id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1412.2449
|
Vinay Kolar
|
Vikram Munishwar, Vinay Kolar, Praveen Jayachandran, Ravi Kokku
|
RTChoke: Efficient Real-Time Traffic Chokepoint Detection and Monitoring
|
11 pages, Tech rep of the paper accepted at COMSNETS 2015
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel efficient adaptive sensing and monitoring solution for a
system of mobile sensing devices that support traffic monitoring applications.
We make a key observation that much of the variance in commute times arises at
a few congestion hotspots, and a reliable estimate of congestion can be
obtained by selectively monitoring congestion just at these hotspots. We design
a smartphone application and a backend system that automatically identifies and
monitors congestion hotspots. The solution has low resource footprint in terms
of both battery usage on the sensing devices and the network bytes used for
uploading data. When a user is not inside any hotspot zone, adaptive sampling
conserves battery power and reduces network usage, while ensuring that any new
hotspots can be effectively identified. Our results show that our application
consumes 40- 80% less energy than a periodic sampling system for different
routes in our experiments, with similar accuracy of congestion information. The
system can be used for a variety of applications such as automatic congestion
alerts to users approaching hotspots, reliable end-to-end commute time
estimates and effective alternate route suggestions.
|
[
{
"version": "v1",
"created": "Mon, 8 Dec 2014 05:16:36 GMT"
}
] | 2014-12-09T00:00:00 |
[
[
"Munishwar",
"Vikram",
""
],
[
"Kolar",
"Vinay",
""
],
[
"Jayachandran",
"Praveen",
""
],
[
"Kokku",
"Ravi",
""
]
] |
new_dataset
| 0.98307 |
1412.2495
|
Ronak Sumbaly
|
Priyanka Bhatia and Ronak Sumbaly
|
Framework for Wireless Network Security using Quantum Cryptography
|
17 pages, 11 figures
|
International Journal of Computer Networks & Communications
(IJCNC) Vol.6, No.6, November 2014
|
10.5121/ijcnc.2014.6604
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data that is transient over an unsecured wireless network is always
susceptible to being intercepted by anyone within the range of the wireless
signal. Hence providing secure communication to keep the user information and
devices safe when connected wirelessly has become one of the major concerns.
Quantum cryptography provides a solution towards absolute communication
security over the network by encoding information as polarized photons, which
can be sent through the air. This paper explores on the aspect of application
of quantum cryptography in wireless networks. In this paper we present a
methodology for integrating quantum cryptography and security of IEEE 802.11
wireless networks in terms of distribution of the encryption keys.
|
[
{
"version": "v1",
"created": "Mon, 8 Dec 2014 09:47:42 GMT"
}
] | 2014-12-09T00:00:00 |
[
[
"Bhatia",
"Priyanka",
""
],
[
"Sumbaly",
"Ronak",
""
]
] |
new_dataset
| 0.973244 |
1412.1908
|
Rui Zhao
|
Rui Zhao, Wanli Ouyang, Xiaogang Wang
|
Person Re-identification by Saliency Learning
|
This manuscript has 14 pages with 25 figures, and a preliminary
version was published in ICCV 2013
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Human eyes can recognize person identities based on small salient regions,
i.e. human saliency is distinctive and reliable in pedestrian matching across
disjoint camera views. However, such valuable information is often hidden when
computing similarities of pedestrian images with existing approaches. Inspired
by our user study result of human perception on human saliency, we propose a
novel perspective for person re-identification based on learning human saliency
and matching saliency distribution. The proposed saliency learning and matching
framework consists of four steps: (1) To handle misalignment caused by drastic
viewpoint change and pose variations, we apply adjacency constrained patch
matching to build dense correspondence between image pairs. (2) We propose two
alternative methods, i.e. K-Nearest Neighbors and One-class SVM, to estimate a
saliency score for each image patch, through which distinctive features stand
out without using identity labels in the training procedure. (3) saliency
matching is proposed based on patch matching. Matching patches with
inconsistent saliency brings penalty, and images of the same identity are
recognized by minimizing the saliency matching cost. (4) Furthermore, saliency
matching is tightly integrated with patch matching in a unified structural
RankSVM learning framework. The effectiveness of our approach is validated on
the VIPeR dataset and the CUHK01 dataset. Our approach outperforms the
state-of-the-art person re-identification methods on both datasets.
|
[
{
"version": "v1",
"created": "Fri, 5 Dec 2014 07:33:48 GMT"
}
] | 2014-12-08T00:00:00 |
[
[
"Zhao",
"Rui",
""
],
[
"Ouyang",
"Wanli",
""
],
[
"Wang",
"Xiaogang",
""
]
] |
new_dataset
| 0.985468 |
1412.1952
|
Albert Y.S. Lam
|
Albert Y.S. Lam and Victor O.K. Li
|
Opportunistic Routing for the Vehicular Energy Network
|
13 pages
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vehicular energy network (VEN) is a vehicular network which can transport
energy over a large geographical area by means of electric vehicles (EVs). In
the near future, an abundance of EVs, plentiful generation of the renewables,
and mature wireless energy transfer and vehicular communication technologies
will expedite the realization of VEN. To transmit energy from a source to a
destination, we need to establish energy paths, which are composed of segments
of vehicular routes, while satisfying various design objectives. In this paper,
we develop a method to construct all energy paths for a particular energy
source-destination pair, followed by some analytical results of the method. We
describe how to utilize the energy paths to develop optimization models for
different design goals and propose two solutions. We also develop a heuristic
for the power loss minimization problem. We compare the performance of the
three solution methods with artificial and real-world traffic networks and
provide a comprehensive comparison in terms of solution quality, computation
time, solvable problem size, and applicability. This paper lays the foundations
of VEN routing.
|
[
{
"version": "v1",
"created": "Fri, 5 Dec 2014 11:02:07 GMT"
}
] | 2014-12-08T00:00:00 |
[
[
"Lam",
"Albert Y. S.",
""
],
[
"Li",
"Victor O. K.",
""
]
] |
new_dataset
| 0.999155 |
1412.2070
|
Jo\~ao Rodrigues
|
Jo\~ao G. P. Rodrigues, Ana Aguiar, Jo\~ao Barros
|
SenseMyCity: Crowdsourcing an Urban Sensor
|
10 pages, 11 figures
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
People treat smartphones as a second skin, having them around nearly 24/7 and
constantly interacting with them. Although smartphones are used mainly for
personal communication, social networking and web browsing, they have many
connectivity capabilities, and are at the same time equipped with a wide range
of embedded sensors. Additionally, bluetooth connectivity can be leveraged to
collect data from external sensors, greatly extending the sensing capabilities.
However, massive data-gathering using smartphones still poses many
architectural challenges, such as limited battery and processing power, and
possibly connectivity costs.
This article describes SenseMyCity (SMC), an Internet of Things mobile urban
sensor that is extensible and fully configurable. The platform consists of an
app, a backoffice and a frontoffice. The SMC app can collect data from embedded
sensors, like GPS, wifi, accelerometer, magnetometer, etc, as well as from
external bluetooth sensors, ranging from On-Board Diagnostics gathering data
from vehicles, to wearable cardiac sensors. Adding support for new internal or
external sensors is straightforward due to the modular architecture. Data
transmission to our servers can occur either on-demand or in real-time, while
keeping costs down by only using the configured type of Internet connectivity.
We discuss our experience implementing the platform and using it to make
longitudinal studies with many users. Further, we present results on bandwidth
utilization and energy consumption for different sensors and sampling rates.
Finally, we show two use cases: mapping fuel consumption and user stress
extracted from cardiac sensors.
|
[
{
"version": "v1",
"created": "Fri, 5 Dec 2014 17:10:02 GMT"
}
] | 2014-12-08T00:00:00 |
[
[
"Rodrigues",
"João G. P.",
""
],
[
"Aguiar",
"Ana",
""
],
[
"Barros",
"João",
""
]
] |
new_dataset
| 0.966581 |
0910.2415
|
Andrei Romashchenko
|
Bruno Durand (LIF), Andrei Romashchenko (LIF), Alexander Shen (LIF)
|
Fixed-point tile sets and their applications
|
v7: updated reference to S.G.Simpson's paper
| null | null | null |
cs.CC math.DS math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An aperiodic tile set was first constructed by R. Berger while proving the
undecidability of the domino problem. It turned out that aperiodic tile sets
appear in many topics ranging from logic (the Entscheidungsproblem) to physics
(quasicrystals). We present a new construction of an aperiodic tile set that is
based on Kleene's fixed-point construction instead of geometric arguments. This
construction is similar to J. von Neumann self-reproducing automata; similar
ideas were also used by P. Gacs in the context of error-correcting
computations. This construction it rather flexible, so it can be used in many
ways: we show how it can be used to implement substitution rules, to construct
strongly aperiodic tile sets (any tiling is far from any periodic tiling), to
give a new proof for the undecidability of the domino problem and related
results, characterize effectively closed 1D subshift it terms of 2D shifts of
finite type (improvement of a result by M. Hochman), to construct a tile set
which has only complex tilings, and to construct a "robust" aperiodic tile set
that does not have periodic (or close to periodic) tilings even if we allow
some (sparse enough) tiling errors. For the latter we develop a hierarchical
classification of points in random sets into islands of different ranks.
Finally, we combine and modify our tools to prove our main result: there exists
a tile set such that all tilings have high Kolmogorov complexity even if
(sparse enough) tiling errors are allowed.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2009 18:55:52 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 06:38:41 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Jan 2010 14:42:41 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Sep 2010 14:22:01 GMT"
},
{
"version": "v5",
"created": "Fri, 12 Nov 2010 15:39:26 GMT"
},
{
"version": "v6",
"created": "Mon, 3 Oct 2011 19:31:37 GMT"
},
{
"version": "v7",
"created": "Thu, 4 Dec 2014 10:19:41 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Durand",
"Bruno",
"",
"LIF"
],
[
"Romashchenko",
"Andrei",
"",
"LIF"
],
[
"Shen",
"Alexander",
"",
"LIF"
]
] |
new_dataset
| 0.987652 |
1412.1602
|
Jan Chorowski
|
Jan Chorowski, Dzmitry Bahdanau, Kyunghyun Cho, Yoshua Bengio
|
End-to-end Continuous Speech Recognition using Attention-based Recurrent
NN: First Results
|
As accepted to: Deep Learning and Representation Learning Workshop,
NIPS 2014
| null | null | null |
cs.NE cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We replace the Hidden Markov Model (HMM) which is traditionally used in in
continuous speech recognition with a bi-directional recurrent neural network
encoder coupled to a recurrent neural network decoder that directly emits a
stream of phonemes. The alignment between the input and output sequences is
established using an attention mechanism: the decoder emits each symbol based
on a context created with a subset of input symbols elected by the attention
mechanism. We report initial results demonstrating that this new approach
achieves phoneme error rates that are comparable to the state-of-the-art
HMM-based decoders, on the TIMIT dataset.
|
[
{
"version": "v1",
"created": "Thu, 4 Dec 2014 10:00:19 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Chorowski",
"Jan",
""
],
[
"Bahdanau",
"Dzmitry",
""
],
[
"Cho",
"Kyunghyun",
""
],
[
"Bengio",
"Yoshua",
""
]
] |
new_dataset
| 0.972577 |
1412.1623
|
Christian Mainka
|
Christian Mainka, Vladislav Mladenov, J\"org Schwenk
|
Do not trust me: Using malicious IdPs for analyzing and attacking Single
Sign-On
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Single Sign-On (SSO) systems simplify login procedures by using an an
Identity Provider (IdP) to issue authentication tokens which can be consumed by
Service Providers (SPs). Traditionally, IdPs are modeled as trusted third
parties. This is reasonable for SSO systems like Kerberos, MS Passport and
SAML, where each SP explicitely specifies which IdP he trusts. However, in open
systems like OpenID and OpenID Connect, each user may set up his own IdP, and a
discovery phase is added to the protocol flow. Thus it is easy for an attacker
to set up its own IdP. In this paper we use a novel approach for analyzing SSO
authentication schemes by introducing a malicious IdP. With this approach we
evaluate one of the most popular and widely deployed SSO protocols - OpenID. We
found four novel attack classes on OpenID, which were not covered by previous
research, and show their applicability to real-life implementations. As a
result, we were able to compromise 11 out of 16 existing OpenID implementations
like Sourceforge, Drupal and ownCloud. We automated discovery of these attacks
in a open source tool OpenID Attacker, which additionally allows fine-granular
testing of all parameters in OpenID implementations. Our research helps to
better understand the message flow in the OpenID protocol, trust assumptions in
the different components of the system, and implementation issues in OpenID
components. It is applicable to other SSO systems like OpenID Connect and SAML.
All OpenID implementations have been informed about their vulnerabilities and
we supported them in fixing the issues.
|
[
{
"version": "v1",
"created": "Thu, 4 Dec 2014 11:14:03 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Mainka",
"Christian",
""
],
[
"Mladenov",
"Vladislav",
""
],
[
"Schwenk",
"Jörg",
""
]
] |
new_dataset
| 0.988764 |
1412.1736
|
Tim Boykett
|
Tim Boykett and Gerhard Wendt
|
J2 Radical in Automata Nearrings
|
Published
|
International Journal of Foundations of Computer Science Vol. 25,
No. 05, pp. 585-595 (2014)
|
10.1142/S0129054114500233
| null |
cs.FL math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Looking at the automata defined over a group alphabet as a nearring, we see
that they are a highly complicated structure. As with ring theory, one method
to deal with complexity is to look at semisimplicity modulo radical structures.
We find some bounds on the Jacobson 2-radical and show that in certain groups,
this radical can be explicitly found and the semisimple image determined.
|
[
{
"version": "v1",
"created": "Thu, 4 Dec 2014 17:14:34 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Boykett",
"Tim",
""
],
[
"Wendt",
"Gerhard",
""
]
] |
new_dataset
| 0.999428 |
1412.1790
|
Martin Hachet
|
J\'er\'emy Frey (INRIA Bordeaux - Sud-Ouest, LaBRI), Renaud Gervais
(INRIA Bordeaux - Sud-Ouest, LaBRI), St\'ephanie Fleck, Fabien Lotte (INRIA
Bordeaux - Sud-Ouest, LaBRI), Martin Hachet (INRIA Bordeaux - Sud-Ouest,
LaBRI)
|
Teegi: Tangible EEG Interface
|
to appear in UIST-ACM User Interface Software and Technology
Symposium, Oct 2014, Honolulu, United States
| null |
10.1145/2642918.2647368
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce Teegi, a Tangible ElectroEncephaloGraphy (EEG) Interface that
enables novice users to get to know more about something as complex as brain
signals, in an easy, en- gaging and informative way. To this end, we have
designed a new system based on a unique combination of spatial aug- mented
reality, tangible interaction and real-time neurotech- nologies. With Teegi, a
user can visualize and analyze his or her own brain activity in real-time, on a
tangible character that can be easily manipulated, and with which it is
possible to interact. An exploration study has shown that interacting with
Teegi seems to be easy, motivating, reliable and infor- mative. Overall, this
suggests that Teegi is a promising and relevant training and mediation tool for
the general public.
|
[
{
"version": "v1",
"created": "Thu, 4 Dec 2014 20:04:08 GMT"
}
] | 2014-12-05T00:00:00 |
[
[
"Frey",
"Jérémy",
"",
"INRIA Bordeaux - Sud-Ouest, LaBRI"
],
[
"Gervais",
"Renaud",
"",
"INRIA Bordeaux - Sud-Ouest, LaBRI"
],
[
"Fleck",
"Stéphanie",
"",
"INRIA\n Bordeaux - Sud-Ouest, LaBRI"
],
[
"Lotte",
"Fabien",
"",
"INRIA\n Bordeaux - Sud-Ouest, LaBRI"
],
[
"Hachet",
"Martin",
"",
"INRIA Bordeaux - Sud-Ouest,\n LaBRI"
]
] |
new_dataset
| 0.99838 |
1412.1127
|
Ahmad Lashgar
|
Ahmad Lashgar and Alireza Majidi and Amirali Baniasadi
|
IPMACC: Open Source OpenACC to CUDA/OpenCL Translator
|
14 pages, 2 figures
| null | null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce IPMACC, a framework for translating OpenACC
applications to CUDA or OpenCL. IPMACC is composed of set of translators
translating OpenACC for C applications to CUDA or OpenCL. The framework uses
the system compiler (e.g. nvcc) for generating final accelerator's binary. The
framework can be used for extending the OpenACC API, executing OpenACC
applications, or obtaining CUDA or OpenCL code which is equivalent to OpenACC
code. We verify correctness of our framework under several benchmarks included
from Rodinia Benchmark Suit and CUDA SDK. We also compare the performance of
CUDA version of the benchmarks to OpenACC version which is compiled by our
framework. By comparing CUDA and OpenACC versions, we discuss the limitations
of OpenACC in achieving a performance near to highly-optimized CUDA version.
|
[
{
"version": "v1",
"created": "Tue, 2 Dec 2014 22:49:14 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Lashgar",
"Ahmad",
""
],
[
"Majidi",
"Alireza",
""
],
[
"Baniasadi",
"Amirali",
""
]
] |
new_dataset
| 0.999755 |
1412.1140
|
Josef Spjut
|
Dong-hyeon Park, Akhil Bagaria, Fabiha Hannan, Eric Storm, Josef Spjut
|
Sphynx: A Shared Instruction Cache Exporatory Study
|
4 pages, 6 figures
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Sphynx project was an exploratory study to discover what might be done to
improve the heavy replication of in- structions in independent instruction
caches for a massively parallel machine where a single program is executing
across all of the cores. While a machine with only many cores (fewer than 50)
might not have any issues replicating the instructions for each core, as we
approach the era where thousands of cores can be placed on one chip, the
overhead of instruction replication may become unacceptably large. We believe
that a large amount of sharing should be possible when the ma- chine is
configured for all of the threads to issue from the same set of instructions.
We propose a technique that allows sharing an instruction cache among a number
of independent processor cores to allow for inter-thread sharing and reuse of
instruction memory. While we do not have test cases to demonstrate the
potential magnitude of performance gains that could be achieved, the potential
for sharing reduces the die area required for instruction storage on chip.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2014 00:16:43 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Park",
"Dong-hyeon",
""
],
[
"Bagaria",
"Akhil",
""
],
[
"Hannan",
"Fabiha",
""
],
[
"Storm",
"Eric",
""
],
[
"Spjut",
"Josef",
""
]
] |
new_dataset
| 0.993641 |
1412.1153
|
EPTCS
|
Hossein Hojjat (Cornell University, USA), Philipp R\"ummer (Uppsala
University, Sweden), Pavle Subotic (Uppsala University, Sweden), Wang Yi
(Uppsala University, Sweden)
|
Horn Clauses for Communicating Timed Systems
|
In Proceedings HCVS 2014, arXiv:1412.0825
|
EPTCS 169, 2014, pp. 39-52
|
10.4204/EPTCS.169.6
| null |
cs.LO cs.SE cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Languages based on the theory of timed automata are a well established
approach for modelling and analysing real-time systems, with many applications
both in industrial and academic context. Model checking for timed automata has
been studied extensively during the last two decades; however, even now
industrial-grade model checkers are available only for few timed automata
dialects (in particular Uppaal timed automata), exhibit limited scalability for
systems with large discrete state space, or cannot handle parametrised systems.
We explore the use of Horn constraints and off-the-shelf model checkers for
analysis of networks of timed automata. The resulting analysis method is fully
symbolic and applicable to systems with large or infinite discrete state space,
and can be extended to include various language features, for instance
Uppaal-style communication/broadcast channels and BIP-style interactions, and
systems with infinite parallelism. Experiments demonstrate the feasibility of
the method.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2014 01:39:51 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Hojjat",
"Hossein",
"",
"Cornell University, USA"
],
[
"Rümmer",
"Philipp",
"",
"Uppsala\n University, Sweden"
],
[
"Subotic",
"Pavle",
"",
"Uppsala University, Sweden"
],
[
"Yi",
"Wang",
"",
"Uppsala University, Sweden"
]
] |
new_dataset
| 0.950492 |
1412.1194
|
Feng Shi
|
Feng Shi, Robert Laganiere, Emil Petriu
|
Gradient Boundary Histograms for Action Recognition
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a high efficient local spatiotemporal descriptor,
called gradient boundary histograms (GBH). The proposed GBH descriptor is built
on simple spatio-temporal gradients, which are fast to compute. We demonstrate
that it can better represent local structure and motion than other
gradient-based descriptors, and significantly outperforms them on large
realistic datasets. A comprehensive evaluation shows that the recognition
accuracy is preserved while the spatial resolution is greatly reduced, which
yields both high efficiency and low memory usage.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2014 05:23:03 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Shi",
"Feng",
""
],
[
"Laganiere",
"Robert",
""
],
[
"Petriu",
"Emil",
""
]
] |
new_dataset
| 0.967804 |
1412.1215
|
Odile Piton
|
H\'el\`ene Pignot (SAMM), Odile Piton (SAMM)
|
Mary Astell's words in A Serious Proposal to the Ladies (part I), a
lexicographic inquiry with NooJ
|
Zoe Gavriilidou, Elina Chadjipapa, Lena Papadopoulou, Max
Silberztein. Nooj 2010 International Conference and Workshop, May 2010,
Komotini, Greece. University of Thrace, Proceedings of the Nooj 2010
International Conference and Workshop, pp.232-244,
http://synmorphose.compulaw.gr/joomlatools-files/docman-files/Zoe-Gav\_BOOK\_7.pdf
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the following article we elected to study with NooJ the lexis of a 17 th
century text, Mary Astell's seminal essay, A Serious Proposal to the Ladies,
part I, published in 1694. We first focused on the semantics to see how Astell
builds her vindication of the female sex, which words she uses to sensitise
women to their alienated condition and promote their education. Then we studied
the morphology of the lexemes (which is different from contemporary English)
used by the author, thanks to the NooJ tools we have devised for this purpose.
NooJ has great functionalities for lexicographic work. Its commands and graphs
prove to be most efficient in the spotting of archaic words or variants in
spelling. Introduction In our previous articles, we have studied the
singularities of 17 th century English within the framework of a diachronic
analysis thanks to syntactical and morphological graphs and thanks to the
dictionaries we have compiled from a corpus that may be expanded overtime. Our
early work was based on a limited corpus of English travel literature to Greece
in the 17 th century. This article deals with a late seventeenth century text
written by a woman philosopher and essayist, Mary Astell (1666--1731),
considered as one of the first English feminists. Astell wrote her essay at a
time in English history when women were "the weaker vessel" and their main
business in life was to charm and please men by their looks and submissiveness.
In this essay we will see how NooJ can help us analyse Astell's rhetoric (what
point of view does she adopt, does she speak in her own name, in the name of
all women, what is her representation of men and women and their relationships
in the text, what are the goals of education?). Then we will turn our attention
to the morphology of words in the text and use NooJ commands and graphs to
carry out a lexicographic inquiry into Astell's lexemes.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2014 07:16:04 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Pignot",
"Hélène",
"",
"SAMM"
],
[
"Piton",
"Odile",
"",
"SAMM"
]
] |
new_dataset
| 0.970419 |
1412.1393
|
Marco Antoniotti
|
Marco Antoniotti
|
CLAZY: Lazy Calling for Common Lisp
|
A version of this note was presented at the 1st European Lisp
Symposium 2008, Bordeaux, France
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document contains a description of a Common Lisp extension that allows a
programmer to write functional programs that use "normal order" evaluation, as
in "non-strict" languages like Haskell. The extension is relatively
straightforward, and it appears to be the first one such that is integrated in
the overall Common Lisp framework.
|
[
{
"version": "v1",
"created": "Wed, 3 Dec 2014 16:34:11 GMT"
}
] | 2014-12-04T00:00:00 |
[
[
"Antoniotti",
"Marco",
""
]
] |
new_dataset
| 0.999049 |
1411.5853
|
Colm \'O D\'unlaing
|
Colm \'O D\'unlaing
|
An ACCL which is not a CRCL
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is fairly easy to show that every regular set is an almost-confluent
congruential language (ACCL), and it is known that every regular set is a
Church-Rosser congruential language (CRCL). Whether there exists an ACCL, which
is not a CRCL, seems to remain an open question. In this note we present one
such ACCL.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2014 12:56:39 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Dec 2014 10:48:47 GMT"
}
] | 2014-12-03T00:00:00 |
[
[
"Dúnlaing",
"Colm Ó",
""
]
] |
new_dataset
| 0.999414 |
1412.0784
|
Linus Hamilton
|
Linus Hamilton
|
Braid is undecidable
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Braid is a 2008 puzzle game centered around the ability to reverse time. We
show that Braid can simulate an arbitrary computation. Our construction makes
no use of Braid's unique time mechanics, and therefore may apply to many other
video games.
We also show that a plausible "bounded" variant of Braid lies within
2-EXPSPACE. Our proof relies on a technical lemma about Turing machines which
may be of independent interest. Namely, define a braidlike Turing machine to be
a Turing machine that, when it writes to the tape, deletes all data on the tape
to the right of the head. We prove that deciding the behavior of such a machine
lies in EXPSPACE.
|
[
{
"version": "v1",
"created": "Tue, 2 Dec 2014 05:29:18 GMT"
}
] | 2014-12-03T00:00:00 |
[
[
"Hamilton",
"Linus",
""
]
] |
new_dataset
| 0.990143 |
1305.6395
|
Gabriele Fici
|
Golnaz Badkobeh, Gabriele Fici, Zsuzsanna Lipt\'ak
|
On the Number of Closed Factors in a Word
|
Accepted to LATA 2015
| null | null | null |
cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A closed word (a.k.a. periodic-like word or complete first return) is a word
whose longest border does not have internal occurrences, or, equivalently,
whose longest repeated prefix is not right special. We investigate the
structure of closed factors of words. We show that a word of length $n$
contains at least $n+1$ distinct closed factors, and characterize those words
having exactly $n+1$ closed factors. Furthermore, we show that a word of length
$n$ can contain $\Theta(n^{2})$ many distinct closed factors.
|
[
{
"version": "v1",
"created": "Tue, 28 May 2013 07:44:39 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Oct 2014 16:29:38 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Dec 2014 08:16:17 GMT"
}
] | 2014-12-02T00:00:00 |
[
[
"Badkobeh",
"Golnaz",
""
],
[
"Fici",
"Gabriele",
""
],
[
"Lipták",
"Zsuzsanna",
""
]
] |
new_dataset
| 0.986589 |
1412.0008
|
Robert Templeman
|
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, Apu
Kapadia
|
ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We live and work in environments that are inundated with cameras embedded in
devices such as phones, tablets, laptops, and monitors. Newer wearable devices
like Google Glass, Narrative Clip, and Autographer offer the ability to quietly
log our lives with cameras from a `first person' perspective. While capturing
several meaningful and interesting moments, a significant number of images
captured by these wearable cameras can contain computer screens. Given the
potentially sensitive information that is visible on our displays, there is a
need to guard computer screens from undesired photography. People need
protection against photography of their screens, whether by other people's
cameras or their own cameras.
We present ScreenAvoider, a framework that controls the collection and
disclosure of images with computer screens and their sensitive content.
ScreenAvoider can detect images with computer screens with high accuracy and
can even go so far as to discriminate amongst screen content. We also introduce
a ScreenTag system that aids in the identification of screen content, flagging
images with highly sensitive content such as messaging applications or email
webpages. We evaluate our concept on realistic lifelogging datasets, showing
that ScreenAvoider provides a practical and useful solution that can help users
manage their privacy.
|
[
{
"version": "v1",
"created": "Fri, 28 Nov 2014 01:50:53 GMT"
}
] | 2014-12-02T00:00:00 |
[
[
"Korayem",
"Mohammed",
""
],
[
"Templeman",
"Robert",
""
],
[
"Chen",
"Dennis",
""
],
[
"Crandall",
"David",
""
],
[
"Kapadia",
"Apu",
""
]
] |
new_dataset
| 0.999682 |
1412.0065
|
Gr\'egory Rogez
|
Gregory Rogez, James S. Supancic III, Maryam Khademi, Jose Maria
Martinez Montiel, Deva Ramanan
|
3D Hand Pose Detection in Egocentric RGB-D Images
|
14 pages, 15 figures, extended version of the corresponding ECCV
workshop paper, submitted to International Journal of Computer Vision
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We focus on the task of everyday hand pose estimation from egocentric
viewpoints. For this task, we show that depth sensors are particularly
informative for extracting near-field interactions of the camera wearer with
his/her environment. Despite the recent advances in full-body pose estimation
using Kinect-like sensors, reliable monocular hand pose estimation in RGB-D
images is still an unsolved problem. The problem is considerably exacerbated
when analyzing hands performing daily activities from a first-person viewpoint,
due to severe occlusions arising from object manipulations and a limited
field-of-view. Our system addresses these difficulties by exploiting strong
priors over viewpoint and pose in a discriminative tracking-by-detection
framework. Our priors are operationalized through a photorealistic synthetic
model of egocentric scenes, which is used to generate training data for
learning depth-based pose classifiers. We evaluate our approach on an annotated
dataset of real egocentric object manipulation scenes and compare to both
commercial and academic approaches. Our method provides state-of-the-art
performance for both hand detection and pose estimation in egocentric RGB-D
images.
|
[
{
"version": "v1",
"created": "Sat, 29 Nov 2014 03:19:56 GMT"
}
] | 2014-12-02T00:00:00 |
[
[
"Rogez",
"Gregory",
""
],
[
"Supancic",
"James S.",
"III"
],
[
"Khademi",
"Maryam",
""
],
[
"Montiel",
"Jose Maria Martinez",
""
],
[
"Ramanan",
"Deva",
""
]
] |
new_dataset
| 0.994504 |
1411.7482
|
Easwar Vivek Mangipudi
|
Abhijit Bhattacharya, Sanjay Motilal Ladwa, Rachit Srivastava,
Aniruddha Mallya, Akhila Rao, Easwar Vivek. M, Deeksha G. Rao Sahib, S.V.R.
Anand, and Anurag Kumar
|
SmartConnect: A System for the Design and Deployment of Wireless Sensor
Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have developed SmartConnect, a tool that addresses the growing need for
the design and deployment of multihop wireless relay networks for connecting
sensors to a control center. Given the locations of the sensors, the traffic
that each sensor generates, the quality of service (QoS) requirements, and the
potential locations at which relays can be placed, SmartConnect helps design
and deploy a low- cost wireless multihop relay network. SmartConnect adopts a
field interactive, iterative approach, with model based network design, field
evaluation and relay augmentation per- formed iteratively until the desired QoS
is met. The design process is based on approximate combinatorial optimization
algorithms. In the paper, we provide the design choices made in SmartConnect
and describe the experimental work that led to these choices. We provide
results from some experimental deployments. Finally, we conduct an experimental
study of the robustness of the network design over long time periods (as
channel conditions slowly change), in terms of the relay augmentation and route
adaptation required.
|
[
{
"version": "v1",
"created": "Thu, 27 Nov 2014 06:52:58 GMT"
}
] | 2014-12-01T00:00:00 |
[
[
"Bhattacharya",
"Abhijit",
""
],
[
"Ladwa",
"Sanjay Motilal",
""
],
[
"Srivastava",
"Rachit",
""
],
[
"Mallya",
"Aniruddha",
""
],
[
"Rao",
"Akhila",
""
],
[
"M",
"Easwar Vivek.",
""
],
[
"Sahib",
"Deeksha G. Rao",
""
],
[
"Anand",
"S. V. R.",
""
],
[
"Kumar",
"Anurag",
""
]
] |
new_dataset
| 0.99956 |
1411.7647
|
Abuzer Yakaryilmaz
|
A. C. Cem Say and Abuzer Yakaryilmaz
|
Magic coins are useful for small-space quantum machines
|
16 pages!
| null | null | null |
cs.CC cs.FL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although polynomial-time probabilistic Turing machines can utilize
uncomputable transition probabilities to recognize uncountably many languages
with bounded error when allowed to use logarithmic space, it is known that such
"magic coins" give no additional computational power to constant-space versions
of those machines. We show that adding a few quantum bits to the model changes
the picture dramatically. For every language $L$, there exists such a two-way
quantum finite automaton that recognizes a language of the same Turing degree
as $L$ with bounded error in polynomial time. When used as verifiers in
public-coin interactive proof systems, such automata can verify membership in
all languages with bounded error, outperforming their classical counterparts,
which are known to fail for the palindromes language.
|
[
{
"version": "v1",
"created": "Thu, 27 Nov 2014 17:12:55 GMT"
}
] | 2014-12-01T00:00:00 |
[
[
"Say",
"A. C. Cem",
""
],
[
"Yakaryilmaz",
"Abuzer",
""
]
] |
new_dataset
| 0.993526 |
1411.7663
|
Stephan Schmidt Dr.
|
Stephan Schmidt
|
A Two Stage CVT / Eikonal Convection Mesh Deformation Approach for Large
Nodal Deformations
| null | null | null | null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A two step mesh deformation approach for large nodal deformations, typically
arising from non-parametric shape optimization, fluid-structure interaction or
computer graphics, is considered. Two major difficulties, collapsed cells and
an undesirable parameterization, are overcome by considering a special form of
ray tracing paired with a centroid Voronoi reparameterization. The ray
direction is computed by solving an Eikonal equation. With respect to the
Hadamard form of the shape derivative, both steps are within the kernel of the
objective and have no negative impact on the minimizer. The paper concludes
with applications in 2D and 3D fluid dynamics and automatic code generation and
manages to solve these problems without any remeshing. The methodology is
available as a FEniCS shape optimization add-on at
http://www.mathematik.uni-wuerzburg.de/~schmidt/femorph.
|
[
{
"version": "v1",
"created": "Thu, 27 Nov 2014 17:44:25 GMT"
}
] | 2014-12-01T00:00:00 |
[
[
"Schmidt",
"Stephan",
""
]
] |
new_dataset
| 0.993596 |
1411.7816
|
Murat Guzeltepe Mr
|
Murat G\"uzeltepe
|
Erratum to "Lattice constellation and codes from quadratic number
fields" [IEEE Trans. Inform. Theory, vol. 47, No. 4, May. 2001]
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We correct a partial mistake for a metric presented in the article "Lattice
constellation and codes from quadratic number fields" [IEEE Trans. Inform.
Theory, vol. 47, No. 4, May. 2001]. We show that the metric defined in the
article is not true, therefore, this brings about to destroy the encoding and
decoding procedures. Also, we define a proper metric for some codes defined in
the article and show that there exist some $1-$error correcting perfect codes
with respect to this new metric.
|
[
{
"version": "v1",
"created": "Fri, 28 Nov 2014 11:20:04 GMT"
}
] | 2014-12-01T00:00:00 |
[
[
"Güzeltepe",
"Murat",
""
]
] |
new_dataset
| 0.997074 |
1411.7820
|
Vivi Nastase
|
Vivi Nastase and Angela Fahrni
|
Coarse-grained Cross-lingual Alignment of Comparable Texts with Topic
Models and Encyclopedic Knowledge
|
9 pages, 4 figures
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method for coarse-grained cross-lingual alignment of comparable
texts: segments consisting of contiguous paragraphs that discuss the same theme
(e.g. history, economy) are aligned based on induced multilingual topics. The
method combines three ideas: a two-level LDA model that filters out words that
do not convey themes, an HMM that models the ordering of themes in the
collection of documents, and language-independent concept annotations to serve
as a cross-language bridge and to strengthen the connection between paragraphs
in the same segment through concept relations. The method is evaluated on
English and French data previously used for monolingual alignment. The results
show state-of-the-art performance in both monolingual and cross-lingual
settings.
|
[
{
"version": "v1",
"created": "Fri, 28 Nov 2014 11:33:02 GMT"
}
] | 2014-12-01T00:00:00 |
[
[
"Nastase",
"Vivi",
""
],
[
"Fahrni",
"Angela",
""
]
] |
new_dataset
| 0.99242 |
1403.7970
|
Carlo Novara
|
Carlo Novara
|
Direct design of LPV feedback controllers: technical details and
numerical examples
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper contains technical details of recent results developed by the
author, regarding the design of LPV controllers directly from experimental
data. Two numerical examples are also presented, about control of the Duffing
oscillator and control of a two-degree-of-freedom manipulator.
|
[
{
"version": "v1",
"created": "Mon, 31 Mar 2014 12:25:53 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Sep 2014 12:25:48 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Nov 2014 21:53:55 GMT"
}
] | 2014-11-27T00:00:00 |
[
[
"Novara",
"Carlo",
""
]
] |
new_dataset
| 0.988787 |
1411.7158
|
Martin Berger
|
Richard Prideaux Evans, Martin Berger
|
Cathoristic logic: A modal logic of incompatible propositions
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cathoristic logic is a multi-modal logic where negation is replaced by a
novel operator allowing the expression of incompatible sentences. We present
the syntax and semantics of the logic including complete proof rules, and
establish a number of results such as compactness, a semantic characterisation
of elementary equivalence, the existence of a quadratic-time decision
procedure, and Brandom's incompatibility semantics property. We demonstrate the
usefulness of the logic as a language for knowledge representation.
|
[
{
"version": "v1",
"created": "Wed, 26 Nov 2014 09:57:58 GMT"
}
] | 2014-11-27T00:00:00 |
[
[
"Evans",
"Richard Prideaux",
""
],
[
"Berger",
"Martin",
""
]
] |
new_dataset
| 0.964815 |
1411.7225
|
Abdelkader Baaziz
|
Abdelkader Baaziz, Luc Quoniam
|
Patents used by NPE as an Open Information System in Web 2.0 - Two mini
case studies
|
10 pages, 3 figures
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Information Systems around patents are complex, their study coupled with
a creative vision of "out of the box", overcomes the strict basic functions of
the patent. We have, on several occasions, guiding research around the patent
solely-based on information, since the writing of new patents ; invalidation of
existing patents, the creation of value-added information and their links to
other Information Systems. The traditional R&D based on heavy investments is
one type of technology transfer. But, patent information is also, another
powerful tool of technology transfer, innovation and creativity. Indeed,
conduct research on the patent, from an academic viewpoint, although not always
focusing only on financial revenue, can be considered as a form of "Non
Practicing Entities" (NPE) activity, called rightly or wrongly "Patent Trolls".
We'll see why the term "patent troll" for this activity is controversial and
inappropriate. The research we will describe in this paper falls within this
context. We show two case studies of efficient use of patent information in
Emerging countries, the first concern the pharmaceutical industry in Brazil and
the second, the oil industry in Algeria.
|
[
{
"version": "v1",
"created": "Wed, 26 Nov 2014 13:44:54 GMT"
}
] | 2014-11-27T00:00:00 |
[
[
"Baaziz",
"Abdelkader",
""
],
[
"Quoniam",
"Luc",
""
]
] |
new_dataset
| 0.990502 |
1411.7336
|
Mohammed alzaidi
|
Mohammed A. Talab, Siti Norul Huda Sheikh Abdullah, Bilal Bataineh
|
Edge direction matrixes-based local binar patterns descriptor for shape
pattern recognition
| null | null | null | null |
cs.CV cs.IR
|
http://creativecommons.org/licenses/by/3.0/
|
Shapes and texture image recognition usage is an essential branch of pattern
recognition. It is made up of techniques that aim at extracting information
from images via human knowledge and works. Local Binary Pattern (LBP) ensures
encoding global and local information and scaling invariance by introducing a
look-up table to reflect the uniformity structure of an object. However, edge
direction matrixes (EDMS) only apply global invariant descriptor which employs
first and secondary order relationships. The main idea behind this methodology
is the need of improved recognition capabilities, a goal achieved by the
combinative use of these descriptors. This collaboration aims to make use of
the major advantages each one presents, by simultaneously complementing each
other, in order to elevate their weak points. By using multiple classifier
approaches such as random forest and multi-layer perceptron neural network, the
proposed combinative descriptor are compared with the state of the art
combinative methods based on Gray-Level Co-occurrence matrix (GLCM with EDMS),
LBP and moment invariant on four benchmark dataset MPEG-7 CE-Shape-1, KTH-TIPS
image, Enghlishfnt and Arabic calligraphy . The experiments have shown the
superiority of the introduced descriptor over the GLCM with EDMS, LBP and
moment invariants and other well-known descriptor such as Scale Invariant
Feature Transform from the literature.
|
[
{
"version": "v1",
"created": "Wed, 26 Nov 2014 19:12:33 GMT"
}
] | 2014-11-27T00:00:00 |
[
[
"Talab",
"Mohammed A.",
""
],
[
"Abdullah",
"Siti Norul Huda Sheikh",
""
],
[
"Bataineh",
"Bilal",
""
]
] |
new_dataset
| 0.987507 |
1411.6667
|
Carol Wang
|
Venkatesan Guruswami and Carol Wang
|
Deletion codes in the high-noise and high-rate regimes
| null | null | null | null |
cs.IT cs.DS math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The noise model of deletions poses significant challenges in coding theory,
with basic questions like the capacity of the binary deletion channel still
being open. In this paper, we study the harder model of worst-case deletions,
with a focus on constructing efficiently decodable codes for the two extreme
regimes of high-noise and high-rate. Specifically, we construct polynomial-time
decodable codes with the following trade-offs (for any eps > 0):
(1) Codes that can correct a fraction 1-eps of deletions with rate poly(eps)
over an alphabet of size poly(1/eps);
(2) Binary codes of rate 1-O~(sqrt(eps)) that can correct a fraction eps of
deletions; and
(3) Binary codes that can be list decoded from a fraction (1/2-eps) of
deletions with rate poly(eps)
Our work is the first to achieve the qualitative goals of correcting a
deletion fraction approaching 1 over bounded alphabets, and correcting a
constant fraction of bit deletions with rate aproaching 1. The above results
bring our understanding of deletion code constructions in these regimes to a
similar level as worst-case errors.
|
[
{
"version": "v1",
"created": "Mon, 24 Nov 2014 21:54:47 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Guruswami",
"Venkatesan",
""
],
[
"Wang",
"Carol",
""
]
] |
new_dataset
| 0.996669 |
1411.6767
|
Debajyoti Mukhopadhyay Prof.
|
Vijayata Waghmare, Debajyoti Mukhopadhyay
|
Mobile Agent based Market Basket Analysis on Cloud
|
6 pages, 7 figures
| null | null | null |
cs.CY cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the design and development of a location-based mobile
shopping application for bakery product shops. Whole application is deployed on
cloud. The three-tier architecture consists of, front-end, middle-ware and
back-end. The front-end level is a location-based mobile shopping application
for android mobile devices, for purchasing bakery products of nearby places.
Front-end level also displays association among the purchased products. The
middle-ware level provides a web service to generate JSON (JavaScript Object
Notation) output from the relational database. It exchanges information and
data between mobile application and servers in cloud. The back-end level
provides the Apache Tomcat Web server and MySQL database. The application also
uses the Google Cloud Messaging for generating and sending notification of
orders to shopkeeper.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2014 08:51:45 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Waghmare",
"Vijayata",
""
],
[
"Mukhopadhyay",
"Debajyoti",
""
]
] |
new_dataset
| 0.999033 |
1411.6791
|
Tie (Tony) Luo
|
Tie Luo and Vikram Srinivasan and Mehul Motani
|
A Metric for DISH Networks: Analysis, Implications, and Applications
|
Cooperative protocol, availability of cooperation, multi-channel
multi-hop wireless network, multi-channel MAC protocols, distributed
information sharing (DISH), channel bandwidth allocation
|
IEEE Transactions on Mobile Computing, vol. 9, no. 3, pp.
376--389, March 2010
|
10.1109/TMC.2009.138
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In wireless networks, node cooperation has been exploited as a data relaying
mechanism for decades. However, the wireless channel allows for much richer
interaction among nodes. In particular, Distributed Information SHaring (DISH)
represents a new improvement to multi-channel MAC protocol design by using a
cooperative element at the control plane. In this approach, nodes exchange
control information to make up for other nodes' insufficient knowledge about
the environment, and thereby aid in their decision making. To date, what is
lacking is a theoretical understanding of DISH. In this paper, we view
cooperation as a network resource and evaluate the availability of cooperation,
$p_{co}$. We first analyze $p_{co}$ in the context of a multi-channel multi-hop
wireless network, and then perform simulations which show that the analysis
accurately characterizes $p_{co}$ as a function of underlying network
parameters. Next, we investigate the correlation between $p_{co}$ and network
metrics such as collision rate, packet delay, and throughput. We find a
near-linear relationship between $p_{co}$ and the metrics, which suggests that
$p_{co}$ can be used as an appropriate performance indicator itself. Finally,
we apply our analysis to solving a channel bandwidth allocation problem, where
we derive optimal schemes and provide general guidelines on bandwidth
allocation for DISH networks.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2014 10:22:06 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Luo",
"Tie",
""
],
[
"Srinivasan",
"Vikram",
""
],
[
"Motani",
"Mehul",
""
]
] |
new_dataset
| 0.998489 |
1411.6831
|
James Whiting
|
James G.H. Whiting, Ben P.J. de Lacy Costello, Andrew Adamatzky
|
Physarum Chip: Developments in growing computers from slime mould
|
Conference abstract presented at the Unconventional Computation &
Natural Computation 2014. University of Western Ontario, London, Ontario,
Canada, July 14-18. 2 pages
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Phychip project is a collaborative European research initiative to design
and implement computation using the organism Physarum polycephalum; it is
funded by the Seventh Framework Programme (FP7) by the European Commission
within CORDIS and the FET Proactive scheme. Included in this presentation are
details the development of a Physarum based biosensor and biological logic
gate, offering significant advancements in the respective fields. The work
demonstrates the first steps towards Physarum computation and practical
Physarum Biosensor; subsequent work will focus on development of a hybrid
electronic-Physarum device capable of implementing computation.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2014 12:19:55 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Whiting",
"James G. H.",
""
],
[
"Costello",
"Ben P. J. de Lacy",
""
],
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.998417 |
1411.6841
|
Jing Jiang
|
Jing Jiang, Minquan Cheng, Ying Miao and Dianhua Wu
|
Multimedia IPP Codes with Efficient Tracing
|
12 pages, submitted to IEEE transction on information theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Binary multimedia identifiable parent property codes (binary $t$-MIPPCs) are
used in multimedia fingerprinting schemes where the identification of users
taking part in the averaging collusion attack to illegally redistribute content
is required. In this paper, we first introduce a binary strong multimedia
identifiable parent property code (binary $t$-SMIPPC) whose tracing algorithm
is more efficient than that of a binary $t$-MIPPC. Then a composition
construction for binary $t$-SMIPPCs from $q$-ary $t$-SMIPPCs is provided.
Several infinite series of optimal $q$-ary $t$-SMIPPCs of length $2$ with $t =
2, 3$ are derived from the relationships among $t$-SMIPPCs and other
fingerprinting codes, such as $\overline{t}$-separable codes and $t$-MIPPCs.
Finally, combinatorial properties of $q$-ary $2$-SMIPPCs of length $3$ are
investigated, and optimal $q$-ary $2$-SMIPPCs of length $3$ with $q \equiv 0,
1, 2, 5 \pmod 6$ are constructed.
|
[
{
"version": "v1",
"created": "Tue, 25 Nov 2014 12:51:51 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Jiang",
"Jing",
""
],
[
"Cheng",
"Minquan",
""
],
[
"Miao",
"Ying",
""
],
[
"Wu",
"Dianhua",
""
]
] |
new_dataset
| 0.985681 |
1411.6998
|
Diego Arenas
|
Diego Arenas (IFSTTAR/COSYS/ESTAS, LAMIH), Remy Chevirer
(IFSTTAR/COSYS/ESTAS), Said Hanafi (LAMIH), Joaquin Rodriguez
(IFSTTAR/COSYS/ESTAS)
|
Solving the Periodic Timetabling Problem using a Genetic Algorithm
|
XVIII Congreso Panamericano de Ingenier\'ia de Transito, Transporte y
Logistica (PANAM 2014), Jun 2014, Santander, Spain.
http://www.panam2014.unican.es
| null | null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In railway operations, a timetable is established to determine the departure
and arrival times for the trains or other rolling stock at the different
stations or relevant points inside the rail network or a subset of this
network. The elaboration of this timetable is done to respond to the commercial
requirements for both passenger and freight traffic, but also it must respect a
set of security and capacity constraints associated with the railway network,
rolling stock and legislation. Combining these requirements and constraints, as
well as the important number of trains and schedules to plan, makes the
preparation of a feasible timetable a complex and time-consuming process, that
normally takes several months to be completed. This article addresses the
problem of generating periodic timetables, which means that the involved trains
operate in a recurrent pattern. For instance, the trains belonging to the same
train line, depart from some station every 15 minutes or one hour. To tackle
the problem, we present a constraint-based model suitable for this kind of
problem. Then, we propose a genetic algorithm, allowing a rapid generation of
feasible periodic timetables. Finally, two case studies are presented, the
first, describing a sub-set of the Netherlands rail network, and the second a
large portion of the Nord-pas-de-Calais regional rail network, both of them are
then solved using our algorithm and the results are presented and discussed.
|
[
{
"version": "v1",
"created": "Mon, 24 Nov 2014 15:24:25 GMT"
}
] | 2014-11-26T00:00:00 |
[
[
"Arenas",
"Diego",
"",
"IFSTTAR/COSYS/ESTAS, LAMIH"
],
[
"Chevirer",
"Remy",
"",
"IFSTTAR/COSYS/ESTAS"
],
[
"Hanafi",
"Said",
"",
"LAMIH"
],
[
"Rodriguez",
"Joaquin",
"",
"IFSTTAR/COSYS/ESTAS"
]
] |
new_dataset
| 0.987432 |
1005.0129
|
Mikhail Volkov
|
Dmitry S. Ananichev, Vladimir V. Gusev, Mikhail V. Volkov
|
Slowly synchronizing automata and digraphs
|
13 pages, 5 figures
|
In: A. Kucera, P. Hlineny (eds.), Mathematical Foundations of
Computer Science [Lect. Notes Comp. Sci., 6281], Springer-Verlag, 2010, 55-65
|
10.1007/978-3-642-15155-2_7
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present several infinite series of synchronizing automata for which the
minimum length of reset words is close to the square of the number of states.
These automata are closely related to primitive digraphs with large exponent.
|
[
{
"version": "v1",
"created": "Sun, 2 May 2010 09:04:27 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Ananichev",
"Dmitry S.",
""
],
[
"Gusev",
"Vladimir V.",
""
],
[
"Volkov",
"Mikhail V.",
""
]
] |
new_dataset
| 0.998455 |
1302.5793
|
Mikhail Volkov
|
Dmitry S. Ananichev, Vladimir V. Gusev, Mikhail V. Volkov
|
Primitive digraphs with large exponents and slowly synchronizing
automata
|
23 pages, 11 figures, 3 tables. This is a translation (with a
slightly updated bibliography) of the authors' paper published in Russian in:
Zapiski Nauchnyh Seminarov POMI [Kombinatorika i Teorija Grafov. IV], Vol.
402, 9-39 (2012), see ftp://ftp.pdmi.ras.ru/pub/publicat/znsl/v402/p009.pdf
Version 2: a few typos are corrected
|
J. Math. Sci. 192 (2013), 263-278
|
10.1007/s10958-013-1392-8
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present several infinite series of synchronizing automata for which the
minimum length of reset words is close to the square of the number of states.
All these automata are tightly related to primitive digraphs with large
exponent.
|
[
{
"version": "v1",
"created": "Sat, 23 Feb 2013 12:56:16 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Apr 2013 16:09:16 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Ananichev",
"Dmitry S.",
""
],
[
"Gusev",
"Vladimir V.",
""
],
[
"Volkov",
"Mikhail V.",
""
]
] |
new_dataset
| 0.992489 |
1306.3414
|
Ella Gale
|
Ella Gale, Andrew Adamatzky and Ben de Lacy Costello
|
Slime Mould Memristors
|
14 pages, 6 figures
| null |
10.1007/s12668-014-0156-3
| null |
cs.ET cond-mat.other physics.bio-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In laboratory experiments we demonstrate that protoplasmic tubes of acellular
slime mould \emph{Physarum polycephalum} show current versus voltage profiles
consistent with memristive systems and that the effect is due to the living
protoplasm of the mould. This complements previous findings on memristive
properties of other living systems (human skin and blood) and contributes to
development of self-growing bio-electronic circuits. Distinctive asymmetric
$V$-$I$ curves which were occasionally observed when the internal current is on
the same order as the driven current, are well-modelled by the concept of
active memristors.
|
[
{
"version": "v1",
"created": "Fri, 14 Jun 2013 14:44:51 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Apr 2014 14:02:10 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Gale",
"Ella",
""
],
[
"Adamatzky",
"Andrew",
""
],
[
"Costello",
"Ben de Lacy",
""
]
] |
new_dataset
| 0.997852 |
1411.6027
|
Bernhard Rumpe
|
Radu Grosu, Bernhard Rumpe
|
Concurrent Timed Port Automata
|
34 pages, 3 figures, Technical Report TUM-I9533, TU Munich, 1995
| null | null |
TUM-I9533
|
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new and powerful class of automata which are explicitly
concurrent and allow a very simple definition of composition. The novelty of
these automata is their time-synchronous message-asynchronous communication
mechanism. Time synchrony is obtained by using global clock. Message asynchrony
is obtained by requiring the automata to react to every input. Explicit
concurrency is obtained by marking each transition with a set of input and
output messages. We compare these automata with a history based approach which
uses the same communication mechanism and show that they are equivalent.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 13:07:05 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Grosu",
"Radu",
""
],
[
"Rumpe",
"Bernhard",
""
]
] |
new_dataset
| 0.997394 |
1411.6087
|
Tao Li
|
Tao Li, Pingyi Fan and Khaled Ben Letaief
|
Wireless Communication System with RF-based Energy Harvesting: From
Information Theory to Green System
|
12 pages, 12 figures, a short version will appear in GLOBECOM 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Harvesting energy from ambient environment is a new promising solution to
free electronic devices from electric wire or limited-lifetime battery, which
may find very significant applications in sensor networks and body-area
networks. This paper mainly investigate the fundamental limits of information
transmission in wireless communication system with RF-based energy harvesting,
in which a master node acts not only as an information source but also an
energy source for child node while only information is transmitted back from
child to master node. Three typical structures: optimum receiver, orthogonal
receiver and power splitting receiver are considered where two way information
transmission between two nodes under an unique external power supply constraint
at master node are jointly investigated in the viewpoint of systemic level. We
explicitly characterize the achievable capacity-rate region and also discuss
the effect of signal processing power consumption at child node. The optimal
transmission strategy corresponding to the most energy-efficient status, namely
the point on the boundary of achievable capacity-rate region, is derived with
help of conditional capacity function. Simulation confirms the substantial
gains of employing optimal transmission strategy and optimum receiver
structure. Besides, a typical application on minimizing required transmit power
to green system is presented.
|
[
{
"version": "v1",
"created": "Sat, 22 Nov 2014 06:31:43 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Li",
"Tao",
""
],
[
"Fan",
"Pingyi",
""
],
[
"Letaief",
"Khaled Ben",
""
]
] |
new_dataset
| 0.965638 |
1411.6172
|
Abhishek Sinha
|
Abhishek Sinha, Georgios Paschos, Chih-ping Li and Eytan Modiano
|
Throughput-Optimal Broadcast on Directed Acyclic Graphs
|
To appear in the proceedings of INFOCOM, 2015
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of broadcasting packets in wireless networks. At each
time slot, a network controller activates non-interfering links and forwards
packets to all nodes at a common rate; the maximum rate is referred to as the
broadcast capacity of the wireless network. Existing policies achieve the
broadcast capacity by balancing traffic over a set of spanning trees, which are
difficult to maintain in a large and time-varying wireless network. We propose
a new dynamic algorithm that achieves the broadcast capacity when the
underlying network topology is a directed acyclic graph (DAG). This algorithm
utilizes local queue-length information, does not use any global topological
structures such as spanning trees, and uses the idea of in-order packet
delivery to all network nodes. Although the in-order packet delivery constraint
leads to degraded throughput in cyclic graphs, we show that it is throughput
optimal in DAGs and can be exploited to simplify the design and analysis of
optimal algorithms. Our simulation results show that the proposed algorithm has
superior delay performance as compared to tree-based approaches.
|
[
{
"version": "v1",
"created": "Sat, 22 Nov 2014 22:07:54 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Sinha",
"Abhishek",
""
],
[
"Paschos",
"Georgios",
""
],
[
"Li",
"Chih-ping",
""
],
[
"Modiano",
"Eytan",
""
]
] |
new_dataset
| 0.987318 |
1411.6185
|
Fidel Barrera-Cruz
|
Fidel Barrera-Cruz and Penny Haxell and Anna Lubiw
|
Morphing Planar Graph Drawings with Unidirectional Moves
|
13 pages, 9 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Alamdari et al. showed that given two straight-line planar drawings of a
graph, there is a morph between them that preserves planarity and consists of a
polynomial number of steps where each step is a \emph{linear morph} that moves
each vertex at constant speed along a straight line. An important step in their
proof consists of converting a \emph{pseudo-morph} (in which contractions are
allowed) to a true morph. Here we introduce the notion of \emph{unidirectional
morphing} step, where the vertices move along lines that all have the same
direction. Our main result is to show that any planarity preserving
pseudo-morph consisting of unidirectional steps and contraction of low degree
vertices can be turned into a true morph without increasing the number of
steps. Using this, we strengthen Alamdari et al.'s result to use only
unidirectional morphs, and in the process we simplify the proof.
|
[
{
"version": "v1",
"created": "Sun, 23 Nov 2014 03:12:26 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Barrera-Cruz",
"Fidel",
""
],
[
"Haxell",
"Penny",
""
],
[
"Lubiw",
"Anna",
""
]
] |
new_dataset
| 0.979801 |
1411.6328
|
Zhiying Wang
|
Zhiying Wang, Itzhak Tamo, and Jehoshua Bruck
|
Explicit MDS Codes for Optimal Repair Bandwidth
|
17 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
MDS codes are erasure-correcting codes that can correct the maximum number of
erasures for a given number of redundancy or parity symbols. If an MDS code has
$r$ parities and no more than $r$ erasures occur, then by transmitting all the
remaining data in the code, the original information can be recovered. However,
it was shown that in order to recover a single symbol erasure, only a fraction
of $1/r$ of the information needs to be transmitted. This fraction is called
the repair bandwidth (fraction). Explicit code constructions were given in
previous works. If we view each symbol in the code as a vector or a column over
some field, then the code forms a 2D array and such codes are especially widely
used in storage systems. In this paper, we address the following question:
given the length of the column $l$, number of parities $r$, can we construct
high-rate MDS array codes with optimal repair bandwidth of $1/r$, whose code
length is as long as possible? In this paper, we give code constructions such
that the code length is $(r+1)\log_r l$.
|
[
{
"version": "v1",
"created": "Mon, 24 Nov 2014 02:28:06 GMT"
}
] | 2014-11-25T00:00:00 |
[
[
"Wang",
"Zhiying",
""
],
[
"Tamo",
"Itzhak",
""
],
[
"Bruck",
"Jehoshua",
""
]
] |
new_dataset
| 0.998773 |
1411.5127
|
Oscar Stiffelman
|
Oscar Stiffelman
|
PivotCompress: Compression by Sorting
|
preprint, compression by sorting, quicksort as universal code; this
version describes the permutation vector and its inverse
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sorted data is usually easier to compress than unsorted permutations of the
same data. This motivates a simple compression scheme: specify the sorted
permutation of the data along with a representation of the sorted data
compressed recursively. The sorted permutation can be specified by recording
the decisions made by quicksort. If the size of the data is known, then the
quicksort decisions describe the data at a rate that is nearly as efficient as
the minimal prefix-free code for the distribution, which is bounded by the
entropy of the distribution. This is possible even though the distribution is
unknown ahead of time. Used in this way, quicksort acts as a universal code in
that it is asymptotically optimal for any stationary source. The Shannon
entropy is a lower bound when describing stochastic, independent symbols.
However, it is possible to encode non-uniform, finite strings below the entropy
of the sample distribution by also encoding symbol counts because the values in
the sequence are no longer independent once the counts are known. The key
insight is that sparse quicksort comparison vectors can also be compressed to
achieve an even lower rate when data is highly non-uniform while incurring only
a modest penalty when data is random.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 06:48:20 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Nov 2014 01:37:51 GMT"
}
] | 2014-11-24T00:00:00 |
[
[
"Stiffelman",
"Oscar",
""
]
] |
new_dataset
| 0.979006 |
1411.5765
|
Franck Dernoncourt
|
Franck Dernoncourt
|
TrackMania is NP-complete
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that completing an untimed, unbounded track in TrackMania Nations
Forever is NP-complete by using a reduction from 3-SAT and showing that a
solution can be checked in polynomial time.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2014 04:08:28 GMT"
}
] | 2014-11-24T00:00:00 |
[
[
"Dernoncourt",
"Franck",
""
]
] |
new_dataset
| 0.998492 |
1411.5782
|
Chong Shangguan
|
Chong Shangguan, Xin Wang, Gennian Ge and Ying Miao
|
New Bounds For Frameproof Codes
|
7 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Frameproof codes are used to fingerprint digital data. It can prevent
copyrighted materials from unauthorized use. In this paper, we study upper and
lower bounds for $w$-frameproof codes of length $N$ over an alphabet of size
$q$. The upper bound is based on a combinatorial approach and the lower bound
is based on a probabilistic construction. Both bounds can improve previous
results when $q$ is small compared to $w$, say $cq\leq w$ for some constant
$c\leq q$. Furthermore, we pay special attention to binary frameproof codes. We
show a binary $w$-frameproof code of length $N$ can not have more than $N$
codewords if $N<\binom{w+1}{2}$.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2014 07:47:09 GMT"
}
] | 2014-11-24T00:00:00 |
[
[
"Shangguan",
"Chong",
""
],
[
"Wang",
"Xin",
""
],
[
"Ge",
"Gennian",
""
],
[
"Miao",
"Ying",
""
]
] |
new_dataset
| 0.967132 |
1411.5951
|
Tom van der Zanden
|
Tom C. van der Zanden and Hans L. Bodlaender
|
PSPACE-completeness of Bloxorz and of Games with 2-Buttons
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bloxorz is an online puzzle game where players move a 1 by 1 by 2 block by
tilting it on a subset of the two dimensional grid. Bloxorz features switches
that open and close trapdoors. The puzzle is to move the block from its initial
position to an upright position on the destination square. We show that the
problem of deciding whether a given Bloxorz level is solvable is
PSPACE-complete and that this remains so even when all trapdoors are initially
closed or all trapdoors are initially open. We also answer an open question of
Viglietta, showing that 2-buttons are sufficient for PSPACE-hardness of general
puzzle games. We also examine the hardness of some variants of Bloxorz,
including variants where the block is a 1 by 1 by 1 cube, and variants with
single-use tiles.
|
[
{
"version": "v1",
"created": "Fri, 21 Nov 2014 16:46:40 GMT"
}
] | 2014-11-24T00:00:00 |
[
[
"van der Zanden",
"Tom C.",
""
],
[
"Bodlaender",
"Hans L.",
""
]
] |
new_dataset
| 0.997801 |
1007.4053
|
Harry Enke
|
Harry Enke (AIP), Matthias Steinmetz (AIP), Hans-Martin Adorf (MPA),
Alexander Beck-Ratzka (AEI), Frank Breitling (AIP), Thomas Bruesemeister
(ZAH), Arthur Carlson (MPE), Torsten Ensslin (MPA), Mikael Hoegqvist (ZIB),
Iliya Nickelt (AIP), Thomas Radke (AEI), Alexander Reinefeld (ZIB), Angelika
Reiser (TUM), Tobias Scholl (TUM), Rainer Spurzem (ZAH, NAOC), Juergen
Steinacker (ZAH), Wolfgang Voges (MPE), Joachim Wambsganss (ZAH), Steve White
(AIP)
|
AstroGrid-D: Grid Technology for Astronomical Science
|
14 pages, 12 figures Subjects: data analysis, image processing,
robotic telescopes, simulations, grid. Accepted for publication in New
Astronomy
|
New Astron.16:79-93,2011
|
10.1016/j.newast.2010.07.005
| null |
cs.DC astro-ph.IM cs.DB cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present status and results of AstroGrid-D, a joint effort of
astrophysicists and computer scientists to employ grid technology for
scientific applications. AstroGrid-D provides access to a network of
distributed machines with a set of commands as well as software interfaces. It
allows simple use of computer and storage facilities and to schedule or monitor
compute tasks and data management. It is based on the Globus Toolkit middleware
(GT4). Chapter 1 describes the context which led to the demand for advanced
software solutions in Astrophysics, and we state the goals of the project. We
then present characteristic astrophysical applications that have been
implemented on AstroGrid-D in chapter 2. We describe simulations of different
complexity, compute-intensive calculations running on multiple sites, and
advanced applications for specific scientific purposes, such as a connection to
robotic telescopes. We can show from these examples how grid execution improves
e.g. the scientific workflow. Chapter 3 explains the software tools and
services that we adapted or newly developed. Section 3.1 is focused on the
administrative aspects of the infrastructure, to manage users and monitor
activity. Section 3.2 characterises the central components of our architecture:
The AstroGrid-D information service to collect and store metadata, a file
management system, the data management system, and a job manager for automatic
submission of compute tasks. We summarise the successfully established
infrastructure in chapter 4, concluding with our future plans to establish
AstroGrid-D as a platform of modern e-Astronomy.
|
[
{
"version": "v1",
"created": "Fri, 23 Jul 2010 06:50:52 GMT"
}
] | 2014-11-21T00:00:00 |
[
[
"Enke",
"Harry",
"",
"AIP"
],
[
"Steinmetz",
"Matthias",
"",
"AIP"
],
[
"Adorf",
"Hans-Martin",
"",
"MPA"
],
[
"Beck-Ratzka",
"Alexander",
"",
"AEI"
],
[
"Breitling",
"Frank",
"",
"AIP"
],
[
"Bruesemeister",
"Thomas",
"",
"ZAH"
],
[
"Carlson",
"Arthur",
"",
"MPE"
],
[
"Ensslin",
"Torsten",
"",
"MPA"
],
[
"Hoegqvist",
"Mikael",
"",
"ZIB"
],
[
"Nickelt",
"Iliya",
"",
"AIP"
],
[
"Radke",
"Thomas",
"",
"AEI"
],
[
"Reinefeld",
"Alexander",
"",
"ZIB"
],
[
"Reiser",
"Angelika",
"",
"TUM"
],
[
"Scholl",
"Tobias",
"",
"TUM"
],
[
"Spurzem",
"Rainer",
"",
"ZAH, NAOC"
],
[
"Steinacker",
"Juergen",
"",
"ZAH"
],
[
"Voges",
"Wolfgang",
"",
"MPE"
],
[
"Wambsganss",
"Joachim",
"",
"ZAH"
],
[
"White",
"Steve",
"",
"AIP"
]
] |
new_dataset
| 0.997833 |
1309.5049
|
Ruizhi Liao
|
Ruizhi Liao, Boris Bellalta, Trang Cao Minh, Jaume Barcelo, Miquel
Oliver
|
Uni-MUMAC: A Unified Down/Up-link MU-MIMO MAC Protocol for IEEE 802.11ac
WLANs
|
27 pages, 16 figures
| null |
10.1007/s11276-014-0861-4
| null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Due to the dominance of the downlink traffic in Wireless Local Area Networks
(WLANs), a large number of previous research efforts have been put to enhance
the transmission from the Access Point (AP) to stations (STAs). The downlink
Multi-User Multiple-Input Multiple-Output (MU-MIMO) technique, supported by the
latest IEEE amendment-802.11ac, is considered as one of the key enhancements
leading WLANs to the Gigabit era. However, as cloud uploading services,
Peer-to-Peer (P2P) and telepresence applications get popular, the need for a
higher uplink capacity becomes inevitable.
In this paper, a unified down/up-link Medium Access Control (MAC) protocol
called Uni-MUMAC is proposed to enhance the performance of IEEE 802.11ac WLANs
by exploring the multi-user spatial multiplexing technique. Specifically, in
the downlink, we implement an IEEE 802.11ac-compliant MU-MIMO transmission
scheme to allow the AP to simultaneously send frames to a group of STAs. In the
uplink, we extend the traditional one round channel access contention to two
rounds, which coordinate multiple STAs to transmit frames to the AP
simultaneously. 2-nd round Contention Window (CW2nd), a parameter that makes
the length of the 2-nd contention round elastic according to the traffic
condition, is introduced. Uni-MUMAC is evaluated through simulations in
saturated and non-saturated conditions when both downlink and uplink traffic
are present in the system. We also propose an analytic saturation model to
validate the simulation results. By properly setting CW2nd and other
parameters, Uni-MUMAC is compared to a prominent multi-user transmission scheme
in the literature. The results exhibit that Uni-MUMAC not only performs well in
the downlink-dominant scenario, but it is also able to balance both the
downlink and uplink throughput in the emerging uplink bandwidth-hungry
scenario.
|
[
{
"version": "v1",
"created": "Thu, 19 Sep 2013 16:49:16 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Dec 2013 14:02:56 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Sep 2014 10:08:15 GMT"
}
] | 2014-11-21T00:00:00 |
[
[
"Liao",
"Ruizhi",
""
],
[
"Bellalta",
"Boris",
""
],
[
"Minh",
"Trang Cao",
""
],
[
"Barcelo",
"Jaume",
""
],
[
"Oliver",
"Miquel",
""
]
] |
new_dataset
| 0.995062 |
1411.5394
|
Shyamnath Gollakota
|
Rajalakshmi Nandakumar and Bryce Kellogg and Shyamnath Gollakota
|
Wi-Fi Gesture Recognition on Existing Devices
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces the first wireless gesture recognition system that
operates using existingWi-Fi signals and devices. To achieve this, we first
identify limitations of existing wireless gesture recognition approaches that
limit their applicability to Wi-Fi. We then introduce algorithms that can
classify gestures using information that is readily available on Wi-Fi devices.
We demonstrate the feasibility of our design using a prototype implementation
on off-the-shelf Wi-Fi devices. Our results show that we can achieve a
classification accuracy of 91% while classifying four gestures across six
participants, without the need for per-participant training. Finally, we show
the feasibility of gesture recognition in non-line-ofsight situations with the
participants interacting with a Wi-Fi device placed in a backpack.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 21:55:20 GMT"
}
] | 2014-11-21T00:00:00 |
[
[
"Nandakumar",
"Rajalakshmi",
""
],
[
"Kellogg",
"Bryce",
""
],
[
"Gollakota",
"Shyamnath",
""
]
] |
new_dataset
| 0.981942 |
1410.0745
|
Robinson Piramuthu Robinson Piramuthu
|
Qiaosong Wang, Vignesh Jagadeesh, Bryan Ressler, Robinson Piramuthu
|
Im2Fit: Fast 3D Model Fitting and Anthropometrics using Single Consumer
Depth Camera and Synthetic Data
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent advances in consumer depth sensors have created many opportunities for
human body measurement and modeling. Estimation of 3D body shape is
particularly useful for fashion e-commerce applications such as virtual try-on
or fit personalization. In this paper, we propose a method for capturing
accurate human body shape and anthropometrics from a single consumer grade
depth sensor. We first generate a large dataset of synthetic 3D human body
models using real-world body size distributions. Next, we estimate key body
measurements from a single monocular depth image. We combine body measurement
estimates with local geometry features around key joint positions to form a
robust multi-dimensional feature vector. This allows us to conduct a fast
nearest-neighbor search to every sample in the dataset and return the closest
one. Compared to existing methods, our approach is able to predict accurate
full body parameters from a partial view using measurement parameters learned
from the synthetic dataset. Furthermore, our system is capable of generating 3D
human mesh models in real-time, which is significantly faster than methods
which attempt to model shape and pose deformations. To validate the efficiency
and applicability of our system, we collected a dataset that contains frontal
and back scans of 83 clothed people with ground truth height and weight.
Experiments on real-world dataset show that the proposed method can achieve
real-time performance with competing results achieving an average error of 1.9
cm in estimated measurements.
|
[
{
"version": "v1",
"created": "Fri, 3 Oct 2014 02:33:08 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Nov 2014 20:30:32 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Wang",
"Qiaosong",
""
],
[
"Jagadeesh",
"Vignesh",
""
],
[
"Ressler",
"Bryan",
""
],
[
"Piramuthu",
"Robinson",
""
]
] |
new_dataset
| 0.999429 |
1411.5078
|
Triet Vo-Huu
|
Triet D. Vo-Huu and Guevara Noubir
|
CBM: A Crypto-Coded Modulation Scheme for Rate Information Concealing
and Robustness Boosting
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Exposing the rate information of wireless transmission enables highly
efficient attacks that can severely degrade the performance of a network at
very low cost. In this paper, we introduce an integrated solution to conceal
the rate information of wireless transmissions while simultaneously boosting
the resiliency against interference. The proposed solution is based on a
generalization of Trellis Coded Modulation combined with Cryptographic
Interleaving. We develop algorithms for discovering explicit codes for
concealing any modulation in {BPSK, QPSK, 8-PSK, 16-QAM, 64-QAM}. We
demonstrate that in most cases this modulation hiding scheme has the side
effect of boosting resiliency by up to 8.5dB.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 00:14:29 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Vo-Huu",
"Triet D.",
""
],
[
"Noubir",
"Guevara",
""
]
] |
new_dataset
| 0.998633 |
1411.5161
|
Achmad Benny Mutiara
|
A.B. Mutiara, R. Refianti, B.A. Witono
|
Developing a SAAS-Cloud Integrated Development Environment (IDE) for C,
C++, and Java
|
9 pages. arXiv admin note: text overlap with arXiv:1410.1159,
arXiv:1304.4047 by other authors
|
Journal of Theoretical and Applied Information Technology, Vol. 68
No.1, 2014
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud era brought revolution of computerization world. People could access
their data from anywhere and anytime with different devices. One of the cloud's
model is Software as a Service, which capable to provide applications that run
on a cloud infrastructure.An IDE (Integrated Development Environment) is the
most popular tool to develop application in the network or single computer
development. By installing IDE in each computer of the network could causes the
lot of time and budget spending. The objective of the research is developing an
efficient cloud based IDE. The IDE could compile the code which sent from
client browser through SaaS IDE to the server and send it back to the client.
The method that used in the research is the System Development Life-Cycle:
Waterfall and Unified Model Language as system designing tool. The research
successfully produced the cloud-based SaaS IDE with excellent result from
several testing in local network and internet.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 09:55:44 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Mutiara",
"A. B.",
""
],
[
"Refianti",
"R.",
""
],
[
"Witono",
"B. A.",
""
]
] |
new_dataset
| 0.998048 |
1411.5255
|
Alex James Dr
|
Alex Pappachen James, Dinesh S. Kumar, Arun Ajayan
|
Threshold Logic Computing: Memristive-CMOS Circuits for Fast Fourier
Transform and Vedic Multiplication
|
5 Pages, IEEE Transactions on Very Large Scale Integration (VLSI)
Systems, 2014
| null |
10.1109/TVLSI.2014.2371857
| null |
cs.ET cs.AR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Brain inspired circuits can provide an alternative solution to implement
computing architectures taking advantage of fault tolerance and generalisation
ability of logic gates. In this brief, we advance over the memristive threshold
circuit configuration consisting of memristive averaging circuit in combination
with operational amplifier and/or CMOS inverters in application to realizing
complex computing circuits. The developed memristive threshold logic gates are
used for designing FFT and multiplication circuits useful for modern
microprocessors. Overall, the proposed threshold logic outperforms previous
memristive-CMOS logic cells on every aspect, however, indicate a lower chip
area, lower THD, and controllable leakage power, but a higher power dissipation
with respect to CMOS logic.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 15:36:23 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"James",
"Alex Pappachen",
""
],
[
"Kumar",
"Dinesh S.",
""
],
[
"Ajayan",
"Arun",
""
]
] |
new_dataset
| 0.998842 |
1411.5343
|
Subodh Paudel
|
Subodh Paudel, Jagan Nath Shrestha, Fernando J Neto, Jorge AF
Ferreira, Muna Adhikari
|
Optimization of Hybrid PV/Wind Power System for Remote Telecom Station
| null | null |
10.1109/ICPES.2011.6156618
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rapid depletion of fossil fuel resources and environmental concerns has
given awareness on generation of renewable energy resources. Among the various
renewable resources, hybrid solar and wind energy seems to be promising
solutions to provide reliable power supply with improved system efficiency and
reduced storage requirements for stand-alone applications. This paper presents
a feasibility assessment and optimum size of photovoltaic (PV) array, wind
turbine and battery bank for a standalone hybrid Solar/Wind Power system
(HSWPS) at remote telecom station of Nepal at Latitude (27{\deg}23'50") and
Longitude (86{\deg}44'23") consisting a telecommunication load of Very Small
Aperture Terminal (VSAT), Repeater station and Code Division Multiple Access
Base Transceiver Station (CDMA 2C10 BTS). In any RES based system, the
feasibility assessment is considered as the first step analysis. In this work,
feasibility analysis is carried through hybrid optimization model for electric
renewables (HOMER) and mathematical models were implemented in the MATLAB
environment to perform the optimal configuration for a given load and a desired
loss of power supply probability (LPSP) from a set of systems components with
the lowest value of cost function defined in terms of reliability and levelized
unit electricity cost (LUCE). The simulation results for the existing and the
proposed models are compared. The simulation results shows that existing
architecture consisting of 6.12 kW KC85T photovoltaic modules, 1kW H3.1 wind
turbine and 1600 Ah GFM-800 battery bank have a 36.6% of unmet load during a
year. On the other hand, the proposed system includes 1kW *2 H3.1 Wind turbine,
8.05 kW TSM-175DA01 photovoltaic modules and 1125 Ah T-105 battery bank with
system reliability of 99.99% with a significant cost reduction as well as
reliable energy production.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 20:01:44 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Paudel",
"Subodh",
""
],
[
"Shrestha",
"Jagan Nath",
""
],
[
"Neto",
"Fernando J",
""
],
[
"Ferreira",
"Jorge AF",
""
],
[
"Adhikari",
"Muna",
""
]
] |
new_dataset
| 0.980625 |
1411.4670
|
Mohamed Hussein
|
Mohamed E. Hussein and Marwan Torki and Ahmed Elsallamy and Mahmoud
Fayyaz
|
AlexU-Word: A New Dataset for Isolated-Word Closed-Vocabulary Offline
Arabic Handwriting Recognition
|
6 pages, 8 figure, and 6 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce the first phase of a new dataset for offline
Arabic handwriting recognition. The aim is to collect a very large dataset of
isolated Arabic words that covers all letters of the alphabet in all possible
shapes using a small number of simple words. The end goal is to collect a very
large dataset of segmented letter images, which can be used to build and
evaluate Arabic handwriting recognition systems that are based on segmented
letter recognition. The current version of the dataset contains $25114$ samples
of $109$ unique Arabic words that cover all possible shapes of all alphabet
letters. The samples were collected from $907$ writers. In its current form,
the dataset can be used for the problem of closed-vocabulary word recognition.
We evaluated a number of window-based descriptors and classifiers on this task
and obtained an accuracy of $92.16\%$ using a SIFT-based descriptor and ANN.
|
[
{
"version": "v1",
"created": "Mon, 17 Nov 2014 21:23:26 GMT"
}
] | 2014-11-19T00:00:00 |
[
[
"Hussein",
"Mohamed E.",
""
],
[
"Torki",
"Marwan",
""
],
[
"Elsallamy",
"Ahmed",
""
],
[
"Fayyaz",
"Mahmoud",
""
]
] |
new_dataset
| 0.999883 |
1411.4692
|
Ishay Haviv
|
Ishay Haviv, Ning Xie
|
Sunflowers and Testing Triangle-Freeness of Functions
|
21 pages, ITCS 2015
| null | null | null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A function $f: \mathbb{F}_2^n \rightarrow \{0,1\}$ is triangle-free if there
are no $x_1,x_2,x_3 \in \mathbb{F}_2^n$ satisfying $x_1+x_2+x_3=0$ and
$f(x_1)=f(x_2)=f(x_3)=1$. In testing triangle-freeness, the goal is to
distinguish with high probability triangle-free functions from those that are
$\varepsilon$-far from being triangle-free. It was shown by Green that the
query complexity of the canonical tester for the problem is upper bounded by a
function that depends only on $\varepsilon$ (GAFA, 2005), however the best
known upper bound is a tower type function of $1/\varepsilon$. The best known
lower bound on the query complexity of the canonical tester is
$1/\varepsilon^{13.239}$ (Fu and Kleinberg, RANDOM, 2014).
In this work we introduce a new approach to proving lower bounds on the query
complexity of triangle-freeness. We relate the problem to combinatorial
questions on collections of vectors in $\mathbb{Z}_D^n$ and to sunflower
conjectures studied by Alon, Shpilka, and Umans (Comput. Complex., 2013). The
relations yield that a refutation of the Weak Sunflower Conjecture over
$\mathbb{Z}_4$ implies a super-polynomial lower bound on the query complexity
of the canonical tester for triangle-freeness. Our results are extended to
testing $k$-cycle-freeness of functions with domain $\mathbb{F}_p^n$ for every
$k \geq 3$ and a prime $p$. In addition, we generalize the lower bound of Fu
and Kleinberg to $k$-cycle-freeness for $k \geq 4$ by generalizing the
construction of uniquely solvable puzzles due to Coppersmith and Winograd (J.
Symbolic Comput., 1990).
|
[
{
"version": "v1",
"created": "Mon, 17 Nov 2014 23:04:38 GMT"
}
] | 2014-11-19T00:00:00 |
[
[
"Haviv",
"Ishay",
""
],
[
"Xie",
"Ning",
""
]
] |
new_dataset
| 0.974741 |
1411.4956
|
Etienne Burdet
|
Etienne Burdet, Morgane Colombert, Denis Morand, Youssef Diab
|
Integrated canopy, building energy and radiosity model for 3D urban
design
| null | null | null | null |
cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an integrated, three dimensional, model of urban canopy, building
energy and radiosity, for early stage urban designs and test it on four urban
morphologies. All sub-models share a common descriptions of the urban
morphology, similar to 3D urban design master plans and have simple parameters.
The canopy model is a multilayer model, with a new discrete layer approach that
does not rely on simplified geometry such as canyon or regular arrays. The
building energy model is a simplified RC equivalent model, with no hypotheses
on internal zoning or wall composition. We use the CitySim software for the
radiosity model. We study the effects of convexity, the number of buildings and
building height, at constant density and thermal characteristics. Our results
suggest that careful three dimensional morphology design can reduce heat demand
by a factor of 2, especially by improving insolation of lower levels. The most
energy efficient morphology in our simulations has both the highest
surface/volume ratio and the biggest impact on the urban climate.
|
[
{
"version": "v1",
"created": "Mon, 17 Nov 2014 14:20:14 GMT"
}
] | 2014-11-19T00:00:00 |
[
[
"Burdet",
"Etienne",
""
],
[
"Colombert",
"Morgane",
""
],
[
"Morand",
"Denis",
""
],
[
"Diab",
"Youssef",
""
]
] |
new_dataset
| 0.983124 |
1208.5188
|
Andrew King
|
Katherine Edwards and Andrew D. King
|
A superlocal version of Reed's Conjecture
|
17 pages, 3 figures. arXiv admin note: substantial text overlap with
arXiv:1109.2112
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reed's well-known $\omega$, $\Delta$, $\chi$ conjecture proposes that every
graph satisfies $\chi \leq \lceil \frac 12(\Delta+1+\omega)\rceil$. The second
author formulated a {\em local strengthening} of this conjecture that considers
a bound supplied by the neighbourhood of a single vertex. Following the idea
that the chromatic number cannot be greatly affected by any particular stable
set of vertices, we propose a further strengthening that considers a bound
supplied by the neighbourhoods of two adjacent vertices. We provide some
fundamental evidence in support, namely that the stronger bound holds in the
fractional relaxation and holds for both quasi-line graphs and graphs with
stability number two. We also conjecture that in the fractional version, we can
push the locality even further.
|
[
{
"version": "v1",
"created": "Sun, 26 Aug 2012 04:01:31 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Nov 2014 00:23:25 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Edwards",
"Katherine",
""
],
[
"King",
"Andrew D.",
""
]
] |
new_dataset
| 0.997187 |
1407.7061
|
Ciaran McCreesh
|
Ciaran McCreesh and Patrick Prosser
|
A Parallel Branch and Bound Algorithm for the Maximum Labelled Clique
Problem
|
Author-final version. Accepted to Optimization Letters
| null | null | null |
cs.DS cs.DC cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The maximum labelled clique problem is a variant of the maximum clique
problem where edges in the graph are given labels, and we are not allowed to
use more than a certain number of distinct labels in a solution. We introduce a
new branch-and-bound algorithm for the problem, and explain how it may be
parallelised. We evaluate an implementation on a set of benchmark instances,
and show that it is consistently faster than previously published results,
sometimes by four or five orders of magnitude.
|
[
{
"version": "v1",
"created": "Fri, 25 Jul 2014 21:11:13 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 14:46:09 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"McCreesh",
"Ciaran",
""
],
[
"Prosser",
"Patrick",
""
]
] |
new_dataset
| 0.995539 |
1409.4744
|
Jun Lin
|
Jun Lin and Zhiyuan Yan
|
An Efficient List Decoder Architecture for Polar Codes
|
12 pages, accepted by IEEE TVLSI Systems
| null | null | null |
cs.AR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Long polar codes can achieve the symmetric capacity of arbitrary binary-input
discrete memoryless channels under a low complexity successive cancelation (SC)
decoding algorithm. However, for polar codes with short and moderate code
length, the decoding performance of the SC algorithm is inferior. The cyclic
redundancy check (CRC) aided successive cancelation list (SCL) decoding
algorithm has better error performance than the SC algorithm for short or
moderate polar codes. In this paper, we propose an efficient list decoder
architecture for the CRC aided SCL algorithm, based on both algorithmic
reformulations and architectural techniques. In particular, an area efficient
message memory architecture is proposed to reduce the area of the proposed
decoder architecture. An efficient path pruning unit suitable for large list
size is also proposed. For a polar code of length 1024 and rate $\frac{1}{2}$,
when list size $L=2$ and 4, the proposed list decoder architecture is
implemented under a TSMC 90nm CMOS technology. Compared with the list decoders
in the literature, our decoder achieves 1.33 to 1.96 times hardware efficiency.
|
[
{
"version": "v1",
"created": "Tue, 16 Sep 2014 19:39:49 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Nov 2014 15:59:04 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Lin",
"Jun",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
new_dataset
| 0.977856 |
1411.0740
|
Ahmadreza Baghaie
|
Ahmadreza Baghaie, Roshan M. D'souza, Zeyun Yu
|
State-of-the-Art in Retinal Optical Coherence Tomography Image Analysis
|
Added references, corrected typos
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Optical Coherence Tomography (OCT) is one of the most emerging imaging
modalities that has been used widely in the field of biomedical imaging. From
its emergence in 1990's, plenty of hardware and software improvements have been
made. Its applications range from ophthalmology to dermatology to coronary
imaging etc. Here, the focus is on applications of OCT in ophthalmology and
retinal imaging. OCT is able to non-invasively produce cross-sectional volume
images of the tissues which are further used for analysis of the tissue
structure and its properties. Due to the underlying physics, OCT images usually
suffer from a granular pattern, called speckle noise, which restricts the
process of interpretation, hence requiring specialized noise reduction
techniques to remove the noise while preserving image details. Also, given the
fact that OCT images are in the $\mu m$ -level, further analysis in needed to
distinguish between the different structures in the imaged volume. Therefore
the use of different segmentation techniques are of high importance. The
movement of the tissue under imaging or the progression of disease in the
tissue also imposes further implications both on the quality and the proper
interpretation of the acquired images. Thus, use of image registration
techniques can be very helpful. In this work, an overview of such image
analysis techniques will be given.
|
[
{
"version": "v1",
"created": "Tue, 4 Nov 2014 00:10:57 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 20:36:38 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Baghaie",
"Ahmadreza",
""
],
[
"D'souza",
"Roshan M.",
""
],
[
"Yu",
"Zeyun",
""
]
] |
new_dataset
| 0.997649 |
1411.3519
|
Mohamed Hussein
|
Marwan Torki, Mohamed E. Hussein, Ahmed Elsallamy, Mahmoud Fayyaz,
Shehab Yaser
|
Window-Based Descriptors for Arabic Handwritten Alphabet Recognition: A
Comparative Study on a Novel Dataset
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a comparative study for window-based descriptors on the
application of Arabic handwritten alphabet recognition. We show a detailed
experimental evaluation of different descriptors with several classifiers. The
objective of the paper is to evaluate different window-based descriptors on the
problem of Arabic letter recognition. Our experiments clearly show that they
perform very well. Moreover, we introduce a novel spatial pyramid partitioning
scheme that enhances the recognition accuracy for most descriptors. In
addition, we introduce a novel dataset for Arabic handwritten isolated alphabet
letters, which can serve as a benchmark for future research.
|
[
{
"version": "v1",
"created": "Thu, 13 Nov 2014 12:22:57 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2014 17:55:32 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Torki",
"Marwan",
""
],
[
"Hussein",
"Mohamed E.",
""
],
[
"Elsallamy",
"Ahmed",
""
],
[
"Fayyaz",
"Mahmoud",
""
],
[
"Yaser",
"Shehab",
""
]
] |
new_dataset
| 0.999161 |
1411.4246
|
Md Lisul Islam
|
Md. Lisul Islam, Swakkhar Shatabda and M. Sohel Rahman
|
GreMuTRRR: A Novel Genetic Algorithm to Solve Distance Geometry Problem
for Protein Structures
|
Accepted for publication in the 8th International Conference on
Electrical and Computer Engineering (ICECE 2014)
| null | null | null |
cs.NE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nuclear Magnetic Resonance (NMR) Spectroscopy is a widely used technique to
predict the native structure of proteins. However, NMR machines are only able
to report approximate and partial distances between pair of atoms. To build the
protein structure one has to solve the Euclidean distance geometry problem
given the incomplete interval distance data produced by NMR machines. In this
paper, we propose a new genetic algorithm for solving the Euclidean distance
geometry problem for protein structure prediction given sparse NMR data. Our
genetic algorithm uses a greedy mutation operator to intensify the search, a
twin removal technique for diversification in the population and a random
restart method to recover stagnation. On a standard set of benchmark dataset,
our algorithm significantly outperforms standard genetic algorithms.
|
[
{
"version": "v1",
"created": "Sun, 16 Nov 2014 11:26:06 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Islam",
"Md. Lisul",
""
],
[
"Shatabda",
"Swakkhar",
""
],
[
"Rahman",
"M. Sohel",
""
]
] |
new_dataset
| 0.998544 |
1411.4299
|
Anupama Aggarwal
|
Anupama Aggarwal, Ponnurangam Kumaraguru
|
What They Do in Shadows: Twitter Underground Follower Market
|
arXiv admin note: text overlap with arXiv:1408.1534
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet users and businesses are increasingly using online social networks
(OSN) to drive audience traffic and increase their popularity. In order to
boost social presence, OSN users need to increase the visibility and reach of
their online profile, like - Facebook likes, Twitter followers, Instagram
comments and Yelp reviews. For example, an increase in Twitter followers not
only improves the audience reach of the user but also boosts the perceived
social reputation and popularity. This has led to a scope for an underground
market that provides followers, likes, comments, etc. via a network of
fraudulent and compromised accounts and various collusion techniques.
In this paper, we landscape the underground markets that provide Twitter
followers by studying their basic building blocks - merchants, customers and
phony followers. We charecterize the services provided by merchants to
understand their operational structure and market hierarchy. Twitter
underground markets can operationalize using a premium monetary scheme or other
incentivized freemium schemes. We find out that freemium market has an
oligopoly structure with few merchants being the market leaders. We also show
that merchant popularity does not have any correlation with the quality of
service provided by the merchant to its customers. Our findings also shed light
on the characteristics and quality of market customers and the phony followers
provided. We draw comparison between legitimate users and phony followers, and
find out key identifiers to separate such users. With the help of these
differentiating features, we build a supervised learning model to predict
suspicious following behaviour with an accuracy of 89.2%.
|
[
{
"version": "v1",
"created": "Sun, 16 Nov 2014 20:10:30 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Aggarwal",
"Anupama",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.999611 |
1411.4366
|
Prashant Dahiwale Prof
|
Prashant Dahiwale, M M Raghuwanshi, Latesh malik
|
PDD Crawler: A focused web crawler using link and content analysis for
relevance prediction
|
9 pages, SEAS-2014, Dubai, UAE, International Conference 7-8 Nov 2014
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Majority of the computer or mobile phone enthusiasts make use of the web for
searching activity. Web search engines are used for the searching; The results
that the search engines get are provided to it by a software module known as
the Web Crawler. The size of this web is increasing round-the-clock. The
principal problem is to search this huge database for specific information. To
state whether a web page is relevant to a search topic is a dilemma. This paper
proposes a crawler called as PDD crawler which will follow both a link based as
well as a content based approach. This crawler follows a completely new
crawling strategy to compute the relevance of the page. It analyses the content
of the page based on the information contained in various tags within the HTML
source code and then computes the total weight of the page. The page with the
highest weight, thus has the maximum content and highest relevance.
|
[
{
"version": "v1",
"created": "Mon, 17 Nov 2014 05:33:51 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Dahiwale",
"Prashant",
""
],
[
"Raghuwanshi",
"M M",
""
],
[
"malik",
"Latesh",
""
]
] |
new_dataset
| 0.999615 |
1411.4617
|
Xudong Ma
|
Xudong Ma
|
Joint Write-Once-Memory and Error-Control Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Write-Once-Memory (WOM) is a model for many modern non-volatile memories,
such as flash memories. Recently, several capacity-achieving WOM coding schemes
have been proposed based on polar coding. Due to the fact that practical
computer memory systems always contain noises, a nature question to ask next is
how may we generalize these coding schemes, such that they may also have the
error-control capabilities. In this paper, we discuss a joint WOM and
error-control coding scheme, which is a generalization of the
capacity-achieving WOM codes based on source polarization. In this paper, we
prove a sufficient and necessary condition for the noisy reading channel being
less noisy than the test channel in data encoding in the polar WOM coding. Such
a sufficient and necessary condition is usually satisfied in reality. As a
consequence of the sufficient and necessary condition, the high entropy set
related to the noisy channel is usually strictly contained in the high entropy
set related to the test channel in data encoding. Therefore the low-complexity
polar joint WOM and error-control codes are sufficient for most practical
coding scenarios.
|
[
{
"version": "v1",
"created": "Mon, 17 Nov 2014 20:12:30 GMT"
}
] | 2014-11-18T00:00:00 |
[
[
"Ma",
"Xudong",
""
]
] |
new_dataset
| 0.997932 |
1411.3742
|
Mohammed Ahmed
|
Mohammed Ahmed
|
TCP Congestion Control Identification
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Transmission Control Protocol (TCP) carries most of the traffic on the
Internet these days. There are several implementations of TCP, and the most
important difference among them is their mechanism for controlling congestion.
One of the methods for determining type of a TCP is active probing. Active
probing considers a TCP implementation as a black box, sends different streams
of data to the appropriate host. According to the response received from the
host, it figures out the type of TCP version implemented.
TCP Behavior Inference Tool (TBIT) is an implemented tool that uses active
probing to check the running TCP on web servers. It can check several aspects
of the running TCP including initial value of congestion window, congestion
control algorithm, conformant congestion control, response to selective
acknowledgment, response to Explicit Congestion Notification (ECN) and time
wait duration. In this paper we focus on congestion control algorithm aspect of
it, explain the mechanism used by TBIT and present the results.
|
[
{
"version": "v1",
"created": "Thu, 13 Nov 2014 21:19:18 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Ahmed",
"Mohammed",
""
]
] |
new_dataset
| 0.998619 |
1411.3777
|
Ardalan Amiri Sani
|
Ardalan Amiri Sani, Lin Zhong, Dan S. Wallach
|
Glider: A GPU Library Driver for Improved System Security
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Legacy device drivers implement both device resource management and
isolation. This results in a large code base with a wide high-level interface
making the driver vulnerable to security attacks. This is particularly
problematic for increasingly popular accelerators like GPUs that have large,
complex drivers. We solve this problem with library drivers, a new driver
architecture. A library driver implements resource management as an untrusted
library in the application process address space, and implements isolation as a
kernel module that is smaller and has a narrower lower-level interface (i.e.,
closer to hardware) than a legacy driver. We articulate a set of device and
platform hardware properties that are required to retrofit a legacy driver into
a library driver. To demonstrate the feasibility and superiority of library
drivers, we present Glider, a library driver implementation for two GPUs of
popular brands, Radeon and Intel. Glider reduces the TCB size and attack
surface by about 35% and 84% respectively for a Radeon HD 6450 GPU and by about
38% and 90% respectively for an Intel Ivy Bridge GPU. Moreover, it incurs no
performance cost. Indeed, Glider outperforms a legacy driver for applications
requiring intensive interactions with the device driver, such as applications
using the OpenGL immediate mode API.
|
[
{
"version": "v1",
"created": "Fri, 14 Nov 2014 02:30:08 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Sani",
"Ardalan Amiri",
""
],
[
"Zhong",
"Lin",
""
],
[
"Wallach",
"Dan S.",
""
]
] |
new_dataset
| 0.999386 |
1411.3791
|
EPTCS
|
Mario Bravetti (University of Bologna, Italy / INRIA, France),
Gianluigi Zavattaro (University of Bologna, Italy / INRIA, France)
|
Choreographies and Behavioural Contracts on the Way to Dynamic Updates
|
In Proceedings MOD* 2014, arXiv:1411.3453
|
EPTCS 168, 2014, pp. 12-31
|
10.4204/EPTCS.168.2
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We survey our work on choreographies and behavioural contracts in multiparty
interactions. In particular theories of behavioural contracts are presented
which enable reasoning about correct service composition (contract compliance)
and service substitutability (contract refinement preorder) under different
assumptions concerning service communication: synchronous address or name based
communication with patient non-preemptable or impatient invocations, or
asynchronous communication. Correspondingly relations between behavioural
contracts and choreographic descriptions are considered, where a contract for
each communicating party is, e.g., derived by projection. The considered
relations are induced as the maximal preoders which preserve contract
compliance and global traces: we show maximality to hold (permitting services
to be discovered/substituted independently for each party) when contract
refinement preorders with all the above asymmetric communication means are
considered and, instead, not to hold if the standard symmetric CCS/pi-calculus
communication is considered (or when directly relating choreographies to
behavioral contracts via a preorder, no matter the communication mean). The
obtained maximal preorders are then characterized in terms of a new form of
testing, called compliance testing, where not only tests must succeed but also
the system under test (thus relating to controllability theory), and compared
with classical preorders such as may/must testing, trace inclusion, etc.
Finally, recent work about adaptable choreographies and behavioural contracts
is presented, where the theory above is extended to update mechanisms allowing
choreographies/contracts to be modified at run-time by internal
(self-adaptation) or external intervention.
|
[
{
"version": "v1",
"created": "Fri, 14 Nov 2014 04:38:51 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Bravetti",
"Mario",
"",
"University of Bologna, Italy / INRIA, France"
],
[
"Zavattaro",
"Gianluigi",
"",
"University of Bologna, Italy / INRIA, France"
]
] |
new_dataset
| 0.988341 |
cs/0111030
|
Hai Dong
|
H. Dong, R. Flood, C. Hovater, J. Musson
|
A Dual Digital Signal Processor VME Board For Instrumentation And
Control Applications
|
3 PDF pages
|
eConf C011127:THAP049,2001
| null | null |
cs.AR
| null |
A Dual Digital Signal Processing VME Board was developed for the Continuous
Electron Beam Accelerator Facility (CEBAF) Beam Current Monitor (BCM) system at
Jefferson Lab. It is a versatile general-purpose digital signal processing
board using an open architecture, which allows for adaptation to various
applications. The base design uses two independent Texas Instrument (TI)
TMS320C6711, which are 900 MFLOPS floating-point digital signal processors
(DSP). Applications that require a fixed point DSP can be implemented by
replacing the baseline DSP with the pin-for-pin compatible TMS320C6211. The
design can be manufactured with a reduced chip set without redesigning the
printed circuit board. For example it can be implemented as a single-channel
DSP with no analog I/O.
|
[
{
"version": "v1",
"created": "Fri, 9 Nov 2001 16:04:17 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Dong",
"H.",
""
],
[
"Flood",
"R.",
""
],
[
"Hovater",
"C.",
""
],
[
"Musson",
"J.",
""
]
] |
new_dataset
| 0.998687 |
cs/0306070
|
Mary R. Thompson
|
M. Thompson, A. Essiari, K. Keahey, V. Welch, S.Lang, B. Liu
|
Fine-Grained Authorization for Job and Resource Management Using Akenti
and the Globus Toolkit
|
CHEP03, La Jolla, Mar 24-27, TUB2006, Grid Security, 7 pages, 5
figures
|
ECONF C0303241:TUBT006,2003
| null |
LBNL-52976
|
cs.DC cs.CR
| null |
As the Grid paradigm is adopted as a standard way of sharing remote resources
across organizational domains, the need for fine-grained access control to
these resources increases. This paper presents an authorization solution for
job submission and control, developed as part of the National Fusion
Collaboratory, that uses the Globus Toolkit 2 and the Akenti authorization
service in order to perform fine-grained authorization of job and resource
management requests in a Grid environment. At job startup, it allows the system
to evaluate a user's Resource Specification Language request against
authorization policies on resource usage (determining how many CPUs or memory a
user can use on a given resource or which executables the user can run).
Furthermore, based on authorization policies, it allows other virtual
organization members to manage the user's job.
|
[
{
"version": "v1",
"created": "Fri, 13 Jun 2003 18:15:03 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jun 2003 23:28:49 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Thompson",
"M.",
""
],
[
"Essiari",
"A.",
""
],
[
"Keahey",
"K.",
""
],
[
"Welch",
"V.",
""
],
[
"Lang",
"S.",
""
],
[
"Liu",
"B.",
""
]
] |
new_dataset
| 0.999222 |
cs/0503088
|
Masahito Hayashi
|
Masahito Hayashi
|
General non-asymptotic and asymptotic formulas in channel resolvability
and identification capacity and their application to wire-tap channel
| null |
IEEE Transactions on Information Theory, Vol. 52, No. 4, 1562-1575
(2006)
| null | null |
cs.IT math.IT
| null |
Several non-asymptotic formulas are established in channel resolvability and
identification capacity, and they are applied to wire-tap channel. By using
these formulas, the $\epsilon$ capacities of the above three problems are
considered in the most general setting, where no structural assumptions such as
the stationary memoryless property are made on a channel. As a result, we solve
an open problem proposed in Han & Verdu and Han. Moreover, we obtain lower
bounds of the exponents of error probability and the wire-tapper's information
in wire-tap channel.
|
[
{
"version": "v1",
"created": "Thu, 31 Mar 2005 05:16:29 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2005 09:19:34 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Hayashi",
"Masahito",
""
]
] |
new_dataset
| 0.994197 |
cs/9401101
| null |
N. Nilsson
|
Teleo-Reactive Programs for Agent Control
|
See http://www.jair.org/ for any accompanying files
|
Journal of Artificial Intelligence Research, Vol 1, (1994),
139-158
| null | null |
cs.AI
| null |
A formalism is presented for computing and organizing actions for autonomous
agents in dynamic environments. We introduce the notion of teleo-reactive (T-R)
programs whose execution entails the construction of circuitry for the
continuous computation of the parameters and conditions on which agent action
is based. In addition to continuous feedback, T-R programs support parameter
binding and recursion. A primary difference between T-R programs and many other
circuit-based systems is that the circuitry of T-R programs is more compact; it
is constructed at run time and thus does not have to anticipate all the
contingencies that might arise over all possible runs. In addition, T-R
programs are intuitive and easy to write and are written in a form that is
compatible with automatic planning and learning methods. We briefly describe
some experimental applications of T-R programs in the control of simulated and
actual mobile robots.
|
[
{
"version": "v1",
"created": "Sat, 1 Jan 1994 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Nilsson",
"N.",
""
]
] |
new_dataset
| 0.991741 |
cs/9704101
| null |
P. Agre, I. Horswill
|
Lifeworld Analysis
|
See http://www.jair.org/ for any accompanying files
|
Journal of Artificial Intelligence Research, Vol 6, (1997),
111-145
| null | null |
cs.AI
| null |
We argue that the analysis of agent/environment interactions should be
extended to include the conventions and invariants maintained by agents
throughout their activity. We refer to this thicker notion of environment as a
lifeworld and present a partial set of formal tools for describing structures
of lifeworlds and the ways in which they computationally simplify activity. As
one specific example, we apply the tools to the analysis of the Toast system
and show how versions of the system with very different control structures in
fact implement a common control structure together with different conventions
for encoding task state in the positions or states of objects in the
environment.
|
[
{
"version": "v1",
"created": "Tue, 1 Apr 1997 00:00:00 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Agre",
"P.",
""
],
[
"Horswill",
"I.",
""
]
] |
new_dataset
| 0.990273 |
1408.3598
|
Cristina Flaut
|
Cristina Flaut
|
BCK-algebras arising from block codes
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper, we will provide an algorithm which allows us to find a
BCK-algebra starting from a given block code.
|
[
{
"version": "v1",
"created": "Fri, 15 Aug 2014 17:58:37 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Nov 2014 09:06:57 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Nov 2014 20:13:57 GMT"
}
] | 2014-11-14T00:00:00 |
[
[
"Flaut",
"Cristina",
""
]
] |
new_dataset
| 0.998878 |
1411.3555
|
Panagiotis Metaxas
|
Panagiotis Takis Metaxas, Eni Mustafaraj, Kily Wong, Laura Zeng, Megan
O'Keefe, Samantha Finn
|
Do Retweets indicate Interest, Trust, Agreement? (Extended Abstract)
|
5 pages, 2 figures, extended abstract
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Arguably one of the most important features of Twitter is the support for
"retweets" or messages re-posted verbatim by a user that were originated by
someone else. (This does not include modified tweets that sometimes are
referred to as retweets.) Despite the fact that retweets are routinely studied
and reported, many important questions remain about user motivation for their
use and their significance. In this paper we answer the question of what users
indicate when they retweet. We do so in a comprehensive fashion, by employing a
user survey, a study of user profiles, and a meta-analysis of over 100 research
publications from three related major conferences. Our findings indicate that
retweeting indicates not only interest in a message, but also trust in the
message and the originator, and agreement with the message contents. However,
the findings are significantly weaker for journalists, some of whom beg to
differ declaring so in their own user profiles. On the other hand, the
inclusion of hashtags strengthens the signal of agreement, especially when the
hashtags are related to politics. While in the past there have been additional
claims in the literature about possible reasons for retweeting, many of them
are not supported, especially given the technical changes introduced recently
by Twitter.
|
[
{
"version": "v1",
"created": "Thu, 13 Nov 2014 14:34:55 GMT"
}
] | 2014-11-14T00:00:00 |
[
[
"Metaxas",
"Panagiotis Takis",
""
],
[
"Mustafaraj",
"Eni",
""
],
[
"Wong",
"Kily",
""
],
[
"Zeng",
"Laura",
""
],
[
"O'Keefe",
"Megan",
""
],
[
"Finn",
"Samantha",
""
]
] |
new_dataset
| 0.98481 |
1411.3044
|
David Furcy
|
Kimberly Barth, David Furcy, Scott M. Summers, Paul Totzke
|
Scaled tree fractals do not strictly self-assemble
|
13 pages, 3 figures, Appeared in the Proceedings of UCNC-2014, pp
27-39; Unconventional Computation and Natural Computation - 13th
International Conference, UCNC 2014, London, ON, Canada, July 14-18, 2014,
Springer Lecture Notes in Computer Science ISBN 978-3-319-08122-9
| null |
10.1007/978-3-319-08123-6_3
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we show that any scaled-up version of any discrete
self-similar {\it tree} fractal does not strictly self-assemble, at any
temperature, in Winfree's abstract Tile Assembly Model.
|
[
{
"version": "v1",
"created": "Wed, 12 Nov 2014 01:55:48 GMT"
}
] | 2014-11-13T00:00:00 |
[
[
"Barth",
"Kimberly",
""
],
[
"Furcy",
"David",
""
],
[
"Summers",
"Scott M.",
""
],
[
"Totzke",
"Paul",
""
]
] |
new_dataset
| 0.965518 |
1411.3061
|
Yong Zeng
|
Yong Zeng and Rui Zhang
|
Full-Duplex Wireless-Powered Relay with Self-Energy Recycling
|
10 pages, 5 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This letter studies a wireless-powered amplify-and-forward relaying system,
where an energy-constrained relay node assists the information transmission
from the source to the destination using the energy harvested from the source.
We propose a novel two-phase protocol for efficient energy transfer and
information relaying, in which the relay operates in full-duplex mode with
simultaneous energy harvesting and information transmission. Compared with the
existing protocols, the proposed design possesses two main advantages: i) it
ensures uninterrupted information transmission since no time switching or power
splitting is needed at the relay for energy harvesting; ii) it enables the
so-called self-energy recycling, i.e., part of the energy (loop energy) that is
used for information transmission by the relay can be harvested and reused in
addition to the dedicated energy sent by the source. Under the multiple-input
single-output (MISO) channel setup, the optimal power allocation and
beamforming design at the relay are derived. Numerical results show a
significant throughput gain achieved by our proposed design over the existing
time switching-based relay protocol.
|
[
{
"version": "v1",
"created": "Wed, 12 Nov 2014 03:43:18 GMT"
}
] | 2014-11-13T00:00:00 |
[
[
"Zeng",
"Yong",
""
],
[
"Zhang",
"Rui",
""
]
] |
new_dataset
| 0.995653 |
1411.3124
|
Bhavani Anantapur
|
A B Bhavani
|
Cross Site Request Forgery on Android WebView
| null |
International Journal for Computer Science and Network Volume 3
Issue 3 June 2014
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Android has always been about connectivity and providing great browsing
experience. Web-based content can be embedded into the Android application
using WebView. It is a User Interface component that displays webpages. It can
either display a remote webpage or can also load static HTML data. This
encompasses the functionality of a browser that can be integrated to
application. WebView provides a number of APIs which enables the applications
to interact with the web content inside WebView. In the current paper Cross
site request forgery or XSRF attack specific to android WebView is
investigated. In XSRF attack the trusts of a web application in its
authenticated users is exploited by letting the attacker make arbitrary HTTP
requests on behalf of a victim user. When the user is logged into the trusted
site through the WebView the site authenticates the WebView and not
application. The application can launch attacks on the behalf of user with the
APIs of Webview exploiting user credentials resulting in Cross site request
forgery. Attacks can also be launched by setting cookies as HTTP headers and
making malicious HTTP Request on behalf of victim.
|
[
{
"version": "v1",
"created": "Wed, 12 Nov 2014 10:29:12 GMT"
}
] | 2014-11-13T00:00:00 |
[
[
"Bhavani",
"A B",
""
]
] |
new_dataset
| 0.998954 |
1410.4393
|
Christopher Herbon
|
Christopher Herbon
|
The HAWKwood Database
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a database consisting of wood pile images, which can be used as a
benchmark to evaluate the performance of wood pile detection and surveying
algorithms. We distinguish six database cate- gories which can be used for
different types of algorithms. Images of real and synthetic scenes are
provided, which consist of 7655 images divided into 354 data sets. Depending on
the category the data sets either include ground truth data or forestry
specific measurements with which algorithms may be compared.
|
[
{
"version": "v1",
"created": "Thu, 16 Oct 2014 12:25:50 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2014 07:07:30 GMT"
}
] | 2014-11-12T00:00:00 |
[
[
"Herbon",
"Christopher",
""
]
] |
new_dataset
| 0.999564 |
1411.2351
|
Wim Martens
|
Wim Martens, Frank Neven, Stijn Vansummeren
|
SCULPT: A Schema Language for Tabular Data on the Web
|
16 pages
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by the recent working effort towards a recommendation by the World
Wide Web Consortium (W3C) for tabular data and metadata on the Web, we present
in this paper a concept for a schema language for tabular web data called
SCULPT. The language consists of rules constraining and defining the structure
of regions in the table. These regions are defined through the novel formalism
of region selection expressions. We present a formal model for SCULPT and
obtain a linear time combined complexity evaluation algorithm. In addition, we
consider weak and strong streaming evaluation for SCULPT and present a fragment
for each of these streaming variants. Finally, we discuss several extensions of
SCULPT including alternative semantics, types, complex content, and explore
region selection expressions as a basis for a transformation language.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 08:57:47 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2014 08:40:52 GMT"
}
] | 2014-11-12T00:00:00 |
[
[
"Martens",
"Wim",
""
],
[
"Neven",
"Frank",
""
],
[
"Vansummeren",
"Stijn",
""
]
] |
new_dataset
| 0.99585 |
1411.2714
|
Peng Hui Tan
|
Peng Hui Tan, Jingon Joung, Sumei Sun
|
Opportunistic Multicast Scheduling for Unicast Transmission in MIMO-OFDM
System
|
6 pages, conference
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a multicast scheduling scheme to exploit content reuse when there
is asynchronicity in user requests. A unicast transmission setup is used for
content delivery, while multicast transmission is employed opportunistically to
reduce wireless resource usage. We then develop a multicast scheduling scheme
for the downlink multiple-input multiple output orthogonal-frequency division
multiplexing system in IEEE 802.11 wireless local area network (WLAN). At each
time slot, the scheduler serves the users by either unicast or multicast
transmission. Out-sequence data received by a user is stored in user's cache
for future use.Multicast precoding and user selection for multicast grouping
are also considered and compliance with the IEEE 802.11 WLAN transmission
protocol. The scheduling scheme is based on the Lyapunov optimization
technique, which aims to maximize system rate. The resulting scheme has low
complexity and requires no prior statistical information on the channels and
queues. Furthermore, in the absence of channel error, the proposed scheme
restricts the worst case of frame dropping deadline, which is useful for
delivering real-time traffic. Simulation results show that our proposed
algorithm outperforms existing techniques by 17 % to 35 % in term of user
capacity.
|
[
{
"version": "v1",
"created": "Tue, 11 Nov 2014 07:21:55 GMT"
}
] | 2014-11-12T00:00:00 |
[
[
"Tan",
"Peng Hui",
""
],
[
"Joung",
"Jingon",
""
],
[
"Sun",
"Sumei",
""
]
] |
new_dataset
| 0.996337 |
1402.2648
|
Deliang Fan Deliang Fan
|
Deliang Fan, Mrigank Sharad, Kaushik Roy
|
Design and Synthesis of Ultra Low Energy Spin-Memristor Threshold Logic
|
this paper is submitted to IEEE Transactions on Nanotechnology. It is
currently under review
|
IEEE Transactions on Nanotechnology, Volume:13, Issue: 3, 2014
|
10.1109/TNANO.2014.2312177
| null |
cs.ET cond-mat.mes-hall
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A threshold logic gate (TLG) performs weighted sum of multiple inputs and
compares the sum with a threshold. We propose Spin-Memeristor Threshold Logic
(SMTL) gates, which employ memristive cross-bar array (MCA) to perform
current-mode summation of binary inputs, whereas, the low-voltage
fast-switching spintronic threshold devices (STD) carry out the threshold
operation in an energy efficient manner. Field programmable SMTL gate arrays
can operate at a small terminal voltage of ~50mV, resulting in ultra-low power
consumption in gates as well as programmable interconnect networks. We evaluate
the performance of SMTL using threshold logic synthesis. Results for common
benchmarks show that SMTL based programmable logic hardware can be more than
100x energy efficient than state of the art CMOS FPGA.
|
[
{
"version": "v1",
"created": "Mon, 10 Feb 2014 19:59:29 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Fan",
"Deliang",
""
],
[
"Sharad",
"Mrigank",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.997029 |
1406.6772
|
Yung-Chih Chen
|
Yung-Chih Chen, Don Towsley, Ramin Khalili
|
MSPlayer: Multi-Source and multi-Path LeverAged YoutubER
|
accepted to ACM CoNEXT'14
| null |
10.1145/2674005.2675007
| null |
cs.NI cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online video streaming through mobile devices has become extremely popular
nowadays. YouTube, for example, reported that the percentage of its traffic
streaming to mobile devices has soared from 6% to more than 40% over the past
two years. Moreover, people are constantly seeking to stream high quality video
for better experience while often suffering from limited bandwidth. Thanks to
the rapid deployment of content delivery networks (CDNs), popular videos are
now replicated at different sites, and users can stream videos from close-by
locations with low latencies. As mobile devices nowadays are equipped with
multiple wireless interfaces (e.g., WiFi and 3G/4G), aggregating bandwidth for
high definition video streaming has become possible.
We propose a client-based video streaming solution, MSPlayer, that takes
advantage of multiple video sources as well as multiple network paths through
different interfaces. MSPlayer reduces start-up latency and provides high
quality video streaming and robust data transport in mobile scenarios. We
experimentally demonstrate our solution on a testbed and through the YouTube
video service.
|
[
{
"version": "v1",
"created": "Thu, 26 Jun 2014 05:34:19 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Nov 2014 19:26:38 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Chen",
"Yung-Chih",
""
],
[
"Towsley",
"Don",
""
],
[
"Khalili",
"Ramin",
""
]
] |
new_dataset
| 0.999249 |
1409.3050
|
Roy Timo
|
Roy Timo and Mich\'ele Wigger
|
Slepian-Wolf Coding for Broadcasting with Cooperative Base-Stations
|
16 pages, 1 figure
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a base-station (BS) cooperation model for broadcasting a discrete
memoryless source in a cellular or heterogeneous network. The model allows the
receivers to use helper BSs to improve network performance, and it permits the
receivers to have prior side information about the source. We establish the
model's information-theoretic limits in two operational modes: In Mode 1, the
helper BSs are given information about the channel codeword transmitted by the
main BS, and in Mode 2 they are provided correlated side information about the
source. Optimal codes for Mode 1 use \emph{hash-and-forward coding} at the
helper BSs; while, in Mode 2, optimal codes use source codes from Wyner's
\emph{helper source-coding problem} at the helper BSs. We prove the optimality
of both approaches by way of a new list-decoding generalisation of [8, Thm. 6],
and, in doing so, show an operational duality between Modes 1 and 2.
|
[
{
"version": "v1",
"created": "Wed, 10 Sep 2014 12:59:12 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Nov 2014 09:20:49 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Timo",
"Roy",
""
],
[
"Wigger",
"Michéle",
""
]
] |
new_dataset
| 0.993812 |
1409.5908
|
Nipun Batra
|
Jack Kelly, Nipun Batra, Oliver Parson, Haimonti Dutta, William
Knottenbelt, Alex Rogers, Amarjeet Singh, Mani Srivastava
|
Demo Abstract: NILMTK v0.2: A Non-intrusive Load Monitoring Toolkit for
Large Scale Data Sets
|
1st ACM International Conference on Embedded Systems For
Energy-Efficient Buildings, 2014
| null |
10.1145/2674061.2675024
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this demonstration, we present an open source toolkit for evaluating
non-intrusive load monitoring research; a field which aims to disaggregate a
household's total electricity consumption into individual appliances. The
toolkit contains: a number of importers for existing public data sets, a set of
preprocessing and statistics functions, a benchmark disaggregation algorithm
and a set of metrics to evaluate the performance of such algorithms.
Specifically, this release of the toolkit has been designed to enable the use
of large data sets by only loading individual chunks of the whole data set into
memory at once for processing, before combining the results of each chunk.
|
[
{
"version": "v1",
"created": "Sat, 20 Sep 2014 17:36:43 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Oct 2014 16:43:18 GMT"
},
{
"version": "v3",
"created": "Sun, 9 Nov 2014 20:43:51 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Kelly",
"Jack",
""
],
[
"Batra",
"Nipun",
""
],
[
"Parson",
"Oliver",
""
],
[
"Dutta",
"Haimonti",
""
],
[
"Knottenbelt",
"William",
""
],
[
"Rogers",
"Alex",
""
],
[
"Singh",
"Amarjeet",
""
],
[
"Srivastava",
"Mani",
""
]
] |
new_dataset
| 0.993295 |
1410.8509
|
Su Kim
|
Su Kim
|
Photomapping Using Aerial Vehicle
| null | null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by/3.0/
|
Creating a photomap plays a critical role in navigation. Therefore, flying
vehicles are usually used to create topdown maps of the environment. In this
report we used two different aerial vehicles to create a map in a simulated
environment
|
[
{
"version": "v1",
"created": "Thu, 30 Oct 2014 19:29:29 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Nov 2014 19:45:39 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Kim",
"Su",
""
]
] |
new_dataset
| 0.989684 |
1410.8844
|
Paul Madden
|
Paul Madden, Eduardo G. Valente Jr
|
DDTS: A Practical System Testing Framework for Scientific Software
|
Fixed bad formatting on last page
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many scientific-software projects test their codes inadequately, or not at
all. Despite its well-known benefits, adopting routine testing is often not
easy. Development teams may have doubts about establishing effective test
procedures, writing test software, or handling the ever-growing complexity of
test cases. They may need to run (and test) on restrictive HPC platforms. They
almost certainly face time and budget pressures that can keep testing
languishing near the bottom of their to-do lists. This paper presents DDTS, a
framework for building test suite applications, designed to fit
scientific-software projects' requirements. DDTS aims to simplify introduction
of rigorous testing, and to ease growing pains as needs mature. It decomposes
the testing problem into practical, intuitive phases; makes configuration and
extension easy; is portable and suitable to HPC platforms; and exploits
parallelism. DDTS is currently used for automated regression and developer
pre-commit testing for several scientific-software projects with disparate
testing requirements.
|
[
{
"version": "v1",
"created": "Fri, 31 Oct 2014 18:45:47 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Nov 2014 22:23:52 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Madden",
"Paul",
""
],
[
"Valente",
"Eduardo G.",
"Jr"
]
] |
new_dataset
| 0.980396 |
1411.2105
|
Marc Hellmuth
|
Sarah Berkemer, Ricardo Chaves, Adrian Fritz, Marc Hellmuth, Maribel
Hernandez-Rosales and Peter F. Stadler
|
Spiders can be recognized by counting their legs
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spiders are arthropods that can be distinguished from their closest
relatives, the insects, by counting their legs. Spiders have 8, insects just 6.
Spider graphs are a very restricted class of graphs that naturally appear in
the context of cograph editing. The vertex set of a spider (or its complement)
is naturally partitioned into a clique (the body), an independent set (the
legs), and a rest (serving as the head). Here we show that spiders can be
recognized directly from their degree sequences through the number of their
legs (vertices with degree 1). Furthermore, we completely characterize the
degree sequences of spiders.
|
[
{
"version": "v1",
"created": "Sat, 8 Nov 2014 10:38:01 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Berkemer",
"Sarah",
""
],
[
"Chaves",
"Ricardo",
""
],
[
"Fritz",
"Adrian",
""
],
[
"Hellmuth",
"Marc",
""
],
[
"Hernandez-Rosales",
"Maribel",
""
],
[
"Stadler",
"Peter F.",
""
]
] |
new_dataset
| 0.999528 |
1411.2160
|
Marcos Aguilera
|
Marcos K. Aguilera, Joshua B. Leners, Ramakrishna Kotla, Michael
Walfish
|
Yesquel: scalable SQL storage for Web applications
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Based on a brief history of the storage systems for Web applications, we
motivate the need for a new storage system. We then describe the architecture
of such a system, called Yesquel. Yesquel supports the SQL query language and
offers performance similar to NOSQL storage systems.
|
[
{
"version": "v1",
"created": "Sat, 8 Nov 2014 20:32:17 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Aguilera",
"Marcos K.",
""
],
[
"Leners",
"Joshua B.",
""
],
[
"Kotla",
"Ramakrishna",
""
],
[
"Walfish",
"Michael",
""
]
] |
new_dataset
| 0.999807 |
1411.2195
|
Ong Sing Goh
|
Li Ching Liew and Ong Sing Goh
|
GeoTravel: Harvesting Ambient Geographic Footprints from GPS
Trajectories
| null | null | null |
GeoTravel/PSM/FTMK/UTeM/2014
|
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study is about harvesting point of interest from GPS trajectories.
Trajectories are the paths that moving objects move by follow through space in
a function of time while GPS trajectories generally are point-sequences with
geographic coordinates, time stamp, speed and heading. User can get information
from GPS enable device. For example, user can acquire present location, search
the information around them and design driving routes to a destination and thus
design travel itineraries. By sharing GPS logs among each other, people are
able to find some places that attract them from other people's travel route.
Analysis on the GPS logs can get the point of interest that is popular. By
present the point of interest, user can choose travel place easily and the
travel itineraries is plan based on the user preferences.
|
[
{
"version": "v1",
"created": "Sun, 9 Nov 2014 04:14:02 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Liew",
"Li Ching",
""
],
[
"Goh",
"Ong Sing",
""
]
] |
new_dataset
| 0.985701 |
1411.2212
|
Mehdi Masoudi
|
Mehdi Masoudi, Milad Mazaheri, Aliakbar Rezaei and Keivan Navi
|
Designing high-speed, low-power full adder cells based on carbon
nanotube technology
|
13 Pages, 13 Figures, 2 Tables
| null |
10.5121/vlsic.2014.5503
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article presents novel high speed and low power full adder cells based
on carbon nanotube field effect transistor (CNFET). Four full adder cells are
proposed in this article. First one (named CN9P4G) and second one (CN9P8GBUFF)
utilizes 13 and 17 CNFETs respectively. Third design that we named CN10PFS uses
only 10 transistors and is full swing. Finally, CN8P10G uses 18 transistors and
divided into two modules, causing Sum and Cout signals are produced in a
parallel manner. All inputs have been used straight, without inverting. These
designs also used the special feature of CNFET that is controlling the
threshold voltage by adjusting the diameters of CNFETs to achieve the best
performance and right voltage levels. All simulation performed using Synopsys
HSPICE software and the proposed designs are compared to other classical and
modern CMOS and CNFET-based full adder cells in terms of delay, power
consumption and power delay product.
|
[
{
"version": "v1",
"created": "Sun, 9 Nov 2014 09:26:43 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Masoudi",
"Mehdi",
""
],
[
"Mazaheri",
"Milad",
""
],
[
"Rezaei",
"Aliakbar",
""
],
[
"Navi",
"Keivan",
""
]
] |
new_dataset
| 0.975701 |
1411.2311
|
Jos\'e A. Soto
|
Jos\'e A. Soto, Claudio Telha
|
Independent sets and hitting sets of bicolored rectangular families
|
36 pages, A preliminary version of this work appeared in IPCO 2011
under the name "Jump Number of Two-Directional Orthogonal Ray Graphs"
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A bicolored rectangular family BRF is a collection of all axis-parallel
rectangles contained in a given region Z of the plane formed by selecting a
bottom-left corner from a set A and an upper-right corner from a set B. We
prove that the maximum independent set and the minimum hitting set of a BRF
have the same cardinality and devise polynomial time algorithms to compute
both. As a direct consequence, we obtain the first polynomial time algorithm to
compute minimum biclique covers, maximum cross-free matchings and jump numbers
in a class of bipartite graphs that significantly extends convex bipartite
graphs and interval bigraphs. We also establish several connections between our
work and other seemingly unrelated problems. Furthermore, when the bicolored
rectangular family is weighted, we show that the problem of finding the maximum
weight of an independent set is NP-hard, and provide efficient algorithms to
solve it on certain subclasses.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 02:09:58 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Soto",
"José A.",
""
],
[
"Telha",
"Claudio",
""
]
] |
new_dataset
| 0.996466 |
1411.2356
|
Thim Strothmann
|
Zahra Derakhshandeh, Robert Gmyr, Andrea W. Richa, Christian
Scheideler, Thim Strothmann, Shimrit Tzur-David
|
Infinite Object Coating in the Amoebot Model
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The term programmable matter refers to matter which has the ability to change
its physical properties (shape, density, moduli, conductivity, optical
properties, etc.) in a programmable fashion, based upon user input or
autonomous sensing. This has many applications like smart materials, autonomous
monitoring and repair, and minimal invasive surgery. While programmable matter
might have been considered pure science fiction more than two decades ago, in
recent years a large amount of research has been conducted in this field. Often
programmable matter is envisioned as a very large number of small locally
interacting computational particles. We propose the Amoebot model, a new model
which builds upon this vision of programmable matter. Inspired by the behavior
of amoeba, the Amoebot model offers a versatile framework to model
self-organizing particles and facilitates rigorous algorithmic research in the
area of programmable matter. We present an algorithm for the problem of coating
an infinite object under this model, and prove the correctness of the algorithm
and that it is work-optimal.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 09:12:15 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Derakhshandeh",
"Zahra",
""
],
[
"Gmyr",
"Robert",
""
],
[
"Richa",
"Andrea W.",
""
],
[
"Scheideler",
"Christian",
""
],
[
"Strothmann",
"Thim",
""
],
[
"Tzur-David",
"Shimrit",
""
]
] |
new_dataset
| 0.998713 |
1411.2373
|
Pedro M. d'Orey
|
Pedro M. d'Orey, Nitin Maslekar, Idoia de la Iglesia and Nikola K.
Zahariev
|
NAVI: Neighbor Aware Virtual Infrastructure for Information
Dissemination in Vehicular Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vehicular Networks enable a vast number of innovative applications, which
rely on the efficient exchange of information between vehicles. However,
efficient and reliable data dissemination is a particularly challenging task in
the context of vehicular networks due to the underlying properties of these
networks, limited availability of network infrastructure and variable
penetration rates for distinct communication technologies. This paper presents
a novel system and mechanism for information dissemination based on virtual
infrastructure selection in combination with multiple communication
technologies. The system has been evaluated using a simulation framework,
involving network simulation in conjugation with realistic vehicular mobility
traces. The presented simulation results show the feasibility of the proposed
mechanism to achieve maximum message penetration with reduced overhead.
Compared with a cellular-based only solution, our mechanism shows that the
judicious vehicle selection can lead to improved network utilization through
the offload of traffic to the short-range communication network.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 10:40:44 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"d'Orey",
"Pedro M.",
""
],
[
"Maslekar",
"Nitin",
""
],
[
"de la Iglesia",
"Idoia",
""
],
[
"Zahariev",
"Nikola K.",
""
]
] |
new_dataset
| 0.992935 |
1411.2392
|
Philipp Leitner
|
Rostyslav Zabolotnyi and Philipp Leitner and Waldemar Hummer and
Schahram Dustdar
|
JCloudScale: Closing the Gap Between IaaS and PaaS
| null | null | null | null |
cs.SE cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Infrastructure-as-a-Service (IaaS) model of cloud computing is a
promising approach towards building elastically scaling systems. Unfortunately,
building such applications today is a complex, repetitive and error-prone
endeavor, as IaaS does not provide any abstraction on top of naked virtual
machines. Hence, all functionality related to elasticity needs to be
implemented anew for each application. In this paper, we present JCloudScale, a
Java-based middleware that supports building elastic applications on top of a
public or private IaaS cloud. JCloudScale allows to easily bring applications
to the cloud, with minimal changes to the application code. We discuss the
general architecture of the middleware as well as its technical features, and
evaluate our system with regard to both, user acceptance (based on a user
study) and performance overhead. Our results indicate that JCloudScale indeed
allowed many participants to build IaaS applications more efficiently,
comparable to the convenience features provided by industrial
Platform-as-a-Service (PaaS) solutions. However, unlike PaaS, using JCloudScale
does not lead to a loss of control and vendor lock-in for the developer.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 11:58:30 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Zabolotnyi",
"Rostyslav",
""
],
[
"Leitner",
"Philipp",
""
],
[
"Hummer",
"Waldemar",
""
],
[
"Dustdar",
"Schahram",
""
]
] |
new_dataset
| 0.968477 |
1411.2443
|
Bo-Kai Hsu
|
Bo-Kai Hsu, Chia-Han Lee, and Ping-Cheng Yeh
|
On Timing Synchronization for Quantity-based Modulation in Additive
Inverse Gaussian Channel with Drift
|
8 pages, 9 figures
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Diffusion-based Molecular Communications, the channel between Transmitter
Nano-machine (TN) and Receiver Nano-machine (RN) can be modeled by Additive
Inverse Gaussian Channel, that is the first hitting time of messenger molecule
released from TN and captured by RN follows Inverse Gaussian distribution. In
this channel, a quantity-based modulation embedding message on the different
quantity levels of messenger molecules relies on a time-slotted system between
TN and RN. Accordingly, their clocks need to synchronize with each other. In
this paper, we discuss the approaches to make RN estimate its timing offset
between TN efficiently by the arrival times of molecules. We propose many
methods such as Maximum Likelihood Estimation (MLE), Unbiased Linear Estimation
(ULE), Iterative ULE, and Decision Feedback (DF). The numerical results shows
the comparison of them. We evaluate these methods by not only the Mean Square
Error, but also the computational complexity.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 14:48:36 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Hsu",
"Bo-Kai",
""
],
[
"Lee",
"Chia-Han",
""
],
[
"Yeh",
"Ping-Cheng",
""
]
] |
new_dataset
| 0.975015 |
1411.2565
|
Ru Zhu
|
Ru Zhu
|
Grace: a Cross-platform Micromagnetic Simulator On Graphics Processing
Units
|
9 pages, 5 figures
| null | null | null |
cs.CE physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A micromagnetic simulator running on graphics processing unit (GPU) is
presented. It achieves significant performance boost as compared to previous
central processing unit (CPU) simulators, up to two orders of magnitude for
large input problems. Different from GPU implementations of other research
groups, this simulator is developed with C++ Accelerated Massive Parallelism
(C++ AMP) and is hardware platform compatible. It runs on GPU from venders
include NVidia, AMD and Intel, which paved the way for fast micromagnetic
simulation on both high-end workstations with dedicated graphics cards and
low-end personal computers with integrated graphics card. A copy of the
simulator software is publicly available.
|
[
{
"version": "v1",
"created": "Mon, 10 Nov 2014 20:12:46 GMT"
}
] | 2014-11-11T00:00:00 |
[
[
"Zhu",
"Ru",
""
]
] |
new_dataset
| 0.997392 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.