id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0903.0566
Gilles Z\'emor
Jean-Pierre Tillich and Gilles Zemor
Quantum LDPC codes with positive rate and minimum distance proportional to n^{1/2}
21 pages
IEEE Trans. Inform. Theory. Vol. 60, No 2, pp. 1193--1202. 2014
10.1109/TIT.2013.2292061
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current best asymptotic lower bound on the minimum distance of quantum LDPC codes with fixed non-zero rate is logarithmic in the blocklength. We propose a construction of quantum LDPC codes with fixed non-zero rate and prove that the minimum distance grows proportionally to the square root of the blocklength.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 16:41:00 GMT" }, { "version": "v2", "created": "Fri, 11 Jan 2013 09:25:05 GMT" } ]
2015-03-05T00:00:00
[ [ "Tillich", "Jean-Pierre", "" ], [ "Zemor", "Gilles", "" ] ]
new_dataset
0.999718
1406.5181
Jake Williams
Jake Ryland Williams, Paul R. Lessard, Suma Desu, Eric Clark, James P. Bagrow, Christopher M. Danforth, and Peter Sheridan Dodds
Zipf's law holds for phrases, not words
Manuscript: 6 pages, 3 figures; Supplementary Information: 8 pages, 18 tables
null
null
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With Zipf's law being originally and most famously observed for word frequency, it is surprisingly limited in its applicability to human language, holding over no more than three to four orders of magnitude before hitting a clear break in scaling. Here, building on the simple observation that phrases of one or more words comprise the most coherent units of meaning in language, we show empirically that Zipf's law for phrases extends over as many as nine orders of rank magnitude. In doing so, we develop a principled and scalable statistical mechanical method of random text partitioning, which opens up a rich frontier of rigorous text analysis via a rank ordering of mixed length phrases.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 20:00:05 GMT" }, { "version": "v2", "created": "Wed, 4 Mar 2015 14:20:45 GMT" } ]
2015-03-05T00:00:00
[ [ "Williams", "Jake Ryland", "" ], [ "Lessard", "Paul R.", "" ], [ "Desu", "Suma", "" ], [ "Clark", "Eric", "" ], [ "Bagrow", "James P.", "" ], [ "Danforth", "Christopher M.", "" ], [ "Dodds", "Peter Sheridan", "" ] ]
new_dataset
0.996941
1503.01267
Andrea Lanna
Andrea Lanna and Francesco Liberati and Letterio Zuccaro and Alessandro Di Giorgio
Electric Vehicles Charging Control based on Future Internet Generic Enablers
To appear in IEEE International Electric Vehicle Conference (IEEE IEVC 2014)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a rationale for the deployment of Future Internet based applications in the field of Electric Vehicles (EVs) smart charging is presented. The focus is on the Connected Device Interface (CDI) Generic Enabler (GE) and the Network Information and Controller (NetIC) GE, which are recognized to have a potential impact on the charging control problem and the configuration of communications networks within reconfigurable clusters of charging points. The CDI GE can be used for capturing the driver feedback in terms of Quality of Experience (QoE) in those situations where the charging power is abruptly limited as a consequence of short term grid needs, like the shedding action asked by the Transmission System Operator to the Distribution System Operator aimed at clearing networks contingencies due to the loss of a transmission line or large wind power fluctuations. The NetIC GE can be used when a master Electric Vehicle Supply Equipment (EVSE) hosts the Load Area Controller, responsible for managing simultaneous charging sessions within a given Load Area (LA); the reconfiguration of distribution grid topology results in shift of EVSEs among LAs, then reallocation of slave EVSEs is needed. Involved actors, equipment, communications and processes are identified through the standardized framework provided by the Smart Grid Architecture Model (SGAM).
[ { "version": "v1", "created": "Wed, 4 Mar 2015 10:13:48 GMT" } ]
2015-03-05T00:00:00
[ [ "Lanna", "Andrea", "" ], [ "Liberati", "Francesco", "" ], [ "Zuccaro", "Letterio", "" ], [ "Di Giorgio", "Alessandro", "" ] ]
new_dataset
0.998066
1503.01376
Sergio Consoli
Sergio Consoli, Nenad Mladenov\`ic, Jos\`e A. Moreno-P\`erez
BVNS para el problema del bosque generador k-etiquetado
8 pages, in Spanish. X Congreso Espanol sobre Metaheur\`isticas, Algoritmos Evolutivos y Bioinspirados, MAEB 2015, M\`erida - Almendralejo 4-6 Feb 2015; Proceedings of the X Congreso Espanol sobre Metaheur\`isticas, Algoritmos Evolutivos y Bioinspirados, MAEB 2015, Francisco Chavez de la O et al. (Eds.), ISBN: 978-84-697-2150-6, pages: 629-636, 2015
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose an efficient solution for the problem of generating k-labeling forest VNS. This problem is an extension of the Minimum Spanning Tree Problem Labelling problem with important applications in telecommunications networks and multimodal transport. It is, given an undirected graph whose links are labeled, and an integer positive number k, find the spanning forest with the lowest number of connected components using at most k different labels. To address the problem a Basic Variable Neighbourhood Search is proposed where the maximum amplitude of the neighbourhood space, n, is a key parameter. Different strategies are studied to establish the value of n. BVNS with the best selected strategy is experimentally compared with other metaheuristics that have appeared in the literature applied to this type of problem.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 16:40:49 GMT" } ]
2015-03-05T00:00:00
[ [ "Consoli", "Sergio", "" ], [ "Mladenovìc", "Nenad", "" ], [ "Moreno-Pèrez", "Josè A.", "" ] ]
new_dataset
0.965486
1503.00992
Jean-Marie Mirebeau
Jean-Marie Mirebeau (CEREMADE), J\'er\^ome Fehrenbach (IMT), Laurent Risser (IMT), Shaza Tobji (IMT)
Anisotropic Diffusion in ITK
null
null
null
null
cs.CV math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anisotropic Non-Linear Diffusion is a powerful image processing technique, which allows to simultaneously remove the noise and enhance sharp features in two or three dimensional images. Anisotropic Diffusion is understood here in the sense of Weickert, meaning that diffusion tensors are anisotropic and reflect the local orientation of image features. This is in contrast with the non-linear diffusion filter of Perona and Malik, which only involves scalar diffusion coefficients, in other words isotropic diffusion tensors. In this paper, we present an anisotropic non-linear diffusion technique we implemented in ITK. This technique is based on a recent adaptive scheme making the diffusion stable and requiring limited numerical resources. (See supplementary data.)
[ { "version": "v1", "created": "Tue, 3 Mar 2015 16:17:16 GMT" } ]
2015-03-04T00:00:00
[ [ "Mirebeau", "Jean-Marie", "", "CEREMADE" ], [ "Fehrenbach", "Jérôme", "", "IMT" ], [ "Risser", "Laurent", "", "IMT" ], [ "Tobji", "Shaza", "", "IMT" ] ]
new_dataset
0.950569
1503.01058
Aleksandr Cariow
Aleksandr Cariow, Galina Cariowa, Bartosz Kubsik
An algorithm for multiplication of split-octonions
14 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1502.06250
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce efficient algorithm for the multiplication of split-octonions. The direct multiplication of two split-octonions requires 64 real multiplications and 56 real additions. More effective solutions still do not exist. We show how to compute a product of the split-octonions with 28 real multiplications and 92 real additions. During synthesis of the discussed algorithm we use the fact that product of two split-octonions may be represented as vector-matrix product. The matrix that participates in the product calculating has unique structural properties that allow performing its advantageous decomposition. Namely this decomposition leads to significant reducing of the multiplicative complexity of split-octonions multiplication.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 19:09:30 GMT" } ]
2015-03-04T00:00:00
[ [ "Cariow", "Aleksandr", "" ], [ "Cariowa", "Galina", "" ], [ "Kubsik", "Bartosz", "" ] ]
new_dataset
0.969999
1503.01063
Niv Voskoboynik
Niv Voskoboynik, Haim H. Permuter and Asaf Cohen
On the Capacity of Wireless Networks with Random Transmission Delay
15 pages, 19 figures, submitted to the IEEE/ACM Transactions on Networking
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce novel coding schemes for wireless networks with random transmission delays. These coding schemes obviate the need for synchronicity, reduce the number of transmissions and achieve the optimal rate region in the corresponding wired model for both multiple unicast and multicast cases with up to three users under the equal rate constraint. The coding schemes are presented in two phases; first, coding schemes for line, star and line-star topologies with random transmission delays are provided. Second, any general topology with multiple bidirectional unicast and multicast sessions is shown to be decomposable into these canonical topologies to reduce the number of transmissions without rate redundancy. As a result, the coding schemes developed for the line, star and line-star topologies serve as building blocks for the construction of more general coding schemes for all networks. The proposed schemes are proved to be Real Time (RT) for wireless networks in the sense that they achieve the minimal decoding delay. With a negligible size header, these coding schemes are shown to be applicable to unsynchronized networks, i.e., networks with random transmission delays. Finally, we demonstrate the applicability of these schemes by extensive simulations. The implementation of such coding schemes on a wireless network with random transmission delay can improve performance and power efficiency.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 19:16:09 GMT" } ]
2015-03-04T00:00:00
[ [ "Voskoboynik", "Niv", "" ], [ "Permuter", "Haim H.", "" ], [ "Cohen", "Asaf", "" ] ]
new_dataset
0.976924
1503.01070
Atousa Torabi
Atousa Torabi, Christopher Pal, Hugo Larochelle, Aaron Courville
Using Descriptive Video Services to Create a Large Data Source for Video Annotation Research
7 pages
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we introduce a dataset of video annotated with high quality natural language phrases describing the visual content in a given segment of time. Our dataset is based on the Descriptive Video Service (DVS) that is now encoded on many digital media products such as DVDs. DVS is an audio narration describing the visual elements and actions in a movie for the visually impaired. It is temporally aligned with the movie and mixed with the original movie soundtrack. We describe an automatic DVS segmentation and alignment method for movies, that enables us to scale up the collection of a DVS-derived dataset with minimal human intervention. Using this method, we have collected the largest DVS-derived dataset for video description of which we are aware. Our dataset currently includes over 84.6 hours of paired video/sentences from 92 DVDs and is growing.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 19:22:01 GMT" } ]
2015-03-04T00:00:00
[ [ "Torabi", "Atousa", "" ], [ "Pal", "Christopher", "" ], [ "Larochelle", "Hugo", "" ], [ "Courville", "Aaron", "" ] ]
new_dataset
0.999597
1503.01073
Vinzenz Maurer
Vinzenz Maurer
T3PS: Tool for Parallel Processing in Parameter Scans
50 pages, 7 figures, available for download at http://t3ps.hepforge.org/
null
null
null
cs.MS cs.CE hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
T3PS is a program that can be used to quickly design and perform parameter scans while easily taking advantage of the multi-core architecture of current processors. It takes an easy to read and write parameter scan definition file format as input. Based on the parameter ranges and other options contained therein, it distributes the calculation of the parameter space over multiple processes and possibly computers. The derived data is saved in a plain text file format readable by most plotting software. The supported scanning strategies include: grid scan, random scan, Markov Chain Monte Carlo, numerical optimization. Several example parameter scans are shown and compared with results in the literature.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 08:48:24 GMT" } ]
2015-03-04T00:00:00
[ [ "Maurer", "Vinzenz", "" ] ]
new_dataset
0.985825
1201.1377
Chinmoy Dutta
Chinmoy Dutta and Jaikumar Radhakrishnan
On Zarankiewicz Problem and Depth-Two Superconcentrators
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show tight necessary and sufficient conditions on the sizes of small bipartite graphs whose union is a larger bipartite graph that has no large bipartite independent set. Our main result is a common generalization of two classical results in graph theory: the theorem of K\H{o}v\'{a}ri, S\'{o}s and Tur\'{a}n on the minimum number of edges in a bipartite graph that has no large independent set, and the theorem of Hansel (also Katona and Szemer\'{e}di, Krichevskii) on the sum of the sizes of bipartite graphs that can be used to construct a graph (non-necessarily bipartite) that has no large independent set. As an application of our results, we show how they unify the underlying combinatorial principles developed in the proof of tight lower bounds for depth-two superconcentrators.
[ { "version": "v1", "created": "Fri, 6 Jan 2012 09:15:07 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2015 23:03:32 GMT" } ]
2015-03-03T00:00:00
[ [ "Dutta", "Chinmoy", "" ], [ "Radhakrishnan", "Jaikumar", "" ] ]
new_dataset
0.989109
1301.1215
Sebastian Schaetz
Sebastian Schaetz and Martin Uecker
A Multi-GPU Programming Library for Real-Time Applications
15 pages, 10 figures
Algorithms and Architectures for Parallel Processing 7439 (2012) 114-128
10.1007/978-3-642-33078-0_9
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MGPU, a C++ programming library targeted at single-node multi-GPU systems. Such systems combine disproportionate floating point performance with high data locality and are thus well suited to implement real-time algorithms. We describe the library design, programming interface and implementation details in light of this specific problem domain. The core concepts of this work are a novel kind of container abstraction and MPI-like communication methods for intra-system communication. We further demonstrate how MGPU is used as a framework for porting existing GPU libraries to multi-device architectures. Putting our library to the test, we accelerate an iterative non-linear image reconstruction algorithm for real-time magnetic resonance imaging using multiple GPUs. We achieve a speed-up of about 1.7 using 2 GPUs and reach a final speed-up of 2.1 with 4 GPUs. These promising results lead us to conclude that multi-GPU systems are a viable solution for real-time MRI reconstruction as well as signal-processing applications in general.
[ { "version": "v1", "created": "Mon, 7 Jan 2013 14:50:24 GMT" } ]
2015-03-03T00:00:00
[ [ "Schaetz", "Sebastian", "" ], [ "Uecker", "Martin", "" ] ]
new_dataset
0.995322
1407.0614
Ivo Vigan
George Rabanca and Ivo Vigan
Covering the Boundary of a Simple Polygon with Geodesic Unit Disks
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of covering the boundary of a simple polygon on n vertices using the minimum number of geodesic unit disks. We present an O(n \log^2 n+k) time 2-approximation algorithm for finding the centers of the disks, with k denoting the number centers found by the algorithm.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 15:32:58 GMT" }, { "version": "v2", "created": "Thu, 3 Jul 2014 03:58:33 GMT" }, { "version": "v3", "created": "Sun, 9 Nov 2014 23:05:20 GMT" }, { "version": "v4", "created": "Sun, 1 Mar 2015 18:17:55 GMT" } ]
2015-03-03T00:00:00
[ [ "Rabanca", "George", "" ], [ "Vigan", "Ivo", "" ] ]
new_dataset
0.99186
1502.07373
Yossef Oren
Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extremely relevant and practical to today's web, especially since most desktop browsers currently accessing the Internet are vulnerable to this attack. Our attack, which is an extension of the last-level cache attacks of Yarom et al., allows a remote adversary recover information belonging to other processes, other users and even other virtual machines running on the same physical host as the victim web browser. We describe the fundamentals behind our attack, evaluate its performance using a high bandwidth covert channel and finally use it to construct a system-wide mouse/network activity logger. Defending against this attack is possible, but the required countermeasures can exact an impractical cost on other benign uses of the web browser and of the computer.
[ { "version": "v1", "created": "Wed, 25 Feb 2015 21:25:49 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2015 22:58:28 GMT" } ]
2015-03-03T00:00:00
[ [ "Oren", "Yossef", "" ], [ "Kemerlis", "Vasileios P.", "" ], [ "Sethumadhavan", "Simha", "" ], [ "Keromytis", "Angelos D.", "" ] ]
new_dataset
0.999444
1503.00035
Steffen Kopecki
Lila Kari, Stavros Konstantinidis, and Steffen Kopecki
Transducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems
null
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work concerns formal descriptions of DNA code properties, and builds on previous work on transducer descriptions of classic code properties and on trajectory descriptions of DNA code properties. This line of research allows us to give a property as input to an algorithm, in addition to any regular language, which can then answer questions about the language and the property. Here we define DNA code properties via transducers and show that this method is strictly more expressive than that of trajectories, without sacrificing the efficiency of deciding the satisfaction question. We also show that the maximality question can be undecidable. Our undecidability results hold not only for the fixed DNA involution but also for any fixed antimorphic permutation. Moreover, we also show the undecidability of the antimorphic version of the Post Corresponding Problem, for any fixed antimorphic permutation.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 23:45:25 GMT" } ]
2015-03-03T00:00:00
[ [ "Kari", "Lila", "" ], [ "Konstantinidis", "Stavros", "" ], [ "Kopecki", "Steffen", "" ] ]
new_dataset
0.953769
1503.00071
Kamalakar Karlapalem
Garima Ahuja and Kamalakar Karlapalem
Crowd Congestion and Stampede Management through Multi Robotic Agents
Extended version of paper "Managing Multi Robotic Agents to Avoid Congestion and Stampedes", Garima Ahuja and Kamalakar Karlapalem, to appear in AAMAS 2015 as a short paper
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowd management is a complex, challenging and crucial task. Lack of appropriate management of crowd has, in past, led to many unfortunate stampedes with significant loss of life. To increase the crowd management efficiency, we deploy automated real time detection of stampede prone areas. Then, we use robotic agents to aid the crowd management police in controlling the crowd in these stampede prone areas. While doing so, we aim for minimum interference by robotic agents in our environment. Thereby not disturbing the ambiance and aesthetics of the place. We evaluate the effectiveness of our model in dealing with difficult scenarios like emergency evacuation and presence of localized congestion. Lastly, we simulate a multi agent system based on our model and use it to illustrate the utility of robotic agents for detecting and reducing congestion.
[ { "version": "v1", "created": "Sat, 28 Feb 2015 06:06:33 GMT" } ]
2015-03-03T00:00:00
[ [ "Ahuja", "Garima", "" ], [ "Karlapalem", "Kamalakar", "" ] ]
new_dataset
0.999538
1503.00288
Yang Song
Yang Song and Robert van Boeschoten
Success factors for Crowdfunding founders and funders
Proceedings of the 5th International Conference on Collaborative Innovation Networks COINs15, Tokyo, Japan March 12-14, 2015 (arXiv:1502.01142)
null
null
coins15/2015/26
cs.CY cs.HC cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowdfunding has been used as one of the effective ways for entrepreneurs to raise funding especially in creative industries. Individuals as well as organizations are paying more attentions to the emergence of new crowdfunding platforms. In the Netherlands, the government is also trying to help artists access financial resources through crowdfunding platforms. This research aims at discovering the success factors for crowdfunding projects through crowdfunding platforms from both founders and funders perspective. We designed our own website for founders and funders to observe crowdfunding behaviors. Our research will contribute to crowdfunding success factors related to issues of trust and decision making and provide practical recommendations for practitioners and researchers.
[ { "version": "v1", "created": "Sun, 1 Mar 2015 14:44:28 GMT" } ]
2015-03-03T00:00:00
[ [ "Song", "Yang", "" ], [ "van Boeschoten", "Robert", "" ] ]
new_dataset
0.983996
1503.00366
Abir Awad
Abir Awad
A New Chaos-Based Cryptosystem for Secure Transmitted Images
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four other versions. In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions. Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM maps. The perturbing orbit technique improves the statistical properties of encrypted images. The obtained error propagation in various standard cipher block modes demonstrates that the proposed cryptosystem is suitable to transmit cipher data over a corrupted digital channel. Finally, to quantify the security level of the proposed cryptosystem, many tests are performed and experimental results show that the suggested cryptosystem has a high security level.
[ { "version": "v1", "created": "Sun, 1 Mar 2015 22:16:40 GMT" } ]
2015-03-03T00:00:00
[ [ "Awad", "Abir", "" ] ]
new_dataset
0.999076
1503.00505
Chetan Singh Thakur
Chetan Singh Thakur, Tara Julia Hamilton, Runchun Wang, Jonathan Tapson and Andr\'e van Schaik
A neuromorphic hardware framework based on population coding
In submission to IJCNN2015
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
In the biological nervous system, large neuronal populations work collaboratively to encode sensory stimuli. These neuronal populations are characterised by a diverse distribution of tuning curves, ensuring that the entire range of input stimuli is encoded. Based on these principles, we have designed a neuromorphic system called a Trainable Analogue Block (TAB), which encodes given input stimuli using a large population of neurons with a heterogeneous tuning curve profile. Heterogeneity of tuning curves is achieved using random device mismatches in VLSI (Very Large Scale Integration) process and by adding a systematic offset to each hidden neuron. Here, we present measurement results of a single test cell fabricated in a 65nm technology to verify the TAB framework. We have mimicked a large population of neurons by re-using measurement results from the test cell by varying offset. We thus demonstrate the learning capability of the system for various regression tasks. The TAB system may pave the way to improve the design of analogue circuits for commercial applications, by rendering circuits insensitive to random mismatch that arises due to the manufacturing process.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 12:55:54 GMT" } ]
2015-03-03T00:00:00
[ [ "Thakur", "Chetan Singh", "" ], [ "Hamilton", "Tara Julia", "" ], [ "Wang", "Runchun", "" ], [ "Tapson", "Jonathan", "" ], [ "van Schaik", "André", "" ] ]
new_dataset
0.953449
1503.00524
Trista Lin
Trista Lin (CITI Insa Lyon / Inria Grenoble Rh\^one-Alpes), Herv\'e Rivano (CITI Insa Lyon / Inria Grenoble Rh\^one-Alpes), Fr\'ed\'eric Le Mou\"el (CITI,CSE)
Router deployment of Streetside Parking Sensor Networks in Urban Areas
UM - Urban Modelling Symposium, Oct 2014, Lyon, France. \<http://urbanmodelling.sciencesconf.org/\&gt
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The deployment of urban infrastructure is very important for urban sensor applications. In this paper, we studied and introduced the deployment strategy of wireless on-street parking sensor networks. We defined a multiple-objective problem with four objectives, and solved them with real street parking map. The results show two sets of Pareto Front with the minimum energy consumption, sensing information delay and the amount of deployed routers and gateways. The result can be considered to provide urban service roadside unit or be taken into account while designing a deployment algorithm.
[ { "version": "v1", "created": "Mon, 2 Mar 2015 13:53:09 GMT" } ]
2015-03-03T00:00:00
[ [ "Lin", "Trista", "", "CITI Insa Lyon / Inria Grenoble Rhône-Alpes" ], [ "Rivano", "Hervé", "", "CITI Insa Lyon / Inria Grenoble Rhône-Alpes" ], [ "Mouël", "Frédéric Le", "", "CITI,CSE" ] ]
new_dataset
0.999406
1305.5468
Stewart Ethier
S. N. Ethier and Carlos Gamez
A game-theoretic analysis of baccara chemin de fer
28 pages
Games, 4 (2013) 711-737
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Assuming that cards are dealt with replacement from a single deck and that each of Player and Banker sees the total of his own two-card hand but not its composition, baccara is a 2 x 2^88 matrix game, which was solved by Kemeny and Snell in 1957. Assuming that cards are dealt without replacement from a d-deck shoe and that Banker sees the composition of his own two-card hand while Player sees only his own total, baccara is a 2 x 2^484 matrix game, which was solved by Downton and Lockwood in 1975 for d=1,2,...,8. Assuming that cards are dealt without replacement from a d-deck shoe and that each of Player and Banker sees the composition of his own two-card hand, baccara is a 2^5 x 2^484 matrix game, which is solved herein for every positive integer d.
[ { "version": "v1", "created": "Thu, 23 May 2013 15:47:16 GMT" } ]
2015-03-02T00:00:00
[ [ "Ethier", "S. N.", "" ], [ "Gamez", "Carlos", "" ] ]
new_dataset
0.998881
1410.2031
Eike Linn
A. Siemon, S. Menzel, R. Waser, E. Linn
A Complementary Resistive Switch-based Crossbar Array Adder
12 pages, accepted for IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), issue on Computing in Emerging Technologies
null
10.1109/JETCAS.2015.2398217
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Redox-based resistive switching devices (ReRAM) are an emerging class of non-volatile storage elements suited for nanoscale memory applications. In terms of logic operations, ReRAM devices were suggested to be used as programmable interconnects, large-scale look-up tables or for sequential logic operations. However, without additional selector devices these approaches are not suited for use in large scale nanocrossbar memory arrays, which is the preferred architecture for ReRAM devices due to the minimum area consumption. To overcome this issue for the sequential logic approach, we recently introduced a novel concept, which is suited for passive crossbar arrays using complementary resistive switches (CRSs). CRS cells offer two high resistive storage states, and thus, parasitic sneak currents are efficiently avoided. However, until now the CRS-based logic-in-memory approach was only shown to be able to perform basic Boolean logic operations using a single CRS cell. In this paper, we introduce two multi-bit adder schemes using the CRS-based logic-in-memory approach. We proof the concepts by means of SPICE simulations using a dynamical memristive device model of a ReRAM cell. Finally, we show the advantages of our novel adder concept in terms of step count and number of devices in comparison to a recently published adder approach, which applies the conventional ReRAM-based sequential logic concept introduced by Borghetti et al.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 09:13:19 GMT" }, { "version": "v2", "created": "Fri, 27 Feb 2015 14:19:55 GMT" } ]
2015-03-02T00:00:00
[ [ "Siemon", "A.", "" ], [ "Menzel", "S.", "" ], [ "Waser", "R.", "" ], [ "Linn", "E.", "" ] ]
new_dataset
0.992738
1410.8292
el Houssein Chouaib Harik
El Houssein Chouaib Harik, Fran\c{c}ois Gu\'erin, Fr\'ed\'eric Guinand, Jean-Fran\c{c}ois Breth\'e, Herv\'e Pelvillain
A Decentralized Interactive Architecture for Aerial and Ground Mobile Robots Cooperation
Submitted to 2015 International Conference on Control, Automation and Robotics (ICCAR)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel decentralized interactive architecture for aerial and ground mobile robots cooperation. The aerial mobile robot is used to provide a global coverage during an area inspection, while the ground mobile robot is used to provide a local coverage of ground features. We include a human-in-the-loop to provide waypoints for the ground mobile robot to progress safely in the inspected area. The aerial mobile robot follows continuously the ground mobile robot in order to always keep it in its coverage view.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 09:01:57 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2014 06:00:35 GMT" }, { "version": "v3", "created": "Wed, 25 Feb 2015 21:01:34 GMT" }, { "version": "v4", "created": "Fri, 27 Feb 2015 10:35:57 GMT" } ]
2015-03-02T00:00:00
[ [ "Harik", "El Houssein Chouaib", "" ], [ "Guérin", "François", "" ], [ "Guinand", "Frédéric", "" ], [ "Brethé", "Jean-François", "" ], [ "Pelvillain", "Hervé", "" ] ]
new_dataset
0.999066
1411.2649
Philipp Richter
Philipp Richter and Mark Allman and Randy Bush and Vern Paxson
A Primer on IPv4 Scarcity
ACM CCR 45(2), 11 pages, editorial contribution
ACM Computer Communication Review 45(2), April 2015
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective registries. In this work we frame the fundamentals of the IPv4 address exhaustion phenomena and connected issues. We elaborate on how the current ecosystem of IPv4 address space has evolved since the standardization of IPv4, leading to the rather complex and opaque scenario we face today. We outline the evolution in address space management as well as address space use patterns, identifying key factors of the scarcity issues. We characterize the possible solution space to overcome these issues and open the perspective of address blocks as virtual resources, which involves issues such as differentiation between address blocks, the need for resource certification, and issues arising when transferring address space between networks.
[ { "version": "v1", "created": "Mon, 10 Nov 2014 22:18:47 GMT" }, { "version": "v2", "created": "Mon, 23 Feb 2015 20:01:56 GMT" }, { "version": "v3", "created": "Fri, 27 Feb 2015 16:47:07 GMT" } ]
2015-03-02T00:00:00
[ [ "Richter", "Philipp", "" ], [ "Allman", "Mark", "" ], [ "Bush", "Randy", "" ], [ "Paxson", "Vern", "" ] ]
new_dataset
0.98978
1502.07762
Tomasz Rutkowski
Tomasz M. Rutkowski, Hiromu Mori, Takumi Kodama, and Hiroyuki Shinoda
Airborne Ultrasonic Tactile Display Brain-computer Interface -- A Small Robotic Arm Online Control Study
2 pages, 1 figure, accepted for 10th AEARU Workshop on Computer Science and Web Technology February 25-27, 2015, University of Tsukuba, Japan
null
null
null
cs.HC cs.RO q-bio.NC
http://creativecommons.org/licenses/by-nc-sa/3.0/
We report on an extended robot control application of a contact-less and airborne ultrasonic tactile display (AUTD) stimulus-based brain-computer interface (BCI) paradigm, which received last year The Annual BCI Research Award 2014. In the award winning human communication augmentation paradigm the six palm positions are used to evoke somatosensory brain responses, in order to define a novel contactless tactile BCI. An example application of a small robot management is also presented in which the users control a small robot online.
[ { "version": "v1", "created": "Fri, 30 Jan 2015 08:21:10 GMT" } ]
2015-03-02T00:00:00
[ [ "Rutkowski", "Tomasz M.", "" ], [ "Mori", "Hiromu", "" ], [ "Kodama", "Takumi", "" ], [ "Shinoda", "Hiroyuki", "" ] ]
new_dataset
0.998365
1502.07796
Matilde Marcolli
Matilde Marcolli and Alexander Port
Graph Grammars, Insertion Lie Algebras, and Quantum Field Theory
19 pages, LaTeX, 3 jpeg figures
null
null
null
cs.FL math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph grammars extend the theory of formal languages in order to model distributed parallelism in theoretical computer science. We show here that to certain classes of context-free and context-sensitive graph grammars one can associate a Lie algebra, whose structure is reminiscent of the insertion Lie algebras of quantum field theory. We also show that the Feynman graphs of quantum field theories are graph languages generated by a theory dependent graph grammar.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 01:16:54 GMT" } ]
2015-03-02T00:00:00
[ [ "Marcolli", "Matilde", "" ], [ "Port", "Alexander", "" ] ]
new_dataset
0.977428
1502.07812
Kwangsu Lee
Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups
31 pages, 1 figure
Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb. 2015
10.1007/s10623-013-9868-6
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anonymous Hierarchical Identity-Based Encryption (HIBE) is an extension of Identity-Based Encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction was based on composite order bilinear groups. In this paper, we propose the first efficient anonymous HIBE scheme with short ciphertexts in prime order (asymmetric) bilinear groups, and prove its security in the full model with an efficient reduction. To achieve this, we use the dual system encryption methodology of Waters. We also present the benchmark results of our scheme by measuring the performance of our implementation.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 03:31:04 GMT" } ]
2015-03-02T00:00:00
[ [ "Lee", "Kwangsu", "" ], [ "Park", "Jong Hwan", "" ], [ "Lee", "Dong Hoon", "" ] ]
new_dataset
0.998518
1502.07999
Christopher Blake
Christopher Blake and Frank R. Kschischang
On the Energy Complexity of LDPC Decoder Circuits
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that in a sequence of randomly generated bipartite configurations with number of left nodes approaching infinity, the probability that a particular configuration in the sequence has a minimum bisection width proportional to the number of vertices in the configuration approaches $1$ so long as a sufficient condition on the node degree distribution is satisfied. This graph theory result implies an almost sure $\Omega\left(n^{2}\right)$ scaling rule for the energy of capacity-approaching LDPC decoder circuits that directly instantiate their Tanner Graphs and are generated according to a uniform configuration model, where $n$ is the block length of the code. For a sequence of circuits that have a full set of check nodes but do not necessarily directly instantiate a Tanner graph, this implies an $\Omega\left(n^{1.5}\right)$ scaling rule. In another theorem, it is shown that all (as opposed to almost all) capacity-approaching LDPC decoding circuits that directly implement their Tanner graphs must have energy that scales as $\Omega\left(n\left(\log n\right)^{2}\right)$. These results further imply scaling rules for the energy of LDPC decoder circuits as a function of gap to capacity.
[ { "version": "v1", "created": "Fri, 27 Feb 2015 18:37:09 GMT" } ]
2015-03-02T00:00:00
[ [ "Blake", "Christopher", "" ], [ "Kschischang", "Frank R.", "" ] ]
new_dataset
0.971715
1312.0387
Pradeesha Ashok
Pradeesha Ashok, Sathish Govindarajan
On Strong Centerpoints
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $P$ be a set of $n$ points in $\mathbb{R}^d$ and $\mathcal{F}$ be a family of geometric objects. We call a point $x \in P$ a strong centerpoint of $P$ w.r.t $\mathcal{F}$ if $x$ is contained in all $F \in \mathcal{F}$ that contains more than $cn$ points from $P$, where $c$ is a fixed constant. A strong centerpoint does not exist even when $\mathcal{F}$ is the family of halfspaces in the plane. We prove the existence of strong centerpoints with exact constants for convex polytopes defined by a fixed set of orientations. We also prove the existence of strong centerpoints for abstract set systems with bounded intersection.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 09:32:36 GMT" }, { "version": "v2", "created": "Thu, 26 Feb 2015 10:05:12 GMT" } ]
2015-02-27T00:00:00
[ [ "Ashok", "Pradeesha", "" ], [ "Govindarajan", "Sathish", "" ] ]
new_dataset
0.992886
1502.07449
Lan Shi
Lan Shi, Christopher Soell, Andreas Baenisch, Robert Weigel, J\"urgen Seiler, Thomas Ussmueller
Concept for a CMOS Image Sensor Suited for Analog Image Pre-Processing
Presented at DATE Friday Workshop on Heterogeneous Architectures and Design Methods for Embedded Image Systems (HIS 2015) (arXiv:1502.07241)
null
null
DATEHIS/2015/04
cs.ET cs.AR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A concept for a novel CMOS image sensor suited for analog image pre-processing is presented in this paper. As an example, an image restoration algorithm for reducing image noise is applied as image pre-processing in the analog domain. To supply low-latency data input for analog image preprocessing, the proposed concept for a CMOS image sensor offers a new sensor signal acquisition method in 2D. In comparison to image pre-processing in the digital domain, the proposed analog image pre-processing promises an improved image quality. Furthermore, the image noise at the stage of analog sensor signal acquisition can be used to select the most effective restoration algorithm applied to the analog circuit due to image processing prior to the A/D converter.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 06:18:04 GMT" } ]
2015-02-27T00:00:00
[ [ "Shi", "Lan", "" ], [ "Soell", "Christopher", "" ], [ "Baenisch", "Andreas", "" ], [ "Weigel", "Robert", "" ], [ "Seiler", "Jürgen", "" ], [ "Ussmueller", "Thomas", "" ] ]
new_dataset
0.960314
1502.07608
Jose Gracia
Steffen Brinkmann, Jose Gracia
CppSs -- a C++ Library for Efficient Task Parallelism
accepted for publication at INFOCOMP, work-in-progress track
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the C++ library CppSs (C++ super-scalar), which provides efficient task-parallelism without the need for special compilers or other software. Any C++ compiler that supports C++11 is sufficient. CppSs features different directionality clauses for defining data dependencies. While the variable argument lists of the taskified functions are evaluated at compile time, the resulting task dependencies are fixed by the runtime value of the arguments and are thus analysed at runtime. With CppSs, we provide task-parallelism using merely native C++.
[ { "version": "v1", "created": "Thu, 26 Feb 2015 15:56:50 GMT" } ]
2015-02-27T00:00:00
[ [ "Brinkmann", "Steffen", "" ], [ "Gracia", "Jose", "" ] ]
new_dataset
0.992294
1502.05873
Matthew Hague
Matthew Hague and Vincent Penelle
Annotated Stack Trees
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Annotated pushdown automata provide an automaton model of higher-order recursion schemes, which may in turn be used to model higher-order programs for the purposes of verification. We study Ground Annotated Stack Tree Rewrite Systems -- a tree rewrite system where each node is labelled by the configuration of an annotated pushdown automaton. This allows the modelling of fork and join constructs in higher-order programs and is a generalisation of higher-order stack trees recently introduced by Penelle. We show that, given a regular set of annotated stack trees, the set of trees that can reach this set is also regular, and constructible in n-EXPTIME for an order-n system, which is optimal. We also show that our construction can be extended to allow a global state through which unrelated nodes of the tree may communicate, provided the number of communications is subject to a fixed bound.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 13:54:39 GMT" }, { "version": "v2", "created": "Wed, 25 Feb 2015 17:48:03 GMT" } ]
2015-02-26T00:00:00
[ [ "Hague", "Matthew", "" ], [ "Penelle", "Vincent", "" ] ]
new_dataset
0.973755
1502.07026
Suhas Ranganath
Suhas Ranganath, JJ Thiagarajan, KN Ramamurthy, Shuang Hu, Mahesh Banavar, and Andreas Spanias
Undergraduate Signal Processing Laboratories for the Android Operating System
ASEE (American Society for Engineering Education) 2012
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a DSP simulation environment that will enable students to perform laboratory exercises using Android mobile devices and tablets. Due to the pervasive nature of the mobile technology, education applications designed for mobile devices have the potential to stimulate student interest in addition to offering convenient access and interaction capabilities. This paper describes a portable signal processing laboratory for the Android platform. This software is intended to be an educational tool for students and instructors in DSP, and signals and systems courses. The development of Android JDSP (A-JDSP) is carried out using the Android SDK, which is a Java-based open source development platform. The proposed application contains basic DSP functions for convolution, sampling, FFT, filtering and frequency domain analysis, with a convenient graphical user interface. A description of the architecture, functions and planned assessments are presented in this paper.
[ { "version": "v1", "created": "Wed, 25 Feb 2015 01:30:31 GMT" } ]
2015-02-26T00:00:00
[ [ "Ranganath", "Suhas", "" ], [ "Thiagarajan", "JJ", "" ], [ "Ramamurthy", "KN", "" ], [ "Hu", "Shuang", "" ], [ "Banavar", "Mahesh", "" ], [ "Spanias", "Andreas", "" ] ]
new_dataset
0.999019
1502.07288
Ananda Theertha Suresh
Mehryar Mohri, Michael Riley, Ananda Theertha Suresh
Automata and Graph Compression
15 pages
null
null
null
cs.IT cs.DS cs.FL math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a theoretical framework for the compression of automata, which are widely used in speech processing and other natural language processing tasks. The framework extends to graph compression. Similar to stationary ergodic processes, we formulate a probabilistic process of graph and automata generation that captures real world phenomena and provide a universal compression scheme LZA for this probabilistic model. Further, we show that LZA significantly outperforms other compression techniques such as gzip and the UNIX compress command for several synthetic and real data sets.
[ { "version": "v1", "created": "Wed, 25 Feb 2015 18:30:36 GMT" } ]
2015-02-26T00:00:00
[ [ "Mohri", "Mehryar", "" ], [ "Riley", "Michael", "" ], [ "Suresh", "Ananda Theertha", "" ] ]
new_dataset
0.981673
1502.07326
Vilem Vychodil
Vilem Vychodil
Rational fuzzy attribute logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a logic for reasoning with if-then formulas which involve constants for rational truth degrees from the unit interval. We introduce graded semantic and syntactic entailment of formulas. We prove the logic is complete in Pavelka style and depending on the choice of structure of truth degrees, the logic is a decidable fragment of the Rational Pavelka logic (RPL) or the Rational Product Logic (R{\Pi}L). We also present a characterization of the entailment based on least models and study related closure structures.
[ { "version": "v1", "created": "Wed, 25 Feb 2015 20:19:03 GMT" } ]
2015-02-26T00:00:00
[ [ "Vychodil", "Vilem", "" ] ]
new_dataset
0.98881
1502.06757
Lse Lse
Mart\'in Dias (INRIA Lille - Nord Europe), Alberto Bacchelli, Georgios Gousios, Damien Cassou (INRIA Lille - Nord Europe), St\'ephane Ducasse (INRIA Lille - Nord Europe)
Untangling Fine-Grained Code Changes
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After working for some time, developers commit their code changes to a version control system. When doing so, they often bundle unrelated changes (e.g., bug fix and refactoring) in a single commit, thus creating a so-called tangled commit. Sharing tangled commits is problematic because it makes review, reversion, and integration of these commits harder and historical analyses of the project less reliable. Researchers have worked at untangling existing commits, i.e., finding which part of a commit relates to which task. In this paper, we contribute to this line of work in two ways: (1) A publicly available dataset of untangled code changes, created with the help of two developers who accurately split their code changes into self contained tasks over a period of four months; (2) a novel approach, EpiceaUntangler, to help developers share untangled commits (aka. atomic commits) by using fine-grained code change information. EpiceaUntangler is based and tested on the publicly available dataset, and further evaluated by deploying it to 7 developers, who used it for 2 weeks. We recorded a median success rate of 91% and average one of 75%, in automatically creating clusters of untangled fine-grained code changes.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 10:50:13 GMT" } ]
2015-02-25T00:00:00
[ [ "Dias", "Martín", "", "INRIA Lille - Nord Europe" ], [ "Bacchelli", "Alberto", "", "INRIA Lille - Nord Europe" ], [ "Gousios", "Georgios", "", "INRIA Lille - Nord Europe" ], [ "Cassou", "Damien", "", "INRIA Lille - Nord Europe" ], [ "Ducasse", "Stéphane", "", "INRIA\n Lille - Nord Europe" ] ]
new_dataset
0.998943
1502.06810
Xavier Gelabert
Carles Anton Haro, Luis Castedo Ribas, Javier del Ser Lorente, Armin Dekorsy, Miguel Egido Cortes, Xavier Gelabert, Lorenza Giupponi, Xavier Mestre, Jose Monserrat, Carlos Mosquera, Miquel Soriano, Liesbet van der Perre, Jon Arambarri, Juan Antonio Romo
White Paper: Radio y Redes Cognitivas
AEI eMOV White Paper, published 04/11/2011, In Spanish
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditionally, two different policies to access the radio spectrum have coexisted: licensed regulation, whereby the rights to use specific spectral bands are granted in exclusivity to an individual operator; or unlicensed regulation, according to which certain spectral bands are declared open for free use by any operator or individual following specific rules. While these paradigms have allowed the wireless communications sector to blossom in the past, in recent years they have evidenced shortcomings and given signs of exhaustion. For instance, it is quite usual to encounter fully overloaded mobile communication systems coexisting with unused contiguous spectral bands. This clearly advocates for a more flexible and dynamic allocation of the spectrum resources which can only be achieved with the advent of the so-called cognitive radios and networks. This whitepaper provides an accurate description of priority research activities and open challenges related to the different functionalities of cognitive radios and networks. First, we outline the main open problems related to the theoretical characterization of cognitive radios, spectrum sensing techniques as well as the optimization of physical layer functionalities in these networks. Second, we provide a description of the main research challenges that arise from a system point of view: MAC protocol optimization, traffic modelling, RRM strategies, routing paradigms or security issues. Next, we point out other problems related to the practical hardware implementation of cognitive radios, giving especial emphasis to sensing capabilities, reconfigurability and cognitive control and management. Finally, we succinctly report on a number of current activities related to the standardization of cognitive radio systems.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 13:45:02 GMT" } ]
2015-02-25T00:00:00
[ [ "Haro", "Carles Anton", "" ], [ "Ribas", "Luis Castedo", "" ], [ "Lorente", "Javier del Ser", "" ], [ "Dekorsy", "Armin", "" ], [ "Cortes", "Miguel Egido", "" ], [ "Gelabert", "Xavier", "" ], [ "Giupponi", "Lorenza", "" ], [ "Mestre", "Xavier", "" ], [ "Monserrat", "Jose", "" ], [ "Mosquera", "Carlos", "" ], [ "Soriano", "Miquel", "" ], [ "van der Perre", "Liesbet", "" ], [ "Arambarri", "Jon", "" ], [ "Romo", "Juan Antonio", "" ] ]
new_dataset
0.993036
1405.0312
Piotr Doll\'ar
Tsung-Yi Lin, Michael Maire, Serge Belongie, Lubomir Bourdev, Ross Girshick, James Hays, Pietro Perona, Deva Ramanan, C. Lawrence Zitnick, Piotr Doll\'ar
Microsoft COCO: Common Objects in Context
1) updated annotation pipeline description and figures; 2) added new section describing datasets splits; 3) updated author list
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new dataset with the goal of advancing the state-of-the-art in object recognition by placing the question of object recognition in the context of the broader question of scene understanding. This is achieved by gathering images of complex everyday scenes containing common objects in their natural context. Objects are labeled using per-instance segmentations to aid in precise object localization. Our dataset contains photos of 91 objects types that would be easily recognizable by a 4 year old. With a total of 2.5 million labeled instances in 328k images, the creation of our dataset drew upon extensive crowd worker involvement via novel user interfaces for category detection, instance spotting and instance segmentation. We present a detailed statistical analysis of the dataset in comparison to PASCAL, ImageNet, and SUN. Finally, we provide baseline performance analysis for bounding box and segmentation detection results using a Deformable Parts Model.
[ { "version": "v1", "created": "Thu, 1 May 2014 21:43:32 GMT" }, { "version": "v2", "created": "Sat, 5 Jul 2014 18:39:56 GMT" }, { "version": "v3", "created": "Sat, 21 Feb 2015 01:48:49 GMT" } ]
2015-02-24T00:00:00
[ [ "Lin", "Tsung-Yi", "" ], [ "Maire", "Michael", "" ], [ "Belongie", "Serge", "" ], [ "Bourdev", "Lubomir", "" ], [ "Girshick", "Ross", "" ], [ "Hays", "James", "" ], [ "Perona", "Pietro", "" ], [ "Ramanan", "Deva", "" ], [ "Zitnick", "C. Lawrence", "" ], [ "Dollár", "Piotr", "" ] ]
new_dataset
0.999837
1410.5387
M\'aria Svore\v{n}ov\'a
Maria Svorenova, Jan Kretinsky, Martin Chmelik, Krishnendu Chatterjee, Ivana Cerna, Calin Belta
Temporal Logic Control for Stochastic Linear Systems using Abstraction Refinement of Probabilistic Games
Technical report accompanying HSCC'15 paper
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of computing the set of initial states of a dynamical system such that there exists a control strategy to ensure that the trajectories satisfy a temporal logic specification with probability 1 (almost-surely). We focus on discrete-time, stochastic linear dynamics and specifications given as formulas of the Generalized Reactivity(1) fragment of Linear Temporal Logic over linear predicates in the states of the system. We propose a solution based on iterative abstraction-refinement, and turn-based 2-player probabilistic games. While the theoretical guarantee of our algorithm after any finite number of iterations is only a partial solution, we show that if our algorithm terminates, then the result is the set of satisfying initial states. Moreover, for any (partial) solution our algorithm synthesizes witness control strategies to ensure almost-sure satisfaction of the temporal logic specification. We demonstrate our approach on an illustrative case study.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 18:45:55 GMT" }, { "version": "v2", "created": "Wed, 22 Oct 2014 12:01:39 GMT" }, { "version": "v3", "created": "Mon, 23 Feb 2015 11:54:41 GMT" } ]
2015-02-24T00:00:00
[ [ "Svorenova", "Maria", "" ], [ "Kretinsky", "Jan", "" ], [ "Chmelik", "Martin", "" ], [ "Chatterjee", "Krishnendu", "" ], [ "Cerna", "Ivana", "" ], [ "Belta", "Calin", "" ] ]
new_dataset
0.96584
1502.06075
Weiyao Lin
Weiyao Lin, Yuanzhe Chen, Jianxin Wu, Hanli Wang, Bin Sheng, Hongxiang Li
A new network-based algorithm for human activity recognition in video
This manuscript is the accepted version for TCSVT (IEEE Transactions on Circuits and Systems for Video Technology)
IEEE Trans. Circuits and Systems for Video Technology, vol. 24, no. 5, pp. 826-841, 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new network-transmission-based (NTB) algorithm is proposed for human activity recognition in videos. The proposed NTB algorithm models the entire scene as an error-free network. In this network, each node corresponds to a patch of the scene and each edge represents the activity correlation between the corresponding patches. Based on this network, we further model people in the scene as packages while human activities can be modeled as the process of package transmission in the network. By analyzing these specific "package transmission" processes, various activities can be effectively detected. The implementation of our NTB algorithm into abnormal activity detection and group activity recognition are described in detail in the paper. Experimental results demonstrate the effectiveness of our proposed algorithm.
[ { "version": "v1", "created": "Sat, 21 Feb 2015 07:10:02 GMT" } ]
2015-02-24T00:00:00
[ [ "Lin", "Weiyao", "" ], [ "Chen", "Yuanzhe", "" ], [ "Wu", "Jianxin", "" ], [ "Wang", "Hanli", "" ], [ "Sheng", "Bin", "" ], [ "Li", "Hongxiang", "" ] ]
new_dataset
0.955808
1502.06085
Hai Jiang
Zhou Zhang, Shuai Zhou, and Hai Jiang
Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter studies distributed opportunistic channel access in a wireless network with decode-and-forward relays. All the sources use channel contention to get transmission opportunity. If a source wins the contention, the channel state information in the first-hop channel (from the source to its relay) is estimated, and a decision is made for the winner source to either give up the transmission opportunity and let all sources start a new contention, or transmit to the relay. Once the relay gets the traffic, it may have a sequence of probings of the second-hop channel (from the relay to the destination). After each probing, if the second-hop channel is good enough, the relay transmits to the destination and completes the transmission process of the source; otherwise, the relay decides either to give up and let all sources start a new contention, or to continue to probe the second-hop channel. The optimal decision strategies for the two hops are derived in this letter. The first-hop strategy is a pure-threshold strategy, i.e., when the first-hop channel signal-to-noise ratio (SNR) is more than a threshold, the winner source should transmit to the relay, and subsequently the second-hop strategy should let the relay keep probing the second-hop channel until a good enough second-hop channel is observed. Simulation results show that our scheme is beneficial when the second-hop channels have larger average SNR.
[ { "version": "v1", "created": "Sat, 21 Feb 2015 08:15:37 GMT" } ]
2015-02-24T00:00:00
[ [ "Zhang", "Zhou", "" ], [ "Zhou", "Shuai", "" ], [ "Jiang", "Hai", "" ] ]
new_dataset
0.999406
1502.06177
Shai Shalev-Shwartz
Shai Shalev-Shwartz
SDCA without Duality
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic Dual Coordinate Ascent is a popular method for solving regularized loss minimization for the case of convex losses. In this paper we show how a variant of SDCA can be applied for non-convex losses. We prove linear convergence rate even if individual loss functions are non-convex as long as the expected loss is convex.
[ { "version": "v1", "created": "Sun, 22 Feb 2015 04:42:01 GMT" } ]
2015-02-24T00:00:00
[ [ "Shalev-Shwartz", "Shai", "" ] ]
new_dataset
0.964928
1502.06323
Mohsen Mollanoori
Mohsen Mollanoori
CSMA-SIC: Carrier Sensing with Successive Interference Cancellation
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Successive interference cancellation (SIC) is a physical layer technique that enables the decoders to decode multiple simultaneously transmitted signals. The complicated model of SIC requires careful design of the MAC protocol and accurate adjustment of transmission parameters. We propose a new MAC protocol, known as CSMA-SIC, that employs the multi-packet reception capability of SIC. The proposed protocol adjusts the transmission probabilities to achieve throughput optimality.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 05:56:17 GMT" } ]
2015-02-24T00:00:00
[ [ "Mollanoori", "Mohsen", "" ] ]
new_dataset
0.998095
1502.06344
Erik Rodner
Clemens-Alexander Brust, Sven Sickert, Marcel Simon, Erik Rodner, Joachim Denzler
Convolutional Patch Networks with Spatial Prior for Road Detection and Urban Scene Understanding
VISAPP 2015 paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classifying single image patches is important in many different applications, such as road detection or scene understanding. In this paper, we present convolutional patch networks, which are convolutional networks learned to distinguish different image patches and which can be used for pixel-wise labeling. We also show how to incorporate spatial information of the patch as an input to the network, which allows for learning spatial priors for certain categories jointly with an appearance model. In particular, we focus on road detection and urban scene understanding, two application areas where we are able to achieve state-of-the-art results on the KITTI as well as on the LabelMeFacade dataset. Furthermore, our paper offers a guideline for people working in the area and desperately wandering through all the painstaking details that render training CNs on image patches extremely difficult.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 08:47:37 GMT" } ]
2015-02-24T00:00:00
[ [ "Brust", "Clemens-Alexander", "" ], [ "Sickert", "Sven", "" ], [ "Simon", "Marcel", "" ], [ "Rodner", "Erik", "" ], [ "Denzler", "Joachim", "" ] ]
new_dataset
0.998474
1502.06378
Loet Leydesdorff
Loet Leydesdorff
Bibliometrics/Citation networks
preprint version of: George A. Barnett (Ed.), The Encyclopedia of Social Networks, Sage, 2011, pp. 72-74
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In addition to shaping social networks, for example, in terms of co-authorship relations, scientific communications induce and reproduce cognitive structures. Scientific literature is intellectually organized in terms of disciplines and specialties; these structures are reproduced and networked reflexively by making references to the authors, concepts and texts embedded in these literatures. The concept of a cognitive structure was introduced in social network analysis (SNA) in 1987 by David Krackhardt, but the focus in SNA has hitherto been on cognition as a psychological attribute of human agency. In bibliometrics, and in science and technology studies (STS) more generally, socio-cognitive structures refer to intellectual organization at the supra-individual level. This intellectual organization emerges and is reproduced by the collectives of authors who are organized not only in terms of inter-personal relations, but also more abstractly in terms of codes of communication that are field-specific. Citations can serve as indicators of this codification process.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 10:40:42 GMT" } ]
2015-02-24T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
new_dataset
0.974213
1502.06422
Kerim Goztepe
Kerim Goztepe
Recommendations on Future Operational Environments Command Control and Cyber Security
null
null
10.13140/2.1.2406.1121
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of army as command control. Some significant recommendations on command control (C2) and cyber security have been suggested for army computing environment in this paper. This study addresses priorities of "what should be done for a better army cyber future" to cyber security researchers.
[ { "version": "v1", "created": "Mon, 23 Feb 2015 13:37:29 GMT" } ]
2015-02-24T00:00:00
[ [ "Goztepe", "Kerim", "" ] ]
new_dataset
0.971211
1305.0127
Dominique Perrin
Val\'erie Berth\'e, Clelia De Felice, Francesco Dolce, Julien Leroy, Dominique Perrin, Christophe Reutenauer, Giuseppina Rindone
The finite index basis property
arXiv admin note: text overlap with arXiv:1011.5369, arXiv:1305.0120
J. Pure Appl. Algebra, 219 (2015) 2521-2537
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe in this paper a connection between bifix codes, symbolic dynamical systems and free groups. This is in the spirit of the connection established previously for the symbolic systems corresponding to Sturmian words. We introduce a class of sets of factors of an infinite word with linear factor complexity containing Sturmian sets and regular interval exchange sets, namemly the class of tree sets. We prove as a main result that for a uniformly recurrent tree set $F$, a finite bifix code $X$ on the alphabet $A$ is $F$-maximal of $F$-degree $d$ if and only if it is the basis of a subgroup of index $d$ of the free group on $A$.
[ { "version": "v1", "created": "Wed, 1 May 2013 09:09:18 GMT" }, { "version": "v2", "created": "Sun, 25 Aug 2013 10:51:09 GMT" }, { "version": "v3", "created": "Tue, 27 Aug 2013 16:08:43 GMT" }, { "version": "v4", "created": "Fri, 27 Dec 2013 09:00:30 GMT" }, { "version": "v5", "created": "Sun, 26 Jan 2014 17:21:23 GMT" }, { "version": "v6", "created": "Sat, 2 Aug 2014 15:41:48 GMT" }, { "version": "v7", "created": "Fri, 20 Feb 2015 18:23:45 GMT" } ]
2015-02-23T00:00:00
[ [ "Berthé", "Valérie", "" ], [ "De Felice", "Clelia", "" ], [ "Dolce", "Francesco", "" ], [ "Leroy", "Julien", "" ], [ "Perrin", "Dominique", "" ], [ "Reutenauer", "Christophe", "" ], [ "Rindone", "Giuseppina", "" ] ]
new_dataset
0.979514
1502.05784
Terry Ferrett
Terry Ferrett and Matthew C. Valenti
LDPC Code Design for Noncoherent Physical Layer Network Coding
Six pages, submitted to 2015 IEEE International Conference on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work considers optimizing LDPC codes in the physical-layer network coded two-way relay channel using noncoherent FSK modulation. The error-rate performance of channel decoding at the relay node during the multiple-access phase was improved through EXIT-based optimization of Tanner graph variable node degree distributions. Codes drawn from the DVB-S2 and WiMAX standards were used as a basis for design and performance comparison. The computational complexity characteristics of the standard codes were preserved in the optimized codes by maintaining the extended irregular repeat-accumulate (eIRA). The relay receiver performance was optimized considering two modulation orders M = {4, 8} using iterative decoding in which the decoder and demodulator refine channel estimates by exchanging information. The code optimization procedure yielded unique optimized codes for each case of modulation order and available channel state information. Performance of the standard and optimized codes were measured using Monte Carlo simulation in the flat Rayleigh fading channel, and error rate improvements up to 1.2 dB are demonstrated depending on system parameters.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 06:13:58 GMT" } ]
2015-02-23T00:00:00
[ [ "Ferrett", "Terry", "" ], [ "Valenti", "Matthew C.", "" ] ]
new_dataset
0.989996
1502.05838
Claudia Schon
Ulrich Furbach, Claudia Schon, Frieder Stolzenburg
Automated Reasoning for Robot Ethics
arXiv admin note: substantial text overlap with arXiv:1411.4823
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deontic logic is a very well researched branch of mathematical logic and philosophy. Various kinds of deontic logics are considered for different application domains like argumentation theory, legal reasoning, and acts in multi-agent systems. In this paper, we show how standard deontic logic can be used to model ethical codes for multi-agent systems. Furthermore we show how Hyper, a high performance theorem prover, can be used to prove properties of these ethical codes.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 11:38:58 GMT" } ]
2015-02-23T00:00:00
[ [ "Furbach", "Ulrich", "" ], [ "Schon", "Claudia", "" ], [ "Stolzenburg", "Frieder", "" ] ]
new_dataset
0.997137
1409.6277
Luigi Laura
Loukas Georgiadis, Giuseppe F. Italiano, Luigi Laura, Nikos Parotsidis
2-Vertex Connectivity in Directed Graphs
arXiv admin note: substantial text overlap with arXiv:1407.3041
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We complement our study of 2-connectivity in directed graphs, by considering the computation of the following 2-vertex-connectivity relations: We say that two vertices v and w are 2-vertex-connected if there are two internally vertex-disjoint paths from v to w and two internally vertex-disjoint paths from w to v. We also say that v and w are vertex-resilient if the removal of any vertex different from v and w leaves v and w in the same strongly connected component. We show how to compute the above relations in linear time so that we can report in constant time if two vertices are 2-vertex-connected or if they are vertex-resilient. We also show how to compute in linear time a sparse certificate for these relations, i.e., a subgraph of the input graph that has O(n) edges and maintains the same 2-vertex-connectivity and vertex-resilience relations as the input graph, where n is the number of vertices.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 18:48:27 GMT" }, { "version": "v2", "created": "Thu, 19 Feb 2015 07:51:16 GMT" } ]
2015-02-20T00:00:00
[ [ "Georgiadis", "Loukas", "" ], [ "Italiano", "Giuseppe F.", "" ], [ "Laura", "Luigi", "" ], [ "Parotsidis", "Nikos", "" ] ]
new_dataset
0.987331
1502.05450
Jean-Marc Alliot
Jean-Marc Alliot
The (Final) countdown
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Countdown game is one of the oldest TV show running in the world. It started broadcasting in 1972 on the french television and in 1982 on British channel 4, and it has been running since in both countries. The game, while extremely popular, never received any serious scientific attention, probably because it seems too simple at first sight. We present in this article an in-depth analysis of the numbers round of the countdown game. This includes a complexity analysis of the game, an analysis of existing algorithms, the presentation of a new algorithm that increases resolution speed by a factor of 20. It also includes some leads on how to turn the game into a more difficult one, both for a human player and for a computer, and even to transform it into a probably undecidable problem.
[ { "version": "v1", "created": "Thu, 19 Feb 2015 00:41:56 GMT" } ]
2015-02-20T00:00:00
[ [ "Alliot", "Jean-Marc", "" ] ]
new_dataset
0.999237
1502.05558
Pierre-\'Etienne Meunier
Florent Becker, Pierre-\'Etienne Meunier
It's a Tough Nanoworld: in Tile Assembly, Cooperation is not (strictly) more Powerful than Competition
null
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a strict separation between the class of "mismatch free" self-assembly systems and general aTAM systems. Mismatch free systems are those systems in which concurrently grown parts must always agree with each other. Tile self-assembly is a model of the formation of crystal growth, in which a large number of particles concurrently and selectively stick to each other, forming complex shapes and structures. It is useful in nanotechnologies, and more generally in the understanding of these processes, ubiquitous in natural systems. The other property of the local assembly process known to change the power of the model is cooperation between two tiles to attach another. We show that disagreement (mismatches) and cooperation are incomparable: neither can be used to simulate the other one. The fact that mismatches are a hard property is especially surprising, since no known, explicit construction of a computational device in tile assembly uses mismatches, except for the recent construction of an intrinsically universal tileset, i.e. a tileset capable of simulating any other tileset up to rescaling. This work shows how to use intrinsic universality in a systematic way to highlight the essence of different features of tile assembly. Moreover, even the most recent experimental realizations do not use competition, which, in view of our results, suggests that a large part of the natural phenomena behind DNA self-assembly remains to be understood experimentally.
[ { "version": "v1", "created": "Thu, 19 Feb 2015 13:03:48 GMT" } ]
2015-02-20T00:00:00
[ [ "Becker", "Florent", "" ], [ "Meunier", "Pierre-Étienne", "" ] ]
new_dataset
0.991758
1501.04894
Arindam Pal
Arindam Pal and Sushmita Ruj
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications
Accepted for publication in IEEE International Conference on Communications (ICC) 2015
null
null
null
cs.DL cs.DM cs.IR cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evaluating the performance of researchers and measuring the impact of papers written by scientists is the main objective of citation analysis. Various indices and metrics have been proposed for this. In this paper, we propose a new citation index CITEX, which gives normalized scores to authors and papers to determine their rankings. To the best of our knowledge, this is the first citation index which simultaneously assigns scores to both authors and papers. Using these scores, we can get an objective measure of the reputation of an author and the impact of a paper. We model this problem as an iterative computation on a publication graph, whose vertices are authors and papers, and whose edges indicate which author has written which paper. We prove that this iterative computation converges in the limit, by using a powerful theorem from linear algebra. We run this algorithm on several examples, and find that the author and paper scores match closely with what is suggested by our intuition. The algorithm is theoretically sound and runs very fast in practice. We compare this index with several existing metrics and find that CITEX gives far more accurate scores compared to the traditional metrics.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 17:44:59 GMT" } ]
2015-02-19T00:00:00
[ [ "Pal", "Arindam", "" ], [ "Ruj", "Sushmita", "" ] ]
new_dataset
0.993975
1502.05275
Stefano Bilotta
Elena Barcucci, Antonio Bernini, Stefano Bilotta, Renzo Pinzani
Cross-bifix-free sets in two dimensions
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A bidimensional bifix (in short bibifix) of a square matrix T is a square submatrix of T which occurs in the top-left and bottom-right corners of T. This allows us to extend the definition of bifix-free words and cross-bifix-free set of words to bidimensional structures. In this paper we exhaustively generate all the bibifix-free square matrices and we construct a particular non-expandable cross-bibifix-free set of square matrices. Moreover, we provide a Gray code for listing this set.
[ { "version": "v1", "created": "Wed, 18 Feb 2015 15:33:43 GMT" } ]
2015-02-19T00:00:00
[ [ "Barcucci", "Elena", "" ], [ "Bernini", "Antonio", "" ], [ "Bilotta", "Stefano", "" ], [ "Pinzani", "Renzo", "" ] ]
new_dataset
0.995506
1502.05321
Dmitry Namiot
Dmitry Namiot, Manfred Sneps-Sneppe
On Mobile Bluetooth Tags
submitted to FRUCT-17 conference (http://fruct.org)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new approach for hyper-local data sharing and delivery on the base of discoverable Bluetooth nodes. Our approach allows customers to associate user-defined data with network nodes and use a special mobile application (context-aware browser) for presenting this information to mobile users in proximity. Alternatively, mobile services can request and share local data in M2M applications rely on network proximity. Bluetooth nodes in cars are among the best candidates for the role of the bearing nodes.
[ { "version": "v1", "created": "Wed, 18 Feb 2015 17:56:06 GMT" } ]
2015-02-19T00:00:00
[ [ "Namiot", "Dmitry", "" ], [ "Sneps-Sneppe", "Manfred", "" ] ]
new_dataset
0.996907
1502.04321
Stefan Schmid
Doris Schi\"oberg, Fabian Schneider, Stefan Schmid, Steve Uhlig, Anja Feldmann
Evolution of Directed Triangle Motifs in the Google+ OSN
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motifs are a fundamental building block and distinguishing feature of networks. While characteristic motif distribution have been found in many networks, very little is known today about the evolution of network motifs. This paper studies the most important motifs in social networks, triangles, and how directed triangle motifs change over time. Our chosen subject is one of the largest Online Social Networks, Google+. Google+ has two distinguishing features that make it particularly interesting: (1) it is a directed network, which yields a rich set of triangle motifs, and (2) it is a young and fast evolving network, whose role in the OSN space is still not fully understood. For the purpose of this study, we crawled the network over a time period of six weeks, collecting several snapshots. We find that some triangle types display significant dynamics, e.g., for some specific initial types, up to 20% of the instances evolve to other types. Due to the fast growth of the OSN in the observed time period, many new triangles emerge. We also observe that many triangles evolve into less-connected motifs (with less edges), suggesting that growth also comes with pruning. We complement the topological study by also considering publicly available user profile data (mostly geographic locations). The corresponding results shed some light on the semantics of the triangle motifs. Indeed, we find that users in more symmetric triangle motifs live closer together, indicating more personal relationships. In contrast, asymmetric links in motifs often point to faraway users with a high in-degree (celebrities).
[ { "version": "v1", "created": "Sun, 15 Feb 2015 15:11:50 GMT" }, { "version": "v2", "created": "Tue, 17 Feb 2015 07:06:21 GMT" } ]
2015-02-18T00:00:00
[ [ "Schiöberg", "Doris", "" ], [ "Schneider", "Fabian", "" ], [ "Schmid", "Stefan", "" ], [ "Uhlig", "Steve", "" ], [ "Feldmann", "Anja", "" ] ]
new_dataset
0.997556
1502.04774
EPTCS
Ugo Dal Lago (Universit\`a di Bologna & INRIA), Margherita Zorzi (Universit\`a di Verona)
Wave-Style Token Machines and Quantum Lambda Calculi
In Proceedings LINEARITY 2014, arXiv:1502.04419
EPTCS 176, 2015, pp. 64-78
10.4204/EPTCS.176.6
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Particle-style token machines are a way to interpret proofs and programs, when the latter are written following the principles of linear logic. In this paper, we show that token machines also make sense when the programs at hand are those of a simple quantum lambda-calculus with implicit qubits. This, however, requires generalising the concept of a token machine to one in which more than one particle travel around the term at the same time. The presence of multiple tokens is intimately related to entanglement and allows us to give a simple operational semantics to the calculus, coherently with the principles of quantum computation.
[ { "version": "v1", "created": "Tue, 17 Feb 2015 02:27:51 GMT" } ]
2015-02-18T00:00:00
[ [ "Lago", "Ugo Dal", "", "Università di Bologna & INRIA" ], [ "Zorzi", "Margherita", "", "Università di Verona" ] ]
new_dataset
0.999427
1502.04801
Sonal Shrivastava
Sonal Shrivastava, Chetan Agrawal and Anurag Jain
An IDS scheme against Black hole Attack to Secure AOMDV Routing in MANET
14 pages,6 figures, International Journal on AdHoc Networking Systems (IJANS) Vol. 5, No. 1, January 2015. arXiv admin note: text overlap with arXiv:1203.3729 by other authors
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on security field in MANET and proposed a novel security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as compare to single path routing protocol. The attacker is affected all the possible paths that is selected by sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS) scheme is identified the attacker information through hop count mechanism. The routing information of actual data is reached to which intermediate node and the next hop information is exist at that node is confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in future attacker is not participating in routing procedure. The proposed security scheme detects and provides the deterrence against routing misbehavior through malicious attack. Here we compare the routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme and recovers 95 % of data as compare to normal routing. Keywords- -AOMDV, MANET, IDS, Black hole attack, Routing misbehavior.
[ { "version": "v1", "created": "Sat, 14 Feb 2015 14:35:36 GMT" } ]
2015-02-18T00:00:00
[ [ "Shrivastava", "Sonal", "" ], [ "Agrawal", "Chetan", "" ], [ "Jain", "Anurag", "" ] ]
new_dataset
0.954566
1502.04885
Guillaume Pitel
Guillaume Pitel and Geoffroy Fouquier
Count-Min-Log sketch: Approximately counting with approximate counters
7 pages, 3 figures. Some preliminary notes can be found on http://blog.guillaume-pitel.fr/
null
null
null
cs.IR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Count-Min Sketch is a widely adopted algorithm for approximate event counting in large scale processing. However, the original version of the Count-Min-Sketch (CMS) suffers of some deficiences, especially if one is interested by the low-frequency items, such as in text-mining related tasks. Several variants of CMS have been proposed to compensate for the high relative error for low-frequency events, but the proposed solutions tend to correct the errors instead of preventing them. In this paper, we propose the Count-Min-Log sketch, which uses logarithm-based, approximate counters instead of linear counters to improve the average relative error of CMS at constant memory footprint.
[ { "version": "v1", "created": "Tue, 17 Feb 2015 13:17:17 GMT" } ]
2015-02-18T00:00:00
[ [ "Pitel", "Guillaume", "" ], [ "Fouquier", "Geoffroy", "" ] ]
new_dataset
0.994993
1502.04898
Miko{\l}aj Boja\'nczyk
Miko{\l}aj Boja\'nczyk
Recognisable languages over monads
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The principle behind algebraic language theory for various kinds of structures, such as words or trees, is to use a compositional function from the structures into a finite set. To talk about compositionality, one needs some way of composing structures into bigger structures. It so happens that category theory has an abstract concept for this, namely a monad. The goal of this paper is to propose monads as a unifying framework for discussing existing algebras and designing new algebras.
[ { "version": "v1", "created": "Tue, 17 Feb 2015 14:07:12 GMT" } ]
2015-02-18T00:00:00
[ [ "Bojańczyk", "Mikołaj", "" ] ]
new_dataset
0.997676
1201.4050
Gema M. Diaz-Toca
J. G. Alc\'azar and G. M. D\'iaz-Toca
On the Shape of Curves that are Rational in Polar Coordinates
null
null
10.1016/j.cagd.2012.09.001
null
cs.SC cs.CG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide a computational approach to the shape of curves which are rational in polar coordinates, i.e. which are defined by means of a parametrization (r(t),\theta(t)) where both r(t),\theta(t) are rational functions. Our study includes theoretical aspects on the shape of these curves, and algorithmic results which eventually lead to an algorithm for plotting the "interesting parts" of the curve, i.e. the parts showing the main geometrical features of it. On the theoretical side, we prove that these curves, with the exceptions of lines and circles, cannot be algebraic (in cartesian coordinates), we characterize the existence of infinitely many self-intersections, and we connect this with certain phenomena which are not possible in the algebraic world, namely the existence of limit circles, limit points, or spiral branches. On the practical side, we provide an algorithm which has been implemented in the computer algebra system Maple to visualize this kind of curves. Our implementation makes use (and improves some aspects of) the command polarplot currently available in Maple for plotting curves in polar form.
[ { "version": "v1", "created": "Thu, 19 Jan 2012 13:01:17 GMT" }, { "version": "v2", "created": "Tue, 29 May 2012 10:54:28 GMT" } ]
2015-02-17T00:00:00
[ [ "Alcázar", "J. G.", "" ], [ "Díaz-Toca", "G. M.", "" ] ]
new_dataset
0.997337
1306.1264
Emiliano De Cristofaro
Erman Ayday and Emiliano De Cristofaro and Jean-Pierre Hubaux and Gene Tsudik
The Chills and Thrills of Whole Genome Sequencing
A slightly different version of this article appears in IEEE Computer Magazine, Vol. 48, No. 2, February 2015, under the title "Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare"
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, Whole Genome Sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining complete genome sequences of complex organisms, including humans. This prompts a wide range of revolutionary applications, as WGS promises to improve modern healthcare and provide a better understanding of the human genome -- in particular, its relation to diseases and response to treatments. However, this progress raises worrisome privacy and ethical issues, since, besides uniquely identifying its owner, the genome contains a treasure trove of highly personal and sensitive information. In this article, after summarizing recent advances in genomics, we discuss some important privacy issues associated with human genomic information and identify a number of particularly relevant research challenges.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 23:08:03 GMT" }, { "version": "v2", "created": "Thu, 18 Jul 2013 18:07:57 GMT" }, { "version": "v3", "created": "Thu, 5 Sep 2013 15:06:37 GMT" }, { "version": "v4", "created": "Thu, 24 Oct 2013 11:56:53 GMT" }, { "version": "v5", "created": "Mon, 16 Feb 2015 17:36:21 GMT" } ]
2015-02-17T00:00:00
[ [ "Ayday", "Erman", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Hubaux", "Jean-Pierre", "" ], [ "Tsudik", "Gene", "" ] ]
new_dataset
0.999089
1308.6778
Benjamin Niedermann
Therese Biedl, Thomas Bl\"asius, Benjamin Niedermann, Martin N\"ollenburg, Roman Prutkin, Ignaz Rutter
Using ILP/SAT to determine pathwidth, visibility representations, and other grid-based graph drawings
Full version of GD 2013 paper
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple and versatile formulation of grid-based graph representation problems as an integer linear program (ILP) and a corresponding SAT instance. In a grid-based representation vertices and edges correspond to axis-parallel boxes on an underlying integer grid; boxes can be further constrained in their shapes and interactions by additional problem-specific constraints. We describe a general d-dimensional model for grid representation problems. This model can be used to solve a variety of NP-hard graph problems, including pathwidth, bandwidth, optimum st-orientation, area-minimal (bar-k) visibility representation, boxicity-k graphs and others. We implemented SAT-models for all of the above problems and evaluated them on the Rome graphs collection. The experiments show that our model successfully solves NP-hard problems within few minutes on small to medium-size Rome graphs.
[ { "version": "v1", "created": "Fri, 30 Aug 2013 15:46:54 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2015 10:16:18 GMT" } ]
2015-02-17T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Bläsius", "Thomas", "" ], [ "Niedermann", "Benjamin", "" ], [ "Nöllenburg", "Martin", "" ], [ "Prutkin", "Roman", "" ], [ "Rutter", "Ignaz", "" ] ]
new_dataset
0.999701
1402.0121
Alexandre Maurer
Alexandre Maurer (EPFL), S\'ebastien Tixeuil (LINCS, NPA), Xavier D\'efago (JAIST)
Reliable Communication in a Dynamic Network in the Presence of Byzantine Faults
null
null
null
null
cs.DC cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following problem: two nodes want to reliably communicate in a dynamic multihop network where some nodes have been compromised, and may have a totally arbitrary and unpredictable behavior. These nodes are called Byzantine. We consider the two cases where cryptography is available and not available. We prove the necessary and sufficient condition (that is, the weakest possible condition) to ensure reliable communication in this context. Our proof is constructive, as we provide Byzantine-resilient algorithms for reliable communication that are optimal with respect to our impossibility results. In a second part, we investigate the impact of our conditions in three case studies: participants interacting in a conference, robots moving on a grid and agents in the subway. Our simulations indicate a clear benefit of using our algorithms for reliable communication in those contexts.
[ { "version": "v1", "created": "Sat, 1 Feb 2014 20:01:57 GMT" }, { "version": "v2", "created": "Wed, 12 Feb 2014 07:53:09 GMT" }, { "version": "v3", "created": "Tue, 27 May 2014 18:55:43 GMT" }, { "version": "v4", "created": "Mon, 16 Feb 2015 17:34:12 GMT" } ]
2015-02-17T00:00:00
[ [ "Maurer", "Alexandre", "", "EPFL" ], [ "Tixeuil", "Sébastien", "", "LINCS, NPA" ], [ "Défago", "Xavier", "", "JAIST" ] ]
new_dataset
0.9736
1412.6605
Reza Rawassizadeh
Stefan Foell, Gerd Kortuem, Reza Rawassizadeh, Marcus Handte, Umer Iqbal, Pedro Marron
Micro-Navigation for Urban Bus Passengers: Using the Internet of Things to Improve the Public Transport Experience
Urb-IoT 2014
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Public bus services are widely deployed in cities around the world because they provide cost-effective and economic public transportation. However, from a passenger point of view urban bus systems can be complex and difficult to navigate, especially for disadvantaged users, i.e. tourists, novice users, older people, and people with impaired cognitive or physical abilities. We present Urban Bus Navigator (UBN), a reality-aware urban navigation system for bus passengers with the ability to recognize and track the physical public transport infrastructure such as buses. Unlike traditional location-aware mobile transport applications, UBN acts as a true navigation assistant for public transport users. Insights from a six-month long trial in Madrid indicate that UBN removes barriers for public transport usage and has a positive impact on how people feel about public transport journeys.
[ { "version": "v1", "created": "Sat, 20 Dec 2014 05:10:20 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2015 04:19:28 GMT" } ]
2015-02-17T00:00:00
[ [ "Foell", "Stefan", "" ], [ "Kortuem", "Gerd", "" ], [ "Rawassizadeh", "Reza", "" ], [ "Handte", "Marcus", "" ], [ "Iqbal", "Umer", "" ], [ "Marron", "Pedro", "" ] ]
new_dataset
0.998871
1502.01885
Chunlei Liu
Haode Yan and Chunlei Liu
Linearized Reed-Solomon codes and linearized Wenger graphs
8 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A codeword is associated to a linearized polynomial. The weight distribution of the codewords is determined as the linearized polynomial varies in a family of fixed degree. There is a corresponding result on Wenger graphs from linearized polynomials.
[ { "version": "v1", "created": "Fri, 6 Feb 2015 13:56:39 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2015 07:14:28 GMT" } ]
2015-02-17T00:00:00
[ [ "Yan", "Haode", "" ], [ "Liu", "Chunlei", "" ] ]
new_dataset
0.993835
1502.02817
Matthias Walter
Michele Conforti and Volker Kaibel and Matthias Walter and Stefan Weltge
Subgraph Polytopes and Independence Polytopes of Count Matroids
8 pages, update to fix error
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected graph, the non-empty subgraph polytope is the convex hull of the characteristic vectors of pairs (F, S) where S is a non-empty subset of nodes and F is a subset of the edges with both endnodes in S. We obtain a strong relationship between the non-empty subgraph polytope and the spanning forest polytope. We further show that these polytopes provide polynomial size extended formulations for independence polytopes of count matroids, which generalizes recent results obtained by Iwata et al. referring to sparsity matroids. As a byproduct, we obtain new lower bounds on the extension complexity of the spanning forest polytope in terms of extension complexities of independence polytopes of these matroids.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 09:08:42 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2015 13:10:23 GMT" } ]
2015-02-17T00:00:00
[ [ "Conforti", "Michele", "" ], [ "Kaibel", "Volker", "" ], [ "Walter", "Matthias", "" ], [ "Weltge", "Stefan", "" ] ]
new_dataset
0.999109
1502.04210
Virgilio Sison
Bryan Hernandez and Virgilio Sison
Grassmannian Codes as Lifts of Matrix Codes Derived as Images of Linear Block Codes over Finite Fields
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $p$ be a prime such that $p \equiv 2$ or $3$ mod $5$. Linear block codes over the non-commutative matrix ring of $2 \times 2$ matrices over the prime field $GF(p)$ endowed with the Bachoc weight are derived as isometric images of linear block codes over the Galois field $GF(p^2)$ endowed with the Hamming metric. When seen as rank metric codes, this family of matrix codes satisfies the Singleton bound and thus are maximum rank distance codes, which are then lifted to form a special class of subspace codes, the Grassmannian codes, that meet the anticode bound. These so-called anticode-optimal Grassmannian codes are associated in some way with complete graphs. New examples of these maximum rank distance codes and anticode-optimal Grassmannian codes are given.
[ { "version": "v1", "created": "Sat, 14 Feb 2015 13:30:57 GMT" } ]
2015-02-17T00:00:00
[ [ "Hernandez", "Bryan", "" ], [ "Sison", "Virgilio", "" ] ]
new_dataset
0.998997
1502.04244
Nian Li
Maosheng Xiong and Nian Li
Optimal cyclic codes with generalized Niho type zeroes and the weight distribution
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we extend the works \cite{gegeng2,XLZD} further in two directions and compute the weight distribution of these cyclic codes under more relaxed conditions. It is interesting to note that many cyclic codes in the family are optimal and have only a few non-zero weights. Besides using similar ideas from \cite{gegeng2,XLZD}, we carry out some subtle manipulation of certain exponential sums.
[ { "version": "v1", "created": "Sat, 14 Feb 2015 21:15:43 GMT" } ]
2015-02-17T00:00:00
[ [ "Xiong", "Maosheng", "" ], [ "Li", "Nian", "" ] ]
new_dataset
0.960166
1502.04328
Benson Joeris
Benson Joeris, Isabel Urrutia, Jorge Urrutia
Geometric Spanning Cycles in Bichromatic Point Sets
null
null
10.1007/s00373-015-1545-2
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set of points in the plane each colored either red or blue, we find non-self-intersecting geometric spanning cycles of the red points and of the blue points such that each edge of the red spanning cycle is crossed at most three times by the blue spanning cycle and vice-versa.
[ { "version": "v1", "created": "Sun, 15 Feb 2015 16:18:40 GMT" } ]
2015-02-17T00:00:00
[ [ "Joeris", "Benson", "" ], [ "Urrutia", "Isabel", "" ], [ "Urrutia", "Jorge", "" ] ]
new_dataset
0.997874
1502.04544
Zhengjun Cao
Zhengjun Cao and Lihua Liu
A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like
6 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Key establishment is any process whereby a shared secret key becomes available to two or more parties, for subsequent cryptographic use such as symmetric-key encryption. Though it is widely known that the primitive of encryption is different from key establishment, we find some researchers have confused the two primitives. In this note, we shall clarify the fundamental difference between the two primitives, and point out that the Boneh-Gentry-Waters broadcast encryption scheme and its like are key establishment schemes, not encryption schemes.
[ { "version": "v1", "created": "Mon, 16 Feb 2015 14:19:53 GMT" } ]
2015-02-17T00:00:00
[ [ "Cao", "Zhengjun", "" ], [ "Liu", "Lihua", "" ] ]
new_dataset
0.998108
1502.03872
JongHun Jung
JongHun Jung, Hwan-Kuk Kim, Soojin Yoon
Malicious web script-based cyber attack protection technology
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent web-based cyber attacks are evolving into a new form of attacks such as private information theft and DDoS attack exploiting JavaScript within a web page. These attacks can be made just by accessing a web site without distribution of malicious codes and infection. Script-based cyber attacks are hard to detect with traditional security equipments such as Firewall and IPS because they inject malicious scripts in a response message for a normal web request. Furthermore, they are hard to trace because attacks such as DDoS can be made just by visiting a web page. Due to these reasons, it is expected that they could result in direct damages and great ripple effects. To cope with these issues, in this article, a proposal is made for techniques that are used to detect malicious scripts through real-time web content analysis and to automatically generate detection signatures for malicious JavaScript.
[ { "version": "v1", "created": "Fri, 13 Feb 2015 02:19:25 GMT" } ]
2015-02-16T00:00:00
[ [ "Jung", "JongHun", "" ], [ "Kim", "Hwan-Kuk", "" ], [ "Yoon", "Soojin", "" ] ]
new_dataset
0.999054
1502.03573
Jacques Sakarovitch
Jacques Sakarovitch (LTCI)
Automata and rational expressions
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This text is an extended version of the chapter 'Automata and rational expressions' in the AutoMathA Handbook that will appear soon, published by the European Science Foundation and edited by JeanEricPin.
[ { "version": "v1", "created": "Thu, 12 Feb 2015 09:26:05 GMT" } ]
2015-02-13T00:00:00
[ [ "Sakarovitch", "Jacques", "", "LTCI" ] ]
new_dataset
0.999369
1502.03641
Abdulsalam Yassine Dr.
Abdulsalam Yassine
A Wavelength Broker for Markets of Competing Optical Transport Networks
6 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current trend in optical networks is to open the entire wholesale market to competition. As a result, we will see, instead of a single big market player, optical transport networks competing with each other to attract customer demand. This paper presents a wavelength broker who acts on behalf of enterprises, web host companies, financial firm etc. to buy certain number of wavelengths from such market. We present the system model, the interaction protocol and provide analysis of the competition. The simulation results of a business scenario are also recorded in the paper
[ { "version": "v1", "created": "Thu, 12 Feb 2015 13:06:16 GMT" } ]
2015-02-13T00:00:00
[ [ "Yassine", "Abdulsalam", "" ] ]
new_dataset
0.997567
1502.03654
Paul de Kerret
Paul de Kerret and David Gesbert and Umer Salim
Regularized ZF in Cooperative Broadcast Channels under Distributed CSIT: A Large System Analysis
Extended version of an ISIT 2015 submission. Addition of the proofs omitted due to space constraint
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Obtaining accurate Channel State Information (CSI) at the transmitters (TX) is critical to many cooperation schemes such as Network MIMO, Interference Alignment etc. Practical CSI feedback and limited backhaul-based sharing inevitably creates degradations of CSI which are specific to each TX, giving rise to a distributed form of CSI. In the Distributed CSI (D-CSI) broadcast channel setting, the various TXs design elements of the precoder based on their individual estimates of the global multiuser channel matrix, which intuitively degrades performance when compared with the commonly used centralized CSI assumption. This paper tackles this challenging scenario and presents a first analysis of the rate performance for the distributed CSI multi-TX broadcast channel setting, in the large number of antenna regime. Using Random Matrix Theory (RMT) tools, we derive deterministic equivalents of the Signal to Interference plus Noise Ratio (SINR) for the popular regularized Zero-Forcing (ZF) precoder, allowing to unveil the price of distributedness for such cooperation methods.
[ { "version": "v1", "created": "Thu, 12 Feb 2015 13:41:57 GMT" } ]
2015-02-13T00:00:00
[ [ "de Kerret", "Paul", "" ], [ "Gesbert", "David", "" ], [ "Salim", "Umer", "" ] ]
new_dataset
0.991398
1502.03678
Ragaad AlTarawneh
Ragaad AlTarawneh, Jens Bauer, Nicole Menck, Shah Rukh Humayoun, Achim Ebert
assistME: A Platform for Assisting Engineers in Maintaining the Factory Pipeline
7 pages, 3 figures, MOBILEng/2014/02
null
null
MOBILEng/2014/02
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this position paper, we present our approach of utilizing mobile devices (i.e., mobile phones and tablets) for assisting engineers and experts in understanding and maintaining the factory pipelines. For this, we present a platform, called assistME, that is composed of three main components: the assistME Server, the assistME mobile infrastructure, and the co-assistME collaborative environment. In order to get full utilization of the assistME platform, we assume that an initial setup is made in the factory in such a way that it is equipped with different sensors to collect data about specific events in the factory pipeline together with the corresponding locations of these events. The assistME Server works as a central control unit in the platform and collects data from the installed sensors in the factory pipeline. In the case of any unexpected behavior or any critical situation in the factory pipeline, notification and other details are sent to the related group of engineers and experts through the assistME mobile app. Further, the co-assistME collaborative environment, equipped with a large shared screen and multiple mobile devices, helps the engineers and experts to collaborate with to understand and analyze the current situation in the factory pipeline in order to maintain it accurately.
[ { "version": "v1", "created": "Thu, 12 Feb 2015 14:40:01 GMT" } ]
2015-02-13T00:00:00
[ [ "AlTarawneh", "Ragaad", "" ], [ "Bauer", "Jens", "" ], [ "Menck", "Nicole", "" ], [ "Humayoun", "Shah Rukh", "" ], [ "Ebert", "Achim", "" ] ]
new_dataset
0.996354
1502.03772
Zubair Nabi Zubair Nabi
Zubair Nabi
A Story of Suo Motos, Judicial Activism, and Article 184 (3)
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The synergy between Big Data and Open Data has the potential to revolutionize information access in the developing world. Following this mantra, we present the analysis of more than a decade worth of open judgements and orders from the Supreme Court of Pakistan. Our overarching goal is to discern the presence of judicial activism in the country in the wake of the Lawyers' Movement. Using Apache Spark as the processing engine we analyze hundreds of unstructured PDF documents to sketch the evolution and various organs of judicial activism in Pakistan since 2009. Our results show that the judiciary has indeed been pursuing matters of public interest, especially those that pertain to the fundamental rights of the citizens. Furthermore, we show how the size of the presiding bench in a case and citations of Articles from the Constitution and prior judgements can aid in classifying legal judgements. Throughout the analysis we also highlight the challenges that anyone who aims to apply Big Data techniques to Open Data will face. We hope that this work will be one in a series of community efforts to use Open Data as a lens to analyze real-world events and phenomena in the developing world.
[ { "version": "v1", "created": "Thu, 12 Feb 2015 19:02:30 GMT" } ]
2015-02-13T00:00:00
[ [ "Nabi", "Zubair", "" ] ]
new_dataset
0.998812
1502.03158
Haitham Bou Ammar PhD
Rasul Tutunov, Haitham Bou Ammar, Ali Jadbabaie
A Fast Distributed Solver for Symmetric Diagonally Dominant Linear Equations
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a fast distributed solver for linear equations given by symmetric diagonally dominant M-Matrices. Our approach is based on a distributed implementation of the parallel solver of Spielman and Peng by considering a specific approximated inverse chain which can be computed efficiently in a distributed fashion. Representing the system of equations by a graph $\mathbb{G}$, the proposed distributed algorithm is capable of attaining $\epsilon$-close solutions (for arbitrary $\epsilon$) in time proportional to $n^{3}$ (number of nodes in $\mathbb{G}$), ${\alpha}$ (upper bound on the size of the R-Hop neighborhood), and $\frac{{W}_{max}}{{W}_{min}}$ (maximum and minimum weight of edges in $\mathbb{G}$).
[ { "version": "v1", "created": "Wed, 11 Feb 2015 00:32:28 GMT" } ]
2015-02-12T00:00:00
[ [ "Tutunov", "Rasul", "" ], [ "Ammar", "Haitham Bou", "" ], [ "Jadbabaie", "Ali", "" ] ]
new_dataset
0.955586
1502.03203
David Budden
Josiah Walker, Trent Houliston, Brendan Annable, Alex Biddulph, Jake Fountain, Mitchell Metcalfe, Anita Sugo, Monica Olejniczak, Stephan K. Chalup, Robert A.R. King, Alexandre Mendes and Peter Turner
The NUbots Team Description Paper 2015
RoboCup 2015 team description paper. arXiv admin note: substantial text overlap with arXiv:1403.6946
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NUbots are an interdisciplinary RoboCup team from The University of Newcastle, Australia. The team has a history of strong contributions in the areas of machine learning and computer vision. The NUbots have participated in RoboCup leagues since 2002, placing first several times in the past. In 2014 the NUbots also partnered with the University of Newcastle Mechatronics Laboratory to participate in the RobotX Marine Robotics Challenge, which resulted in several new ideas and improvements to the NUbots vision system for RoboCup. This paper summarizes the history of the NUbots team, describes the roles and research of the team members, gives an overview of the NUbots' robots, their software system, and several associated research projects.
[ { "version": "v1", "created": "Wed, 11 Feb 2015 07:05:51 GMT" } ]
2015-02-12T00:00:00
[ [ "Walker", "Josiah", "" ], [ "Houliston", "Trent", "" ], [ "Annable", "Brendan", "" ], [ "Biddulph", "Alex", "" ], [ "Fountain", "Jake", "" ], [ "Metcalfe", "Mitchell", "" ], [ "Sugo", "Anita", "" ], [ "Olejniczak", "Monica", "" ], [ "Chalup", "Stephan K.", "" ], [ "King", "Robert A. R.", "" ], [ "Mendes", "Alexandre", "" ], [ "Turner", "Peter", "" ] ]
new_dataset
0.998577
1502.03407
Gokay Saldamli
Gokay Saldamli, Richard Chow and Hongxia Jin
Albatross: a Privacy-Preserving Location Sharing System
12 Pages, Extended version of ASIACCS 2015 paper
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+ to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called Albatross. The system protects location information from the service provider and yet enables fine-grained location-sharing. One main feature of the system is to protect an individual's social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. Albatross protects locations sharing preferences through protocol unification and masking. Albatross has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.
[ { "version": "v1", "created": "Wed, 11 Feb 2015 19:03:28 GMT" } ]
2015-02-12T00:00:00
[ [ "Saldamli", "Gokay", "" ], [ "Chow", "Richard", "" ], [ "Jin", "Hongxia", "" ] ]
new_dataset
0.993445
1502.01504
Davide Carboni
Davide Carboni
Feedback based Reputation on top of the Bitcoin Blockchain
10 pages, 4 figures, 20 references
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to assess the reputation of a member in a web community is a need addressed in many different ways according to the many different stages in which the nature of communities has evolved over time. In the case of reputation of goods/services suppliers, the solutions available to prevent the feedback abuse are generally reliable but centralized under the control of few big Internet companies. In this paper we show how a decentralized and distributed feedback management system can be built on top of the Bitcoin blockchain
[ { "version": "v1", "created": "Thu, 5 Feb 2015 11:17:53 GMT" }, { "version": "v2", "created": "Tue, 10 Feb 2015 15:56:46 GMT" } ]
2015-02-11T00:00:00
[ [ "Carboni", "Davide", "" ] ]
new_dataset
0.988487
1502.02799
Yisong Wang
Yisong Wang
On Forgetting in Tractable Propositional Fragments
27 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distilling from a knowledge base only the part that is relevant to a subset of alphabet, which is recognized as forgetting, has attracted extensive interests in AI community. In standard propositional logic, a general algorithm of forgetting and its computation-oriented investigation in various fragments whose satisfiability are tractable are still lacking. The paper aims at filling the gap. After exploring some basic properties of forgetting in propositional logic, we present a resolution-based algorithm of forgetting for CNF fragment, and some complexity results about forgetting in Horn, renamable Horn, q-Horn, Krom, DNF and CNF fragments of propositional logic.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 07:05:56 GMT" } ]
2015-02-11T00:00:00
[ [ "Wang", "Yisong", "" ] ]
new_dataset
0.997425
1502.02961
Richard Kennaway
Richard Kennaway
Avatar-independent scripting for real-time gesture animation
23 pages, 12 figures. Last revised November 2006
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When animation of a humanoid figure is to be generated at run-time, instead of by replaying pre-composed motion clips, some method is required of specifying the avatar's movements in a form from which the required motion data can be automatically generated. This form must be of a more abstract nature than raw motion data: ideally, it should be independent of the particular avatar's proportions, and both writable by hand and suitable for automatic generation from higher-level descriptions of the required actions. We describe here the development and implementation of such a scripting language for the particular area of sign languages of the deaf, called SiGML (Signing Gesture Markup Language), based on the existing HamNoSys notation for sign languages. We conclude by suggesting how this work may be extended to more general animation for interactive virtual reality applications.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 16:03:37 GMT" } ]
2015-02-11T00:00:00
[ [ "Kennaway", "Richard", "" ] ]
new_dataset
0.958758
1203.1895
Alan Guo
Greg Aloupis, Erik D. Demaine, Alan Guo, Giovanni Viglietta
Classic Nintendo Games are (Computationally) Hard
36 pages, 36 figures. Fixed some typos. Added NP-hardness results (with proofs and figures) for American SMB2 and Zelda 2
null
null
null
cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove NP-hardness results for five of Nintendo's largest video game franchises: Mario, Donkey Kong, Legend of Zelda, Metroid, and Pokemon. Our results apply to generalized versions of Super Mario Bros. 1-3, The Lost Levels, and Super Mario World; Donkey Kong Country 1-3; all Legend of Zelda games; all Metroid games; and all Pokemon role-playing games. In addition, we prove PSPACE-completeness of the Donkey Kong Country games and several Legend of Zelda games.
[ { "version": "v1", "created": "Thu, 8 Mar 2012 19:37:20 GMT" }, { "version": "v2", "created": "Thu, 6 Feb 2014 18:24:15 GMT" }, { "version": "v3", "created": "Sun, 8 Feb 2015 19:45:26 GMT" } ]
2015-02-10T00:00:00
[ [ "Aloupis", "Greg", "" ], [ "Demaine", "Erik D.", "" ], [ "Guo", "Alan", "" ], [ "Viglietta", "Giovanni", "" ] ]
new_dataset
0.998059
1402.0299
Panos Rondogiannis
Zolt\'an \'Esik and Panos Rondogiannis
A Fixed Point Theorem for Non-Monotonic Functions
34 pages. Accepted in: Theoretical Computer Science (to appear)
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a fixed point theorem for a class of (potentially) non-monotonic functions over specially structured complete lattices. The theorem has as a special case the Knaster-Tarski fixed point theorem when restricted to the case of monotonic functions and Kleene's theorem when the functions are additionally continuous. From the practical side, the theorem has direct applications in the semantics of negation in logic programming. In particular, it leads to a more direct and elegant proof of the least fixed point result of [Rondogiannis and W.W.Wadge, ACM TOCL 6(2): 441-467 (2005)]. Moreover, the theorem appears to have potential for possible applications outside the logic programming domain.
[ { "version": "v1", "created": "Mon, 3 Feb 2014 07:42:10 GMT" }, { "version": "v2", "created": "Sun, 1 Feb 2015 11:57:31 GMT" }, { "version": "v3", "created": "Sat, 7 Feb 2015 14:24:30 GMT" } ]
2015-02-10T00:00:00
[ [ "Ésik", "Zoltán", "" ], [ "Rondogiannis", "Panos", "" ] ]
new_dataset
0.993129
1404.1736
Alexios Balatsoukas-Stimming
Alexios Balatsoukas-Stimming and Andreas Burg
Faulty Successive Cancellation Decoding of Polar Codes for the Binary Erasure Channel
As presented at ISITA 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study faulty successive cancellation decoding of polar codes for the binary erasure channel. To this end, we introduce a simple erasure-based fault model and we show that, under this model, polarization does not happen, meaning that fully reliable communication is not possible at any rate. Moreover, we provide numerical results for the frame erasure rate and bit erasure rate and we study an unequal error protection scheme that can significantly improve the performance of the faulty successive cancellation decoder with negligible overhead.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 10:45:28 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2015 10:35:04 GMT" } ]
2015-02-10T00:00:00
[ [ "Balatsoukas-Stimming", "Alexios", "" ], [ "Burg", "Andreas", "" ] ]
new_dataset
0.959368
1501.07754
Xiaoxiong Zhong
Yang Qin, Li Li, Xiaohan Zhang, Xiaoxiong Zhong
NFCU: A New Friendship-based Routing with Buffer Management in Opportunistic Networks
This paper has been withdrawn by the author due to some crucial parameters setting error in experiments
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Routing in opportunistic networks is a very important and challenging problem because opportunistic network utilizes the contact opportunities of mobile nodes to achieve data communication.Social-based routing uses behavior of human beings which can form a community with the same interests to deliver the message.In this paper,we analyze the drawbacks of the original friendship-based algorithm, which defined social pressure metric to determine nodes'friendship community, but the metric couldn't distinguish the distribution characterization of the connection length which has an important impact on the selection of links with better quality. Further, the existing friendship-based routing doesn't consider the buffer management, which is vital for routing design in opportunistic networks. We propose a New Friendship-based routing with buffer management based on Copy Utility, named NFCU. NFCU algorithm, which not only considers the contact periods in constructing social pressure metric to solve the drawbacks of the original friendship-based routing scheme efficiently, but also considers the buffer management, that can efficiently determine which copy of the message should be deleted timely according to the copy utility function. Our proposed strategy can reduce the network overhead significantly, and increase the message delivery ratio. The extensive simulation results demonstrate that NFCU performs better than the original friendship-based routing. Moreover, we compare NFCU with other four classicalrouting schemes in opportunistic networks in terms of message delivery ratio, average delay, and comprehensive metric- message delivery ratio*(1/average delay). The simulation results show that our scheme NFCU can achieve better performance.
[ { "version": "v1", "created": "Fri, 30 Jan 2015 12:48:12 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2015 12:02:13 GMT" } ]
2015-02-10T00:00:00
[ [ "Qin", "Yang", "" ], [ "Li", "Li", "" ], [ "Zhang", "Xiaohan", "" ], [ "Zhong", "Xiaoxiong", "" ] ]
new_dataset
0.997959
1502.00561
Marcelo Cicconet
Marcelo Cicconet, Davi Geiger, and Michael Werman
Quantum Pairwise Symmetry: Applications in 2D Shape Analysis
The paper has been withdrawn since the authors concluded a more comprehensive study on the choice of parameters needs to be performed
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pair of rooted tangents -- defining a quantum triangle -- with an associated quantum wave of spin 1/2 is proposed as the primitive to represent and compute symmetry. Measures of the spin characterize how "isosceles" or how "degenerate" these triangles are -- which corresponds to their mirror or parallel symmetry. We also introduce a complex-valued kernel to model probability errors in the parameter space, which is more robust to noise and clutter than the classical model.
[ { "version": "v1", "created": "Mon, 2 Feb 2015 17:33:55 GMT" }, { "version": "v2", "created": "Mon, 9 Feb 2015 19:38:39 GMT" } ]
2015-02-10T00:00:00
[ [ "Cicconet", "Marcelo", "" ], [ "Geiger", "Davi", "" ], [ "Werman", "Michael", "" ] ]
new_dataset
0.998957
1502.02065
Saiph Savage
Saiph Savage, Andr\'es Monroy-Hern\'andez
Participatory Militias: An Analysis of an Armed Movement's Online Audience
Participatory Militias: An Analysis of an Armed Movement's Online Audience. Saiph Savage, Andres Monroy-Hernandez. CSCW: ACM Conference on Computer-Supported Cooperative Work 2015
null
10.1145/2675133.2675295
null
cs.SI cs.CY
http://creativecommons.org/licenses/by/3.0/
Armed groups of civilians known as "self-defense forces" have ousted the powerful Knights Templar drug cartel from several towns in Michoacan. This militia uprising has unfolded on social media, particularly in the "VXM" ("Valor por Michoacan," Spanish for "Courage for Michoacan") Facebook page, gathering more than 170,000 fans. Previous work on the Drug War has documented the use of social media for real-time reports of violent clashes. However, VXM goes one step further by taking on a pro-militia propagandist role, engaging in two-way communication with its audience. This paper presents a descriptive analysis of VXM and its audience. We examined nine months of posts, from VXM's inception until May 2014, totaling 6,000 posts by VXM administrators and more than 108,000 comments from its audience. We describe the main conversation themes, post frequency and relationships with offline events and public figures. We also characterize the behavior of VXM's most active audience members. Our work illustrates VXM's online mobilization strategies, and how its audience takes part in defining the narrative of this armed conflict. We conclude by discussing possible applications of our findings for the design of future communication technologies.
[ { "version": "v1", "created": "Fri, 6 Feb 2015 22:09:19 GMT" } ]
2015-02-10T00:00:00
[ [ "Savage", "Saiph", "" ], [ "Monroy-Hernández", "Andrés", "" ] ]
new_dataset
0.999545
1502.02402
Matthieu Boutier
Matthieu Boutier (PPS), Juliusz Chroboczek (PPS)
User-space Multipath UDP in Mosh
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many network topologies, hosts have multiple IP addresses, and may choose among multiple network paths by selecting the source and destination addresses of the packets that they send. This can happen with multihomed hosts (hosts connected to multiple networks), or in multihomed networks using source-specific routing. A number of efforts have been made to dynamically choose between multiple addresses in order to improve the reliability or the performance of network applications, at the network layer, as in Shim6, or at the transport layer, as in MPTCP. In this paper, we describe our experience of implementing dynamic address selection at the application layer within the Mobile Shell. While our work is specific to Mosh, we hope that it is generic enough to serve as a basis for designing UDP-based multipath applications or even more general APIs.
[ { "version": "v1", "created": "Mon, 9 Feb 2015 09:05:50 GMT" } ]
2015-02-10T00:00:00
[ [ "Boutier", "Matthieu", "", "PPS" ], [ "Chroboczek", "Juliusz", "", "PPS" ] ]
new_dataset
0.999834
1502.02489
Helio M. de Oliveira
H.M. de Oliveira, C.M.F. Barros and R.M. Campello de Souza
Fourier Codes and Hartley Codes
5 pages, 4 tables, 1 appedix. conference: XXV Simposio Brasileiro de Telecomunicacoes, SBrT'07, Recife, PE, Brazil, 2007
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-valued block codes are introduced, which are derived from Discrete Fourier Transforms (DFT) and Discrete Hartley Transforms (DHT). These algebraic structures are built from the eigensequences of the transforms. Generator and parity check matrices were computed for codes up to block length N=24. They can be viewed as lattices codes so the main parameters (dimension, minimal norm, area of the Voronoi region, density, and centre density) are computed. Particularly, Hamming-Hartley and Golay-Hartley block codes are presented. These codes may possibly help an efficient computation of a DHT/DFT.
[ { "version": "v1", "created": "Mon, 9 Feb 2015 14:01:20 GMT" } ]
2015-02-10T00:00:00
[ [ "de Oliveira", "H. M.", "" ], [ "Barros", "C. M. F.", "" ], [ "de Souza", "R. M. Campello", "" ] ]
new_dataset
0.999148
1409.5181
Zhilin Zhang
Zhilin Zhang, Zhouyue Pi, Benyuan Liu
TROIKA: A General Framework for Heart Rate Monitoring Using Wrist-Type Photoplethysmographic Signals During Intensive Physical Exercise
Matlab codes and data are available at: https://sites.google.com/site/researchbyzhang/
IEEE Transactions on Biomedical Engineering, vol. 62, no. 2, pp. 522-531, February 2015
10.1109/TBME.2014.2359372
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heart rate monitoring using wrist-type photoplethysmographic (PPG) signals during subjects' intensive exercise is a difficult problem, since the signals are contaminated by extremely strong motion artifacts caused by subjects' hand movements. So far few works have studied this problem. In this work, a general framework, termed TROIKA, is proposed, which consists of signal decomposiTion for denoising, sparse signal RecOnstructIon for high-resolution spectrum estimation, and spectral peaK trAcking with verification. The TROIKA framework has high estimation accuracy and is robust to strong motion artifacts. Many variants can be straightforwardly derived from this framework. Experimental results on datasets recorded from 12 subjects during fast running at the peak speed of 15 km/hour showed that the average absolute error of heart rate estimation was 2.34 beat per minute (BPM), and the Pearson correlation between the estimates and the ground-truth of heart rate was 0.992. This framework is of great values to wearable devices such as smart-watches which use PPG signals to monitor heart rate for fitness.
[ { "version": "v1", "created": "Thu, 18 Sep 2014 03:24:49 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 07:47:00 GMT" }, { "version": "v3", "created": "Fri, 6 Feb 2015 06:16:09 GMT" } ]
2015-02-09T00:00:00
[ [ "Zhang", "Zhilin", "" ], [ "Pi", "Zhouyue", "" ], [ "Liu", "Benyuan", "" ] ]
new_dataset
0.972657
1406.5453
Carlo A. Furia
Carlo A. Furia
Rotation of Sequences: Algorithms and Proofs
Added verified implementations for ESC/Java2
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequence rotation consists of a circular shift of the sequence's elements by a given number of positions. We present the four classic algorithms to rotate a sequence; the loop invariants underlying their correctness; detailed correctness proofs; and fully annotated versions for the verifiers Boogie, Dafny, and ESC/Java2. The presentation illustrates in detail both how the algorithms work and what it takes to carry out mechanized proofs of their correctness.
[ { "version": "v1", "created": "Fri, 20 Jun 2014 16:24:57 GMT" }, { "version": "v2", "created": "Thu, 27 Nov 2014 18:24:04 GMT" }, { "version": "v3", "created": "Thu, 5 Feb 2015 10:03:41 GMT" } ]
2015-02-06T00:00:00
[ [ "Furia", "Carlo A.", "" ] ]
new_dataset
0.999192
1410.7614
Zhifei Zhang
Zhifei Zhang, Alain Sarlette and Zhihao Ling
Integral Control on Lie Groups
Resubmitted to Systems and Control Letters, February 2015
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we extend the popular integral control technique to systems evolving on Lie groups. More explicitly, we provide an alternative definition of "integral action" for proportional(-derivative)-controlled systems whose configuration evolves on a nonlinear space, where configuration errors cannot be simply added up to compute a definite integral. We then prove that the proposed integral control allows to cancel the drift induced by a constant bias in both first order (velocity) and second order (torque) control inputs for fully actuated systems evolving on abstract Lie groups. We illustrate the approach by 3-dimensional motion control applications.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 13:36:34 GMT" }, { "version": "v2", "created": "Thu, 5 Feb 2015 16:57:46 GMT" } ]
2015-02-06T00:00:00
[ [ "Zhang", "Zhifei", "" ], [ "Sarlette", "Alain", "" ], [ "Ling", "Zhihao", "" ] ]
new_dataset
0.997747
1502.01414
Alexander Barg
Itzhak Tamo, Alexander Barg, Sreechakra Goparaju, and Robert Calderbank
Cyclic LRC Codes and their Subfield Subcodes
Submitted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider linear cyclic codes with the locality property, or locally recoverable codes (LRC codes). A family of LRC codes that generalizes the classical construction of Reed-Solomon codes was constructed in a recent paper by I. Tamo and A. Barg (IEEE Transactions on Information Theory, no. 8, 2014; arXiv:1311.3284). In this paper we focus on the optimal cyclic codes that arise from the general construction. We give a characterization of these codes in terms of their zeros, and observe that there are many equivalent ways of constructing optimal cyclic LRC codes over a given field. We also study subfield subcodes of cyclic LRC codes (BCH-like LRC codes) and establish several results about their locality and minimum distance.
[ { "version": "v1", "created": "Thu, 5 Feb 2015 02:51:33 GMT" } ]
2015-02-06T00:00:00
[ [ "Tamo", "Itzhak", "" ], [ "Barg", "Alexander", "" ], [ "Goparaju", "Sreechakra", "" ], [ "Calderbank", "Robert", "" ] ]
new_dataset
0.986784
1502.01454
Ali Abdel Aziz
Ali Mohamed AbdelAziz, Moustafa Youssef
The Diversity and Scale Matter: Ubiquitous Transportation Mode Detection using Single Cell Tower Information
5 pages, 6 figures
null
null
null
cs.NI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting the transportation mode of a user is important for a wide range of applications. While a number of recent systems addressed the transportation mode detection problem using the ubiquitous mobile phones, these studies either leverage GPS, the inertial sensors, and/or multiple cell towers information. However, these different phone sensors have high energy consumption, limited to a small subset of phones (e.g. high-end phones or phones that support neighbouring cell tower information), cannot work in certain areas (e.g. inside tunnels for GPS), and/or work only from the user side. In this paper, we present a transportation mode detection system, MonoSense, that leverages the phone serving cell information only. The basic idea is that the phone speed can be correlated with features extracted from both the serving cell tower ID and the received signal strength from it. To achieve high detection accuracy with this limited information, MonoSense leverages diversity along multiple axes to extract novel features. Specifically, MonoSense extracts features from both the time and frequency domain information available from the serving cell tower over different sliding widow sizes. More importantly, we show also that both the logarithmic and linear RSS scales can provide different information about the movement of a phone, further enriching the feature space and leading to higher accuracy. Evaluation of MonoSense using 135 hours of cellular traces covering 485 km and collected by four users using different Android phones shows that it can achieve an average precision and recall of 89.26% and 89.84% respectively in differentiating between the stationary, walking, and driving modes using only the serving cell tower information, highlighting MonoSense ability to enable a wide set of intelligent transportation applications.
[ { "version": "v1", "created": "Thu, 5 Feb 2015 08:28:18 GMT" } ]
2015-02-06T00:00:00
[ [ "AbdelAziz", "Ali Mohamed", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.999111
1502.01657
Sudeep Pillai
Michael Fleder, Michael S. Kester, Sudeep Pillai
Bitcoin Transaction Graph Analysis
null
null
null
null
cs.CR cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin's design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic public-key ids. This leads to a common misconception that it inherently provides anonymous use. While Bitcoin's presumed anonymity offers new avenues for commerce, several recent studies raise user-privacy concerns. We explore the level of anonymity in the Bitcoin system. Our approach is two-fold: (i) We annotate the public transaction graph by linking bitcoin public keys to "real" people - either definitively or statistically. (ii) We run the annotated graph through our graph-analysis framework to find and summarize activity of both known and unknown users.
[ { "version": "v1", "created": "Thu, 5 Feb 2015 17:55:27 GMT" } ]
2015-02-06T00:00:00
[ [ "Fleder", "Michael", "" ], [ "Kester", "Michael S.", "" ], [ "Pillai", "Sudeep", "" ] ]
new_dataset
0.999626
cs/0102006
Hsueh-I. Lu
Yi-Ting Chiang, Ching-Chi Lin, and Hsueh-I Lu
Orderly Spanning Trees with Applications
25 pages, 7 figures, A preliminary version appeared in Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2001), Washington D.C., USA, January 7-9, 2001, pp. 506-515
SIAM Journal on Computing 34(4): 924-945 (2005)
10.1137/S0097539702411381
null
cs.DS cs.DM
null
We introduce and study the {\em orderly spanning trees} of plane graphs. This algorithmic tool generalizes {\em canonical orderings}, which exist only for triconnected plane graphs. Although not every plane graph admits an orderly spanning tree, we provide an algorithm to compute an {\em orderly pair} for any connected planar graph $G$, consisting of a plane graph $H$ of $G$, and an orderly spanning tree of $H$. We also present several applications of orderly spanning trees: (1) a new constructive proof for Schnyder's Realizer Theorem, (2) the first area-optimal 2-visibility drawing of $G$, and (3) the best known encodings of $G$ with O(1)-time query support. All algorithms in this paper run in linear time.
[ { "version": "v1", "created": "Wed, 7 Feb 2001 15:44:49 GMT" }, { "version": "v2", "created": "Mon, 2 Jul 2001 01:12:56 GMT" }, { "version": "v3", "created": "Sat, 13 Jul 2002 10:54:10 GMT" } ]
2015-02-06T00:00:00
[ [ "Chiang", "Yi-Ting", "" ], [ "Lin", "Ching-Chi", "" ], [ "Lu", "Hsueh-I", "" ] ]
new_dataset
0.997543
1502.01222
Aaron Striegel
Xueheng Hu and Lixing Song and Dirk Van Bruggen and Aaron Striegel
Is There WiFi Yet? How Aggressive WiFi Probe Requests Deteriorate Energy and Throughput
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WiFi offloading has emerged as a key component of cellular operator strategy to meet the data needs of rich, mobile devices. As such, mobile devices tend to aggressively seek out WiFi in order to provide improved user Quality of Experience (QoE) and cellular capacity relief. For home and work environments, aggressive WiFi scans can significantly improve the speed on which mobile nodes join the WiFi network. Unfortunately, the same aggressive behavior that excels in the home environment incurs considerable side effects across crowded wireless environments. In this paper, we show through empirical studies at both large (stadium) and small (laboratory) scales how aggressive WiFi scans can have significant implications for energy and throughput, both for the mobile nodes scanning and other nearby mobile nodes. We close with several thoughts on the disjoint incentives for properly balancing WiFi discovery speed and ultra-dense network interactions.
[ { "version": "v1", "created": "Wed, 4 Feb 2015 15:01:00 GMT" } ]
2015-02-05T00:00:00
[ [ "Hu", "Xueheng", "" ], [ "Song", "Lixing", "" ], [ "Van Bruggen", "Dirk", "" ], [ "Striegel", "Aaron", "" ] ]
new_dataset
0.976475
1502.00317
Mounia Lalmas Dr
David Warnock and Mounia Lalmas
An Exploration of Cursor tracking Data
Mouse, Cursor, Tracking, Engagement, Involvement, Aesthetics, Self-report Measure, Experimental Design
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cursor tracking data contains information about website visitors which may provide new ways to understand visitors and their needs. This paper presents an Amazon Mechanical Turk study where participants were tracked as they used modified variants of the Wikipedia and BBC News websites. Participants were asked to complete reading and information-finding tasks. The results showed that it was possible to differentiate between users reading content and users looking for information based on cursor data. The effects of website aesthetics, user interest and cursor hardware were also analysed which showed it was possible to identify hardware from cursor data, but no relationship between cursor data and engagement was found. The implications of these results, from the impact on web analytics to the design of experiments to assess user engagement, are discussed.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 21:42:02 GMT" }, { "version": "v2", "created": "Tue, 3 Feb 2015 14:25:07 GMT" } ]
2015-02-04T00:00:00
[ [ "Warnock", "David", "" ], [ "Lalmas", "Mounia", "" ] ]
new_dataset
0.983458
1502.00859
Piotr Micek
Piotr Micek and Veit Wiechert
An on-line competitive algorithm for coloring bipartite graphs without long induced paths
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The existence of an on-line competitive algorithm for coloring bipartite graphs remains a tantalizing open problem. So far there are only partial positive results for bipartite graphs with certain small forbidden graphs as induced subgraphs. We propose a new on-line competitive coloring algorithm for $P_9$-free bipartite graphs.
[ { "version": "v1", "created": "Tue, 3 Feb 2015 13:32:08 GMT" } ]
2015-02-04T00:00:00
[ [ "Micek", "Piotr", "" ], [ "Wiechert", "Veit", "" ] ]
new_dataset
0.998666