id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1405.2013
|
Ahmed Hamdi Sakr
|
Ahmed Hamdi Sakr and Ekram Hossain
|
Cognitive and Energy Harvesting-Based D2D Communication in Cellular
Networks: Stochastic Geometry Modeling and Analysis
|
IEEE Transactions on Communications, to appear
| null | null | null |
cs.NI math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While cognitive radio enables spectrum-efficient wireless communication,
radio frequency (RF) energy harvesting from ambient interference is an enabler
for energy-efficient wireless communication. In this paper, we model and
analyze cognitive and energy harvesting-based D2D communication in cellular
networks. The cognitive D2D transmitters harvest energy from ambient
interference and use one of the channels allocated to cellular users (in uplink
or downlink), which is referred to as the D2D channel, to communicate with the
corresponding receivers. We investigate two spectrum access policies for
cellular communication in the uplink or downlink, namely, random spectrum
access (RSA) policy and prioritized spectrum access (PSA) policy. In RSA, any
of the available channels including the channel used by the D2D transmitters
can be selected randomly for cellular communication, while in PSA the D2D
channel is used only when all of the other channels are occupied. A D2D
transmitter can communicate successfully with its receiver only when it
harvests enough energy to perform channel inversion toward the receiver, the
D2D channel is free, and the $\mathsf{SINR}$ at the receiver is above the
required threshold; otherwise, an outage occurs for the D2D communication. We
use tools from stochastic geometry to evaluate the performance of the proposed
communication system model with general path-loss exponent in terms of outage
probability for D2D and cellular users. We show that energy harvesting can be a
reliable alternative to power cognitive D2D transmitters while achieving
acceptable performance. Under the same $\mathsf{SINR}$ outage requirements as
for the non-cognitive case, cognitive channel access improves the outage
probability for D2D users for both the spectrum access policies.
|
[
{
"version": "v1",
"created": "Thu, 8 May 2014 16:50:44 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2015 17:12:46 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Sakr",
"Ahmed Hamdi",
""
],
[
"Hossain",
"Ekram",
""
]
] |
new_dataset
| 0.969713 |
1412.6249
|
Min Lin
|
Min Lin, Shuo Li, Xuan Luo, Shuicheng Yan
|
Purine: A bi-graph based deep learning framework
|
Submitted to ICLR 2015 workshop
| null | null | null |
cs.NE cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce a novel deep learning framework, termed Purine.
In Purine, a deep network is expressed as a bipartite graph (bi-graph), which
is composed of interconnected operators and data tensors. With the bi-graph
abstraction, networks are easily solvable with event-driven task dispatcher. We
then demonstrate that different parallelism schemes over GPUs and/or CPUs on
single or multiple PCs can be universally implemented by graph composition.
This eases researchers from coding for various parallelization schemes, and the
same dispatcher can be used for solving variant graphs. Scheduled by the task
dispatcher, memory transfers are fully overlapped with other computations,
which greatly reduce the communication overhead and help us achieve approximate
linear acceleration.
|
[
{
"version": "v1",
"created": "Fri, 19 Dec 2014 08:20:10 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Dec 2014 03:18:46 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Jan 2015 02:17:39 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Mar 2015 16:13:46 GMT"
},
{
"version": "v5",
"created": "Thu, 16 Apr 2015 13:09:33 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Lin",
"Min",
""
],
[
"Li",
"Shuo",
""
],
[
"Luo",
"Xuan",
""
],
[
"Yan",
"Shuicheng",
""
]
] |
new_dataset
| 0.988655 |
1502.04569
|
Mainak Jas
|
Mainak Jas and Devi Parikh
|
Image Specificity
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For some images, descriptions written by multiple people are consistent with
each other. But for other images, descriptions across people vary considerably.
In other words, some images are specific $-$ they elicit consistent
descriptions from different people $-$ while other images are ambiguous.
Applications involving images and text can benefit from an understanding of
which images are specific and which ones are ambiguous. For instance, consider
text-based image retrieval. If a query description is moderately similar to the
caption (or reference description) of an ambiguous image, that query may be
considered a decent match to the image. But if the image is very specific, a
moderate similarity between the query and the reference description may not be
sufficient to retrieve the image.
In this paper, we introduce the notion of image specificity. We present two
mechanisms to measure specificity given multiple descriptions of an image: an
automated measure and a measure that relies on human judgement. We analyze
image specificity with respect to image content and properties to better
understand what makes an image specific. We then train models to automatically
predict the specificity of an image from image features alone without requiring
textual descriptions of the image. Finally, we show that modeling image
specificity leads to improvements in a text-based image retrieval application.
|
[
{
"version": "v1",
"created": "Mon, 16 Feb 2015 15:16:25 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2015 13:13:46 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Jas",
"Mainak",
""
],
[
"Parikh",
"Devi",
""
]
] |
new_dataset
| 0.960905 |
1504.04074
|
Xiaohan Wei
|
Xiaohan Wei and Michael J. Neely
|
Power Aware Wireless File Downloading: A Lyapunov Indexing Approach to A
Constrained Restless Bandit Problem
|
Extended version submitted to IEEE Trans. Network. arXiv admin note:
substantial text overlap with arXiv:1401.3824
| null | null | null |
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper treats power-aware throughput maxi-mization in a multi-user file
downloading system. Each user can receive a new file only after its previous
file is finished. The file state processes for each user act as coupled Markov
chains that form a generalized restless bandit system. First, an optimal
algorithm is derived for the case of one user. The algorithm maximizes
throughput subject to an average power constraint. Next, the one-user algorithm
is extended to a low complexity heuristic for the multi-user problem. The
heuristic uses a simple online index policy. In a special case with no
power-constraint, the multi-user heuristic is shown to be throughput optimal.
Simulations are used to demonstrate effectiveness of the heuristic in the
general case. For simple cases where the optimal solution can be computed
offline, the heuristic is shown to be near-optimal for a wide range of
parameters.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 00:43:27 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Wei",
"Xiaohan",
""
],
[
"Neely",
"Michael J.",
""
]
] |
new_dataset
| 0.950822 |
1504.04085
|
Aswin Sankaranarayanan
|
Huaijin Chen, M. Salman Asif, Aswin C. Sankaranarayanan, and Ashok
Veeraraghavan
|
FPA-CS: Focal Plane Array-based Compressive Imaging in Short-wave
Infrared
|
appears in IEEE Conf. Computer Vision and Pattern Recognition, 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cameras for imaging in short and mid-wave infrared spectra are significantly
more expensive than their counterparts in visible imaging. As a result,
high-resolution imaging in those spectrum remains beyond the reach of most
consumers. Over the last decade, compressive sensing (CS) has emerged as a
potential means to realize inexpensive short-wave infrared cameras. One
approach for doing this is the single-pixel camera (SPC) where a single
detector acquires coded measurements of a high-resolution image. A
computational reconstruction algorithm is then used to recover the image from
these coded measurements. Unfortunately, the measurement rate of a SPC is
insufficient to enable imaging at high spatial and temporal resolutions.
We present a focal plane array-based compressive sensing (FPA-CS)
architecture that achieves high spatial and temporal resolutions. The idea is
to use an array of SPCs that sense in parallel to increase the measurement
rate, and consequently, the achievable spatio-temporal resolution of the
camera. We develop a proof-of-concept prototype in the short-wave infrared
using a sensor with 64$\times$ 64 pixels; the prototype provides a 4096$\times$
increase in the measurement rate compared to the SPC and achieves a megapixel
resolution at video rate using CS techniques.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 02:29:20 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Chen",
"Huaijin",
""
],
[
"Asif",
"M. Salman",
""
],
[
"Sankaranarayanan",
"Aswin C.",
""
],
[
"Veeraraghavan",
"Ashok",
""
]
] |
new_dataset
| 0.999622 |
1504.04111
|
Bahattin Yildiz
|
Bahattin Yildiz and Ismail G. Kelebek
|
The homogeneous weight for $R_k$, related Gray map and new binary
quasicyclic codes
|
Submitted to be published
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using theoretical results about the homogeneous weights for Frobenius rings,
we describe the homogeneous weight for the ring family $R_k$, a recently
introduced family of Frobenius rings which have been used extensively in coding
theory. We find an associated Gray map for the homogeneous weight using first
order Reed-Muller codes and we describe some of the general properties of the
images of codes over $R_k$ under this Gray map. We then discuss quasitwisted
codes over $R_k$ and their binary images under the homogeneous Gray map. In
this way, we find many optimal binary codes which are self-orthogonal and
quasicyclic. In particular, we find a substantial number of optimal binary
codes that are quasicyclic of index 8, 16 and 24, nearly all of which are new
additions to the database of quasicyclic codes kept by Chen.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 07:07:20 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Yildiz",
"Bahattin",
""
],
[
"Kelebek",
"Ismail G.",
""
]
] |
new_dataset
| 0.998131 |
1504.04133
|
Liping Li
|
Liping Li, Wenyi Zhang, Yanjun Hu
|
On the Error Performance of Systematic Polar Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Systematic polar codes are shown to outperform non-systematic polar codes in
terms of the bit-error-rate (BER) performance. However theoretically the
mechanism behind the better performance of systematic polar codes is not yet
clear. In this paper, we set the theoretical framework to analyze the
performance of systematic polar codes. The exact evaluation of the BER of
systematic polar codes conditioned on the BER of non-systematic polar codes
involves in $2^{NR}$ terms where $N$ is the code block length and $R$ is the
code rate, resulting in a prohibitive number of computations for large block
lengths. By analyzing the polar code construction and the
successive-cancellation (SC) decoding process, we use a statistical model to
quantify the advantage of systematic polar codes over non-systematic polar
codes, so called the systematic gain in this paper. A composite model is
proposed to approximate the dominant error cases in the SC decoding process.
This composite model divides the errors into independent regions and coupled
regions, controlled by a coupling coefficient. Based on this model, the
systematic gain can be conveniently calculated. Numerical simulations are
provided in the paper showing very close approximations of the proposed model
in quantifying the systematic gain.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 08:26:55 GMT"
}
] | 2015-04-17T00:00:00 |
[
[
"Li",
"Liping",
""
],
[
"Zhang",
"Wenyi",
""
],
[
"Hu",
"Yanjun",
""
]
] |
new_dataset
| 0.998026 |
1406.5670
|
Zhirong Wu
|
Zhirong Wu, Shuran Song, Aditya Khosla, Fisher Yu, Linguang Zhang,
Xiaoou Tang, Jianxiong Xiao
|
3D ShapeNets: A Deep Representation for Volumetric Shapes
|
to be appeared in CVPR 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D shape is a crucial but heavily underutilized cue in today's computer
vision systems, mostly due to the lack of a good generic shape representation.
With the recent availability of inexpensive 2.5D depth sensors (e.g. Microsoft
Kinect), it is becoming increasingly important to have a powerful 3D shape
representation in the loop. Apart from category recognition, recovering full 3D
shapes from view-based 2.5D depth maps is also a critical part of visual
understanding. To this end, we propose to represent a geometric 3D shape as a
probability distribution of binary variables on a 3D voxel grid, using a
Convolutional Deep Belief Network. Our model, 3D ShapeNets, learns the
distribution of complex 3D shapes across different object categories and
arbitrary poses from raw CAD data, and discovers hierarchical compositional
part representations automatically. It naturally supports joint object
recognition and shape completion from 2.5D depth maps, and it enables active
object recognition through view planning. To train our 3D deep learning model,
we construct ModelNet -- a large-scale 3D CAD model dataset. Extensive
experiments show that our 3D deep representation enables significant
performance improvement over the-state-of-the-arts in a variety of tasks.
|
[
{
"version": "v1",
"created": "Sun, 22 Jun 2014 03:31:52 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 04:59:49 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Apr 2015 16:46:05 GMT"
}
] | 2015-04-16T00:00:00 |
[
[
"Wu",
"Zhirong",
""
],
[
"Song",
"Shuran",
""
],
[
"Khosla",
"Aditya",
""
],
[
"Yu",
"Fisher",
""
],
[
"Zhang",
"Linguang",
""
],
[
"Tang",
"Xiaoou",
""
],
[
"Xiao",
"Jianxiong",
""
]
] |
new_dataset
| 0.999019 |
1504.03965
|
Simon Lentner
|
Elisabeth Kraus and Simon D. Lentner
|
Nash Equilibria And Partition Functions Of Games With Many Dependent
Players
|
14 pages
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss and solve a model for a game with many players, where a subset of
truely deciding players is embedded into a hierarchy of dependent agents.
These interdependencies modify the game matrix and the Nash equilibria for
the deciding players. In a concrete example, we recognize the partition
function of the Ising model and for high dependency we observe a phase
transition to a new Nash equilibrium, which is the Pareto-efficient outcome.
An example we have in mind is the game theory for major shareholders in a
stock market, where intermediate companies decide according to a majority vote
of their owners and compete for the final profit. In our model, these
interdependency eventually forces cooperation.
|
[
{
"version": "v1",
"created": "Wed, 15 Apr 2015 16:54:29 GMT"
}
] | 2015-04-16T00:00:00 |
[
[
"Kraus",
"Elisabeth",
""
],
[
"Lentner",
"Simon D.",
""
]
] |
new_dataset
| 0.991365 |
1301.6150
|
Naveen Goela
|
Naveen Goela, Emmanuel Abbe, Michael Gastpar
|
Polar Codes For Broadcast Channels
|
25 pages, double-column, 7 figures
|
IEEE Transactions on Information Theory, vol. 61, no. 2, pp.
758-782, Feb. 2015
|
10.1109/TIT.2014.2378172
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are introduced for discrete memoryless broadcast channels. For
$m$-user deterministic broadcast channels, polarization is applied to map
uniformly random message bits from $m$ independent messages to one codeword
while satisfying broadcast constraints. The polarization-based codes achieve
rates on the boundary of the private-message capacity region. For two-user
noisy broadcast channels, polar implementations are presented for two
information-theoretic schemes: i) Cover's superposition codes; ii) Marton's
codes. Due to the structure of polarization, constraints on the auxiliary and
channel-input distributions are identified to ensure proper alignment of
polarization indices in the multi-user setting. The codes achieve rates on the
capacity boundary of a few classes of broadcast channels (e.g., binary-input
stochastically degraded). The complexity of encoding and decoding is $O(n*log
n)$ where $n$ is the block length. In addition, polar code sequences obtain a
stretched-exponential decay of $O(2^{-n^{\beta}})$ of the average block error
probability where $0 < \beta < 0.5$.
|
[
{
"version": "v1",
"created": "Fri, 25 Jan 2013 20:10:58 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Goela",
"Naveen",
""
],
[
"Abbe",
"Emmanuel",
""
],
[
"Gastpar",
"Michael",
""
]
] |
new_dataset
| 0.99984 |
1310.7536
|
Bei Zeng
|
Markus Grassl, Peter Shor, Graeme Smith, John Smolin, Bei Zeng
|
New Constructions of Codes for Asymmetric Channels via Concatenation
|
9 pages, 3 figures, 4 tables
|
IEEE Transactions on Information Theory, vol. 61, no. 4, pp.
1879-1886, 2015
|
10.1109/TIT.2015.2401567
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present new constructions of codes for asymmetric channels for both binary
and nonbinary alphabets, based on methods of generalized code concatenation.
For the binary asymmetric channel, our methods construct nonlinear
single-error-correcting codes from ternary outer codes. We show that some of
the Varshamov-Tenengol'ts-Constantin-Rao codes, a class of binary nonlinear
codes for this channel, have a nice structure when viewed as ternary codes. In
many cases, our ternary construction yields even better codes. For the
nonbinary asymmetric channel, our methods construct linear codes for many
lengths and distances which are superior to the linear codes of the same length
capable of correcting the same number of symmetric errors.
In the binary case, Varshamov has shown that almost all good linear codes for
the asymmetric channel are also good for the symmetric channel. Our results
indicate that Varshamov's argument does not extend to the nonbinary case, i.e.,
one can find better linear codes for asymmetric channels than for symmetric
ones.
|
[
{
"version": "v1",
"created": "Mon, 28 Oct 2013 19:03:20 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Grassl",
"Markus",
""
],
[
"Shor",
"Peter",
""
],
[
"Smith",
"Graeme",
""
],
[
"Smolin",
"John",
""
],
[
"Zeng",
"Bei",
""
]
] |
new_dataset
| 0.996895 |
1403.5045
|
Branislav Kveton
|
Branislav Kveton, Zheng Wen, Azin Ashkan, Hoda Eydgahi, Brian Eriksson
|
Matroid Bandits: Fast Combinatorial Optimization with Learning
| null | null | null | null |
cs.LG cs.AI cs.SY stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A matroid is a notion of independence in combinatorial optimization which is
closely related to computational efficiency. In particular, it is well known
that the maximum of a constrained modular function can be found greedily if and
only if the constraints are associated with a matroid. In this paper, we bring
together the ideas of bandits and matroids, and propose a new class of
combinatorial bandits, matroid bandits. The objective in these problems is to
learn how to maximize a modular function on a matroid. This function is
stochastic and initially unknown. We propose a practical algorithm for solving
our problem, Optimistic Matroid Maximization (OMM); and prove two upper bounds,
gap-dependent and gap-free, on its regret. Both bounds are sublinear in time
and at most linear in all other quantities of interest. The gap-dependent upper
bound is tight and we prove a matching lower bound on a partition matroid
bandit. Finally, we evaluate our method on three real-world problems and show
that it is practical.
|
[
{
"version": "v1",
"created": "Thu, 20 Mar 2014 05:52:43 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2014 06:25:22 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Jun 2014 20:23:34 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Kveton",
"Branislav",
""
],
[
"Wen",
"Zheng",
""
],
[
"Ashkan",
"Azin",
""
],
[
"Eydgahi",
"Hoda",
""
],
[
"Eriksson",
"Brian",
""
]
] |
new_dataset
| 0.97477 |
1403.5735
|
Jie Xu Dr.
|
Jie Xu and Rui Zhang
|
Cooperative Energy Trading in CoMP Systems Powered by Smart Grids
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the energy management in the coordinated multi-point
(CoMP) systems powered by smart grids, where each base station (BS) with local
renewable energy generation is allowed to implement the two-way energy trading
with the grid. Due to the uneven renewable energy supply and communication
energy demand over distributed BSs as well as the difference in the prices for
their buying/selling energy from/to the gird, it is beneficial for the
cooperative BSs to jointly manage their energy trading with the grid and energy
consumption in CoMP based communication for reducing the total energy cost.
Specifically, we consider the downlink transmission in one CoMP cluster by
jointly optimizing the BSs' purchased/sold energy units from/to the grid and
their cooperative transmit precoding, so as to minimize the total energy cost
subject to the given quality of service (QoS) constraints for the users. First,
we obtain the optimal solution to this problem by developing an algorithm based
on techniques from convex optimization and the uplink-downlink duality. Next,
we propose a sub-optimal solution of lower complexity than the optimal
solution, where zero-forcing (ZF) based precoding is implemented at the BSs.
Finally, through extensive simulations, we show the performance gain achieved
by our proposed joint energy trading and communication cooperation schemes in
terms of energy cost reduction, as compared to conventional schemes that
separately design communication cooperation and energy trading.
|
[
{
"version": "v1",
"created": "Sun, 23 Mar 2014 09:54:17 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2015 06:38:29 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Xu",
"Jie",
""
],
[
"Zhang",
"Rui",
""
]
] |
new_dataset
| 0.995493 |
1408.1119
|
Jonathan Scarlett
|
Jonathan Scarlett and Vincent Y. F. Tan
|
Second-Order Asymptotics for the Discrete Memoryless MAC with Degraded
Message Sets
|
5 Pages, 1 Figure. Follow-up paper of http://arxiv.org/abs/1310.1197.
Accepted to ISIT 2015
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the second-order asymptotics of the discrete memoryless
multiple-access channel with degraded message sets. For a fixed average error
probability $\epsilon\in(0,1)$ and an arbitrary point on the boundary of the
capacity region, we characterize the speed of convergence of rate pairs that
converge to that point for codes that have asymptotic error probability no
larger than $\epsilon$, thus complementing an analogous result given previously
for the Gaussian setting.
|
[
{
"version": "v1",
"created": "Tue, 5 Aug 2014 21:28:02 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Sep 2014 16:48:15 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2015 03:11:13 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Scarlett",
"Jonathan",
""
],
[
"Tan",
"Vincent Y. F.",
""
]
] |
new_dataset
| 0.970636 |
1412.0623
|
Sean Bell
|
Sean Bell and Paul Upchurch and Noah Snavely and Kavita Bala
|
Material Recognition in the Wild with the Materials in Context Database
|
CVPR 2015. Sean Bell and Paul Upchurch contributed equally
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recognizing materials in real-world images is a challenging task. Real-world
materials have rich surface texture, geometry, lighting conditions, and
clutter, which combine to make the problem particularly difficult. In this
paper, we introduce a new, large-scale, open dataset of materials in the wild,
the Materials in Context Database (MINC), and combine this dataset with deep
learning to achieve material recognition and segmentation of images in the
wild.
MINC is an order of magnitude larger than previous material databases, while
being more diverse and well-sampled across its 23 categories. Using MINC, we
train convolutional neural networks (CNNs) for two tasks: classifying materials
from patches, and simultaneous material recognition and segmentation in full
images. For patch-based classification on MINC we found that the best
performing CNN architectures can achieve 85.2% mean class accuracy. We convert
these trained CNN classifiers into an efficient fully convolutional framework
combined with a fully connected conditional random field (CRF) to predict the
material at every pixel in an image, achieving 73.1% mean class accuracy. Our
experiments demonstrate that having a large, well-sampled dataset such as MINC
is crucial for real-world material recognition and segmentation.
|
[
{
"version": "v1",
"created": "Mon, 1 Dec 2014 20:11:44 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2015 05:29:32 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Bell",
"Sean",
""
],
[
"Upchurch",
"Paul",
""
],
[
"Snavely",
"Noah",
""
],
[
"Bala",
"Kavita",
""
]
] |
new_dataset
| 0.999852 |
1504.03553
|
EPTCS
|
Natallia Kokash (Leiden Institute of Advanced Computer Science
(LIACS))
|
Handshaking Protocol for Distributed Implementation of Reo
|
In Proceedings FOCLASA 2014, arXiv:1502.03157
|
EPTCS 175, 2015, pp. 1-17
|
10.4204/EPTCS.175.1
| null |
cs.DC cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reo, an exogenous channel-based coordination language, is a model for service
coordination wherein services communicate through connectors formed by joining
binary communication channels. In order to establish transactional
communication among services as prescribed by connector semantics, distributed
ports exchange handshaking messages signalling which parties are ready to
provide or consume data. In this paper, we present a formal implementation
model for distributed Reo with communication delays and outline ideas for its
proof of correctness. To reason about Reo implementation formally, we introduce
Timed Action Constraint Automata (TACA) and explain how to compare TACA with
existing automata-based semantics for Reo. We use TACA to describe handshaking
behavior of Reo modeling primitives and argue that in any distributed circuit
remote Reo nodes and channels exposing such behavior commit to perform
transitions envisaged by the network semantics.
|
[
{
"version": "v1",
"created": "Thu, 12 Feb 2015 02:14:37 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Kokash",
"Natallia",
"",
"Leiden Institute of Advanced Computer Science"
]
] |
new_dataset
| 0.959178 |
1504.03564
|
Sadeque Khan
|
Sadeque Reza Khan and Farzana Sultana Dristy
|
Android based security and home automation system
|
10 pages,17 figures, Journal, International Journal of Ambient
Systems and Applications, Volume 3, 2015
| null |
10.5121/ijasa.2014.3102
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The smart mobile terminal operator platform Android is getting popular all
over the world with its wide variety of applications and enormous use in
numerous spheres of our daily life. Considering the fact of increasing demand
of home security and automation, an Android based control system is presented
in this paper where the proposed system can maintain the security of home main
entrance and also the car door lock. Another important feature of the designed
system is that it can control the overall appliances in a room. The mobile to
security system or home automation system interface is established through
Bluetooth. The hardware part is designed with the PIC microcontroller.
|
[
{
"version": "v1",
"created": "Sat, 28 Mar 2015 06:06:55 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Khan",
"Sadeque Reza",
""
],
[
"Dristy",
"Farzana Sultana",
""
]
] |
new_dataset
| 0.998212 |
1504.03628
|
Fabian Steiner
|
Fabian Steiner, Georg B\"ocherer, Gianluigi Liva
|
Protograph-Based LDPC Code Design for Shaped Bit-Metric Decoding
|
9 pages, 10 figures. arXiv admin note: substantial text overlap with
arXiv:1501.05595
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A protograph-based low-density parity-check (LDPC) code design technique for
bandwidth-efficient coded modulation is presented. The approach jointly
optimizes the LDPC code node degrees and the mapping of the coded bits to the
bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform
input and for BICM with probabilistic shaping, binary-input symmetric-output
surrogate channels for the code design are used. The constructed codes for
uniform inputs perform as good as the multi-edge type codes of Zhang and
Kschischang (2013). For 8-ASK and 64-ASK with probabilistic shaping, codes of
rates 2/3 and 5/6 with blocklength 64800 are designed, which operate within
0.63dB and 0.69dB of continuous AWGN capacity for a target frame error rate of
1e-3 at spectral efficiencies of 1.38 and 4.25 bits/channel use, respectively.
|
[
{
"version": "v1",
"created": "Tue, 14 Apr 2015 17:03:55 GMT"
}
] | 2015-04-15T00:00:00 |
[
[
"Steiner",
"Fabian",
""
],
[
"Böcherer",
"Georg",
""
],
[
"Liva",
"Gianluigi",
""
]
] |
new_dataset
| 0.997639 |
1311.4964
|
Su Hu
|
Su H, Guoan Bi, Yong Liang Guan, Shaoqian Li
|
TDCS-based Cognitive Radio Networks with Multiuser Interference
Avoidance
|
to be appeared in IEEE Transaction on Communications, 2014
|
IEEE Transactions on Communications 61(12): 4828-4835, 2013
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For overlay cognitive radio networks (CRNs), transform domain communication
system (TDCS) has been proposed to support multiuser communications through
spectrum bin nulling and frequency domain spreading. In TDCS-based CRNs, each
user is assigned a specific pseudorandom spreading sequence. However, the
existence of multiuser interference (MUI) is one of main concerns, due to the
non-zero cross-correlations between any pair of TDCS signals. In this paper, a
novel framework of TDCS-based CRNs with the joint design of sequences and
modulation schemes is presented to realize MUI avoidance. With the uncertainty
of spectrum sensing results in CRNs, we first introduce a unique sequence
design through two-dimensional time-frequency synthesis and obtain a class of
almost perfect sequences. That is, periodic auto-correlation and
cross-correlations are identically zero for most circular shifts. These
correlation properties are further exploited in conjunction with a
specially-designed cyclic code shift keying in order to achieve the advantage
of MUI avoidance. Numerical results demonstrate that the proposed TDCS-based
CRNs are considered as preferable candidates for decentralized networks against
the near-far problem.
|
[
{
"version": "v1",
"created": "Wed, 20 Nov 2013 06:42:18 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"H",
"Su",
""
],
[
"Bi",
"Guoan",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Li",
"Shaoqian",
""
]
] |
new_dataset
| 0.999251 |
1404.7739
|
Tuvi Etzion
|
Eli Ben-Sasson, Tuvi Etzion, Ariel Gabizon, and Netanel Raviv
|
Subspace Polynomials and Cyclic Subspace Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Subspace codes have received an increasing interest recently due to their
application in error-correction for random network coding. In particular,
cyclic subspace codes are possible candidates for large codes with efficient
encoding and decoding algorithms. In this paper we consider such cyclic codes
and provide constructions of optimal codes for which their codewords do not
have full orbits. We further introduce a new way to represent subspace codes by
a class of polynomials called subspace polynomials. We present some
constructions of such codes which are cyclic and analyze their parameters.
|
[
{
"version": "v1",
"created": "Wed, 30 Apr 2014 14:37:26 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Jan 2015 11:19:13 GMT"
},
{
"version": "v3",
"created": "Sun, 12 Apr 2015 12:48:30 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Ben-Sasson",
"Eli",
""
],
[
"Etzion",
"Tuvi",
""
],
[
"Gabizon",
"Ariel",
""
],
[
"Raviv",
"Netanel",
""
]
] |
new_dataset
| 0.99956 |
1412.0691
|
Hema Swetha Koppula
|
Ashutosh Saxena, Ashesh Jain, Ozan Sener, Aditya Jami, Dipendra K.
Misra, Hema S. Koppula
|
RoboBrain: Large-Scale Knowledge Engine for Robots
|
10 pages, 9 figures
| null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a knowledge engine, which learns and shares
knowledge representations, for robots to carry out a variety of tasks. Building
such an engine brings with it the challenge of dealing with multiple data
modalities including symbols, natural language, haptic senses, robot
trajectories, visual features and many others. The \textit{knowledge} stored in
the engine comes from multiple sources including physical interactions that
robots have while performing tasks (perception, planning and control),
knowledge bases from the Internet and learned representations from several
robotics research groups.
We discuss various technical aspects and associated challenges such as
modeling the correctness of knowledge, inferring latent information and
formulating different robotic tasks as queries to the knowledge engine. We
describe the system architecture and how it supports different mechanisms for
users and robots to interact with the engine. Finally, we demonstrate its use
in three important research areas: grounding natural language, perception, and
planning, which are the key building blocks for many robotic tasks. This
knowledge engine is a collaborative effort and we call it RoboBrain.
|
[
{
"version": "v1",
"created": "Mon, 1 Dec 2014 21:22:46 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Apr 2015 06:16:39 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Saxena",
"Ashutosh",
""
],
[
"Jain",
"Ashesh",
""
],
[
"Sener",
"Ozan",
""
],
[
"Jami",
"Aditya",
""
],
[
"Misra",
"Dipendra K.",
""
],
[
"Koppula",
"Hema S.",
""
]
] |
new_dataset
| 0.999609 |
1504.02840
|
Ahmad Pahlavan Tafti
|
Ahmad Pahlavan Tafti, Hamid Hassannia, Zeyun Yu
|
siftservice.com - Turning a Computer Vision algorithm into a World Wide
Web Service
|
8 pages, 7 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image features detection and description is a longstanding topic in computer
vision and pattern recognition areas. The Scale Invariant Feature Transform
(SIFT) is probably the most popular and widely demanded feature descriptor
which facilitates a variety of computer vision applications such as image
registration, object tracking, image forgery detection, and 3D surface
reconstruction. This work introduces a Software as a Service (SaaS) based
implementation of the SIFT algorithm which is freely available at
http://siftservice.com for any academic, educational and research purposes. The
service provides application-to-application interaction and aims Rapid
Application Development (RAD) and also fast prototyping for computer vision
students and researchers all around the world. An Internet connection is all
they need!
|
[
{
"version": "v1",
"created": "Sat, 11 Apr 2015 05:47:09 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Tafti",
"Ahmad Pahlavan",
""
],
[
"Hassannia",
"Hamid",
""
],
[
"Yu",
"Zeyun",
""
]
] |
new_dataset
| 0.999118 |
1504.02866
|
Bhaskar Bhuyan
|
Bhaskar Bhuyan and Nityananda Sarma
|
A Delay Aware Routing Protocol for Wireless Sensor Networks
|
6 Pages, 8 Figures, journal
|
IJCSI International Journal of Computer Science Issues, Volume 11,
Issue 6, No 2, November 2014
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Sensor Networks (WSNs) consist of sensor nodes which can be deployed
for various operations such as agriculture and environmental sensing, wild life
monitoring, health care, military surveillance, industrial control, home
automation, security etc. Quality of Service (QoS) is an important issue in
wireless sensor networks (WSNs) and providing QoS support in WSNs is an
emerging area of research. Due to resource constraints nature of sensor
networks like processing power, memory, bandwidth, energy etc. providing QoS
support in WSNs is a challenging task. Delay is an important QoS parameter for
forwarding data in a time constraint WSNs environment. In this paper we propose
a delay aware routing protocol for transmission of time critical event
information to the Sink of WSNs. The performance of the proposed protocol is
evaluated by NS2 simulations under different scenarios.
|
[
{
"version": "v1",
"created": "Sat, 11 Apr 2015 12:37:09 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Bhuyan",
"Bhaskar",
""
],
[
"Sarma",
"Nityananda",
""
]
] |
new_dataset
| 0.974159 |
1504.03013
|
EPTCS
|
Nachum Dershowitz, Evgenia Falkovich
|
Cellular Automata are Generic
|
In Proceedings DCM 2014, arXiv:1504.01927
|
EPTCS 179, 2015, pp. 17-32
|
10.4204/EPTCS.179.2
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Any algorithm (in the sense of Gurevich's abstract-state-machine
axiomatization of classical algorithms) operating over any arbitrary unordered
domain can be simulated by a dynamic cellular automaton, that is, by a
pattern-directed cellular automaton with unconstrained topology and with the
power to create new cells. The advantage is that the latter is closer to
physical reality. The overhead of our simulation is quadratic.
|
[
{
"version": "v1",
"created": "Sun, 12 Apr 2015 20:27:58 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Dershowitz",
"Nachum",
""
],
[
"Falkovich",
"Evgenia",
""
]
] |
new_dataset
| 0.995966 |
1504.03016
|
Marko Angjelichinoski
|
Marko Angjelichinoski, Cedomir Stefanovic, Petar Popovski, Hongpeng
Liu, Poh Chiang Loh, Frede Blaabjerg
|
Power Talk: How to Modulate Data over a DC Micro Grid Bus using Power
Electronics
|
IEEE GLOBECOM 2015
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a novel communication strategy for DC Micro Grids (MGs), termed
power talk, in which the devices communicate by modulating the power levels in
the DC bus. The information is transmitted by varying the parameters that the
MG units use to control the level of the common bus voltage, while it is
received by processing the bus measurements that units perform. This
communication is challenged by the fact that the voltage level is subject to
random disturbances, as the state of the MG changes with random load
variations. We develop a corresponding communication model and address the
random voltage fluctuations by using coding strategies that transform the MG
into some well-known communication channels. The performance analysis shows
that it is possible to mitigate the random voltage level variations and
communicate reliably over the MG bus.
|
[
{
"version": "v1",
"created": "Sun, 12 Apr 2015 20:46:38 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Angjelichinoski",
"Marko",
""
],
[
"Stefanovic",
"Cedomir",
""
],
[
"Popovski",
"Petar",
""
],
[
"Liu",
"Hongpeng",
""
],
[
"Loh",
"Poh Chiang",
""
],
[
"Blaabjerg",
"Frede",
""
]
] |
new_dataset
| 0.998992 |
1504.03161
|
Jun Zhao
|
Jun Zhao, Osman Ya\u{g}an, Virgil Gligor
|
Random intersection graphs and their applications in security, wireless
communication, and social networks
|
This is an invited paper in Information Theory and Applications
Workshop (ITA) 2015
| null | null | null |
cs.DM cs.CR cs.SI math.CO physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Random intersection graphs have received much interest and been used in
diverse applications. They are naturally induced in modeling secure sensor
networks under random key predistribution schemes, as well as in modeling the
topologies of social networks including common-interest networks, collaboration
networks, and actor networks. Simply put, a random intersection graph is
constructed by assigning each node a set of items in some random manner and
then putting an edge between any two nodes that share a certain number of
items.
Broadly speaking, our work is about analyzing random intersection graphs, and
models generated by composing it with other random graph models including
random geometric graphs and Erd\H{o}s-R\'enyi graphs. These compositional
models are introduced to capture the characteristics of various complex natural
or man-made networks more accurately than the existing models in the
literature. For random intersection graphs and their compositions with other
random graphs, we study properties such as ($k$-)connectivity,
($k$-)robustness, and containment of perfect matchings and Hamilton cycles. Our
results are typically given in the form of asymptotically exact probabilities
or zero-one laws specifying critical scalings, and provide key insights into
the design and analysis of various real-world networks.
|
[
{
"version": "v1",
"created": "Wed, 11 Feb 2015 09:37:09 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Zhao",
"Jun",
""
],
[
"Yağan",
"Osman",
""
],
[
"Gligor",
"Virgil",
""
]
] |
new_dataset
| 0.999107 |
1504.03184
|
Tslil Clingman
|
T. Clingman, Jeff Murugan, Jonathan P. Shock
|
Probability Density Functions from the Fisher Information Metric
|
16 pages, no figures
| null | null |
QGaSLAB-15-02
|
cs.IT math.DG math.IT math.ST physics.data-an stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show a general relation between the spatially disjoint product of
probability density functions and the sum of their Fisher information metric
tensors. We then utilise this result to give a method for constructing the
probability density functions for an arbitrary Riemannian Fisher information
metric tensor. We note further that this construction is extremely
unconstrained, depending only on certain continuity properties of the
probability density functions and a select symmetry of their domains.
|
[
{
"version": "v1",
"created": "Mon, 13 Apr 2015 13:53:37 GMT"
}
] | 2015-04-14T00:00:00 |
[
[
"Clingman",
"T.",
""
],
[
"Murugan",
"Jeff",
""
],
[
"Shock",
"Jonathan P.",
""
]
] |
new_dataset
| 0.955849 |
1503.08663
|
Guanbin Li
|
Guanbin Li and Yizhou Yu
|
Visual Saliency Based on Multiscale Deep Features
|
To appear in CVPR 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual saliency is a fundamental problem in both cognitive and computational
sciences, including computer vision. In this CVPR 2015 paper, we discover that
a high-quality visual saliency model can be trained with multiscale features
extracted using a popular deep learning architecture, convolutional neural
networks (CNNs), which have had many successes in visual recognition tasks. For
learning such saliency models, we introduce a neural network architecture,
which has fully connected layers on top of CNNs responsible for extracting
features at three different scales. We then propose a refinement method to
enhance the spatial coherence of our saliency results. Finally, aggregating
multiple saliency maps computed for different levels of image segmentation can
further boost the performance, yielding saliency maps better than those
generated from a single segmentation. To promote further research and
evaluation of visual saliency models, we also construct a new large database of
4447 challenging images and their pixelwise saliency annotation. Experimental
results demonstrate that our proposed method is capable of achieving
state-of-the-art performance on all public benchmarks, improving the F-Measure
by 5.0% and 13.2% respectively on the MSRA-B dataset and our new dataset
(HKU-IS), and lowering the mean absolute error by 5.7% and 35.1% respectively
on these two datasets.
|
[
{
"version": "v1",
"created": "Mon, 30 Mar 2015 13:21:09 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Mar 2015 05:21:02 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Apr 2015 06:40:46 GMT"
}
] | 2015-04-13T00:00:00 |
[
[
"Li",
"Guanbin",
""
],
[
"Yu",
"Yizhou",
""
]
] |
new_dataset
| 0.993982 |
1504.02491
|
Revital Hollander shabtai
|
Revital Hollander Shabtai and Yehuda Roditty
|
Line-Broadcasting in Complete k-Trees
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A line-broadcasting model in a connected graph $G=(V,E)$, $|V|=n$, is a model
in which one vertex, called the {\it originator} of the broadcast holds a
message that has to be transmitted to all vertices of the graph through
placement of a series of calls over the graph. In this model, an informed
vertex can transmit a message through a path of any length in a single time
unit, as long as two transmissions do not use the same edge at the same time.
Farley \cite{f} has shown that the process is completed within at most $\lceil
\log_{2}n \rceil$ time units from any originator in a tree (and thus in any
connected undirected graph). and that the cost of broadcasting one message from
any vertex is at most $(n-1) \lceil \log_{2}n \rceil$.
In this paper, we present lower and upper bounds for the cost to broadcast
one message in a complete $k-$tree, from any vertex using the line-broadcasting
model. We prove that if $B(u)$ is the minimum cost to broadcast in a graph
$G=(V,E)$ from a vertex $u \in V$ using the line-broadcasting model, then
$(1+o(1))n \le B(u) \le (2+o(1))n$, where $u$ is any vertex in a complete
$k$-tree. Furthermore, for certain conditions, $B(u) \le (2-o(1))n$.
|
[
{
"version": "v1",
"created": "Thu, 9 Apr 2015 20:29:22 GMT"
}
] | 2015-04-13T00:00:00 |
[
[
"Shabtai",
"Revital Hollander",
""
],
[
"Roditty",
"Yehuda",
""
]
] |
new_dataset
| 0.995563 |
1504.02576
|
Loet Leydesdorff
|
Johann Bauer, Loet Leydesdorff and Lutz Bornmann
|
Highly-cited papers in Library and Information Science (LIS): Authors,
institutions, and network structures
|
accepted for publication in the Journal of the Association for
Information Science and Technology (JASIST)
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a follow-up to the highly-cited authors list published by Thomson Reuters
in June 2014, we analyze the top-1% most frequently cited papers published
between 2002 and 2012 included in the Web of Science (WoS) subject category
"Information Science & Library Science." 798 authors contributed to 305 top-1%
publications; these authors were employed at 275 institutions. The authors at
Harvard University contributed the largest number of papers, when the addresses
are whole-number counted. However, Leiden University leads the ranking, if
fractional counting is used.
Twenty-three of the 798 authors were also listed as most highly-cited authors
by Thomson Reuters in June 2014 (http://highlycited.com/). Twelve of these 23
authors were involved in publishing four or more of the 305 papers under study.
Analysis of co-authorship relations among the 798 highly-cited scientists shows
that co-authorships are based on common interests in a specific topic. Three
topics were important between 2002 and 2012: (1) collection and exploitation of
information in clinical practices, (2) the use of internet in public
communication and commerce, and (3) scientometrics.
|
[
{
"version": "v1",
"created": "Fri, 10 Apr 2015 08:00:29 GMT"
}
] | 2015-04-13T00:00:00 |
[
[
"Bauer",
"Johann",
""
],
[
"Leydesdorff",
"Loet",
""
],
[
"Bornmann",
"Lutz",
""
]
] |
new_dataset
| 0.978979 |
1504.02578
|
David Terei
|
David Terei, Amit Levy
|
Blade: A Data Center Garbage Collector
|
14 pages, 9 figures
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An increasing number of high-performance distributed systems are written in
garbage collected languages. This removes a large class of harmful bugs from
these systems. However, it also introduces high tail-latency do to garbage
collection pause times. We address this problem through a new technique of
garbage collection avoidance which we call Blade. Blade is an API between the
collector and application developer that allows developers to leverage existing
failure recovery mechanisms in distributed systems to coordinate collection and
bound the latency impact. We describe Blade and implement it for the Go
programming language. We also investigate two different systems that utilize
Blade, a HTTP load-balancer and the Raft consensus algorithm. For the
load-balancer, we eliminate any latency introduced by the garbage collector,
for Raft, we bound the latency impact to a single network round-trip, (48
{\mu}s in our setup). In both cases, latency at the tail using Blade is up to
three orders of magnitude better.
|
[
{
"version": "v1",
"created": "Fri, 10 Apr 2015 08:05:40 GMT"
}
] | 2015-04-13T00:00:00 |
[
[
"Terei",
"David",
""
],
[
"Levy",
"Amit",
""
]
] |
new_dataset
| 0.987749 |
1504.02621
|
EPTCS
|
Christopher Bak, Glyn Faulkner, Detlef Plump, Colin Runciman
|
A Reference Interpreter for the Graph Programming Language GP 2
|
In Proceedings GaM 2015, arXiv:1504.02448
|
EPTCS 181, 2015, pp. 48-64
|
10.4204/EPTCS.181.4
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GP 2 is an experimental programming language for computing by graph
transformation. An initial interpreter for GP 2, written in the functional
language Haskell, provides a concise and simply structured reference
implementation. Despite its simplicity, the performance of the interpreter is
sufficient for the comparative investigation of a range of test programs. It
also provides a platform for the development of more sophisticated
implementations.
|
[
{
"version": "v1",
"created": "Fri, 10 Apr 2015 09:50:23 GMT"
}
] | 2015-04-13T00:00:00 |
[
[
"Bak",
"Christopher",
""
],
[
"Faulkner",
"Glyn",
""
],
[
"Plump",
"Detlef",
""
],
[
"Runciman",
"Colin",
""
]
] |
new_dataset
| 0.999211 |
1504.02148
|
Chao-Lin Liu
|
Peter K. Bol and Chao-Lin Liu and Hongsu Wang
|
Mining and discovering biographical information in Difangzhi with a
language-model-based approach
|
6 pages, 4 figures, 1 table, 2015 International Conference on Digital
Humanities. in Proceedings of the 2015 International Conference on Digital
Humanities (DH 2015). July 2015
| null | null | null |
cs.CL cs.CY cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present results of expanding the contents of the China Biographical
Database by text mining historical local gazetteers, difangzhi. The goal of the
database is to see how people are connected together, through kinship, social
connections, and the places and offices in which they served. The gazetteers
are the single most important collection of names and offices covering the Song
through Qing periods. Although we begin with local officials we shall
eventually include lists of local examination candidates, people from the
locality who served in government, and notable local figures with biographies.
The more data we collect the more connections emerge. The value of doing
systematic text mining work is that we can identify relevant connections that
are either directly informative or can become useful without deep historical
research. Academia Sinica is developing a name database for officials in the
central governments of the Ming and Qing dynasties.
|
[
{
"version": "v1",
"created": "Wed, 8 Apr 2015 22:38:35 GMT"
}
] | 2015-04-10T00:00:00 |
[
[
"Bol",
"Peter K.",
""
],
[
"Liu",
"Chao-Lin",
""
],
[
"Wang",
"Hongsu",
""
]
] |
new_dataset
| 0.959811 |
1504.02398
|
Dorian Galvez-Lopez
|
Dorian G\'alvez-L\'opez, Marta Salas, Juan D. Tard\'os, J. M. M.
Montiel
|
Real-time Monocular Object SLAM
| null | null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a real-time object-based SLAM system that leverages the largest
object database to date. Our approach comprises two main components: 1) a
monocular SLAM algorithm that exploits object rigidity constraints to improve
the map and find its real scale, and 2) a novel object recognition algorithm
based on bags of binary words, which provides live detections with a database
of 500 3D objects. The two components work together and benefit each other: the
SLAM algorithm accumulates information from the observations of the objects,
anchors object features to especial map landmarks and sets constrains on the
optimization. At the same time, objects partially or fully located within the
map are used as a prior to guide the recognition algorithm, achieving higher
recall. We evaluate our proposal on five real environments showing improvements
on the accuracy of the map and efficiency with respect to other
state-of-the-art techniques.
|
[
{
"version": "v1",
"created": "Thu, 9 Apr 2015 17:46:19 GMT"
}
] | 2015-04-10T00:00:00 |
[
[
"Gálvez-López",
"Dorian",
""
],
[
"Salas",
"Marta",
""
],
[
"Tardós",
"Juan D.",
""
],
[
"Montiel",
"J. M. M.",
""
]
] |
new_dataset
| 0.9971 |
1504.02443
|
EPTCS
|
Hartmut Lackner (Humboldt-Universit\"at zu Berlin), Martin Schmidt
(Humboldt-Universit\"at zu Berlin)
|
Potential Errors and Test Assessment in Software Product Line
Engineering
|
In Proceedings MBT 2015, arXiv:1504.01928
|
EPTCS 180, 2015, pp. 57-72
|
10.4204/EPTCS.180.4
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software product lines (SPL) are a method for the development of variant-rich
software systems. Compared to non-variable systems, testing SPLs is extensive
due to an increasingly amount of possible products. Different approaches exist
for testing SPLs, but there is less research for assessing the quality of these
tests by means of error detection capability. Such test assessment is based on
error injection into correct version of the system under test. However to our
knowledge, potential errors in SPL engineering have never been systematically
identified before. This article presents an overview over existing paradigms
for specifying software product lines and the errors that can occur during the
respective specification processes. For assessment of test quality, we leverage
mutation testing techniques to SPL engineering and implement the identified
errors as mutation operators. This allows us to run existing tests against
defective products for the purpose of test assessment. From the results, we
draw conclusions about the error-proneness of the surveyed SPL design paradigms
and how quality of SPL tests can be improved.
|
[
{
"version": "v1",
"created": "Thu, 9 Apr 2015 19:30:50 GMT"
}
] | 2015-04-10T00:00:00 |
[
[
"Lackner",
"Hartmut",
"",
"Humboldt-Universität zu Berlin"
],
[
"Schmidt",
"Martin",
"",
"Humboldt-Universität zu Berlin"
]
] |
new_dataset
| 0.989466 |
1306.4934
|
Igal Sason
|
Igal Sason
|
On the Corner Points of the Capacity Region of a Two-User Gaussian
Interference Channel
|
Submitted to the IEEE Trans. on Information Theory in July 17, 2014,
and revised in April 5, 2015. Presented in part at Allerton 2013, and also
presented in part with improved results at ISIT 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work considers the corner points of the capacity region of a two-user
Gaussian interference channel (GIC). In a two-user GIC, the rate pairs where
one user transmits its data at the single-user capacity (without interference),
and the other at the largest rate for which reliable communication is still
possible are called corner points. This paper relies on existing outer bounds
on the capacity region of a two-user GIC that are used to derive informative
bounds on the corner points of the capacity region. The new bounds refer to a
weak two-user GIC (i.e., when both cross-link gains in standard form are
positive and below 1), and a refinement of these bounds is obtained for the
case where the transmission rate of one user is within $\varepsilon > 0$ of the
single-user capacity. The bounds on the corner points are asymptotically tight
as the transmitted powers tend to infinity, and they are also useful for the
case of moderate SNR and INR. Upper and lower bounds on the gap (denoted by
$\Delta$) between the sum-rate and the maximal achievable total rate at the two
corner points are derived. This is followed by an asymptotic analysis analogous
to the study of the generalized degrees of freedom (where the SNR and INR
scalings are coupled such that $\frac{\log(\text{INR})}{\log(\text{SNR})} =
\alpha \geq 0$), leading to an asymptotic characterization of this gap which is
exact for the whole range of $\alpha$. The upper and lower bounds on $\Delta$
are asymptotically tight in the sense that they achieve the exact asymptotic
characterization. Improved bounds on $\Delta$ are derived for finite SNR and
INR, and their improved tightness is exemplified numerically.
|
[
{
"version": "v1",
"created": "Thu, 20 Jun 2013 16:42:39 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Jun 2013 22:06:09 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Jun 2013 14:04:13 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Aug 2013 12:09:43 GMT"
},
{
"version": "v5",
"created": "Wed, 14 Aug 2013 20:52:56 GMT"
},
{
"version": "v6",
"created": "Wed, 9 Oct 2013 15:44:48 GMT"
},
{
"version": "v7",
"created": "Sun, 8 Dec 2013 09:58:03 GMT"
},
{
"version": "v8",
"created": "Thu, 19 Dec 2013 20:19:53 GMT"
},
{
"version": "v9",
"created": "Tue, 7 Apr 2015 20:14:47 GMT"
}
] | 2015-04-09T00:00:00 |
[
[
"Sason",
"Igal",
""
]
] |
new_dataset
| 0.974526 |
1504.01747
|
Hosein Nikopour
|
Usa Vilaipornsawai, Hosein Nikopour, Alireza Bayesteh, and Jianglie Ma
|
SCMA for Open-Loop Joint Transmission CoMP
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sparse Code Multiple Access (SCMA), a non-orthogonal multiple access scheme,
has been introduced as a key 5G technology to improve spectral efficiency. In
this work, we propose SCMA to enable open-loop coordinated multipoint (CoMP)
joint transmission (JT). The scheme combines CoMP techniques with multi-user
SCMA (MU-SCMA) in downlink. This scheme provides open-loop user multiplexing
and JT in power and code domains, with robustness to mobility and low overhead
of channel state information (CSI) acquisition. The combined scheme is called
MU-SCMA-CoMP, in which SCMA layers and transmit power of multiple transmit
points (TPs) are shared among multiple users while a user may receive multiple
SCMA layers from multiple TPs within a CoMP cluster. The benefits of the
proposed scheme includes: i) drastic overhead reduction of CSI acquisition, ii)
significant increase in throughput and coverage, and iii) robustness to channel
aging. Various algorithms of MU-SCMA-CoMP are presented, including the
detection strategy, power sharing optimization, and scheduling. System level
evaluation shows that the proposed schemes provide significant throughput and
coverage gains over OFDMA for both pedestrian and vehicular users.
|
[
{
"version": "v1",
"created": "Tue, 7 Apr 2015 20:17:10 GMT"
}
] | 2015-04-09T00:00:00 |
[
[
"Vilaipornsawai",
"Usa",
""
],
[
"Nikopour",
"Hosein",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Ma",
"Jianglie",
""
]
] |
new_dataset
| 0.999342 |
1504.01771
|
Andrey Gushchin
|
Andrey Gushchin, Anwar Walid, Ao Tang
|
Scalable Routing in SDN-enabled Networks with Consolidated Middleboxes
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Middleboxes are special network devices that perform various functions such
as enabling security and efficiency. SDN-based routing approaches in networks
with middleboxes need to address resource constraints, such as memory in the
switches and processing power of middleboxes, and traversal constraint where a
flow must visit the required middleboxes in a specific order. In this work we
propose a solution based on MultiPoint-To-Point Trees (MPTPT) for routing
traffic in SDN-enabled networks with consolidated middleboxes. We show both
theoretically and via simulations that our solution significantly reduces the
number of routing rules in the switches, while guaranteeing optimum throughput
and meeting processing requirements. Additionally, the underlying algorithm has
low complexity making it suitable in dynamic network environment.
|
[
{
"version": "v1",
"created": "Tue, 7 Apr 2015 22:39:45 GMT"
}
] | 2015-04-09T00:00:00 |
[
[
"Gushchin",
"Andrey",
""
],
[
"Walid",
"Anwar",
""
],
[
"Tang",
"Ao",
""
]
] |
new_dataset
| 0.990134 |
1504.01942
|
Laura Leal Taix\'e
|
Laura Leal-Taix\'e and Anton Milan and Ian Reid and Stefan Roth and
Konrad Schindler
|
MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the recent past, the computer vision community has developed centralized
benchmarks for the performance evaluation of a variety of tasks, including
generic object and pedestrian detection, 3D reconstruction, optical flow,
single-object short-term tracking, and stereo estimation. Despite potential
pitfalls of such benchmarks, they have proved to be extremely helpful to
advance the state of the art in the respective area. Interestingly, there has
been rather limited work on the standardization of quantitative benchmarks for
multiple target tracking. One of the few exceptions is the well-known PETS
dataset, targeted primarily at surveillance applications. Despite being widely
used, it is often applied inconsistently, for example involving using different
subsets of the available data, different ways of training the models, or
differing evaluation scripts. This paper describes our work toward a novel
multiple object tracking benchmark aimed to address such issues. We discuss the
challenges of creating such a framework, collecting existing and new data,
gathering state-of-the-art methods to be tested on the datasets, and finally
creating a unified evaluation system. With MOTChallenge we aim to pave the way
toward a unified evaluation framework for a more meaningful quantification of
multi-target tracking.
|
[
{
"version": "v1",
"created": "Wed, 8 Apr 2015 12:56:38 GMT"
}
] | 2015-04-09T00:00:00 |
[
[
"Leal-Taixé",
"Laura",
""
],
[
"Milan",
"Anton",
""
],
[
"Reid",
"Ian",
""
],
[
"Roth",
"Stefan",
""
],
[
"Schindler",
"Konrad",
""
]
] |
new_dataset
| 0.985417 |
1411.3715
|
Daniele Barchiesi
|
Daniele Barchiesi, Dimitrios Giannoulis, Dan Stowell, Mark D. Plumbley
|
Acoustic Scene Classification
| null |
IEEE Signal Processing Magazine 32(3) (May 2015) 16-34
|
10.1109/MSP.2014.2326181
| null |
cs.SD cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we present an account of the state-of-the-art in acoustic
scene classification (ASC), the task of classifying environments from the
sounds they produce. Starting from a historical review of previous research in
this area, we define a general framework for ASC and present different imple-
mentations of its components. We then describe a range of different algorithms
submitted for a data challenge that was held to provide a general and fair
benchmark for ASC techniques. The dataset recorded for this purpose is
presented, along with the performance metrics that are used to evaluate the
algorithms and statistical significance tests to compare the submitted methods.
We use a baseline method that employs MFCCS, GMMS and a maximum likelihood
criterion as a benchmark, and only find sufficient evidence to conclude that
three algorithms significantly outperform it. We also evaluate the human
classification accuracy in performing a similar classification task. The best
performing algorithm achieves a mean accuracy that matches the median accuracy
obtained by humans, and common pairs of classes are misclassified by both
computers and humans. However, all acoustic scenes are correctly classified by
at least some individuals, while there are scenes that are misclassified by all
algorithms.
|
[
{
"version": "v1",
"created": "Thu, 13 Nov 2014 16:03:09 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"Barchiesi",
"Daniele",
""
],
[
"Giannoulis",
"Dimitrios",
""
],
[
"Stowell",
"Dan",
""
],
[
"Plumbley",
"Mark D.",
""
]
] |
new_dataset
| 0.999192 |
1502.06152
|
Graham H. Norton
|
Graham H. Norton
|
On Sequences, Rational Functions and Decomposition
|
Several more typos corrected. To appear in J. Applied Algebra in
Engineering, Communication and Computing. The final publication version is
available at Springer via http://dx.doi.org/10.1007/s00200-015-0256-5
| null |
10.1007/s00200-015-0256-5
| null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our overall goal is to unify and extend some results in the literature
related to the approximation of generating functions of finite and infinite
sequences over a field by rational functions. In our approach, numerators play
a significant role. We revisit a theorem of Niederreiter on (i) linear
complexities and (ii) '$n^{th}$ minimal polynomials' of an infinite sequence,
proved using partial quotients. We prove (i) and its converse from first
principles and generalise (ii) to rational functions where the denominator need
not have minimal degree. We prove (ii) in two parts: firstly for geometric
sequences and then for sequences with a jump in linear complexity. The basic
idea is to decompose the denominator as a sum of polynomial multiples of two
polynomials of minimal degree; there is a similar decomposition for the
numerators. The decomposition is unique when the denominator has degree at most
the length of the sequence. The proof also applies to rational functions
related to finite sequences, generalising a result of Massey. We give a number
of applications to rational functions associated to sequences.
|
[
{
"version": "v1",
"created": "Sat, 21 Feb 2015 23:29:58 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Mar 2015 20:38:35 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Apr 2015 07:16:07 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"Norton",
"Graham H.",
""
]
] |
new_dataset
| 0.964067 |
1504.01476
|
Sunil Kumar Kopparapu Dr
|
Lajish V. L. and Sunil Kumar Kopparapu
|
Mobile Phone Based Vehicle License Plate Recognition for Road Policing
|
7 pages; PReMI Experiential Workshop, Delhi
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Identity of a vehicle is done through the vehicle license plate by traffic
police in general. Au- tomatic vehicle license plate recognition has several
applications in intelligent traffic management systems. The security situation
across the globe and particularly in India demands a need to equip the traffic
police with a system that enables them to get instant details of a vehicle. The
system should be easy to use, should be mobile, and work 24 x 7. In this paper,
we describe a mobile phone based, client-server architected, license plate
recognition system. While we use the state of the art image processing and
pattern recognition algorithms tuned for Indian conditions to automatically
recognize non-uniform license plates, the main contribution is in creating an
end to end usable solution. The client application runs on a mobile device and
a server application, with access to vehicle information database, is hosted
centrally. The solution enables capture of license plate image captured by the
phone camera and passes to the server; on the server the license plate number
is recognized; the data associated with the number plate is then sent back to
the mobile device, instantaneously. We describe the end to end system
architecture in detail. A working prototype of the proposed system has been
implemented in the lab environment.
|
[
{
"version": "v1",
"created": "Tue, 7 Apr 2015 05:25:42 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"L.",
"Lajish V.",
""
],
[
"Kopparapu",
"Sunil Kumar",
""
]
] |
new_dataset
| 0.999753 |
1504.01488
|
Sunil Kumar Kopparapu Dr
|
Sunil Kumar Kopparapu, Lajish VL
|
On-line Handwritten Devanagari Character Recognition using Fuzzy
Directional Features
|
6 pages; 2009
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a new feature set for use in the recognition of on-line
handwritten Devanagari script based on Fuzzy Directional Features. Experiments
are conducted for the automatic recognition of isolated handwritten character
primitives (sub-character units). Initially we describe the proposed feature
set, called the Fuzzy Directional Features (FDF) and then show how these
features can be effectively utilized for writer independent character
recognition. Experimental results show that FDF set perform well for writer
independent data set at stroke level recognition. The main contribution of this
paper is the introduction of a novel feature set and establish experimentally
its ability in recognition of handwritten Devanagari script.
|
[
{
"version": "v1",
"created": "Tue, 7 Apr 2015 06:31:58 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"Kopparapu",
"Sunil Kumar",
""
],
[
"VL",
"Lajish",
""
]
] |
new_dataset
| 0.995868 |
1504.01526
|
MM Aftab Hossain
|
M. M. Aftab Hossain, Riku J\"antti, Cicek Cavdar
|
Energy saving market for mobile operators
|
6 pages, 2 figures, to be published in ICC 2015 workshop on Next
Generation Green ICT
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ensuring seamless coverage accounts for the lion's share of the energy
consumed in a mobile network. Overlapping coverage of three to five mobile
network operators (MNOs) results in enormous amount of energy waste which is
avoidable. The traffic demands of the mobile networks vary significantly
throughout the day. As the offered load for all networks are not same at a
given time and the differences in energy consumption at different loads are
significant, multi-MNO capacity/coverage sharing can dramatically reduce energy
consumption of mobile networks and provide the MNOs a cost effective means to
cope with the exponential growth of traffic. In this paper, we propose an
energy saving market for a multi-MNO network scenario. As the competing MNOs
are not comfortable with information sharing, we propose a double auction
clearinghouse market mechanism where MNOs sell and buy capacity in order to
minimize energy consumption. In our setting, each MNO proposes its bids and
asks simultaneously for buying and selling multi-unit capacities respectively
to an independent auctioneer, i.e., clearinghouse and ends up either as a buyer
or as a seller in each round. We show that the mechanism allows the MNOs to
save significant percentage of energy cost throughout a wide range of network
load. Different than other energy saving features such as cell sleep or antenna
muting which can not be enabled at heavy traffic load, dynamic capacity sharing
allows MNOs to handle traffic bursts with energy saving opportunity.
|
[
{
"version": "v1",
"created": "Tue, 7 Apr 2015 09:21:49 GMT"
}
] | 2015-04-08T00:00:00 |
[
[
"Hossain",
"M. M. Aftab",
""
],
[
"Jäntti",
"Riku",
""
],
[
"Cavdar",
"Cicek",
""
]
] |
new_dataset
| 0.988179 |
1504.00325
|
C. Lawrence Zitnick
|
Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam, Saurabh
Gupta, Piotr Dollar, C. Lawrence Zitnick
|
Microsoft COCO Captions: Data Collection and Evaluation Server
|
arXiv admin note: text overlap with arXiv:1411.4952
| null | null | null |
cs.CV cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe the Microsoft COCO Caption dataset and evaluation
server. When completed, the dataset will contain over one and a half million
captions describing over 330,000 images. For the training and validation
images, five independent human generated captions will be provided. To ensure
consistency in evaluation of automatic caption generation algorithms, an
evaluation server is used. The evaluation server receives candidate captions
and scores them using several popular metrics, including BLEU, METEOR, ROUGE
and CIDEr. Instructions for using the evaluation server are provided.
|
[
{
"version": "v1",
"created": "Wed, 1 Apr 2015 18:13:43 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2015 20:21:16 GMT"
}
] | 2015-04-07T00:00:00 |
[
[
"Chen",
"Xinlei",
""
],
[
"Fang",
"Hao",
""
],
[
"Lin",
"Tsung-Yi",
""
],
[
"Vedantam",
"Ramakrishna",
""
],
[
"Gupta",
"Saurabh",
""
],
[
"Dollar",
"Piotr",
""
],
[
"Zitnick",
"C. Lawrence",
""
]
] |
new_dataset
| 0.999288 |
1504.01027
|
Marco Aurelio dos Santos
|
Marco Santos
|
Mapeamento Sistematico
|
in Portuguese
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A systematic mapping is a way to identify, evaluate and interpret all
relevant research available to a matter of particular research. One of the
reasons for conducting systematic reviews is that it summarizes the existing
evidence regarding treatment or technology [Kitchenham, 2004].
|
[
{
"version": "v1",
"created": "Sat, 4 Apr 2015 17:14:33 GMT"
}
] | 2015-04-07T00:00:00 |
[
[
"Santos",
"Marco",
""
]
] |
new_dataset
| 0.984004 |
1504.01182
|
Nayan Jyoti Kalita
|
Nayan Jyoti Kalita, Baharul Islam
|
Bengali to Assamese Statistical Machine Translation using Moses (Corpus
Based)
|
6 pages, International Conference on Cognitive Computing and
Information Processing (CCIP-15), 3-4 March 2015, Noida (India)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine dialect interpretation assumes a real part in encouraging man-machine
correspondence and in addition men-men correspondence in Natural Language
Processing (NLP). Machine Translation (MT) alludes to utilizing machine to
change one dialect to an alternate. Statistical Machine Translation is a type
of MT consisting of Language Model (LM), Translation Model (TM) and decoder. In
this paper, Bengali to Assamese Statistical Machine Translation Model has been
created by utilizing Moses. Other translation tools like IRSTLM for Language
Model and GIZA-PP-V1.0.7 for Translation model are utilized within this
framework which is accessible in Linux situations. The purpose of the LM is to
encourage fluent output and the purpose of TM is to encourage similarity
between input and output, the decoder increases the probability of translated
text in target language. A parallel corpus of 17100 sentences in Bengali and
Assamese has been utilized for preparing within this framework. Measurable MT
procedures have not so far been generally investigated for Indian dialects. It
might be intriguing to discover to what degree these models can help the
immense continuous MT deliberations in the nation.
|
[
{
"version": "v1",
"created": "Mon, 6 Apr 2015 01:18:24 GMT"
}
] | 2015-04-07T00:00:00 |
[
[
"Kalita",
"Nayan Jyoti",
""
],
[
"Islam",
"Baharul",
""
]
] |
new_dataset
| 0.994714 |
1306.3914
|
Thomas Zemen
|
Laura Bernad\'o and Thomas Zemen and Fredrik Tufvesson and Andreas F.
Molisch and Christoph F. Mecklenbr\"auker
|
Time- and Frequency-Varying $K$-Factor of Non-Stationary Vehicular
Channels for Safety Relevant Scenarios
|
26 pages, 12 figures, submitted to IEEE Transactions on Intelligent
Transportation Systems for possible publication
|
IEEE Transactions on Intelligent Transportation Systems, vol. 16,
no. 2, April 2015
|
10.1109/TITS.2014.2349364
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vehicular communication channels are characterized by a non-stationary time-
and frequency-selective fading process due to fast changes in the environment.
We characterize the distribution of the envelope of the first delay bin in
vehicle-to-vehicle channels by means of its Rician $K$-factor. We analyze the
time-frequency variability of this channel parameter using vehicular channel
measurements at 5.6 GHz with a bandwidth of 240 MHz for safety-relevant
scenarios in intelligent transportation systems (ITS). This data enables a
frequency-variability analysis from an IEEE 802.11p system point of view, which
uses 10 MHz channels. We show that the small-scale fading of the envelope of
the first delay bin is Ricean distributed with a varying $K$-factor. The later
delay bins are Rayleigh distributed. We demonstrate that the $K$-factor cannot
be assumed to be constant in time and frequency. The causes of these variations
are the frequency-varying antenna radiation patterns as well as the
time-varying number of active scatterers, and the effects of vegetation. We
also present a simple but accurate bi-modal Gaussian mixture model, that allows
to capture the $K$-factor variability in time for safety-relevant ITS
scenarios.
|
[
{
"version": "v1",
"created": "Mon, 17 Jun 2013 16:12:50 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Jan 2014 19:57:20 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Apr 2014 17:44:25 GMT"
}
] | 2015-04-06T00:00:00 |
[
[
"Bernadó",
"Laura",
""
],
[
"Zemen",
"Thomas",
""
],
[
"Tufvesson",
"Fredrik",
""
],
[
"Molisch",
"Andreas F.",
""
],
[
"Mecklenbräuker",
"Christoph F.",
""
]
] |
new_dataset
| 0.963312 |
1504.00847
|
Walid Hachem
|
Walid Hachem, Aris Moustakas and Leonid Pastur
|
The Shannon's mutual information of a multiple antenna time and
frequency dependent channel: an ergodic operator approach
| null | null | null | null |
cs.IT math-ph math.IT math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider a random non-centered multiple antenna radio transmission channel.
Assume that the deterministic part of the channel is itself frequency
selective, and that the random multipath part is represented by an ergodic
stationary vector process. In the Hilbert space $l^2({\mathbb Z})$, one can
associate to this channel a random ergodic self-adjoint operator having a
so-called Integrated Density of States (IDS). Shannon's mutual information per
receive antenna of this channel coincides then with the integral of a $\log$
function with respect to the IDS. In this paper, it is shown that when the
numbers of antennas at the transmitter and at the receiver tend to infinity at
the same rate, the mutual information per receive antenna tends to a quantity
that can be identified and, in fact, is closely related to that obtained within
the random matrix approach. This result can be obtained by analyzing the
behavior of the Stieltjes transform of the IDS in the regime of the large
numbers of antennas.
|
[
{
"version": "v1",
"created": "Fri, 3 Apr 2015 14:00:35 GMT"
}
] | 2015-04-06T00:00:00 |
[
[
"Hachem",
"Walid",
""
],
[
"Moustakas",
"Aris",
""
],
[
"Pastur",
"Leonid",
""
]
] |
new_dataset
| 0.950707 |
1404.0284
|
Jack Kelly
|
Jack Kelly and William Knottenbelt
|
The UK-DALE dataset, domestic appliance-level electricity demand and
whole-house demand from five UK homes
| null |
Scientific Data 2 (2015) Article number: 150007 (2015)
|
10.1038/sdata.2015.7
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many countries are rolling out smart electricity meters. These measure a
home's total power demand. However, research into consumer behaviour suggests
that consumers are best able to improve their energy efficiency when provided
with itemised, appliance-by-appliance consumption information. Energy
disaggregation is a computational technique for estimating
appliance-by-appliance energy consumption from a whole-house meter signal.
To conduct research on disaggregation algorithms, researchers require data
describing not just the aggregate demand per building but also the `ground
truth' demand of individual appliances. In this context, we present UK-DALE: an
open-access dataset from the UK recording Domestic Appliance-Level Electricity
at a sample rate of 16 kHz for the whole-house and at 1/6 Hz for individual
appliances. This is the first open access UK dataset at this temporal
resolution. We recorded from five houses, one of which was recorded for 655
days, the longest duration we are aware of for any energy dataset at this
sample rate. We also describe the low-cost, open-source, wireless system we
built for collecting our dataset.
|
[
{
"version": "v1",
"created": "Tue, 1 Apr 2014 15:49:00 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2015 14:29:00 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2015 10:45:57 GMT"
}
] | 2015-04-02T00:00:00 |
[
[
"Kelly",
"Jack",
""
],
[
"Knottenbelt",
"William",
""
]
] |
new_dataset
| 0.99955 |
1504.00331
|
Eldon Carman Jr
|
E. Preston Carman Jr. (1), Till Westmann (2), Vinayak R. Borkar (3),
Michael J. Carey (3) and Vassilis J. Tsotras (1) ((1) UC Riverside, (2)
Oracle Labs, (3) UC Irvine)
|
Apache VXQuery: A Scalable XQuery Implementation
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The wide use of XML for document management and data exchange has created the
need to query large repositories of XML data. To efficiently query such large
data collections and take advantage of parallelism, we have implemented Apache
VXQuery, an open-source scalable XQuery processor. The system builds upon two
other open-source frameworks -- Hyracks, a parallel execution engine, and
Algebricks, a language agnostic compiler toolbox. Apache VXQuery extends these
two frameworks and provides an implementation of the XQuery specifics (data
model, data-model dependent functions and optimizations, and a parser). We
describe the architecture of Apache VXQuery, its integration with Hyracks and
Algebricks, and the XQuery optimization rules applied to the query plan to
improve path expression efficiency and to enable query parallelism. An
experimental evaluation using a real 500GB dataset with various selection,
aggregation and join XML queries shows that Apache VXQuery performs well both
in terms of scale-up and speed-up. Our experiments show that it is about 3x
faster than Saxon (an open-source and commercial XQuery processor) on a 4-core,
single node implementation, and around 2.5x faster than Apache MRQL (a
MapReduce-based parallel query processor) on an eight (4-core) node cluster.
|
[
{
"version": "v1",
"created": "Wed, 1 Apr 2015 18:27:23 GMT"
}
] | 2015-04-02T00:00:00 |
[
[
"Carman",
"E. Preston",
"Jr."
],
[
"Westmann",
"Till",
""
],
[
"Borkar",
"Vinayak R.",
""
],
[
"Carey",
"Michael J.",
""
],
[
"Tsotras",
"Vassilis J.",
""
]
] |
new_dataset
| 0.992282 |
1404.5244
|
Dmitry Kosolobov
|
Dmitry Kosolobov, Mikhail Rubinchik, Arseny M. Shur
|
$\mathrm{Pal}^k$ Is Linear Recognizable Online
|
18 pages, 5 figures, presented in SOFSEM 2015
|
Proc. SOFSEM 2015. Springer, 2015. LNCS Vol. 8939, 289-301
| null | null |
cs.FL cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a language $L$ that is online recognizable in linear time and space, we
construct a linear time and space online recognition algorithm for the language
$L\cdot\mathrm{Pal}$, where $\mathrm{Pal}$ is the language of all nonempty
palindromes. Hence for every fixed positive $k$, $\mathrm{Pal}^k$ is online
recognizable in linear time and space. Thus we solve an open problem posed by
Galil and Seiferas in 1978.
|
[
{
"version": "v1",
"created": "Mon, 21 Apr 2014 17:07:52 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Aug 2014 19:17:25 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Sep 2014 18:36:41 GMT"
},
{
"version": "v4",
"created": "Fri, 30 Jan 2015 14:34:02 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Kosolobov",
"Dmitry",
""
],
[
"Rubinchik",
"Mikhail",
""
],
[
"Shur",
"Arseny M.",
""
]
] |
new_dataset
| 0.978543 |
1407.0970
|
Saverio Giallorenzo
|
Mila Dalla Preda, Maurizio Gabbrielli, Saverio Giallorenzo, Ivan
Lanese, and Jacopo Mauro
|
Dynamic Choreographies - Safe Runtime Updates of Distributed
Applications
|
Technical Report
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Programming distributed applications free from communication deadlocks and
races is complex. Preserving these properties when applications are updated at
runtime is even harder. We present DIOC, a language for programming distributed
applications that are free from deadlocks and races by construction. A DIOC
program describes a whole distributed application as a unique entity
(choreography). DIOC allows the programmer to specify which parts of the
application can be updated. At runtime, these parts may be replaced by new DIOC
fragments from outside the application. DIOC programs are compiled, generating
code for each site, in a lower-level language called DPOC. We formalise both
DIOC and DPOC semantics as labelled transition systems and prove the
correctness of the compilation as a trace equivalence result. As corollaries,
DPOC applications are free from communication deadlocks and races, even in
presence of runtime updates.
|
[
{
"version": "v1",
"created": "Thu, 3 Jul 2014 16:12:12 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jan 2015 08:46:47 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Mar 2015 13:07:40 GMT"
},
{
"version": "v4",
"created": "Tue, 31 Mar 2015 06:48:05 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Preda",
"Mila Dalla",
""
],
[
"Gabbrielli",
"Maurizio",
""
],
[
"Giallorenzo",
"Saverio",
""
],
[
"Lanese",
"Ivan",
""
],
[
"Mauro",
"Jacopo",
""
]
] |
new_dataset
| 0.990265 |
1412.7210
|
Antti Rasmus
|
Antti Rasmus, Tapani Raiko, Harri Valpola
|
Denoising autoencoder with modulated lateral connections learns
invariant representations of natural images
|
Presentation at ICLR 2015 workshop
| null | null | null |
cs.NE cs.CV cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suitable lateral connections between encoder and decoder are shown to allow
higher layers of a denoising autoencoder (dAE) to focus on invariant
representations. In regular autoencoders, detailed information needs to be
carried through the highest layers but lateral connections from encoder to
decoder relieve this pressure. It is shown that abstract invariant features can
be translated to detailed reconstructions when invariant features are allowed
to modulate the strength of the lateral connection. Three dAE structures with
modulated and additive lateral connections, and without lateral connections
were compared in experiments using real-world images. The experiments verify
that adding modulated lateral connections to the model 1) improves the accuracy
of the probability model for inputs, as measured by denoising performance; 2)
results in representations whose degree of invariance grows faster towards the
higher layers; and 3) supports the formation of diverse invariant poolings.
|
[
{
"version": "v1",
"created": "Mon, 22 Dec 2014 23:36:15 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Dec 2014 12:17:51 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Feb 2015 20:56:43 GMT"
},
{
"version": "v4",
"created": "Tue, 31 Mar 2015 15:49:16 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Rasmus",
"Antti",
""
],
[
"Raiko",
"Tapani",
""
],
[
"Valpola",
"Harri",
""
]
] |
new_dataset
| 0.995331 |
1503.08818
|
Zimu Yuan
|
Zimu Yuan, Zhiwei Xu
|
Founding Digital Currency on Imprecise Commodity
|
arXiv admin note: text overlap with arXiv:1503.08407
| null | null | null |
cs.CY cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current digital currency schemes provide instantaneous exchange on precise
commodity, in which "precise" means a buyer can possibly verify the function of
the commodity without error. However, imprecise commodities, e.g. statistical
data, with error existing are abundant in digital world. Existing digital
currency schemes do not offer a mechanism to help the buyer for payment
decision on precision of commodity, which may lead the buyer to a dilemma
between having to buy and being unconfident. In this paper, we design a
currency schemes IDCS for imprecise digital commodity. IDCS completes a trade
in three stages of handshake between a buyer and providers. We present an IDCS
prototype implementation that assigns weights on the trustworthy of the
providers, and calculates a confidence level for the buyer to decide the
quality of a imprecise commodity. In experiment, we characterize the
performance of IDCS prototype under varying impact factors.
|
[
{
"version": "v1",
"created": "Sun, 29 Mar 2015 09:35:17 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Yuan",
"Zimu",
""
],
[
"Xu",
"Zhiwei",
""
]
] |
new_dataset
| 0.996321 |
1503.08853
|
Ali Borji
|
Ali Borji and James Tanner
|
Reconciling saliency and object center-bias hypotheses in explaining
free-viewing fixations
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Predicting where people look in natural scenes has attracted a lot of
interest in computer vision and computational neuroscience over the past two
decades. Two seemingly contrasting categories of cues have been proposed to
influence where people look: \textit{low-level image saliency} and
\textit{high-level semantic information}. Our first contribution is to take a
detailed look at these cues to confirm the hypothesis proposed by
Henderson~\cite{henderson1993eye} and Nuthmann \&
Henderson~\cite{nuthmann2010object} that observers tend to look at the center
of objects. We analyzed fixation data for scene free-viewing over 17 observers
on 60 fully annotated images with various types of objects. Images contained
different types of scenes, such as natural scenes, line drawings, and 3D
rendered scenes. Our second contribution is to propose a simple combined model
of low-level saliency and object center-bias that outperforms each individual
component significantly over our data, as well as on the OSIE dataset by Xu et
al.~\cite{xu2014predicting}. The results reconcile saliency with object
center-bias hypotheses and highlight that both types of cues are important in
guiding fixations. Our work opens new directions to understand strategies that
humans use in observing scenes and objects, and demonstrates the construction
of combined models of low-level saliency and high-level object-based
information.
|
[
{
"version": "v1",
"created": "Mon, 30 Mar 2015 21:07:53 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Borji",
"Ali",
""
],
[
"Tanner",
"James",
""
]
] |
new_dataset
| 0.991453 |
1503.08934
|
Tadashi Wadayama
|
Takahiro Oshima and Tadashi Wadayama
|
Index ARQ Protocol for Reliable Contents Distribution over Broadcast
Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present paper, we propose a broadcast ARQ protocol based on the
concept of index coding. In the proposed scenario, a server wishes to transmit
a finite sequence of packets to multiple receivers via a broadcast channel with
packet erasures until all of the receivers successfully receive all of the
packets. In the retransmission phase, the server produces a coded packet as a
retransmitted packet based on the side-information sent from the receivers via
feedback channels. A notable feature of the proposed protocol is that the
decoding process at the receiver side has low decoding complexity because only
a small number of addition operations are needed in order to recover an
intended packet. This feature may be preferable for reducing the power
consumption of receivers. The throughput performance of the proposed protocol
is close to that of the ideal FEC throughput performance when the erasure
probability is less than $0.1$. This implies that the proposed protocol
provides almost optimal throughput performance in such a regime.
|
[
{
"version": "v1",
"created": "Tue, 31 Mar 2015 07:08:34 GMT"
}
] | 2015-04-01T00:00:00 |
[
[
"Oshima",
"Takahiro",
""
],
[
"Wadayama",
"Tadashi",
""
]
] |
new_dataset
| 0.998586 |
1403.0445
|
Matthieu Boutier
|
Matthieu Boutier (PPS), Juliusz Chroboczek (PPS)
|
Source-specific routing
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Source-specific routing (not to be confused with source routing) is a routing
technique where routing decisions depend on both the source and the destination
address of a packet. Source-specific routing solves some difficult problems
related to multihoming, notably in edge networks, and is therefore a useful
addition to the multihoming toolbox. In this paper, we describe the semantics
of source-specific packet forwarding, and describe the design and
implementation of a source-specific extension to the Babel routing protocol as
well as its implementation - to our knowledge, the first complete
implementation of a source-specific dynamic routing protocol, including a
disambiguation algorithm that makes our implementation work over widely
available networking APIs. We further discuss interoperability between ordinary
next-hop and source-specific dynamic routing protocols. Our implementation has
seen a moderate amount of deployment, notably as a testbed for the IETF Homenet
working group.
|
[
{
"version": "v1",
"created": "Mon, 3 Mar 2014 14:38:07 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Dec 2014 08:17:08 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Dec 2014 14:48:55 GMT"
},
{
"version": "v4",
"created": "Mon, 30 Mar 2015 08:46:28 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Boutier",
"Matthieu",
"",
"PPS"
],
[
"Chroboczek",
"Juliusz",
"",
"PPS"
]
] |
new_dataset
| 0.999643 |
1408.4077
|
Laszlo Kish
|
Laszlo B. Kish, Claes-Goran Granqvist, Sergey M. Bezrukov and Tamas
Horvath
|
Brain: Biological noise-based logic
|
paper in press
|
Advances in Cognitive Neurodynamics 2015, pp 319-322
|
10.1007/978-94-017-9548-7_45
| null |
cs.NE cs.ET
|
http://creativecommons.org/licenses/by/3.0/
|
Neural spikes in the brain form stochastic sequences, i.e., belong to the
class of pulse noises. This stochasticity is a counterintuitive feature because
extracting information - such as the commonly supposed neural information of
mean spike frequency - requires long times for reasonably low error
probability. The mystery could be solved by noise-based logic, wherein
randomness has an important function and allows large speed enhancements for
special-purpose tasks, and the same mechanism is at work for the brain logic
version of this concept.
|
[
{
"version": "v1",
"created": "Mon, 18 Aug 2014 17:49:28 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Kish",
"Laszlo B.",
""
],
[
"Granqvist",
"Claes-Goran",
""
],
[
"Bezrukov",
"Sergey M.",
""
],
[
"Horvath",
"Tamas",
""
]
] |
new_dataset
| 0.983111 |
1411.5847
|
Pierre-Lo\"ic Garoche
|
Assal\'e Adj\'e and Pierre-Lo\"ic Garoche and Alexis Werey
|
Quadratic Zonotopes:An extension of Zonotopes to Quadratic Arithmetics
|
17 pages, 5 figures, 1 table
| null | null | null |
cs.LO math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Affine forms are a common way to represent convex sets of $\mathbb{R}$ using
a base of error terms $\epsilon \in [-1, 1]^m$. Quadratic forms are an
extension of affine forms enabling the use of quadratic error terms $\epsilon_i
\epsilon_j$.
In static analysis, the zonotope domain, a relational abstract domain based
on affine forms has been used in a wide set of settings, e.g. set-based
simulation for hybrid systems, or floating point analysis, providing relational
abstraction of functions with a cost linear in the number of errors terms.
In this paper, we propose a quadratic version of zonotopes. We also present a
new algorithm based on semi-definite programming to project a quadratic
zonotope, and therefore quadratic forms, to intervals. All presented material
has been implemented and applied on representative examples.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2014 12:43:01 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Mar 2015 20:26:26 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Adjé",
"Assalé",
""
],
[
"Garoche",
"Pierre-Loïc",
""
],
[
"Werey",
"Alexis",
""
]
] |
new_dataset
| 0.986073 |
1503.04990
|
Michael Bekos
|
Michael A. Bekos, Till Bruckdorfer, Michael Kaufmann, Chrysanthi N.
Raftopoulou
|
The Book Thickness of 1-Planar Graphs is Constant
| null | null | null | null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a book embedding, the vertices of a graph are placed on the spine of a
book and the edges are assigned to pages, so that edges on the same page do not
cross. In this paper, we prove that every $1$-planar graph (that is, a graph
that can be drawn on the plane such that no edge is crossed more than once)
admits an embedding in a book with constant number of pages. To the best of our
knowledge, the best non-trivial previous upper-bound is $O(\sqrt{n})$, where
$n$ is the number of vertices of the graph.
|
[
{
"version": "v1",
"created": "Tue, 17 Mar 2015 10:49:36 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2015 09:45:16 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Bekos",
"Michael A.",
""
],
[
"Bruckdorfer",
"Till",
""
],
[
"Kaufmann",
"Michael",
""
],
[
"Raftopoulou",
"Chrysanthi N.",
""
]
] |
new_dataset
| 0.981794 |
1503.08558
|
Konstantin Avrachenkov
|
Konstantin Avrachenkov (INRIA Sophia Antipolis), Vivek Borkar (EE-IIT)
|
Whittle Index Policy for Crawling Ephemeral Content
| null | null | null | null |
cs.IR cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a task of scheduling a crawler to retrieve content from several
sites with ephemeral content. A user typically loses interest in ephemeral
content, like news or posts at social network groups, after several days or
hours. Thus, development of timely crawling policy for such ephemeral
information sources is very important. We first formulate this problem as an
optimal control problem with average reward. The reward can be measured in the
number of clicks or relevant search requests. The problem in its initial
formulation suffers from the curse of dimensionality and quickly becomes
intractable even with moderate number of information sources. Fortunately, this
problem admits a Whittle index, which leads to problem decomposition and to a
very simple and efficient crawling policy. We derive the Whittle index and
provide its theoretical justification.
|
[
{
"version": "v1",
"created": "Mon, 30 Mar 2015 06:45:31 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Borkar",
"Vivek",
"",
"EE-IIT"
]
] |
new_dataset
| 0.95656 |
1503.08581
|
Ioannis Partalas
|
Ioannis Partalas, Aris Kosmopoulos, Nicolas Baskiotis, Thierry
Artieres, George Paliouras, Eric Gaussier, Ion Androutsopoulos, Massih-Reza
Amini, Patrick Galinari
|
LSHTC: A Benchmark for Large-Scale Text Classification
| null | null | null | null |
cs.IR cs.CL cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LSHTC is a series of challenges which aims to assess the performance of
classification systems in large-scale classification in a a large number of
classes (up to hundreds of thousands). This paper describes the dataset that
have been released along the LSHTC series. The paper details the construction
of the datsets and the design of the tracks as well as the evaluation measures
that we implemented and a quick overview of the results. All of these datasets
are available online and runs may still be submitted on the online server of
the challenges.
|
[
{
"version": "v1",
"created": "Mon, 30 Mar 2015 08:03:47 GMT"
}
] | 2015-03-31T00:00:00 |
[
[
"Partalas",
"Ioannis",
""
],
[
"Kosmopoulos",
"Aris",
""
],
[
"Baskiotis",
"Nicolas",
""
],
[
"Artieres",
"Thierry",
""
],
[
"Paliouras",
"George",
""
],
[
"Gaussier",
"Eric",
""
],
[
"Androutsopoulos",
"Ion",
""
],
[
"Amini",
"Massih-Reza",
""
],
[
"Galinari",
"Patrick",
""
]
] |
new_dataset
| 0.99987 |
1412.6937
|
Xudong Chen
|
Xudong Chen, M.-A. Belabbas and Tamer Basar
|
Formation Control with Triangulated Laman Graphs
| null | null | null | null |
cs.SY math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Formation control deals with the design of decentralized control laws that
stabilize agents at prescribed distances from each other. We call any
configuration that satisfies the inter-agent distance conditions a target
configuration. It is well known that when the distance conditions are defined
via a rigid graph, there is a finite number of target configurations modulo
rotations and translations. We can thus recast the objective of formation
control as stabilizing one or many of the target configurations. A major issue
is that such control laws will also have equilibria corresponding to
configurations which do not meet the desired inter-agent distance conditions;
we refer to these as undesired equilibria. The undesired equilibria become
problematic if they are also stable. Designing decentralized control laws whose
stable equilibria are all target configurations in the case of a general rigid
graph is still an open problem. We propose here a partial solution to this
problem by exhibiting a class of rigid graphs and control laws for which all
stable equilibria are target configurations.
|
[
{
"version": "v1",
"created": "Mon, 22 Dec 2014 11:40:14 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Dec 2014 13:18:58 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Feb 2015 01:50:49 GMT"
},
{
"version": "v4",
"created": "Fri, 27 Mar 2015 18:06:52 GMT"
}
] | 2015-03-30T00:00:00 |
[
[
"Chen",
"Xudong",
""
],
[
"Belabbas",
"M. -A.",
""
],
[
"Basar",
"Tamer",
""
]
] |
new_dataset
| 0.998034 |
1503.07881
|
Yonathan Perez
|
Yonathan Perez, Rok Sosic, Arijit Banerjee, Rohan Puttagunta, Martin
Raison, Pararth Shah, Jure Leskovec
|
Ringo: Interactive Graph Analytics on Big-Memory Machines
|
6 pages, 2 figures
| null |
10.1145/2723372.2735369
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Ringo, a system for analysis of large graphs. Graphs provide a way
to represent and analyze systems of interacting objects (people, proteins,
webpages) with edges between the objects denoting interactions (friendships,
physical interactions, links). Mining graphs provides valuable insights about
individual objects as well as the relationships among them.
In building Ringo, we take advantage of the fact that machines with large
memory and many cores are widely available and also relatively affordable. This
allows us to build an easy-to-use interactive high-performance graph analytics
system. Graphs also need to be built from input data, which often resides in
the form of relational tables. Thus, Ringo provides rich functionality for
manipulating raw input data tables into various kinds of graphs. Furthermore,
Ringo also provides over 200 graph analytics functions that can then be applied
to constructed graphs.
We show that a single big-memory machine provides a very attractive platform
for performing analytics on all but the largest graphs as it offers excellent
performance and ease of use as compared to alternative approaches. With Ringo,
we also demonstrate how to integrate graph analytics with an iterative process
of trial-and-error data exploration and rapid experimentation, common in data
mining workloads.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 20:01:55 GMT"
}
] | 2015-03-30T00:00:00 |
[
[
"Perez",
"Yonathan",
""
],
[
"Sosic",
"Rok",
""
],
[
"Banerjee",
"Arijit",
""
],
[
"Puttagunta",
"Rohan",
""
],
[
"Raison",
"Martin",
""
],
[
"Shah",
"Pararth",
""
],
[
"Leskovec",
"Jure",
""
]
] |
new_dataset
| 0.999509 |
1503.07903
|
Safia Haloui
|
Safia Haloui
|
Codes from Jacobian surfaces
| null | null | null | null |
cs.IT math.AG math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with some Algebraic Geometry codes on Jacobians of
genus 2 curves. We derive a lower bound for the minimum distance of these codes
from an upper "Weil type" bound for the number of rational points on
irreducible (possibly singular or non-absolutely irreducible) curves lying on
an abelian surface over a finite field.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 21:12:08 GMT"
}
] | 2015-03-30T00:00:00 |
[
[
"Haloui",
"Safia",
""
]
] |
new_dataset
| 0.985982 |
1503.07919
|
Mordechai Guri
|
Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici
|
BitWhisper: Covert Signaling Channel between Air-Gapped Computers using
Thermal Manipulations
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It has been assumed that the physical separation (air-gap) of computers
provides a reliable level of security, such that should two adjacent computers
become compromised, the covert exchange of data between them would be
impossible. In this paper, we demonstrate BitWhisper, a method of bridging the
air-gap between adjacent compromised computers by using their heat emissions
and built-in thermal sensors to create a covert communication channel. Our
method is unique in two respects: it supports bidirectional communication, and
it requires no additional dedicated peripheral hardware. We provide
experimental results based on implementation of BitWhisper prototype, and
examine the channel properties and limitations. Our experiments included
different layouts, with computers positioned at varying distances from one
another, and several sensor types and CPU configurations (e.g., Virtual
Machines). We also discuss signal modulation and communication protocols,
showing how BitWhisper can be used for the exchange of data between two
computers in a close proximity (at distance of 0-40cm) at an effective rate of
1-8 bits per hour, a rate which makes it possible to infiltrate brief commands
and exfiltrate small amount of data (e.g., passwords) over the covert channel.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 22:14:07 GMT"
}
] | 2015-03-30T00:00:00 |
[
[
"Guri",
"Mordechai",
""
],
[
"Monitz",
"Matan",
""
],
[
"Mirski",
"Yisroel",
""
],
[
"Elovici",
"Yuval",
""
]
] |
new_dataset
| 0.995008 |
1503.07932
|
Jingchao Sun
|
Jingchao Sun and Rui Zhang and Xiaocong Jin and Yanchao Zhang
|
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile
Crowdsourcing
| null | null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
The plummeting cost of Bluetooth tags and the ubiquity of mobile devices are
revolutionizing the traditional lost-and-found service. This paper presents
SecureFind, a secure and privacy-preserving object-finding system via mobile
crowdsourcing. In SecureFind, a unique Bluetooth tag is attached to every
valuable object, and the owner of a lost object submits an object-finding
request to many mobile users via the SecureFind service provider. Each mobile
user involved searches his vicinity for the lost object on behalf of the object
owner who can infer the location of his lost object based on the responses from
mobile users. SecureFind is designed to ensure strong object security such that
only the object owner can discover the location of his lost object as well as
offering strong location privacy to mobile users involved. The high efficacy
and efficiency of SecureFind are confirmed by extensive simulations.
|
[
{
"version": "v1",
"created": "Fri, 27 Mar 2015 00:23:23 GMT"
}
] | 2015-03-30T00:00:00 |
[
[
"Sun",
"Jingchao",
""
],
[
"Zhang",
"Rui",
""
],
[
"Jin",
"Xiaocong",
""
],
[
"Zhang",
"Yanchao",
""
]
] |
new_dataset
| 0.996324 |
1503.06782
|
Changchun Zhang
|
Changchun Zhang, Robert Caiming Qiu
|
Massive MIMO as a Big Data System: Random Matrix Models and Testbed
|
arXiv admin note: text overlap with arXiv:1402.6419 by other authors
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper has two parts. The first one deals with how to use large random
matrices as building blocks to model the massive data arising from the massive
(or large-scale) MIMO system. As a result, we apply this model for distributed
spectrum sensing and network monitoring. The part boils down to the streaming,
distributed massive data, for which a new algorithm is obtained and its
performance is derived using the central limit theorem that is recently
obtained in the literature. The second part deals with the large-scale testbed
using software-defined radios (particularly USRP) that takes us more than four
years to develop this 70-node network testbed. To demonstrate the power of the
software defined radio, we reconfigure our testbed quickly into a testbed for
massive MIMO. The massive data of this testbed is of central interest in this
paper. It is for the first time for us to model the experimental data arising
from this testbed. To our best knowledge, we are not aware of other similar
work.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 19:51:22 GMT"
}
] | 2015-03-29T00:00:00 |
[
[
"Zhang",
"Changchun",
""
],
[
"Qiu",
"Robert Caiming",
""
]
] |
new_dataset
| 0.999289 |
1307.5664
|
Baoliu Ye Prof.
|
Bin Tang, Shenghao Yang, Baoliu Ye, Yitong Yin and Sanglu Lu
|
Expander Chunked Codes
|
26 pages, 3 figures, submitted for journal publication
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chunked codes are efficient random linear network coding (RLNC) schemes with
low computational cost, where the input packets are encoded into small chunks
(i.e., subsets of the coded packets). During the network transmission, RLNC is
performed within each chunk. In this paper, we first introduce a simple
transfer matrix model to characterize the transmission of chunks, and derive
some basic properties of the model to facilitate the performance analysis. We
then focus on the design of overlapped chunked codes, a class of chunked codes
whose chunks are non-disjoint subsets of input packets, which are of special
interest since they can be encoded with negligible computational cost and in a
causal fashion. We propose expander chunked (EC) codes, the first class of
overlapped chunked codes that have an analyzable performance,where the
construction of the chunks makes use of regular graphs. Numerical and
simulation results show that in some practical settings, EC codes can achieve
rates within 91 to 97 percent of the optimum and outperform the
state-of-the-art overlapped chunked codes significantly.
|
[
{
"version": "v1",
"created": "Mon, 22 Jul 2013 11:56:13 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2014 10:31:25 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Mar 2015 12:06:50 GMT"
}
] | 2015-03-27T00:00:00 |
[
[
"Tang",
"Bin",
""
],
[
"Yang",
"Shenghao",
""
],
[
"Ye",
"Baoliu",
""
],
[
"Yin",
"Yitong",
""
],
[
"Lu",
"Sanglu",
""
]
] |
new_dataset
| 0.968579 |
1503.07551
|
Helio M. de Oliveira
|
P. Carrion, H.M. de Oliveira and R.M. Campello de Souza
|
A Low-throughput Wavelet-based Steganography Audio Scheme
|
2 pages, 1 figure, conference: 8th Brazilian Symposium on Information
and Computer System Security, 2008, Gramado, RS, Brazil
| null | null | null |
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the preliminary of a novel scheme of steganography, and
introduces the idea of combining two secret keys in the operation. The first
secret key encrypts the text using a standard cryptographic scheme (e.g. IDEA,
SAFER+, etc.) prior to the wavelet audio decomposition. The way in which the
cipher text is embedded in the file requires another key, namely a stego-key,
which is associated with features of the audio wavelet analysis.
|
[
{
"version": "v1",
"created": "Thu, 5 Feb 2015 03:15:25 GMT"
}
] | 2015-03-27T00:00:00 |
[
[
"Carrion",
"P.",
""
],
[
"de Oliveira",
"H. M.",
""
],
[
"de Souza",
"R. M. Campello",
""
]
] |
new_dataset
| 0.99873 |
1503.07626
|
Alexander Shumilov
|
Igor Bychkov, Gennady Ruzhnikov, Roman Fedorov, Alexander Shumilov
|
Building the distributed WPS-services execution environment
|
17 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article describes the environment of WPS-based (Web Processing Service)
distributed services, that uses scenarios in JavaScript programming language in
order to integrate services with each other. The environment standardizes data
processing procedures, stores all services-related information and offers the
set of basic WPS-services.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 05:21:28 GMT"
}
] | 2015-03-27T00:00:00 |
[
[
"Bychkov",
"Igor",
""
],
[
"Ruzhnikov",
"Gennady",
""
],
[
"Fedorov",
"Roman",
""
],
[
"Shumilov",
"Alexander",
""
]
] |
new_dataset
| 0.998818 |
1503.07640
|
Qinqin Chen
|
Qinqin Chen, Hui Zhao, Lin Li, Hang Long, Jianquan Wang, Xiaoyue Hou
|
A Closed-Loop UL Power Control Scheme for Interference Mitigation in
Dynamic TD-LTE Systems
|
5 pages, 4 figures,conference
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The TD-LTE system is envisaged to adopt dynamic time division duplexing (TDD)
transmissions for small cells to adapt their communication service to the fast
variation of downlink (DL) and uplink (UL) traffic demands. However, different
DL/UL directions for the same subframe in adjacent cells will result in new
destructive interference components, i.e., eNB-to-eNB and UE-to-UE, with levels
that can significantly differ from one subframe to another. In this paper, a
feasible UL power control mechanism is proposed to manage eNB-to-eNB
interference, where different UL power control parameters are set based on
different interference level. We consider the geometric location information
and the subframe set selection process about adjacent eNBs when the
interference level is estimated. The performance of the proposed scheme is
evaluated through system level simulations and it is shown that the scheme can
achieve preferable improvement in terms of UL average and 5%-ile packet
throughputs compared with the original scheme without power control. Also, the
UE-to-UE interference is not worse when the UE transmit power become higher.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 07:52:57 GMT"
}
] | 2015-03-27T00:00:00 |
[
[
"Chen",
"Qinqin",
""
],
[
"Zhao",
"Hui",
""
],
[
"Li",
"Lin",
""
],
[
"Long",
"Hang",
""
],
[
"Wang",
"Jianquan",
""
],
[
"Hou",
"Xiaoyue",
""
]
] |
new_dataset
| 0.997431 |
1503.07768
|
Kourosh Davarpanah
|
Kourosh Davarpanah, Dan Kaufman, Ophelie Pubellier
|
NeuCoin: the First Secure, Cost-efficient and Decentralized
Cryptocurrency
|
39 pages, 10 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
NeuCoin is a decentralized peer-to-peer cryptocurrency derived from Sunny
King's Peercoin, which itself was derived from Satoshi Nakamoto's Bitcoin. As
with Peercoin, proof-of-stake replaces proof-of-work as NeuCoin's security
model, effectively replacing the operating costs of Bitcoin miners
(electricity, computers) with the capital costs of holding the currency.
Proof-of-stake also avoids proof-of-work's inherent tendency towards
centralization resulting from competition for coinbase rewards among miners
based on lowest cost electricity and hash power.
NeuCoin increases security relative to Peercoin and other existing
proof-of-stake currencies in numerous ways, including: (1) incentivizing nodes
to continuously stake coins over time through substantially higher mining
rewards and lower minimum stake age; (2) abandoning the use of coin age in the
mining formula; (3) causing the stake modifier parameter to change over time
for each stake; and (4) utilizing a client that punishes nodes that attempt to
mine on multiple branches with duplicate stakes.
This paper demonstrates how NeuCoin's proof-of-stake implementation addresses
all commonly raised "nothing at stake" objections to generic proof-of-stake
systems. It also reviews many of the flaws of proof-of-work designs to
highlight the potential for an alternate cryptocurrency that solves these
flaws.
|
[
{
"version": "v1",
"created": "Thu, 26 Mar 2015 15:46:22 GMT"
}
] | 2015-03-27T00:00:00 |
[
[
"Davarpanah",
"Kourosh",
""
],
[
"Kaufman",
"Dan",
""
],
[
"Pubellier",
"Ophelie",
""
]
] |
new_dataset
| 0.997433 |
1008.2748
|
Carl Hewitt
|
Carl Hewitt
|
ActorScript(TM) extension of C sharp (TM), Java(TM), and Objective
C(TM): iAdaptive(TM) concurrency for antiCloud(TM) privacy and security
|
Added explanation of facets of an Actor. Admin note: text overlap
with arXiv:1008.1459
| null | null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ActorScript(TM) is a general purpose programming language for implementing
discretionary, adaptive concurrency that manages resources and demand.
It is differentiated from previous languages by the following:
- Universality
*** Ability to specify what Actors can do
*** Specify interface between hardware and software
*** Everything in the language is accomplished using message passing
including the very definition of ActorScript itself
*** Functional, Imperative, Logic, and Concurrent programming are integrated.
*** Concurrency dynamically adapts to resources available and current load.
*** Programs do not expose low-level implementation mechanisms such as
threads, tasks, locks, cores, etc.
*** Messages can be directly communicated without requiring indirection
through brokers, channels, class hierarchies, mailboxes, pipes, ports, queues
etc.
*** Variable races are eliminated.
*** Binary XML and JSON are data types.
*** Application binary interfaces are afforded so that no identifier symbol
need be looked up at runtime.
- Safety and Security
*** Programs are extension invariant, i.e., extending a program does not
change its meaning.
*** Applications cannot directly harm each other.
- Performance
*** Impose no overhead on implementation of Actor systems
*** Message passing has essentially same overhead as procedure calling and
looping.
*** Allow execution to be dynamically adjusted for system load and capacity
(e.g. cores)
*** Locality because execution is not bound by a sequential global memory
model
*** Inherent concurrency because execution is not bound by communicating
sequential processes
*** Minimize latency along critical paths
|
[
{
"version": "v1",
"created": "Mon, 16 Aug 2010 19:45:20 GMT"
},
{
"version": "v10",
"created": "Wed, 29 Dec 2010 13:23:33 GMT"
},
{
"version": "v11",
"created": "Wed, 16 Feb 2011 18:58:22 GMT"
},
{
"version": "v12",
"created": "Sun, 6 Mar 2011 23:51:16 GMT"
},
{
"version": "v13",
"created": "Mon, 2 May 2011 14:11:43 GMT"
},
{
"version": "v14",
"created": "Sat, 18 Jun 2011 08:36:20 GMT"
},
{
"version": "v15",
"created": "Wed, 6 Jul 2011 14:09:24 GMT"
},
{
"version": "v16",
"created": "Mon, 18 Jul 2011 10:39:23 GMT"
},
{
"version": "v17",
"created": "Mon, 1 Aug 2011 19:28:08 GMT"
},
{
"version": "v18",
"created": "Mon, 7 Nov 2011 12:08:56 GMT"
},
{
"version": "v19",
"created": "Tue, 15 Nov 2011 14:29:38 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Aug 2010 17:24:47 GMT"
},
{
"version": "v20",
"created": "Mon, 21 Nov 2011 17:26:53 GMT"
},
{
"version": "v21",
"created": "Tue, 13 Dec 2011 23:20:19 GMT"
},
{
"version": "v22",
"created": "Tue, 3 Jan 2012 15:49:33 GMT"
},
{
"version": "v23",
"created": "Wed, 11 Jan 2012 14:16:14 GMT"
},
{
"version": "v24",
"created": "Sat, 14 Jan 2012 19:18:33 GMT"
},
{
"version": "v25",
"created": "Fri, 9 Mar 2012 18:12:55 GMT"
},
{
"version": "v26",
"created": "Mon, 25 Jun 2012 16:22:05 GMT"
},
{
"version": "v27",
"created": "Thu, 2 Aug 2012 18:56:07 GMT"
},
{
"version": "v28",
"created": "Tue, 28 Aug 2012 05:28:57 GMT"
},
{
"version": "v29",
"created": "Fri, 19 Oct 2012 05:40:28 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Aug 2010 14:45:26 GMT"
},
{
"version": "v30",
"created": "Wed, 7 Nov 2012 18:03:34 GMT"
},
{
"version": "v31",
"created": "Tue, 4 Dec 2012 18:24:08 GMT"
},
{
"version": "v32",
"created": "Tue, 8 Jan 2013 18:36:23 GMT"
},
{
"version": "v33",
"created": "Wed, 27 Feb 2013 19:45:06 GMT"
},
{
"version": "v34",
"created": "Tue, 26 Mar 2013 15:36:01 GMT"
},
{
"version": "v35",
"created": "Tue, 23 Apr 2013 05:42:37 GMT"
},
{
"version": "v36",
"created": "Mon, 29 Apr 2013 16:05:46 GMT"
},
{
"version": "v37",
"created": "Tue, 7 May 2013 17:40:13 GMT"
},
{
"version": "v38",
"created": "Tue, 25 Jun 2013 18:43:01 GMT"
},
{
"version": "v39",
"created": "Mon, 15 Jul 2013 16:17:05 GMT"
},
{
"version": "v4",
"created": "Tue, 31 Aug 2010 17:25:04 GMT"
},
{
"version": "v40",
"created": "Mon, 19 Aug 2013 16:41:30 GMT"
},
{
"version": "v41",
"created": "Tue, 24 Sep 2013 19:03:29 GMT"
},
{
"version": "v42",
"created": "Tue, 15 Oct 2013 23:52:45 GMT"
},
{
"version": "v43",
"created": "Mon, 16 Dec 2013 20:23:22 GMT"
},
{
"version": "v44",
"created": "Wed, 1 Jan 2014 02:22:43 GMT"
},
{
"version": "v45",
"created": "Fri, 14 Feb 2014 20:49:29 GMT"
},
{
"version": "v46",
"created": "Mon, 21 Apr 2014 13:58:04 GMT"
},
{
"version": "v47",
"created": "Wed, 14 May 2014 15:55:52 GMT"
},
{
"version": "v48",
"created": "Wed, 11 Jun 2014 06:39:04 GMT"
},
{
"version": "v49",
"created": "Mon, 16 Jun 2014 19:33:48 GMT"
},
{
"version": "v5",
"created": "Thu, 9 Sep 2010 18:41:02 GMT"
},
{
"version": "v50",
"created": "Tue, 14 Oct 2014 15:10:41 GMT"
},
{
"version": "v51",
"created": "Wed, 15 Oct 2014 16:52:06 GMT"
},
{
"version": "v52",
"created": "Wed, 5 Nov 2014 15:03:16 GMT"
},
{
"version": "v53",
"created": "Mon, 24 Nov 2014 00:33:38 GMT"
},
{
"version": "v54",
"created": "Mon, 29 Dec 2014 19:30:07 GMT"
},
{
"version": "v55",
"created": "Sun, 11 Jan 2015 00:03:38 GMT"
},
{
"version": "v56",
"created": "Mon, 19 Jan 2015 17:13:01 GMT"
},
{
"version": "v57",
"created": "Sun, 25 Jan 2015 23:31:03 GMT"
},
{
"version": "v58",
"created": "Mon, 9 Feb 2015 18:06:24 GMT"
},
{
"version": "v59",
"created": "Tue, 17 Feb 2015 18:23:20 GMT"
},
{
"version": "v6",
"created": "Mon, 4 Oct 2010 19:15:10 GMT"
},
{
"version": "v60",
"created": "Wed, 4 Mar 2015 21:46:30 GMT"
},
{
"version": "v7",
"created": "Sat, 6 Nov 2010 21:38:29 GMT"
},
{
"version": "v8",
"created": "Mon, 29 Nov 2010 15:58:31 GMT"
},
{
"version": "v9",
"created": "Mon, 6 Dec 2010 20:50:18 GMT"
}
] | 2015-03-26T00:00:00 |
[
[
"Hewitt",
"Carl",
""
]
] |
new_dataset
| 0.991908 |
1410.8566
|
Nikita Polyanskii
|
Arkadii D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav
Shchukin
|
Almost Cover-Free Codes and Designs
|
18 pages, conference paper
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An $s$-subset of codewords of a binary code $X$ is said to be an {\em
$(s,\ell)$-bad} in $X$ if the code $X$ contains a subset of other $\ell$
codewords such that the conjunction of the $\ell$ codewords is covered by the
disjunctive sum of the $s$ codewords. Otherwise, the $s$-subset of codewords of
$X$ is said to be an {\em $(s,\ell)$-good} in~$X$.mA binary code $X$ is said to
be a cover-free $(s,\ell)$-code if the code $X$ does not contain $(s,\ell)$-bad
subsets. In this paper, we introduce a natural {\em probabilistic}
generalization of cover-free $(s,\ell)$-codes, namely: a binary code is said to
be an almost cover-free $(s,\ell)$-code if {\em almost all} $s$-subsets of its
codewords are $(s,\ell)$-good. We discuss the concept of almost cover-free
$(s,\ell)$-codes arising in combinatorial group testing problems connected with
the nonadaptive search of defective supersets (complexes). We develop a random
coding method based on the ensemble of binary constant weight codes to obtain
lower bounds on the capacity of such codes.
|
[
{
"version": "v1",
"created": "Thu, 30 Oct 2014 21:30:42 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Nov 2014 19:20:19 GMT"
},
{
"version": "v3",
"created": "Mon, 15 Dec 2014 01:32:07 GMT"
},
{
"version": "v4",
"created": "Sun, 18 Jan 2015 01:19:56 GMT"
},
{
"version": "v5",
"created": "Wed, 25 Mar 2015 09:26:07 GMT"
}
] | 2015-03-26T00:00:00 |
[
[
"D'yachkov",
"Arkadii",
""
],
[
"Vorobyev",
"Ilya",
""
],
[
"Polyanskii",
"Nikita",
""
],
[
"Shchukin",
"Vladislav",
""
]
] |
new_dataset
| 0.991092 |
1503.01546
|
Yelena Mejova
|
Yelena Mejova, Hamed Haddadi, Anastasios Noulas, Ingmar Weber
|
#FoodPorn: Obesity Patterns in Culinary Interactions
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a large-scale analysis of Instagram pictures taken at 164,753
restaurants by millions of users. Motivated by the obesity epidemic in the
United States, our aim is three-fold: (i) to assess the relationship between
fast food and chain restaurants and obesity, (ii) to better understand people's
thoughts on and perceptions of their daily dining experiences, and (iii) to
reveal the nature of social reinforcement and approval in the context of
dietary health on social media. When we correlate the prominence of fast food
restaurants in US counties with obesity, we find the Foursquare data to show a
greater correlation at 0.424 than official survey data from the County Health
Rankings would show. Our analysis further reveals a relationship between small
businesses and local foods with better dietary health, with such restaurants
getting more attention in areas of lower obesity. However, even in such areas,
social approval favors the unhealthy foods high in sugar, with donut shops
producing the most liked photos. Thus, the dietary landscape our study reveals
is a complex ecosystem, with fast food playing a role alongside social
interactions and personal perceptions, which often may be at odds.
|
[
{
"version": "v1",
"created": "Thu, 5 Mar 2015 06:03:53 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Mar 2015 06:32:52 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Mar 2015 11:59:33 GMT"
}
] | 2015-03-26T00:00:00 |
[
[
"Mejova",
"Yelena",
""
],
[
"Haddadi",
"Hamed",
""
],
[
"Noulas",
"Anastasios",
""
],
[
"Weber",
"Ingmar",
""
]
] |
new_dataset
| 0.99919 |
1503.07284
|
Sunil Kumar Kopparapu Dr
|
Arijit De and Sunil Kumar Kopparapu
|
A Rule-Based Short Query Intent Identification System
|
5 pages, 2010 International Conference on Signal and Image Processing
(ICSIP)
| null |
10.1109/ICSIP.2010.5697471
| null |
cs.IR cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using SMS (Short Message System), cell phones can be used to query for
information about various topics. In an SMS based search system, one of the key
problems is to identify a domain (broad topic) associated with the user query;
so that a more comprehensive search can be carried out by the domain specific
search engine. In this paper we use a rule based approach, to identify the
domain, called Short Query Intent Identification System (SQIIS). We construct
two different rule-bases using different strategies to suit query intent
identification. We evaluate the two rule-bases experimentally.
|
[
{
"version": "v1",
"created": "Wed, 25 Mar 2015 05:35:05 GMT"
}
] | 2015-03-26T00:00:00 |
[
[
"De",
"Arijit",
""
],
[
"Kopparapu",
"Sunil Kumar",
""
]
] |
new_dataset
| 0.976709 |
1107.0478
|
Noam Presman
|
Noam Presman, Ofer Shapira and Simon Litsyn
|
Polar Codes with Mixed-Kernels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A generalization of the polar coding scheme called mixed-kernels is
introduced. This generalization exploits several homogeneous kernels over
alphabets of different sizes. An asymptotic analysis of the proposed scheme
shows that its polarization properties are strongly related to the ones of the
constituent kernels. Simulation of finite length instances of the scheme
indicate their advantages both in error correction performance and complexity
compared to the known polar coding structures.
|
[
{
"version": "v1",
"created": "Sun, 3 Jul 2011 17:45:57 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Feb 2015 13:47:11 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Mar 2015 17:51:54 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Presman",
"Noam",
""
],
[
"Shapira",
"Ofer",
""
],
[
"Litsyn",
"Simon",
""
]
] |
new_dataset
| 0.996197 |
1204.1990
|
Martin Grohe
|
Martin Grohe and Martin Otto
|
Pebble Games and Linear Equations
| null | null | null | null |
cs.LO cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a new, simplified and detailed account of the correspondence between
levels of the Sherali-Adams relaxation of graph isomorphism and levels of
pebble-game equivalence with counting (higher-dimensional Weisfeiler-Lehman
colour refinement). The correspondence between basic colour refinement and
fractional isomorphism, due to Tinhofer (1986, 1991) and Ramana, Scheinerman
and Ullman (1994), is re-interpreted as the base level of Sherali-Adams and
generalised to higher levels in this sense by Atserias and Maneva (2012) and
Malkin (2014), who prove that the two resulting hierarchies interleave.
In carrying this analysis further, we here give
(a) a precise characterisation of the level-k Sherali-Adams relaxation in
terms of a modified counting pebble game;
(b) a variant of the Sherali-Adams levels that precisely match the k-pebble
counting game;
(c) a proof that the interleaving between these two hierarchies is strict.
We also investigate the variation based on boolean arithmetic instead of
real/rational arithmetic and obtain analogous correspondences and separations
for plain k-pebble equivalence (without counting). Our results are driven by
considerably simplified accounts of the underlying combinatorics and linear
algebra.
|
[
{
"version": "v1",
"created": "Mon, 9 Apr 2012 21:00:07 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Oct 2012 22:06:55 GMT"
},
{
"version": "v3",
"created": "Tue, 24 Mar 2015 13:23:31 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Grohe",
"Martin",
""
],
[
"Otto",
"Martin",
""
]
] |
new_dataset
| 0.998819 |
1502.08040
|
Mayank Kumar
|
Mayank Kumar, Ashok Veeraraghavan, Ashutosh Sabharval
|
DistancePPG: Robust non-contact vital signs monitoring using a camera
|
24 pages, 11 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vital signs such as pulse rate and breathing rate are currently measured
using contact probes. But, non-contact methods for measuring vital signs are
desirable both in hospital settings (e.g. in NICU) and for ubiquitous in-situ
health tracking (e.g. on mobile phone and computers with webcams). Recently,
camera-based non-contact vital sign monitoring have been shown to be feasible.
However, camera-based vital sign monitoring is challenging for people with
darker skin tone, under low lighting conditions, and/or during movement of an
individual in front of the camera. In this paper, we propose distancePPG, a new
camera-based vital sign estimation algorithm which addresses these challenges.
DistancePPG proposes a new method of combining skin-color change signals from
different tracked regions of the face using a weighted average, where the
weights depend on the blood perfusion and incident light intensity in the
region, to improve the signal-to-noise ratio (SNR) of camera-based estimate.
One of our key contributions is a new automatic method for determining the
weights based only on the video recording of the subject. The gains in SNR of
camera-based PPG estimated using distancePPG translate into reduction of the
error in vital sign estimation, and thus expand the scope of camera-based vital
sign monitoring to potentially challenging scenarios. Further, a dataset will
be released, comprising of synchronized video recordings of face and pulse
oximeter based ground truth recordings from the earlobe for people with
different skin tones, under different lighting conditions and for various
motion scenarios.
|
[
{
"version": "v1",
"created": "Fri, 27 Feb 2015 20:03:06 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Mar 2015 02:31:18 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Kumar",
"Mayank",
""
],
[
"Veeraraghavan",
"Ashok",
""
],
[
"Sabharval",
"Ashutosh",
""
]
] |
new_dataset
| 0.999525 |
1503.03573
|
Peter Maceli
|
Maria Chudnovsky, Peter Maceli, and Mingxian Zhong
|
Three-coloring graphs with no induced seven-vertex path II : using a
triangle
|
26 pages
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give a polynomial time algorithm which determines if a
given graph containing a triangle and no induced seven-vertex path is
3-colorable, and gives an explicit coloring if one exists. In previous work, we
gave a polynomial time algorithm for three-coloring triangle-free graphs with
no induced seven-vertex path. Combined, our work shows that three-coloring a
graph with no induced seven-vertex path can be done in polynomial time.
|
[
{
"version": "v1",
"created": "Thu, 12 Mar 2015 03:46:55 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2015 21:20:19 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Chudnovsky",
"Maria",
""
],
[
"Maceli",
"Peter",
""
],
[
"Zhong",
"Mingxian",
""
]
] |
new_dataset
| 0.998772 |
1503.06733
|
Mohammad Sadegh Rasooli
|
Mohammad Sadegh Rasooli, Joel Tetreault
|
Yara Parser: A Fast and Accurate Dependency Parser
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dependency parsers are among the most crucial tools in natural language
processing as they have many important applications in downstream tasks such as
information retrieval, machine translation and knowledge acquisition. We
introduce the Yara Parser, a fast and accurate open-source dependency parser
based on the arc-eager algorithm and beam search. It achieves an unlabeled
accuracy of 93.32 on the standard WSJ test set which ranks it among the top
dependency parsers. At its fastest, Yara can parse about 4000 sentences per
second when in greedy mode (1 beam). When optimizing for accuracy (using 64
beams and Brown cluster features), Yara can parse 45 sentences per second. The
parser can be trained on any syntactic dependency treebank and different
options are provided in order to make it more flexible and tunable for specific
tasks. It is released with the Apache version 2.0 license and can be used for
both commercial and academic purposes. The parser can be found at
https://github.com/yahoo/YaraParser.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 17:20:54 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Mar 2015 18:45:13 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Rasooli",
"Mohammad Sadegh",
""
],
[
"Tetreault",
"Joel",
""
]
] |
new_dataset
| 0.963291 |
1503.06870
|
Isabel Kloumann
|
Isabel Kloumann, Lada Adamic, Jon Kleinberg, Shaomei Wu
|
The Lifecycles of Apps in a Social Ecosystem
|
11 pages, 10 figures, 3 tables, International World Wide Web
Conference
| null |
10.1145/2736277.2741684
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Apps are emerging as an important form of on-line content, and they combine
aspects of Web usage in interesting ways --- they exhibit a rich temporal
structure of user adoption and long-term engagement, and they exist in a
broader social ecosystem that helps drive these patterns of adoption and
engagement. It has been difficult, however, to study apps in their natural
setting since this requires a simultaneous analysis of a large set of popular
apps and the underlying social network they inhabit.
In this work we address this challenge through an analysis of the collection
of apps on Facebook Login, developing a novel framework for analyzing both
temporal and social properties. At the temporal level, we develop a retention
model that represents a user's tendency to return to an app using a very small
parameter set. At the social level, we organize the space of apps along two
fundamental axes --- popularity and sociality --- and we show how a user's
probability of adopting an app depends both on properties of the local network
structure and on the match between the user's attributes, his or her friends'
attributes, and the dominant attributes within the app's user population. We
also develop models that show the importance of different feature sets with
strong performance in predicting app success.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 22:58:45 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Kloumann",
"Isabel",
""
],
[
"Adamic",
"Lada",
""
],
[
"Kleinberg",
"Jon",
""
],
[
"Wu",
"Shaomei",
""
]
] |
new_dataset
| 0.998507 |
1503.06970
|
Nieke Aerts
|
Nieke Aerts and Stefan Felsner
|
Straight Line Triangle Representations
|
An extended abstract of this paper was presented at GD2013
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A straight line triangle representation (SLTR) of a planar graph is a
straight line drawing such that all the faces including the outer face have
triangular shape. Such a drawing can be viewed as a tiling of a triangle using
triangles with the input graph as skeletal structure. In this paper we present
a characterization of graphs that have an SLTR. The characterization is based
on flat angle assignments, i.e., selections of angles of the graph that have
size~$\pi$ in the representation. We also provide a second characterization in
terms of contact systems of pseudosegments. With the aid of discrete harmonic
functions we show that contact systems of pseudosegments that respect certain
conditions are stretchable. The stretching procedure is then used to get
straight line triangle representations. Since the discrete harmonic function
approach is quite flexible it allows further applications, we mention some of
them. The drawback of the characterization of SLTRs is that we are not able to
effectively check whether a given graph admits a flat angle assignment that
fulfills the conditions. Hence it is still open to decide whether the
recognition of graphs that admit straight line triangle representation is
polynomially tractable.
|
[
{
"version": "v1",
"created": "Tue, 24 Mar 2015 10:01:28 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Aerts",
"Nieke",
""
],
[
"Felsner",
"Stefan",
""
]
] |
new_dataset
| 0.999313 |
1503.06981
|
Dimitrios Christopoulos
|
Dimitrios Christopoulos, Shree Krishna Sharma, Symeon Chatzinotas,
Jens Krauseand Bjorn Ottersten
|
Coordinated Multibeam Satellite Co-location: The Dual Satellite Paradigm
|
Submitted to the IEEE wirless. Comms. Magazine
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present article, a new system architecture for the next generation of
satellite communication (SatComs) is presented. The key concept lies in the
collaboration between multibeam satellites that share one orbital position.
Multi-satellite constellations in unique orbital slots offer gradual deployment
to cover unpredictable traffic patterns and redundancy to hardware failure
advantages. They are also of high relevance during the satellite replacement
phases or necessitated by constraints in the maximum communications payload
that a single satellite can bear. In this context, the potential gains of
advanced architectures, that is architectures enabled by the general class of
cooperative and cognitive techniques, are exhibited via a simple paradigm. More
specifically, the scenario presented herein, involves two co-existing multibeam
satellites which illuminate overlapping coverage areas. Based on this scenario,
specific types of cooperative and cognitive techniques are herein considered as
candidate technologies that can boost the performance of multibeam satellite
constellations. These techniques are compared to conventional frequency
splitting configurations in terms of three different criteria, namely the
spectral efficiency, the power efficiency and the fairness. Consequently,
insightful guidelines for the design of future high throughput constellations
of multibeam satellites are given.
|
[
{
"version": "v1",
"created": "Tue, 24 Mar 2015 10:56:13 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Christopoulos",
"Dimitrios",
""
],
[
"Sharma",
"Shree Krishna",
""
],
[
"Chatzinotas",
"Symeon",
""
],
[
"Ottersten",
"Jens Krauseand Bjorn",
""
]
] |
new_dataset
| 0.998817 |
1503.07001
|
Eug\'enio Rodrigues
|
Eug\'enio Rodrigues, Ana Rita Amaral, Ad\'elio Rodrigues Gaspar,
\'Alvaro Gomes, Manuel Carlos Gameiro da Silva, Carlos Henggeler Antunes
|
GerAPlanO - A new building design tool: design generation, thermal
assessment and performance optimization
|
6 pages, 3 figures, Proceedings of Energy for Sustainability 2015
Conference: Sustainable Cities: Designing for People and the Planet, Coimbra,
14-15 May, 2015
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Building practitioners (architects, engineers, energy managers) are showing a
growing interest in the design of more energy efficient and livable buildings.
The best way to predict how a building will behave regarding energy consumption
and thermal comfort is to use a dynamic simulation tool. However, the use of
this kind of tools is difficult on a daily basis practice due to the heuristic
and exploratory nature of the architectural design process. To deal with this
difficulty, the University of Coimbra and three companies have been working on
the development of a prototype design aiding tool, specifically devoted to the
space planning phase of building design, under the project GerAPlanO (Automatic
Generation of Architecture Floor plans with Energy Optimization). This project
aims to combine the capabilities of design generation techniques, thermal
assessment programs, and design optimization methods to provide assistance to
decision makers. This paper presents the overall concept, as well as the
current status of development of this tool.
|
[
{
"version": "v1",
"created": "Tue, 24 Mar 2015 12:12:43 GMT"
}
] | 2015-03-25T00:00:00 |
[
[
"Rodrigues",
"Eugénio",
""
],
[
"Amaral",
"Ana Rita",
""
],
[
"Gaspar",
"Adélio Rodrigues",
""
],
[
"Gomes",
"Álvaro",
""
],
[
"da Silva",
"Manuel Carlos Gameiro",
""
],
[
"Antunes",
"Carlos Henggeler",
""
]
] |
new_dataset
| 0.953409 |
1308.4568
|
Cem Tekin
|
Cem Tekin and Mihaela van der Schaar
|
Distributed Online Learning via Cooperative Contextual Bandits
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a novel framework for decentralized, online learning
by many learners. At each moment of time, an instance characterized by a
certain context may arrive to each learner; based on the context, the learner
can select one of its own actions (which gives a reward and provides
information) or request assistance from another learner. In the latter case,
the requester pays a cost and receives the reward but the provider learns the
information. In our framework, learners are modeled as cooperative contextual
bandits. Each learner seeks to maximize the expected reward from its arrivals,
which involves trading off the reward received from its own actions, the
information learned from its own actions, the reward received from the actions
requested of others and the cost paid for these actions - taking into account
what it has learned about the value of assistance from each other learner. We
develop distributed online learning algorithms and provide analytic bounds to
compare the efficiency of these with algorithms with the complete knowledge
(oracle) benchmark (in which the expected reward of every action in every
context is known by every learner). Our estimates show that regret - the loss
incurred by the algorithm - is sublinear in time. Our theoretical framework can
be used in many practical applications including Big Data mining, event
detection in surveillance sensor networks and distributed online recommendation
systems.
|
[
{
"version": "v1",
"created": "Wed, 21 Aug 2013 13:28:43 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Aug 2013 14:19:28 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Apr 2014 09:40:06 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Mar 2015 14:06:27 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Tekin",
"Cem",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
new_dataset
| 0.979791 |
1503.06499
|
Luca Rossi
|
Luca Rossi, Matthew J. Williams, Christoph Stich, Mirco Musolesi
|
Privacy and the City: User Identification and Location Semantics in
Location-Based Social Networks
|
In Proceedings of 9th AAAI International Conference on Weblogs and
Social Media (ICWSM 2015)
| null | null | null |
cs.CR cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the advent of GPS enabled smartphones, an increasing number of users is
actively sharing their location through a variety of applications and services.
Along with the continuing growth of Location-Based Social Networks (LBSNs),
security experts have increasingly warned the public of the dangers of exposing
sensitive information such as personal location data. Most importantly, in
addition to the geographical coordinates of the user's location, LBSNs allow
easy access to an additional set of characteristics of that location, such as
the venue type or popularity.
In this paper, we investigate the role of location semantics in the
identification of LBSN users. We simulate a scenario in which the attacker's
goal is to reveal the identity of a set of LBSN users by observing their
check-in activity. We then propose to answer the following question: what are
the types of venues that a malicious user has to monitor to maximize the
probability of success? Conversely, when should a user decide whether to make
his/her check-in to a location public or not? We perform our study on more than
1 million check-ins distributed over 17 urban regions of the United States. Our
analysis shows that different types of venues display different discriminative
power in terms of user identity, with most of the venues in the "Residence"
category providing the highest re-identification success across the urban
regions. Interestingly, we also find that users with a high entropy of their
check-ins distribution are not necessarily the hardest to identify, suggesting
that it is the collective behaviour of the users' population that determines
the complexity of the identification task, rather than the individual
behaviour.
|
[
{
"version": "v1",
"created": "Sun, 22 Mar 2015 23:42:25 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Rossi",
"Luca",
""
],
[
"Williams",
"Matthew J.",
""
],
[
"Stich",
"Christoph",
""
],
[
"Musolesi",
"Mirco",
""
]
] |
new_dataset
| 0.969492 |
1503.06532
|
Kamran Karimi
|
Kamran Karimi
|
The Feasibility of Using OpenCL Instead of OpenMP for Parallel CPU
Programming
|
8 pages, 4 figures, 2 tables
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
OpenCL, along with CUDA, is one of the main tools used to program GPGPUs.
However, it allows running the same code on multi-core CPUs too, making it a
rival for the long-established OpenMP. In this paper we compare OpenCL and
OpenMP when developing and running compute-heavy code on a CPU. Both ease of
programming and performance aspects are considered. Since, unlike a GPU, no
memory copy operation is involved, our comparisons measure the code generation
quality, as well as thread management efficiency of OpenCL and OpenMP. We
evaluate the performance of these development tools under two conditions: a
large number of short-running compute-heavy parallel code executions, when more
thread management is performed, and a small number of long-running parallel
code executions, when less thread management is required. The results show that
OpenCL and OpenMP each win in one of the two conditions. We argue that while
using OpenMP requires less setup, OpenCL can be a viable substitute for OpenMP
from a performance point of view, especially when a high number of thread
invocations is required. We also provide a number of potential pitfalls to
watch for when moving from OpenMP to OpenCL.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 05:15:00 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Karimi",
"Kamran",
""
]
] |
new_dataset
| 0.997858 |
1503.06548
|
Debajyoti Mukhopadhyay Prof.
|
Sumitkumar Kanoje, Varsha Powar, Debajyoti Mukhopadhyay
|
Using MongoDB for Social Networking Website
|
3 pages, 2 figures
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media is a biggest successful buzzword used in the recent time. Its
success opened various opportunities for the developers. Developing any
application requires storage of large data into databases. Many databases are
available for the developers, Choosing the right one make development easier.
MongoDB is a cross platform document oriented, schema-less database eschewed
the traditional table based relational database structure in favor of JSON like
documents. This article discusses various pros and cons encountered with the
use of the MongoDB so that developers would be helped while choosing it wisely.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 08:15:46 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Kanoje",
"Sumitkumar",
""
],
[
"Powar",
"Varsha",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] |
new_dataset
| 0.989502 |
1503.06643
|
Mrinal Haloi
|
Mrinal Haloi
|
A novel pLSA based Traffic Signs Classification System
|
APMediaCast-2015, Bali, Indonesia
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we developed a novel and fast traffic sign recognition system, a
very important part for advanced driver assistance system and for autonomous
driving. Traffic signs play a very vital role in safe driving and avoiding
accident. We have used image processing and topic discovery model pLSA to
tackle this challenging multiclass classification problem. Our algorithm is
consist of two parts, shape classification and sign classification for improved
accuracy. For processing and representation of image we have used bag of
features model with SIFT local descriptor. Where a visual vocabulary of size
300 words are formed using k-means codebook formation algorithm. We exploited
the concept that every image is a collection of visual topics and images having
same topics will belong to same category. Our algorithm is tested on German
traffic sign recognition benchmark (GTSRB) and gives very promising result near
to existing state of the art techniques.
|
[
{
"version": "v1",
"created": "Mon, 23 Mar 2015 14:10:44 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Haloi",
"Mrinal",
""
]
] |
new_dataset
| 0.999677 |
1503.06072
|
Jules Hedges
|
Jules Hedges
|
String diagrams for game theory
| null | null | null | null |
cs.GT cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a monoidal category whose morphisms are games (in the
sense of game theory, not game semantics) and an associated diagrammatic
language. The two basic operations of a monoidal category, namely categorical
composition and tensor product, correspond roughly to sequential and
simultaneous composition of games. This leads to a compositional theory in
which we can reason about properties of games in terms of corresponding
properties of the component parts. In particular, we give a definition of Nash
equilibrium which is recursive on the causal structure of the game.
The key technical idea in this paper is the use of continuation passing style
for reasoning about the future consequences of players' choices, closely based
on applications of selection functions in game theory. Additionally, the clean
categorical foundation gives many opportunities for generalisation, for example
to learning agents.
|
[
{
"version": "v1",
"created": "Fri, 20 Mar 2015 13:50:05 GMT"
}
] | 2015-03-23T00:00:00 |
[
[
"Hedges",
"Jules",
""
]
] |
new_dataset
| 0.998268 |
1503.06081
|
Francesco Dolce
|
Francesco Dolce and Dominique Perrin
|
Enumeration formul{\ae} in neutral sets
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present several enumeration results holding in sets of words called
neutral and which satisfy restrictive conditions on the set of possible
extensions of nonempty words. These formulae concern return words and bifix
codes. They generalize formulae previously known for Sturmian sets or more
generally for tree sets. We also give a geometric example of this class of
sets, namely the natural coding of some interval exchange transformations.
|
[
{
"version": "v1",
"created": "Fri, 20 Mar 2015 14:12:33 GMT"
}
] | 2015-03-23T00:00:00 |
[
[
"Dolce",
"Francesco",
""
],
[
"Perrin",
"Dominique",
""
]
] |
new_dataset
| 0.998588 |
1503.06095
|
Amy Felty
|
Amy P. Felty, Alberto Momigliano and Brigitte Pientka
|
The Next 700 Challenge Problems for Reasoning with Higher-Order Abstract
Syntax Representations: Part 1-A Common Infrastructure for Benchmarks
|
42 pages, 5 figures
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A variety of logical frameworks support the use of higher-order abstract
syntax (HOAS) in representing formal systems. Although these systems seem
superficially the same, they differ in a variety of ways; for example, how they
handle a context of assumptions and which theorems about a given formal system
can be concisely expressed and proved. Our contributions in this paper are
three-fold: 1) we develop a common infrastructure for representing benchmarks
for systems supporting reasoning with binders, 2) we present several concrete
benchmarks, which highlight a variety of different aspects of reasoning within
a context of assumptions, and 3) we design an open repository ORBI, (Open
challenge problem Repository for systems supporting reasoning with BInders).
Our work sets the stage for providing a basis for qualitative comparison of
different systems. This allows us to review and survey the state of the art,
which we do in great detail for four systems in Part 2 of this paper (Felty et
al, 2015). It also allows us to outline future fundamental research questions
regarding the design and implementation of meta-reasoning systems.
|
[
{
"version": "v1",
"created": "Fri, 20 Mar 2015 14:54:15 GMT"
}
] | 2015-03-23T00:00:00 |
[
[
"Felty",
"Amy P.",
""
],
[
"Momigliano",
"Alberto",
""
],
[
"Pientka",
"Brigitte",
""
]
] |
new_dataset
| 0.990295 |
1201.1661
|
Giang Nguyen
|
Giang T. K. Nguyen, Rachit Agarwal, Junda Liu, Matthew Caesar, P.
Brighten Godfrey, Scott Shenker
|
Slick Packets
|
This is the full version of a paper with the same title that appeared
in ACM SIGMETRICS 2011, with the inclusion of the appendix. 16 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Source-controlled routing has been proposed as a way to improve flexibility
of future network architectures, as well as simplifying the data plane.
However, if a packet specifies its path, this precludes fast local re-routing
within the network. We propose SlickPackets, a novel solution that allows
packets to slip around failures by specifying alternate paths in their headers,
in the form of compactly-encoded directed acyclic graphs. We show that this can
be accomplished with reasonably small packet headers for real network
topologies, and results in responsiveness to failures that is competitive with
past approaches that require much more state within the network. Our approach
thus enables fast failure response while preserving the benefits of
source-controlled routing.
|
[
{
"version": "v1",
"created": "Sun, 8 Jan 2012 22:21:15 GMT"
}
] | 2015-03-20T00:00:00 |
[
[
"Nguyen",
"Giang T. K.",
""
],
[
"Agarwal",
"Rachit",
""
],
[
"Liu",
"Junda",
""
],
[
"Caesar",
"Matthew",
""
],
[
"Godfrey",
"P. Brighten",
""
],
[
"Shenker",
"Scott",
""
]
] |
new_dataset
| 0.998099 |
1201.1671
|
Taufik Abrao
|
D\'ecio L. Gazzoni Filho, Taufik Abr\~ao, Marcelo C. Tosin, Francisco
Granziera Jr
|
Error-Correcting Codes for Reliable Communications in Microgravity
Platforms
|
13 pages, 3 figures, paper accepted to be published in International
Journal of Satellite Communications Policy and Management (IJSCPM) ISSN
(Online): 1742-7576 - ISSN (Print): 1742-7568
| null | null | null |
cs.IT cs.SY math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The PAANDA experiment was conceived to characterize the acceleration ambient
of a rocket launched microgravity platform, specially the microgravity phase.
The recorded data was transmitted to ground stations, leading to loss of
telemetry information sent during the reentry period. Traditionally, an
error-correcting code for this channel consists of a block code with very large
block size to protect against long periods of data loss. Instead, we propose
the use of digital fountain codes along with conventional Reed-Solomon block
codes to protect against long and short burst error periods, respectively.
Aiming to use this approach for a second version of PAANDA to prevent data
corruption, we propose a model for the communication channel based on
information extracted from Cum\~a II's telemetry data, and simulate the
performance of our proposed error-correcting code under this channel model.
Simulation results show that nearly all telemetry data can be recovered,
including data from the reentry period.
|
[
{
"version": "v1",
"created": "Mon, 9 Jan 2012 00:28:23 GMT"
}
] | 2015-03-20T00:00:00 |
[
[
"Filho",
"Décio L. Gazzoni",
""
],
[
"Abrão",
"Taufik",
""
],
[
"Tosin",
"Marcelo C.",
""
],
[
"Granziera",
"Francisco",
"Jr"
]
] |
new_dataset
| 0.995982 |
1201.3073
|
Sylvain Martin
|
Sylvain Martin, Laurent Chiarello, Guy Leduc
|
DISco: a Distributed Information Store for network Challenges and their
Outcome
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present DISco, a storage and communication middleware designed to enable
distributed and task-centric autonomic control of networks.
DISco is designed to enable multi-agent identification of anomalous
situations -- so-called "challenges" -- and assist coordinated remediation that
maintains degraded -- but acceptable -- service level, while keeping a track of
the challenge evolution in order to enable human-assisted diagnosis of flaws in
the network. We propose to use state-of-art peer-to-peer publish/subscribe and
distributed storage as core building blocks for the DISco service.
|
[
{
"version": "v1",
"created": "Sun, 15 Jan 2012 09:37:08 GMT"
}
] | 2015-03-20T00:00:00 |
[
[
"Martin",
"Sylvain",
""
],
[
"Chiarello",
"Laurent",
""
],
[
"Leduc",
"Guy",
""
]
] |
new_dataset
| 0.999225 |
1202.0859
|
Fan Cheng
|
Fan Cheng, Raymond W. Yeung, and Kenneth W. Shum
|
Imperfect Secrecy in Wiretap Channel II
|
Submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a point-to-point communication system which consists of a sender, a
receiver and a set of noiseless channels, the sender wishes to transmit a
private message to the receiver through the channels which may be eavesdropped
by a wiretapper. The set of wiretap sets is arbitrary. The wiretapper can
access any one but not more than one wiretap set. From each wiretap set, the
wiretapper can obtain some partial information about the private message which
is measured by the equivocation of the message given the symbols obtained by
the wiretapper. The security strategy is to encode the message with some random
key at the sender. Only the message is required to be recovered at the
receiver. Under this setting, we define an achievable rate tuple consisting of
the size of the message, the size of the key, and the equivocation for each
wiretap set. We first prove a tight rate region when both the message and the
key are required to be recovered at the receiver. Then we extend the result to
the general case when only the message is required to be recovered at the
receiver. Moreover, we show that even if stochastic encoding is employed at the
sender, the message rate cannot be increased.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2012 02:11:46 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Dec 2012 11:58:00 GMT"
},
{
"version": "v3",
"created": "Sun, 12 Oct 2014 06:14:01 GMT"
}
] | 2015-03-20T00:00:00 |
[
[
"Cheng",
"Fan",
""
],
[
"Yeung",
"Raymond W.",
""
],
[
"Shum",
"Kenneth W.",
""
]
] |
new_dataset
| 0.974052 |
1202.5012
|
Matthew Patitz
|
Jennifer E. Padilla and Matthew J. Patitz and Raul Pena and Robert T.
Schweller and Nadrian C. Seeman and Robert Sheline and Scott M. Summers and
Xingsi Zhong
|
Asynchronous Signal Passing for Tile Self-Assembly: Fuel Efficient
Computation and Efficient Assembly of Shapes
|
This version contains the appendices omitted from the version
appearing in the UCNC 2013 proceedings
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we demonstrate the power of a model of tile self-assembly based
on active glues which can dynamically change state. We formulate the
Signal-passing Tile Assembly Model (STAM), based on the model of Padilla, Liu,
and Seeman to be asynchronous, allowing any action of turning a glue on or off,
attaching a new tile, or breaking apart an assembly to happen in any order.
Within this highly generalized model we provide three new solutions to tile
self-assembly problems that have been addressed within the abstract Tile
Assembly Model and its variants, showing that signal passing tiles allow for
substantial improvement across multiple complexity metrics. Our first result
utilizes a recursive assembly process to achieve tile-type efficient assembly
of linear structures, using provably fewer tile types than what is possible in
standard tile assembly models. Our second system of signal-passing tiles
simulates any Turing machine with high fuel efficiency by using only a constant
number of tiles per computation step. Our third system assembles the discrete
Sierpinski triangle, demonstrating that this pattern can be strictly
self-assembled within the STAM. This result is of particular interest in that
it is known that this pattern cannot self-assemble within a number of well
studied tile self-assembly models. Notably, all of our constructions are at
temperature 1, further demonstrating that signal-passing confers the power to
bypass many restrictions found in standard tile assembly models.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2012 19:16:38 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Oct 2012 06:18:58 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Nov 2013 01:15:06 GMT"
}
] | 2015-03-20T00:00:00 |
[
[
"Padilla",
"Jennifer E.",
""
],
[
"Patitz",
"Matthew J.",
""
],
[
"Pena",
"Raul",
""
],
[
"Schweller",
"Robert T.",
""
],
[
"Seeman",
"Nadrian C.",
""
],
[
"Sheline",
"Robert",
""
],
[
"Summers",
"Scott M.",
""
],
[
"Zhong",
"Xingsi",
""
]
] |
new_dataset
| 0.991164 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.