id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1005.2770
Eran Hof
Eran Hof, Igal Sason, Shlomo Shamai, Chao Tian
Capacity-Achieving Polar Codes for Arbitrarily-Permuted Parallel Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel coding over arbitrarily-permuted parallel channels was first studied by Willems et al. (2008). This paper introduces capacity-achieving polar coding schemes for arbitrarily-permuted parallel channels where the component channels are memoryless, binary-input and output-symmetric.
[ { "version": "v1", "created": "Sun, 16 May 2010 18:53:47 GMT" }, { "version": "v2", "created": "Tue, 4 Oct 2011 07:41:52 GMT" }, { "version": "v3", "created": "Sun, 19 Aug 2012 19:26:14 GMT" } ]
2015-03-17T00:00:00
[ [ "Hof", "Eran", "" ], [ "Sason", "Igal", "" ], [ "Shamai", "Shlomo", "" ], [ "Tian", "Chao", "" ] ]
new_dataset
0.964703
1010.0886
Michael Reckhaus
Michael Reckhaus, Nico Hochgeschwender, Paul G. Ploeger and Gerhard K. Kraetzschmar
A Platform-independent Programming Environment for Robot Control
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of robot control programs is a complex task. Many robots are different in their electrical and mechanical structure which is also reflected in the software. Specific robot software environments support the program development, but are mainly text-based and usually applied by experts in the field with profound knowledge of the target robot. This paper presents a graphical programming environment which aims to ease the development of robot control programs. In contrast to existing graphical robot programming environments, our approach focuses on the composition of parallel action sequences. The developed environment allows to schedule independent robot actions on parallel execution lines and provides mechanism to avoid side-effects of parallel actions. The developed environment is platform-independent and based on the model-driven paradigm. The feasibility of our approach is shown by the application of the sequencer to a simulated service robot and a robot for educational purpose.
[ { "version": "v1", "created": "Tue, 5 Oct 2010 13:56:36 GMT" } ]
2015-03-17T00:00:00
[ [ "Reckhaus", "Michael", "" ], [ "Hochgeschwender", "Nico", "" ], [ "Ploeger", "Paul G.", "" ], [ "Kraetzschmar", "Gerhard K.", "" ] ]
new_dataset
0.999706
1010.3294
Mohamed Elsabagh
Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal
ARQ Security in Wi-Fi and RFID Networks
8 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting the statistical independence between the multipath fading experienced by the legitimate nodes and potential adversaries, secret keys are established and then are continuously updated. The continuous key update property of both schemes makes them capable of defending against all of the passive eavesdropping attacks and most of the currently-known active attacks against either Wi-Fi or RFID networks. However, each scheme is tailored to best suit the requirements of its respective paradigm. In Wi-Fi networks, we overlay, rather than completely replace, the current Wi-Fi security protocols. Thus, our Wi-Fi scheme can be readily implemented via only minor modifications over the IEEE 802.11 standards. On the other hand, the proposed RFID scheme introduces the first provably secure low cost RFID authentication protocol. The proposed schemes impose a throughput-security tradeoff that is shown, through our analytical and experimental results, to be practically acceptable.
[ { "version": "v1", "created": "Fri, 15 Oct 2010 23:06:22 GMT" } ]
2015-03-17T00:00:00
[ [ "Elsabagh", "Mohamed", "" ], [ "Abdallah", "Yara", "" ], [ "Youssef", "Moustafa", "" ], [ "Gamal", "Hesham El", "" ] ]
new_dataset
0.991024
1010.5023
Matthew Might
Matthew Might and David Darais
Yacc is dead
18 pages; submitted October 2009 to ESOP; rejected
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two novel approaches to parsing context-free languages. The first approach is based on an extension of Brzozowski's derivative from regular expressions to context-free grammars. The second approach is based on a generalization of the derivative to parser combinators. The payoff of these techniques is a small (less than 250 lines of code), easy-to-implement parsing library capable of parsing arbitrary context-free grammars into lazy parse forests. Implementations for both Scala and Haskell are provided. Preliminary experiments with S-Expressions parsed millions of tokens per second, which suggests this technique is efficient enough for use in practice.
[ { "version": "v1", "created": "Sun, 24 Oct 2010 23:12:28 GMT" } ]
2015-03-17T00:00:00
[ [ "Might", "Matthew", "" ], [ "Darais", "David", "" ] ]
new_dataset
0.977463
1010.5421
Subhash Kak
Subhash Kak
On the Mesh Array for Matrix Multiplication
6 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents new properties of the mesh array for matrix multiplication. In contrast to the standard array that requires 3n-2 steps to complete its computation, the mesh array requires only 2n-1 steps. Symmetries of the mesh array computed values are presented which enhance the efficiency of the array for specific applications. In multiplying symmetric matrices, the results are obtained in 3n/2+1 steps. The mesh array is examined for its application as a scrambling system.
[ { "version": "v1", "created": "Tue, 26 Oct 2010 15:10:37 GMT" } ]
2015-03-17T00:00:00
[ [ "Kak", "Subhash", "" ] ]
new_dataset
0.998658
1010.5974
Paul Bonsma
Paul Bonsma, Daniel Lokshtanov
Feedback Vertex Set in Mixed Graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mixed graph is a graph with both directed and undirected edges. We present an algorithm for deciding whether a given mixed graph on $n$ vertices contains a feedback vertex set (FVS) of size at most $k$, in time $2^{O(k)}k! O(n^4)$. This is the first fixed parameter tractable algorithm for FVS that applies to both directed and undirected graphs.
[ { "version": "v1", "created": "Thu, 28 Oct 2010 14:04:50 GMT" } ]
2015-03-17T00:00:00
[ [ "Bonsma", "Paul", "" ], [ "Lokshtanov", "Daniel", "" ] ]
new_dataset
0.998289
1011.1638
Eric Filiol
Anthony Desnos and Robert Erra and Eric Filiol
Processor-Dependent Malware... and codes
13 pages - Extended version of the paper presented at the iAWACS 2009 conference
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Malware usually target computers according to their operating system. Thus we have Windows malwares, Linux malwares and so on ... In this paper, we consider a different approach and show on a technical basis how easily malware can recognize and target systems selectively, according to the onboard processor chip. This technology is very easy to build since it does not rely on deep analysis of chip logical gates architecture. Floating Point Arithmetic (FPA) looks promising to define a set of tests to identify the processor or, more precisely, a subset of possible processors. We give results for different families of processors: AMD, Intel (Dual Core, Atom), Sparc, Digital Alpha, Cell, Atom ... As a conclusion, we propose two {\it open problems} that are new, to the authors' knowledge.
[ { "version": "v1", "created": "Sun, 7 Nov 2010 14:31:15 GMT" } ]
2015-03-17T00:00:00
[ [ "Desnos", "Anthony", "" ], [ "Erra", "Robert", "" ], [ "Filiol", "Eric", "" ] ]
new_dataset
0.963747
1011.2361
Nihar Shah B
Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar and Kannan Ramchandran
Distributed Storage Codes with Repair-by-Transfer and Non-achievability of Interior Points on the Storage-Bandwidth Tradeoff
30 pages, 6 figures. Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2173792
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regenerating codes are a class of recently developed codes for distributed storage that, like Reed-Solomon codes, permit data recovery from any subset of k nodes within the n-node network. However, regenerating codes possess in addition, the ability to repair a failed node by connecting to an arbitrary subset of d nodes. It has been shown that for the case of functional-repair, there is a tradeoff between the amount of data stored per node and the bandwidth required to repair a failed node. A special case of functional-repair is exact-repair where the replacement node is required to store data identical to that in the failed node. Exact-repair is of interest as it greatly simplifies system implementation. The first result of the paper is an explicit, exact-repair code for the point on the storage-bandwidth tradeoff corresponding to the minimum possible repair bandwidth, for the case when d=n-1. This code has a particularly simple graphical description and most interestingly, has the ability to carry out exact-repair through mere transfer of data and without any need to perform arithmetic operations. Hence the term `repair-by-transfer'. The second result of this paper shows that the interior points on the storage-bandwidth tradeoff cannot be achieved under exact-repair, thus pointing to the existence of a separate tradeoff under exact-repair. Specifically, we identify a set of scenarios, termed `helper node pooling', and show that it is the necessity to satisfy such scenarios that over-constrains the system.
[ { "version": "v1", "created": "Wed, 10 Nov 2010 12:34:46 GMT" }, { "version": "v2", "created": "Tue, 16 Nov 2010 11:00:30 GMT" } ]
2015-03-17T00:00:00
[ [ "Shah", "Nihar B.", "" ], [ "Rashmi", "K. V.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Ramchandran", "Kannan", "" ] ]
new_dataset
0.975927
1011.3174
Peihua Li
Peihua Li
Tensor-SIFT based Earth Mover's Distance for Contour Tracking
28 pages, 9 figures, 2 tables
null
null
null
cs.CV math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contour tracking in adverse environments is a challenging problem due to cluttered background, illumination variation, occlusion, and noise, among others. This paper presents a robust contour tracking method by contributing to some of the key issues involved, including (a) a region functional formulation and its optimization; (b) design of a robust and effective feature; and (c) development of an integrated tracking algorithm. First, we formulate a region functional based on robust Earth Mover's distance (EMD) with kernel density for distribution modeling, and propose a two-phase method for its optimization. In the first phase, letting the candidate contour be fixed, we express EMD as the transportation problem and solve it by the simplex algorithm. Next, using the theory of shape derivative, we make a perturbation analysis of the contour around the best solution to the transportation problem. This leads to a partial differential equation (PDE) that governs the contour evolution. Second, we design a novel and effective feature for tracking applications. We propose a dimensionality reduction method by tensor decomposition, achieving a low-dimensional description of SIFT features called Tensor-SIFT for characterizing local image region properties. Applicable to both color and gray-level images, Tensor-SIFT is very distinctive, insensitive to illumination changes, and noise. Finally, we develop an integrated algorithm that combines various techniques of the simplex algorithm, narrow-band level set and fast marching algorithms. Particularly, we introduce an inter-frame initialization method and a stopping criterion for the termination of PDE iteration. Experiments in challenging image sequences show that the proposed work has promising performance.
[ { "version": "v1", "created": "Sun, 14 Nov 2010 01:52:52 GMT" } ]
2015-03-17T00:00:00
[ [ "Li", "Peihua", "" ] ]
new_dataset
0.99907
1011.3493
David Doty
Ho-Lin Chen, David Doty, and Shinnosuke Seki
Program Size and Temperature in Self-Assembly
The previous version contained more sections, but we have split that paper into two. The other half will be posted as a separate paper
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Winfree's abstract Tile Assembly Model (aTAM) is a model of molecular self-assembly of DNA complexes known as tiles, which float freely in solution and attach one at a time to a growing "seed" assembly based on specific binding sites on their four sides. We show that there is a polynomial-time algorithm that, given an n x n square, finds the minimal tile system (i.e., the system with the smallest number of distinct tile types) that uniquely self-assembles the square, answering an open question of Adleman, Cheng, Goel, Huang, Kempe, Moisset de Espanes, and Rothemund ("Combinatorial Optimization Problems in Self-Assembly", STOC 2002). Our investigation leading to this algorithm reveals other positive and negative results about the relationship between the size of a tile system and its "temperature" (the binding strength threshold required for a tile to attach).
[ { "version": "v1", "created": "Mon, 15 Nov 2010 20:22:58 GMT" }, { "version": "v2", "created": "Wed, 2 Mar 2011 17:25:06 GMT" } ]
2015-03-17T00:00:00
[ [ "Chen", "Ho-Lin", "" ], [ "Doty", "David", "" ], [ "Seki", "Shinnosuke", "" ] ]
new_dataset
0.998178
1011.3721
AbdelRahman Karawia Dr.
A.A. Karawia
On the Inverse Of General Cyclic Heptadiagonal and Anti-Heptadiagonal Matrices
9 pages
null
null
null
cs.SC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the current work, the author present a symbolic algorithm for finding the determinant of any general nonsingular cyclic heptadiagonal matrices and inverse of anti-cyclic heptadiagonal matrices. The algorithms are mainly based on the work presented in [A. A. KARAWIA, A New Algorithm for Inverting General Cyclic Heptadiagonal Matrices Recursively, arXiv:1011.2306v1 [cs.SC]]. The symbolic algorithms are suited for implementation using Computer Algebra Systems (CAS) such as MATLAB, MAPLE and MATHEMATICA. An illustrative example is given.
[ { "version": "v1", "created": "Mon, 15 Nov 2010 11:42:22 GMT" } ]
2015-03-17T00:00:00
[ [ "Karawia", "A. A.", "" ] ]
new_dataset
0.982648
1012.0548
Vida Dujmovic
Vida Dujmovic and Stefan Langerman
A Center Transversal Theorem for Hyperplanes and Applications to Graph Drawing
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by an open problem from graph drawing, we study several partitioning problems for line and hyperplane arrangements. We prove a ham-sandwich cut theorem: given two sets of n lines in R^2, there is a line l such that in both line sets, for both halfplanes delimited by l, there are n^{1/2} lines which pairwise intersect in that halfplane, and this bound is tight; a centerpoint theorem: for any set of n lines there is a point such that for any halfplane containing that point there are (n/3)^{1/2} of the lines which pairwise intersect in that halfplane. We generalize those results in higher dimension and obtain a center transversal theorem, a same-type lemma, and a positive portion Erdos-Szekeres theorem for hyperplane arrangements. This is done by formulating a generalization of the center transversal theorem which applies to set functions that are much more general than measures. Back to Graph Drawing (and in the plane), we completely solve the open problem that motivated our search: there is no set of n labelled lines that are universal for all n-vertex labelled planar graphs. As a side note, we prove that every set of n (unlabelled) lines is universal for all n-vertex (unlabelled) planar graphs.
[ { "version": "v1", "created": "Thu, 2 Dec 2010 19:36:51 GMT" }, { "version": "v2", "created": "Wed, 22 Aug 2012 18:06:03 GMT" } ]
2015-03-17T00:00:00
[ [ "Dujmovic", "Vida", "" ], [ "Langerman", "Stefan", "" ] ]
new_dataset
0.999286
1012.1258
Ram Rajagopal
Ram Rajagopal, XuanLong Nguyen, Sinem Coleri Ergen and Pravin Varaiya
Simultaneous Sequential Detection of Multiple Interacting Faults
38 pages, 3 figures
null
null
null
cs.IT cs.SY math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single fault sequential change point problems have become important in modeling for various phenomena in large distributed systems, such as sensor networks. But such systems in many situations present multiple interacting faults. For example, individual sensors in a network may fail and detection is performed by comparing measurements between sensors, resulting in statistical dependency among faults. We present a new formulation for multiple interacting faults in a distributed system. The formulation includes specifications of how individual subsystems composing the large system may fail, the information that can be shared among these subsystems and the interaction pattern between faults. We then specify a new sequential algorithm for detecting these faults. The main feature of the algorithm is that it uses composite stopping rules for a subsystem that depend on the decision of other subsystems. We provide asymptotic false alarm and detection delay analysis for this algorithm in the Bayesian setting and show that under certain conditions the algorithm is optimal. The analysis methodology relies on novel detailed comparison techniques between stopping times. We validate the approach with some simulations.
[ { "version": "v1", "created": "Mon, 6 Dec 2010 17:54:07 GMT" } ]
2015-03-17T00:00:00
[ [ "Rajagopal", "Ram", "" ], [ "Nguyen", "XuanLong", "" ], [ "Ergen", "Sinem Coleri", "" ], [ "Varaiya", "Pravin", "" ] ]
new_dataset
0.970809
1012.1403
Fanping Du
Fanping Du
Negative frequency communication
21 pages, 11 figures
null
null
null
cs.IT math.IT physics.pop-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum is the most valuable resource in communication system, but unfortunately, so far, a half of the spectrum has been wasted. In this paper, we will see that the negative frequency not only has a physical meaning but also can be used in communication. In fact, the complete description of a frequency signal is a rotating complex-frequency signal, in a complete description, positive and negative frequency signals are two distinguishable and independent frequency signals, they can carry different information. But the current carrier modulation and demodulation do not distinguish positive and negative frequencies, so half of the spectrum resources and signal energy are wasted. The complex-carrier modulation and demodulation, proposed by this paper, use the complex-frequency signal as a carrier signal, the negative and positive frequency can carry different information, so the spectrum resources are fully used, the signal energy carried by complex-carrier modulation is focused on a certain band, so the signal energy will not be lost by the complex-carrier demodulation.
[ { "version": "v1", "created": "Tue, 7 Dec 2010 05:46:02 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2010 01:45:19 GMT" }, { "version": "v3", "created": "Fri, 25 Mar 2011 08:49:39 GMT" }, { "version": "v4", "created": "Mon, 18 Apr 2011 03:10:03 GMT" }, { "version": "v5", "created": "Mon, 26 Sep 2011 08:09:13 GMT" } ]
2015-03-17T00:00:00
[ [ "Du", "Fanping", "" ] ]
new_dataset
0.994161
1012.1531
Laurent Bartholdi
Laurent Bartholdi and Pedro V. Silva
Groups defined by automata
Chapter 24 in the handbook "AutoMathA". With index
null
null
null
cs.FL cs.DM math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is Chapter 24 in the "AutoMathA" handbook. Finite automata have been used effectively in recent years to define infinite groups. The two main lines of research have as their most representative objects the class of automatic groups (including word-hyperbolic groups as a particular case) and automata groups (singled out among the more general self-similar groups). The first approach implements in the language of automata some tight constraints on the geometry of the group's Cayley graph, building strange, beautiful bridges between far-off domains. Automata are used to define a normal form for group elements, and to monitor the fundamental group operations. The second approach features groups acting in a finitely constrained manner on a regular rooted tree. Automata define sequential permutations of the tree, and represent the group elements themselves. The choice of particular classes of automata has often provided groups with exotic behaviour which have revolutioned our perception of infinite finitely generated groups.
[ { "version": "v1", "created": "Tue, 7 Dec 2010 15:18:36 GMT" } ]
2015-03-17T00:00:00
[ [ "Bartholdi", "Laurent", "" ], [ "Silva", "Pedro V.", "" ] ]
new_dataset
0.983902
1012.5907
Deniz Sarioz
J\'anos Pach and Deniz Sarioz
Small (2,s)-colorable graphs without 1-obstacle representations
14 pages, 13 figures, ancillary to: Janos Pach and Deniz Sarioz, "On the structure of graphs with low obstacle number", Graphs and Combinatorics, Volume 27, Number 3, issue entitled "The Japan Conference on Computational Geometry and Graphs (JCCGG2009)", 465-473, DOI: 10.1007/s00373-011-1027-0, Springer, 2011. URL: http://www.springerlink.com/content/131r0n307h488825/
null
null
null
cs.DM cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An obstacle representation of a graph G is a set of points on the plane together with a set of polygonal obstacles that determine a visibility graph isomorphic to G. The obstacle number of G is the minimum number of obstacles over all obstacle representations of G. Alpert, Koch, and Laison gave a 12-vertex bipartite graph and proved that its obstacle number is two. We show that a 10-vertex induced subgraph of this graph has obstacle number two. Alpert et al. also constructed very large graphs with vertex set consisting of a clique and an independent set in order to show that obstacle number is an unbounded parameter. We specify a 70-vertex graph with vertex set consisting of a clique and an independent set, and prove that it has obstacle number greater than one. This is an ancillary document to our article in press. We conclude by showing that a 10-vertex graph with vertex set consisting of two cliques has obstacle number greater than one, improving on a result therein.
[ { "version": "v1", "created": "Wed, 29 Dec 2010 10:49:44 GMT" }, { "version": "v2", "created": "Sun, 24 Apr 2011 22:00:40 GMT" } ]
2015-03-17T00:00:00
[ [ "Pach", "János", "" ], [ "Sarioz", "Deniz", "" ] ]
new_dataset
0.999324
1101.0275
Mehdi Torbatian
Mehdi Torbatian, Hossein Najafi, and Mohamed Oussama Damen
Asynchronous Interference Alignment
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A constant K-user interference channel in which the users are not symbol-synchronous is considered. It is shown that the asynchronism among the users facilitates aligning interfering signals at each receiver node while it does not affect the total number of degrees of freedom (DoF) of the channel. To achieve the total K/2 DoF of the channel when single antenna nodes are used, a novel practical interference alignment scheme is proposed wherein the alignment task is performed with the help of asynchronous delays which inherently exist among the received signals at each receiver node. When each node is equipped with M > 1 antennas, it is argued that the same alignment scheme is sufficient to achieve the total MK/2 DoF of the medium when all links between collocated antennas experience the same asynchronous delay.
[ { "version": "v1", "created": "Fri, 31 Dec 2010 17:06:37 GMT" }, { "version": "v2", "created": "Thu, 9 Jun 2011 15:09:01 GMT" } ]
2015-03-17T00:00:00
[ [ "Torbatian", "Mehdi", "" ], [ "Najafi", "Hossein", "" ], [ "Damen", "Mohamed Oussama", "" ] ]
new_dataset
0.998989
1101.0294
Lei Zhang
Lei Zhang and Dongning Guo
Virtual Full Duplex Wireless Broadcasting via Compressed Sensing
13 pages, 7 figures
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel solution is proposed to undertake a frequent task in wireless networks, which is to let all nodes broadcast information to and receive information from their respective one-hop neighboring nodes. The contribution is two-fold. First, as each neighbor selects one message-bearing codeword from its unique codebook for transmission, it is shown that decoding their messages based on a superposition of those codewords through the multiaccess channel is fundamentally a problem of compressed sensing. In the case where each message consists of a small number of bits, an iterative algorithm based on belief propagation is developed for efficient decoding. Second, to satisfy the half-duplex constraint, each codeword consists of randomly distributed on-slots and off-slots. A node transmits during its on-slots, and listens to its neighbors only through its own off-slots. Over one frame interval, each node broadcasts a message to neighbors and simultaneously decodes neighbors' messages based on the superposed signals received through its own off-slots. Thus the solution fully exploits the multiaccess nature of the wireless medium and addresses the half-duplex constraint at the fundamental level. In a network consisting of Poisson distributed nodes, numerical results demonstrate that the proposed scheme often achieves several times the rate of slotted ALOHA and CSMA with the same packet error rate.
[ { "version": "v1", "created": "Fri, 31 Dec 2010 19:50:22 GMT" }, { "version": "v2", "created": "Fri, 21 Sep 2012 01:18:49 GMT" }, { "version": "v3", "created": "Sun, 11 Aug 2013 02:02:01 GMT" } ]
2015-03-17T00:00:00
[ [ "Zhang", "Lei", "" ], [ "Guo", "Dongning", "" ] ]
new_dataset
0.999385
1101.0565
Matias Korman
Jean Cardinal and Matias Korman
Coloring Planar Homothets and Three-Dimensional Hypergraphs
Preliminary version of this paper appeared in Latin 2012
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The inclusion relation between simple objects in the plane may be used to define geometric set systems, or hypergraphs. Properties of various types of colorings of these hypergraphs have been the subject of recent investigations, with applications to wireless networking. We first prove that every set of homothetic copies of a given convex body in the plane can be colored with four colors so that any point covered by at least two copies is covered by two copies with distinct colors. This generalizes a previous result from Smorodinsky [18]. As a corollary, we find improvements to well studied variations of the coloring problem such as conflict-free colorings, k-strong (conflict-free) colorings and choosability. We also show a relation between our proof and Schnyder's characterization of planar graphs. Then we show that for any k >1, every three-dimensional hypergraph can be colored with 6(k - 1) colors so that every hyperedge e contains min{|e|, k} vertices with mutually distinct colors. Furthermore, we also show that at least 2k colors might be necessary. This refines a previous result from Aloupis et al. [2].
[ { "version": "v1", "created": "Mon, 3 Jan 2011 17:06:52 GMT" }, { "version": "v2", "created": "Tue, 4 Jan 2011 17:45:11 GMT" }, { "version": "v3", "created": "Wed, 5 Jan 2011 09:56:14 GMT" }, { "version": "v4", "created": "Thu, 6 Jan 2011 15:07:42 GMT" }, { "version": "v5", "created": "Sat, 8 Jan 2011 16:06:11 GMT" }, { "version": "v6", "created": "Mon, 21 Feb 2011 10:38:35 GMT" }, { "version": "v7", "created": "Mon, 10 Oct 2011 13:16:56 GMT" }, { "version": "v8", "created": "Fri, 29 Jun 2012 06:56:27 GMT" } ]
2015-03-17T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Korman", "Matias", "" ] ]
new_dataset
0.999671
1101.1379
Xiaoxiao Yang
Xiaoxiao Yang
A Probabilistic Variant of Projection Temporal Logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose Probabilistic discrete-time Projection Temporal Logic (PrPTL), which extends Projection Temporal Logic (PTL) with probability. To this end, some useful formulas are derived and some logic laws are given. Further, we define Time Normal Form (TNF) for PrPTL as the standard form and prove that any PrPTL formulas can be rewritten to TNF. According to the TNF, we construct the time normal form graph which can be used for the probabilistic model checking on PrPTL.
[ { "version": "v1", "created": "Fri, 7 Jan 2011 08:43:36 GMT" } ]
2015-03-17T00:00:00
[ [ "Yang", "Xiaoxiao", "" ] ]
new_dataset
0.962569
1101.2249
KyungHi Chang
Manar Mohaisen and KyungHi Chang
Fixed-complexity Sphere Encoder for Multi-user MIMO Systems
7 pages, 7 figures. Accepted by Journal of Communications and Networks
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a fixed-complexity sphere encoder (FSE) for multi-user MIMO (MU-MIMO) systems. The proposed FSE accomplishes a scalable tradeoff between performance and complexity. Also, because it has a parallel tree-search structure, the proposed encoder can be easily pipelined, leading to a tremendous reduction in the precoding latency. The complexity of the proposed encoder is also analyzed, and we propose two techniques that reduce it. Simulation and analytical results demonstrate that in a 4 by 4 MU-MIMO system, the proposed FSE requires only 11.5% of the computational complexity needed by the conventional QRD-M encoder (QRDM-E). Also, the encoding throughput of the proposed encoder is 7.5 times that of the QRDM-E with tolerable degradation in the BER performance, while achieving the optimum diversity order.
[ { "version": "v1", "created": "Wed, 12 Jan 2011 01:17:45 GMT" } ]
2015-03-17T00:00:00
[ [ "Mohaisen", "Manar", "" ], [ "Chang", "KyungHi", "" ] ]
new_dataset
0.973946
1101.2360
Sandor P. Fekete
Sandor P. Fekete, Joseph S. B. Mitchell, Christiane Schmidt
Minimum Covering with Travel Cost
17 pages, 12 figures; extended abstract appears in ISAAC 2009, full version to appear in Journal of Combinatorial Optimization
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a polygon and a visibility range, the Myopic Watchman Problem with Discrete Vision (MWPDV) asks for a closed path P and a set of scan points S, such that (i) every point of the polygon is within visibility range of a scan point; and (ii) path length plus weighted sum of scan number along the tour is minimized. Alternatively, the bicriteria problem (ii') aims at minimizing both scan number and tour length. We consider both lawn mowing (in which tour and scan points may leave P) and milling (in which tour, scan points and visibility must stay within P) variants for the MWPDV; even for simple special cases, these problems are NP-hard. We show that this problem is NP-hard, even for the special cases of rectilinear polygons and L_\infty scan range 1, and negligible small travel cost or negligible travel cost. For rectilinear MWPDV milling in grid polygons we present a 2.5-approximation with unit scan range; this holds for the bicriteria version, thus for any linear combination of travel cost and scan cost. For grid polygons and circular unit scan range, we describe a bicriteria 4-approximation. These results serve as stepping stones for the general case of circular scans with scan radius r and arbitrary polygons of feature size a, for which we extend the underlying ideas to a pi(r/a}+(r+1)/2) bicriteria approximation algorithm. Finally, we describe approximation schemes for MWPDV lawn mowing and milling of grid polygons, for fixed ratio between scan cost and travel cost.
[ { "version": "v1", "created": "Wed, 12 Jan 2011 13:50:10 GMT" } ]
2015-03-17T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Schmidt", "Christiane", "" ] ]
new_dataset
0.985416
1101.2389
Uria Basher
Uria Basher, Avihay Shirazi, and Haim Permuter
Capacity Region of Finite State Multiple-Access Channel with Delayed State Information at the Transmitters
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A single-letter characterization is provided for the capacity region of finite-state multiple access channels. The channel state is a Markov process, the transmitters have access to delayed state information, and channel state information is available at the receiver. The delays of the channel state information are assumed to be asymmetric at the transmitters. We apply the result to obtain the capacity region for a finite-state Gaussian MAC, and for a finite-state multiple-access fading channel. We derive power control strategies that maximize the capacity region for these channels.
[ { "version": "v1", "created": "Wed, 12 Jan 2011 15:42:55 GMT" }, { "version": "v2", "created": "Thu, 13 Jan 2011 11:07:48 GMT" } ]
2015-03-17T00:00:00
[ [ "Basher", "Uria", "" ], [ "Shirazi", "Avihay", "" ], [ "Permuter", "Haim", "" ] ]
new_dataset
0.986775
1101.2524
Pavan Srinath
K. Pavan Srinath and B. Sundar Rajan
Generalized Silver Codes
Accepted for publication in the IEEE Transactions on Information Theory. This revised version has 30 pages, 7 figures and Section III has been completely revised
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For an $n_t$ transmit, $n_r$ receive antenna system ($n_t \times n_r$ system), a {\it{full-rate}} space time block code (STBC) transmits $n_{min} = min(n_t,n_r)$ complex symbols per channel use. The well known Golden code is an example of a full-rate, full-diversity STBC for 2 transmit antennas. Its ML-decoding complexity is of the order of $M^{2.5}$ for square $M$-QAM. The Silver code for 2 transmit antennas has all the desirable properties of the Golden code except its coding gain, but offers lower ML-decoding complexity of the order of $M^2$. Importantly, the slight loss in coding gain is negligible compared to the advantage it offers in terms of lowering the ML-decoding complexity. For higher number of transmit antennas, the best known codes are the Perfect codes, which are full-rate, full-diversity, information lossless codes (for $n_r \geq n_t$) but have a high ML-decoding complexity of the order of $M^{n_tn_{min}}$ (for $n_r < n_t$, the punctured Perfect codes are considered). In this paper, a scheme to obtain full-rate STBCs for $2^a$ transmit antennas and any $n_r$ with reduced ML-decoding complexity of the order of $M^{n_t(n_{min}-(3/4))-0.5}$, is presented. The codes constructed are also information lossless for $n_r \geq n_t$, like the Perfect codes and allow higher mutual information than the comparable punctured Perfect codes for $n_r < n_t$. These codes are referred to as the {\it generalized Silver codes}, since they enjoy the same desirable properties as the comparable Perfect codes (except possibly the coding gain) with lower ML-decoding complexity, analogous to the Silver-Golden codes for 2 transmit antennas. Simulation results of the symbol error rates for 4 and 8 transmit antennas show that the generalized Silver codes match the punctured Perfect codes in error performance while offering lower ML-decoding complexity.
[ { "version": "v1", "created": "Thu, 13 Jan 2011 10:07:12 GMT" }, { "version": "v2", "created": "Fri, 1 Apr 2011 07:32:25 GMT" } ]
2015-03-17T00:00:00
[ [ "Srinath", "K. Pavan", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.966342
1101.2719
Yao Yu
Yao Yu, Athina P. Petropulu and H. Vincent Poor
CSSF MIMO RADAR: Low-Complexity Compressive Sensing Based MIMO Radar That Uses Step Frequency
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new approach is proposed, namely CSSF MIMO radar, which applies the technique of step frequency (SF) to compressive sensing (CS) based multi-input multi-output (MIMO) radar. The proposed approach enables high resolution range, angle and Doppler estimation, while transmitting narrowband pulses. The problem of joint angle-Doppler-range estimation is first formulated to fit the CS framework, i.e., as an L1 optimization problem. Direct solution of this problem entails high complexity as it employs a basis matrix whose construction requires discretization of the angle-Doppler-range space. Since high resolution requires fine space discretization, the complexity of joint range, angle and Doppler estimation can be prohibitively high. For the case of slowly moving targets, a technique is proposed that achieves significant complexity reduction by successively estimating angle-range and Doppler in a decoupled fashion and by employing initial estimates obtained via matched filtering to further reduce the space that needs to be digitized. Numerical results show that the combination of CS and SF results in a MIMO radar system that has superior resolution and requires far less data as compared to a system that uses a matched filter with SF.
[ { "version": "v1", "created": "Fri, 14 Jan 2011 05:58:48 GMT" } ]
2015-03-17T00:00:00
[ [ "Yu", "Yao", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.998058
1101.2753
Jaydip Sen
Jaydip Sen
An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks
14 pages, 10 figures, i table
International Journal of Scalable Computing: Practice and Experience. Vol. 11, No. 4, pp. 345-358, 2011
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselves over possibly multi-hop paths with or without the involvement of MRs. User privacy and security have been primary concerns in WMNs due to their peer-to-peer network topology, shared wireless medium, stringent resource constraints, and highly dynamic environment. Moreover, to support real-time applications, WMNs must also be equipped with robust, reliable and efficient routing protocols so as to minimize the end-to-end latency. Design of a secure and efficient routing protocol for WMNs, therefore, is of paramount importance. In this paper, we propose an efficient and reliable routing protocol that also provides user anonymity in WMNs. The protocol is based on an accurate estimation of the available bandwidth in the wireless links and a robust estimation of the end-to-end delay in a routing path, and minimization of control message overhead. The user anonymity, authentication and data privacy is achieved by application of a novel protocol that is based on Rivest's ring signature scheme. Simulations carried out on the proposed protocol demonstrate that it is more efficient than some of the existing routing protocols.
[ { "version": "v1", "created": "Fri, 14 Jan 2011 09:58:28 GMT" } ]
2015-03-17T00:00:00
[ [ "Sen", "Jaydip", "" ] ]
new_dataset
0.973711
1101.3698
Ni-Chun Wang
Ni-Chun Wang, Ezio Biglieri, and Kung Yao
Systolic Arrays for Lattice-Reduction-Aided MIMO Detection
13 pages, to be appeared in journal of communications and networks
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input, multiple-output (MIMO) technology provides high data rate and enhanced QoS for wireless com- munications. Since the benefits from MIMO result in a heavy computational load in detectors, the design of low-complexity sub-optimum receivers is currently an active area of research. Lattice-reduction-aided detection (LRAD) has been shown to be an effective low-complexity method with near-ML performance. In this paper we advocate the use of systolic array architectures for MIMO receivers, and in particular we exhibit one of them based on LRAD. The "LLL lattice reduction algorithm" and the ensuing linear detections or successive spatial-interference cancellations can be located in the same array, which is con- siderably hardware-efficient. Since the conventional form of the LLL algorithm is not immediately suitable for parallel processing, two modified LLL algorithms are considered here for the systolic array. LLL algorithm with full-size reduction (FSR-LLL) is one of the versions more suitable for parallel processing. Another variant is the all-swap lattice-reduction (ASLR) algorithm for complex-valued lattices, which processes all lattice basis vectors simultaneously within one iteration. Our novel systolic array can operate both algorithms with different external logic controls. In order to simplify the systolic array design, we replace the Lov\'asz condition in the definition of LLL-reduced lattice with the looser Siegel condition. Simulation results show that for LR- aided linear detections, the bit-error-rate performance is still maintained with this relaxation. Comparisons between the two algorithms in terms of bit-error-rate performance, and average FPGA processing time in the systolic array are made, which shows that ASLR is a better choice for a systolic architecture, especially for systems with a large number of antennas.
[ { "version": "v1", "created": "Mon, 17 Jan 2011 18:09:52 GMT" } ]
2015-03-17T00:00:00
[ [ "Wang", "Ni-Chun", "" ], [ "Biglieri", "Ezio", "" ], [ "Yao", "Kung", "" ] ]
new_dataset
0.998691
1101.3891
Patricia Marcu
Patricia Marcu, Wolfgang Hommel
Inter-organizational fault management: Functional and organizational core aspects of management architectures
International Journal of Computer Networks & Communications (IJCNC)
International Journal of Computer Networks & Communications (IJCNC), Editor: AIRCC, January 2011, Volume 3. Number 1, pages:101-117, ISSN-Online: 0974 - 9322,ISSN-Print: 0975- 2293
10.5121/ijcnc.2011.3107
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Outsourcing -- successful, and sometimes painful -- has become one of the hottest topics in IT service management discussions over the past decade. IT services are outsourced to external service provider in order to reduce the effort required for and overhead of delivering these services within the own organization. More recently also IT services providers themselves started to either outsource service parts or to deliver those services in a non-hierarchical cooperation with other providers. Splitting a service into several service parts is a non-trivial task as they have to be implemented, operated, and maintained by different providers. One key aspect of such inter-organizational cooperation is fault management, because it is crucial to locate and solve problems, which reduce the quality of service, quickly and reliably. In this article we present the results of a thorough use case based requirements analysis for an architecture for inter-organizational fault management (ioFMA). Furthermore, a concept of the organizational respective functional model of the ioFMA is given.
[ { "version": "v1", "created": "Thu, 20 Jan 2011 13:08:06 GMT" } ]
2015-03-17T00:00:00
[ [ "Marcu", "Patricia", "" ], [ "Hommel", "Wolfgang", "" ] ]
new_dataset
0.979895
1101.4075
Pang-Chang Lan
Pang-Chang Lan and Chih-Yao Wu and Chia-Han Lee and Ping-Cheng Yeh and Chen-Mou Cheng
PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme
6 pages, 4 figures, topic on physical layer security in information theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independent subcarriers of the OFDM system, the P-MOPI scheme easily allows two communicating parties to exchange over 100 secret bits. As a result, not only secure communication but also the MIMO gain can be guaranteed by using the P-MOPI scheme.
[ { "version": "v1", "created": "Fri, 21 Jan 2011 06:55:52 GMT" } ]
2015-03-17T00:00:00
[ [ "Lan", "Pang-Chang", "" ], [ "Wu", "Chih-Yao", "" ], [ "Lee", "Chia-Han", "" ], [ "Yeh", "Ping-Cheng", "" ], [ "Cheng", "Chen-Mou", "" ] ]
new_dataset
0.999296
1101.4152
Manfred Kufleitner
Manfred Kufleitner and Alexander Lauser
Languages of Dot-depth One over Infinite Words
Presented at LICS 2011
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over finite words, languages of dot-depth one are expressively complete for alternation-free first-order logic. This fragment is also known as the Boolean closure of existential first-order logic. Here, the atomic formulas comprise order, successor, minimum, and maximum predicates. Knast (1983) has shown that it is decidable whether a language has dot-depth one. We extend Knast's result to infinite words. In particular, we describe the class of languages definable in alternation-free first-order logic over infinite words, and we give an effective characterization of this fragment. This characterization has two components. The first component is identical to Knast's algebraic property for finite words and the second component is a topological property, namely being a Boolean combination of Cantor sets. As an intermediate step we consider finite and infinite words simultaneously. We then obtain the results for infinite words as well as for finite words as special cases. In particular, we give a new proof of Knast's Theorem on languages of dot-depth one over finite words.
[ { "version": "v1", "created": "Fri, 21 Jan 2011 15:00:08 GMT" }, { "version": "v2", "created": "Fri, 1 Apr 2011 17:47:51 GMT" } ]
2015-03-17T00:00:00
[ [ "Kufleitner", "Manfred", "" ], [ "Lauser", "Alexander", "" ] ]
new_dataset
0.99869
1101.4356
Matteo Cristani PhD
Elisa Burato and Matteo Cristani and Luca Vigan\`o
Meaning Negotiation as Inference
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Meaning negotiation (MN) is the general process with which agents reach an agreement about the meaning of a set of terms. Artificial Intelligence scholars have dealt with the problem of MN by means of argumentations schemes, beliefs merging and information fusion operators, and ontology alignment but the proposed approaches depend upon the number of participants. In this paper, we give a general model of MN for an arbitrary number of agents, in which each participant discusses with the others her viewpoint by exhibiting it in an actual set of constraints on the meaning of the negotiated terms. We call this presentation of individual viewpoints an angle. The agents do not aim at forming a common viewpoint but, instead, at agreeing about an acceptable common angle. We analyze separately the process of MN by two agents (\emph{bilateral} or \emph{pairwise} MN) and by more than two agents (\emph{multiparty} MN), and we use game theoretic models to understand how the process develops in both cases: the models are Bargaining Game for bilateral MN and English Auction for multiparty MN. We formalize the process of reaching such an agreement by giving a deduction system that comprises of rules that are consistent and adequate for representing MN.
[ { "version": "v1", "created": "Sun, 23 Jan 2011 09:49:55 GMT" } ]
2015-03-17T00:00:00
[ [ "Burato", "Elisa", "" ], [ "Cristani", "Matteo", "" ], [ "Viganò", "Luca", "" ] ]
new_dataset
0.985437
1101.4412
R\u{a}zvan Deaconescu
R\u{a}zvan Deaconescu, Marius Sandu-Popa, Adriana Dr\u{a}ghici, Nicolae T\u{a}pus
BitTorrent Swarm Analysis through Automation and Enhanced Logging
ISSN - [Online: 0974 - 9322; Print : 0975- 2293], pages 52-65
International Journal of Computer Networks & Communications (IJCNC), Volume 3, Number 1, 2011
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Peer-to-Peer protocols currently form the most heavily used protocol class in the Internet, with BitTorrent, the most popular protocol for content distribution, as its flagship. A high number of studies and investigations have been undertaken to measure, analyse and improve the inner workings of the BitTorrent protocol. Approaches such as tracker message analysis, network probing and packet sniffing have been deployed to understand and enhance BitTorrent's internal behaviour. In this paper we present a novel approach that aims to collect, process and analyse large amounts of local peer information in BitTorrent swarms. We classify the information as periodic status information able to be monitored in real time and as verbose logging information to be used for subsequent analysis. We have designed and implemented a retrieval, storage and presentation infrastructure that enables easy analysis of BitTorrent protocol internals. Our approach can be employed both as a comparison tool, as well as a measurement system of how network characteristics and protocol implementation influence the overall BitTorrent swarm performance. We base our approach on a framework that allows easy swarm creation and control for different BitTorrent clients. With the help of a virtualized infrastructure and a client-server software layer we are able to create, command and manage large sized BitTorrent swarms. The framework allows a user to run, schedule, start, stop clients within a swarm and collect information regarding their behavior.
[ { "version": "v1", "created": "Sun, 23 Jan 2011 22:59:20 GMT" } ]
2015-03-17T00:00:00
[ [ "Deaconescu", "Răzvan", "" ], [ "Sandu-Popa", "Marius", "" ], [ "Drăghici", "Adriana", "" ], [ "Tăpus", "Nicolae", "" ] ]
new_dataset
0.998181
1101.4479
Daoud Clarke
Daoud Clarke
A Context-theoretic Framework for Compositionality in Distributional Semantics
Submitted to Computational Linguistics on 20th January 2010 for review
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Techniques in which words are represented as vectors have proved useful in many applications in computational linguistics, however there is currently no general semantic formalism for representing meaning in terms of vectors. We present a framework for natural language semantics in which words, phrases and sentences are all represented as vectors, based on a theoretical analysis which assumes that meaning is determined by context. In the theoretical analysis, we define a corpus model as a mathematical abstraction of a text corpus. The meaning of a string of words is assumed to be a vector representing the contexts in which it occurs in the corpus model. Based on this assumption, we can show that the vector representations of words can be considered as elements of an algebra over a field. We note that in applications of vector spaces to representing meanings of words there is an underlying lattice structure; we interpret the partial ordering of the lattice as describing entailment between meanings. We also define the context-theoretic probability of a string, and, based on this and the lattice structure, a degree of entailment between strings. We relate the framework to existing methods of composing vector-based representations of meaning, and show that our approach generalises many of these, including vector addition, component-wise multiplication, and the tensor product.
[ { "version": "v1", "created": "Mon, 24 Jan 2011 09:52:39 GMT" } ]
2015-03-17T00:00:00
[ [ "Clarke", "Daoud", "" ] ]
new_dataset
0.993759
1306.1713
Marcin Peczarski
Gerold J\"ager, Marcin Peczarski
The Worst Case Number of Questions in Generalized AB Game with and without White-peg Answers
null
Discrete Applied Mathematics 184 (2015), pp. 20-31
10.1016/j.dam.2014.10.032
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The AB game is a two-player game, where the codemaker has to choose a secret code and the codebreaker has to guess it in as few questions as possible. It is a variant of the famous Mastermind game, with the only difference that all pegs in both, the secret and the questions must have distinct colors. In this work, we consider the Generalized AB game, where for given arbitrary numbers $p$, $c$ with $p \le c$ the secret code consists of $p$ pegs each having one of $c$ colors and the answer consists only of a number of black and white pegs. There the number of black pegs equals the number of pegs matching in the corresponding question and the secret in position and color, and the number of white pegs equals the additional number of pegs matching in the corresponding question and the secret only in color. We consider also a variant of the Generalized AB game, where the information of white pegs is omitted. This variant is called Generalized Black-peg AB game. Let $\ab(p,c)$ and $\abb(p,c)$ be the worst case number of questions for Generalized AB game and Generalized Black-peg AB game, respectively. Combining a computer program with theoretical considerations, we confirm known exact values of $\ab(2,c)$ and $\ab(3,c)$ and prove tight bounds for $\ab(4,c)$. Furthermore, we present exact values for $\abb(2,c)$ and $\abb(3,c)$ and tight bounds for $\abb(4,c)$.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 13:07:18 GMT" } ]
2015-03-17T00:00:00
[ [ "Jäger", "Gerold", "" ], [ "Peczarski", "Marcin", "" ] ]
new_dataset
0.972186
1409.6736
Youssef Khmou
Youssef Khmou and Said Safi
Angle of Arrival Detection with Fifth Order Phase Operators
4 pages, 3 figures
World Academy of Science, Engineering and Technology, International Science Index 90, International Journal of Mathematical, Computational, Physical and Quantum Engineering, 8(6), 961 - 964. (2014)
null
null
cs.IT math.IT physics.space-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a fifth order propagator operators are proposed for estimating the Angles Of Arrival (AOA) of narrowband electromagnetic waves impinging on antenna array when its number of sensors is larger than the number of radiating sources. The array response matrix is partitioned into five linearly dependent phases to construct the noise projector using five different propagators from non diagonal blocks of the spectral matrice of the received data; hence, five different estimators are proposed to estimate the angles of the sources. The simulation results proved the performance of the proposed estimators in the presence of white noise comparatively to high resolution eigen based spectra.
[ { "version": "v1", "created": "Tue, 23 Sep 2014 20:10:03 GMT" } ]
2015-03-17T00:00:00
[ [ "Khmou", "Youssef", "" ], [ "Safi", "Said", "" ] ]
new_dataset
0.99305
1503.04250
Julia Bernd
Julia Bernd, Damian Borth, Benjamin Elizalde, Gerald Friedland, Heather Gallagher, Luke Gottlieb, Adam Janin, Sara Karabashlieva, Jocelyn Takahashi, Jennifer Won
The YLI-MED Corpus: Characteristics, Procedures, and Plans
47 pages; 3 figures; 25 tables. Also published as ICSI Technical Report TR-15-001
null
null
TR-15-001
cs.MM cs.CL
http://creativecommons.org/licenses/by/3.0/
The YLI Multimedia Event Detection corpus is a public-domain index of videos with annotations and computed features, specialized for research in multimedia event detection (MED), i.e., automatically identifying what's happening in a video by analyzing the audio and visual content. The videos indexed in the YLI-MED corpus are a subset of the larger YLI feature corpus, which is being developed by the International Computer Science Institute and Lawrence Livermore National Laboratory based on the Yahoo Flickr Creative Commons 100 Million (YFCC100M) dataset. The videos in YLI-MED are categorized as depicting one of ten target events, or no target event, and are annotated for additional attributes like language spoken and whether the video has a musical score. The annotations also include degree of annotator agreement and average annotator confidence scores for the event categorization of each video. Version 1.0 of YLI-MED includes 1823 "positive" videos that depict the target events and 48,138 "negative" videos, as well as 177 supplementary videos that are similar to event videos but are not positive examples. Our goal in producing YLI-MED is to be as open about our data and procedures as possible. This report describes the procedures used to collect the corpus; gives detailed descriptive statistics about the corpus makeup (and how video attributes affected annotators' judgments); discusses possible biases in the corpus introduced by our procedural choices and compares it with the most similar existing dataset, TRECVID MED's HAVIC corpus; and gives an overview of our future plans for expanding the annotation effort.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 23:36:42 GMT" } ]
2015-03-17T00:00:00
[ [ "Bernd", "Julia", "" ], [ "Borth", "Damian", "" ], [ "Elizalde", "Benjamin", "" ], [ "Friedland", "Gerald", "" ], [ "Gallagher", "Heather", "" ], [ "Gottlieb", "Luke", "" ], [ "Janin", "Adam", "" ], [ "Karabashlieva", "Sara", "" ], [ "Takahashi", "Jocelyn", "" ], [ "Won", "Jennifer", "" ] ]
new_dataset
0.99224
1503.04263
Seung Hyun Jeon
Seung Hyun Jeon, Sanghong An, Changwoo Yoon, Hyun-woo Lee, and Junkyun Choi
User Centric Content Management System for Open IPTV Over SNS (ICTC2012)
10 pages, 17 figures, An earlier version of this paper was awarded as best paper at the IEEE International Conference on ICT Convergence (ICTC), Jeju, Korea, October 2012
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coupled schemes between service-oriented architecture (SOA) and Web 2.0 have recently been researched. Web-based content providers and telecommunications company (Telecom) based Internet protocol television (IPTV) providers have struggled against each other to accommodate more three-screen service subscribers. Since the advent of Web 2.0, more abundant reproduced content can be circulated. However, because according to increasing device's resolution and content formats IPTV providers transcode content in advance, network bandwidth, storage and operation costs for content management systems (CMSs) are wasted. In this paper, we present a user centric CMS for open IPTV, which integrates SOA and Web 2.0. Considering content popularity based on a Zipf-like distribution to solve these problems, we analyze the performance between the user centric CMS and the conventional Web syndication system for normalized costs. Based on the user centric CMS, we implement a social Web TV with device-aware function, which can aggregate, transcode, and deploy content over social networking service (SNS) independently.
[ { "version": "v1", "created": "Sat, 14 Mar 2015 03:56:25 GMT" } ]
2015-03-17T00:00:00
[ [ "Jeon", "Seung Hyun", "" ], [ "An", "Sanghong", "" ], [ "Yoon", "Changwoo", "" ], [ "Lee", "Hyun-woo", "" ], [ "Choi", "Junkyun", "" ] ]
new_dataset
0.994937
1503.04315
Marios Papachristou
Marios Papachristou
Designing and Building a Three-dimensional Projective Scanner for Smartphones
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the frustrating things in the digital fabrication era is that its media are neither affordable nor easily accessible and usable. Three-dimensional (3D) fabrication media (DFM) such as 3D Printers and 3D Scanners have experienced an upsurge in popularity, while the latter remain expensive and hard to function. With this paper, we aim to present you the RhoScanner Project - a an affordable and efficient Three-dimensional Projective Scanner for Smart-phones, hence shedding light on the extended capabilities of digital fabrication media on popular use.
[ { "version": "v1", "created": "Sat, 14 Mar 2015 15:36:10 GMT" } ]
2015-03-17T00:00:00
[ [ "Papachristou", "Marios", "" ] ]
new_dataset
0.964948
1503.04575
Bo Li
Qizhi Fang, Bo Li, Xiaohan Shan, Xiaoming Sun
The Least-core and Nucleolus of Path Cooperative Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative games provide an appropriate framework for fair and stable profit distribution in multiagent systems. In this paper, we study the algorithmic issues on path cooperative games that arise from the situations where some commodity flows through a network. In these games, a coalition of edges or vertices is successful if it enables a path from the source to the sink in the network, and lose otherwise. Based on dual theory of linear programming and the relationship with flow games, we provide the characterizations on the CS-core, least-core and nucleolus of path cooperative games. Furthermore, we show that the least-core and nucleolus are polynomially solvable for path cooperative games defined on both directed and undirected network.
[ { "version": "v1", "created": "Mon, 16 Mar 2015 09:11:01 GMT" } ]
2015-03-17T00:00:00
[ [ "Fang", "Qizhi", "" ], [ "Li", "Bo", "" ], [ "Shan", "Xiaohan", "" ], [ "Sun", "Xiaoming", "" ] ]
new_dataset
0.998064
1503.04628
Nan Li
Nan Li, Gunnar Carlsson, Elena Dubrova, Kim Petersen
Logic BIST: State-of-the-Art and Open Problems
6 pages, 3 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many believe that in-field hardware faults are too rare in practice to justify the need for Logic Built-In Self-Test (LBIST) in a design. Until now, LBIST was primarily used in safety-critical applications. However, this may change soon. First, even if costly methods like burn-in are applied, it is no longer possible to get rid of all latent defects in devices at leading-edge technology. Second, demands for high reliability spread to consumer electronics as smartphones replace our wallets and IDs. However, today many ASIC vendors are reluctant to use LBIST. In this paper, we describe the needs for successful deployment of LBIST in the industrial practice and discuss how these needs can be addressed. Our work is hoped to attract a wider attention to this important research topic.
[ { "version": "v1", "created": "Mon, 16 Mar 2015 12:45:04 GMT" } ]
2015-03-17T00:00:00
[ [ "Li", "Nan", "" ], [ "Carlsson", "Gunnar", "" ], [ "Dubrova", "Elena", "" ], [ "Petersen", "Kim", "" ] ]
new_dataset
0.999775
1307.6505
Aleksandar Ilic
Aleksandar Ilic
On the variable common due date, minimal tardy jobs bicriteria two-machine flow shop problem with ordered machines
6 pages, 1 algorithm
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a special case of the ordinary NP-hard two-machine flow shop problem with the objective of determining simultaneously a minimal common due date and the minimal number of tardy jobs. In [S. S. Panwalkar, C. Koulamas, An O(n^2) algorithm for the variable common due date, minimal tardy jobs bicriteria two-machine flow shop problem with ordered machines, European Journal of Operational Research 221 (2012), 7-13.], the authors presented quadratic algorithm for the problem when each job has its smaller processing time on the first machine. In this note, we improve the running time of the algorithm to O(n log n) by efficient implementation using recently introduced modified binary tree data structure.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 17:41:00 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2015 17:49:32 GMT" } ]
2015-03-16T00:00:00
[ [ "Ilic", "Aleksandar", "" ] ]
new_dataset
0.979032
1503.03202
Giza Belciug Felicia
Marius Cristian Cerlinca, Tudor Ioan Cerlinca, Cristina Elena Turcu, Remus Catalin Prodan, Felicia Florentina Giza-Belciug
Proiectarea si implementarea unui portal HL7
4 pages, in Romanian; Distributed Systems (2009) Suceava
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces some techniques used in developing and implementing an HL7 clinical data portal used in client-server architecture. The HL7 portal is used by nonHL7 applications that need medical data from HL7 servers. Also, the portal can translate a large number of HL7 terms between an indefinite number of languages.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 07:52:35 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2015 08:43:27 GMT" } ]
2015-03-16T00:00:00
[ [ "Cerlinca", "Marius Cristian", "" ], [ "Cerlinca", "Tudor Ioan", "" ], [ "Turcu", "Cristina Elena", "" ], [ "Prodan", "Remus Catalin", "" ], [ "Giza-Belciug", "Felicia Florentina", "" ] ]
new_dataset
0.983202
1503.03884
Cristina Turcu
Turcu Cristina, Cerlinca Tudor, Cerlinca Marius, Prodan Remus, Turcu Cornel, G\^iza Felicia
An RFID-based Clinical Information System for Identification and Monitoring of Patients
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Managing health-care records and information is an imperative necessity. Most patient health records are stored in separate systems and there are still huge paper trails of records that health-care providers must keep to comply with different regulations. This paper proposes an RFID-based system, named SIMOPAC, that integrate RFID technology in health care in order to make patient emergency care as efficient and risk-free as possible, by providing doctors with as much information about a patient as quickly as possible. Every hospital could use SIMOPAC with their existing system in order to promote patient safety and optimize hospital workflow. We will concentrate on the RFID technology and how it could be used in emergency care. We describe a general purpose architecture and data model that is designed for collecting ambulatory data from various existing devices and systems, as well as for storing and presenting clinically significant information to the emergency care physician.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 20:43:44 GMT" } ]
2015-03-16T00:00:00
[ [ "Cristina", "Turcu", "" ], [ "Tudor", "Cerlinca", "" ], [ "Marius", "Cerlinca", "" ], [ "Remus", "Prodan", "" ], [ "Cornel", "Turcu", "" ], [ "Felicia", "Gîza", "" ] ]
new_dataset
0.990184
1503.03940
Yixin Sun
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal
RAPTOR: Routing Attacks on Privacy in Tor
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Tor network is a widely used system for anonymous communication. However, Tor is known to be vulnerable to attackers who can observe traffic at both ends of the communication path. In this paper, we show that prior attacks are just the tip of the iceberg. We present a suite of new attacks, called Raptor, that can be launched by Autonomous Systems (ASes) to compromise user anonymity. First, AS-level adversaries can exploit the asymmetric nature of Internet routing to increase the chance of observing at least one direction of user traffic at both ends of the communication. Second, AS-level adversaries can exploit natural churn in Internet routing to lie on the BGP paths for more users over time. Third, strategic adversaries can manipulate Internet routing via BGP hijacks (to discover the users using specific Tor guard nodes) and interceptions (to perform traffic analysis). We demonstrate the feasibility of Raptor attacks by analyzing historical BGP data and Traceroute data as well as performing real-world attacks on the live Tor network, while ensuring that we do not harm real users. In addition, we outline the design of two monitoring frameworks to counter these attacks: BGP monitoring to detect control-plane attacks, and Traceroute monitoring to detect data-plane anomalies. Overall, our work motivates the design of anonymity systems that are aware of the dynamics of Internet routing.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 03:05:32 GMT" } ]
2015-03-16T00:00:00
[ [ "Sun", "Yixin", "" ], [ "Edmundson", "Anne", "" ], [ "Vanbever", "Laurent", "" ], [ "Li", "Oscar", "" ], [ "Rexford", "Jennifer", "" ], [ "Chiang", "Mung", "" ], [ "Mittal", "Prateek", "" ] ]
new_dataset
0.993279
1503.03954
Yun Liao
Yun Liao, Lingyang Song, Zhu Han, Yonghui Li
Full-Duplex Cognitive Radio: A New Design Paradigm for Enhancing Spectrum Usage
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid growth of demand for ever-increasing data rate, spectrum resources have become more and more scarce. As a promising technique to increase the efficiency of the spectrum utilization, cognitive radio (CR) technique has the great potential to meet such a requirement by allowing un-licensed users to coexist in licensed bands. In conventional CR systems, the spectrum sensing is performed at the beginning of each time slot before the data transmission. This unfortunately results in two major problems: 1) transmission time reduction due to sensing, and 2) sensing accuracy impairment due to data transmission. To tackle these problems, in this paper we present a new design paradigm for future CR by exploring the full-duplex (FD) techniques to achieve the simultaneous spectrum sensing and data transmission. With FD radios equipped at the secondary users (SUs), SUs can simultaneously sense and access the vacant spectrum, and thus, significantly improve sensing performances and meanwhile increase data transmission efficiency. The aim of this article is to transform the promising conceptual framework into the practical wireless network design by addressing a diverse set of challenges such as protocol design and theoretical analysis. Several application scenarios with FD enabled CR are elaborated, and key open research directions and novel algorithms in these systems are discussed.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 05:07:39 GMT" } ]
2015-03-16T00:00:00
[ [ "Liao", "Yun", "" ], [ "Song", "Lingyang", "" ], [ "Han", "Zhu", "" ], [ "Li", "Yonghui", "" ] ]
new_dataset
0.994388
1503.04006
Jaydeb Bhaumik
Jaydeb Bhaumik
Synthesis of all Maximum Length Cellular Automata of Cell Size up to 12
10 pages
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximum length CA has wide range of applications in design of linear block code, cryptographic primitives and VLSI testing particularly in Built-In-Self-Test. In this paper, an algorithm to compute all $n$-cell maximum length CA-rule vectors is proposed. Also rule vectors for each primitive polynomial in GF(2^2) to GF(2^{12} have been computed by simulation and they have been listed.Programmable rule vectors based maximum length CA can be used to design cryptographic primitives.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 12:09:37 GMT" } ]
2015-03-16T00:00:00
[ [ "Bhaumik", "Jaydeb", "" ] ]
new_dataset
0.998351
1004.0403
Alessandro Colantonio
Alessandro Colantonio and Roberto Di Pietro
CONCISE: Compressed 'n' Composable Integer Set
Preprint submitted to Information Processing Letters, 7 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few. However, bitmaps usually use a large storage space, thus requiring compression. Nevertheless, there is a space-time tradeoff among compression schemes. The Word Aligned Hybrid (WAH) bitmap compression trades some space to allow for bitwise operations without first decompressing bitmaps. WAH has been recognized as the most efficient scheme in terms of computation time. In this paper we present CONCISE (Compressed 'n' Composable Integer Set), a new scheme that enjoys significatively better performances than those of WAH. In particular, when compared to WAH, our algorithm is able to reduce the required memory up to 50%, by having similar or better performance in terms of computation time. Further, we show that CONCISE can be efficiently used to manipulate bitmaps representing sets of integral numbers in lieu of well-known data structures such as arrays, lists, hashtables, and self-balancing binary search trees. Extensive experiments over synthetic data show the effectiveness of our approach.
[ { "version": "v1", "created": "Sat, 3 Apr 2010 00:07:00 GMT" } ]
2015-03-14T00:00:00
[ [ "Colantonio", "Alessandro", "" ], [ "Di Pietro", "Roberto", "" ] ]
new_dataset
0.992385
1004.0744
Valentin Brimkov
Valentin E. Brimkov
Patrolling a Street Network is Strongly NP-Complete but in P for Tree Structures
null
null
null
null
cs.CG cs.CC cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following problem: Given a finite set of straight line segments in the plane, determine the positions of a minimal number of points on the segments, from which guards can see all segments. This problem can be interpreted as looking for a minimal number of locations of policemen, guards, cameras or other sensors, that can observe a network of streets, corridors, tunnels, tubes, etc. We show that the problem is strongly NP-complete even for a set of segments with a cubic graph structure, but in P for tree structures.
[ { "version": "v1", "created": "Tue, 6 Apr 2010 01:06:27 GMT" } ]
2015-03-14T00:00:00
[ [ "Brimkov", "Valentin E.", "" ] ]
new_dataset
0.995941
1004.1503
Tuvi Etzion
Tuvi Etzion and Alexander Vardy
A New Construction for Constant Weight Codes
5 pages, to be presented in ISIT2014, melbourne, Australia
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new construction for constant weight codes is presented. The codes are constructed from $k$-dimensional subspaces of the vector space $\F_q^n$. These subspaces form a constant dimension code in the Grassmannian space $\cG_q(n,k)$. Some of the constructed codes are optimal constant weight codes with parameters not known before. An efficient algorithm for error-correction is given for the constructed codes. If the constant dimension code has an efficient encoding and decoding algorithms then also the constructed constant weight code has an efficient encoding and decoding algorithms.
[ { "version": "v1", "created": "Fri, 9 Apr 2010 09:13:34 GMT" }, { "version": "v2", "created": "Mon, 3 Mar 2014 19:45:40 GMT" }, { "version": "v3", "created": "Tue, 8 Jul 2014 19:57:35 GMT" } ]
2015-03-14T00:00:00
[ [ "Etzion", "Tuvi", "" ], [ "Vardy", "Alexander", "" ] ]
new_dataset
0.996675
1004.2303
Lawrence Ong
Lawrence Ong, Sarah J. Johnson, and Christopher M. Kellett
The Binary-Symmetric Parallel-Relay Network
accepted and to be presented at ISIT 2010
Proceedings of the 2010 IEEE International Sysmposium on Information Theory (ISIT 2010), Austin, USA, pp. 654-658, June 13-18, 2010
10.1109/ISIT.2010.5513571
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present capacity results of the binary-symmetric parallel-relay network, where there is one source, one destination, and K relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of relays. On the other hand, decoding relays, where the relays decode the source message, re-encode, and forward it to the destination, achieve the capacity when the number of relays is small.
[ { "version": "v1", "created": "Wed, 14 Apr 2010 01:49:30 GMT" } ]
2015-03-14T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Johnson", "Sarah J.", "" ], [ "Kellett", "Christopher M.", "" ] ]
new_dataset
0.999575
1004.2434
Deniz Gunduz
Deniz Gunduz, Aylin Yener, Andrea Goldsmith and H. Vincent Poor
The Multi-way Relay Channel
Revised version of our submission to the Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multiuser communication channel, in which multiple users exchange information with the help of a relay terminal, termed the multi-way relay channel (mRC), is introduced. In this model, multiple interfering clusters of users communicate simultaneously, where the users within the same cluster wish to exchange messages among themselves. It is assumed that the users cannot receive each other's signals directly, and hence the relay terminal in this model is the enabler of communication. In particular, restricted encoders, which ignore the received channel output and use only the corresponding messages for generating the channel input, are considered. Achievable rate regions and an outer bound are characterized for the Gaussian mRC, and their comparison is presented in terms of exchange rates in a symmetric Gaussian network scenario. It is shown that the compress-and-forward (CF) protocol achieves exchange rates within a constant bit offset of the exchange capacity independent of the power constraints of the terminals in the network. A finite bit gap between the exchange rates achieved by the CF and the amplify-and-forward (AF) protocols is also shown. The two special cases of the mRC, the full data exchange model, in which every user wants to receive messages of all other users, and the pairwise data exchange model which consists of multiple two-way relay channels, are investigated in detail. In particular for the pairwise data exchange model, in addition to the proposed random coding based achievable schemes, a nested lattice coding based scheme is also presented and is shown to achieve exchange rates within a constant bit gap of the exchange capacity.
[ { "version": "v1", "created": "Wed, 14 Apr 2010 16:10:03 GMT" }, { "version": "v2", "created": "Mon, 27 Feb 2012 14:06:13 GMT" } ]
2015-03-14T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Yener", "Aylin", "" ], [ "Goldsmith", "Andrea", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.999157
0707.1151
Philip Baback Alipour
P. B. Alipour
Logic, Design & Organization of PTVD-SHAM; A Parallel Time Varying & Data Super-helical Access Memory
34 pages, 5 figures (2 multi-figures), 1 table. v.1 & v.2: corrupt file layout due to *.doc file's bad conversion; v.3: fig.2.1 corruption; v.4: correction to v.1-3; v.5: major content revision, spacing levelled; v.6+: theorems, hypotheses content, restructured and conformed with its new topic [arXiv:0710.0244v1] published in cs.CE category. (Avoid corrupted versions.)
null
null
null
cs.AR
null
This paper encompasses a super helical memory system's design, 'Boolean logic & image-logic' as a theoretical concept of an invention-model to 'store time-data' in terms of anticipating the best memory location ever for data/time. A waterfall effect is deemed to assist the process of potential-difference output-switch into diverse logic states in quantum dot computational methods via utilizing coiled carbon nanotubes (CCNTs) and carbon nanotube field effect transistors (CNFETs). A 'quantum confinement' is thus derived for a flow of particles in a categorized quantum well substrate with a normalized capacitance rectifying high B-field flux into electromagnetic induction. Multi-access of coherent sequences of 'qubit addressing' is gained in any magnitude as pre-defined for the orientation of array displacement. Briefly, Gaussian curvature of k<0 is debated in aim of specifying the 2D electron gas characteristics in scenarios where data is stored in short intervals versus long ones e.g. when k'>(k<0) for greater CCNT diameters, space-time continuum is folded by chance for the particle. This benefits from Maxwell-Lorentz theory in Minkowski's space-time viewpoint alike to crystal oscillators for precise data timing purposes and radar systems e.g., time varying self-clocking devices in diverse geographic locations. This application could also be optional for data depository versus extraction, in the best supercomputer system's locations, autonomously. For best performance in minimizing current limiting mechanisms including electromigration, a multilevel metallization and implant process forming elevated sources/drains for the circuit's staircase pyramidal construction, is discussed accordingly.
[ { "version": "v1", "created": "Mon, 9 Jul 2007 19:26:06 GMT" }, { "version": "v2", "created": "Mon, 9 Jul 2007 20:48:51 GMT" }, { "version": "v3", "created": "Thu, 12 Jul 2007 18:36:06 GMT" }, { "version": "v4", "created": "Thu, 12 Jul 2007 20:06:57 GMT" }, { "version": "v5", "created": "Wed, 18 Jul 2007 11:22:22 GMT" }, { "version": "v6", "created": "Tue, 2 Oct 2007 16:31:53 GMT" } ]
2015-03-13T00:00:00
[ [ "Alipour", "P. B.", "" ] ]
new_dataset
0.971382
0806.2513
Olli Pottonen
Patric R. J. \"Osterg{\aa}rd and Olli Pottonen
The Perfect Binary One-Error-Correcting Codes of Length 15: Part I--Classification
6 pages. v3: made the codes available in the source of this paper
IEEE Trans. Inform. Theory 55 (2009), 4657-4660
10.1109/TIT.2009.2027525
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length 16 is presented. There are 5983 such inequivalent perfect codes and 2165 extended perfect codes. Efficient generation of these codes relies on the recent classification of Steiner quadruple systems of order 16. Utilizing a result of Blackmore, the optimal binary one-error-correcting codes of length 14 and the (15, 1024, 4) codes are also classified; there are 38408 and 5983 such codes, respectively.
[ { "version": "v1", "created": "Mon, 16 Jun 2008 07:58:28 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 10:20:09 GMT" }, { "version": "v3", "created": "Wed, 30 Dec 2009 18:56:05 GMT" } ]
2015-03-13T00:00:00
[ [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ] ]
new_dataset
0.996891
0809.2978
Jon Wilkening
Jon Wilkening and Jia Yu
A local construction of the Smith normal form of a matrix polynomial
26 pages, 6 figures; introduction expanded, 10 references added, two additional tests performed
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for computing a Smith form with multipliers of a regular matrix polynomial over a field. This algorithm differs from previous ones in that it computes a local Smith form for each irreducible factor in the determinant separately and then combines them into a global Smith form, whereas other algorithms apply a sequence of unimodular row and column operations to the original matrix. The performance of the algorithm in exact arithmetic is reported for several test cases.
[ { "version": "v1", "created": "Wed, 17 Sep 2008 18:58:42 GMT" }, { "version": "v2", "created": "Wed, 9 Jun 2010 19:23:17 GMT" } ]
2015-03-13T00:00:00
[ [ "Wilkening", "Jon", "" ], [ "Yu", "Jia", "" ] ]
new_dataset
0.982454
0902.1786
Shuai Zhang
Christian Schlegel and Shuai Zhang
On the Dynamics of the Error Floor Behavior in (Regular) LDPC Codes
15 pages, submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that dominant trapping sets of regular LDPC codes, so called absorption sets, undergo a two-phased dynamic behavior in the iterative message-passing decoding algorithm. Using a linear dynamic model for the iteration behavior of these sets, it is shown that they undergo an initial geometric growth phase which stabilizes in a final bit-flipping behavior where the algorithm reaches a fixed point. This analysis is shown to lead to very accurate numerical calculations of the error floor bit error rates down to error rates that are inaccessible by simulation. The topology of the dominant absorption sets of an example code, the IEEE 802.3an (2048,1723) regular LDPC code, are identified and tabulated using topological relationships in combination with search algorithms.
[ { "version": "v1", "created": "Wed, 11 Feb 2009 00:29:55 GMT" }, { "version": "v2", "created": "Wed, 11 Feb 2009 23:40:14 GMT" } ]
2015-03-13T00:00:00
[ [ "Schlegel", "Christian", "" ], [ "Zhang", "Shuai", "" ] ]
new_dataset
0.961986
0908.4499
Yann Strozecki
Yann Strozecki
Monadic second-order model-checking on decomposable matroids
32 pages, journal paper. Revision: the last part has been removed and the writing improved
null
null
null
cs.DM cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A notion of branch-width, which generalizes the one known for graphs, can be defined for matroids. We first give a proof of the polynomial time model-checking of monadic second-order formulas on representable matroids of bounded branch-width, by reduction to monadic second-order formulas on trees. This proof is much simpler than the one previously known. We also provide a link between our logical approach and a grammar that allows to build matroids of bounded branch-width. Finally, we introduce a new class of non-necessarily representable matroids, described by a grammar and on which monadic second-order formulas can be checked in linear time.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 11:00:44 GMT" }, { "version": "v2", "created": "Sat, 29 Jan 2011 23:43:14 GMT" } ]
2015-03-13T00:00:00
[ [ "Strozecki", "Yann", "" ] ]
new_dataset
0.994918
0909.0704
Lav Varshney
Ha Q. Nguyen, Lav R. Varshney, and Vivek K Goyal
Concentric Permutation Source Codes
null
IEEE Transactions on Communications, vol. 58, no. 11, pp. 3154-3164, November 2010
10.1109/TCOMM.2010.101210.090535
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Permutation codes are a class of structured vector quantizers with a computationally-simple encoding procedure based on sorting the scalar components. Using a codebook comprising several permutation codes as subcodes preserves the simplicity of encoding while increasing the number of rate-distortion operating points, improving the convex hull of operating points, and increasing design complexity. We show that when the subcodes are designed with the same composition, optimization of the codebook reduces to a lower-dimensional vector quantizer design within a single cone. Heuristics for reducing design complexity are presented, including an optimization of the rate allocation in a shape-gain vector quantizer with gain-dependent wrapped spherical shape codebook.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 16:33:18 GMT" }, { "version": "v2", "created": "Sat, 19 Sep 2009 21:32:37 GMT" }, { "version": "v3", "created": "Wed, 14 Apr 2010 01:10:13 GMT" }, { "version": "v4", "created": "Wed, 23 Jun 2010 19:19:31 GMT" } ]
2015-03-13T00:00:00
[ [ "Nguyen", "Ha Q.", "" ], [ "Varshney", "Lav R.", "" ], [ "Goyal", "Vivek K", "" ] ]
new_dataset
0.989961
0909.2009
Claudio Weidmann
Claudio Weidmann and Gottfried Lechner
A Fresh Look at Coding for q-ary Symmetric Channels
12 pages, 6 figures; revision submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies coding schemes for the $q$-ary symmetric channel based on binary low-density parity-check (LDPC) codes that work for any alphabet size $q=2^m$, $m\in\mathbb{N}$, thus complementing some recently proposed packet-based schemes requiring large $q$. First, theoretical optimality of a simple layered scheme is shown, then a practical coding scheme based on a simple modification of standard binary LDPC decoding is proposed. The decoder is derived from first principles and using a factor-graph representation of a front-end that maps $q$-ary symbols to groups of $m$ bits connected to a binary code. The front-end can be processed with a complexity that is linear in $m=\log_2 q$. An extrinsic information transfer chart analysis is carried out and used for code optimization. Finally, it is shown how the same decoder structure can also be applied to a larger class of $q$-ary channels.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 18:17:30 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2011 15:52:39 GMT" } ]
2015-03-13T00:00:00
[ [ "Weidmann", "Claudio", "" ], [ "Lechner", "Gottfried", "" ] ]
new_dataset
0.954697
0910.3028
Natasha Devroye
Stefano Rini, Daniela Tuninetti, Natasha Devroye
State of the cognitive interference channel: a new unified inner bound
Presented at the 2010 International Zurich Seminar on Communications - an 2nd updated version.
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of the interference channel in which one transmitter non-causally knows the message of the other, termed the cognitive interference channel, has remained open since its inception in 2005. A number of subtly differing achievable rate regions and outer bounds have been derived, some of which are tight under specific conditions. In this work we present a new unified inner bound for the discrete memoryless cognitive interference channel. We show explicitly how it encompasses all known discrete memoryless achievable rate regions as special cases. The presented achievable region was recently used in deriving the capacity region of the general deterministic cognitive interference channel, and thus also the linear high-SNR deterministic approximation of the Gaussian cognitive interference channel. The high-SNR deterministic approximation was then used to obtain the capacity of the Gaussian cognitive interference channel to within 1.87 bits.
[ { "version": "v1", "created": "Fri, 16 Oct 2009 03:14:05 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 05:45:48 GMT" }, { "version": "v3", "created": "Fri, 19 Mar 2010 22:35:24 GMT" } ]
2015-03-13T00:00:00
[ [ "Rini", "Stefano", "" ], [ "Tuninetti", "Daniela", "" ], [ "Devroye", "Natasha", "" ] ]
new_dataset
0.995486
0910.3511
Haya Shulman
Amir Herzberg and Haya Shulman
Stealth-MITM DoS Attacks on Secure Channels
14 figures; 21 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small' anti-replay window, and analysis of `sufficient' window size. First amplifying attack on IPsec, when deployed with `sufficient' window size. This attack (as the previous) is realistic: attacker needs only to duplicate and speed-up few packets. We also suggest a solution designed to prevent the presented attacks, and to provide secure channel immune to degradation and other DoS attacks. Our solution involves changes (only) to the two gateway machines running IPsec. In addition to their practical importance, our results also raise the challenge of formally defining secure channels immune to DoS and degradation attacks, and providing provably-secure implementations.
[ { "version": "v1", "created": "Mon, 19 Oct 2009 10:25:17 GMT" } ]
2015-03-13T00:00:00
[ [ "Herzberg", "Amir", "" ], [ "Shulman", "Haya", "" ] ]
new_dataset
0.999081
0912.0027
Yunhui Fu
Matthew Cook and Yunhui Fu and Robert T. Schweller
Temperature 1 Self-Assembly: Deterministic Assembly in 3D and Probabilistic Assembly in 2D
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the power of the Wang tile self-assembly model at temperature 1, a threshold value that permits attachment between any two tiles that share even a single bond. When restricted to deterministic assembly in the plane, no temperature 1 assembly system has been shown to build a shape with a tile complexity smaller than the diameter of the shape. In contrast, we show that temperature 1 self-assembly in 3 dimensions, even when growth is restricted to at most 1 step into the third dimension, is capable of simulating a large class of temperature 2 systems, in turn permitting the simulation of arbitrary Turing machines and the assembly of $n\times n$ squares in near optimal $O(\log n)$ tile complexity. Further, we consider temperature 1 probabilistic assembly in 2D, and show that with a logarithmic scale up of tile complexity and shape scale, the same general class of temperature $\tau=2$ systems can be simulated with high probability, yielding Turing machine simulation and $O(\log^2 n)$ assembly of $n\times n$ squares with high probability. Our results show a sharp contrast in achievable tile complexity at temperature 1 if either growth into the third dimension or a small probability of error are permitted. Motivated by applications in nanotechnology and molecular computing, and the plausibility of implementing 3 dimensional self-assembly systems, our techniques may provide the needed power of temperature 2 systems, while at the same time avoiding the experimental challenges faced by those systems.
[ { "version": "v1", "created": "Mon, 30 Nov 2009 21:45:29 GMT" }, { "version": "v2", "created": "Thu, 13 May 2010 00:12:03 GMT" } ]
2015-03-13T00:00:00
[ [ "Cook", "Matthew", "" ], [ "Fu", "Yunhui", "" ], [ "Schweller", "Robert T.", "" ] ]
new_dataset
0.992036
1001.0210
Alexander Vardy
Hessam Mahdavifar and Alexander Vardy
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes
15 pages, to appear in the IEEE Transactions on Information Theory
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose Alice wishes to send messages to Bob through a communication channel C_1, but her transmissions also reach an eavesdropper Eve through another channel C_2. The goal is to design a coding scheme that makes it possible for Alice to communicate both reliably and securely. Reliability is measured in terms of Bob's probability of error in recovering the message, while security is measured in terms of Eve's equivocation ratio. Wyner showed that the situation is characterized by a single constant C_s, called the secrecy capacity, which has the following meaning: for all $\epsilon > 0$, there exist coding schemes of rate $R \ge C_s - \epsilon$ that asymptotically achieve both the reliability and the security objectives. However, his proof of this result is based upon a nonconstructive random-coding argument. To date, despite a considerable research effort, the only case where we know how to construct coding schemes that achieve secrecy capacity is when Eve's channel C_2 is an erasure channel, or a combinatorial variation thereof. Polar codes were recently invented by Arikan; they approach the capacity of symmetric binary-input discrete memoryless channels with low encoding and decoding complexity. Herein, we use polar codes to construct a coding scheme that achieves the secrecy capacity for a wide range of wiretap channels. Our construction works for any instantiation of the wiretap channel model, as long as both C_1 and C_2 are symmetric and binary-input, and C_2 is degraded with respect to C_1. Moreover, we show how to modify our construction in order to provide strong security, in the sense defined by Maurer, while still operating at a rate that approaches the secrecy capacity. In this case, we cannot guarantee that the reliability condition will be satisfied unless the main channel C_1 is noiseless, although we believe it can be always satisfied in practice.
[ { "version": "v1", "created": "Fri, 1 Jan 2010 05:30:10 GMT" }, { "version": "v2", "created": "Mon, 4 Apr 2011 00:48:19 GMT" } ]
2015-03-13T00:00:00
[ [ "Mahdavifar", "Hessam", "" ], [ "Vardy", "Alexander", "" ] ]
new_dataset
0.993982
1001.0592
Georgios Zervas
John W. Byers, Michael Mitzenmacher, Georgios Zervas
Information Asymmetries in Pay-Per-Bid Auctions: How Swoopo Makes Bank
48 pages, 21 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Innovative auction methods can be exploited to increase profits, with Shubik's famous "dollar auction" perhaps being the most widely known example. Recently, some mainstream e-commerce web sites have apparently achieved the same end on a much broader scale, by using "pay-per-bid" auctions to sell items, from video games to bars of gold. In these auctions, bidders incur a cost for placing each bid in addition to (or sometimes in lieu of) the winner's final purchase cost. Thus even when a winner's purchase cost is a small fraction of the item's intrinsic value, the auctioneer can still profit handsomely from the bid fees. Our work provides novel analyses for these auctions, based on both modeling and datasets derived from auctions at Swoopo.com, the leading pay-per-bid auction site. While previous modeling work predicts profit-free equilibria, we analyze the impact of information asymmetry broadly, as well as Swoopo features such as bidpacks and the Swoop It Now option specifically, to quantify the effects of imperfect information in these auctions. We find that even small asymmetries across players (cheaper bids, better estimates of other players' intent, different valuations of items, committed players willing to play "chicken") can increase the auction duration well beyond that predicted by previous work and thus skew the auctioneer's profit disproportionately. Finally, we discuss our findings in the context of a dataset of thousands of live auctions we observed on Swoopo, which enables us also to examine behavioral factors, such as the power of aggressive bidding. Ultimately, our findings show that even with fully rational players, if players overlook or are unaware any of these factors, the result is outsized profits for pay-per-bid auctioneers.
[ { "version": "v1", "created": "Tue, 5 Jan 2010 16:31:06 GMT" }, { "version": "v2", "created": "Wed, 13 Jan 2010 19:58:07 GMT" }, { "version": "v3", "created": "Tue, 30 Mar 2010 21:51:26 GMT" } ]
2015-03-13T00:00:00
[ [ "Byers", "John W.", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Zervas", "Georgios", "" ] ]
new_dataset
0.989028
1001.5019
Siamak Tazari
Stephan Kreutzer and Siamak Tazari
Lower Bounds for the Complexity of Monadic Second-Order Logic
Preliminary version appeared in proceedings of the 25th IEEE symposium on Logic in Computer Science (LICS'10), Edinburgh, Scotland, UK, pp. 189-198, 2010
null
null
null
cs.LO cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Courcelle's famous theorem from 1990 states that any property of graphs definable in monadic second-order logic (MSO) can be decided in linear time on any class of graphs of bounded treewidth, or in other words, MSO is fixed-parameter tractable in linear time on any such class of graphs. From a logical perspective, Courcelle's theorem establishes a sufficient condition, or an upper bound, for tractability of MSO-model checking. Whereas such upper bounds on the complexity of logics have received significant attention in the literature, almost nothing is known about corresponding lower bounds. In this paper we establish a strong lower bound for the complexity of monadic second-order logic. In particular, we show that if C is any class of graphs which is closed under taking subgraphs and whose treewidth is not bounded by a polylogarithmic function (in fact, $\log^c n$ for some small c suffices) then MSO-model checking is intractable on C (under a suitable assumption from complexity theory).
[ { "version": "v1", "created": "Wed, 27 Jan 2010 20:51:47 GMT" }, { "version": "v2", "created": "Thu, 23 Jun 2011 20:50:43 GMT" } ]
2015-03-13T00:00:00
[ [ "Kreutzer", "Stephan", "" ], [ "Tazari", "Siamak", "" ] ]
new_dataset
0.951843
1002.3188
Sung Hoon LIm
Sung Hoon Lim, Young-Han Kim, Abbas El Gamal, Sae-Young Chung
Noisy Network Coding
33 pages, 4 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward schemes, and each decoder performs simultaneous joint typicality decoding on the received signals from all the blocks without explicitly decoding the compression indices. A consequence of this new scheme is that achievability is proved simply and more generally without resorting to time expansion to extend results for acyclic networks to networks with cycles. The noisy network coding scheme is then extended to general multi-source networks by combining it with decoding techniques for interference channels. For the Gaussian multicast network, noisy network coding improves the previously established gap to the cutset bound. We also demonstrate through two popular AWGN network examples that noisy network coding can outperform conventional compress-forward, amplify-forward, and hash-forward schemes.
[ { "version": "v1", "created": "Tue, 16 Feb 2010 23:48:31 GMT" }, { "version": "v2", "created": "Fri, 12 Mar 2010 00:01:19 GMT" } ]
2015-03-13T00:00:00
[ [ "Lim", "Sung Hoon", "" ], [ "Kim", "Young-Han", "" ], [ "Gamal", "Abbas El", "" ], [ "Chung", "Sae-Young", "" ] ]
new_dataset
0.982713
1003.1266
Ulrike von Luxburg
Ulrike von Luxburg, Agnes Radl, Matthias Hein
Hitting and commute times in large graphs are often misleading
null
null
null
null
cs.DS cs.LG math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Next to the shortest path distance, the second most popular distance function between vertices in a graph is the commute distance (resistance distance). For two vertices u and v, the hitting time H_{uv} is the expected time it takes a random walk to travel from u to v. The commute time is its symmetrized version C_{uv} = H_{uv} + H_{vu}. In our paper we study the behavior of hitting times and commute distances when the number n of vertices in the graph is very large. We prove that as n converges to infinty, hitting times and commute distances converge to expressions that do not take into account the global structure of the graph at all. Namely, the hitting time H_{uv} converges to 1/d_v and the commute time to 1/d_u + 1/d_v where d_u and d_v denote the degrees of vertices u and v. In these cases, the hitting and commute times are misleading in the sense that they do not provide information about the structure of the graph. We focus on two major classes of random graphs: random geometric graphs (k-nearest neighbor graphs, epsilon-graphs, Gaussian similarity graphs) and random graphs with given expected degrees (in particular, Erdos-Renyi graphs with and without planted partitions)
[ { "version": "v1", "created": "Fri, 5 Mar 2010 13:54:11 GMT" }, { "version": "v2", "created": "Thu, 26 May 2011 08:07:41 GMT" } ]
2015-03-13T00:00:00
[ [ "von Luxburg", "Ulrike", "" ], [ "Radl", "Agnes", "" ], [ "Hein", "Matthias", "" ] ]
new_dataset
0.987195
1003.1684
R\"udiger Ehlers
Ruediger Ehlers
Generalised Rabin(1) synthesis
14 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel method for the synthesis of finite state systems that is a generalisation of the generalised reactivity(1) synthesis approach by Piterman, Pnueli and Sa'ar. In particular, we describe an efficient method to synthesize systems from linear-time temporal logic specifications for which all assumptions and guarantees have a Rabin index of one. We show how to build a parity game with at most five colours that captures all solutions to the synthesis problem from such a specification. This parity game has a structure that is amenable to symbolic implementations. We furthermore show that the results obtained are in some sense tight, i.e., that there does not exist a similar synthesis method for assumptions and specifications of higher Rabin index, unless P=NP.
[ { "version": "v1", "created": "Mon, 8 Mar 2010 17:36:02 GMT" }, { "version": "v2", "created": "Wed, 22 Dec 2010 23:00:11 GMT" } ]
2015-03-13T00:00:00
[ [ "Ehlers", "Ruediger", "" ] ]
new_dataset
0.991964
1003.3501
Jo\~ao Luiz Rebelatto
Jo\~ao Luiz Rebelatto, Bartolomeu F. Uch\^oa-Filho, Yonghui Li and Branka Vucetic
Generalized Distributed Network Coding Based on Nonbinary Linear Block Codes for Multi-User Cooperative Communications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of M users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its code rate. The proposed scheme, called generalized dynamic network codes (GDNC), is a generalization of the dynamic network codes (DNC) recently proposed by Xiao and Skoglund. The design of the network codes that maximizes the diversity order is recognized as equivalent to the design of linear block codes over a nonbinary finite field under the Hamming metric. The proposed scheme offers a much better tradeoff between rate and diversity order. An outage probability analysis showing the improved performance is carried out, and computer simulations results are shown to agree with the analytical results.
[ { "version": "v1", "created": "Thu, 18 Mar 2010 02:45:12 GMT" }, { "version": "v2", "created": "Sun, 21 Mar 2010 23:52:52 GMT" } ]
2015-03-13T00:00:00
[ [ "Rebelatto", "João Luiz", "" ], [ "Uchôa-Filho", "Bartolomeu F.", "" ], [ "Li", "Yonghui", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.998535
1004.0180
Jing ( Tiffany ) Li
Kai Xie, Jing (Tiffany) Li
Precoded Turbo Equalizer for Power Line Communication Systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Power line communication continues to draw increasing interest by promising a wide range of applications including cost-free last-mile communication solution. However, signal transmitted through the power lines deteriorates badly due to the presence of severe inter-symbol interference (ISI) and harsh random pulse noise. This work proposes a new precoded turbo equalization scheme specifically designed for the PLC channels. By introducing useful precoding to reshape ISI, optimizing maximum {\it a posteriori} (MAP) detection to address the non-Gaussian pulse noise, and performing soft iterative decision refinement, the new equalizer demonstrates a gain significantly better than the existing turbo equalizers.
[ { "version": "v1", "created": "Thu, 1 Apr 2010 16:42:29 GMT" } ]
2015-03-13T00:00:00
[ [ "Xie", "Kai", "", "Tiffany" ], [ "Jing", "", "", "Tiffany" ], [ "Li", "", "" ] ]
new_dataset
0.993883
1107.1753
Yavor Parvanov
Yavor Parvanov
Notes on Electronic Lexicography
8 pages, 1 figure
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These notes are a continuation of topics covered by V. Selegej in his article "Electronic Dictionaries and Computational lexicography". How can an electronic dictionary have as its object the description of closely related languages? Obviously, such a question allows multiple answers.
[ { "version": "v1", "created": "Sat, 9 Jul 2011 00:40:06 GMT" } ]
2015-03-13T00:00:00
[ [ "Parvanov", "Yavor", "" ] ]
new_dataset
0.988411
1202.6447
Mingzhi Zhu
Mingzhi Zhu, Gennian Ge
Quaternary Constant-Composition Codes with Weight Four and Distances Five or Six
23 pages, 3 tables
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sizes of optimal constant-composition codes of weight three have been determined by Chee, Ge and Ling with four cases in doubt. Group divisible codes played an important role in their constructions. In this paper, we study the problem of constructing optimal quaternary constant-composition codes with Hamming weight four and minimum distances five or six through group divisible codes and Room square approaches. The problem is solved leaving only five lengths undetermined. Previously, the results on the sizes of such quaternary constant-composition codes were scarce.
[ { "version": "v1", "created": "Wed, 29 Feb 2012 05:32:09 GMT" }, { "version": "v2", "created": "Mon, 12 Mar 2012 05:33:59 GMT" }, { "version": "v3", "created": "Tue, 13 Mar 2012 11:02:35 GMT" }, { "version": "v4", "created": "Thu, 15 Mar 2012 07:27:08 GMT" } ]
2015-03-13T00:00:00
[ [ "Zhu", "Mingzhi", "" ], [ "Ge", "Gennian", "" ] ]
new_dataset
0.999029
1204.3800
Srinivasan Kalyanaraman
Srinivasan Kalyanaraman
Indus script corpora, archaeo-metallurgy and Meluhha (Mleccha)
49 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Jules Bloch's work on formation of the Marathi language has to be expanded further to provide for a study of evolution and formation of Indian languages in the Indian language union (sprachbund). The paper analyses the stages in the evolution of early writing systems which began with the evolution of counting in the ancient Near East. A stage anterior to the stage of syllabic representation of sounds of a language, is identified. Unique geometric shapes required for tokens to categorize objects became too large to handle to abstract hundreds of categories of goods and metallurgical processes during the production of bronze-age goods. About 3500 BCE, Indus script as a writing system was developed to use hieroglyphs to represent the 'spoken words' identifying each of the goods and processes. A rebus method of representing similar sounding words of the lingua franca of the artisans was used in Indus script. This method is recognized and consistently applied for the lingua franca of the Indian sprachbund. That the ancient languages of India, constituted a sprachbund (or language union) is now recognized by many linguists. The sprachbund area is proximate to the area where most of the Indus script inscriptions were discovered, as documented in the corpora. That hundreds of Indian hieroglyphs continued to be used in metallurgy is evidenced by their use on early punch-marked coins. This explains the combined use of syllabic scripts such as Brahmi and Kharoshti together with the hieroglyphs on Rampurva copper bolt, and Sohgaura copper plate from about 6th century BCE.Indian hieroglyphs constitute a writing system for meluhha language and are rebus representations of archaeo-metallurgy lexemes. The rebus principle was employed by the early scripts and can legitimately be used to decipher the Indus script, after secure pictorial identification.
[ { "version": "v1", "created": "Tue, 17 Apr 2012 14:14:26 GMT" } ]
2015-03-13T00:00:00
[ [ "Kalyanaraman", "Srinivasan", "" ] ]
new_dataset
0.99982
1207.4291
Salvatore Iaconesi
Salvatore Iaconesi, Oriana Persico
ConnectiCity, augmented perception of the city
19 pages, 6 figures, presented at Information Visualization 12, Montpellier, France
null
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As we move through cities in our daily lives, we are in a constant state of transformation of the spaces around us. The form and essence of urban space directly affects people's behavior, describing in their perception what is possible or impossible, allowed or prohibited, suggested or advised against. We are now able to fill and stratify space/time with digital information layers, completely wrapping cities in a membrane of information and of opportunities for interaction and communication. Mobile devices, smartphones, wearables, digital tags, near field communication devices, location based services and mixed/augmented reality have gone much further in this direction, turning the world into an essentially read/write, ubiquitous publishing surface. The usage of mobile devices and ubiquitous technologies alters the understanding of place. In this process, the definition of (urban) landscape powerfully shifts from a definition which is purely administrative (e.g.: the borders of the flower bed in the middle of a roundabout) to one that is multiplied according to all individuals which experience that location; as a lossless sum of their perceptions; as a stratification of interpretations and activities which forms our cognition of space and time. In our research we investigated the possibilities to use the scenario which sees urban spaces progressively filling with multiple layers of real-time, ubiquitous, digital information to conceptualize, design and implement a series of usage scenarios. It is possible to create multiple layers of narratives which traverse the city and which allow us to read them in different ways, according to the different strategies and methodologies enabling us to highlight how cities express points of view on the environment, culture, economy, transports, energy and politics.
[ { "version": "v1", "created": "Wed, 18 Jul 2012 08:02:33 GMT" } ]
2015-03-13T00:00:00
[ [ "Iaconesi", "Salvatore", "" ], [ "Persico", "Oriana", "" ] ]
new_dataset
0.998959
1208.1956
Kai Yang Kai Yang
Kai Yang and Xi Zhou
MIDI-LAB, a Powerful Visual Basic Program for Creating MIDI Music
12 pages, 10 figures, 2 tables, http://www.airccse.org/journal/ijsea/ijsea.html; International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.4, July 2012
null
null
null
cs.SE cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Creating MIDI music can be a practical challenge. In the past, working with it was difficult and frustrating to all but the most accomplished and determined. Now, however, we are offering a powerful Visual Basic program called MIDI-LAB, that is easy to learn, and instantly rewarding to even the newest users. MIDI-LAB has been developed to give users the ability to quickly create music with a limitless variety of tunes, tempos, speeds, volumes, instruments, rhythms and major scales. This program has a simple, intuitive, and user-friendly interface, which provides a straightforward way to enter musical data with Numbered Musical Notation (NMN) and immediately create MIDI music. The key feature of this program is the digitalization of music input. It vastly simplifies creating, editing, and saving MIDI music. MIDI-LAB can be used virtually anywhere to write music for entertainment, teaching, computer games, and mobile phone ringtones.
[ { "version": "v1", "created": "Thu, 9 Aug 2012 15:43:58 GMT" } ]
2015-03-13T00:00:00
[ [ "Yang", "Kai", "" ], [ "Zhou", "Xi", "" ] ]
new_dataset
0.995298
1209.5039
Jaswinder Dilawari Singh
Jaswinder Singh Dilawari, Ravinder Khanna
Creation of Digital Test Form for Prepress Department
5 Pages,4 Figures
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 9, September 2012 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 10, No. 9, September 2012
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main problem in colour management in prepress department is lack of availability of literature on colour management and knowledge gap between prepress department and press department. So a digital test from has been created by Adobe Photoshop to analyse the ICC profile and to create a new profile and this analysed data is used to study about various grey scale of RGB and CMYK images. That helps in conversion of image from RGB to CMYK in prepress department.
[ { "version": "v1", "created": "Sun, 23 Sep 2012 07:52:01 GMT" } ]
2015-03-13T00:00:00
[ [ "Dilawari", "Jaswinder Singh", "" ], [ "Khanna", "Ravinder", "" ] ]
new_dataset
0.961975
1209.6037
Jaswinder Dilawari Singh
Jaswinder Singh Dilawari, Ravinder Khanna
Reproduction of Images by Gamut Mapping and Creation of New Test Charts in Prepress Process
5 Pages,10 Figures; International Journal of Scientific and Engineering Research,Volume 3, Issue 10, October 2012 Edition
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of digital images the problem of keeping picture visualization uniformity arises because each printing or scanning device has its own color chart. So, universal color profiles are made by ICC to bring uniformity in various types of devices. Keeping that color profile in mind various new color charts are created and calibrated with the help of standard IT8 test charts available in the market. The main objective to color reproduction is to produce the identical picture at device output. For that principles for gamut mapping has been designed
[ { "version": "v1", "created": "Wed, 26 Sep 2012 19:25:56 GMT" } ]
2015-03-13T00:00:00
[ [ "Dilawari", "Jaswinder Singh", "" ], [ "Khanna", "Ravinder", "" ] ]
new_dataset
0.988654
1301.4668
Kirana Kumara P
Kirana Kumara P
A MATLAB Code for Three Dimensional Linear Elastostatics using Constant Boundary Elements
12 pages (pdf), 8 supplementary files, accepted author manuscript
International Journal of Advances in Engineering Sciences(IJAES) Vol 2 No 3 (2012) pp. 9-20 [e-ISSN: 2231-0347, Print-ISSN: 2231-2013]
null
null
cs.CE physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Present work presents a code written in the very simple programming language MATLAB, for three dimensional linear elastostatics, using constant boundary elements. The code, in full or in part, is not a translation or a copy of any of the existing codes. Present paper explains how the code is written, and lists all the formulae used. Code is verified by using the code to solve a simple problem which has the well known approximate analytical solution. Of course, present work does not make any contribution to research on boundary elements, in terms of theory. But the work is justified by the fact that, to the best of author's knowledge, as of now, one cannot find an open access MATLAB code for three dimensional linear elastostatics using constant boundary elements. Author hopes this paper to be of help to beginners who wish to understand how a simple but complete boundary element code works, so that they can build upon and modify the present open access code to solve complex engineering problems quickly and easily. The code is available online for open access (as supplementary file for the present paper), and may be downloaded from the website for the present journal.
[ { "version": "v1", "created": "Sun, 20 Jan 2013 16:29:09 GMT" } ]
2015-03-13T00:00:00
[ [ "P", "Kirana Kumara", "" ] ]
new_dataset
0.999728
1312.4597
Istv\'an Kov\'acs
Istv\'an Kov\'acs
Indecomposable coverings with homothetic polygons
null
null
null
null
cs.CG math.CO math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that for any convex polygon $S$ with at least four sides, or a concave one with no parallel sides, and any $m>0$, there is an $m$-fold covering of the plane with homothetic copies of $S$ that cannot be decomposed into two coverings.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 00:22:08 GMT" }, { "version": "v2", "created": "Thu, 12 Mar 2015 14:32:43 GMT" } ]
2015-03-13T00:00:00
[ [ "Kovács", "István", "" ] ]
new_dataset
0.997109
1404.5985
Matthew Patitz
Jacob Hendricks, Matthew J. Patitz, Trent A. Rogers
Reflections on Tiles (in Self-Assembly)
New results which classify the types of shapes which can self-assemble in the RTAM have been added
null
null
null
cs.CG cs.CC cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define the Reflexive Tile Assembly Model (RTAM), which is obtained from the abstract Tile Assembly Model (aTAM) by allowing tiles to reflect across their horizontal and/or vertical axes. We show that the class of directed temperature-1 RTAM systems is not computationally universal, which is conjectured but unproven for the aTAM, and like the aTAM, the RTAM is computationally universal at temperature 2. We then show that at temperature 1, when starting from a single tile seed, the RTAM is capable of assembling n x n squares for n odd using only n tile types, but incapable of assembling n x n squares for n even. Moreover, we show that n is a lower bound on the number of tile types needed to assemble n x n squares for n odd in the temperature-1 RTAM. The conjectured lower bound for temperature-1 aTAM systems is 2n-1. Finally, we give preliminary results toward the classification of which finite connected shapes in Z^2 can be assembled (strictly or weakly) by a singly seeded (i.e. seed of size 1) RTAM system, including a complete classification of which finite connected shapes be strictly assembled by a "mismatch-free" singly seeded RTAM system.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 21:12:43 GMT" }, { "version": "v2", "created": "Fri, 25 Apr 2014 00:54:08 GMT" }, { "version": "v3", "created": "Wed, 11 Mar 2015 22:12:24 GMT" } ]
2015-03-13T00:00:00
[ [ "Hendricks", "Jacob", "" ], [ "Patitz", "Matthew J.", "" ], [ "Rogers", "Trent A.", "" ] ]
new_dataset
0.997531
1503.03593
Sapna Saxena
Sapna Saxena, Bhanu Kapoor
State of the art parallel approaches for RSA public key based cryptosystem
IJCSA February 2015
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RSA is one of the most popular Public Key Cryptography based algorithm mainly used for digital signatures, encryption/decryption etc. It is based on the mathematical scheme of factorization of very large integers which is a compute-intensive process and takes very long time as well as power to perform. Several scientists are working throughout the world to increase the speedup and to decrease the power consumption of RSA algorithm while keeping the security of the algorithm intact. One popular technique which can be used to enhance the performance of RSA is parallel programming. In this paper we are presenting the survey of various parallel implementations of RSA algorithm involving variety of hardware and software implementations.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 05:35:44 GMT" } ]
2015-03-13T00:00:00
[ [ "Saxena", "Sapna", "" ], [ "Kapoor", "Bhanu", "" ] ]
new_dataset
0.973384
1503.03614
Ankit Chaudhary
Jagdish L. Raheja, A. Singhal, A. Chaudhary
Android based Portable Hand Sign Recognition System
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These days mobile devices like phones or tablets are very common among people of all age. They are connected with network and provide seamless communications through internet or cellular services. These devices can be a big help for the people who are not able to communicate properly and even in emergency conditions. A disabled person who is not able to speak or a person who speak a different language, these devices can be a boon for them as understanding, translating and speaking systems for these people. This chapter discusses a portable android based hand sign recognition system which can be used by disabled people. This chapter shows a part of on-going project. Computer Vision based techniques were used for image analysis and PCA was used after image tokenizer for recognition. This method was tested with webcam results to make system more robust.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 07:27:27 GMT" } ]
2015-03-13T00:00:00
[ [ "Raheja", "Jagdish L.", "" ], [ "Singhal", "A.", "" ], [ "Chaudhary", "A.", "" ] ]
new_dataset
0.999573
1503.03630
Liang-Jian Deng
Liang-Jian Deng and Weihong Guo and Ting-Zhu Huang
Single image super-resolution by approximated Heaviside functions
null
null
null
null
cs.CV cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image super-resolution is a process to enhance image resolution. It is widely used in medical imaging, satellite imaging, target recognition, etc. In this paper, we conduct continuous modeling and assume that the unknown image intensity function is defined on a continuous domain and belongs to a space with a redundant basis. We propose a new iterative model for single image super-resolution based on an observation: an image is consisted of smooth components and non-smooth components, and we use two classes of approximated Heaviside functions (AHFs) to represent them respectively. Due to sparsity of the non-smooth components, a $L_{1}$ model is employed. In addition, we apply the proposed iterative model to image patches to reduce computation and storage. Comparisons with some existing competitive methods show the effectiveness of the proposed method.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 08:54:54 GMT" } ]
2015-03-13T00:00:00
[ [ "Deng", "Liang-Jian", "" ], [ "Guo", "Weihong", "" ], [ "Huang", "Ting-Zhu", "" ] ]
new_dataset
0.999685
1503.03642
Chang Yao
Chang Yao, Divyakant Agrawal, Pengfei Chang, Gang Chen, Beng Chin Ooi, Weng-Fai Wong, Meihui Zhang
DGCC:A New Dependency Graph based Concurrency Control Protocol for Multicore Database Systems
12 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicore CPUs and large memories are increasingly becoming the norm in modern computer systems. However, current database management systems (DBMSs) are generally ineffective in exploiting the parallelism of such systems. In particular, contention can lead to a dramatic fall in performance. In this paper, we propose a new concurrency control protocol called DGCC (Dependency Graph based Concurrency Control) that separates concurrency control from execution. DGCC builds dependency graphs for batched transactions before executing them. Using these graphs, contentions within the same batch of transactions are resolved before execution. As a result, the execution of the transactions does not need to deal with contention while maintaining full equivalence to that of serialized execution. This better exploits multicore hardware and achieves higher level of parallelism. To facilitate DGCC, we have also proposed a system architecture that does not have certain centralized control components yielding better scalability, as well as supports a more efficient recovery mechanism. Our extensive experimental study shows that DGCC achieves up to four times higher throughput compared to that of state-of-the-art concurrency control protocols for high contention workloads.
[ { "version": "v1", "created": "Thu, 12 Mar 2015 09:32:02 GMT" } ]
2015-03-13T00:00:00
[ [ "Yao", "Chang", "" ], [ "Agrawal", "Divyakant", "" ], [ "Chang", "Pengfei", "" ], [ "Chen", "Gang", "" ], [ "Ooi", "Beng Chin", "" ], [ "Wong", "Weng-Fai", "" ], [ "Zhang", "Meihui", "" ] ]
new_dataset
0.9993
1309.2787
Stian Soiland-Reyes
Hyde Zhang, Stian Soiland-Reyes, Carole Goble
Taverna Mobile: Taverna workflows on Android
Abstract, 3 pages, 2 figures. Submitted for Oral communication at NETTAB 2013 on 2013-09-10. Accepted 2013-09-14. Published 2013-10-14 in EMBnet.journal. http://journal.embnet.org/index.php/embnetjournal/article/view/727 Taverna Mobile: http://dev.mygrid.org.uk/wiki/display/tav/Taverna+Mobile
EMBnet.Journal 2013, 19(B), pp. 43-45
10.14806/ej.19.B.727
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
Researchers are often on the move, say at conferences or projects meetings, and as workflows are becoming ubiquitous in the scientific process, having access to scientific workflows from a mobile device would be a significant advantage. We therefore have developed Taverna Mobile, an application for Android phones which allows browsing of existing workflows, executing them, and reviewing the results. Taverna Mobile does not aim to reproduce the full experience of building workflows in the Taverna Workbench, rather it focuses on tasks we have deemed relevant to a scientist that is not at her desk. For instance, when visiting a conference she might hear about someone's workflow, which she can quickly locate and mark for later exploration. When in the biology lab, faced with updated scientific data, the scientist can rerun her own workflow with new inputs. While commuting, she can monitor the status of a long-running job.
[ { "version": "v1", "created": "Wed, 11 Sep 2013 11:19:24 GMT" }, { "version": "v2", "created": "Thu, 17 Oct 2013 15:48:31 GMT" }, { "version": "v3", "created": "Fri, 18 Oct 2013 11:07:09 GMT" }, { "version": "v4", "created": "Wed, 11 Mar 2015 11:35:27 GMT" } ]
2015-03-12T00:00:00
[ [ "Zhang", "Hyde", "" ], [ "Soiland-Reyes", "Stian", "" ], [ "Goble", "Carole", "" ] ]
new_dataset
0.990869
1503.03166
Kirat Pal Er
Kirat Pal Singh, Shivani Parmar
Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm
International Journal of Engineering Research & Technology. arXiv admin note: substantial text overlap with arXiv:1306.1916, arXiv:1503.02304
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes the design of high performance MIPS Cryptography processor based on triple data encryption standard. The organization of pipeline stages in such a way that pipeline can be clocked at high frequency. Encryption and Decryption blocks of triple data encryption standard (T-DES) crypto system and dependency among themselves are explained in detail with the help of block diagram. In order to increase the processor functionality and performance, especially for security applications we include three new 32-bit instructions LKLW, LKUW and CRYPT. The design has been synthesized at 40nm process technology targeting using Xilinx Virtex-6 device. The overall MIPS Crypto processor works at 209MHz.
[ { "version": "v1", "created": "Sun, 8 Mar 2015 18:23:32 GMT" } ]
2015-03-12T00:00:00
[ [ "Singh", "Kirat Pal", "" ], [ "Parmar", "Shivani", "" ] ]
new_dataset
0.973419
1503.03283
Ayineedi Venkateswarlu
Ayineedi Venkateswarlu, Santanu Sarkar and A. Sai Mali
On Acyclic Edge-Coloring of Complete Bipartite Graphs
17 pages, 10 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An acyclic edge-coloring of a graph is a proper edge-coloring without bichromatic ($2$-colored) cycles. The acyclic chromatic index of a graph $G$, denoted by $a'(G)$, is the least integer $k$ such that $G$ admits an acyclic edge-coloring using $k$ colors. Let $\Delta = \Delta(G)$ denote the maximum degree of a vertex in a graph $G$. A complete bipartite graph with $n$ vertices on each side is denoted by $K_{n,n}$. Basavaraju, Chandran and Kummini proved that $a'(K_{n,n}) \ge n+2 = \Delta + 2$ when $n$ is odd. Basavaraju and Chandran provided an acyclic edge-coloring of $K_{p,p}$ using $p+2$ colors and thus establishing $a'(K_{p,p}) = p+2 = \Delta + 2$ when $p$ is an odd prime. The main tool in their approach is perfect $1$-factorization of $K_{p,p}$. Recently, following their approach, Venkateswarlu and Sarkar have shown that $K_{2p-1,2p-1}$ admits an acyclic edge-coloring using $2p+1$ colors which implies that $a'(K_{2p-1,2p-1}) = 2p+1 = \Delta + 2$, where $p$ is an odd prime. In this paper, we generalize this approach and present a general framework to possibly get an acyclic edge-coloring of $K_{n,n}$ which possess a perfect $1$-factorization using $n+2 = \Delta+2$ colors. In this general framework, we show that $K_{p^2,p^2}$ admits an acyclic edge-coloring using $p^2+2$ colors and thus establishing $a'(K_{p^2,p^2}) = p^2+2 = \Delta + 2$ when $p\ge 5$ is an odd prime.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 11:41:31 GMT" } ]
2015-03-12T00:00:00
[ [ "Venkateswarlu", "Ayineedi", "" ], [ "Sarkar", "Santanu", "" ], [ "Mali", "A. Sai", "" ] ]
new_dataset
0.999418
1503.03293
Helio M. de Oliveira
R.M. Campello de Souza, E.S.V. Freire and H.M. de Oliveira
Fourier Codes
6 pages, 2 tables. In: 10th International Symposium on Communication Theory and Applications 2009, Ambleside, Lake District, UK
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new family of error-correcting codes, called Fourier codes, is introduced. The code parity-check matrix, dimension and an upper bound on its minimum distance are obtained from the eigenstructure of the Fourier number theoretic transform. A decoding technique for such codes is proposed.
[ { "version": "v1", "created": "Wed, 11 Mar 2015 12:14:10 GMT" } ]
2015-03-12T00:00:00
[ [ "de Souza", "R. M. Campello", "" ], [ "Freire", "E. S. V.", "" ], [ "de Oliveira", "H. M.", "" ] ]
new_dataset
0.999543
1206.5327
Carroline Dewi Puspa Kencana Ramli
Carroline Dewi Puspa Kencana Ramli, Hanne Riis Nielson, Flemming Nielson
XACML 3.0 in Answer Set Programming
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a systematic technique for transforming XACML 3.0 policies in Answer Set Programming (ASP). We show that the resulting logic program has a unique answer set that directly corresponds to our formalisation of the standard semantics of XACML 3.0 from Ramli et. al. We demonstrate how our results make it possible to use off-the-shelf ASP solvers to formally verify properties of access control policies represented in XACML, such as checking the completeness of a set of access control policies and verifying policy properties.
[ { "version": "v1", "created": "Fri, 22 Jun 2012 21:59:14 GMT" }, { "version": "v2", "created": "Mon, 18 Feb 2013 17:35:04 GMT" } ]
2015-03-11T00:00:00
[ [ "Ramli", "Carroline Dewi Puspa Kencana", "" ], [ "Nielson", "Hanne Riis", "" ], [ "Nielson", "Flemming", "" ] ]
new_dataset
0.989468
1503.01804
Achuta Kadambi
Achuta Kadambi, Vage Taamazyan, Suren Jayasuriya, Ramesh Raskar
Frequency Domain TOF: Encoding Object Depth in Modulation Frequency
10 pages
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time of flight cameras may emerge as the 3-D sensor of choice. Today, time of flight sensors use phase-based sampling, where the phase delay between emitted and received, high-frequency signals encodes distance. In this paper, we present a new time of flight architecture that relies only on frequency---we refer to this technique as frequency-domain time of flight (FD-TOF). Inspired by optical coherence tomography (OCT), FD-TOF excels when frequency bandwidth is high. With the increasing frequency of TOF sensors, new challenges to time of flight sensing continue to emerge. At high frequencies, FD-TOF offers several potential benefits over phase-based time of flight methods.
[ { "version": "v1", "created": "Thu, 5 Mar 2015 22:15:33 GMT" } ]
2015-03-11T00:00:00
[ [ "Kadambi", "Achuta", "" ], [ "Taamazyan", "Vage", "" ], [ "Jayasuriya", "Suren", "" ], [ "Raskar", "Ramesh", "" ] ]
new_dataset
0.990523
1503.02774
Andrea Lincoln
Adam Hesterberg, Andrea Lincoln, Jayson Lynch
Improved Connectivity Condition for Byzantine Fault Tolerance
10 pages
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a network in which some pairs of nodes can communicate freely, and some subsets of the nodes could be faulty and colluding to disrupt communication, when can messages reliably be sent from one given node to another? We give a new characterization of when the agreement problem can be solved and provide an agreement algorithm which can reach agreement when the number of Byzantine nodes along each minimal vertex cut is bounded. Our new bound holds for a strict superset of cases than the previously known bound. We show that the new bound is tight. Furthermore, we show that this algorithm does not require the processes to know the graph structure, as the previously known algorithm did. Finally, we explore some of the situations in which we can reach agreement if we assume that individual nodes or entire subgraphs are trustworthy.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 05:21:54 GMT" } ]
2015-03-11T00:00:00
[ [ "Hesterberg", "Adam", "" ], [ "Lincoln", "Andrea", "" ], [ "Lynch", "Jayson", "" ] ]
new_dataset
0.975577
1503.02825
Rossano Schifanella
Daniele Quercia, Luca Maria Aiello, Rossano Schifanella, Adam Davies
The Digital Life of Walkable Streets
10 pages, 7 figures, Proceedings of International World Wide Web Conference (WWW 2015)
null
10.1145/2736277.2741631
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Walkability has many health, environmental, and economic benefits. That is why web and mobile services have been offering ways of computing walkability scores of individual street segments. Those scores are generally computed from survey data and manual counting (of even trees). However, that is costly, owing to the high time, effort, and financial costs. To partly automate the computation of those scores, we explore the possibility of using the social media data of Flickr and Foursquare to automatically identify safe and walkable streets. We find that unsafe streets tend to be photographed during the day, while walkable streets are tagged with walkability-related keywords. These results open up practical opportunities (for, e.g., room booking services, urban route recommenders, and real-estate sites) and have theoretical implications for researchers who might resort to the use social media data to tackle previously unanswered questions in the area of walkability.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 09:20:01 GMT" } ]
2015-03-11T00:00:00
[ [ "Quercia", "Daniele", "" ], [ "Aiello", "Luca Maria", "" ], [ "Schifanella", "Rossano", "" ], [ "Davies", "Adam", "" ] ]
new_dataset
0.992967
1503.02970
Alexander Pilz
Stefan Felsner, Alexander Pilz
Ham-Sandwich Cuts for Abstract Order Types
A preliminary version of this paper appeared in the proceedings of ISAAC 2014
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The linear-time ham-sandwich cut algorithm of Lo, Matou\v{s}ek, and Steiger for bi-chromatic finite point sets in the plane works by appropriately selecting crossings of the lines in the dual line arrangement with a set of well-chosen vertical lines. We consider the setting where we are not given the coordinates of the point set, but only the orientation of each point triple (the order type) and give a deterministic linear-time algorithm for the mentioned sub-algorithm. This yields a linear-time ham-sandwich cut algorithm even in our restricted setting. We also show that our methods are applicable to abstract order types.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 16:16:13 GMT" } ]
2015-03-11T00:00:00
[ [ "Felsner", "Stefan", "" ], [ "Pilz", "Alexander", "" ] ]
new_dataset
0.974177
1503.02997
No'am Newman
No'am Newman
Spreadsheets in an ERP environment: not what the doctor ordered
In Proceedings of the 2nd Workshop on Software Engineering Methods in Spreadsheets (http://spreadsheetlab.org/sems15/)
null
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
Modern ERP systems contain flexible report generators but the tendency exists for users to export data to spreadsheets for manipulation, reporting and decision making. A purported reason for this is that some users are more familiar with personal reporting tools (spreadsheets) as opposed to enterprise reporting tools. The author's doctoral research intends to measure the extent of spreadsheet usage in ERP environments and to determine which factors facilitate this.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 17:31:47 GMT" } ]
2015-03-11T00:00:00
[ [ "Newman", "No'am", "" ] ]
new_dataset
0.994397
1503.03012
Richard Mayne Dr.
Richard Mayne, Andrew Adamatzky and Jeff Jones
On the role of the plasmodial cytoskeleton in facilitating intelligent behaviour in slime mould Physarum polycephalum
25 pages, 10 figures
Communicative & Integrative Biology 7 (1), e32097, 2014
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The plasmodium of slime mould Physarum polycephalum behaves as an amorphous reaction-diffusion computing substrate and is capable of apparently intelligent behaviour. But how does intelligence emerge in an acellular organism? Through a range of laboratory experiments, we visualise the plasmodial cytoskeleton, a ubiquitous cellular protein scaffold whose functions are manifold and essential to life, and discuss its putative role as a network for transducing, transmitting and structuring data streams within the plasmodium. Through a range of computer modelling techniques, we demonstrate how emergent behaviour, and hence computational intelligence, may occur in cytoskeletal communications networks. Specifically, we model the topology of both the actin and tubulin cytoskeletal networks and discuss how computation may occur therein. Furthermore, we present bespoke cellular automata and particle swarm models for the computational process within the cytoskeleton and observe the incidence of emergent patterns in both. Our work grants unique insight into the origins of natural intelligence; the results presented here are therefore readily transferable to the fields of natural computation, cell biology and biomedical science. We conclude by discussing how our results may alter our biological, computational and philosophical understanding of intelligence and consciousness.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 17:50:45 GMT" } ]
2015-03-11T00:00:00
[ [ "Mayne", "Richard", "" ], [ "Adamatzky", "Andrew", "" ], [ "Jones", "Jeff", "" ] ]
new_dataset
0.996609
1503.03021
Anastasios Noulas Anastasios Noulas
Vsevolod Salnikov, Renaud Lambiotte, Anastasios Noulas, Cecilia Mascolo
OpenStreetCab: Exploiting Taxi Mobility Patterns in New York City to Reduce Commuter Costs
in NetMob 2015
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rise of Uber as the global alternative taxi operator has attracted a lot of interest recently. Aside from the media headlines which discuss the new phenomenon, e.g. on how it has disrupted the traditional transportation industry, policy makers, economists, citizens and scientists have engaged in a discussion that is centred around the means to integrate the new generation of the sharing economy services in urban ecosystems. In this work, we aim to shed new light on the discussion, by taking advantage of a publicly available longitudinal dataset that describes the mobility of yellow taxis in New York City. In addition to movement, this data contains information on the fares paid by the taxi customers for each trip. As a result we are given the opportunity to provide a first head to head comparison between the iconic yellow taxi and its modern competitor, Uber, in one of the world's largest metropolitan centres. We identify situations when Uber X, the cheapest version of the Uber taxi service, tends to be more expensive than yellow taxis for the same journey. We also demonstrate how Uber's economic model effectively takes advantage of well known patterns in human movement. Finally, we take our analysis a step further by proposing a new mobile application that compares taxi prices in the city to facilitate traveller's taxi choices, hoping to ultimately to lead to a reduction of commuter costs. Our study provides a case on how big datasets that become public can improve urban services for consumers by offering the opportunity for transparency in economic sectors that lack up to date regulations.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 18:12:14 GMT" } ]
2015-03-11T00:00:00
[ [ "Salnikov", "Vsevolod", "" ], [ "Lambiotte", "Renaud", "" ], [ "Noulas", "Anastasios", "" ], [ "Mascolo", "Cecilia", "" ] ]
new_dataset
0.993371
1502.05811
Lilla T\'othm\'er\'esz
Lilla T\'othm\'er\'esz
Rotor-routing orbits in directed graphs and the Picard group
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In [5], Holroyd, Levine, M\'esz\'aros, Peres, Propp and Wilson characterize recurrent chip-and-rotor configurations for strongly connected digraphs. However, the number of steps needed to recur, and the number of orbits is left open for general digraphs. Recently, these questions were answered by Pham [6], using linear algebraic methods. We give new, purely combinatorial proofs for these formulas. We also relate rotor-router orbits to the chip-firing game: The number of recurrent rotor-router unicycle-orbits equals the order of the Picard group of the graph, defined in the sense of [1], and during a period, the same chip-moves happen, as during firing the period vector in the chip-firing game.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 09:54:56 GMT" }, { "version": "v2", "created": "Sun, 8 Mar 2015 19:15:43 GMT" } ]
2015-03-10T00:00:00
[ [ "Tóthmérész", "Lilla", "" ] ]
new_dataset
0.998978
1503.02354
Xinghua Yang
Xinghua Yang, Fei Qiao, Qi Wei, Huazhong Yang
A General Scheme for Noise-Tolerant Logic Design Based on Probabilistic and DCVS Approaches
4 pages, 10 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a general circuit scheme for noise-tolerant logic design based on Markov Random Field theory and differential Cascade Voltage Switch technique has been proposed, which is an extension of the work in [1-3], [4]. A block with only four transistors has been successfully inserted to the original circuit scheme from [3] and extensive simulation results show that our proposed design can operate correctly with the input signal of 1 dB signal-noise-ratio. When using the evaluation parameter from [5], the output value of our design decreases by 76.5% on average than [3] which means that superior noise-immunity could be obtained through our work.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 01:36:50 GMT" } ]
2015-03-10T00:00:00
[ [ "Yang", "Xinghua", "" ], [ "Qiao", "Fei", "" ], [ "Wei", "Qi", "" ], [ "Yang", "Huazhong", "" ] ]
new_dataset
0.996762
1503.02386
Johan P. Hansen
Johan P. Hansen
Riemann-Roch Spaces and Linear Network Codes
8 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct linear network codes utilizing algebraic curves over finite fields and certain associated Riemann-Roch spaces and present methods to obtain their parameters. In particular we treat the Hermitian curve and the curves associated with the Suzuki and Ree groups all having the maximal number of points for curves of their respective genera. Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possibly altered vector space. Ralf Koetter and Frank R. Kschischang %\cite{DBLP:journals/tit/KoetterK08} introduced a metric on the set of vector spaces and showed that a minimal distance decoder for this metric achieves correct decoding if the dimension of the intersection of the transmitted and received vector space is sufficiently large. The vector spaces in our construction have minimal distance bounded from below in the above metric making them suitable for linear network coding.
[ { "version": "v1", "created": "Mon, 9 Mar 2015 08:03:57 GMT" } ]
2015-03-10T00:00:00
[ [ "Hansen", "Johan P.", "" ] ]
new_dataset
0.99814
1311.4947
Jie Li
Jie Li, Xiaohu Tang and Udaya Parampalli
A Framework of Constructions of Minimal Storage Regenerating Codes with the Optimal Access/Update Property
Accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2015.2408600
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a generic framework for constructing systematic minimum storage regenerating codes with two parity nodes based on the invariant subspace technique. Codes constructed in our framework not only contain some best known codes as special cases, but also include some new codes with key properties such as the optimal access property and the optimal update property. In particular, for a given storage capacity of an individual node, one of the new codes has the largest number of systematic nodes and two of the new codes have the largest number of systematic nodes with the optimal update property.
[ { "version": "v1", "created": "Wed, 20 Nov 2013 03:48:13 GMT" }, { "version": "v2", "created": "Sun, 17 Aug 2014 08:28:26 GMT" }, { "version": "v3", "created": "Fri, 6 Mar 2015 02:06:50 GMT" } ]
2015-03-09T00:00:00
[ [ "Li", "Jie", "" ], [ "Tang", "Xiaohu", "" ], [ "Parampalli", "Udaya", "" ] ]
new_dataset
0.961945
1503.01918
Matej Kristan
Matej Kristan, Vildana Sulic, Stanislav Kovacic, Janez Pers
Fast image-based obstacle detection from unmanned surface vehicles
This is an extended version of the ACCV2014 paper [Kristan et al., 2014] submitted to a journal. [Kristan et al., 2014] M. Kristan, J. Pers, V. Sulic, S. Kovacic, A graphical model for rapid obstacle image-map estimation from unmanned surface vehicles, in Proc. Asian Conf. Computer Vision, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Obstacle detection plays an important role in unmanned surface vehicles (USV). The USVs operate in highly diverse environments in which an obstacle may be a floating piece of wood, a scuba diver, a pier, or a part of a shoreline, which presents a significant challenge to continuous detection from images taken onboard. This paper addresses the problem of online detection by constrained unsupervised segmentation. To this end, a new graphical model is proposed that affords a fast and continuous obstacle image-map estimation from a single video stream captured onboard a USV. The model accounts for the semantic structure of marine environment as observed from USV by imposing weak structural constraints. A Markov random field framework is adopted and a highly efficient algorithm for simultaneous optimization of model parameters and segmentation mask estimation is derived. Our approach does not require computationally intensive extraction of texture features and comfortably runs in real-time. The algorithm is tested on a new, challenging, dataset for segmentation and obstacle detection in marine environments, which is the largest annotated dataset of its kind. Results on this dataset show that our model outperforms the related approaches, while requiring a fraction of computational effort.
[ { "version": "v1", "created": "Fri, 6 Mar 2015 11:21:07 GMT" } ]
2015-03-09T00:00:00
[ [ "Kristan", "Matej", "" ], [ "Sulic", "Vildana", "" ], [ "Kovacic", "Stanislav", "" ], [ "Pers", "Janez", "" ] ]
new_dataset
0.998763