id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1506.05543
|
Rajib Rana
|
Rajib Rana, Margee Hume, John Reilly, Jeffrey Soar
|
wHealth - Transforming Telehealth Services
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A worldwide increase in proportions of older people in the population poses
the challenge of managing their increasing healthcare needs within limited
resources. To achieve this many countries are interested in adopting telehealth
technology. Several shortcomings of state-of-the-art telehealth technology
constrain widespread adoption of telehealth services. We present an
ensemble-sensing framework - wHealth (short form of wireless health) for
effective delivery of telehealth services. It extracts personal health
information using sensors embedded in everyday devices and allows effective and
seamless communication between patients and clinicians. Due to the
non-stigmatizing design, ease of maintenance, simplistic interaction and
seamless intervention, our wHealth platform has the potential to enable
widespread adoption of telehealth services for managing elderly healthcare. We
discuss the key barriers and potential solutions to make the wHealth platform a
reality.
|
[
{
"version": "v1",
"created": "Thu, 18 Jun 2015 03:44:12 GMT"
}
] | 2015-06-19T00:00:00 |
[
[
"Rana",
"Rajib",
""
],
[
"Hume",
"Margee",
""
],
[
"Reilly",
"John",
""
],
[
"Soar",
"Jeffrey",
""
]
] |
new_dataset
| 0.988852 |
1506.05693
|
Bernard Cousin
|
Omar Smail, Bernard Cousin (UR1, ATNET), Zoulikha Mekkakia, Rachida
Mekki
|
A multipath energy-conserving routing protocol for wireless ad hoc
networks lifetime improvement
| null |
EURASIP Journal on Wireless Communications and Networking,
SpringerOpen, 2014, 2014 (139), pp. 1 - 22
|
10.1186/1687-1499-2014-139
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ad hoc networks are wireless mobile networks that can operate without
infrastructure and without centralized network management. Traditional
techniques of routing are not well adapted. Indeed, their lack of reactivity
with respect to the variability of network changes makes them difficult to use.
Moreover, conserving energy is a critical concern in the design of routing
protocols for ad hoc networks, because most mobile nodes operate with limited
battery capacity, and the energy depletion of a node affects not only the node
itself but also the overall network lifetime. In all proposed single-path
routing schemes a new path-discovery process is required once a path failure is
detected, and this process causes delay and wastage of node resources. A
multipath routing scheme is an alternative to maximize the network lifetime. In
this paper, we propose an energy-efficient multipath routing protocol, called
AOMR-LM (Ad hoc On-demand Multipath Routing with Lifetime Maximization), which
preserves the residual energy of nodes and balances the consumed energy to
increase the network lifetime. To achieve this goal, we used the residual
energy of nodes for calculating the node energy level. The multipath selection
mechanism uses this energy level to classify the paths. Two parameters are
analyzed: the energy threshold beta and the coefficient alpha. These parameters
are required to classify the nodes and to ensure the preservation of node
energy. Our protocol improves the performance of mobile ad hoc networks by
prolonging the lifetime of the network. This novel protocol has been compared
with other protocols: AOMDV and ZD-AOMDV. The protocol performance has been
evaluated in terms of network lifetime, energy consumption, and end-to-end
delay.
|
[
{
"version": "v1",
"created": "Thu, 18 Jun 2015 14:25:53 GMT"
}
] | 2015-06-19T00:00:00 |
[
[
"Smail",
"Omar",
"",
"UR1, ATNET"
],
[
"Cousin",
"Bernard",
"",
"UR1, ATNET"
],
[
"Mekkakia",
"Zoulikha",
""
],
[
"Mekki",
"Rachida",
""
]
] |
new_dataset
| 0.993534 |
1312.1732
|
Gerard Vidal
|
Gerard Vidal, Murilo Baptista, Hector Mancini
|
A fast and light stream cipher for smartphones
| null | null |
10.1140/epjst/e2014-02185-y
| null |
cs.CR nlin.CD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a stream cipher based on a chaotic dynamical system. Using a
chaotic trajectory sampled under certain rules in order to avoid any attempt to
reconstruct the original one, we create a binary pseudo-random keystream that
can only be exactly reproduced by someone that has fully knowledge of the
communication system parameters formed by a transmitter and a receiver and
sharing the same initial conditions. The plaintext is XORed with the keystream
creating the ciphertext, the encrypted message. This keystream passes the NISTs
randomness test and has been implemented in a videoconference App for
smartphones, in order to show the fast and light nature of the proposed
encryption system.
|
[
{
"version": "v1",
"created": "Thu, 5 Dec 2013 23:26:21 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Vidal",
"Gerard",
""
],
[
"Baptista",
"Murilo",
""
],
[
"Mancini",
"Hector",
""
]
] |
new_dataset
| 0.991188 |
1401.7229
|
Rui Wang
|
Rui Wang and Xiaojun Yuan
|
MIMO Multiway Relaying with Pairwise Data Exchange: A Degrees of Freedom
Perspective
|
13 pages, 7 figures
| null |
10.1109/TSP.2014.2347924
| null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper, we study achievable degrees of freedom (DoF) of a
multiple-input multiple-output (MIMO) multiway relay channel (mRC) where $K$
users, each equipped with $M$ antennas, exchange messages in a pairwise manner
via a common $N$-antenna relay node. % A novel and systematic way of joint
beamforming design at the users and at the relay is proposed to align signals
for efficient implementation of physical-layer network coding (PNC). It is
shown that, when the user number $K=3$, the proposed beamforming design can
achieve the DoF capacity of the considered mRC for any $(M,N)$ setups. % For
the scenarios with $K>3$, we show that the proposed signaling scheme can be
improved by disabling a portion of relay antennas so as to align signals more
efficiently. Our analysis reveals that the obtained achievable DoF is always
piecewise linear, and is bounded either by the number of user antennas $M$ or
by the number of relay antennas $N$. Further, we show that the DoF capacity can
be achieved for $\frac{M}{N} \in \left(0,\frac{K-1}{K(K-2)} \right]$ and
$\frac{M}{N} \in \left[\frac{1}{K(K-1)}+\frac{1}{2},\infty \right)$, which
provides a broader range of the DoF capacity than the existing results.
Asymptotic DoF as $K\rightarrow \infty$ is also derived based on the proposed
signaling scheme.
|
[
{
"version": "v1",
"created": "Tue, 28 Jan 2014 15:45:17 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Aug 2014 10:31:58 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Wang",
"Rui",
""
],
[
"Yuan",
"Xiaojun",
""
]
] |
new_dataset
| 0.987115 |
1402.1219
|
Brian Tierney
|
Brian B. Tierney and Anthony Grbic
|
Planar Shielded-Loop Resonators
| null | null |
10.1109/TAP.2014.2314305
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The design and analysis of planar shielded-loop resonators for use in
wireless non-radiative power transfer systems is presented. The difficulties
associated with coaxial shielded-loop resonators for wireless power transfer
are discussed and planar alternatives are proposed. The currents along these
planar structures are analyzed and first-order design equations are presented
in the form of a circuit model. In addition, the planar structures are
simulated and fabricated. Planar shielded-loop resonators are compact and
simple to fabricate. Moreover, they are well-suited for printed circuit board
designs or integrated circuits
|
[
{
"version": "v1",
"created": "Thu, 6 Feb 2014 00:50:00 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Tierney",
"Brian B.",
""
],
[
"Grbic",
"Anthony",
""
]
] |
new_dataset
| 0.99845 |
1402.5265
|
Rami Mochaourab
|
Rami Mochaourab and Eduard Jorswieck
|
Coalitional Games in MISO Interference Channels: Epsilon-Core and
Coalition Structure Stable Set
|
to appear in IEEE Transactions on Signal Processing, 14 pages, 14
figures, 3 tables
| null |
10.1109/TSP.2014.2367466
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The multiple-input single-output interference channel is considered. Each
transmitter is assumed to know the channels between itself and all receivers
perfectly and the receivers are assumed to treat interference as additive
noise. In this setting, noncooperative transmission does not take into account
the interference generated at other receivers which generally leads to
inefficient performance of the links. To improve this situation, we study
cooperation between the links using coalitional games. The players (links) in a
coalition either perform zero forcing transmission or Wiener filter precoding
to each other. The $\epsilon$-core is a solution concept for coalitional games
which takes into account the overhead required in coalition deviation. We
provide necessary and sufficient conditions for the strong and weak
$\epsilon$-core of our coalitional game not to be empty with zero forcing
transmission. Since, the $\epsilon$-core only considers the possibility of
joint cooperation of all links, we study coalitional games in partition form in
which several distinct coalitions can form. We propose a polynomial time
distributed coalition formation algorithm based on coalition merging and prove
that its solution lies in the coalition structure stable set of our coalition
formation game. Simulation results reveal the cooperation gains for different
coalition formation complexities and deviation overhead models.
|
[
{
"version": "v1",
"created": "Fri, 21 Feb 2014 11:55:42 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Jun 2014 15:12:14 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Oct 2014 18:13:58 GMT"
},
{
"version": "v4",
"created": "Wed, 12 Nov 2014 17:38:05 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Mochaourab",
"Rami",
""
],
[
"Jorswieck",
"Eduard",
""
]
] |
new_dataset
| 0.952487 |
1506.01598
|
Ghislain Fourny
|
Ghislain Fourny
|
decimalInfinite: All Decimals In Bits, No Loss, Same Order, Simple
|
Technical report, 9 pages
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a binary encoding that supports arbitrarily large,
small and precise decimals. It completely preserves information and order. It
does not rely on any arbitrary use-case-based choice of calibration and is
readily implementable and usable, as is. Finally, it is also simple to explain
and understand.
|
[
{
"version": "v1",
"created": "Thu, 4 Jun 2015 14:09:47 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jun 2015 12:01:04 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Fourny",
"Ghislain",
""
]
] |
new_dataset
| 0.999544 |
1506.05257
|
Daniel J Mankowitz
|
Daniel J. Mankowitz and Ehud Rivlin
|
CFORB: Circular FREAK-ORB Visual Odometry
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel Visual Odometry algorithm entitled Circular FREAK-ORB
(CFORB). This algorithm detects features using the well-known ORB algorithm
[12] and computes feature descriptors using the FREAK algorithm [14]. CFORB is
invariant to both rotation and scale changes, and is suitable for use in
environments with uneven terrain. Two visual geometric constraints have been
utilized in order to remove invalid feature descriptor matches. These
constraints have not previously been utilized in a Visual Odometry algorithm. A
variation to circular matching [16] has also been implemented. This allows
features to be matched between images without having to be dependent upon the
epipolar constraint. This algorithm has been run on the KITTI benchmark dataset
and achieves a competitive average translational error of $3.73 \%$ and average
rotational error of $0.0107 deg/m$. CFORB has also been run in an indoor
environment and achieved an average translational error of $3.70 \%$. After
running CFORB in a highly textured environment with an approximately uniform
feature spread across the images, the algorithm achieves an average
translational error of $2.4 \%$ and an average rotational error of $0.009
deg/m$.
|
[
{
"version": "v1",
"created": "Wed, 17 Jun 2015 09:44:42 GMT"
}
] | 2015-06-18T00:00:00 |
[
[
"Mankowitz",
"Daniel J.",
""
],
[
"Rivlin",
"Ehud",
""
]
] |
new_dataset
| 0.996186 |
1203.4031
|
Eric Polizzi
|
Eric Polizzi, James Kestyn
|
FEAST Eigenvalue Solver v3.0 User Guide
|
37 pages, 10 Figures, 12 Tables
| null | null | null |
cs.MS cs.CE physics.chem-ph physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The FEAST eigensolver package is a free high-performance numerical library
for solving the Hermitian and non-Hermitian eigenvalue problems, and obtaining
all the eigenvalues and (right/left) eigenvectors within a given search
interval or arbitrary contour in the complex plane. Its originality lies with a
new transformative numerical approach to the traditional eigenvalue algorithm
design - the FEAST algorithm. The FEAST eigensolver combines simplicity and
efficiency and it offers many important capabilities for achieving high
performance, robustness, accuracy, and scalability on parallel architectures.
FEAST is both a comprehensive library package, and an easy to use software. It
includes flexible reverse communication interfaces and ready to use predefined
interfaces for dense, banded and sparse systems. The current version v3.0 of
the FEAST package can address both Hermitian and non-Hermitian eigenvalue
problems (real symmetric, real non-symmetric, complex Hermitian, complex
symmetric, or complex general systems) on both shared-memory and distributed
memory architectures (i.e contains both FEAST-SMP and FEAST-MPI packages). This
User's guide provides instructions for installation setup, a detailed
description of the FEAST interfaces and a large number of examples.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2012 03:47:55 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2013 02:31:28 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jun 2015 15:47:52 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Polizzi",
"Eric",
""
],
[
"Kestyn",
"James",
""
]
] |
new_dataset
| 0.967794 |
1311.0058
|
R. J. Sobie
|
Ian Gable, Michael Chester, Patrick Armstrong, Frank Berghaus, Andre
Charbonneau, Colin Leavett-Brown, Michael Paterson, Robert Prior, Randall
Sobie, Ryan Taylor
|
Dynamic web cache publishing for IaaS clouds using Shoal
|
Conference paper at the 2013 Computing in HEP (CHEP) Conference,
Amsterdam
| null |
10.1088/1742-6596/513/3/032035
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have developed a highly scalable application, called Shoal, for tracking
and utilizing a distributed set of HTTP web caches. Squid servers advertise
their existence to the Shoal server via AMQP messaging by running Shoal Agent.
The Shoal server provides a simple REST interface that allows clients to
determine their closest Squid cache. Our goal is to dynamically instantiate
Squid caches on IaaS clouds in response to client demand. Shoal provides the
VMs on IaaS clouds with the location of the nearest dynamically instantiated
Squid Cache. In this paper, we describe the design and performance of Shoal.
|
[
{
"version": "v1",
"created": "Thu, 31 Oct 2013 22:43:01 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Gable",
"Ian",
""
],
[
"Chester",
"Michael",
""
],
[
"Armstrong",
"Patrick",
""
],
[
"Berghaus",
"Frank",
""
],
[
"Charbonneau",
"Andre",
""
],
[
"Leavett-Brown",
"Colin",
""
],
[
"Paterson",
"Michael",
""
],
[
"Prior",
"Robert",
""
],
[
"Sobie",
"Randall",
""
],
[
"Taylor",
"Ryan",
""
]
] |
new_dataset
| 0.994633 |
1311.0790
|
Nicholas Miller
|
Nicholas C. Miller, Andrew D. Baczewski, John D. Albrecht, and
Balasubramaniam Shanker
|
A Discontinuous Galerkin Time Domain Framework for Periodic Structures
Subject To Oblique Excitation
|
Submitted to IEEE TAP on August 5th, 2013. Revision submitted on
February 3rd, 2014
| null |
10.1109/TAP.2014.2324012
| null |
cs.CE
|
http://creativecommons.org/licenses/by/3.0/
|
A nodal Discontinuous Galerkin (DG) method is derived for the analysis of
time-domain (TD) scattering from doubly periodic PEC/dielectric structures
under oblique interrogation. Field transformations are employed to elaborate a
formalism that is free from any issues with causality that are common when
applying spatial periodic boundary conditions simultaneously with incident
fields at arbitrary angles of incidence. An upwind numerical flux is derived
for the transformed variables, which retains the same form as it does in the
original Maxwell problem for domains without explicitly imposed periodicity.
This, in conjunction with the amenability of the DG framework to non-conformal
meshes, provides a natural means of accurately solving the first order TD
Maxwell equations for a number of periodic systems of engineering interest.
Results are presented that substantiate the accuracy and utility of our method.
|
[
{
"version": "v1",
"created": "Mon, 4 Nov 2013 17:48:27 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Feb 2014 17:29:17 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Miller",
"Nicholas C.",
""
],
[
"Baczewski",
"Andrew D.",
""
],
[
"Albrecht",
"John D.",
""
],
[
"Shanker",
"Balasubramaniam",
""
]
] |
new_dataset
| 0.999402 |
1506.04861
|
Omrit Filtser
|
Omrit Filtser and Matthew J. Katz
|
The Discrete Fr\'echet Gap
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the discrete Fr\'echet gap and its variants as an alternative
measure of similarity between polygonal curves. We believe that for some
applications the new measure (and its variants) may better reflect our
intuitive notion of similarity than the discrete Fr\'echet distance (and its
variants), since the latter measure is indifferent to (matched) pairs of points
that are relatively close to each other. Referring to the frogs analogy by
which the discrete Fr\'echet distance is often described, the discrete
Fr\'echet gap is the minimum difference between the longest and shortest
positions of the leash needed for the frogs to traverse their point sequences.
We present an optimization scheme, which is suitable for any monotone
function defined for pairs of distances such as the gap and ratio functions. We
apply this scheme to two variants of the discrete Fr\'echet gap, namely, the
one-sided discrete Fr\'echet gap with shortcuts and the weak discrete Fr\'echet
gap, to obtain $O(n^2 \log^2 n)$-time algorithms for computing them.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2015 07:19:26 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Filtser",
"Omrit",
""
],
[
"Katz",
"Matthew J.",
""
]
] |
new_dataset
| 0.998406 |
1506.04904
|
Reza Sabzevari
|
Jonas Schuler, Reza Sabzevari and Davide Scaramuzza
|
LightPanel: Active Mobile Platform for Dense 3D Modelling
|
12 pages
| null | null | null |
cs.RO cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a novel platform for dense 3D modelling. This
platform is an active image acquisition setup assisted with a set of light
sources and a distance sensor. The hardware setup is designed for being mounted
on a mobile robot which is remotely driven to create accurate dense 3D models
from out-of-reach objects. For this reason, the object is actively illuminated
by the imaging setup and Photometric Stereo is used to recover the dense 3D
model. The proposed image acquisition setup, called LightPanel, is described
from design to calibration and discusses the practical challenges of using
Photometric Stereo under uncontrolled lighting conditions.
|
[
{
"version": "v1",
"created": "Tue, 16 Jun 2015 10:30:34 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Schuler",
"Jonas",
""
],
[
"Sabzevari",
"Reza",
""
],
[
"Scaramuzza",
"Davide",
""
]
] |
new_dataset
| 0.996521 |
1506.05071
|
Sireesha Chiliveri
|
C. Sireesha, G. Jyostna, P. Raghu Varan, and P. R. L. Eswari
|
PROP - Patronage of PHP Web Applications
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PHP is one of the most commonly used languages to develop web sites because
of its simplicity, easy to learn and it can be easily embedded with any of the
databases. A web developer with his basic knowledge developing an application
without practising secure guidelines, improper validation of user inputs leads
to various source code vulnerabilities. Logical flaws while designing,
implementing and hosting the web application causes work flow deviation
attacks. In this paper, we are analyzing the complete behaviour of a web
application through static and dynamic analysis methodologies.
|
[
{
"version": "v1",
"created": "Mon, 15 Jun 2015 11:08:05 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Sireesha",
"C.",
""
],
[
"Jyostna",
"G.",
""
],
[
"Varan",
"P. Raghu",
""
],
[
"Eswari",
"P. R. L.",
""
]
] |
new_dataset
| 0.995011 |
1506.05073
|
Dorai Ashok S A
|
Dorai Ashok Shanmugavel Anbalagan
|
Secure Shell (SSH): Public Key Authentication over Hypertext Transfer
Protocol (HTTP)
|
7 pages
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure Shell (SSH) protocol requires all implementations to support public
key authentication method ("publickey") for authentication purposes, so web
applications which provide a SSH client over the web browser need to support
"publickey". However, restrictions in Hypertext Transfer Protocol (HTTP), such
as same origin policy, and limited access to local resources, make it difficult
to perform such authentications. In this document, a system to perform
"publickey" authentication over HTTP is provided. It is ensured that no
compromise is made that would pose a security risk to SSH protocol.
|
[
{
"version": "v1",
"created": "Mon, 15 Jun 2015 11:47:11 GMT"
}
] | 2015-06-17T00:00:00 |
[
[
"Anbalagan",
"Dorai Ashok Shanmugavel",
""
]
] |
new_dataset
| 0.999233 |
1306.3529
|
Alexandre J. Raymond
|
Alexandre J. Raymond and Warren J. Gross
|
Scalable Successive-Cancellation Hardware Decoder for Polar Codes
| null | null |
10.1109/TSP.2014.2347262
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes, discovered by Ar{\i}kan, are the first error-correcting codes
with an explicit construction to provably achieve channel capacity,
asymptotically. However, their error-correction performance at finite lengths
tends to be lower than existing capacity-approaching schemes. Using the
successive-cancellation algorithm, polar decoders can be designed for very long
codes, with low hardware complexity, leveraging the regular structure of such
codes. We present an architecture and an implementation of a scalable hardware
decoder based on this algorithm. This design is shown to scale to code lengths
of up to N = 2^20 on an Altera Stratix IV FPGA, limited almost exclusively by
the amount of available SRAM.
|
[
{
"version": "v1",
"created": "Fri, 14 Jun 2013 23:38:58 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Raymond",
"Alexandre J.",
""
],
[
"Gross",
"Warren J.",
""
]
] |
new_dataset
| 0.995925 |
1307.2785
|
Yu-Ru Lin
|
Yu-Ru Lin, Brian Keegan, Drew Margolin, David Lazer
|
Rising tides or rising stars?: Dynamics of shared attention on Twitter
during media events
|
13 pages, 6 figures
| null |
10.1371/journal.pone.0094093
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Media events" such as political debates generate conditions of shared
attention as many users simultaneously tune in with the dual screens of
broadcast and social media to view and participate. Are collective patterns of
user behavior under conditions of shared attention distinct from other "bursts"
of activity like breaking news events? Using data from a population of
approximately 200,000 politically-active Twitter users, we compare features of
their behavior during eight major events during the 2012 U.S. presidential
election to examine (1) the impact of "media events" have on patterns of social
media use compared to "typical" time and (2) whether changes during media
events are attributable to changes in behavior across the entire population or
an artifact of changes in elite users' behavior. Our findings suggest that
while this population became more active during media events, this additional
activity reflects concentrated attention to a handful of users, hashtags, and
tweets. Our work is the first study on distinguishing patterns of large-scale
social behavior under condition of uncertainty and shared attention, suggesting
new ways of mining information from social media to support collective
sensemaking following major events.
|
[
{
"version": "v1",
"created": "Wed, 10 Jul 2013 13:27:32 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Lin",
"Yu-Ru",
""
],
[
"Keegan",
"Brian",
""
],
[
"Margolin",
"Drew",
""
],
[
"Lazer",
"David",
""
]
] |
new_dataset
| 0.989137 |
1501.00657
|
Scott A. Hale
|
Scott A. Hale
|
Cross-language Wikipedia Editing of Okinawa, Japan
|
In Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems, CHI 2015. ACM
| null |
10.1145/2702123.2702346
| null |
cs.CY cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article analyzes users who edit Wikipedia articles about Okinawa, Japan,
in English and Japanese. It finds these users are among the most active and
dedicated users in their primary languages, where they make many large,
high-quality edits. However, when these users edit in their non-primary
languages, they tend to make edits of a different type that are overall smaller
in size and more often restricted to the narrow set of articles that exist in
both languages. Design changes to motivate wider contributions from users in
their non-primary languages and to encourage multilingual users to transfer
more information across language divides are presented.
|
[
{
"version": "v1",
"created": "Sun, 4 Jan 2015 10:10:32 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Mar 2015 16:19:48 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Hale",
"Scott A.",
""
]
] |
new_dataset
| 0.976959 |
1505.05123
|
Santhosh Kumar
|
Santhosh Kumar and Henry D. Pfister
|
Reed-Muller Codes Achieve Capacity on Erasure Channels
|
(v2) Added Section V (titled 'Discussion') and a detailed discussion
of primitive narrow-sense BCH codes (Section IV-C)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new approach to proving that a sequence of
deterministic linear codes achieves capacity on an erasure channel under
maximum a posteriori decoding. Rather than relying on the precise structure of
the codes, this method requires only that the codes are highly symmetric. In
particular, the technique applies to any sequence of linear codes where the
blocklengths are strictly increasing, the code rates converge to a number
between 0 and 1, and the permutation group of each code is doubly transitive.
This also provides a rare example in information theory where symmetry alone
implies near-optimal performance.
An important consequence of this result is that a sequence of Reed-Muller
codes with increasing blocklength achieves capacity if its code rate converges
to a number between 0 and 1. This possibility has been suggested previously in
the literature but it has only been proven for cases where the limiting code
rate is 0 or 1. Moreover, these results extend naturally to affine-invariant
codes and, thus, to all extended primitive narrow-sense BCH codes. The primary
tools used in the proof are the sharp threshold property for monotone boolean
functions and the area theorem for extrinsic information transfer functions.
|
[
{
"version": "v1",
"created": "Tue, 19 May 2015 19:29:26 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jun 2015 17:36:40 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Kumar",
"Santhosh",
""
],
[
"Pfister",
"Henry D.",
""
]
] |
new_dataset
| 0.987912 |
1506.02082
|
Philip Baback Alipour
|
Philip B. Alipour, Matteus Magnusson, Martin W. Olsson, Nooshin H.
Ghasemi, Lawrence Henesey
|
A Real-time Cargo Damage Management System via a Sorting Array
Triangulation Technique
|
This article is a report on a developed IDSS system/prototype aimed
to be published for a journal conference proceedings and/or a full paper
under Computer Science and Software Engineering categories. 28 pages; 10
Figures including graphs; 5 tables; presentation file is available at
http://web.uvic.ca/~phibal12/Presentations/IDSS_proj.pptx Ask authors for
full code and/or other files
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report covers an intelligent decision support system (IDSS), which
handles an efficient and effective way to rapidly inspect containerized cargos
for defection. Defection is either cargo exposure to radiation, physical
damages such as holes, punctured surfaces, iron surface oxidation, etc. The
system uses a sorting array triangulation technique (SAT) and surface damage
detection (SDD) to conduct the inspection. This new technique saves time and
money on finding damaged goods during transportation such that, instead of
running $n$ inspections on $n$ containers, only 3 inspections per triangulation
or a ratio of $3:n$ is required, assuming $n > 3$ containers. The damaged stack
in the array is virtually detected contiguous to an actually-damaged cargo by
calculating nearby distances of such cargos, delivering reliable estimates for
the whole local stack population. The estimated values on damaged, somewhat
damaged and undamaged cargo stacks, are listed and profiled after being sorted
by the program, thereby submitted to the manager for a final decision. The
report describes the problem domain and the implementation of the simulator
prototype, showing how the system operates via software, hardware with/without
human agents, conducting real-time inspections and management per se.
|
[
{
"version": "v1",
"created": "Fri, 5 Jun 2015 22:56:18 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Jun 2015 20:49:46 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Alipour",
"Philip B.",
""
],
[
"Magnusson",
"Matteus",
""
],
[
"Olsson",
"Martin W.",
""
],
[
"Ghasemi",
"Nooshin H.",
""
],
[
"Henesey",
"Lawrence",
""
]
] |
new_dataset
| 0.998807 |
1506.04228
|
Grigor Iliev
|
Grigor Iliev, Nadezhda Borisova, Elena Karashtranova, Dafina
Kostadinova
|
A Publicly Available Cross-Platform Lemmatizer for Bulgarian
|
5 pages, Sixth International Scientific Conference - FMNS2015
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our dictionary-based lemmatizer for the Bulgarian language presented here is
distributed as free software, publicly available to download and use under the
GPL v3 license. The presented software is written entirely in Java and is
distributed as a GATE plugin. To our best knowledge, at the time of writing
this article, there are not any other free lemmatization tools specifically
targeting the Bulgarian language. The presented lemmatizer is a work in
progress and currently yields an accuracy of about 95% in comparison to the
manually annotated corpus BulTreeBank-Morph, which contains 273933 tokens.
|
[
{
"version": "v1",
"created": "Sat, 13 Jun 2015 05:47:50 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Iliev",
"Grigor",
""
],
[
"Borisova",
"Nadezhda",
""
],
[
"Karashtranova",
"Elena",
""
],
[
"Kostadinova",
"Dafina",
""
]
] |
new_dataset
| 0.995774 |
1506.04498
|
Satoshi Egi
|
Satoshi Egi
|
Egison: Non-Linear Pattern-Matching against Non-Free Data Types
|
9 pages. arXiv admin note: text overlap with arXiv:1407.0729
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces the Egison programming language whose feature is strong
pattern-matching facility against not only algebraic data types but also
non-free data types whose data have multiple ways of representation such as
sets and graphs. Our language supports multiple occurrences of the same
variables in a pattern, multiple results of pattern-matching, polymorphism of
pattern-constructors and loop-patterns, patterns that contain "and-so-forth"
whose repeat count can be changed by the parameter. This paper proposes the way
to design expressions that have all these features and demonstrates how these
features are useful to express programs concise. Egison has already implemented
in Haskell.
|
[
{
"version": "v1",
"created": "Mon, 15 Jun 2015 07:48:14 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Egi",
"Satoshi",
""
]
] |
new_dataset
| 0.97658 |
1506.04549
|
Moritz Horsch
|
Moritz Horsch, Andreas H\"ulsing, Johannes Buchmann
|
PALPAS - PAsswordLess PAssword Synchronization
|
An extended abstract of this work appears in the proceedings of ARES
2015
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tools that synchronize passwords over several user devices typically store
the encrypted passwords in a central online database. For encryption, a
low-entropy, password-based key is used. Such a database may be subject to
unauthorized access which can lead to the disclosure of all passwords by an
offline brute-force attack. In this paper, we present PALPAS, a secure and
user-friendly tool that synchronizes passwords between user devices without
storing information about them centrally. The idea of PALPAS is to generate a
password from a high entropy secret shared by all devices and a random salt
value for each service. Only the salt values are stored on a server but not the
secret. The salt enables the user devices to generate the same password but is
statistically independent of the password. In order for PALPAS to generate
passwords according to different password policies, we also present a mechanism
that automatically retrieves and processes the password requirements of
services. PALPAS users need to only memorize a single password and the setup of
PALPAS on a further device demands only a one-time transfer of few static data.
|
[
{
"version": "v1",
"created": "Mon, 15 Jun 2015 11:01:04 GMT"
}
] | 2015-06-16T00:00:00 |
[
[
"Horsch",
"Moritz",
""
],
[
"Hülsing",
"Andreas",
""
],
[
"Buchmann",
"Johannes",
""
]
] |
new_dataset
| 0.999423 |
1302.3412
|
Minglai Cai
|
Holger Boche, Minglai Cai, Ning Cai, Christian Deppe
|
Secrecy capacities of compound quantum wiretap channels and applications
|
We revised and improved our paper arXiv:1208.1151. We added a new
result for capacity and a new section for applications. arXiv admin note:
text overlap with arXiv:1202.0773. Published in the 1 May 2014 issue of
Physical Review A, Vol.89, No.5
| null |
10.1103/PhysRevA.89.052320
| null |
cs.IT math.IT quant-ph
|
http://creativecommons.org/licenses/by/3.0/
|
We determine the secrecy capacity of the compound channel with quantum
wiretapper and channel state information at the transmitter. Moreover, we
derive a lower bound on the secrecy capacity of this channel without channel
state information and determine the secrecy capacity of the compound
classical-quantum wiretap channel with channel state information at the
transmitter. We use this result to derive a new proof for a lower bound on the
entanglement generating capacity of compound quantum channel. We also derive a
new proof for the entanglement generating capacity of compound quantum channel
with channel state information at the encoder.
|
[
{
"version": "v1",
"created": "Thu, 14 Feb 2013 14:40:20 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Feb 2013 16:33:45 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Jul 2013 08:55:48 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Oct 2013 11:01:02 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Jun 2014 12:55:14 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Boche",
"Holger",
""
],
[
"Cai",
"Minglai",
""
],
[
"Cai",
"Ning",
""
],
[
"Deppe",
"Christian",
""
]
] |
new_dataset
| 0.963374 |
1303.3251
|
Li Xiao
|
Li Xiao, Xiang-Gen Xia, and Wenjie Wang
|
Multi-Stage Robust Chinese Remainder Theorem
|
26 pages, 2 figures
| null |
10.1109/TSP.2014.2339798
| null |
cs.IT cs.CE cs.CR math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is well-known that the traditional Chinese remainder theorem (CRT) is not
robust in the sense that a small error in a remainder may cause a large error
in the reconstruction solution. A robust CRT was recently proposed for a
special case when the greatest common divisor (gcd) of all the moduli is more
than 1 and the remaining integers factorized by the gcd of all the moduli are
co-prime. In this special case, a closed-form reconstruction from erroneous
remainders was proposed and a necessary and sufficient condition on the
remainder errors was obtained. It basically says that the reconstruction error
is upper bounded by the remainder error level $\tau$ if $\tau$ is smaller than
a quarter of the gcd of all the moduli. In this paper, we consider the robust
reconstruction problem for a general set of moduli. We first present a
necessary and sufficient condition for the remainder errors for a robust
reconstruction from erroneous remainders with a general set of muduli and also
a corresponding robust reconstruction method. This can be thought of as a
single stage robust CRT. We then propose a two-stage robust CRT by grouping the
moduli into several groups as follows. First, the single stage robust CRT is
applied to each group. Then, with these robust reconstructions from all the
groups, the single stage robust CRT is applied again across the groups. This is
then easily generalized to multi-stage robust CRT. Interestingly, with this
two-stage robust CRT, the robust reconstruction holds even when the remainder
error level $\tau$ is above the quarter of the gcd of all the moduli. In this
paper, we also propose an algorithm on how to group a set of moduli for a
better reconstruction robustness of the two-stage robust CRT in some special
cases.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 19:02:36 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Xiao",
"Li",
""
],
[
"Xia",
"Xiang-Gen",
""
],
[
"Wang",
"Wenjie",
""
]
] |
new_dataset
| 0.997723 |
1304.6763
|
Joakim And\'en
|
Joakim And\'en, St\'ephane Mallat
|
Deep Scattering Spectrum
| null | null |
10.1109/TSP.2014.2326991
| null |
cs.SD cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A scattering transform defines a locally translation invariant representation
which is stable to time-warping deformations. It extends MFCC representations
by computing modulation spectrum coefficients of multiple orders, through
cascades of wavelet convolutions and modulus operators. Second-order scattering
coefficients characterize transient phenomena such as attacks and amplitude
modulation. A frequency transposition invariant representation is obtained by
applying a scattering transform along log-frequency. State-the-of-art
classification results are obtained for musical genre and phone classification
on GTZAN and TIMIT databases, respectively.
|
[
{
"version": "v1",
"created": "Wed, 24 Apr 2013 21:50:03 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jan 2014 20:35:56 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Andén",
"Joakim",
""
],
[
"Mallat",
"Stéphane",
""
]
] |
new_dataset
| 0.979979 |
1411.6675
|
Federico Leva
|
Federico Leva
|
From orphan works, a new role of libraries for the public domain and
public interest (Dalle opere orfane, un nuovo ruolo delle biblioteche per il
pubblico dominio e l'utilit\`a sociale)
|
17 pages, 7 figures. Text in Italian. Preprint for digitalia.sbn.it.
Second revision corrected some misunderstandings. ODT, PNG sources. Keywords:
copyright; public domain; digital libraries; european union; directive
2012/28/eu; orphan works; hostage works; mass-digitization; Google Books;
Internet Archive
| null | null | null |
cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
Summarising the new orphan works law of Italy, we show how it makes the
public interest prevail and allows libraries and other beneficiaries to improve
their services. We then argue that such services are part of their mission
towards the public domain and are a first step for its complete accomplishment,
by the work of each and a reform of european copyright. Failing that, European
culture will disappear.
--
Sintetizzando le nuove norme sulle opere orfane, mostriamo come esse
affermino la prevalenza dell'interesse pubblico e consentano a biblioteche e
altri enti beneficiari di migliorare i propri servizi. Sosteniamo quindi che
questi si inquadrano nella loro missione nei confronti del pubblico dominio e
sono un primo passo per la sua completa realizzazione, mediante il lavoro di
ciascuno e la riforma del diritto d'autore europeo. In caso contrario, la
cultura europea sparir\`a.
|
[
{
"version": "v1",
"created": "Mon, 24 Nov 2014 22:36:58 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Nov 2014 09:13:09 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Leva",
"Federico",
""
]
] |
new_dataset
| 0.996135 |
1501.01436
|
Jianghao He
|
Jianghao He and Soung-Chang Liew
|
ARQ for Physical-layer Network Coding
|
34 pages, 6 figures, 10 Tables,Technical Report
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates ARQ (Automatic Repeat request) designs for PNC
(Physical-layer Network Coding) systems. We have previously found that, besides
TWRC (Two-Way Relay Channel) operated on the principle of PNC, there are many
other PNC building blocks--building blocks are simple small network structures
that can be used to construct a large network. In some of these PNC building
blocks, receivers can obtain side information through overhearing. Although
such overheard information is not the target information that the receivers
desire, the receivers can exploit the overheard information together with a
network-coded packet received to obtain a desired native packet. This leads to
throughput gain. Our previous study, however, assumed what is sent always get
received. In practice, that is not the case. Error control is needed to ensure
reliable communication. This paper focuses on the use of ARQ to ensure reliable
PNC communication. The availability of overheard Information and its potential
exploitation make the ARQ design of a network-coded system different from that
of a non-network-coded system. In this paper, we lay out the fundamental
considerations for such ARQ design: 1) We address how to track the stored coded
packets and overheard packets to increase the chance of packet extraction, and
derive the throughput gain achieved by tracking 2) We investigate two
variations of PNC ARQ, coupled and non-coupled ARQs, and prove that non-coupled
ARQ is more efficient; 3) We show how to optimize parameters in PNC
ARQ--specifically the window size and ACK frequency--to minimize the throughput
degradation caused by ACK feedback overhead and wasteful retransmissions due to
lost ACK.
|
[
{
"version": "v1",
"created": "Wed, 7 Jan 2015 10:50:42 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jun 2015 10:07:35 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"He",
"Jianghao",
""
],
[
"Liew",
"Soung-Chang",
""
]
] |
new_dataset
| 0.996201 |
1506.02568
|
Hao Chen
|
Liqing Xu and Hao Chen
|
Deterministic Construction of RIP Matrices in Compressed Sensing from
Constant Weight Codes
|
11 pages, submitted
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The expicit restricted isometry property (RIP) measurement matrices are
needed in practical application of compressed sensing in signal processing. RIP
matrices from Reed-Solomon codes, BCH codes, orthogonal codes, expander graphs
have been proposed and analysised. On the other hand binary constant weight
codes have been studied for many years and many optimal or near-optimal small
weight and ditance constant weight codes have been determined. In this paper we
propose a new deterministic construction of RIP measurement matrices in
compressed sensing from binary and ternary contant weight codes. The sparse
orders and the number of budged rows in the new constant-weight-code-based RIP
matrices can be arbitrary. These contant-weight-code based RIP matrices have
better parameters compared with the DeVore RIP matrices when the sizes are
small.
|
[
{
"version": "v1",
"created": "Mon, 8 Jun 2015 16:15:16 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jun 2015 04:32:15 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Xu",
"Liqing",
""
],
[
"Chen",
"Hao",
""
]
] |
new_dataset
| 0.96648 |
1506.03830
|
Juan Manuel R. Mosso Sr.
|
Juan Manuel R. Mosso
|
Ciberseguridad Inteligente
|
21 pages, in Spanish
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Internet Economy has a strong dependency on cyberspace. This raises
security risk scenarios due to the increasing number of vulnerabilities and the
increased frequency and sophistication of cyber attacks, especially with the
advent of advanced threats of APT type. This paper presents a model of
Intelligent Cybersecurity (ICS) for detect, deny, disrupt, degrade, deceive and
destroy enemy capabilities in cyberspace. This is achieved through the
conceptual and technical development of a Capacity for Cyber Intelligence (CCI)
which aims to interfere destructively C2 capabilities of the adversary,
penetrating its decision loops with the speed necessary to displace him to a
reactive posture. Finally, unlike the security models raised classically, the
concept of ICSI suggests that the advantage in the conflict can be obtained by
defense and not always by the attacker. As theoretical support, the "Offensive
System Reference Model" (OSRM) is presented, which is used to think cyber
conflict at all levels, from a perspective coordinated and synchronized with
the rest of the traditional forces under the present set; and a justification
of the capacity from the modern perspective C2.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 20:44:15 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Mosso",
"Juan Manuel R.",
""
]
] |
new_dataset
| 0.999639 |
1506.04051
|
Lucia Maddalena
|
Lucia Maddalena and Alfredo Petrosino
|
Towards Benchmarking Scene Background Initialization
|
6 pages, SBI dataset, SBMI2015 Workshop
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Given a set of images of a scene taken at different times, the availability
of an initial background model that describes the scene without foreground
objects is the prerequisite for a wide range of applications, ranging from
video surveillance to computational photography. Even though several methods
have been proposed for scene background initialization, the lack of a common
groundtruthed dataset and of a common set of metrics makes it difficult to
compare their performance. To move first steps towards an easy and fair
comparison of these methods, we assembled a dataset of sequences frequently
adopted for background initialization, selected or created ground truths for
quantitative evaluation through a selected suite of metrics, and compared
results obtained by some existing methods, making all the material publicly
available.
|
[
{
"version": "v1",
"created": "Fri, 12 Jun 2015 15:52:46 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Maddalena",
"Lucia",
""
],
[
"Petrosino",
"Alfredo",
""
]
] |
new_dataset
| 0.988191 |
1506.04094
|
Saeedeh Shekarpour
|
Christoph Lange, Saeedeh Shekarpour, Soren Auer
|
The WDAqua ITN: Answering Questions using Web Data
| null | null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WDAqua is a Marie Curie Innovative Training Network (ITN) and is funded under
EU grant number 642795 and runs from January 2015 to December 2018. WDAqua aims
at advancing the state of the art by intertwining training, research and
innovation efforts, centered around one service: data-driven question
answering. Question answering is immediately useful to a wide audience of end
users, and we will demonstrate this in settings including e-commerce, public
sector information, publishing and smart cities. Question answering also covers
web science and data science broadly, leading to transferrable research results
and to transferrable skills of the researchers who have finished our training
programme. To ensure that our research improves question answering overall,
every individual research project connects at least two of these steps.
Intersectional secondments (within a consortium covering academia, research
institutes and industrial research as well as network-wide workshops, R and D
challenges and innovation projects further balance ground-breaking research and
the needs of society and industry. Training-wise these offers equip early stage
researchers with the expertise and transferable technical and non-technical
skills that will allow them to pursue a successful career as an academic,
decision maker, practitioner or entrepreneur.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 10:56:33 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Lange",
"Christoph",
""
],
[
"Shekarpour",
"Saeedeh",
""
],
[
"Auer",
"Soren",
""
]
] |
new_dataset
| 0.998854 |
1506.04104
|
Georgios Kontaxis
|
Georgios Kontaxis and Monica Chew
|
Tracking Protection in Firefox For Privacy and Performance
|
In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy
(W2SP) 2015. Awarded Best Paper prize at workshop
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Tracking Protection in the Mozilla Firefox web browser. Tracking
Protection is a new privacy technology to mitigate invasive tracking of users'
online activity by blocking requests to tracking domains. We evaluate our
approach and demonstrate a 67.5% reduction in the number of HTTP cookies set
during a crawl of the Alexa top 200 news sites. Since Firefox does not download
and render content from tracking domains, Tracking Protection also enjoys
performance benefits of a 44% median reduction in page load time and 39%
reduction in data usage in the Alexa top 200 news sites.
|
[
{
"version": "v1",
"created": "Fri, 12 Jun 2015 18:41:32 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Kontaxis",
"Georgios",
""
],
[
"Chew",
"Monica",
""
]
] |
new_dataset
| 0.996816 |
1506.04110
|
Amit Levy
|
Amit Levy, Henry Corrigan-Gibbs and Dan Boneh
|
Stickler: Defending Against Malicious CDNs in an Unmodified Browser
|
In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy
(W2SP) 2015
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Website publishers can derive enormous performance benefits and cost savings
by directing traffic to their sites through content distribution networks
(CDNs). However, publishers who use CDNs today must trust their CDN not to
modify the site's JavaScript, CSS, images or other media en route to end users.
A CDN that violates this trust could inject ads into websites, downsample media
to save bandwidth or, worse, inject malicious JavaScript code to steal user
secrets it could not otherwise access. We present Stickler, a system for
website publishers that guarantees the end-to-end authenticity of content
served to end users while simultaneously allowing publishers to reap the
benefits of CDNs. Crucially, Stickler achieves these guarantees without
requiring modifications to the browser.
|
[
{
"version": "v1",
"created": "Fri, 12 Jun 2015 18:47:19 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Levy",
"Amit",
""
],
[
"Corrigan-Gibbs",
"Henry",
""
],
[
"Boneh",
"Dan",
""
]
] |
new_dataset
| 0.994169 |
1506.04115
|
Griffin Boyce
|
Paul Syverson and Griffin Boyce
|
Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
|
In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy
(W2SP) 2015
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tor is a communications infrastructure widely used for unfettered and
anonymous access to Internet websites. Tor is also used to access sites on the
.onion virtual domain. The focus of .onion use and discussion has traditionally
been on the offering of hidden services, services that separate their
reachability from the identification of their IP addresses. We argue that Tor's
.onion system can be used to provide an entirely separate benefit: basic
website authentication. We also argue that not only can onionsites provide
website authentication, but doing so is easy, fast, cheap, flexible and secure
when compared to alternatives such as the standard use of TLS with
certificates.
|
[
{
"version": "v1",
"created": "Fri, 12 Jun 2015 18:55:44 GMT"
}
] | 2015-06-15T00:00:00 |
[
[
"Syverson",
"Paul",
""
],
[
"Boyce",
"Griffin",
""
]
] |
new_dataset
| 0.997304 |
0909.1381
|
Goutam Paul
|
Sayan Bhattacharya, Goutam Paul, Swagato Sanyal
|
On Necessary and Sufficient Number of Cops in the Game of Cops and
Robber in Multidimensional Grids
|
This is a revised and extended version of the poster paper with the
same title that has been presented in the 8th Asian Symposium on Computer
Mathematics (ASCM), December 15-17, 2007, Singapore
|
Discrete Applied Mathematics, pages 1745--1751, vol. 158, no. 16,
August 2010
|
10.1016/j.dam.2010.06.014
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We theoretically analyze the Cops and Robber Game for the first time in a
multidimensional grid. It is shown that for an $n$-dimensional grid, at least
$n$ cops are necessary to ensure capture of the robber. We also present a set
of cop strategies for which $n$ cops are provably sufficient to catch the
robber. Further, for two-dimensional grid, we provide an efficient cop strategy
for which the robber is caught even by a single cop under certain conditions.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 03:55:29 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Bhattacharya",
"Sayan",
""
],
[
"Paul",
"Goutam",
""
],
[
"Sanyal",
"Swagato",
""
]
] |
new_dataset
| 0.98855 |
1212.1790
|
Muhammad Fahad Khan
|
Faisal Baig, Saira Beg, Muhammad Fahad Khan
|
Controlling Home Appliances Remotely through Voice Command
|
4 pages, 4, figures, International Journal of Computer Applications
| null |
10.5120/7437-0133
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Controlling appliances is a main part of automation. The main object of Home
automation is to provide a wireless communication link of home appliances to
the remote user. The main objective of this work is to make such a system which
controls the home appliances remotely. This paper discusses two methods of
controlling home appliances one is via voice to text SMS and other is to use
the mobile as a remote control, this system will provide a benefit to the
elderly and disable people and also to those who are unaware of typing an SMS.
|
[
{
"version": "v1",
"created": "Sat, 8 Dec 2012 13:38:19 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Baig",
"Faisal",
""
],
[
"Beg",
"Saira",
""
],
[
"Khan",
"Muhammad Fahad",
""
]
] |
new_dataset
| 0.998799 |
1301.4773
|
Tao Feng
|
Tao Feng, Ka Hin Leung, Qing Xiang
|
Binary Cyclic codes with two primitive nonzeros
|
11 pages, submitted to the special volumn of Science Sinica
Mathematics on Coding, Cryptography and Combinatorics
| null |
10.1007/s11425-013-4668-z
| null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we make some progress towards a well-known conjecture on the
minimum weights of binary cyclic codes with two primitive nonzeros. We also
determine the Walsh spectrum of $\Tr(x^d)$ over $\F_{2^{m}}$ in the case where
$m=2t$, $d=3+2^{t+1}$ and $\gcd(d, 2^{m}-1)=1$.
|
[
{
"version": "v1",
"created": "Mon, 21 Jan 2013 07:46:02 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Feng",
"Tao",
""
],
[
"Leung",
"Ka Hin",
""
],
[
"Xiang",
"Qing",
""
]
] |
new_dataset
| 0.994157 |
1310.1294
|
Marc Vuffray
|
Nicolas Macris and Marc Vuffray
|
The Bethe Free Energy Allows to Compute the Conditional Entropy of
Graphical Code Instances. A Proof from the Polymer Expansion
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main objective of this paper is to explore the precise relationship
between the Bethe free energy (or entropy) and the Shannon conditional entropy
of graphical error correcting codes. The main result shows that the Bethe free
energy associated with a low-density parity-check code used over a binary
symmetric channel in a large noise regime is, with high probability,
asymptotically exact as the block length grows. To arrive at this result we
develop new techniques for rather general graphical models based on the loop
sum as a starting point and the polymer expansion from statistical mechanics.
The true free energy is computed as a series expansion containing the Bethe
free energy as its zero-th order term plus a series of corrections. It is
easily seen that convergence criteria for such expansions are satisfied for
general high-temperature models. We apply these general results to ensembles of
low-density generator-matrix and parity-check codes. While the application to
generator-matrix codes follows standard "high temperature" methods, the case of
parity-check codes requires non-trivial new ideas because the hard constraints
correspond to a zero-temperature regime. Nevertheless one can combine the
polymer expansion with expander and counting arguments to show that the
difference between the true and Bethe free energies vanishes with high
probability in the large block
|
[
{
"version": "v1",
"created": "Fri, 4 Oct 2013 14:37:20 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jun 2015 18:01:19 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Macris",
"Nicolas",
""
],
[
"Vuffray",
"Marc",
""
]
] |
new_dataset
| 0.994649 |
1506.03506
|
Vikram Saraph
|
Maurice Herlihy, Vikram Saraph
|
The Relative Power of Composite Loop Agreement Tasks
|
18 pages
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Loop agreement is a family of wait-free tasks that includes set agreement and
simplex agreement, and was used to prove the undecidability of wait-free
solvability of distributed tasks by read/write memory. Herlihy and Rajsbaum
defined the algebraic signature of a loop agreement task, which consists of a
group and a distinguished element. They used the algebraic signature to
characterize the relative power of loop agreement tasks. In particular, they
showed that one task implements another exactly when there is a homomorphism
between their respective signatures sending one distinguished element to the
other. In this paper, we extend the previous result by defining the composition
of multiple loop agreement tasks to create a new one with the same combined
power. We generalize the original algebraic characterization of relative power
to compositions of tasks. In this way, we can think of loop agreement tasks in
terms of their basic building blocks. We also investigate a category-theoretic
perspective of loop agreement by defining a category of loops, showing that the
algebraic signature is a functor, and proving that our definition of task
composition is the "correct" one, in a categorical sense.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 23:28:59 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Herlihy",
"Maurice",
""
],
[
"Saraph",
"Vikram",
""
]
] |
new_dataset
| 0.997753 |
1506.03540
|
Kangjin Kim
|
Kangjin Kim, Joe Campbell, William Duong, Yu Zhang and Georgios
Fainekos
|
DisCoF$^+$: Asynchronous DisCoF with Flexible Decoupling for Cooperative
Pathfinding in Distributed Systems
|
9 pages, 3 figures, in Proceedings of the IEEE International
Conference on Automation Science and Engineering, Aug. 2015
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In our prior work, we outlined an approach, named DisCoF, for cooperative
pathfinding in distributed systems with limited sensing and communication
range. Contrasting to prior works on cooperative pathfinding with completeness
guarantees, which often assume the access to global information, DisCoF does
not make this assumption. The implication is that at any given time in DisCoF,
the robots may not all be aware of each other, which is often the case in
distributed systems. As a result, DisCoF represents an inherently online
approach since coordination can only be realized in an opportunistic manner
between robots that are within each other's sensing and communication range.
However, there are a few assumptions made in DisCoF to facilitate a formal
analysis, which must be removed to work with distributed multi-robot platforms.
In this paper, we present DisCoF$^+$, which extends DisCoF by enabling an
asynchronous solution, as well as providing flexible decoupling between robots
for performance improvement. We also extend the formal results of DisCoF to
DisCoF$^+$. Furthermore, we evaluate our implementation of DisCoF$^+$ and
demonstrate a simulation of it running in a distributed multi-robot
environment. Finally, we compare DisCoF$^+$ with DisCoF in terms of plan
quality and planning performance.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 03:47:23 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Kim",
"Kangjin",
""
],
[
"Campbell",
"Joe",
""
],
[
"Duong",
"William",
""
],
[
"Zhang",
"Yu",
""
],
[
"Fainekos",
"Georgios",
""
]
] |
new_dataset
| 0.994836 |
1506.03553
|
EPTCS
|
Johan Arcile (Laboratoire IBISC, Universit\'e d'Evry-Val d'Essonne),
Jean-Yves Didier (Laboratoire IBISC, Universit\'e d'Evry-Val d'Essonne),
Hanna Klaudel (Laboratoire IBISC, Universit\'e d'Evry-Val d'Essonne), Raymond
Devillers (D\'epartement d'Informatique, Universit\'e Libre de Bruxelles),
Artur Rataj (Institute of Theoretical and Applied Computer Science)
|
Indefinite waitings in MIRELA systems
|
In Proceedings ESSS 2015, arXiv:1506.03250
|
EPTCS 184, 2015, pp. 5-18
|
10.4204/EPTCS.184.1
| null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
MIRELA is a high-level language and a rapid prototyping framework dedicated
to systems where virtual and digital objects coexist in the same environment
and interact in real time. Its semantics is given in the form of networks of
timed automata, which can be checked using symbolic methods. This paper shows
how to detect various kinds of indefinite waitings in the components of such
systems. The method is experimented using the PRISM model checker.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 06:10:32 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Arcile",
"Johan",
"",
"Laboratoire IBISC, Université d'Evry-Val d'Essonne"
],
[
"Didier",
"Jean-Yves",
"",
"Laboratoire IBISC, Université d'Evry-Val d'Essonne"
],
[
"Klaudel",
"Hanna",
"",
"Laboratoire IBISC, Université d'Evry-Val d'Essonne"
],
[
"Devillers",
"Raymond",
"",
"Département d'Informatique, Université Libre de Bruxelles"
],
[
"Rataj",
"Artur",
"",
"Institute of Theoretical and Applied Computer Science"
]
] |
new_dataset
| 0.993233 |
1506.03558
|
EPTCS
|
Chen-Wei Wang (York University), Jonathan S. Ostroff (York
University), Simon Hudon (York University)
|
Using Indexed and Synchronous Events to Model and Validate
Cyber-Physical Systems
|
In Proceedings ESSS 2015, arXiv:1506.03250
|
EPTCS 184, 2015, pp. 81-95
|
10.4204/EPTCS.184.6
| null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Timed Transition Models (TTMs) are event-based descriptions for modelling,
specifying, and verifying discrete real-time systems. An event can be
spontaneous, fair, or timed with specified bounds. TTMs have a textual syntax,
an operational semantics, and an automated tool supporting linear-time temporal
logic. We extend TTMs and its tool with two novel modelling features for
writing high-level specifications: indexed events and synchronous events.
Indexed events allow for concise description of behaviour common to a set of
actors. The indexing construct allows us to select a specific actor and to
specify a temporal property for that actor. We use indexed events to validate
the requirements of a train control system. Synchronous events allow developers
to decompose simultaneous state updates into actions of separate events. To
specify the intended data flow among synchronized actions, we use primed
variables to reference the post-state (i.e., one resulted from taking the
synchronized actions). The TTM tool automatically infers the data flow from
synchronous events, and reports errors on inconsistencies due to circular data
flow. We use synchronous events to validate part of the requirements of a
nuclear shutdown system. In both case studies, we show how the new notation
facilitates the formal validation of system requirements, and use the TTM tool
to verify safety, liveness, and real-time properties.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 06:16:40 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Wang",
"Chen-Wei",
"",
"York University"
],
[
"Ostroff",
"Jonathan S.",
"",
"York\n University"
],
[
"Hudon",
"Simon",
"",
"York University"
]
] |
new_dataset
| 0.995632 |
1506.03724
|
Punarbasu Purkayastha
|
Yeow Meng Chee, Han Mao Kiah, Punarbasu Purkayastha, Patrick Sol\'e
|
Product Construction of Affine Codes
|
13 pages, to appear in SIAM Journal on Discrete Mathematics
| null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Binary matrix codes with restricted row and column weights are a desirable
method of coded modulation for power line communication. In this work, we
construct such matrix codes that are obtained as products of affine codes -
cosets of binary linear codes. Additionally, the constructions have the
property that they are systematic. Subsequently, we generalize our construction
to irregular product of affine codes, where the component codes are affine
codes of different rates.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 16:04:20 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Chee",
"Yeow Meng",
""
],
[
"Kiah",
"Han Mao",
""
],
[
"Purkayastha",
"Punarbasu",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.999282 |
1506.03799
|
Amin Jourabloo
|
Amin Jourabloo, Xiaoming Liu
|
Pose-Invariant 3D Face Alignment
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Face alignment aims to estimate the locations of a set of landmarks for a
given image. This problem has received much attention as evidenced by the
recent advancement in both the methodology and performance. However, most of
the existing works neither explicitly handle face images with arbitrary poses,
nor perform large-scale experiments on non-frontal and profile face images. In
order to address these limitations, this paper proposes a novel face alignment
algorithm that estimates both 2D and 3D landmarks and their 2D visibilities for
a face image with an arbitrary pose. By integrating a 3D deformable model, a
cascaded coupled-regressor approach is designed to estimate both the camera
projection matrix and the 3D landmarks. Furthermore, the 3D model also allows
us to automatically estimate the 2D landmark visibilities via surface normals.
We gather a substantially larger collection of all-pose face images to evaluate
our algorithm and demonstrate superior performances than the state-of-the-art
methods.
|
[
{
"version": "v1",
"created": "Thu, 11 Jun 2015 19:45:13 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Jourabloo",
"Amin",
""
],
[
"Liu",
"Xiaoming",
""
]
] |
new_dataset
| 0.998725 |
1208.4048
|
Zhengzheng Xiang
|
Zhengzheng Xiang, Meixia Tao, Jianhua Mo, and Xiaodong Wang
|
Degrees of Freedom for MIMO Two-Way X Relay Channel
|
28 pages, 6 figures
| null |
10.1109/TSP.2013.2238535
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the degrees of freedom (DOF) of a multiple-input multiple-output
(MIMO) two-way X relay channel, where there are two groups of source nodes and
one relay node, each equipped with multiple antennas, and each of the two
source nodes in one group exchanges independent messages with the two source
nodes in the other group via the relay node. It is assumed that every source
node is equipped with M antennas while the relay is equipped with N antennas.
We first show that the upper bound on the total DOF for this network is
2min{2M,N} and then focus on the case of N \leq 2M so that the DOF is upper
bounded by the number of antennas at the relay. By applying signal alignment
for network coding and joint transceiver design for interference cancellation,
we show that this upper bound can be achieved when N \leq8M/5. We also show
that with signal alignment only but no joint transceiver design, the upper
bound is achievable when N\leq4M/3. Simulation results are provided to
corroborate the theoretical results and to demonstrate the performance of the
proposed scheme in the finite signal-to-noise ratio regime.
|
[
{
"version": "v1",
"created": "Mon, 20 Aug 2012 16:19:31 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Dec 2012 01:58:08 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Xiang",
"Zhengzheng",
""
],
[
"Tao",
"Meixia",
""
],
[
"Mo",
"Jianhua",
""
],
[
"Wang",
"Xiaodong",
""
]
] |
new_dataset
| 0.997835 |
1210.8129
|
Sunil K. Narang
|
Sunil K. Narang and Antonio Ortega
|
Compact Support Biorthogonal Wavelet Filterbanks for Arbitrary
Undirected Graphs
|
Submitted for review in IEEE TSP
| null |
10.1109/TSP.2013.2273197
| null |
cs.IT cs.DC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In our recent work, we proposed the design of perfect reconstruction
orthogonal wavelet filterbanks, called graph- QMF, for arbitrary undirected
weighted graphs. In that formulation we first designed "one-dimensional"
two-channel filterbanks on bipartite graphs, and then extended them to
"multi-dimensional" separable two-channel filterbanks for arbitrary graphs via
a bipartite subgraph decomposition. We specifically designed wavelet filters
based on the spectral decomposition of the graph, and stated necessary and
sufficient conditions for a two-channel graph filter-bank on bipartite graphs
to provide aliasing-cancellation, perfect reconstruction and orthogonal set of
basis (orthogonality). While, the exact graph-QMF designs satisfy all the above
conditions, they are not exactly k-hop localized on the graph. In this paper,
we relax the condition of orthogonality to design a biorthogonal pair of
graph-wavelets that can have compact spatial spread and still satisfy the
perfect reconstruction conditions. The design is analogous to the standard
Cohen-Daubechies-Feauveau's (CDF) construction of factorizing a maximally-flat
Daubechies half-band filter. Preliminary results demonstrate that the proposed
filterbanks can be useful for both standard signal processing applications as
well as for signals defined on arbitrary graphs.
Note: Code examples from this paper are available at
http://biron.usc.edu/wiki/index.php/Graph Filterbanks
|
[
{
"version": "v1",
"created": "Tue, 30 Oct 2012 19:33:35 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Nov 2012 19:29:19 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Narang",
"Sunil K.",
""
],
[
"Ortega",
"Antonio",
""
]
] |
new_dataset
| 0.996391 |
1210.8181
|
Hendrik vom Lehn
|
Jeroen van den Hoven, Dirk Helbing, Dino Pedreschi, Josep
Domingo-Ferrer, Fosca Gianotti, Markus Christen
|
FuturICT - The Road towards Ethical ICT
|
arXiv admin note: text overlap with arXiv:1012.0178
| null |
10.1140/epjst/e2012-01691-2
| null |
cs.CY cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The pervasive use of information and communication technology (ICT) in modern
societies enables countless opportunities for individuals, institutions,
businesses and scientists, but also raises difficult ethical and social
problems. In particular, ICT helped to make societies more complex and thus
harder to understand, which impedes social and political interventions to avoid
harm and to increase the common good. To overcome this obstacle, the
large-scale EU flagship proposal FuturICT intends to create a platform for
accessing global human knowledge as a public good and instruments to increase
our understanding of the information society by making use of ICT-based
research. In this contribution, we outline the ethical justification for such
an endeavor. We argue that the ethical issues raised by FuturICT research
projects overlap substantially with many of the known ethical problems emerging
from ICT use in general. By referring to the notion of Value Sensitive Design,
we show for the example of privacy how this core value of responsible ICT can
be protected in pursuing research in the framework of FuturICT. In addition, we
discuss further ethical issues and outline the institutional design of FuturICT
allowing to address them.
|
[
{
"version": "v1",
"created": "Tue, 30 Oct 2012 21:44:43 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Hoven",
"Jeroen van den",
""
],
[
"Helbing",
"Dirk",
""
],
[
"Pedreschi",
"Dino",
""
],
[
"Domingo-Ferrer",
"Josep",
""
],
[
"Gianotti",
"Fosca",
""
],
[
"Christen",
"Markus",
""
]
] |
new_dataset
| 0.998762 |
1412.7449
|
Oriol Vinyals
|
Oriol Vinyals, Lukasz Kaiser, Terry Koo, Slav Petrov, Ilya Sutskever,
Geoffrey Hinton
|
Grammar as a Foreign Language
| null | null | null | null |
cs.CL cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Syntactic constituency parsing is a fundamental problem in natural language
processing and has been the subject of intensive research and engineering for
decades. As a result, the most accurate parsers are domain specific, complex,
and inefficient. In this paper we show that the domain agnostic
attention-enhanced sequence-to-sequence model achieves state-of-the-art results
on the most widely used syntactic constituency parsing dataset, when trained on
a large synthetic corpus that was annotated using existing parsers. It also
matches the performance of standard parsers when trained only on a small
human-annotated dataset, which shows that this model is highly data-efficient,
in contrast to sequence-to-sequence models without the attention mechanism. Our
parser is also fast, processing over a hundred sentences per second with an
unoptimized CPU implementation.
|
[
{
"version": "v1",
"created": "Tue, 23 Dec 2014 17:16:24 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Feb 2015 03:16:54 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Jun 2015 22:41:07 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Vinyals",
"Oriol",
""
],
[
"Kaiser",
"Lukasz",
""
],
[
"Koo",
"Terry",
""
],
[
"Petrov",
"Slav",
""
],
[
"Sutskever",
"Ilya",
""
],
[
"Hinton",
"Geoffrey",
""
]
] |
new_dataset
| 0.985032 |
1506.01498
|
Chunlei Liu
|
Chunlei Liu
|
Gold type codes of higher relative dimension
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some new Gold type codes of higher relative dimension are introduced. Their
weight distribution is determined.
|
[
{
"version": "v1",
"created": "Thu, 4 Jun 2015 08:07:21 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2015 08:18:04 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Liu",
"Chunlei",
""
]
] |
new_dataset
| 0.962784 |
1506.02204
|
Chunlei Liu
|
Chunlei Liu
|
Kasami type codes of higher relative dimension
|
arXiv admin note: substantial text overlap with arXiv:1506.01498
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some new Kasami type codes of higher relative dimension is introduced. Their
weight distribution is determined.
|
[
{
"version": "v1",
"created": "Sun, 7 Jun 2015 00:55:41 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2015 08:53:05 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Liu",
"Chunlei",
""
]
] |
new_dataset
| 0.996475 |
1506.03104
|
James Peirce Jr.
|
Eric Eager, Megan Eberle and James Peirce
|
How Infectious Was #Deflategate?
|
12 pages, 4 figures
| null | null | null |
cs.SI physics.soc-ph q-bio.PE stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
On Monday January 19, 2015 a story broke that the National Football League
(NFL) had started an investigation into whether the New England Patriots
deliberately deflated the footballs they used during their championship win
over the Indianapolis Colts. Like an infectious disease, discussion regarding
Deflategate grew rapidly on social media sites in the hours and days after the
release of the story. However, after the Super Bowl was over, the scandal
slowly began to dissipate and lost much of the attention it had originally had,
as interest in the NFL wained at the completion of its season. We construct a
simple epidemic model for the infectiousness of the Deflategate news story. We
then use data from the social media site Twitter to estimate the parameters of
this model using standard techniques from the study of inverse problems. We
find that the infectiousness (as measured by the basic reproduction number) of
Deflategate rivals that of any infectious disease that we are aware of, and is
actually more infectious than recent news stories of greater importance - both
in terms of the basic reproduction number and in terms of the average amount of
time the average tweeter continued to tweet about the news story.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 21:09:53 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Eager",
"Eric",
""
],
[
"Eberle",
"Megan",
""
],
[
"Peirce",
"James",
""
]
] |
new_dataset
| 0.998816 |
1506.03128
|
Jani Biju Babjan
|
Jani Biju Babjan
|
License Plate Recognition System Based on Color Coding Of License Plates
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
License Plate Recognition Systems are used to determine the license plate
number of a vehicle. The current system mainly uses Optical Character
Recognition to recognize the number plate. There are several problems to this
system. Some of them include interchanging of several letters or numbers
(letter O with digit 0), difficulty in localizing the license plate, high error
rate, use of different fonts in license plates etc. So a new system to
recognize the license plate number using color coding of license plates is
proposed in this paper. Easier localization of license plate can be done by
searching for the start or stop patters of license plates. An eight segment
display system along with traditional numbering with the first and last
segments left for start or stop patterns is proposed in this paper. Practical
applications include several areas under Internet of Things (IoT).
|
[
{
"version": "v1",
"created": "Mon, 8 Jun 2015 15:44:29 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Babjan",
"Jani Biju",
""
]
] |
new_dataset
| 0.998672 |
1506.03184
|
Cong Yao
|
Xinyu Zhou and Shuchang Zhou and Cong Yao and Zhimin Cao and Qi Yin
|
ICDAR 2015 Text Reading in the Wild Competition
|
3 pages, 2 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, text detection and recognition in natural scenes are becoming
increasing popular in the computer vision community as well as the document
analysis community. However, majority of the existing ideas, algorithms and
systems are specifically designed for English. This technical report presents
the final results of the ICDAR 2015 Text Reading in the Wild (TRW 2015)
competition, which aims at establishing a benchmark for assessing detection and
recognition algorithms devised for both Chinese and English scripts and
providing a playground for researchers from the community. In this article, we
describe in detail the dataset, tasks, evaluation protocols and participants of
this competition, and report the performance of the participating methods.
Moreover, promising directions for future research are discussed.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 06:46:55 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Zhou",
"Xinyu",
""
],
[
"Zhou",
"Shuchang",
""
],
[
"Yao",
"Cong",
""
],
[
"Cao",
"Zhimin",
""
],
[
"Yin",
"Qi",
""
]
] |
new_dataset
| 0.999639 |
1506.03237
|
Adebayo Omotosho Mr
|
Mikail Olaniyi, Adebayo Omotosho, Esther Oluwatosin, Michael Adegoke,
Tomi Akinmukomi
|
Students Exeat Monitoring System Using Fingerprint Biometric
Authentication and Mobile Short Message Service
|
The Don Bosco International Journal of ICT and Youth Development 2012
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Exeat is a generic term commonly used to describe a period of absence from a
centre of learning either for entire day, or parts of a day for appointments,
interviews, open days and other fixtures in privately owned academic
environment. The current method of monitoring students movement is inefficient
and brings difficulty to the University Halls management checking students exit
or entry into the halls of residence as well as impersonation. By using nexus
combination of Ubiquitous Mobile Computing Technology through Mobile Short
Message Service and biometric fingerprint approach exeat management and
monitoring is quick and easy. Result after testing of the designed and
simulated system shows that exeat monitoring systems is less prone to forgery
as stakeholders are carried along, capable of preventing impersonation among
students, and provide absolute electronic compliance to the policy of issuing
exeat to students in the University Halls of Residence.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 09:44:35 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Olaniyi",
"Mikail",
""
],
[
"Omotosho",
"Adebayo",
""
],
[
"Oluwatosin",
"Esther",
""
],
[
"Adegoke",
"Michael",
""
],
[
"Akinmukomi",
"Tomi",
""
]
] |
new_dataset
| 0.99806 |
1506.03311
|
Konstantin Avrachenkov
|
Konstantin Avrachenkov (MAESTRO), Vikas Vikram Singh (MAESTRO)
|
Stochastic Coalitional Better-response Dynamics and Strong Nash
Equilibrium
| null | null | null | null |
cs.GT cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider coalition formation among players in an n-player finite strategic
game over infinite horizon. At each time a randomly formed coalition makes a
joint deviation from a current action profile such that at new action profile
all players from the coalition are strictly benefited. Such deviations define a
coalitional better-response (CBR) dynamics that is in general stochastic. The
CBR dynamics either converges to a strong Nash equilibrium or stucks in a
closed cycle. We also assume that at each time a selected coalition makes
mistake in deviation with small probability that add mutations (perturbations)
into CBR dynamics. We prove that all strong Nash equilibria and closed cycles
are stochastically stable, i.e., they are selected by perturbed CBR dynamics as
mutations vanish. Similar statement holds for strict strong Nash equilibrium.
We apply CBR dynamics to the network formation games and we prove that all
strongly stable networks and closed cycles are stochastically stable.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 14:04:16 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Avrachenkov",
"Konstantin",
"",
"MAESTRO"
],
[
"Singh",
"Vikas Vikram",
"",
"MAESTRO"
]
] |
new_dataset
| 0.997113 |
1506.03363
|
Tony Clark
|
Tony Clark, Paul Sammut, James Willans
|
Super-Languages: Developing Languages and Applications with XMF (Second
Edition)
| null | null | null | null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this book is to introduce the language XMF. This is done by
defining the language, providing some examples of applications that can be
written directly in the XOCL language that comes with XMF, and then by showing
how XMF can be used for language engineering. The main focus of this book is on
language engineering by example.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 15:34:58 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Clark",
"Tony",
""
],
[
"Sammut",
"Paul",
""
],
[
"Willans",
"James",
""
]
] |
new_dataset
| 0.994929 |
1506.03381
|
Tony Clark
|
Tony Clark
|
Meta-Packages: Painless Domain Specific Languages
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Domain Specific Languages are used to provide a tailored modelling notation
for a specific application domain. There are currently two main approaches to
DSLs: standard notations that are tailored by adding simple properties; new
notations that are designed from scratch. There are problems with both of these
approaches which can be addressed by providing access to a small meta-language
based on packages and classes. A meta-modelling approach based on meta-packages
allows a wide range of DSLs to be defined in a standard way. The DSLs can be
processed using standard object-based extension at the meta-level and existing
tooling can easily be defined to adapt to the new languages. This paper
introduces the concept of meta-packages and provides a simple example.
|
[
{
"version": "v1",
"created": "Wed, 10 Jun 2015 16:30:31 GMT"
}
] | 2015-06-11T00:00:00 |
[
[
"Clark",
"Tony",
""
]
] |
new_dataset
| 0.990203 |
1506.01069
|
Xinyu Wu
|
Xinyu Wu, Vishal Saxena, Kehan Zhu
|
A CMOS Spiking Neuron for Dense Memristor-Synapse Connectivity for
Brain-Inspired Computing
|
This is a preprint of an article accepted for publication in
International Joint Conference on Neural Networks (IJCNN) 2015
| null | null | null |
cs.NE cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neuromorphic systems that densely integrate CMOS spiking neurons and
nano-scale memristor synapses open a new avenue of brain-inspired computing.
Existing silicon neurons have molded neural biophysical dynamics but are
incompatible with memristor synapses, or used extra training circuitry thus
eliminating much of the density advantages gained by using memristors, or were
energy inefficient. Here we describe a novel CMOS spiking leaky
integrate-and-fire neuron circuit. Building on a reconfigurable architecture
with a single opamp, the described neuron accommodates a large number of
memristor synapses, and enables online spike timing dependent plasticity (STDP)
learning with optimized power consumption. Simulation results of an 180nm CMOS
design showed 97% power efficiency metric when realizing STDP learning in
10,000 memristor synapses with a nominal 1M{\Omega} memristance, and only
13{\mu}A current consumption when integrating input spikes. Therefore, the
described CMOS neuron contributes a generalized building block for large-scale
brain-inspired neuromorphic systems.
|
[
{
"version": "v1",
"created": "Tue, 2 Jun 2015 21:28:56 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jun 2015 21:35:19 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Wu",
"Xinyu",
""
],
[
"Saxena",
"Vishal",
""
],
[
"Zhu",
"Kehan",
""
]
] |
new_dataset
| 0.993988 |
1506.02740
|
Yiwei Zhang
|
Yiwei Zhang, Gennian Ge
|
Snake-in-the-Box Codes for Rank Modulation under Kendall's $\tau$-Metric
|
arXiv admin note: text overlap with arXiv:1311.4703 by other authors
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a Gray code in the scheme of rank modulation for flash memories, the
codewords are permutations and two consecutive codewords are obtained using a
push-to-the-top operation. We consider snake-in-the-box codes under Kendall's
$\tau$-metric, which is a Gray code capable of detecting one Kendall's
$\tau$-error. We answer two open problems posed by Horovitz and Etzion.
Firstly, we prove the validity of a construction given by them, resulting in a
snake of size $M_{2n+1}=\frac{(2n+1)!}{2}-2n+1$. Secondly, we come up with a
different construction aiming at a longer snake of size
$M_{2n+1}=\frac{(2n+1)!}{2}-2n+3$. The construction is applied successfully to
$S_7$.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 01:23:35 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Zhang",
"Yiwei",
""
],
[
"Ge",
"Gennian",
""
]
] |
new_dataset
| 0.995182 |
1506.02833
|
Albert Saa-Garriga
|
Albert Sa\`a-Garriga and David Castells-Rufas and Jordi Carrabina
|
OMP2HMPP: Compiler Framework for Energy Performance Trade-off Analysis
of Automatically Generated Codes
| null |
IJCSI International Journal of Computer Science Issues, Volume 12,
Issue 2, March 2015
| null | null |
cs.DC cs.PF cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present OMP2HMPP, a tool that, in a first step, automatically translates
OpenMP code into various possible transformations of HMPP. In a second step
OMP2HMPP executes all variants to obtain the performance and power consumption
of each transformation. The resulting trade-off can be used to choose the more
convenient version. After running the tool on a set of codes from the Polybench
benchmark we show that the best automatic transformation is equivalent to a
manual one done by an expert. Compared with original OpenMP code running in 2
quad-core processors we obtain an average speed-up of 31x and 5.86x factor in
operations per watt.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 09:24:38 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Saà-Garriga",
"Albert",
""
],
[
"Castells-Rufas",
"David",
""
],
[
"Carrabina",
"Jordi",
""
]
] |
new_dataset
| 0.989427 |
1506.02850
|
Giuseppe De Nittis
|
Nicola Basilico, Giuseppe De Nittis, Nicola Gatti
|
Adversarial patrolling with spatially uncertain alarm signals
| null | null | null | null |
cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When securing complex infrastructures or large environments, constant
surveillance of every area is not affordable. To cope with this issue, a common
countermeasure is the usage of cheap but wide-ranged sensors, able to detect
suspicious events that occur in large areas, supporting patrollers to improve
the effectiveness of their strategies. However, such sensors are commonly
affected by uncertainty. In the present paper, we focus on spatially uncertain
alarm signals. That is, the alarm system is able to detect an attack but it is
uncertain on the exact position where the attack is taking place. This is
common when the area to be secured is wide such as in border patrolling and
fair site surveillance. We propose, to the best of our knowledge, the first
Patrolling Security Game model where a Defender is supported by a spatially
uncertain alarm system which non-deterministically generates signals once a
target is under attack. We show that finding the optimal strategy in arbitrary
graphs is APX-hard even in zero-sum games and we provide two (exponential time)
exact algorithms and two (polynomial time) approximation algorithms.
Furthermore, we analyse what happens in environments with special topologies,
showing that in linear and cycle graphs the optimal patrolling strategy can be
found in polynomial time, de facto allowing our algorithms to be used in
real-life scenarios, while in trees the problem is NP-hard. Finally, we show
that without false positives and missed detections, the best patrolling
strategy reduces to stay in a place, wait for a signal, and respond to it at
best. This strategy is optimal even with non-negligible missed detection rates,
which, unfortunately, affect every commercial alarm system. We evaluate our
methods in simulation, assessing both quantitative and qualitative aspects.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 10:22:43 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Basilico",
"Nicola",
""
],
[
"De Nittis",
"Giuseppe",
""
],
[
"Gatti",
"Nicola",
""
]
] |
new_dataset
| 0.996466 |
1506.02923
|
Abdulrahman Ibraheem
|
Abdulrahman Oladipupo Ibraheem
|
Compact Shape Trees: A Contribution to the Forest of Shape
Correspondences and Matching Methods
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel technique, termed compact shape trees, for computing
correspondences of single-boundary 2-D shapes in O(n2) time. Together with zero
or more features defined at each of n sample points on the shape's boundary,
the compact shape tree of a shape comprises the O(n) collection of vectors
emanating from any of the sample points on the shape's boundary to the rest of
the sample points on the boundary. As it turns out, compact shape trees have a
number of elegant properties both in the spatial and frequency domains. In
particular, via a simple vector-algebraic argument, we show that the O(n)
collection of vectors in a compact shape tree possesses at least the same
discriminatory power as the O(n2) collection of lines emanating from each
sample point to every other sample point on a shape's boundary. In addition, we
describe neat approaches for achieving scale and rotation invariance with
compact shape trees in the spatial domain; by viewing compact shape trees as
aperiodic discrete signals, we also prove scale and rotation invariance
properties for them in the Fourier domain. Towards these, along the way, using
concepts from differential geometry and the Calculus, we propose a novel theory
for sampling 2-D shape boundaries in a scale and rotation invariant manner.
Finally, we propose a number of shape recognition experiments to test the
efficacy of our concept.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 14:18:01 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Ibraheem",
"Abdulrahman Oladipupo",
""
]
] |
new_dataset
| 0.997549 |
1506.02955
|
Kai Chen
|
Bin Li, Hui Shen, Kai Chen
|
A Decision-Aided Parallel SC-List Decoder for Polar Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a decision-aided scheme for parallel SC-List
decoding of polar codes. At the parallel SC-List decoder, each survival path is
extended based on multiple information bits, therefore the number of split
paths becomes very large and the sorting to find the top L paths becomes very
complex. We propose a decision-aided scheme to reduce the number of split paths
and thus reduce the sorting complexity.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 15:19:00 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Li",
"Bin",
""
],
[
"Shen",
"Hui",
""
],
[
"Chen",
"Kai",
""
]
] |
new_dataset
| 0.995408 |
1506.02990
|
Chung-Yu Lou
|
Chung-Yu Lou, Babak Daneshrad, Richard D. Wesel
|
Convolutional-Code-Specific CRC Code Design
|
12 pages, 8 figures, journal paper
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyclic redundancy check (CRC) codes check if a codeword is correctly
received. This paper presents an algorithm to design CRC codes that are
optimized for the code-specific error behavior of a specified feedforward
convolutional code. The algorithm utilizes two distinct approaches to computing
undetected error probability of a CRC code used with a specific convolutional
code. The first approach enumerates the error patterns of the convolutional
code and tests if each of them is detectable. The second approach reduces
complexity significantly by exploiting the equivalence of the undetected error
probability to the frame error rate of an equivalent catastrophic convolutional
code. The error events of the equivalent convolutional code are exactly the
undetectable errors for the original concatenation of CRC and convolutional
codes. This simplifies the computation because error patterns do not need to be
individually checked for detectability. As an example, we optimize CRC codes
for a commonly used 64-state convolutional code for information length k=1024
demonstrating significant reduction in undetected error probability compared to
the existing CRC codes with the same degrees. For a fixed target undetected
error probability, the optimized CRC codes typically require 2 fewer bits.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 16:37:15 GMT"
}
] | 2015-06-10T00:00:00 |
[
[
"Lou",
"Chung-Yu",
""
],
[
"Daneshrad",
"Babak",
""
],
[
"Wesel",
"Richard D.",
""
]
] |
new_dataset
| 0.993563 |
1503.05451
|
Katharina Muelling
|
Katharina Muelling, Arun Venkatraman, Jean-Sebastien Valois, John
Downey, Jeffrey Weiss, Shervin Javdani, Martial Hebert, Andrew B. Schwartz,
Jennifer L. Collinger, J. Andrew Bagnell
|
Autonomy Infused Teleoperation with Application to BCI Manipulation
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Robot teleoperation systems face a common set of challenges including
latency, low-dimensional user commands, and asymmetric control inputs. User
control with Brain-Computer Interfaces (BCIs) exacerbates these problems
through especially noisy and erratic low-dimensional motion commands due to the
difficulty in decoding neural activity. We introduce a general framework to
address these challenges through a combination of computer vision, user intent
inference, and arbitration between the human input and autonomous control
schemes. Adjustable levels of assistance allow the system to balance the
operator's capabilities and feelings of comfort and control while compensating
for a task's difficulty. We present experimental results demonstrating
significant performance improvement using the shared-control assistance
framework on adapted rehabilitation benchmarks with two subjects implanted with
intracortical brain-computer interfaces controlling a seven degree-of-freedom
robotic manipulator as a prosthetic. Our results further indicate that shared
assistance mitigates perceived user difficulty and even enables successful
performance on previously infeasible tasks. We showcase the extensibility of
our architecture with applications to quality-of-life tasks such as opening a
door, pouring liquids from containers, and manipulation with novel objects in
densely cluttered environments.
|
[
{
"version": "v1",
"created": "Wed, 18 Mar 2015 15:24:12 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jun 2015 17:28:59 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Muelling",
"Katharina",
""
],
[
"Venkatraman",
"Arun",
""
],
[
"Valois",
"Jean-Sebastien",
""
],
[
"Downey",
"John",
""
],
[
"Weiss",
"Jeffrey",
""
],
[
"Javdani",
"Shervin",
""
],
[
"Hebert",
"Martial",
""
],
[
"Schwartz",
"Andrew B.",
""
],
[
"Collinger",
"Jennifer L.",
""
],
[
"Bagnell",
"J. Andrew",
""
]
] |
new_dataset
| 0.980937 |
1505.05428
|
Kenza Guenda
|
K. Chatouh, K. Guenda, T.A. Gulliver and L. Noui
|
Simplex and MacDonald Codes over $R_{q}$
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In this paper, we introduce the homogeneous weight and homogeneous Gray map
over the ring $R_{q}=\mathbb{F}_{2}[u_{1},u_{2},\ldots,u_{q}]/\left\langle
u_{i}^{2}=0,u_{i}u_{j}=u_{j}u_{i}\right\rangle$ for $q \geq 2$. We also
consider the construction of simplex and MacDonald codes of types $\alpha$ and
$\beta$ over this ring.
|
[
{
"version": "v1",
"created": "Wed, 20 May 2015 15:49:32 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Jun 2015 23:42:42 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Chatouh",
"K.",
""
],
[
"Guenda",
"K.",
""
],
[
"Gulliver",
"T. A.",
""
],
[
"Noui",
"L.",
""
]
] |
new_dataset
| 0.999106 |
1506.02071
|
Krzysztof Szczypiorski
|
Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj
|
Using Facebook for Image Steganography
|
6 pages, 4 figures, 2 tables. Accepted to Fourth International
Workshop on Cyber Crime (IWCC 2015), co-located with 10th International
Conference on Availability, Reliability and Security (ARES 2015), Toulouse,
France, 24-28 August 2015
| null | null | null |
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Because Facebook is available on hundreds of millions of desktop and mobile
computing platforms around the world and because it is available on many
different kinds of platforms (from desktops and laptops running Windows, Unix,
or OS X to hand held devices running iOS, Android, or Windows Phone), it would
seem to be the perfect place to conduct steganography. On Facebook, information
hidden in image files will be further obscured within the millions of pictures
and other images posted and transmitted daily. Facebook is known to alter and
compress uploaded images so they use minimum space and bandwidth when displayed
on Facebook pages. The compression process generally disrupts attempts to use
Facebook for image steganography. This paper explores a method to minimize the
disruption so JPEG images can be used as steganography carriers on Facebook.
|
[
{
"version": "v1",
"created": "Fri, 5 Jun 2015 21:16:22 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Hiney",
"Jason",
""
],
[
"Dakve",
"Tejas",
""
],
[
"Szczypiorski",
"Krzysztof",
""
],
[
"Gaj",
"Kris",
""
]
] |
new_dataset
| 0.998955 |
1506.02203
|
Matteo Ruggero Ronchi
|
Matteo Ruggero Ronchi and Pietro Perona
|
Describing Common Human Visual Actions in Images
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Which common human actions and interactions are recognizable in monocular
still images? Which involve objects and/or other people? How many is a person
performing at a time? We address these questions by exploring the actions and
interactions that are detectable in the images of the MS COCO dataset. We make
two main contributions. First, a list of 140 common `visual actions', obtained
by analyzing the largest on-line verb lexicon currently available for English
(VerbNet) and human sentences used to describe images in MS COCO. Second, a
complete set of annotations for those `visual actions', composed of
subject-object and associated verb, which we call COCO-a (a for `actions').
COCO-a is larger than existing action datasets in terms of number of actions
and instances of these actions, and is unique because it is data-driven, rather
than experimenter-biased. Other unique features are that it is exhaustive, and
that all subjects and objects are localized. A statistical analysis of the
accuracy of our annotations and of each action, interaction and subject-object
combination is provided.
|
[
{
"version": "v1",
"created": "Sun, 7 Jun 2015 00:33:23 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Ronchi",
"Matteo Ruggero",
""
],
[
"Perona",
"Pietro",
""
]
] |
new_dataset
| 0.998724 |
1506.02211
|
Chao Dong
|
Chao Dong and Ximei Zhu and Yubin Deng and Chen Change Loy and Yu Qiao
|
Boosting Optical Character Recognition: A Super-Resolution Approach
|
5 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Text image super-resolution is a challenging yet open research problem in the
computer vision community. In particular, low-resolution images hamper the
performance of typical optical character recognition (OCR) systems. In this
article, we summarize our entry to the ICDAR2015 Competition on Text Image
Super-Resolution. Experiments are based on the provided ICDAR2015 TextSR
dataset and the released Tesseract-OCR 3.02 system. We report that our winning
entry of text image super-resolution framework has largely improved the OCR
performance with low-resolution images used as input, reaching an OCR accuracy
score of 77.19%, which is comparable with that of using the original
high-resolution images 78.80%.
|
[
{
"version": "v1",
"created": "Sun, 7 Jun 2015 02:29:45 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Dong",
"Chao",
""
],
[
"Zhu",
"Ximei",
""
],
[
"Deng",
"Yubin",
""
],
[
"Loy",
"Chen Change",
""
],
[
"Qiao",
"Yu",
""
]
] |
new_dataset
| 0.964162 |
1504.02463
|
Ramon Caceres
|
Christopher Small, Richard Becker, Ram\'on C\'aceres, Simon Urbanek
|
Earthquakes, Hurricanes, and Mobile Communication Patterns in the New
York Metro Area: Collective Behavior during Extreme Events
|
24 pages, 10 figures, added 1 sentence to abstract, corrected font
issues
| null | null | null |
cs.SI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use wireless voice-call and text-message volumes to quantify
spatiotemporal communication patterns in the New York Metro area before,
during, and after the Virginia earthquake and Hurricane Irene in 2011. The
earthquake produces an instantaneous and pervasive increase in volume and a
~90-minute temporal disruption to both call and text volume patterns, but call
volume anomalies are much larger. The magnitude of call volume anomaly
diminishes with distance from earthquake epicenter, with multiple clusters of
high response in Manhattan. The hurricane produces a two-day, spatially varying
disruption to normal call and text volume patterns. In most coastal areas, call
volumes dropped anomalously in the afternoon before the hurricane's arrival,
but text volumes showed a much less consistent pattern. These spatial patterns
suggest partial, but not full, compliance with evacuation orders for low-lying
areas. By helping us understand how people behave in actual emergencies,
wireless data patterns may assist network operators and emergency planners who
want to provide the best possible services to the community. We have been
careful to preserve privacy throughout this work by using only anonymous and
aggregate data.
|
[
{
"version": "v1",
"created": "Thu, 9 Apr 2015 18:48:31 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2015 03:21:11 GMT"
}
] | 2015-06-08T00:00:00 |
[
[
"Small",
"Christopher",
""
],
[
"Becker",
"Richard",
""
],
[
"Cáceres",
"Ramón",
""
],
[
"Urbanek",
"Simon",
""
]
] |
new_dataset
| 0.999669 |
1504.05646
|
Vanessa Teague
|
J. Alex Halderman (University of Michigan) and Vanessa Teague
(University of Melbourne)
|
The New South Wales iVote System: Security Failures and Verification
Flaws in a Live Online Election
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the world's largest-ever deployment of online voting, the iVote Internet
voting system was trusted for the return of 280,000 ballots in the 2015 state
election in New South Wales, Australia. During the election, we performed an
independent security analysis of parts of the live iVote system and uncovered
severe vulnerabilities that could be leveraged to manipulate votes, violate
ballot privacy, and subvert the verification mechanism. These vulnerabilities
do not seem to have been detected by the election authorities before we
disclosed them, despite a pre-election security review and despite the system
having run in a live state election for five days. One vulnerability, the
result of including analytics software from an insecure external server,
exposed some votes to complete compromise of privacy and integrity. At least
one parliamentary seat was decided by a margin much smaller than the number of
votes taken while the system was vulnerable. We also found protocol flaws,
including vote verification that was itself susceptible to manipulation. This
incident underscores the difficulty of conducting secure elections online and
carries lessons for voters, election officials, and the e-voting research
community.
|
[
{
"version": "v1",
"created": "Wed, 22 Apr 2015 03:42:36 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2015 19:17:31 GMT"
}
] | 2015-06-08T00:00:00 |
[
[
"Halderman",
"J. Alex",
"",
"University of Michigan"
],
[
"Teague",
"Vanessa",
"",
"University of Melbourne"
]
] |
new_dataset
| 0.999583 |
1505.06289
|
Will Monroe
|
Angel Chang, Will Monroe, Manolis Savva, Christopher Potts,
Christopher D. Manning
|
Text to 3D Scene Generation with Rich Lexical Grounding
|
10 pages, 7 figures, 3 tables. To appear in ACL-IJCNLP 2015
| null | null | null |
cs.CL cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to map descriptions of scenes to 3D geometric representations has
many applications in areas such as art, education, and robotics. However, prior
work on the text to 3D scene generation task has used manually specified object
categories and language that identifies them. We introduce a dataset of 3D
scenes annotated with natural language descriptions and learn from this data
how to ground textual descriptions to physical objects. Our method successfully
grounds a variety of lexical terms to concrete referents, and we show
quantitatively that our method improves 3D scene generation over previous work
using purely rule-based methods. We evaluate the fidelity and plausibility of
3D scenes generated with our grounding approach through human judgments. To
ease evaluation on this task, we also introduce an automated metric that
strongly correlates with human judgments.
|
[
{
"version": "v1",
"created": "Sat, 23 May 2015 08:32:11 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2015 01:13:17 GMT"
}
] | 2015-06-08T00:00:00 |
[
[
"Chang",
"Angel",
""
],
[
"Monroe",
"Will",
""
],
[
"Savva",
"Manolis",
""
],
[
"Potts",
"Christopher",
""
],
[
"Manning",
"Christopher D.",
""
]
] |
new_dataset
| 0.970017 |
1506.01739
|
Flavio Lombardi
|
Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi
|
CloRoFor: Cloud Robust Forensics
|
12 pages, 6 figures
| null | null | null |
cs.DC cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The malicious alteration of machine time is a big challenge in computer
forensics. Detecting such changes and reconstructing the actual timeline of
events is of paramount importance. However, this can be difficult since the
attacker has many opportunities and means to hide such changes. In particular,
cloud computing, host and guest machine time can be manipulated in various ways
by an attacker. Guest virtual machines are especially vulnerable to attacks
coming from their (more privileged) host. As such, it is important to guarantee
the timeline integrity of both hosts and guests in a cloud, or at least to
ensure that the alteration of such timeline does not go undetected. In this
paper we survey the issues related to host and guest machine time integrity in
the cloud. Further, we describe a novel architecture for host and guest time
alteration detection and correction/resilience with respect to compromised
hosts and guests. The proposed framework has been implemented on an especially
built simulator. Collected results are evaluated and discussed. Performance
figures show the feasibility of our proposal.
|
[
{
"version": "v1",
"created": "Thu, 4 Jun 2015 22:12:31 GMT"
}
] | 2015-06-08T00:00:00 |
[
[
"Battistoni",
"Roberto",
""
],
[
"Di Pietro",
"Roberto",
""
],
[
"Lombardi",
"Flavio",
""
]
] |
new_dataset
| 0.986428 |
1205.6773
|
Sugata Sanyal
|
Preetida Vinayakray-Jani, Sugata Sanyal
|
Proactive TCP mechanism to improve Handover performance in Mobile
Satellite and Terrestrial Networks
|
5 pages, 2 figures
| null |
10.5120/7546-0643
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Emerging standardization of Geo Mobile Radio (GMR-1) for satellite system is
having strong resemblance to terrestrial GSM (Global System for Mobile
communications) at the upper protocol layers and TCP (Transmission Control
Protocol) is one of them. This space segment technology as well as terrestrial
technology, is characterized by periodic variations in communication properties
and coverage causing the termination of ongoing call as connections of Mobile
Nodes (MN) alter stochastically. Although provisions are made to provide
efficient communication infrastructure this hybrid space and terrestrial
networks must ensure the end-to-end network performance so that MN can move
seamlessly among these networks. However from connectivity point of view
current TCP performance has not been engineered for mobility events in
multi-radio MN. Traditionally, TCP has applied a set of congestion control
algorithms (slow-start, congestion avoidance, fast retransmit, fast recovery)
to probe the currently available bandwidth on the connection path. These
algorithms need several round-trip times to find the correct transmission rate
(i.e. congestion window), and adapt to sudden changes connectivity due to
handover. While there are protocols to maintain the connection continuity on
mobility events, such as Mobile IP (MIP) and Host Identity Protocol (HIP), TCP
performance engineering has had less attention. TCP is implemented as a
separate component in an operating system, and is therefore often unaware of
the mobility events or the nature of multi-radios' communication. This paper
aims to improve TCP communication performance in Mobile satellite and
terrestrial networks.
|
[
{
"version": "v1",
"created": "Wed, 30 May 2012 18:14:01 GMT"
}
] | 2015-06-05T00:00:00 |
[
[
"Vinayakray-Jani",
"Preetida",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.999125 |
1206.3365
|
Soung Chang Liew
|
Qike Wang, Kam-Hon Tse, Lian-Kuan Chen, Soung-Chang Liew
|
Physical-Layer Network Coding for VPN in TDM-PON
| null | null |
10.1109/LPT.2012.2224103
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We experimentally demonstrate a novel optical physical-layer network coding
(PNC) scheme over time-division multiplexing (TDM) passive optical network
(PON). Full-duplex error-free communications between optical network units
(ONUs) at 2.5 Gb/s are shown for all-optical virtual private network (VPN)
applications. Compared to the conventional half-duplex communications set-up,
our scheme can increase the capacity by 100% with power penalty smaller than 3
dB. Synchronization of two ONUs is not required for the proposed VPN scheme
|
[
{
"version": "v1",
"created": "Fri, 15 Jun 2012 03:40:31 GMT"
}
] | 2015-06-05T00:00:00 |
[
[
"Wang",
"Qike",
""
],
[
"Tse",
"Kam-Hon",
""
],
[
"Chen",
"Lian-Kuan",
""
],
[
"Liew",
"Soung-Chang",
""
]
] |
new_dataset
| 0.988834 |
1207.6313
|
Xavier Mestre
|
Francisco Rubio, Xavier Mestre, Walid Hachem
|
A CLT on the SNR of Diagonally Loaded MVDR Filters
|
This is a corrected version of the paper that will appear at IEEE
Transactions on Signal Processing September 2012
| null |
10.1109/TSP.2012.2197396
| null |
cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the fluctuations of the signal-to-noise ratio (SNR) of
minimum variance distorsionless response (MVDR) filters implementing diagonal
loading in the estimation of the covariance matrix. Previous results in the
signal processing literature are generalized and extended by considering both
spatially as well as temporarily correlated samples. Specifically, a central
limit theorem (CLT) is established for the fluctuations of the SNR of the
diagonally loaded MVDR filter, under both supervised and unsupervised training
settings in adaptive filtering applications. Our second-order analysis is based
on the Nash-Poincar\'e inequality and the integration by parts formula for
Gaussian functionals, as well as classical tools from statistical asymptotic
theory. Numerical evaluations validating the accuracy of the CLT confirm the
asymptotic Gaussianity of the fluctuations of the SNR of the MVDR filter.
|
[
{
"version": "v1",
"created": "Thu, 26 Jul 2012 16:12:54 GMT"
}
] | 2015-06-05T00:00:00 |
[
[
"Rubio",
"Francisco",
""
],
[
"Mestre",
"Xavier",
""
],
[
"Hachem",
"Walid",
""
]
] |
new_dataset
| 0.995306 |
1506.01698
|
Anna Rohrbach
|
Anna Rohrbach and Marcus Rohrbach and Bernt Schiele
|
The Long-Short Story of Movie Description
| null | null | null | null |
cs.CV cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generating descriptions for videos has many applications including assisting
blind people and human-robot interaction. The recent advances in image
captioning as well as the release of large-scale movie description datasets
such as MPII Movie Description allow to study this task in more depth. Many of
the proposed methods for image captioning rely on pre-trained object classifier
CNNs and Long-Short Term Memory recurrent networks (LSTMs) for generating
descriptions. While image description focuses on objects, we argue that it is
important to distinguish verbs, objects, and places in the challenging setting
of movie description. In this work we show how to learn robust visual
classifiers from the weak annotations of the sentence descriptions. Based on
these visual classifiers we learn how to generate a description using an LSTM.
We explore different design choices to build and train the LSTM and achieve the
best performance to date on the challenging MPII-MD dataset. We compare and
analyze our approach and prior work along various dimensions to better
understand the key challenges of the movie description task.
|
[
{
"version": "v1",
"created": "Thu, 4 Jun 2015 19:45:36 GMT"
}
] | 2015-06-05T00:00:00 |
[
[
"Rohrbach",
"Anna",
""
],
[
"Rohrbach",
"Marcus",
""
],
[
"Schiele",
"Bernt",
""
]
] |
new_dataset
| 0.998384 |
1203.1263
|
Ronald Caplan
|
R. M. Caplan
|
NLSEmagic: Nonlinear Schr\"odinger Equation Multidimensional
Matlab-based GPU-accelerated Integrators using Compact High-order Schemes
|
37 pages, 13 figures
| null |
10.1016/j.cpc.2012.12.010
| null |
cs.MS cs.CE physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a simple to use, yet powerful code package called NLSEmagic to
numerically integrate the nonlinear Schr\"odinger equation in one, two, and
three dimensions. NLSEmagic is a high-order finite-difference code package
which utilizes graphic processing unit (GPU) parallel architectures. The codes
running on the GPU are many times faster than their serial counterparts, and
are much cheaper to run than on standard parallel clusters. The codes are
developed with usability and portability in mind, and therefore are written to
interface with MATLAB utilizing custom GPU-enabled C codes with the
MEX-compiler interface. The packages are freely distributed, including user
manuals and set-up files.
|
[
{
"version": "v1",
"created": "Tue, 6 Mar 2012 17:45:07 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Dec 2012 19:16:52 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Caplan",
"R. M.",
""
]
] |
new_dataset
| 0.977489 |
1203.6543
|
Jos Vermaseren A
|
J. Kuipers, T. Ueda, J.A.M. Vermaseren and J. Vollinga
|
FORM version 4.0
|
26 pages. Uses axodraw
| null |
10.1016/j.cpc.2012.12.028
| null |
cs.SC hep-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present version 4.0 of the symbolic manipulation system FORM. The most
important new features are manipulation of rational polynomials and the
factorization of expressions. Many other new functions and commands are also
added; some of them are very general, while others are designed for building
specific high level packages, such as one for Groebner bases. New is also the
checkpoint facility, that allows for periodic backups during long calculations.
Lastly, FORM 4.0 has become available as open source under the GNU General
Public License version 3.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2012 14:55:52 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Kuipers",
"J.",
""
],
[
"Ueda",
"T.",
""
],
[
"Vermaseren",
"J. A. M.",
""
],
[
"Vollinga",
"J.",
""
]
] |
new_dataset
| 0.991798 |
1204.3431
|
Sumit Katiyar
|
Sumit Katiyar, R. K. Jain, N. K. Agrawal
|
Green Cellular Network Deployment To Reduce RF Pollution
|
6 pages, 6 figures. arXiv admin note: substantial text overlap with
arXiv:1204.2101, arXiv:1110.2627, and with arXiv:0803.0952 and
arXiv:0803.0952 by other authors
| null |
10.5120/8414-9361
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the mobile telecommunication systems are growing tremendously all over the
world, the numbers of handheld and base stations are also rapidly growing and
it became very popular to see these base stations distributed everywhere in the
neighborhood and on roof tops which has caused a considerable amount of panic
to the public in Palestine concerning wither the radiated electromagnetic
fields from these base stations may cause any health effect or hazard. Recently
UP High Court in India ordered for removal of BTS towers from residential area,
it has created panic among cellular communication network designers too. Green
cellular networks could be a solution for the above problem. This paper deals
with green cellular networks with the help of multi-layer overlaid hierarchical
structure (macro / micro / pico / femto cells). Macrocell for area coverage,
micro for pedestrian and a slow moving traffic while pico for indoor use and
femto for individual high capacity users. This could be the answer of the
problem of energy conservation and enhancement of spectral density also.
|
[
{
"version": "v1",
"created": "Mon, 16 Apr 2012 10:10:59 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Katiyar",
"Sumit",
""
],
[
"Jain",
"R. K.",
""
],
[
"Agrawal",
"N. K.",
""
]
] |
new_dataset
| 0.999311 |
1204.5046
|
Zuleita Ka Ming Ho
|
Zuleita Ho and Eduard Jorswieck
|
Instantaneous Relaying: Optimal Strategies and Interference
Neutralization
|
30 pages, journal version, complete proofs
| null |
10.1109/TSP.2012.2210709
| null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a multi-user wireless network equipped with multiple relay nodes, some
relays are more intelligent than other relay nodes. The intelligent relays are
able to gather channel state information, perform linear processing and forward
signals whereas the dumb relays is only able to serve as amplifiers. As the
dumb relays are oblivious to the source and destination nodes, the wireless
network can be modeled as a relay network with *smart instantaneous relay*
only: the signals of source-destination arrive at the same time as
source-relay-destination. Recently, instantaneous relaying is shown to improve
the degrees-of-freedom of the network as compared to classical cut-set bound.
In this paper, we study an achievable rate region and its boundary of the
instantaneous interference relay channel in the scenario of (a) uninformed
non-cooperative source-destination nodes (source and destination nodes are not
aware of the existence of the relay and are non-cooperative) and (b) informed
and cooperative source-destination nodes. Further, we examine the performance
of interference neutralization: a relay strategy which is able to cancel
interference signals at each destination node in the air. We observe that
interference neutralization, although promise to achieve desired
degrees-of-freedom, may not be feasible if relay has limited power. Simulation
results show that the optimal relay strategies improve the achievable rate
region and provide better user-fairness in both uninformed non-cooperative and
informed cooperative scenarios.
|
[
{
"version": "v1",
"created": "Mon, 23 Apr 2012 12:45:43 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2012 10:49:50 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Ho",
"Zuleita",
""
],
[
"Jorswieck",
"Eduard",
""
]
] |
new_dataset
| 0.993191 |
1301.2005
|
Xiaowang Zhang
|
Xiaowang Zhang and Kewen Wang and Zhe Wang and Yue Ma and Guilin Qi
|
A Distance-based Paraconsistent Semantics for DL-Lite
|
17 pages
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
DL-Lite is an important family of description logics. Recently, there is an
increasing interest in handling inconsistency in DL-Lite as the constraint
imposed by a TBox can be easily violated by assertions in ABox in DL-Lite. In
this paper, we present a distance-based paraconsistent semantics based on the
notion of feature in DL-Lite, which provides a novel way to rationally draw
meaningful conclusions even from an inconsistent knowledge base. Finally, we
investigate several important logical properties of this entailment relation
based on the new semantics and show its promising advantages in non-monotonic
reasoning for DL-Lite.
|
[
{
"version": "v1",
"created": "Wed, 9 Jan 2013 23:02:34 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2013 14:57:25 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Jun 2015 07:03:58 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Zhang",
"Xiaowang",
""
],
[
"Wang",
"Kewen",
""
],
[
"Wang",
"Zhe",
""
],
[
"Ma",
"Yue",
""
],
[
"Qi",
"Guilin",
""
]
] |
new_dataset
| 0.997111 |
1506.01075
|
Chien-Liang Fok
|
C.-L. Fok and G. Johnson and J. D. Yamokoski, A. Mok, and L. Sentis
|
ControlIt! - A Software Framework for Whole-Body Operational Space
Control
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Whole Body Operational Space Control (WBOSC) is a pioneering algorithm in the
field of human-centered Whole-Body Control (WBC). It enables floating-base
highly-redundant robots to achieve unified motion/force control of one or more
operational space objectives while adhering to physical constraints. Limited
studies exist on the software architecture and APIs that enable WBOSC to
perform and be integrated into a larger system. In this paper we address this
by presenting ControlIt!, a new open-source software framework for WBOSC.
Unlike previous implementations, ControlIt! is multi-threaded to increase servo
frequencies on standard PC hardware. A new parameter binding mechanism enables
tight integration between ControlIt! and external processes via an extensible
set of transport protocols. To support a new robot, only two plugins and a URDF
model needs to be provided --- the rest of ControlIt! remains unchanged. New
WBC primitives can be added by writing a Task or Constraint plugin.
ControlIt!'s capabilities are demonstrated on Dreamer, a 16-DOF torque
controlled humanoid upper body robot containing both series elastic and
co-actuated joints, and using it to perform a product disassembly task. Using
this testbed, we show that ControlIt! can achieve average servo latencies of
about 0.5ms when configured with two Cartesian position tasks, two orientation
tasks, and a lower priority posture task. This is significantly higher than the
5ms that was achieved using UTA-WBC, the prototype implementation of WBOSC that
is both application and platform-specific. Variations in the product's position
is handled by updating the goal of the Cartesian position task. ControlIt!'s
source code is released under an LGPL license and we hope it will be adopted
and maintained by the WBC community for the long term as a platform for WBC
development and integration.
|
[
{
"version": "v1",
"created": "Tue, 2 Jun 2015 21:59:05 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Fok",
"C. -L.",
""
],
[
"Johnson",
"G.",
""
],
[
"Yamokoski",
"J. D.",
""
],
[
"Mok",
"A.",
""
],
[
"Sentis",
"L.",
""
]
] |
new_dataset
| 0.97416 |
1506.01092
|
Seungjin Choi
|
Saehoon Kim and Seungjin Choi
|
Bilinear Random Projections for Locality-Sensitive Binary Codes
|
11 pages, 23 figures, CVPR-2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Locality-sensitive hashing (LSH) is a popular data-independent indexing
method for approximate similarity search, where random projections followed by
quantization hash the points from the database so as to ensure that the
probability of collision is much higher for objects that are close to each
other than for those that are far apart. Most of high-dimensional visual
descriptors for images exhibit a natural matrix structure. When visual
descriptors are represented by high-dimensional feature vectors and long binary
codes are assigned, a random projection matrix requires expensive complexities
in both space and time. In this paper we analyze a bilinear random projection
method where feature matrices are transformed to binary codes by two smaller
random projection matrices. We base our theoretical analysis on extending
Raginsky and Lazebnik's result where random Fourier features are composed with
random binary quantizers to form locality sensitive binary codes. To this end,
we answer the following two questions: (1) whether a bilinear random projection
also yields similarity-preserving binary codes; (2) whether a bilinear random
projection yields performance gain or loss, compared to a large linear
projection. Regarding the first question, we present upper and lower bounds on
the expected Hamming distance between binary codes produced by bilinear random
projections. In regards to the second question, we analyze the upper and lower
bounds on covariance between two bits of binary codes, showing that the
correlation between two bits is small. Numerical experiments on MNIST and
Flickr45K datasets confirm the validity of our method.
|
[
{
"version": "v1",
"created": "Wed, 3 Jun 2015 00:30:26 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Kim",
"Saehoon",
""
],
[
"Choi",
"Seungjin",
""
]
] |
new_dataset
| 0.998598 |
1506.01256
|
Ndoundam Rene
|
Rene Ndoundam, Stephane Gael Raymond Ekodeck
|
PDF Steganography based on Chinese Remainder Theorem
|
29pages, 5 figures
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
We propose different approaches of PDF files based steganography, essentially
based on the Chinese Remainder Theorem. Here, after a cover PDF document has
been released from unnecessary A0, a secret message is hidden in it using one
of the proposed approaches, making it invisible to common PDF readers, and the
file is then transmitted through a non-secure communication channel. Where each
of our methods, ensure the condition that the number of inserted A0 is less
than the number of characters of the secret message s.
|
[
{
"version": "v1",
"created": "Wed, 3 Jun 2015 14:29:07 GMT"
}
] | 2015-06-04T00:00:00 |
[
[
"Ndoundam",
"Rene",
""
],
[
"Ekodeck",
"Stephane Gael Raymond",
""
]
] |
new_dataset
| 0.964162 |
1112.3096
|
Rui Wang
|
Rui Wang and Meixia Tao
|
Joint Source and Relay Precoding Designs for MIMO Two-Way Relaying Based
on MSE Criterion
|
32 pages, 10 figures
| null |
10.1109/TSP.2011.2178598
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Properly designed precoders can significantly improve the spectral efficiency
of multiple-input multiple-output (MIMO) relay systems. In this paper, we
investigate joint source and relay precoding design based on the
mean-square-error (MSE) criterion in MIMO two-way relay systems, where two
multi-antenna source nodes exchange information via a multi-antenna
amplify-and-forward relay node. This problem is non-convex and its optimal
solution remains unsolved. Aiming to find an efficient way to solve the
problem, we first decouple the primal problem into three tractable
sub-problems, and then propose an iterative precoding design algorithm based on
alternating optimization. The solution to each sub-problem is optimal and
unique, thus the convergence of the iterative algorithm is guaranteed.
Secondly, we propose a structured precoding design to lower the computational
complexity. The proposed precoding structure is able to parallelize the
channels in the multiple access (MAC) phase and broadcast (BC) phase. It thus
reduces the precoding design to a simple power allocation problem. Lastly, for
the special case where only a single data stream is transmitted from each
source node, we present a source-antenna-selection (SAS) based precoding design
algorithm. This algorithm selects only one antenna for transmission from each
source and thus requires lower signalling overhead. Comprehensive simulation is
conducted to evaluate the effectiveness of all the proposed precoding designs.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2011 02:06:06 GMT"
}
] | 2015-06-03T00:00:00 |
[
[
"Wang",
"Rui",
""
],
[
"Tao",
"Meixia",
""
]
] |
new_dataset
| 0.99166 |
1201.1601
|
Xiaolin Wu
|
Xiaolin Wu and Guangtao Zhai
|
Temporal Psychovisual Modulation: a new paradigm of information display
| null | null |
10.1109/MSP.2012.2219678
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report on a new paradigm of information display that greatly extends the
utility and versatility of current optoelectronic displays. The main innovation
is to let a display of high refresh rate optically broadcast so-called atom
frames, which are designed through non-negative matrix factorization to form
bases for a class of images, and different viewers perceive selfintended images
by using display-synchronized viewing devices and their own human visual
systems to fuse appropriately weighted atom frames. This work is essentially a
scheme of temporal psychovisual modulation in visible spectrum, using an
optoelectronic modulator coupled with a biological demodulator.
|
[
{
"version": "v1",
"created": "Sun, 8 Jan 2012 03:16:50 GMT"
}
] | 2015-06-03T00:00:00 |
[
[
"Wu",
"Xiaolin",
""
],
[
"Zhai",
"Guangtao",
""
]
] |
new_dataset
| 0.996469 |
1201.4106
|
Frank Kschischang
|
Benjamin P. Smith and Arash Farhood and Andrew Hunt and Frank R.
Kschischang and John Lodge
|
Staircase Codes: FEC for 100 Gb/s OTN
|
To appear in IEEE/OSA J. of Lightwave Technology
| null |
10.1109/JLT.2011.2175479
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Staircase codes, a new class of forward-error-correction (FEC) codes suitable
for high-speed optical communications, are introduced. An ITU-T
G.709-compatible staircase code with rate R=239/255 is proposed, and FPGA-based
simulation results are presented, exhibiting a net coding gain (NCG) of 9.41 dB
at an output error rate of 1E-15, an improvement of 0.42 dB relative to the
best code from the ITU-T G.975.1 recommendation. An error floor analysis
technique is presented, and the proposed code is shown to have an error floor
at 4.0E-21.
|
[
{
"version": "v1",
"created": "Thu, 19 Jan 2012 16:49:36 GMT"
}
] | 2015-06-03T00:00:00 |
[
[
"Smith",
"Benjamin P.",
""
],
[
"Farhood",
"Arash",
""
],
[
"Hunt",
"Andrew",
""
],
[
"Kschischang",
"Frank R.",
""
],
[
"Lodge",
"John",
""
]
] |
new_dataset
| 0.997426 |
1411.7855
|
\"Orjan Stenflo
|
Franklin Mendivil and \"Orjan Stenflo
|
V-variable image compression
|
15 pages, 22 figures
|
Fractals, 23, no 02, (2015)
|
10.1142/S0218348X15500073
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
V-variable fractals, where $V$ is a positive integer, are intuitively
fractals with at most $V$ different "forms" or "shapes" at all levels of
magnification. In this paper we describe how V-variable fractals can be used
for the purpose of image compression.
|
[
{
"version": "v1",
"created": "Fri, 28 Nov 2014 13:18:22 GMT"
}
] | 2015-06-03T00:00:00 |
[
[
"Mendivil",
"Franklin",
""
],
[
"Stenflo",
"Örjan",
""
]
] |
new_dataset
| 0.983986 |
1506.00744
|
Hai Liu
|
Zhiyong Lin, Hai Liu, Lu Yu, Yiu-Wing Leung, and Xiaowen Chu
|
ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for
Cognitive Radios
|
10 pages
| null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of existing rendezvous algorithms generate channel-hopping sequences
based on the whole channel set. They are inefficient when the set of available
channels is a small subset of the whole channel set. We propose a new algorithm
called ZOS which uses three types of elementary sequences (namely, Zero-type,
One-type, and S-type) to generate channel-hopping sequences based on the set of
available channels. ZOS provides guaranteed rendezvous without any additional
requirements. The maximum time-to-rendezvous of ZOS is upper-bounded by
O(m1*m2*log2M) where M is the number of all channels and m1 and m2 are the
numbers of available channels of two users.
|
[
{
"version": "v1",
"created": "Tue, 2 Jun 2015 04:13:00 GMT"
}
] | 2015-06-03T00:00:00 |
[
[
"Lin",
"Zhiyong",
""
],
[
"Liu",
"Hai",
""
],
[
"Yu",
"Lu",
""
],
[
"Leung",
"Yiu-Wing",
""
],
[
"Chu",
"Xiaowen",
""
]
] |
new_dataset
| 0.999771 |
0801.1987
|
Neal E. Young
|
Christos Koufogiannakis and Neal E. Young
|
A Nearly Linear-Time PTAS for Explicit Fractional Packing and Covering
Linear Programs
|
corrected version of FOCS 2007 paper: 10.1109/FOCS.2007.62. Accepted
to Algorithmica, 2013
|
Algorithmica 70(4):648-674(2014)
|
10.1007/s00453-013-9771-6
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give an approximation algorithm for packing and covering linear programs
(linear programs with non-negative coefficients). Given a constraint matrix
with n non-zeros, r rows, and c columns, the algorithm computes feasible primal
and dual solutions whose costs are within a factor of 1+eps of the optimal cost
in time O((r+c)log(n)/eps^2 + n).
|
[
{
"version": "v1",
"created": "Sun, 13 Jan 2008 22:04:49 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Mar 2013 16:03:10 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Koufogiannakis",
"Christos",
""
],
[
"Young",
"Neal E.",
""
]
] |
new_dataset
| 0.994162 |
1502.07391
|
Gideon Segev
|
Gideon Segev, Iddo Amit, Andrey Godkin, Alex Henning and Yossi
Rosenwaks
|
Multiple State EFN Transistors
| null | null |
10.1109/LED.2015.2434793
| null |
cs.ET cond-mat.mes-hall
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electrostatically Formed Nanowire (EFN) based transistors have been suggested
in the past as gas sensing devices. These transistors are multiple gate
transistors in which the source to drain conduction path is determined by the
bias applied to the back gate, and two junction gates. If a specific bias is
applied to the side gates, the conduction band electrons between them are
confined to a well-defined area forming a narrow channel- the Electrostatically
Formed Nanowire. Recent work has shown that by applying non-symmetric bias on
the side gates, the lateral position of the EFN can be controlled. We propose a
novel Multiple State EFN Transistor (MSET) that utilizes this degree of freedom
for the implementation of complete multiplexer functionality in a single
transistor like device. The multiplexer functionality allows a very simple
implementation of binary and multiple valued logic functions.
|
[
{
"version": "v1",
"created": "Wed, 25 Feb 2015 22:38:02 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Mar 2015 08:33:33 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Segev",
"Gideon",
""
],
[
"Amit",
"Iddo",
""
],
[
"Godkin",
"Andrey",
""
],
[
"Henning",
"Alex",
""
],
[
"Rosenwaks",
"Yossi",
""
]
] |
new_dataset
| 0.997244 |
1503.05502
|
Stanislav Sobolevsky
|
Silvia Paldino, Iva Bojic, Stanislav Sobolevsky, Carlo Ratti, Marta C.
Gonzalez
|
Urban Magnetism Through The Lens of Geo-tagged Photography
|
17 pages, 10 figures, 6 tables
|
EPJ Data Science 2015, 4:5
|
10.1140/epjds/s13688-015-0043-3
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is an increasing trend of people leaving digital traces through social
media. This reality opens new horizons for urban studies. With this kind of
data, researchers and urban planners can detect many aspects of how people live
in cities and can also suggest how to transform cities into more efficient and
smarter places to live in. In particular, their digital trails can be used to
investigate tastes of individuals, and what attracts them to live in a
particular city or to spend their vacation there. In this paper we propose an
unconventional way to study how people experience the city, using information
from geotagged photographs that people take at different locations. We compare
the spatial behavior of residents and tourists in 10 most photographed cities
all around the world. The study was conducted on both a global and local level.
On the global scale we analyze the 10 most photographed cities and measure how
attractive each city is for people visiting it from other cities within the
same country or from abroad. For the purpose of our analysis we construct the
users mobility network and measure the strength of the links between each pair
of cities as a level of attraction of people living in one city (i.e., origin)
to the other city (i.e., destination). On the local level we study the spatial
distribution of user activity and identify the photographed hotspots inside
each city. The proposed methodology and the results of our study are a low cost
mean to characterize a touristic activity within a certain location and can
help in urban organization to strengthen their touristic potential.
|
[
{
"version": "v1",
"created": "Wed, 18 Mar 2015 17:30:21 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2015 20:45:43 GMT"
},
{
"version": "v3",
"created": "Sat, 30 May 2015 11:37:20 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Paldino",
"Silvia",
""
],
[
"Bojic",
"Iva",
""
],
[
"Sobolevsky",
"Stanislav",
""
],
[
"Ratti",
"Carlo",
""
],
[
"Gonzalez",
"Marta C.",
""
]
] |
new_dataset
| 0.974335 |
1506.00091
|
Leon Abdillah
|
Tri Murti, Leon Andretti Abdillah, Muhammad Sobri
|
Sistem penunjang keputusan kelayakan pemberian pinjaman dengna metode
fuzzy tsukamoto
|
5 pages, in Indonesian, in Seminar Nasional Inovasi dan Tren 2015
(SNIT2015), Bekasi, 2015
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Decision support systems (DSS) can be used to help settlement issues or
decisions that are semi-structured or structured. The method used is Fuzzy
Tsukamoto. PT Triprima Finance is a company engaged in the service sector
lending with collateral in the form of Motor Vehicle Owner Book or car (reg).
PT. Triprima Finance should consider borrowing from its customers with the
consent of the head manager. Such approval requires a long time because they
have to pass through many stages of the reporting procedure. Decision-making
activities at PT Triprima Finance carried out by the analysis process manually.
To help overcome these problems, the need for completion method in accuracy and
speed of decision making feasibility of lending. To overcome this need to
develop a new system that is a decision support system Tsukamoto fuzzy method.
is expected to facilitate kaposko to determine the decisions to be taken.
|
[
{
"version": "v1",
"created": "Sat, 30 May 2015 08:06:20 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Murti",
"Tri",
""
],
[
"Abdillah",
"Leon Andretti",
""
],
[
"Sobri",
"Muhammad",
""
]
] |
new_dataset
| 0.967535 |
1506.00128
|
Pedro Quaresma
|
Pedro Quaresma and Vanda Santos and Milena Mari\'c
|
A Web Environment for Geometry
|
CICM 2015, Conference on Intelligent Computer Mathematics
(Work-in-Progress track), July 13-17, 2015, Washington DC, USA
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Web Geometry Laboratory, (WGL), is a blended-learning, collaborative and
adaptive, Web environment for geometry. It integrates a well known dynamic
geometry system. In a collaborative session, exchange of geometrical and
textual information between the user engaged in the session is possible. In a
normal work session (stand-alone mode), all the geometric steps done by the
students are recorded, alongside the navigation information, allowing, in a
latter stage, their teachers to "play back" the students sessions, using that
info to assert the students level and adjust the teaching strategies to each
individual student. Teachers can register and begin using one of the public
servers, defining students, preparing materials to be released to the students,
open collaborative sessions, etc. Using an action research methodology the WGL
system is being developed, validated through case-studies, and further
improved, in a cycle where the implementation steps are intertwined with case
studies.
|
[
{
"version": "v1",
"created": "Sat, 30 May 2015 15:27:53 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Quaresma",
"Pedro",
""
],
[
"Santos",
"Vanda",
""
],
[
"Marić",
"Milena",
""
]
] |
new_dataset
| 0.999236 |
1506.00190
|
Ruo-Wei Hung
|
Ruo-Wei Hung
|
Hamiltonian Cycles in Linear-Convex Supergrid Graphs
|
17 pages, 24 figurs
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A supergrid graph is a finite induced subgraph of the infinite graph
associated with the two-dimensional supergrid. The supergrid graphs contain
grid graphs and triangular grid graphs as subgraphs. The Hamiltonian cycle
problem for grid and triangular grid graphs was known to be NP-complete. In the
past, we have shown that the Hamiltonian cycle problem for supergrid graphs is
also NP-complete. The Hamiltonian cycle problem on supergrid graphs can be
applied to control the stitching trace of computerized sewing machines. In this
paper, we will study the Hamiltonian cycle property of linear-convex supergrid
graphs which form a subclass of supergrid graphs. A connected graph is called
$k$-connected if there are $k$ vertex-disjoint paths between every pair of
vertices, and is called locally connected if the neighbors of each vertex in it
form a connected subgraph. In this paper, we first show that any 2-connected,
linear-convex supergrid graph is locally connected. We then prove that any
2-connected, linear-convex supergrid graph contains a Hamiltonian cycle.
|
[
{
"version": "v1",
"created": "Sun, 31 May 2015 03:42:31 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Hung",
"Ruo-Wei",
""
]
] |
new_dataset
| 0.995213 |
1506.00278
|
Licheng Yu
|
Licheng Yu, Eunbyung Park, Alexander C. Berg, and Tamara L. Berg
|
Visual Madlibs: Fill in the blank Image Generation and Question
Answering
|
10 pages; 8 figures; 4 tables
| null | null | null |
cs.CV cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce a new dataset consisting of 360,001 focused
natural language descriptions for 10,738 images. This dataset, the Visual
Madlibs dataset, is collected using automatically produced fill-in-the-blank
templates designed to gather targeted descriptions about: people and objects,
their appearances, activities, and interactions, as well as inferences about
the general scene or its broader context. We provide several analyses of the
Visual Madlibs dataset and demonstrate its applicability to two new description
generation tasks: focused description generation, and multiple-choice
question-answering for images. Experiments using joint-embedding and deep
learning methods show promising results on these tasks.
|
[
{
"version": "v1",
"created": "Sun, 31 May 2015 19:39:44 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Yu",
"Licheng",
""
],
[
"Park",
"Eunbyung",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Berg",
"Tamara L.",
""
]
] |
new_dataset
| 0.999747 |
1506.00312
|
Masrour Zoghi
|
Masrour Zoghi, Zohar Karnin, Shimon Whiteson and Maarten de Rijke
|
Copeland Dueling Bandits
|
33 pages, 8 figures
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A version of the dueling bandit problem is addressed in which a Condorcet
winner may not exist. Two algorithms are proposed that instead seek to minimize
regret with respect to the Copeland winner, which, unlike the Condorcet winner,
is guaranteed to exist. The first, Copeland Confidence Bound (CCB), is designed
for small numbers of arms, while the second, Scalable Copeland Bandits (SCB),
works better for large-scale problems. We provide theoretical results bounding
the regret accumulated by CCB and SCB, both substantially improving existing
results. Such existing results either offer bounds of the form $O(K \log T)$
but require restrictive assumptions, or offer bounds of the form $O(K^2 \log
T)$ without requiring such assumptions. Our results offer the best of both
worlds: $O(K \log T)$ bounds without restrictive assumptions.
|
[
{
"version": "v1",
"created": "Mon, 1 Jun 2015 00:44:37 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Zoghi",
"Masrour",
""
],
[
"Karnin",
"Zohar",
""
],
[
"Whiteson",
"Shimon",
""
],
[
"de Rijke",
"Maarten",
""
]
] |
new_dataset
| 0.995895 |
1506.00326
|
Joshua Joy
|
Uichin Lee, Joshua Joy, Youngtae Noh
|
Secure Personal Content Networking over Untrusted Devices
| null | null |
10.1007/s11277-014-2093-4
| null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Securely sharing and managing personal content is a challenging task in
multi-device environments. In this paper, we design and implement a new
platform called Personal Content Networking (PCN). Our work is inspired by
Content-Centric Networking (CCN) because we aim to enable access to personal
content using its name instead of its location. The unique challenge of PCN is
to support secure file operations such as replication, updates, and access
control over distributed untrusted devices. The primary contribution of this
work is the design and implementation of a secure content management platform
that supports secure updates, replications, and fine-grained content-centric
access control of files. Furthermore, we demonstrate its feasibility through a
prototype implementation on the CCNx skeleton.
|
[
{
"version": "v1",
"created": "Mon, 1 Jun 2015 02:06:21 GMT"
}
] | 2015-06-02T00:00:00 |
[
[
"Lee",
"Uichin",
""
],
[
"Joy",
"Joshua",
""
],
[
"Noh",
"Youngtae",
""
]
] |
new_dataset
| 0.960212 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.