stable and thorough Linked Data publishing lifecycle. Wikidata, on the other hand, has recently emerged as a user curated source for structured information which is included in Wikipedia. In this paper, we present how Wikidata is incorporated in the DBpedia ecosystem. Enriching DBpedia with structured information from Wikidata provides added value for a number of usage scenarios. We outline those scenarios and describe the structure and conversion process of the DBpediaWikidata dataset.
[ { "version": "v1", "created": "Wed, 15 Jul 2015 11:59:07 GMT" } ]
2015-07-16T00:00:00
[ [ "Ismayilov", "Ali", "" ], [ "Kontokostas", "Dimitris", "" ], [ "Auer", "Sören", "" ], [ "Lehmann", "Jens", "" ], [ "Hellmann", "Sebastian", "" ] ]
new_dataset
0.999286
1408.4002
Benjamin Eltzner
Benjamin Eltzner, Carina Wollnik, Carsten Gottschlich, Stephan Huckemann, Florian Rehfeldt
The Filament Sensor for Near Real-Time Detection of Cytoskeletal Fiber Structures
32 pages, 21 figures
PLoS ONE 10(5): e0126346, May 2015
10.1371/journal.pone.0126346
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A reliable extraction of filament data from microscopic images is of high interest in the analysis of acto-myosin structures as early morphological markers in mechanically guided differentiation of human mesenchymal stem cells and the understanding of the underlying fiber arrangement processes. In this paper, we propose the filament sensor (FS), a fast and robust processing sequence which detects and records location, orientation, length and width for each single filament of an image, and thus allows for the above described analysis. The extraction of these features has previously not been possible with existing methods. We evaluate the performance of the proposed FS in terms of accuracy and speed in comparison to three existing methods with respect to their limited output. Further, we provide a benchmark dataset of real cell images along with filaments manually marked by a human expert as well as simulated benchmark images. The FS clearly outperforms existing methods in terms of computational runtime and filament extraction accuracy. The implementation of the FS and the benchmark database are available as open source.
[ { "version": "v1", "created": "Mon, 18 Aug 2014 13:06:03 GMT" }, { "version": "v2", "created": "Sat, 11 Jul 2015 13:19:42 GMT" }, { "version": "v3", "created": "Tue, 14 Jul 2015 08:40:32 GMT" } ]
2015-07-15T00:00:00
[ [ "Eltzner", "Benjamin", "" ], [ "Wollnik", "Carina", "" ], [ "Gottschlich", "Carsten", "" ], [ "Huckemann", "Stephan", "" ], [ "Rehfeldt", "Florian", "" ] ]
new_dataset
0.998523
1507.03577
Jinseong Jeon
Jinseong Jeon and Xiaokang Qiu and Jeffrey S. Foster and Armando Solar-Lezama
JSKETCH: Sketching for Java
This research was supported in part by NSF CCF-1139021, CCF- 1139056, CCF-1161775, and the partnership between UMIACS and the Laboratory for Telecommunication Sciences
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sketch-based synthesis, epitomized by the SKETCH tool, lets developers synthesize software starting from a partial program, also called a sketch or template. This paper presents JSKETCH, a tool that brings sketch-based synthesis to Java. JSKETCH's input is a partial Java program that may include holes, which are unknown constants, expression generators, which range over sets of expressions, and class generators, which are partial classes. JSKETCH then translates the synthesis problem into a SKETCH problem; this translation is complex because SKETCH is not object-oriented. Finally, JSKETCH synthesizes an executable Java program by interpreting the output of SKETCH.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 05:02:53 GMT" } ]
2015-07-15T00:00:00
[ [ "Jeon", "Jinseong", "" ], [ "Qiu", "Xiaokang", "" ], [ "Foster", "Jeffrey S.", "" ], [ "Solar-Lezama", "Armando", "" ] ]
new_dataset
0.999243
1507.03675
Marek Materzok
Marek Materzok
Easyprove: a tool for teaching precise reasoning
Proceedings of the Fourth International Conference on Tools for Teaching Logic (TTL2015), Rennes, France, June 9-12, 2015. Editors: M. Antonia Huertas, Jo\~ao Marcos, Mar\'ia Manzano, Sophie Pinchinat, Fran\c{c}ois Schwarzentruber
null
null
null
cs.CY cs.LO
http://creativecommons.org/licenses/by/4.0/
Teaching precise mathematical reasoning can be very hard. It is very easy for a student to make a subtle mistake in a proof which invalidates it, but it is often hard for the teacher to pinpoint and explain the problem in the (often chaotically written) student's proof. We present Easyprove, an interactive proof assistant aimed at first year computer science students and high school students, intended as a supplementary tool for teaching logical reasoning. The system is a Web application with a natural, mouse-oriented user interface.
[ { "version": "v1", "created": "Tue, 14 Jul 2015 00:51:45 GMT" } ]
2015-07-15T00:00:00
[ [ "Materzok", "Marek", "" ] ]
new_dataset
0.950617
1507.03691
Fang Chen
Fang Chen, Bo Yang, Qiaoni Han, Cailian Chen and Xinping Guan
Dynamic Sleep Control in Green Relay-Assisted Networks for Energy Saving and QoS Improving
7 papers, 4 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the relay station (RS) sleep control mechanism targeting on reducing energy consumption while improving users' quality of service (QoS) in green relay-assisted cellular networks, where the base station (BS) is powered by grid power and the RSs are powered by renewable energy. By adopting green RSs, the grid power consumption of the BS is greatly reduced. But due to the uncertainty and stochastic characteristics of the renewable energy, power supply for RSs is not always sufficient. Thus the harvested energy needs to be scheduled appropriately to cater to the dynamic traffic so as to minimize the energy saving in the long term. An optimization problem is formulated to find the optimal sleep ratio of RSs to match the time variation of energy harvesting and traffic arrival. To fully use the renewable energy, green-RS-first principle is adopted in the user association process. The optimal RS sleeping policy is obtained through dynamic programming (DP) approach, which divides the original optimization problem into per-stage subproblems. A reduced DP algorithm and a greedy algorithm are further proposed to greatly reduce the computation complexity. By simulations, the reduced DP algorithm outperforms the greedy algorithm in achieving satisfactory energy saving and QoS performance.
[ { "version": "v1", "created": "Tue, 14 Jul 2015 01:19:00 GMT" } ]
2015-07-15T00:00:00
[ [ "Chen", "Fang", "" ], [ "Yang", "Bo", "" ], [ "Han", "Qiaoni", "" ], [ "Chen", "Cailian", "" ], [ "Guan", "Xinping", "" ] ]
new_dataset
0.99917
1507.03751
Manfred Harringer
Manfred Harringer
Closed Curves and Elementary Visual Object Identification
13 pages, 10 figures
null
null
null
cs.CV cs.LG q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For two closed curves on a plane (discrete version) and local criteria for similarity of points on the curves one gets a potential, which describes the similarity between curve points. This is the base for a global similarity measure of closed curves (Fr\'echet distance). I use borderlines of handwritten digits to demonstrate an area of application. I imagine, measuring the similarity of closed curves is an essential and elementary task performed by a visual system. This approach to similarity measures may be used by visual systems.
[ { "version": "v1", "created": "Tue, 14 Jul 2015 07:57:39 GMT" } ]
2015-07-15T00:00:00
[ [ "Harringer", "Manfred", "" ] ]
new_dataset
0.995756
1507.03969
Zhouyue Pi
Zhouyue Pi, Junil Choi, and Robert Heath Jr
Millimeter-wave Gbps Broadband Evolution towards 5G: Fixed Access and Backhaul
6 pages, 4 figures, 2 tables, submitted to IEEE Communications Magazine
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As wireless communication evolves towards 5G, both fixed broadband and mobile broadband will play a crucial part in providing the Gbps infrastructure for a connected society. This paper proposes a Millimeter-wave Gbps Broadband (MGB) system as the solution to two critical problems in this evolution: last-mile access for fixed broadband and small cell backhaul for mobile broadband. The key idea is to use spectrum that is already available in the millimeter wave bands for fixed wireless access with optimized dynamic beamforming and massive MIMO infrastructure to achieve high capacity with wide area coverage. This paper explains the MGB concept and describes potential array architectures for realizing the system. Simulations demonstrate that with 500 MHz of bandwidth (at 39 GHz band) and 28 dBm transmission power (55 dBm EIRP), it is possible to provide more than 11 Gbps backhaul capacity for 96 small cells within 1-km radius.
[ { "version": "v1", "created": "Tue, 14 Jul 2015 19:08:28 GMT" } ]
2015-07-15T00:00:00
[ [ "Pi", "Zhouyue", "" ], [ "Choi", "Junil", "" ], [ "Heath", "Robert", "Jr" ] ]
new_dataset
0.972588
1410.6648
Henning Schnoor
Juha Kontinen, Julian-Steffen M\"uller, Henning Schnoor, Heribert Vollmer
A Van Benthem Theorem for Modal Team Semantics
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The famous van Benthem theorem states that modal logic corresponds exactly to the fragment of first-order logic that is invariant under bisimulation. In this article we prove an exact analogue of this theorem in the framework of modal dependence logic MDL and team semantics. We show that modal team logic MTL, extending MDL by classical negation, captures exactly the FO-definable bisimulation invariant properties of Kripke structures and teams. We also compare the expressive power of MTL to most of the variants and extensions of MDL recently studied in the area.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 11:12:52 GMT" }, { "version": "v2", "created": "Mon, 13 Jul 2015 18:39:11 GMT" } ]
2015-07-14T00:00:00
[ [ "Kontinen", "Juha", "" ], [ "Müller", "Julian-Steffen", "" ], [ "Schnoor", "Henning", "" ], [ "Vollmer", "Heribert", "" ] ]
new_dataset
0.986352
1503.00697
Hossein Shokri Ghadikolaei
Hossein Shokri-Ghadikolaei, Carlo Fischione, Gabor Fodor, Petar Popovski, Michele Zorzi
Millimeter Wave Cellular Networks: A MAC Layer Perspective
21 pages, 9 figures, 2 tables, to appear in IEEE Transactions on Communications
null
10.1109/TCOMM.2015.2456093
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The millimeter wave (mmWave) frequency band is seen as a key enabler of multi-gigabit wireless access in future cellular networks. In order to overcome the propagation challenges, mmWave systems use a large number of antenna elements both at the base station and at the user equipment, which lead to high directivity gains, fully-directional communications, and possible noise-limited operations. The fundamental differences between mmWave networks and traditional ones challenge the classical design constraints, objectives, and available degrees of freedom. This paper addresses the implications that highly directional communication has on the design of an efficient medium access control (MAC) layer. The paper discusses key MAC layer issues, such as synchronization, random access, handover, channelization, interference management, scheduling, and association. The paper provides an integrated view on MAC layer issues for cellular networks, identifies new challenges and tradeoffs, and provides novel insights and solution approaches.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 20:28:59 GMT" }, { "version": "v2", "created": "Tue, 3 Mar 2015 02:16:41 GMT" }, { "version": "v3", "created": "Sat, 27 Jun 2015 06:31:59 GMT" }, { "version": "v4", "created": "Sun, 12 Jul 2015 08:26:25 GMT" } ]
2015-07-14T00:00:00
[ [ "Shokri-Ghadikolaei", "Hossein", "" ], [ "Fischione", "Carlo", "" ], [ "Fodor", "Gabor", "" ], [ "Popovski", "Petar", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.999694
1507.03037
Santanu Sarma
S.Sarma
SenseDroid: A Context-Aware Information Exchange Framework for Mobile Sensor Networks Using Android Phones
7 pages, 5 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile phones and smartphones have evolved to be very powerful devices that have the potential to be utilized in many application areas apart from generic communication. With each passing year, we see increasingly powerful smartphones being manufactured, which have a plethora of powerful embedded sensors like microphone, camera, digital compass, GPS, accelerometer, temperature sensors and many more. Moreover, the ability to easily program today's smartphones, enables us to exploit these sensors, in a wide variety of application such as personal safety, emergency and calamity response, situation awareness, remote activity monitoring, transportation and environment monitoring. In this paper, we survey the existing mobile phone sensing methodologies and application areas. We also formulate the architectural framework of our project, SenseDroid, its utility, limitations and possible future applications.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 22:09:54 GMT" } ]
2015-07-14T00:00:00
[ [ "Sarma", "S.", "" ] ]
new_dataset
0.99945
1507.03195
Clement Charpentier
Cl\'ement Charpentier (IF)
The Coloring Game on Planar Graphs with Large Girth, by a result on Sparse Cactuses
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We denote by $\chi$ g (G) the game chromatic number of a graph G, which is the smallest number of colors Alice needs to win the coloring game on G. We know from Montassier et al. [M. Montassier, P. Ossona de Mendez, A. Raspaud and X. Zhu, Decomposing a graph into forests, J. Graph Theory Ser. B, 102(1):38-52, 2012] and, independantly, from Wang and Zhang, [Y. Wang and Q. Zhang. Decomposing a planar graph with girth at least 8 into a forest and a matching, Discrete Maths, 311:844-849, 2011] that planar graphs with girth at least 8 have game chromatic number at most 5. One can ask if this bound of 5 can be improved for a sufficiently large girth. In this paper, we prove that it cannot. More than that, we prove that there are cactuses CT (i.e. graphs whose edges only belong to at most one cycle each) having $\chi$ g (CT) = 5 despite having arbitrary large girth, and even arbitrary large distance between its cycles.
[ { "version": "v1", "created": "Sun, 12 Jul 2015 07:14:19 GMT" } ]
2015-07-14T00:00:00
[ [ "Charpentier", "Clément", "", "IF" ] ]
new_dataset
0.997876
1507.03196
Zhangyang Wang
Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang
DeepFont: Identify Your Font from An Image
To Appear in ACM Multimedia as a full paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As font is one of the core design concepts, automatic font identification and similar font suggestion from an image or photo has been on the wish list of many designers. We study the Visual Font Recognition (VFR) problem, and advance the state-of-the-art remarkably by developing the DeepFont system. First of all, we build up the first available large-scale VFR dataset, named AdobeVFR, consisting of both labeled synthetic data and partially labeled real-world data. Next, to combat the domain mismatch between available training and testing data, we introduce a Convolutional Neural Network (CNN) decomposition approach, using a domain adaptation technique based on a Stacked Convolutional Auto-Encoder (SCAE) that exploits a large corpus of unlabeled real-world text images combined with synthetic data preprocessed in a specific way. Moreover, we study a novel learning-based model compression approach, in order to reduce the DeepFont model size without sacrificing its performance. The DeepFont system achieves an accuracy of higher than 80% (top-5) on our collected dataset, and also produces a good font similarity measure for font selection and suggestion. We also achieve around 6 times compression of the model without any visible loss of recognition accuracy.
[ { "version": "v1", "created": "Sun, 12 Jul 2015 07:25:14 GMT" } ]
2015-07-14T00:00:00
[ [ "Wang", "Zhangyang", "" ], [ "Yang", "Jianchao", "" ], [ "Jin", "Hailin", "" ], [ "Shechtman", "Eli", "" ], [ "Agarwala", "Aseem", "" ], [ "Brandt", "Jonathan", "" ], [ "Huang", "Thomas S.", "" ] ]
new_dataset
0.986532
1507.03215
Volker Diekert
Volker Diekert
More Than 1700 Years of Word Equations
The paper will appear as an invited address in the LNCS proceedings of CAI 2015, Stuttgart, Germany, September 1 - 4, 2015
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometry and Diophantine equations have been ever-present in mathematics. Diophantus of Alexandria was born in the 3rd century (as far as we know), but a systematic mathematical study of word equations began only in the 20th century. So, the title of the present article does not seem to be justified at all. However, a linear Diophantine equation can be viewed as a special case of a system of word equations over a unary alphabet, and, more importantly, a word equation can be viewed as a special case of a Diophantine equation. Hence, the problem WordEquations: "Is a given word equation solvable?" is intimately related to Hilbert's 10th problem on the solvability of Diophantine equations. This became clear to the Russian school of mathematics at the latest in the mid 1960s, after which a systematic study of that relation began. Here, we review some recent developments which led to an amazingly simple decision procedure for WordEquations, and to the description of the set of all solutions as an EDT0L language.
[ { "version": "v1", "created": "Sun, 12 Jul 2015 10:23:09 GMT" } ]
2015-07-14T00:00:00
[ [ "Diekert", "Volker", "" ] ]
new_dataset
0.995935
1507.03376
Akka Zemmari
Y. M\'etivier, J.M. Robson, and A. Zemmari
A Distributed Enumeration Algorithm and Applications to All Pairs Shortest Paths, Diameter
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the standard message passing model; we assume the system is fully synchronous: all processes start at the same time and time proceeds in synchronised rounds. In each round each vertex can transmit a different message of size $O(1)$ to each of its neighbours. This paper proposes and analyses a distributed enumeration algorithm of vertices of a graph having a distinguished vertex which satisfies that two vertices with consecutive numbers are at distance at most $3$. We prove that its time complexity is $O(n)$ where $n$ is the number of vertices of the graph. Furthermore, the size of each message is $O(1)$ thus its bit complexity is also $O(n).$ We provide some links between this enumeration and Hamiltonian graphs from which we deduce that this enumeration is optimal in the sense that there does not exist an enumeration which satisfies that two vertices with consecutive numbers are at distance at most $2$. We deduce from this enumeration algorithms which compute all pairs shortest paths and the diameter with a time complexity and a bit complexity equal to $O(n)$. This improves the best known distributed algorithms (under the same hypotheses) for computing all pairs shortest paths or the diameter presented in \cite{PRT12,HW12} having a time complexity equal to $O(n)$ and which use messages of size $O(\log n)$ bits.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 09:58:11 GMT" } ]
2015-07-14T00:00:00
[ [ "Métivier", "Y.", "" ], [ "Robson", "J. M.", "" ], [ "Zemmari", "A.", "" ] ]
new_dataset
0.991409
1507.03388
Saul Rodriguez
Saul Rodriguez, Stig Ollmar, Muhammad Waqar, Ana Rusu
A Batteryless Sensor ASIC for Implantable Bio-impedance Applications
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The measurement of the biological tissue's electrical impedance is an active research field that has attracted a lot of attention during the last decades. Bio-impedances are closely related to a large variety of physiological conditions; therefore, they are useful for diagnosis and monitoring in many medical applications. Measuring living tissues, however, is a challenging task that poses countless technical and practical problems, in particular if the tissues need to be measured under the skin. This paper presents a bio-impedance sensor ASIC targeting a battery-free, miniature size, implantable device, which performs accurate 4-point complex impedance extraction in the frequency range from 2 kHz to 2 MHz. The ASIC is fabricated in 150 nm CMOS, has a size of 1.22 mm x 1.22 mm and consumes 165 uA from a 1.8 V power supply. The ASIC is embedded in a prototype which communicates with, and is powered by an external reader device through inductive coupling. The prototype is validated by measuring the impedances of different combinations of discrete components, measuring the electrochemical impedance of physiological solution, and performing ex vivo measurements on animal organs. The proposed ASIC is able to extract complex impedances with around 1 Ohm resolution; therefore enabling accurate wireless tissue measurements.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 10:35:42 GMT" } ]
2015-07-14T00:00:00
[ [ "Rodriguez", "Saul", "" ], [ "Ollmar", "Stig", "" ], [ "Waqar", "Muhammad", "" ], [ "Rusu", "Ana", "" ] ]
new_dataset
0.999083
1507.03418
Chuangqiang Hu
Chuangqiang Hu
Explicit Construction of AG Codes from Generalized Hermitian Curves
13 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present multi-point algebraic geometric codes overstepping the Gilbert-Varshamov bound. The construction is based on the generalized Hermitian curve introduced by A. Bassa, P. Beelen, A. Garcia, and H. Stichtenoth. These codes are described in detail by constrcting a generator matrix. It turns out that these codes have nice properties similar to those of Hermitian codes. It is shown that the duals are also such codes and an explicit formula is given.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 12:24:02 GMT" } ]
2015-07-14T00:00:00
[ [ "Hu", "Chuangqiang", "" ] ]
new_dataset
0.986284
1507.03466
Bart Besselink
B. Besselink, V. Turri, S.H. van de Hoef, K.-Y. Liang, A. Alam, J. M{\aa}rtensson, K.H. Johansson
Cyber-physical Control of Road Freight Transport
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Freight transportation is of outmost importance for our society and is continuously increasing. At the same time, transporting goods on roads accounts for about 26% of all energy consumption and 18% of all greenhouse gas emissions in the European Union. Despite the influence the transportation system has on our energy consumption and the environment, road transportation is mainly done by individual long-haulage trucks with no real-time coordination or global optimization. In this paper, we review how modern information and communication technology supports a cyber-physical transportation system architecture with an integrated logistic system coordinating fleets of trucks traveling together in vehicle platoons. From the reduced air drag, platooning trucks traveling close together can save about 10% of their fuel consumption. Utilizing road grade information and vehicle-to-vehicle communication, a safe and fuel-optimized cooperative look-ahead control strategy is implemented on top of the existing cruise controller. By optimizing the interaction between vehicles and platoons of vehicles, it is shown that significant improvements can be achieved. An integrated transport planning and vehicle routing in the fleet management system allows both small and large fleet owners to benefit from the collaboration. A realistic case study with 200 heavy-duty vehicles performing transportation tasks in Sweden is described. Simulations show overall fuel savings at more than 5% thanks to coordinated platoon planning. It is also illustrated how well the proposed cooperative look-ahead controller for heavy-duty vehicle platoons manages to optimize the velocity profiles of the vehicles over a hilly segment of the considered road network.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 14:16:22 GMT" } ]
2015-07-14T00:00:00
[ [ "Besselink", "B.", "" ], [ "Turri", "V.", "" ], [ "van de Hoef", "S. H.", "" ], [ "Liang", "K. -Y.", "" ], [ "Alam", "A.", "" ], [ "Mårtensson", "J.", "" ], [ "Johansson", "K. H.", "" ] ]
new_dataset
0.999481
1507.03467
Umberto Ferraro Petrillo
Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware
This is the pre-peer reviewed version of the article: \emph{Using HTML5 to Prevent Detection of Drive-by-Download Web Malware}, which has been published in final form at \url{http://dx.doi.org/10.1002/sec.1077}. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving
Security and Communication Networks, Volume 8, Issue 7, pages 1237-1255, 10 May 2015
10.1002/sec.1077
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The web is experiencing an explosive growth in the last years. New technologies are introduced at a very fast-pace with the aim of narrowing the gap between web-based applications and traditional desktop applications. The results are web applications that look and feel almost like desktop applications while retaining the advantages of being originated from the web. However, these advancements come at a price. The same technologies used to build responsive, pleasant and fully-featured web applications, can also be used to write web malware able to escape detection systems. In this article we present new obfuscation techniques, based on some of the features of the upcoming HTML5 standard, which can be used to deceive malware detection systems. The proposed techniques have been experimented on a reference set of obfuscated malware. Our results show that the malware rewritten using our obfuscation techniques go undetected while being analyzed by a large number of detection systems. The same detection systems were able to correctly identify the same malware in its original unobfuscated form. We also provide some hints about how the existing malware detection systems can be modified in order to cope with these new techniques.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 14:19:52 GMT" } ]
2015-07-14T00:00:00
[ [ "De Santis", "Alfredo", "" ], [ "De Maio", "Giancarlo", "" ], [ "Petrillo", "Umberto Ferraro", "" ] ]
new_dataset
0.971808
1507.03474
Dominik Peters
Dominik Peters and Edith Elkind
Simple Causes of Complexity in Hedonic Games
7+9 pages, long version of a paper in IJCAI 2015
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hedonic games provide a natural model of coalition formation among self-interested agents. The associated problem of finding stable outcomes in such games has been extensively studied. In this paper, we identify simple conditions on expressivity of hedonic games that are sufficient for the problem of checking whether a given game admits a stable outcome to be computationally hard. Somewhat surprisingly, these conditions are very mild and intuitive. Our results apply to a wide range of stability concepts (core stability, individual stability, Nash stability, etc.) and to many known formalisms for hedonic games (additively separable games, games with W-preferences, fractional hedonic games, etc.), and unify and extend known results for these formalisms. They also have broader applicability: for several classes of hedonic games whose computational complexity has not been explored in prior work, we show that our framework immediately implies a number of hardness results for them.
[ { "version": "v1", "created": "Mon, 13 Jul 2015 14:36:17 GMT" } ]
2015-07-14T00:00:00
[ [ "Peters", "Dominik", "" ], [ "Elkind", "Edith", "" ] ]
new_dataset
0.994363
1506.07452
Wonmin Byeon
Marijn F. Stollenga, Wonmin Byeon, Marcus Liwicki, Juergen Schmidhuber
Parallel Multi-Dimensional LSTM, With Application to Fast Biomedical Volumetric Image Segmentation
Marijn F. Stollenga and Wonmin Byeon are the shared first authors, both authors contributed equally to this work
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional Neural Networks (CNNs) can be shifted across 2D images or 3D videos to segment them. They have a fixed input size and typically perceive only small local contexts of the pixels to be classified as foreground or background. In contrast, Multi-Dimensional Recurrent NNs (MD-RNNs) can perceive the entire spatio-temporal context of each pixel in a few sweeps through all pixels, especially when the RNN is a Long Short-Term Memory (LSTM). Despite these theoretical advantages, however, unlike CNNs, previous MD-LSTM variants were hard to parallelize on GPUs. Here we re-arrange the traditional cuboid order of computations in MD-LSTM in pyramidal fashion. The resulting PyraMiD-LSTM is easy to parallelize, especially for 3D data such as stacks of brain slice images. PyraMiD-LSTM achieved best known pixel-wise brain image segmentation results on MRBrainS13 (and competitive results on EM-ISBI12).
[ { "version": "v1", "created": "Wed, 24 Jun 2015 16:26:51 GMT" } ]
2015-07-13T00:00:00
[ [ "Stollenga", "Marijn F.", "" ], [ "Byeon", "Wonmin", "" ], [ "Liwicki", "Marcus", "" ], [ "Schmidhuber", "Juergen", "" ] ]
new_dataset
0.991357
1507.01147
Yan Wang
Yan Wang, Sunghyun Cho, Jue Wang and Shih-Fu Chang
PanoSwarm: Collaborative and Synchronized Multi-Device Panoramic Photography
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Taking a picture has been traditionally a one-persons task. In this paper we present a novel system that allows multiple mobile devices to work collaboratively in a synchronized fashion to capture a panorama of a highly dynamic scene, creating an entirely new photography experience that encourages social interactions and teamwork. Our system contains two components: a client app that runs on all participating devices, and a server program that monitors and communicates with each device. In a capturing session, the server collects in realtime the viewfinder images of all devices and stitches them on-the-fly to create a panorama preview, which is then streamed to all devices as visual guidance. The system also allows one camera to be the host and to send direct visual instructions to others to guide camera adjustment. When ready, all devices take pictures at the same time for panorama stitching. Our preliminary study suggests that the proposed system can help users capture high quality panoramas with an enjoyable teamwork experience. A demo video of the system in action is provided at http://youtu.be/PwQ6k_ZEQSs.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 21:31:54 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2015 03:08:24 GMT" }, { "version": "v3", "created": "Fri, 10 Jul 2015 13:28:08 GMT" } ]
2015-07-13T00:00:00
[ [ "Wang", "Yan", "" ], [ "Cho", "Sunghyun", "" ], [ "Wang", "Jue", "" ], [ "Chang", "Shih-Fu", "" ] ]
new_dataset
0.999773
1507.02770
Jaderick Pabico
Jaderick P. Pabico and Jose Rene L. Micor
Ang Social Network sa Facebook ng mga Taga-Batangas at ng mga Taga-Laguna: Isang Paghahambing
16 pages, 8 figures; The text is written in Filipino language with Abstract translated to English. The title in English is "The Social Network of Batangas and Laguna Facebook Users: A Comparison." Presented in First Sotero H. Laurel Social Science Conference, Lyceum of the Philippines University-Batangas, Batangas City, Philippines, 24 September 2013
Asia Pacific Journal of Multidisciplinary Research 1(1):138-150
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Online social networking (OSN) has become of great influence to Filipinos, where Facebook, Twitter, LinkedIn, Google+, and Instagram are among the popular ones. Their popularity, coupled with their intuitive and interactive use, allow one's personal information such as gender, age, address, relationship status, and list of friends to become publicly available. The accessibility of information from these sites allow, with the aid of computers, for the study of a wide population's characteristics even in a provincial scale. Aside from being neighbouring locales, the respective residents of Laguna and Batangas both derive their livelihoods from two lakes, Laguna de Bay and Taal Lake. Both residents experience similar problems, such as that, among many others, of fish kill. The goal of this research is to find out similarities in their respective online populations, particularly that of Facebook's. With the use of computational dynamic social network analysis (CDSNA), we found out that the two communities are similar, among others, as follows: o Both populations are dominated by single young female o Homophily was observed when choosing a friend in terms of age (i.e., friendships were created more often between people whose ages do not differ by at most five years); and o Heterophily was observed when choosing friends in terms of gender (i.e., more friendships were created between a male and a female than between both people of the same gender). This paper also presents the differences in the structure of the two social networks, such as degrees of separation and preferential attachment.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 02:58:04 GMT" } ]
2015-07-13T00:00:00
[ [ "Pabico", "Jaderick P.", "" ], [ "Micor", "Jose Rene L.", "" ] ]
new_dataset
0.998888
1507.02800
Shuo Jin
Chuhua Xian, Shuo Jin, Charlie C.L. Wang
Meshfree C^2-Weighting for Shape Deformation
10 pages, 14 figures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Handle-driven deformation based on linear blending is widely used in many applications because of its merits in intuitiveness, efficiency and easiness of implementation. We provide a meshfree method to compute the smooth weights of linear blending for shape deformation. The C2-continuity of weighting is guaranteed by the carefully formulated basis functions, with which the computation of weights is in a closed-form. Criteria to ensure the quality of deformation are preserved by the basis functions after decomposing the shape domain according to the Voronoi diagram of handles. The cost of inserting a new handle is only the time to evaluate the distances from the new handle to all sample points in the space of deformation. Moreover, a virtual handle insertion algorithm has been developed to allow users freely placing handles while preserving the criteria on weights. Experimental examples for real-time 2D/3D deformations are shown to demonstrate the effectiveness of this method.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 08:12:22 GMT" } ]
2015-07-13T00:00:00
[ [ "Xian", "Chuhua", "" ], [ "Jin", "Shuo", "" ], [ "Wang", "Charlie C. L.", "" ] ]
new_dataset
0.993031
1507.02835
Chetan Singh Thakur
Chetan Singh Thakur, Runchun Wang, Tara Julia Hamilton, Jonathan Tapson and Andre van Schaik
A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch
Submitted to TCAS-I
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/4.0/
Random device mismatch that arises as a result of scaling of the CMOS (complementary metal-oxide semi-conductor) technology into the deep submicron regime degrades the accuracy of analogue circuits. Methods to combat this increase the complexity of design. We have developed a novel neuromorphic system called a Trainable Analogue Block (TAB), which exploits device mismatch as a means for random projections of the input to a higher dimensional space. The TAB framework is inspired by the principles of neural population coding operating in the biological nervous system. Three neuronal layers, namely input, hidden, and output, constitute the TAB framework, with the number of hidden layer neurons far exceeding the input layer neurons. Here, we present measurement results of the first prototype TAB chip built using a 65nm process technology and show its learning capability for various regression tasks. Our TAB chip exploits inherent randomness and variability arising due to the fabrication process to perform various learning tasks. Additionally, we characterise each neuron and discuss the statistical variability of its tuning curve that arises due to random device mismatch, a desirable property for the learning capability of the TAB. We also discuss the effect of the number of hidden neurons and the resolution of output weights on the accuracy of the learning capability of the TAB.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 10:29:01 GMT" } ]
2015-07-13T00:00:00
[ [ "Thakur", "Chetan Singh", "" ], [ "Wang", "Runchun", "" ], [ "Hamilton", "Tara Julia", "" ], [ "Tapson", "Jonathan", "" ], [ "van Schaik", "Andre", "" ] ]
new_dataset
0.996862
1507.02992
Hans-Joachim Hof
Christoph Pohl, Hans-Joachim Hof
Secure Scrum: Development of Secure Software with Scrum
The Ninth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2015, Venice, Italy, 2015
null
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects. In traditional software projects, security issues require detailed planning in an initial planning phase, typically resulting in a detailed security analysis (e.g., threat and risk analysis), a security architecture, and instructions for security implementation (e.g., specification of key sizes and cryptographic algorithms to use). Agile software development methods like Scrum are known for reducing the initial planning phases (e.g., sprint 0 in Scrum) and for focusing more on producing running code. Scrum is also known for allowing fast adaption of the emerging software to changes of customer wishes. For security, this means that it is likely that there are no detailed security architecture or security implementation instructions from the start of the project. It also means that a lot of design decisions will be made during the runtime of the project. Hence, to address security in Scrum, it is necessary to consider security issues throughout the whole software development process. Secure Scrum is a variation of the Scrum framework with special focus on the development of secure software throughout the whole software development process. It puts emphasis on implementation of security related issues without the need of changing the underlying Scrum process or influencing team dynamics. Secure Scrum allows even non- security experts to spot security issues, to implement security features, and to verify implementations. A field test of Secure Scrum shows that the security level of software developed using Secure Scrum is higher then the security level of software developed using standard Scrum.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 19:16:27 GMT" } ]
2015-07-13T00:00:00
[ [ "Pohl", "Christoph", "" ], [ "Hof", "Hans-Joachim", "" ] ]
new_dataset
0.959643
1506.00394
Marcus Paradies
Marcus Paradies and Michael Rudolf and Wolfgang Lehner
GraphVista: Interactive Exploration Of Large Graphs
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The potential to gain business insights from graph-structured data through graph analytics is increasingly attracting companies from a variety of industries, ranging from web companies to traditional enterprise businesses. To analyze a graph, a user often executes isolated graph queries using a dedicated interface---a procedural graph programming interface or a declarative graph query language. The results are then returned and displayed using a specific visualization technique. This follows the classical ad-hoc Query$\rightarrow$Result interaction paradigm and often requires multiple query iterations until an interesting aspect in the graph data is identified. This is caused on the one hand by the schema flexibility of graph data and on the other hand by the intricacies of declarative graph query languages. To lower the burden for the user to explore an unknown graph without prior knowledge of a graph query language, visual graph exploration provides an effective and intuitive query interface to navigate through the graph interactively. We demonstrate GRAPHVISTA, a graph visualization and exploration tool that can seamlessly combine ad-hoc querying and interactive graph exploration within the same query session. In our demonstration, conference attendees will see GRAPHVISTA running against a large real-world graph data set. They will start by identifying entry points of interest with the help of ad-hoc queries and will then discover the graph interactively through visual graph exploration.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 08:55:26 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2015 07:27:53 GMT" } ]
2015-07-10T00:00:00
[ [ "Paradies", "Marcus", "" ], [ "Rudolf", "Michael", "" ], [ "Lehner", "Wolfgang", "" ] ]
new_dataset
0.995942
1506.05079
Przemys{\l}aw Uzna\'nski
Przemys{\l}aw Uzna\'nski
All Permutations Supersequence is coNP-complete
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that deciding whether a given input word contains as subsequence every possible permutation of integers $\{1,2,\ldots,n\}$ is coNP-complete. The coNP-completeness holds even when given the guarantee that the input word contains as subsequences all of length $n-1$ sequences over the same set of integers. We also show NP-completeness of a related problem of Partially Non-crossing Perfect Matching in Bipartite Graphs, i.e. to find a perfect matching in an ordered bipartite graph where edges of the matching incident to selected vertices (even only from one side) are non-crossing.
[ { "version": "v1", "created": "Tue, 16 Jun 2015 19:12:08 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2015 02:49:35 GMT" } ]
2015-07-10T00:00:00
[ [ "Uznański", "Przemysław", "" ] ]
new_dataset
0.992522
1506.08409
Erik Demaine
Erik D. Demaine and Stefan Langerman
Bust-a-Move/Puzzle Bobble is NP-Complete
9 pages, 9 figures. Corrected mistakes in gadgets
null
null
null
cs.CC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the classic 1994 Taito video game, known as Puzzle Bobble or Bust-a-Move, is NP-complete. Our proof applies to the perfect-information version where the bubble sequence is known in advance, and it uses just three bubble colors.
[ { "version": "v1", "created": "Sun, 28 Jun 2015 14:51:37 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2015 19:23:16 GMT" } ]
2015-07-10T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Langerman", "Stefan", "" ] ]
new_dataset
0.99682
1507.01148
Yan Wang
Yan Wang, Jue Wang and Shih-Fu Chang
CamSwarm: Instantaneous Smartphone Camera Arrays for Collaborative Photography
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Camera arrays (CamArrays) are widely used in commercial filming projects for achieving special visual effects such as bullet time effect, but are very expensive to set up. We propose CamSwarm, a low-cost and lightweight alternative to professional CamArrays for consumer applications. It allows the construction of a collaborative photography platform from multiple mobile devices anywhere and anytime, enabling new capturing and editing experiences that a single camera cannot provide. Our system allows easy team formation; uses real-time visualization and feedback to guide camera positioning; provides a mechanism for synchronized capturing; and finally allows the user to efficiently browse and edit the captured imagery. Our user study suggests that CamSwarm is easy to use; the provided real-time guidance is helpful; and the full system achieves high quality results promising for non-professional use. A demo video is provided at https://www.youtube.com/watch?v=LgkHcvcyTTM.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 21:46:37 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2015 01:13:21 GMT" } ]
2015-07-10T00:00:00
[ [ "Wang", "Yan", "" ], [ "Wang", "Jue", "" ], [ "Chang", "Shih-Fu", "" ] ]
new_dataset
0.999311
1507.02373
Travis Deyle
Jennifer Wang, Erik Schluntz, Brian Otis, and Travis Deyle
A New Vision for Smart Objects and the Internet of Things: Mobile Robots and Long-Range UHF RFID Sensor Tags
8 pages
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new vision for smart objects and the Internet of Things wherein mobile robots interact with wirelessly-powered, long-range, ultra-high frequency radio frequency identification (UHF RFID) tags outfitted with sensing capabilities. We explore the technology innovations driving this vision by examining recently-commercialized sensor tags that could be affixed-to or embedded-in objects or the environment to yield true embodied intelligence. Using a pair of autonomous mobile robots outfitted with UHF RFID readers, we explore several potential applications where mobile robots interact with sensor tags to perform tasks such as: soil moisture sensing, remote crop monitoring, infrastructure monitoring, water quality monitoring, and remote sensor deployment.
[ { "version": "v1", "created": "Thu, 9 Jul 2015 04:48:10 GMT" } ]
2015-07-10T00:00:00
[ [ "Wang", "Jennifer", "" ], [ "Schluntz", "Erik", "" ], [ "Otis", "Brian", "" ], [ "Deyle", "Travis", "" ] ]
new_dataset
0.999343
1507.02438
Tae Hyun Kim
Tae Hyun Kim and Kyoung Mu Lee
Generalized Video Deblurring for Dynamic Scenes
CVPR 2015 oral
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several state-of-the-art video deblurring methods are based on a strong assumption that the captured scenes are static. These methods fail to deblur blurry videos in dynamic scenes. We propose a video deblurring method to deal with general blurs inherent in dynamic scenes, contrary to other methods. To handle locally varying and general blurs caused by various sources, such as camera shake, moving objects, and depth variation in a scene, we approximate pixel-wise kernel with bidirectional optical flows. Therefore, we propose a single energy model that simultaneously estimates optical flows and latent frames to solve our deblurring problem. We also provide a framework and efficient solvers to optimize the energy model. By minimizing the proposed energy function, we achieve significant improvements in removing blurs and estimating accurate optical flows in blurry frames. Extensive experimental results demonstrate the superiority of the proposed method in real and challenging videos that state-of-the-art methods fail in either deblurring or optical flow estimation.
[ { "version": "v1", "created": "Thu, 9 Jul 2015 09:59:40 GMT" } ]
2015-07-10T00:00:00
[ [ "Kim", "Tae Hyun", "" ], [ "Lee", "Kyoung Mu", "" ] ]
new_dataset
0.971903
1507.02463
Tapas Kumar Mishra
Tapas Kumar Mishra and Sudebkumar Prasant Pal
An extremal problem in proper $(r,p)$-coloring of hypergraphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G(V,E)$ be a $k$-uniform hypergraph. A hyperedge $e \in E$ is said to be properly $(r,p)$ colored by an $r$-coloring of vertices in $V$ if $e$ contains vertices of at least $p$ distinct colors in the $r$-coloring. An $r$-coloring of vertices in $V$ is called a {\it strong $(r,p)$ coloring} if every hyperedge $e \in E$ is properly $(r,p)$ colored by the $r$-coloring. We study the maximum number of hyperedges that can be properly $(r,p)$ colored by a single $r$-coloring and the structures that maximizes number of properly $(r,p)$ colored hyperedges.
[ { "version": "v1", "created": "Thu, 9 Jul 2015 11:25:23 GMT" } ]
2015-07-10T00:00:00
[ [ "Mishra", "Tapas Kumar", "" ], [ "Pal", "Sudebkumar Prasant", "" ] ]
new_dataset
0.991011
1507.01894
Katherine Leonard
Oleg Iliev, Zahra Lakdawala, Katherine Leonard, Yavor Vutov
On pore-scale modeling and simulation of reactive transport in 3D geometries
15 pages, 6 figures
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pore-scale modeling and simulation of reactive flow in porous media has a range of diverse applications, and poses a number of research challenges. It is known that the morphology of a porous medium has significant influence on the local flow rate, which can have a substantial impact on the rate of chemical reactions. While there are a large number of papers and software tools dedicated to simulating either fluid flow in 3D computerized tomography (CT) images or reactive flow using pore-network models, little attention to date has been focused on the pore-scale simulation of sorptive transport in 3D CT images, which is the specific focus of this paper. Here we first present an algorithm for the simulation of such reactive flows directly on images, which is implemented in a sophisticated software package. We then use this software to present numerical results in two resolved geometries, illustrating the importance of pore-scale simulation and the flexibility of our software package.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 17:38:44 GMT" }, { "version": "v2", "created": "Wed, 8 Jul 2015 12:17:16 GMT" } ]
2015-07-09T00:00:00
[ [ "Iliev", "Oleg", "" ], [ "Lakdawala", "Zahra", "" ], [ "Leonard", "Katherine", "" ], [ "Vutov", "Yavor", "" ] ]
new_dataset
0.989538
1507.02020
Thierry Poibeau
Thierry Poibeau (LaTTICe), Pablo Ruiz (LaTTICe)
Generating Navigable Semantic Maps from Social Sciences Corpora
in Digital Humanities 2015, Jun 2015, Sydney, Australia. Actes de la Conf{\'e}rence Digital Humanities 2015. arXiv admin note: text overlap with arXiv:1406.4211
null
null
null
cs.CL cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is now commonplace to observe that we are facing a deluge of online information. Researchers have of course long acknowledged the potential value of this information since digital traces make it possible to directly observe, describe and analyze social facts, and above all the co-evolution of ideas and communities over time. However, most online information is expressed through text, which means it is not directly usable by machines, since computers require structured, organized and typed information in order to be able to manipulate it. Our goal is thus twofold: 1. Provide new natural language processing techniques aiming at automatically extracting relevant information from texts, especially in the context of social sciences, and connect these pieces of information so as to obtain relevant socio-semantic networks; 2. Provide new ways of exploring these socio-semantic networks, thanks to tools allowing one to dynamically navigate these networks, de-construct and re-construct them interactively, from different points of view following the needs expressed by domain experts.
[ { "version": "v1", "created": "Wed, 8 Jul 2015 04:27:48 GMT" } ]
2015-07-09T00:00:00
[ [ "Poibeau", "Thierry", "", "LaTTICe" ], [ "Ruiz", "Pablo", "", "LaTTICe" ] ]
new_dataset
0.968984
1507.02043
Patrick Zwickl
Patrick Zwickl, Ivan Gojmerac, Paul Fuxjaeger, Peter Reichl and Oliver Holland
The Society Spectrum: Self-Regulation of Cellular Network Markets
6 pages, 3 figures, conference format
null
null
null
cs.NI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's cellular telecommunications markets require continuous monitoring and intervention by regulators in order to balance the interests of various stakeholders. In order to reduce the extent of regulatory involvements in the day-to-day business of cellular operators, the present paper proposes a "self-regulating" spectrum market regime named "society spectrum". This regime provides a market-inherent and automatic self-balancing of stakeholder powers, which at the same time provides a series of coordination and fairness assurance functions that clearly distinguish it from "spectrum as a commons" solutions. The present paper will introduce the fundamental regulatory design and will elaborate on mechanisms to assure fairness among stakeholders and individuals. This work further puts the society spectrum into the context of contemporary radio access technologies and cognitive radio approaches.
[ { "version": "v1", "created": "Wed, 8 Jul 2015 06:47:11 GMT" } ]
2015-07-09T00:00:00
[ [ "Zwickl", "Patrick", "" ], [ "Gojmerac", "Ivan", "" ], [ "Fuxjaeger", "Paul", "" ], [ "Reichl", "Peter", "" ], [ "Holland", "Oliver", "" ] ]
new_dataset
0.998654
1507.01613
Boris Brimkov
Boris Brimkov
A note on the clique number of complete $k$-partite graphs
6 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we show that a complete $k$-partite graph is the only graph with clique number $k$ among all degree-equivalent simple graphs. This result gives a lower bound on the clique number, which is sharper than existing bounds on a large family of graphs.
[ { "version": "v1", "created": "Mon, 6 Jul 2015 20:13:00 GMT" } ]
2015-07-08T00:00:00
[ [ "Brimkov", "Boris", "" ] ]
new_dataset
0.991696
1507.01656
Steve Versteeg
Steve Versteeg
Languages for Mobile Agents
Honours Thesis. Department of Computer Science and Sofware Engineering, University of Melbourne. 1997
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile agents represent a new model for network computing. Many different languages have been used to implement mobile agents. The characteristics that make a language useful for writing mobile agents are: (1) their support of agent migration, (2) their support for agent-to-agent communication, (3) how they allow agents to interact with local resources, (4) security mechanisms, (5) execution efficiency, (6) language implementation across multiple platforms, and (7) the language's ease of programming of the tasks mobile agents perform.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 01:47:31 GMT" } ]
2015-07-08T00:00:00
[ [ "Versteeg", "Steve", "" ] ]
new_dataset
0.998858
1507.01699
Yong Zeng
Yong Zeng and Rui Zhang
Millimeter Wave MIMO with Lens Antenna Array: A New Path Division Multiplexing Paradigm
submitted for possible journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave (mmWave) communication is a promising technology for 5G cellular systems. To compensate for the severe path loss in mmWave systems, large antenna arrays are generally used to achieve significant beamforming gains. However, due to the high hardware and power consumption cost associated with radio frequency (RF) chains, it is desirable to achieve the large-antenna gains, but with only limited number of RF chains for mmWave communications. To this end, we study in this paper a new lens antenna array enabled mmWave MIMO communication system. We first show that the array response of the proposed lens antenna array at the receiver/transmitter follows a "sinc" function, where the antenna with the peak response is determined by the angle of arrival (AoA)/departure (AoD) of the received/transmitted signal. By exploiting this unique property of lens antenna arrays along with the multi-path sparsity of mmWave channels, we propose a novel low-cost and capacity-achieving MIMO transmission scheme, termed \emph{orthogonal path division multiplexing (OPDM)}. For channels with insufficiently separated AoAs and/or AoDs, we also propose a simple \emph{path grouping} technique with group-based small-scale MIMO processing to mitigate the inter-path interference. Numerical results are provided to compare the performance of the proposed lens antenna arrays for mmWave MIMO system against that of conventional arrays, under different practical setups. It is shown that the proposed system achieves significant throughput gain as well as complexity and hardware cost reduction, both making it an appealing new paradigm for mmWave MIMO communications.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 08:12:42 GMT" } ]
2015-07-08T00:00:00
[ [ "Zeng", "Yong", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.99959
1507.01708
Carlo Sartiani
Dario Colazzo, Carlo Sartiani
Typing Regular Path Query Languages for Data Graphs
null
null
null
null
cs.DB cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regular path query languages for data graphs are essentially \emph{untyped}. The lack of type information greatly limits the optimization opportunities for query engines and makes application development more complex. In this paper we discuss a simple, yet expressive, schema language for edge-labelled data graphs. This schema language is, then, used to define a query type inference approach with good precision properties.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 08:43:59 GMT" } ]
2015-07-08T00:00:00
[ [ "Colazzo", "Dario", "" ], [ "Sartiani", "Carlo", "" ] ]
new_dataset
0.993819
1507.01777
Suman Sau
Swagata Mandal, Suman Sau, Amlan Chakrabarti, Jogendra Saini, Sushanta Kumar Pal and Subhasish Chattopadhyay
FPGA based Novel High Speed DAQ System Design with Error Correction
ISVLSI 2015. arXiv admin note: substantial text overlap with arXiv:1505.04569, arXiv:1503.08819
null
null
01A
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Present state of the art applications in the area of high energy physics experiments (HEP), radar communication, satellite communication and bio medical instrumentation require fault resilient data acquisition (DAQ) system with the data rate in the order of Gbps. In order to keep the high speed DAQ system functional in such radiation environment where direct intervention of human is not possible, a robust and error free communication system is necessary. In this work we present an efficient DAQ design and its implementation on field programmable gate array (FPGA). The proposed DAQ system supports high speed data communication (~4.8 Gbps) and achieves multi-bit error correction capabilities. BCH code (named after Raj Bose and D. K. RayChaudhuri) has been used for multi-bit error correction. The design has been implemented on Xilinx Kintex-7 board and is tested for board to board communication as well as for board to PC using PCIe (Peripheral Component Interconnect express) interface. To the best of our knowledge, the proposed FPGA based high speed DAQ system utilizing optical link and multi-bit error resiliency can be considered first of its kind. Performance estimation of the implemented DAQ system is done based on resource utilization, critical path delay, efficiency and bit error rate (BER).
[ { "version": "v1", "created": "Tue, 7 Jul 2015 12:24:25 GMT" } ]
2015-07-08T00:00:00
[ [ "Mandal", "Swagata", "" ], [ "Sau", "Suman", "" ], [ "Chakrabarti", "Amlan", "" ], [ "Saini", "Jogendra", "" ], [ "Pal", "Sushanta Kumar", "" ], [ "Chattopadhyay", "Subhasish", "" ] ]
new_dataset
0.998554
1507.01934
Hisao Tamaki
Kenta Kitsunai, Yasuaki Kobayashi, and Hisao Tamaki
On the pathwidth of almost semicomplete digraphs
33pages, a shorter version to appear in ESA 2015
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We call a digraph {\em $h$-semicomplete} if each vertex of the digraph has at most $h$ non-neighbors, where a non-neighbor of a vertex $v$ is a vertex $u \neq v$ such that there is no edge between $u$ and $v$ in either direction. This notion generalizes that of semicomplete digraphs which are $0$-semicomplete and tournaments which are semicomplete and have no anti-parallel pairs of edges. Our results in this paper are as follows. (1) We give an algorithm which, given an $h$-semicomplete digraph $G$ on $n$ vertices and a positive integer $k$, in $(h + 2k + 1)^{2k} n^{O(1)}$ time either constructs a path-decomposition of $G$ of width at most $k$ or concludes correctly that the pathwidth of $G$ is larger than $k$. (2) We show that there is a function $f(k, h)$ such that every $h$-semicomplete digraph of pathwidth at least $f(k, h)$ has a semicomplete subgraph of pathwidth at least $k$. One consequence of these results is that the problem of deciding if a fixed digraph $H$ is topologically contained in a given $h$-semicomplete digraph $G$ admits a polynomial-time algorithm for fixed $h$.
[ { "version": "v1", "created": "Tue, 7 Jul 2015 19:55:36 GMT" } ]
2015-07-08T00:00:00
[ [ "Kitsunai", "Kenta", "" ], [ "Kobayashi", "Yasuaki", "" ], [ "Tamaki", "Hisao", "" ] ]
new_dataset
0.997522
1409.0980
Vilem Vychodil
Vilem Vychodil
Monoidal functional dependencies
null
Journal of Computer and System Sciences 81(7) (2015) 1357-1372
10.1016/j.jcss.2015.03.006
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a complete logic for reasoning with functional dependencies (FDs) with semantics defined over classes of commutative integral partially ordered monoids and complete residuated lattices. The dependencies allow us to express stronger relationships between attribute values than the ordinary FDs. In our setting, the dependencies not only express that certain values are determined by others but also express that similar values of attributes imply similar values of other attributes. We show complete axiomatization using a system of Armstrong-like rules, comment on related computational issues, and the relational vs. propositional semantics of the dependencies.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 08:06:22 GMT" }, { "version": "v2", "created": "Fri, 3 Jul 2015 20:17:42 GMT" } ]
2015-07-07T00:00:00
[ [ "Vychodil", "Vilem", "" ] ]
new_dataset
0.995769
1411.0336
Hussain Elkotby
Hussain Elkotby and Mai Vu
Uplink User-Assisted Relaying in Cellular Networks
32 pages, 13 figures, revised version submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use stochastic geometry to analyze the performance of a partial decode-and-forward (PDF) relaying scheme applied in a user-assisted relaying setting, where an active user relays data through another idle user in uplink cellular communication. We present the geometric model of a network deploying user-assisted relaying and propose two geometric cooperation policies for fast and slow fading channels. We analytically derive the cooperation probability for both policies. This cooperation probability is further used in the analytical derivation of the moments of inter-cell interference power caused by system-wide deployment of this user-assisted PDF relaying. We then model the inter-cell interference power statistics using the Gamma distribution by matching the first two moments analytically derived. This cooperation and interference analysis provides the theoretical basis for quantitatively evaluating the performance impact of user-assisted relaying in cellular networks. We then numerically evaluate the average transmission rate performance and show that user-assisted relaying can significantly improve per-user transmission rate despite of increased inter-cell interference. This transmission rate gain is significant for active users near the cell edge and further increases with higher idle user density, supporting user-assisted relaying as a viable solution to crowded population areas.
[ { "version": "v1", "created": "Sun, 2 Nov 2014 23:30:52 GMT" }, { "version": "v2", "created": "Tue, 28 Apr 2015 20:44:26 GMT" }, { "version": "v3", "created": "Sat, 4 Jul 2015 20:32:24 GMT" } ]
2015-07-07T00:00:00
[ [ "Elkotby", "Hussain", "" ], [ "Vu", "Mai", "" ] ]
new_dataset
0.980504
1411.2858
Loet Leydesdorff
Loet Leydesdorff
Can Technology Life-Cycles Be Indicated by Diversity in Patent Classifications? The crucial role of variety
accepted for publication in Scientometrics (July 2015)
null
null
null
cs.DL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a previous study of patent classifications in nine material technologies for photovoltaic cells, Leydesdorff et al. (2015) reported cyclical patterns in the longitudinal development of Rao-Stirling diversity. We suggested that these cyclical patterns can be used to indicate technological life-cycles. Upon decomposition, however, the cycles are exclusively due to increases and decreases in the variety of the classifications, and not to disparity or technological distance, measured as (1 - cosine). A single frequency component can accordingly be shown in the periodogram. Furthermore, the cyclical patterns are associated with the numbers of inventors in the respective technologies. Sometimes increased variety leads to a boost in the number of inventors, but in early phases--when the technology is still under constructio--it can also be the other way round. Since the development of the cycles thus seems independent of technological distances among the patents, the visualization in terms of patent maps can be considered as addressing an analytically different set of research questions.
[ { "version": "v1", "created": "Tue, 11 Nov 2014 15:45:59 GMT" }, { "version": "v2", "created": "Fri, 22 May 2015 09:37:39 GMT" }, { "version": "v3", "created": "Sun, 5 Jul 2015 11:11:24 GMT" } ]
2015-07-07T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
new_dataset
0.956919
1506.06098
Jose Rodrigues Jr
J. Rodrigues, M. Gazziro, N. Goncalves, O. Neto, Y. Fernandes, A. Gimenes, C. Alegre, R. Assis
The 12 prophets dataset
Full dataset online at http://aleijadinho3d.icmc.usp.br/data.html
null
null
University of Sao Paulo, Technical Report ICMC-USP 400, 2014
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The "Ajeijadinho 3D" project is an initiative supported by the University of S\~ao Paulo (Museum of Science and Dean of Culture and Extension), which involves the 3D digitization of art works of Brazilian sculptor Antonio Francisco Lisboa, better known as Aleijadinho. The project made use of advanced acquisition and processing of 3D meshes for preservation and dissemination of the cultural heritage. The dissemination occurs through a Web portal, so that the population has the opportunity to meet the art works in detail using 3D visualization and interaction. The portal address is http://www.aleijadinho3d.icmc.usp.br. The 3D acquisitions were conducted over a week at the end of July 2013 in the cities of Ouro Preto, MG, Brazil and Congonhas do Campo, MG, Brazil. The scanning was done with a special equipment supplied by company Leica Geosystems, which allowed the work to take place at distances between 10 and 30 meters, defining a non-invasive procedure, simplified logistics, and without the need for preparation or isolation of the sites. In Ouro Preto, we digitized the churches of Francisco of Assis, Our Lady of Carmo, and Our Lady of Mercy; in Congonhas do Campo we scanned the entire Sanctuary of Bom Jesus de Matosinhos and his 12 prophets. Once scanned, the art works went through a long process of preparation, which required careful handling of meshes done by experts from the University of S\~ao Paulo in partnership with company Imprimate.
[ { "version": "v1", "created": "Fri, 19 Jun 2015 17:57:38 GMT" } ]
2015-07-07T00:00:00
[ [ "Rodrigues", "J.", "" ], [ "Gazziro", "M.", "" ], [ "Goncalves", "N.", "" ], [ "Neto", "O.", "" ], [ "Fernandes", "Y.", "" ], [ "Gimenes", "A.", "" ], [ "Alegre", "C.", "" ], [ "Assis", "R.", "" ] ]
new_dataset
0.999855
1507.01057
Wang Hao
Daqing Zhang, Hao Wang, Yasha Wang, Junyi Ma
Anti-Fall: A Non-intrusive and Real-time Fall Detector Leveraging CSI from Commodity WiFi Devices
13 pages,8 figures,corrected version, ICOST conference
null
10.1007/978-3-319-19312-0_15
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fall is one of the major health threats and obstacles to independent living for elders, timely and reliable fall detection is crucial for mitigating the effects of falls. In this paper, leveraging the fine-grained Channel State Information (CSI) and multi-antenna setting in commodity WiFi devices, we design and implement a real-time, non-intrusive, and low-cost indoor fall detector, called Anti-Fall. For the first time, the CSI phase difference over two antennas is identified as the salient feature to reliably segment the fall and fall-like activities, both phase and amplitude information of CSI is then exploited to accurately separate the fall from other fall-like activities. Experimental results in two indoor scenarios demonstrate that Anti-Fall consistently outperforms the state-of-the-art approach WiFall, with 10% higher detection rate and 10% less false alarm rate on average.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 01:57:58 GMT" } ]
2015-07-07T00:00:00
[ [ "Zhang", "Daqing", "" ], [ "Wang", "Hao", "" ], [ "Wang", "Yasha", "" ], [ "Ma", "Junyi", "" ] ]
new_dataset
0.968067
1507.01095
V Lalitha
V. Lalitha and Satyanarayana V. Lokam
Weight Enumerators and Higher Support Weights of Maximally Recoverable Codes
19 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we establish the matroid structures corresponding to data-local and local maximally recoverable codes (MRC). The matroid structures of these codes can be used to determine the associated Tutte polynomial. Greene proved that the weight enumerators of any code can be determined from its associated Tutte polynomial. We will use this result to derive explicit expressions for the weight enumerators of data-local and local MRC. Also, Britz proved that the higher support weights of any code can be determined from its associated Tutte polynomial. We will use this result to derive expressions for the higher support weights of data-local and local MRC with two local codes.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 10:48:03 GMT" } ]
2015-07-07T00:00:00
[ [ "Lalitha", "V.", "" ], [ "Lokam", "Satyanarayana V.", "" ] ]
new_dataset
0.998565
1507.01109
Simon Worthington
Simon Worthington
Book to the Future - a manifesto for book liberation
178 x 111mm, 44 page, spine 2.769mm, 50.801 gm, cover color matt, interior color, paper 70 gsm, illustrations 12
null
10.5281/zenodo.18166
null
cs.DL cs.CY
http://creativecommons.org/licenses/by/4.0/
The Book Liberation Manifesto is an exploration of publishing outside of current corporate constraints and beyond the confines of book piracy. We believe that knowledge should be in free circulation to benefit humankind, which means an equitable and vibrant economy to support publishing, instead of the prevailing capitalist hand-me-down system of Sisyphean economic sustainability. Readers and books have been forced into pirate libraries, while sales channels have been monopolised by the big Internet giants which exact extortionate fees from publishers. We have three proposals. First, publications should be free-at-the-point-of-reading under a variety of open intellectual property regimes. Second, they should become fully digital -- in order to facilitate ready reuse, distribution, algorithmic and computational use. Finally, Open Source software for publishing should be treated as public infrastructure, with sustained research and investment. The result of such robust infrastructures will mean lower costs for manufacturing and faster publishing lifecycles, so that publishers and publics will be more readily able to afford to invent new futures. For more information on the Hybrid Publishing Consortium.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 14:16:04 GMT" } ]
2015-07-07T00:00:00
[ [ "Worthington", "Simon", "" ] ]
new_dataset
0.980462
1507.01162
Haibo Hong
Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang
Minimal Logarithmic Signatures for Sporadic Groups
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length is called a minimal logarithmic signature (MLS) and is even desirable for cryptographic constructions. The MLS conjecture states that every finite simple group has an MLS. Until now, the MLS conjecture has been proved true for some families of simple groups. In this paper, we will prove the existence of minimal logarithmic signatures for some sporadic groups.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 02:32:14 GMT" } ]
2015-07-07T00:00:00
[ [ "Hong", "Haibo", "" ], [ "Wang", "Licheng", "" ], [ "Ahmad", "Haseeb", "" ], [ "Li", "Jing", "" ], [ "Yang", "Yixian", "" ] ]
new_dataset
0.999266
1507.01163
Haibo Hong
Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang
Minimal Logarithmic Signatures for one type of Classical Groups
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a special type of factorization of finite groups, logarithmic signature (LS) is used as the main component of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2 and MST3. An LS with the shortest length, called a minimal logarithmic signature (MLS), is even desirable for cryptographic applications. The MLS conjecture states that every finite simple group has an MLS. Recently, the conjecture has been shown to be true for general linear groups GLn(q), special linear groups SLn(q), and symplectic groups Spn(q) with q a power of primes and for orthogonal groups On(q) with q as a power of 2. In this paper, we present new constructions of minimal logarithmic signatures for the orthogonal group On(q) and SOn(q) with q as a power of odd primes. Furthermore, we give constructions of MLSs for a type of classical groups projective commutator subgroup.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 02:47:28 GMT" } ]
2015-07-07T00:00:00
[ [ "Hong", "Haibo", "" ], [ "Wang", "Licheng", "" ], [ "Ahmad", "Haseeb", "" ], [ "Yang", "Yixian", "" ] ]
new_dataset
0.999172
1507.01272
Srijan Kumar
Srijan Kumar, Francesca Spezzano, V.S. Subrahmanian
VEWS: A Wikipedia Vandal Early Warning System
To appear in Proceedings of the 21st ACM SIGKDD Conference of Knowledge Discovery and Data Mining (KDD 2015)
null
10.1145/2783258.2783367
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of detecting vandals on Wikipedia before any human or known vandalism detection system reports flagging potential vandals so that such users can be presented early to Wikipedia administrators. We leverage multiple classical ML approaches, but develop 3 novel sets of features. Our Wikipedia Vandal Behavior (WVB) approach uses a novel set of user editing patterns as features to classify some users as vandals. Our Wikipedia Transition Probability Matrix (WTPM) approach uses a set of features derived from a transition probability matrix and then reduces it via a neural net auto-encoder to classify some users as vandals. The VEWS approach merges the previous two approaches. Without using any information (e.g. reverts) provided by other users, these algorithms each have over 85% classification accuracy. Moreover, when temporal recency is considered, accuracy goes to almost 90%. We carry out detailed experiments on a new data set we have created consisting of about 33K Wikipedia users (including both a black list and a white list of editors) and containing 770K edits. We describe specific behaviors that distinguish between vandals and non-vandals. We show that VEWS beats ClueBot NG and STiki, the best known algorithms today for vandalism detection. Moreover, VEWS detects far more vandals than ClueBot NG and on average, detects them 2.39 edits before ClueBot NG when both detect the vandal. However, we show that the combination of VEWS and ClueBot NG can give a fully automated vandal early warning system with even higher accuracy.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 20:53:26 GMT" } ]
2015-07-07T00:00:00
[ [ "Kumar", "Srijan", "" ], [ "Spezzano", "Francesca", "" ], [ "Subrahmanian", "V. S.", "" ] ]
new_dataset
0.997028
1507.01287
Andres Monroy-Hernandez
Munmun De Choudhury, Andr\'es Monroy-Hern\'andez, and Gloria Mark
"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War
Best paper award at the 32nd annual ACM conference on Human factors in computing systems (CHI '14). ACM, New York, NY, USA, pages 3563-3572
In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (CHI 2014). ACM, New York, NY, USA, pages 3563-3572
10.1145/2556288.2557197
null
cs.CY cs.HC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media platforms have emerged as prominent information sharing ecosystems in the context of a variety of recent crises, ranging from mass emergencies, to wars and political conflicts. We study affective responses in social media and how they might indicate desensitization to violence experienced in communities embroiled in an armed conflict. Specifically, we examine three established affect measures: negative affect, activation, and dominance as observed on Twitter in relation to a number of statistics on protracted violence in four major cities afflicted by the Mexican Drug War. During a two year period (Aug 2010-Dec 2012), while violence was on the rise in these regions, our findings show a decline in negative emotional expression as well as a rise in emotional arousal and dominance in Twitter posts: aspects known to be psychological markers of desensitization. We discuss the implications of our work for behavioral health, facilitating rehabilitation efforts in communities enmeshed in an acute and persistent urban warfare, and the impact on civic engagement.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 22:32:40 GMT" } ]
2015-07-07T00:00:00
[ [ "De Choudhury", "Munmun", "" ], [ "Monroy-Hernández", "Andrés", "" ], [ "Mark", "Gloria", "" ] ]
new_dataset
0.989755
1507.01290
Andres Monroy-Hernandez
Andr\'es Monroy-Hern\'andez, Emre Kiciman, Danah Boyd, Scott Counts
Narcotweets: Social Media in Wartime
In Proceedings of the 2012 International AAAI Conference on Weblogs and Social Media
null
null
null
cs.CY cs.SI
http://creativecommons.org/licenses/by/4.0/
This paper describes how people living in armed conflict environments use social media as a participatory news platform, in lieu of damaged state and media apparatuses. We investigate this by analyzing the microblogging practices of Mexican citizens whose everyday life is affected by the Drug War. We provide a descriptive analysis of the phenomenon, combining content and quantitative Twitter data analyses. We focus on three interrelated phenomena: general participation patterns of ordinary citizens, the emergence and role of information curators, and the tension between governmental regulation and drug cartel intimidation. This study reveals the complex tensions among citizens, media actors, and the government in light of large scale organized crime.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 22:42:42 GMT" } ]
2015-07-07T00:00:00
[ [ "Monroy-Hernández", "Andrés", "" ], [ "Kiciman", "Emre", "" ], [ "Boyd", "Danah", "" ], [ "Counts", "Scott", "" ] ]
new_dataset
0.999025
1507.01291
Andres Monroy-Hernandez
Andr\'es Monroy-Hern\'andez, danah boyd, Emre Kiciman, Munmun De Choudhury, and Scott Counts
The New War Correspondents: the Rise of Civic Media Curation in Urban Warfare
In Proceedings of the 2013 conference on Computer supported cooperative work (CSCW 2013). ACM, New York, NY, USA, 1443-1452
null
10.1145/2441776.2441938
null
cs.CY cs.HC cs.SI
http://creativecommons.org/licenses/by/4.0/
In this paper we examine the information sharing practices of people living in cities amid armed conflict. We describe the volume and frequency of microblogging activity on Twitter from four cities afflicted by the Mexican Drug War, showing how citizens use social media to alert one another and to comment on the violence that plagues their communities. We then investigate the emergence of civic media "curators," individuals who act as "war correspondents" by aggregating and disseminating information to large numbers of people on social media. We conclude by outlining the implications of our observations for the design of civic media systems in wartime.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 22:49:09 GMT" } ]
2015-07-07T00:00:00
[ [ "Monroy-Hernández", "Andrés", "" ], [ "boyd", "danah", "" ], [ "Kiciman", "Emre", "" ], [ "De Choudhury", "Munmun", "" ], [ "Counts", "Scott", "" ] ]
new_dataset
0.978761
1507.01292
Andres Monroy-Hernandez
Andr\'es Monroy-Hern\'andez
ScratchR: Sharing User-generated Programmable Media
In Proceedings of the 6th international conference on Interaction Design and Children (IDC 2007). ACM, New York, NY, USA, 167-168
null
10.1145/1297277.1297315
null
cs.HC cs.CY cs.SI
http://creativecommons.org/licenses/by/4.0/
In this paper, I describe a platform for sharing programmable media on the web called ScratchR. As the backbone of an on-line community of creative learners, ScratchR will give members access to an audience and inspirational ideas from each other. ScratchR seeks to support different states of participation: from passive consumption to active creation. This platform is being evaluated with a group of middle-school students and a larger community of beta testers.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 22:56:01 GMT" } ]
2015-07-07T00:00:00
[ [ "Monroy-Hernández", "Andrés", "" ] ]
new_dataset
0.995364
1507.01300
Andres Monroy-Hernandez
Elena Agapie and Andr\'es Monroy-Hern\'andez
Eventful: Crowdsourcing Local News Reporting
Collective Intelligence Conference 2014, Boston, MA
null
null
null
cs.HC cs.CY
http://creativecommons.org/licenses/by/4.0/
We present Eventful, a system for producing news reports of local events using remote and locative crowd workers. The system recruits and guides novice crowd workers as they perform the roles of field reporter, curator, or writer. Field reporters attend the events in person, and use Eventful's mobile web app to get a personalized mission, submit content, and receive feedback. Missions include tasks such as taking a photo, and asking a question to an attendee. In parallel, remote curators approve, reject, and give real-time feedback on the content collected by field reporters. Finally, writers put together a report by mashing up and tweaking the content approved by the curators. We used Eventful to produce a news report for each of the six local events we decided to cover as we piloted the system. The process was typically completed under an hour and costing under $150 USD.
[ { "version": "v1", "created": "Sun, 5 Jul 2015 23:42:19 GMT" } ]
2015-07-07T00:00:00
[ [ "Agapie", "Elena", "" ], [ "Monroy-Hernández", "Andrés", "" ] ]
new_dataset
0.998454
1507.01314
Andres Monroy-Hernandez
Elena L. Glassman, Juho Kim, Andr\'es Monroy-Hern\'andez, Meredith Ringel Morris
Mudslide: A Spatially Anchored Census of Student Confusion for Online Lecture Videos
Best paper honorable mention
In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI 2015). ACM, New York, NY, USA, 1555-1564
10.1145/2702123.2702304
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Educators have developed an effective technique to get feedback after in-person lectures, called "muddy card." Students are given time to reflect and write the "muddiest" (least clear) point on an index card, to hand in as they leave class. This practice of assigning end-of-lecture reflection tasks to generate explicit student feedback is well suited for adaptation to the challenge of supporting feedback in online video lectures. We describe the design and evaluation of Mudslide, a prototype system that translates the practice of muddy cards into the realm of online lecture videos. Based on an in-lab study of students and teachers, we find that spatially contextualizing students' muddy point feedback with respect to particular lecture slides is advantageous to both students and teachers. We also reflect on further opportunities for enhancing this feedback method based on teachers' and students' experiences with our prototype.
[ { "version": "v1", "created": "Mon, 6 Jul 2015 01:04:39 GMT" } ]
2015-07-07T00:00:00
[ [ "Glassman", "Elena L.", "" ], [ "Kim", "Juho", "" ], [ "Monroy-Hernández", "Andrés", "" ], [ "Morris", "Meredith Ringel", "" ] ]
new_dataset
0.985305
1507.01318
Andres Monroy-Hernandez
Juho Kim, Elena L. Glassman, Andr\'es Monroy-Hern\'andez, Meredith Ringel Morris
RIMES: Embedding Interactive Multimedia Exercises in Lecture Videos
null
In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI 2015). ACM, New York, NY, USA, 1535-1544
10.1145/2702123.2702186
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Teachers in conventional classrooms often ask learners to express themselves and show their thought processes by speaking out loud, drawing on a whiteboard, or even using physical objects. Despite the pedagogical value of such activities, interactive exercises available in most online learning platforms are constrained to multiple-choice and short answer questions. We introduce RIMES, a system for easily authoring, recording, and reviewing interactive multimedia exercises embedded in lecture videos. With RIMES, teachers can prompt learners to record their responses to an activity using video, audio, and inking while watching lecture videos. Teachers can then review and interact with all the learners' responses in an aggregated gallery. We evaluated RIMES with 19 teachers and 25 students. Teachers created a diverse set of activities across multiple subjects that tested deep conceptual and procedural knowledge. Teachers found the exercises useful for capturing students' thought processes, identifying misconceptions, and engaging students with content.
[ { "version": "v1", "created": "Mon, 6 Jul 2015 01:12:47 GMT" } ]
2015-07-07T00:00:00
[ [ "Kim", "Juho", "" ], [ "Glassman", "Elena L.", "" ], [ "Monroy-Hernández", "Andrés", "" ], [ "Morris", "Meredith Ringel", "" ] ]
new_dataset
0.995612
1507.01423
Francesco Ranzato
Francesco Ranzato
Abstract Interpretation of Supermodular Games
null
null
null
null
cs.GT cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Supermodular games find significant applications in a variety of models, especially in operations research and economic applications of noncooperative game theory, and feature pure strategy Nash equilibria characterized as fixed points of multivalued functions on complete lattices. Pure strategy Nash equilibria of supermodular games are here approximated by resorting to the theory of abstract interpretation, a well established and known framework used for designing static analyses of programming languages. This is obtained by extending the theory of abstract interpretation in order to handle approximations of multivalued functions and by providing some methods for abstracting supermodular games, in order to obtain approximate Nash equilibria which are shown to be correct within the abstract interpretation framework.
[ { "version": "v1", "created": "Mon, 6 Jul 2015 12:47:52 GMT" } ]
2015-07-07T00:00:00
[ [ "Ranzato", "Francesco", "" ] ]
new_dataset
0.980525
1507.01450
Torsten Ueckerdt
Muhammad Jawaherul Alam, Thomas Bl\"asius, Ignaz Rutter, Torsten Ueckerdt, Alexander Wolff
Pixel and Voxel Representations of Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study contact representations for graphs, which we call pixel representations in 2D and voxel representations in 3D. Our representations are based on the unit square grid whose cells we call pixels in 2D and voxels in 3D. Two pixels are adjacent if they share an edge, two voxels if they share a face. We call a connected set of pixels or voxels a blob. Given a graph, we represent its vertices by disjoint blobs such that two blobs contain adjacent pixels or voxels if and only if the corresponding vertices are adjacent. We are interested in the size of a representation, which is the number of pixels or voxels it consists of. We first show that finding minimum-size representations is NP-complete. Then, we bound representation sizes needed for certain graph classes. In 2D, we show that, for $k$-outerplanar graphs with $n$ vertices, $\Theta(kn)$ pixels are always sufficient and sometimes necessary. In particular, outerplanar graphs can be represented with a linear number of pixels, whereas general planar graphs sometimes need a quadratic number. In 3D, $\Theta(n^2)$ voxels are always sufficient and sometimes necessary for any $n$-vertex graph. We improve this bound to $\Theta(n\cdot \tau)$ for graphs of treewidth $\tau$ and to $O((g+1)^2n\log^2n)$ for graphs of genus $g$. In particular, planar graphs admit representations with $O(n\log^2n)$ voxels.
[ { "version": "v1", "created": "Fri, 12 Jun 2015 18:03:48 GMT" } ]
2015-07-07T00:00:00
[ [ "Alam", "Muhammad Jawaherul", "" ], [ "Bläsius", "Thomas", "" ], [ "Rutter", "Ignaz", "" ], [ "Ueckerdt", "Torsten", "" ], [ "Wolff", "Alexander", "" ] ]
new_dataset
0.998746
1111.4949
Nabarun Mondal Mr
Nabarun Mondal, Partha P. Ghosh
Universal Computation Is 'Almost Surely' Chaotic
24 pages, 0 figures, paper accepted at "Scientific Online" : http://www.scipublish.com/journals/AM/papers/1506
null
null
null
cs.CC math.DS math.NT nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fixed point iterations are known to generate chaos, for some values in their parameter range. It is an established fact that Turing Machines are fixed point iterations. However, as these Machines operate in integer space, the standard notions of a chaotic system is not readily applicable for them. Changing the state space of Turing Machines from integer to rational space, the condition for chaotic dynamics can be suitably established, as presented in the current paper. Further it is deduced that, given random input, computation performed by a Universal Turing Machine would be 'almost surely' chaotic.
[ { "version": "v1", "created": "Mon, 21 Nov 2011 17:44:09 GMT" }, { "version": "v2", "created": "Mon, 25 Jun 2012 19:14:24 GMT" }, { "version": "v3", "created": "Wed, 27 Jun 2012 16:13:13 GMT" }, { "version": "v4", "created": "Wed, 4 Jul 2012 15:27:50 GMT" }, { "version": "v5", "created": "Fri, 6 Jul 2012 15:57:16 GMT" }, { "version": "v6", "created": "Tue, 17 Jul 2012 17:49:25 GMT" }, { "version": "v7", "created": "Thu, 19 Jul 2012 06:09:17 GMT" }, { "version": "v8", "created": "Fri, 11 Jul 2014 12:32:14 GMT" }, { "version": "v9", "created": "Fri, 3 Jul 2015 19:41:12 GMT" } ]
2015-07-06T00:00:00
[ [ "Mondal", "Nabarun", "" ], [ "Ghosh", "Partha P.", "" ] ]
new_dataset
0.975055
1507.00913
Erik Rodner
Erik Rodner and Marcel Simon and Gunnar Brehm and Stephanie Pietsch and J. Wolfgang W\"agele and Joachim Denzler
Fine-grained Recognition Datasets for Biodiversity Analysis
CVPR FGVC Workshop 2015; dataset available
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the following paper, we present and discuss challenging applications for fine-grained visual classification (FGVC): biodiversity and species analysis. We not only give details about two challenging new datasets suitable for computer vision research with up to 675 highly similar classes, but also present first results with localized features using convolutional neural networks (CNN). We conclude with a list of challenging new research directions in the area of visual classification for biodiversity research.
[ { "version": "v1", "created": "Fri, 3 Jul 2015 13:53:26 GMT" } ]
2015-07-06T00:00:00
[ [ "Rodner", "Erik", "" ], [ "Simon", "Marcel", "" ], [ "Brehm", "Gunnar", "" ], [ "Pietsch", "Stephanie", "" ], [ "Wägele", "J. Wolfgang", "" ], [ "Denzler", "Joachim", "" ] ]
new_dataset
0.999772
1507.00942
Alexandra Meliou
Matteo Brucato, Rahul Ramakrishna, Azza Abouzied, Alexandra Meliou
PackageBuilder: From Tuples to Packages
null
PVLDB, vol. 7, no. 13, 2014, pp. 1593-1596
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this demo, we present PackageBuilder, a system that extends database systems to support package queries. A package is a collection of tuples that individually satisfy base constraints and collectively satisfy global constraints. The need for package support arises in a variety of scenarios: For example, in the creation of meal plans, users are not only interested in the nutritional content of individual meals (base constraints), but also care to specify daily consumption limits and control the balance of the entire plan (global constraints). We introduce PaQL, a declarative SQL-based package query language, and the interface abstractions which allow users to interactively specify package queries and easily navigate through their results. To efficiently evaluate queries, the system employs pruning and heuristics, as well as state-of-the-art constraint optimization solvers. We demonstrate PackageBuilder by allowing attendees to interact with the system's interface, to define PaQL queries and to observe how query evaluation is performed.
[ { "version": "v1", "created": "Fri, 3 Jul 2015 15:22:57 GMT" } ]
2015-07-06T00:00:00
[ [ "Brucato", "Matteo", "" ], [ "Ramakrishna", "Rahul", "" ], [ "Abouzied", "Azza", "" ], [ "Meliou", "Alexandra", "" ] ]
new_dataset
0.999536
1507.00956
Vadim Bulitko
Vadim Bulitko and Jessica Hong and Kumar Kumaran and Ivan Swedberg and William Thoang and Patrick von Hauff and Georg Schmolzer
RETAIN: a Neonatal Resuscitation Trainer Built in an Undergraduate Video-Game Class
10 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Approximately ten percent of newborns require some help with their breathing at birth. About one percent require extensive assistance at birth which needs to be administered by trained personnel. Neonatal resuscitation is taught through a simulation based training program in North America. Such a training methodology is cost and resource intensive which reduces its availability thereby adversely impacting skill acquisition and retention. We implement and present RETAIN (REsuscitation TrAIning for Neonatal residents) -- a video game to complement the existing neonatal training. Being a video game, RETAIN runs on ubiquitous off-the-shelf hardware and can be easily accessed by trainees almost anywhere at their convenience. Thus we expect RETAIN to help trainees retain and retrain their resuscitation skills. We also report on how RETAIN was developed by an interdisciplinary team of six undergraduate students as a three-month term project for a second year university course.
[ { "version": "v1", "created": "Fri, 3 Jul 2015 15:48:03 GMT" } ]
2015-07-06T00:00:00
[ [ "Bulitko", "Vadim", "" ], [ "Hong", "Jessica", "" ], [ "Kumaran", "Kumar", "" ], [ "Swedberg", "Ivan", "" ], [ "Thoang", "William", "" ], [ "von Hauff", "Patrick", "" ], [ "Schmolzer", "Georg", "" ] ]
new_dataset
0.973331
1402.0017
Christos Kourtellaris
Christos K. Kourtellaris, Charalambos D. Charalambous
Capacity of Binary State Symmetric Channel with and without Feedback and Transmission Cost
null
null
10.1109/ITW.2015.7133133
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a unit memory channel, called Binary State Symmetric Channel (BSSC), in which the channel state is the modulo2 addition of the current channel input and the previous channel output. We derive closed form expressions for the capacity and corresponding channel input distribution, of this BSSC with and without feedback and transmission cost. We also show that the capacity of the BSSC is not increased by feedback, and it is achieved by a first order symmetric Markov process.
[ { "version": "v1", "created": "Fri, 31 Jan 2014 22:03:28 GMT" }, { "version": "v2", "created": "Sun, 15 Feb 2015 19:32:48 GMT" } ]
2015-07-03T00:00:00
[ [ "Kourtellaris", "Christos K.", "" ], [ "Charalambous", "Charalambos D.", "" ] ]
new_dataset
0.959373
1507.00557
Van Bang Le
Van Bang Le and Thomas Podelleck
Characterization and recognition of some opposition and coalition graph classes
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is an opposition graph, respectively, a coalition graph, if it admits an acyclic orientation which puts the two end-edges of every chordless 4-vertex path in opposition, respectively, in the same direction. Opposition and coalition graphs have been introduced and investigated in connection to perfect graphs. Recognizing and characterizing opposition and coalition graphs are long-standing open problems. This paper gives characterizations for opposition graphs and coalition graphs on some restricted graph classes. Implicit in our arguments are polynomial time recognition algorithms for these graphs. We also give a good characterization for the so-called generalized opposition graphs.
[ { "version": "v1", "created": "Thu, 2 Jul 2015 12:50:44 GMT" } ]
2015-07-03T00:00:00
[ [ "Le", "Van Bang", "" ], [ "Podelleck", "Thomas", "" ] ]
new_dataset
0.99054
1507.00646
Zhensong Qian
Oliver Schulte and Zhensong Qian
SQL for SRL: Structure Learning Inside a Database System
3 pages, 1 figure, Position Paper of the Fifth International Workshop on Statistical Relational AI at UAI 2015
null
null
null
cs.LG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The position we advocate in this paper is that relational algebra can provide a unified language for both representing and computing with statistical-relational objects, much as linear algebra does for traditional single-table machine learning. Relational algebra is implemented in the Structured Query Language (SQL), which is the basis of relational database management systems. To support our position, we have developed the FACTORBASE system, which uses SQL as a high-level scripting language for statistical-relational learning of a graphical model structure. The design philosophy of FACTORBASE is to manage statistical models as first-class citizens inside a database. Our implementation shows how our SQL constructs in FACTORBASE facilitate fast, modular, and reliable program development. Empirical evidence from six benchmark databases indicates that leveraging database system capabilities achieves scalable model structure learning.
[ { "version": "v1", "created": "Thu, 2 Jul 2015 16:07:48 GMT" } ]
2015-07-03T00:00:00
[ [ "Schulte", "Oliver", "" ], [ "Qian", "Zhensong", "" ] ]
new_dataset
0.997953