id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1411.1933
Muralikrishnan Ramane MR
Muralikrishnan Ramane, Balaji Vasudevan and Sathappan Allaphan
A Provenance-Policy Based Access Control Model For Data Usage Validation In Cloud
October 2014, Volume 3, Number 5, Page. 1-9
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an organization specifically as virtual as cloud there is need for access control systems to constrain users direct or backhanded action that could lead to breach of security. In cloud, apart from owner access to confidential data the third party auditing and accounting is done which could stir up further data leaks. To control such data leaks and integrity, in past several security policies based on role, identity and user attributes were proposed and found ineffective since they depend on static policies which do not monitor data access and its origin. Provenance on the other hand tracks data usage and its origin which proves the authenticity of data. To employ provenance in a real time system like cloud, the service provider needs to store metadata on the subject of data alteration which is universally called as the Provenance Information. This paper presents a provenance-policy based access control model which is designed and integrated with the system that not only makes data auditable but also incorporates accountability for data alteration events.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 14:35:04 GMT" } ]
2014-11-10T00:00:00
[ [ "Ramane", "Muralikrishnan", "" ], [ "Vasudevan", "Balaji", "" ], [ "Allaphan", "Sathappan", "" ] ]
new_dataset
0.976351
1411.1951
Manuel P\"oter
Manuel P\"oter
Pheet meets C++11
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pheet is a C++ task-scheduling framework that allows for easy customization of internal data-structures. The implementation was started before the C++11 standard was committed and therefore did not use the new standardized memory model but compiler/platform specific intrinsics for atomic memory operations. This not only makes the implementation harder to port to other compilers or architectures but also suffers from the fact that prior C++ versions did not specify any memory model. In this report I discuss the porting of one of the internal Pheet data structures to the new memory model and provide reasoning about the correctness based on the semantics of the memory consistency model. Using two benchmarks from the Pheet benchmark suite I compare the performance of the original against the new implementation which shows a significant speedup under certain conditions on one of the two test machines.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 15:40:48 GMT" } ]
2014-11-10T00:00:00
[ [ "Pöter", "Manuel", "" ] ]
new_dataset
0.983779
1411.1953
Leroy Cronin Prof
Juan Manuel Parrilla Gutierrez, Trevor Hinkley, James Taylor, Kliment Yanev, Leroy Cronin
Hardware and Software manual for Evolution of Oil Droplets in a Chemo-Robotic Platform
42 pages, 25 figures, list of printed parts
null
null
null
cs.RO cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
This manual outlines a fully automated liquid handling robot to enable physically-embodied evolution within a chemical oil-droplet system. The robot is based upon the REPRAP3D printer system and makes the droplets by mixing chemicals and then placing them in a petri dish after which they are recorded using a camera and the behaviour of the droplets analysed using image recognition software. This manual accompanies the open access publication published in Nature Communications DOI: 10.1038/ncomms6571.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 15:41:34 GMT" } ]
2014-11-10T00:00:00
[ [ "Gutierrez", "Juan Manuel Parrilla", "" ], [ "Hinkley", "Trevor", "" ], [ "Taylor", "James", "" ], [ "Yanev", "Kliment", "" ], [ "Cronin", "Leroy", "" ] ]
new_dataset
0.998521
1411.1999
Hossam Ishkewy
Hossam Ishkewy, Hany Harb and Hassan Farahat
Azhary: An Arabic Lexical Ontology
appears in International Journal of Web & Semantic Technology (IJWesT) Vol.5, No.4, October 2014
null
null
null
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arabic language is the most spoken languages in the Semitic languages group, and one of the most common languages in the world spoken by more than 422 million. It is also of paramount importance to Muslims, it is a sacred language of the Islamic Holly Book (Quran) and prayer (and other acts of worship) in Islam is performed only by mastering some of Arabic words. Arabic is also a major ritual language of a number of Christian churches in the Arab world and it is also used in writing several intellectual and religious Jewish books in the Middle Ages. Despite this, there is no semantic Arabic lexicon which researchers can depend on. In this paper we introduce Azhary as a lexical ontology for the Arabic language. It groups Arabic words into sets of synonyms called synsets, and records a number of relationships between words such as synonym, antonym, hypernym, hyponym, meronym, holonym and association relations. The ontology contains 26,195 words organized in 13,328 synsets. It has been developed and contrasted against AWN which is the most common available Arabic lexical ontology.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 18:23:00 GMT" } ]
2014-11-10T00:00:00
[ [ "Ishkewy", "Hossam", "" ], [ "Harb", "Hany", "" ], [ "Farahat", "Hassan", "" ] ]
new_dataset
0.999886
1411.2022
Dmitry Kosolobov
Dmitry Kosolobov
Online Square Detection
9 pages, 4 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The online square detection problem is to detect the first occurrence of a square in a string whose characters are provided as input one at a time. Recall that a square is a string that is a concatenation of two identical strings. In this paper we present an algorithm solving this problem in $O(n\log\sigma)$ time and linear space on ordered alphabet, where $\sigma$ is the number of different letters in the input string. Our solution is relatively simple and does not require much memory unlike the previously known online algorithm with the same working time. Also we present an algorithm working in $O(n\log n)$ time and linear space on unordered alphabet, though this solution does not outperform the previously known result with the same time bound.
[ { "version": "v1", "created": "Fri, 7 Nov 2014 20:28:37 GMT" } ]
2014-11-10T00:00:00
[ [ "Kosolobov", "Dmitry", "" ] ]
new_dataset
0.997355
1411.1316
David Buckley
David Buckley, Ke Chen, Joshua Knowles
Rapid Skill Capture in a First-Person Shooter
16 pages, 28 figures, journal paper submission
null
null
null
cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various aspects of computer game design, including adaptive elements of game levels, characteristics of 'bot' behavior, and player matching in multiplayer games, would ideally be sensitive to a player's skill level. Yet, while difficulty and player learning have been explored in the context of games, there has been little work analyzing skill per se, and how it pertains to a player's input. To this end, we present a data set of 476 game logs from over 40 players of a first-person shooter game (Red Eclipse) as a basis of a case study. We then analyze different metrics of skill and show that some of these can be predicted using only a few seconds of keyboard and mouse input. We argue that the techniques used here are useful for adapting games to match players' skill levels rapidly, perhaps more rapidly than solutions based on performance averaging such as TrueSkill.
[ { "version": "v1", "created": "Wed, 5 Nov 2014 16:41:12 GMT" }, { "version": "v2", "created": "Thu, 6 Nov 2014 13:04:25 GMT" } ]
2014-11-07T00:00:00
[ [ "Buckley", "David", "" ], [ "Chen", "Ke", "" ], [ "Knowles", "Joshua", "" ] ]
new_dataset
0.993626
1411.1401
Frank Hoppensteadt
Frank Hoppensteadt
Spin Wave Neuroanalog of von Neumann's Microwave Computer
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequency and phase of neural activity play important roles in the behaving brain. The emerging understanding of these roles has been informed by the design of analog devices that have been important to neuroscience, among them the neuroanalog computer developed by O. Schmitt in the 1930's. In the 1950's, J. von Neumann, in a search for high performance computing using microwaves, invented a logic machine based on similar devices, that can perform logic functions including binary arithmetic. Described here is a novel embodiment of his machine using nano-magnetics. The embodiment is based on properties of ferromagnetic thin films that are governed by a nonlinear Schrodinger equation for magnetization in a film. Electrical currents through point contacts on a film create spin torque nano oscillators (STNO) that define the oscillator elements of the system. These oscillators may communicate through directed graphs of electrical connections or by radiation in the form of spin waves. It is shown here how to construct a logic machine using STNO, that this machine can perform several computations simultaneously using multiplexing of inputs, that this system can evaluate iterated logic functions, and that spin waves can communicate frequency, phase and binary information. Neural tissue and the Schmitt, von Neumann and STNO devices share a common bifurcation structure, although these systems operate on vastly different space and time scales. This suggests that neural circuits may be capable of computational functionality described here.
[ { "version": "v1", "created": "Wed, 5 Nov 2014 15:21:30 GMT" } ]
2014-11-07T00:00:00
[ [ "Hoppensteadt", "Frank", "" ] ]
new_dataset
0.996516
1411.1531
Junyoung Nam
Junyoung Nam
A Codebook-Based Limited Feedback System for Large-Scale MIMO
9 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider limited feedback systems for FDD large-scale (massive) MIMO. A new codebook-based framework for multiuser (MU) MIMO downlink systems is introduced and then compared with an ideal non-codebook based system. We are particularly interested in the less-known finite-rate feedback regime where the number $M$ of transmit antennas and the number of users are of the same order of magnitude and $M$ is large but finite, which is a typical scenario of large-scale MIMO. We provide new findings in this regime and identify some benefits of the new framework in terms of scheduling gain and downlink dedicated pilot overhead.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 08:48:25 GMT" } ]
2014-11-07T00:00:00
[ [ "Nam", "Junyoung", "" ] ]
new_dataset
0.99825
1411.1544
Claudia Landi
Barbara Di Fabio and Claudia Landi
The edit distance for Reeb graphs of surfaces
An extended abstract of this work appeared in: E. Barcucci et al. (Eds.): DGCI 2014, LNCS 8668, pp. 202-213, 2014. c
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reeb graphs are structural descriptors that capture shape properties of a topological space from the perspective of a chosen function. In this work we define a combinatorial metric for Reeb graphs of orientable surfaces in terms of the cost necessary to transform one graph into another by edit operations. The main contributions of this paper are the stability property and the optimality of this edit distance. More precisely, the stability result states that changes in the functions, measured by the maximum norm, imply not greater changes in the corresponding Reeb graphs, measured by the edit distance. The optimality result states that our edit distance discriminates Reeb graphs better than any other metric for Reeb graphs of surfaces satisfying the stability property.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 09:49:07 GMT" } ]
2014-11-07T00:00:00
[ [ "Di Fabio", "Barbara", "" ], [ "Landi", "Claudia", "" ] ]
new_dataset
0.974327
1411.1567
Hauke Holtkamp
Hauke Holtkamp, Guido Dietl, Harald Haas
Distributed DTX Alignment with Memory
13 pages, In 2014 IEEE International Conference on Communications (ICC), Page(s): 3481 - 3486
null
10.1109/ICC.2014.6883860
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper addresses the assignment of transmission and sleep time slots between interfering transmitters with the objective of minimal power consumption. In particular, we address the constructive alignment of Discontinuous Transmission (DTX) time slots under link rate constraints. Due to the complexity of the combinatorial optimization problem at hand, we resort to heuristic assignment strategies. We derive four time slot alignment solutions (sequential alignment, random alignment, p-persistent ranking and DTX alignment with memory) and identify trade-offs. One solution, DTX alignment with memory, addresses trade-offs of the other three by maintaining memory of past alignment and channel quality to buffer short term changes in channel quality. All strategies are found to exhibit similar convergence behavior, but different power consumption and retransmission probabilities. DTX alignment with memory is shown to achieve up to 40% savings in power consumption and more than 20% lower retransmission probability than the state of the art.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 11:20:33 GMT" } ]
2014-11-07T00:00:00
[ [ "Holtkamp", "Hauke", "" ], [ "Dietl", "Guido", "" ], [ "Haas", "Harald", "" ] ]
new_dataset
0.959729
1411.1668
Partha Bhowmick
Sahadev Bera, Shyamosree Pal, Partha Bhowmick, Bhargab B. Bhattacharya
On Chord and Sagitta in ${\mathbb Z}^2$: An Analysis towards Fast and Robust Circular Arc Detection
34 pages
null
null
null
cs.CG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although chord and sagitta, when considered in tandem, may reflect many underlying geometric properties of circles on the Euclidean plane, their implications on the digital plane are not yet well-understood. In this paper, we explore some of their fundamental properties on the digital plane that have a strong bearing on the unsupervised detection of circles and circular arcs in a digital image. We show that although the chord-and-sagitta properties of a real circle do not readily migrate to the digital plane, they can indeed be used for the analysis in the discrete domain based on certain bounds on their deviations, which are derived from the real domain. In particular, we derive an upper bound on the circumferential angular deviation of a point in the context of chord property, and an upper bound on the relative error in radius estimation with regard to the sagitta property. Using these two bounds, we design a novel algorithm for the detection and parameterization of circles and circular arcs, which does not require any heuristic initialization or manual tuning. The chord property is deployed for the detection of circular arcs, whereas the sagitta property is used to estimate their centers and radii. Finally, to improve the accuracy of estimation, the notion of restricted Hough transform is used. Experimental results demonstrate superior efficiency and robustness of the proposed methodology compared to existing techniques.
[ { "version": "v1", "created": "Sun, 26 Oct 2014 17:45:02 GMT" } ]
2014-11-07T00:00:00
[ [ "Bera", "Sahadev", "" ], [ "Pal", "Shyamosree", "" ], [ "Bhowmick", "Partha", "" ], [ "Bhattacharya", "Bhargab B.", "" ] ]
new_dataset
0.997206
1411.1680
Siddharth Garg
D. Fooladivanda, G. Mancini, S. Garg, C. Rosenberg
State of Charge Evolution Equations for Flywheels
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mathematical state-of-charge evolution equation is present for Flywheel Energy Storage Systems.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 18:14:31 GMT" } ]
2014-11-07T00:00:00
[ [ "Fooladivanda", "D.", "" ], [ "Mancini", "G.", "" ], [ "Garg", "S.", "" ], [ "Rosenberg", "C.", "" ] ]
new_dataset
0.997874
1411.1733
Marcos Portnoi
Marcos Portnoi and Chien-Chung Shen
Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical system to aid in augmenting safety. We introduce a conceptual model for a firearm equipped with sensors and a context-aware software agent. Based on the information from the sensors, the agent can access the context and inform the consumer of potential unsafe operations. To support Secure Zones and the cyber-physical firearm model, we propose a Key Infrastructure Scheme for key generation, distribution, and management, and a Context-Aware Software Agent Framework for Firearms.
[ { "version": "v1", "created": "Thu, 6 Nov 2014 20:22:00 GMT" } ]
2014-11-07T00:00:00
[ [ "Portnoi", "Marcos", "" ], [ "Shen", "Chien-Chung", "" ] ]
new_dataset
0.992294
1305.5359
Manoj Gopalkrishnan
Manoj Gopalkrishnan
A coercion-resistant protocol for conducting elections by telephone
v2: 15 pages, no figures. We point out that the protocol requires an assumption of a trusted election authority, unlike traditional paper ballots; v1: 14 pages, no figures
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a protocol that allows voters to phone in their votes. Our protocol makes it expensive for a candidate and a voter to cooperate to prove to the candidate who the voter voted for. When the electoral pool is large enough, the cost to the candidate of manipulating sufficiently many votes to have an influence on the election results becomes impossibly expensive. Hence, the protocol provides candidates no incentive to attempt inducement or coercion of voters, resulting in free and fair elections with the promise of cost savings and higher voter turnout over traditional elections. One major inadequacy with our suggested protocol is that we assume the existence of a trusted election authority to count the votes.
[ { "version": "v1", "created": "Thu, 23 May 2013 09:37:40 GMT" }, { "version": "v2", "created": "Wed, 5 Nov 2014 06:51:03 GMT" } ]
2014-11-06T00:00:00
[ [ "Gopalkrishnan", "Manoj", "" ] ]
new_dataset
0.999003
1411.1171
Rui Zeng
Rui Zeng, Jiasong Wu, Zhuhong Shao, Lotfi Senhadji, and Huazhong Shu
Multilinear Principal Component Analysis Network for Tensor Object Classification
4 pages, 3 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recently proposed principal component analysis network (PCANet) has been proved high performance for visual content classification. In this letter, we develop a tensorial extension of PCANet, namely, multilinear principal analysis component network (MPCANet), for tensor object classification. Compared to PCANet, the proposed MPCANet uses the spatial structure and the relationship between each dimension of tensor objects much more efficiently. Experiments were conducted on different visual content datasets including UCF sports action video sequences database and UCF11 database. The experimental results have revealed that the proposed MPCANet achieves higher classification accuracy than PCANet for tensor object classification.
[ { "version": "v1", "created": "Wed, 5 Nov 2014 07:27:08 GMT" } ]
2014-11-06T00:00:00
[ [ "Zeng", "Rui", "" ], [ "Wu", "Jiasong", "" ], [ "Shao", "Zhuhong", "" ], [ "Senhadji", "Lotfi", "" ], [ "Shu", "Huazhong", "" ] ]
new_dataset
0.98409
1411.1395
Partha Bhowmick
Sahadev Bera, Partha Bhowmick, Bhargab B. Bhattacharya
On Covering a Solid Sphere with Concentric Spheres in ${\mathbb Z}^3$
null
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a digital sphere, constructed by the circular sweep of a digital semicircle (generatrix) around its diameter, consists of some holes (absentee-voxels), which appear on its spherical surface of revolution. This incompleteness calls for a proper characterization of the absentee-voxels whose restoration will yield a complete spherical surface without any holes. In this paper, we present a characterization of such absentee-voxels using certain techniques of digital geometry and show that their count varies quadratically with the radius of the semicircular generatrix. Next, we design an algorithm to fill these absentee-voxels so as to generate a spherical surface of revolution, which is more realistic from the viewpoint of visual perception. We further show that covering a solid sphere by a set of complete spheres also results in an asymptotically larger count of absentees, which is cubic in the radius of the sphere. The characterization and generation of complete solid spheres without any holes can also be accomplished in a similar fashion. We furnish test results to substantiate our theoretical findings.
[ { "version": "v1", "created": "Thu, 23 Oct 2014 05:05:23 GMT" } ]
2014-11-06T00:00:00
[ [ "Bera", "Sahadev", "" ], [ "Bhowmick", "Partha", "" ], [ "Bhattacharya", "Bhargab B.", "" ] ]
new_dataset
0.99771
1307.3664
Martin Strohmeier
Martin Strohmeier, Vincent Lenders, Ivan Martinovic
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Survey, 22 Pages, 21 Figures
null
10.1109/COMST.2014.2365951
RR-13-10
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.
[ { "version": "v1", "created": "Sat, 13 Jul 2013 17:05:20 GMT" }, { "version": "v2", "created": "Tue, 15 Apr 2014 23:34:33 GMT" } ]
2014-11-05T00:00:00
[ [ "Strohmeier", "Martin", "" ], [ "Lenders", "Vincent", "" ], [ "Martinovic", "Ivan", "" ] ]
new_dataset
0.994783
1211.5568
Irene M\'arquez-Corbella
M. Borges-Quintana, M. A. Borges-Trenard, I. M\'arquez-Corbella and E. Mart\'inez-Moro
Computing coset leaders and leader codewords of binary codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we use the Gr\"obner representation of a binary linear code $\mathcal C$ to give efficient algorithms for computing the whole set of coset leaders, denoted by $\mathrm{CL}(\mathcal C)$ and the set of leader codewords, denoted by $\mathrm L(\mathcal C)$. The first algorithm could be adapted to provide not only the Newton and the covering radius of $\mathcal C$ but also to determine the coset leader weight distribution. Moreover, providing the set of leader codewords we have a test-set for decoding by a gradient-like decoding algorithm. Another contribution of this article is the relation stablished between zero neighbours and leader codewords.
[ { "version": "v1", "created": "Fri, 23 Nov 2012 18:17:49 GMT" }, { "version": "v2", "created": "Mon, 3 Nov 2014 10:13:05 GMT" } ]
2014-11-04T00:00:00
[ [ "Borges-Quintana", "M.", "" ], [ "Borges-Trenard", "M. A.", "" ], [ "Márquez-Corbella", "I.", "" ], [ "Martínez-Moro", "E.", "" ] ]
new_dataset
0.999648
1310.6925
Albert Y.S. Lam
Albert Y.S. Lam, Yiu-Wing Leung, Xiaowen Chu
Electric Vehicle Charging Station Placement: Formulation, Complexity, and Solutions
Submitted to IEEE Transactions on Smart Grid, revised
null
10.1109/TSG.2014.2344684
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To enhance environmental sustainability, many countries will electrify their transportation systems in their future smart city plans. So the number of electric vehicles (EVs) running in a city will grow significantly. There are many ways to re-charge EVs' batteries and charging stations will be considered as the main source of energy. The locations of charging stations are critical; they should not only be pervasive enough such that an EV anywhere can easily access a charging station within its driving range, but also widely spread so that EVs can cruise around the whole city upon being re-charged. Based on these new perspectives, we formulate the Electric Vehicle Charging Station Placement Problem (EVCSPP) in this paper. We prove that the problem is non-deterministic polynomial-time hard. We also propose four solution methods to tackle EVCSPP and evaluate their performance on various artificial and practical cases. As verified by the simulation results, the methods have their own characteristics and they are suitable for different situations depending on the requirements for solution quality, algorithmic efficiency, problem size, nature of the algorithm, and existence of system prerequisite.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 06:38:18 GMT" }, { "version": "v2", "created": "Tue, 4 Mar 2014 07:24:53 GMT" }, { "version": "v3", "created": "Tue, 10 Jun 2014 01:56:09 GMT" } ]
2014-11-04T00:00:00
[ [ "Lam", "Albert Y. S.", "" ], [ "Leung", "Yiu-Wing", "" ], [ "Chu", "Xiaowen", "" ] ]
new_dataset
0.996247
1406.2390
Xu Chen
Xu Chen, Xiuyuan Cheng and St\'ephane Mallat
Unsupervised Deep Haar Scattering on Graphs
null
null
null
null
cs.LG cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classification of high-dimensional data defined on graphs is particularly difficult when the graph geometry is unknown. We introduce a Haar scattering transform on graphs, which computes invariant signal descriptors. It is implemented with a deep cascade of additions, subtractions and absolute values, which iteratively compute orthogonal Haar wavelet transforms. Multiscale neighborhoods of unknown graphs are estimated by minimizing an average total variation, with a pair matching algorithm of polynomial complexity. Supervised classification with dimension reduction is tested on data bases of scrambled images, and for signals sampled on unknown irregular grids on a sphere.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 23:51:30 GMT" }, { "version": "v2", "created": "Mon, 3 Nov 2014 15:25:16 GMT" } ]
2014-11-04T00:00:00
[ [ "Chen", "Xu", "" ], [ "Cheng", "Xiuyuan", "" ], [ "Mallat", "Stéphane", "" ] ]
new_dataset
0.990385
1308.1279
Russell Brown
Russell A. Brown
Barycentric Coordinates as Interpolants
8 pages, 1 figure
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Barycentric coordinates are frequently used as interpolants to shade computer graphics images. A simple equation transforms barycentric coordinates from screen space into eye space in order to undo the perspective transformation and permit accurate interpolative shading of texture maps. This technique is amenable to computation using a block-normalized integer representation.
[ { "version": "v1", "created": "Tue, 6 Aug 2013 14:15:42 GMT" }, { "version": "v2", "created": "Wed, 7 Aug 2013 13:39:44 GMT" }, { "version": "v3", "created": "Thu, 8 Aug 2013 14:09:09 GMT" }, { "version": "v4", "created": "Thu, 23 Oct 2014 09:46:57 GMT" }, { "version": "v5", "created": "Fri, 24 Oct 2014 03:08:21 GMT" }, { "version": "v6", "created": "Mon, 27 Oct 2014 04:34:08 GMT" }, { "version": "v7", "created": "Tue, 28 Oct 2014 00:42:03 GMT" }, { "version": "v8", "created": "Wed, 29 Oct 2014 02:34:55 GMT" }, { "version": "v9", "created": "Thu, 30 Oct 2014 05:07:47 GMT" } ]
2014-10-31T00:00:00
[ [ "Brown", "Russell A.", "" ] ]
new_dataset
0.976722
1410.8176
Kasim Sinan Yildirim
Kas{\i}m Sinan Y{\i}ld{\i}r{\i}m and Ruggero Carli and Luca Schenato
Proportional-Integral Clock Synchronization in Wireless Sensor Networks
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we present a new control theoretic distributed time synchronization algorithm, named PISync, in order to synchronize sensor nodes in Wireless Sensor Networks (WSNs). PISync algorithm is based on a Proportional-Integral (PI) controller. It applies a proportional feedback (P) and an integral feedback (I) on the local measured synchronization errors to compensate the differences between the clock offsets and clock speeds. We present practical flooding-based and fully distributed protocol implementations of the PISync algorithm, and we provide theoretical analysis to highlight the benefits of this approach in terms of improved steady state error and scalability as compared to existing synchronization algorithms. We show through real-world experiments and simulations that PISync protocols have several advantages over existing protocols in the WSN literature, namely no need for memory allocation, minimal CPU overhead and code size independent of network size and topology, and graceful performance degradation in terms of network size.
[ { "version": "v1", "created": "Wed, 29 Oct 2014 21:51:09 GMT" } ]
2014-10-31T00:00:00
[ [ "Yıldırım", "Kasım Sinan", "" ], [ "Carli", "Ruggero", "" ], [ "Schenato", "Luca", "" ] ]
new_dataset
0.997021
1410.8205
Fabrizio Frati
Timothy M. Chan and Fabrizio Frati and Carsten Gutwenger and Anna Lubiw and Petra Mutzel and Marcus Schaefer
Drawing Partially Embedded and Simultaneously Planar Graphs
Preliminary version appeared at the 22nd International Symposium on Graph Drawing (GD '14)
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of constructing planar drawings with few bends for two related problems, the partially embedded graph problem---to extend a straight-line planar drawing of a subgraph to a planar drawing of the whole graph---and the simultaneous planarity problem---to find planar drawings of two graphs that coincide on shared vertices and edges. In both cases we show that if the required planar drawings exist, then there are planar drawings with a linear number of bends per edge and, in the case of simultaneous planarity, a constant number of crossings between every pair of edges. Our proofs provide efficient algorithms if the combinatorial embedding of the drawing is given. Our result on partially embedded graph drawing generalizes a classic result by Pach and Wenger which shows that any planar graph can be drawn with a linear number of bends per edge if the location of each vertex is fixed.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 00:17:58 GMT" } ]
2014-10-31T00:00:00
[ [ "Chan", "Timothy M.", "" ], [ "Frati", "Fabrizio", "" ], [ "Gutwenger", "Carsten", "" ], [ "Lubiw", "Anna", "" ], [ "Mutzel", "Petra", "" ], [ "Schaefer", "Marcus", "" ] ]
new_dataset
0.998788
1410.8216
EPTCS
Andrew Butterfield (Trinity College Dublin)
UTP2: Higher-Order Equational Reasoning by Pointing
In Proceedings UITP 2014, arXiv:1410.7850
EPTCS 167, 2014, pp. 14-22
10.4204/EPTCS.167.4
null
cs.LO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a prototype theorem prover, UTP2, developed to match the style of hand-written proof work in the Unifying Theories of Programming semantical framework. This is based on alphabetised predicates in a 2nd-order logic, with a strong emphasis on equational reasoning. We present here an overview of the user-interface of this prover, which was developed from the outset using a point-and-click approach. We contrast this with the command-line paradigm that continues to dominate the mainstream theorem provers, and raises the question: can we have the best of both worlds?
[ { "version": "v1", "created": "Thu, 30 Oct 2014 01:07:15 GMT" } ]
2014-10-31T00:00:00
[ [ "Butterfield", "Andrew", "", "Trinity College Dublin" ] ]
new_dataset
0.995883
1410.8217
EPTCS
Gudmund Grov (Heriot-Watt University), Aleks Kissinger (University of Oxford), Yuhui Lin (Heriot-Watt University)
Tinker, tailor, solver, proof
In Proceedings UITP 2014, arXiv:1410.7850
EPTCS 167, 2014, pp. 23-34
10.4204/EPTCS.167.5
null
cs.LO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Tinker, a tool for designing and evaluating proof strategies based on proof-strategy graphs, a formalism previously introduced by the authors. We represent proof strategies as open-graphs, which are directed graphs with additional input/output edges. Tactics appear as nodes in a graph, and can be `piped' together by adding edges between them. Goals are added to the input edges of such a graph, and flow through the graph as the strategy is evaluated. Properties of the edges ensure that only the right `type' of goals are accepted. In this paper, we detail the Tinker tool and show how it can be integrated with two different theorem provers: Isabelle and ProofPower.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 01:07:33 GMT" } ]
2014-10-31T00:00:00
[ [ "Grov", "Gudmund", "", "Heriot-Watt University" ], [ "Kissinger", "Aleks", "", "University of\n Oxford" ], [ "Lin", "Yuhui", "", "Heriot-Watt University" ] ]
new_dataset
0.975262
1410.8219
EPTCS
Florian Rabe (Jacobs University Bremen)
A Logic-Independent IDE
In Proceedings UITP 2014, arXiv:1410.7850
EPTCS 167, 2014, pp. 48-60
10.4204/EPTCS.167.7
null
cs.LO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The author's MMT system provides a framework for defining and implementing logical systems. By combining MMT with the jEdit text editor, we obtain a logic-independent IDE. The IDE functionality includes advanced features such as context-sensitive auto-completion, search, and change management.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 01:07:58 GMT" } ]
2014-10-31T00:00:00
[ [ "Rabe", "Florian", "", "Jacobs University Bremen" ] ]
new_dataset
0.999387
1410.8222
EPTCS
Makarius Wenzel (Univ. Paris-Sud, Laboratoire LRI, UMR8623)
System description: Isabelle/jEdit in 2014
In Proceedings UITP 2014, arXiv:1410.7850
EPTCS 167, 2014, pp. 84-94
10.4204/EPTCS.167.10
null
cs.LO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is an updated system description for Isabelle/jEdit, according to the official release Isabelle2014 (August 2014). The following new PIDE concepts are explained: asynchronous print functions and document overlays, syntactic and semantic completion, editor navigation, management of auxiliary files within the document-model.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 01:08:32 GMT" } ]
2014-10-31T00:00:00
[ [ "Wenzel", "Makarius", "", "Univ. Paris-Sud, Laboratoire LRI, UMR8623" ] ]
new_dataset
0.998231
1410.8336
Marthe Bonamy
Marthe Bonamy, Lukasz Kowalik
A 13k-kernel for Planar Feedback Vertex Set via Region Decomposition
22 pages, short version accepted to IPEC'14
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show a kernel of at most $13k$ vertices for the Planar Feedback Vertex Set problem restricted to planar graphs, i.e., a polynomial-time algorithm that transforms an input instance $(G,k)$ to an equivalent instance with at most $13k$ vertices. To this end we introduce a few new reduction rules. However, our main contribution is an application of the region decomposition technique in the analysis of the kernel size. We show that our analysis is tight, up to a constant additive term.
[ { "version": "v1", "created": "Thu, 30 Oct 2014 11:50:36 GMT" } ]
2014-10-31T00:00:00
[ [ "Bonamy", "Marthe", "" ], [ "Kowalik", "Lukasz", "" ] ]
new_dataset
0.99774
1410.8082
Reginald Smith
Reginald D. Smith
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
13 pages, 3 figures
null
null
null
cs.CR q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development and evolution of malware including computer viruses, worms, and trojan horses, is shown to be closely analogous to the process of community succession long recognized in ecology. In particular, both changes in the overall environment by external disturbances, as well as, feedback effects from malware competition and antivirus coevolution have driven community succession and the development of different types of malware with varying modes of transmission and adaptability.
[ { "version": "v1", "created": "Wed, 24 Sep 2014 17:04:05 GMT" } ]
2014-10-30T00:00:00
[ [ "Smith", "Reginald D.", "" ] ]
new_dataset
0.989245
1404.0545
EPTCS
Thomas Given-Wilson (INRIA, Saclay)
An Intensional Concurrent Faithful Encoding of Turing Machines
In Proceedings ICE 2014, arXiv:1410.7013
EPTCS 166, 2014, pp. 21-37
10.4204/EPTCS.166.4
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The benchmark for computation is typically given as Turing computability; the ability for a computation to be performed by a Turing Machine. Many languages exploit (indirect) encodings of Turing Machines to demonstrate their ability to support arbitrary computation. However, these encodings are usually by simulating the entire Turing Machine within the language, or by encoding a language that does an encoding or simulation itself. This second category is typical for process calculi that show an encoding of lambda-calculus (often with restrictions) that in turn simulates a Turing Machine. Such approaches lead to indirect encodings of Turing Machines that are complex, unclear, and only weakly equivalent after computation. This paper presents an approach to encoding Turing Machines into intensional process calculi that is faithful, reduction preserving, and structurally equivalent. The encoding is demonstrated in a simple asymmetric concurrent pattern calculus before generalised to simplify infinite terms, and to show encodings into Concurrent Pattern Calculus and Psi Calculi.
[ { "version": "v1", "created": "Wed, 2 Apr 2014 13:25:43 GMT" }, { "version": "v2", "created": "Wed, 7 May 2014 10:04:09 GMT" }, { "version": "v3", "created": "Mon, 23 Jun 2014 09:06:05 GMT" }, { "version": "v4", "created": "Tue, 28 Oct 2014 10:39:18 GMT" } ]
2014-10-29T00:00:00
[ [ "Given-Wilson", "Thomas", "", "INRIA, Saclay" ] ]
new_dataset
0.975159
1410.7466
EPTCS
H{\aa}kon Normann (IT University of Copenhagen), Cristian Prisacariu (Institute for Informatics, University of Oslo), Thomas Hildebrandt (IT University of Copenhagen)
Concurrency Models with Causality and Events as Psi-calculi
In Proceedings ICE 2014, arXiv:1410.7013
EPTCS 166, 2014, pp. 4-20
10.4204/EPTCS.166.3
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Psi-calculi are a parametric framework for nominal calculi, where standard calculi are found as instances, like the pi-calculus, or the cryptographic spi-calculus and applied-pi. Psi-calculi have an interleaving operational semantics, with a strong foundation on the theory of nominal sets and process algebras. Much of the expressive power of psi-calculi comes from their logical part, i.e., assertions, conditions, and entailment, which are left quite open thus accommodating a wide range of logics. We are interested in how this expressiveness can deal with event-based models of concurrency. We thus take the popular prime event structures model and give an encoding into an instance of psi-calculi. We also take the recent and expressive model of Dynamic Condition Response Graphs (in which event structures are strictly included) and give an encoding into another corresponding instance of psi-calculi. The encodings that we achieve look rather natural and intuitive. Additional results about these encodings give us more confidence in their correctness.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 00:40:29 GMT" } ]
2014-10-29T00:00:00
[ [ "Normann", "Håkon", "", "IT University of Copenhagen" ], [ "Prisacariu", "Cristian", "", "Institute for Informatics, University of Oslo" ], [ "Hildebrandt", "Thomas", "", "IT\n University of Copenhagen" ] ]
new_dataset
0.978465
1410.7540
Swaleha Saeed
Swaleha Saeed, M Sarosh Umar, M Athar Ali and Musheer Ahmad
Fisher-Yates Chaotic Shuffling Based Image Encryption
null
International Journal of Information Processing, 8(3), 31-41, 2014 ISSN : 0973-8215 IK International Publishing House Pvt. Ltd., New Delhi, India
null
null
cs.CR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Present era, information security is of utmost concern and encryption is one of the alternatives to ensure security. Chaos based cryptography has brought a secure and efficient way to meet the challenges of secure multimedia transmission over the networks. In this paper, we have proposed a secure Grayscale image encryption methodology in wavelet domain. The proposed algorithm performs shuffling followed by encryption using states of chaotic map in a secure manner. Firstly, the image is transformed from spatial domain to wavelet domain by the Haar wavelet. Subsequently, Fisher Yates chaotic shuffling technique is employed to shuffle the image in wavelet domain to confuse the relationship between plain image and cipher image. A key dependent piece-wise linear chaotic map is used to generate chaos for the chaotic shuffling. Further, the resultant shuffled approximate coefficients are chaotically modulated. To enhance the statistical characteristics from cryptographic point of view, the shuffled image is self keyed diffused and mixing operation is carried out using keystream extracted from one-dimensional chaotic map and the plain-image. The proposed algorithm is tested over some standard image dataset. The results of several experimental, statistical and sensitivity analyses proved that the algorithm provides an efficient and secure method to achieve trusted gray scale image encryption.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 07:48:03 GMT" } ]
2014-10-29T00:00:00
[ [ "Saeed", "Swaleha", "" ], [ "Umar", "M Sarosh", "" ], [ "Ali", "M Athar", "" ], [ "Ahmad", "Musheer", "" ] ]
new_dataset
0.99587
1410.7751
Michael Bierma
Michael Bierma, Eric Gustafson, Jeremy Erickson, David Fritz, Yung Ryn Choe
Andlantis: Large-scale Android Dynamic Analysis
In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674)
null
null
MoST/2014/08
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analyzing Android applications for malicious behavior is an important area of research, and is made difficult, in part, by the increasingly large number of applications available for the platform. While techniques exist to perform static analysis on a large number of applications, dynamic analysis techniques are relatively limited in scale due to the computational resources required to emulate the full Android system to achieve accurate execution. We present Andlantis, a scalable dynamic analysis system capable of processing over 3000 Android applications per hour. During this processing, the system is able to collect valuable forensic data, which helps reverse-engineers and malware researchers identify and understand anomalous application behavior. We discuss the results of running 1261 malware samples through the system, and provide examples of malware analysis performed with the resulting data.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 19:22:17 GMT" } ]
2014-10-29T00:00:00
[ [ "Bierma", "Michael", "" ], [ "Gustafson", "Eric", "" ], [ "Erickson", "Jeremy", "" ], [ "Fritz", "David", "" ], [ "Choe", "Yung Ryn", "" ] ]
new_dataset
0.998183
1410.7754
Daniel Defreez
Daniel Defreez, Bhargava Shastry, Hao Chen, Jean-Pierre Seifert
A First Look at Firefox OS Security
In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674)
null
null
MoST/2014/10
cs.CR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With Firefox OS, Mozilla is making a serious push for an HTML5-based mobile platform. In order to assuage security concerns over providing hardware access to web applications, Mozilla has introduced a number of mechanisms that make the security landscape of Firefox OS distinct from both the desktop web and other mobile operating systems. From an application security perspective, the two most significant of these mechanisms are the the introduction of a default Content Security Policy and code review in the market. This paper describes how lightweight static analysis can augment these mechanisms to find vulnerabilities which have otherwise been missed. We provide examples of privileged applications in the market that contain vulnerabilities that can be automatically detected. In addition to these findings, we show some of the challenges that occur when desktop software is repurposed for a mobile operating system. In particular, we argue that the caching of certificate overrides across applications--a known problem in Firefox OS--generates a counter-intuitive user experience that detracts from the security of the system.
[ { "version": "v1", "created": "Tue, 28 Oct 2014 19:23:26 GMT" } ]
2014-10-29T00:00:00
[ [ "Defreez", "Daniel", "" ], [ "Shastry", "Bhargava", "" ], [ "Chen", "Hao", "" ], [ "Seifert", "Jean-Pierre", "" ] ]
new_dataset
0.998384
1305.2462
Liyong Shen
Sonia Perez-Diaza, Liyong Shen
Characterization of Rational Ruled Surfaces
31 pages
Journal of Symbolic Computation Volume 63, May 2014, Pages 21-45
10.1016/j.jsc.2013.11.003
null
cs.SC cs.CG math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ruled surface is a typical modeling surface in computer aided geometric design. It is usually given in the standard parametric form. However, it can also be in the forms than the standard one. For these forms, it is necessary to determine and find the standard form. In this paper, we present algorithms to determine whether a given implicit surface is a rational ruled surface. A parametrization of the surface is computed for the affirmative case. We also consider the parametric situation. More precisely, after a given rational parametric surface is determined as a ruled one, we reparameterize it to the standard form.
[ { "version": "v1", "created": "Sat, 11 May 2013 01:50:15 GMT" }, { "version": "v2", "created": "Tue, 4 Jun 2013 00:42:54 GMT" } ]
2014-10-28T00:00:00
[ [ "Perez-Diaza", "Sonia", "" ], [ "Shen", "Liyong", "" ] ]
new_dataset
0.985205
1404.7206
Qinsi Wang
Qinsi Wang, Paolo Zuliani, Soonho Kong, Sicun Gao, and Edmund M. Clarke
SReach: A Bounded Model Checker for Stochastic Hybrid Systems
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a new tool, SReach, which solves probabilistic bounded reachability problems for two classes of stochastic hybrid systems. The first one is (nonlinear) hybrid automata with parametric uncertainty. The second one is probabilistic hybrid automata with additional randomness for both transition probabilities and variable resets. Standard approaches to reachability problems for linear hybrid systems require numerical solutions for large optimization problems, and become infeasible for systems involving both nonlinear dynamics over the reals and stochasticity. Our approach encodes stochastic information by using random variables, and combines the randomized sampling, a $\delta$-complete decision procedure, and statistical tests. SReach utilizes the $\delta$-complete decision procedure to solve reachability problems in a sound manner, i.e., it always decides correctly if, for a given assignment to all random variables, the system actually reaches the unsafe region. The statistical tests adapted guarantee arbitrary small error bounds between probabilities estimated by SReach and real ones. Compared to standard simulation-based methods, our approach supports non-deterministic branching, increases the coverage of simulation, and avoids the zero-crossing problem. We demonstrate our method's feasibility by applying SReach to three representative biological models and to additional benchmarks for nonlinear hybrid systems with multiple probabilistic system parameters.
[ { "version": "v1", "created": "Tue, 29 Apr 2014 01:18:14 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2014 15:36:45 GMT" } ]
2014-10-28T00:00:00
[ [ "Wang", "Qinsi", "" ], [ "Zuliani", "Paolo", "" ], [ "Kong", "Soonho", "" ], [ "Gao", "Sicun", "" ], [ "Clarke", "Edmund M.", "" ] ]
new_dataset
0.978135
1405.6262
Xudong Ma
Xudong Ma
Write-Once-Memory Codes by Source Polarization
5 pages, Proceedings of the International Conference on Computing, Networking and Communications (ICNC 2015), Anaheim, California, USA, February 16-19, 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new Write-Once-Memory (WOM) coding scheme based on source polarization. By applying a source polarization transformation on the to-be-determined codeword, the proposed WOM coding scheme encodes information into the bits in the high-entropy set. We prove in this paper that the proposed WOM codes are capacity-achieving. WOM codes have found many applications in modern data storage systems, such as flash memories.
[ { "version": "v1", "created": "Sat, 24 May 2014 03:33:50 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2014 16:52:02 GMT" } ]
2014-10-28T00:00:00
[ [ "Ma", "Xudong", "" ] ]
new_dataset
0.999441
1406.6140
Sadanand Kulkarni A
Sadanand A. Kulkarni, Prashant L. Borde, Ramesh R. Manza, Pravin L. Yannawar
Offline Handwritten MODI Character Recognition Using HU, Zernike Moments and Zoning
This paper has been withdrawn by the author due to the paper was rejected by journal with a reson "paper was not suitable for the journal"
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HOCR is abbreviated as Handwritten Optical Character Recognition. HOCR is a process of recognition of different handwritten characters from a digital image of documents. Handwritten automatic character recognition has attracted many researchers all over the world to contribute handwritten character recognition domain. Shape identification and feature extraction is very important part of any character recognition system and success of method is highly dependent on selection of features. However feature extraction is the most important step in defining the shape of the character as precisely and as uniquely as possible. This is indeed the most important step and complex task as well and achieved success by using invariance property, irrespective of position and orientation. Zernike moments describes shape, identify rotation invariant due to its Orthogonality property. MODI is an ancient script of India had cursive and complex representation of characters. The work described in this paper presents efficiency of Zernike moments over Hu 7 moment with zoning for automatic recognition of handwritten MODI characters. Offline approach is used in this paper because MODI Script was very popular and widely used for writing purpose till 19th century before Devanagari was officially adopted.
[ { "version": "v1", "created": "Tue, 24 Jun 2014 05:40:43 GMT" }, { "version": "v2", "created": "Wed, 2 Jul 2014 04:49:04 GMT" }, { "version": "v3", "created": "Thu, 3 Jul 2014 15:09:24 GMT" }, { "version": "v4", "created": "Mon, 27 Oct 2014 13:17:41 GMT" } ]
2014-10-28T00:00:00
[ [ "Kulkarni", "Sadanand A.", "" ], [ "Borde", "Prashant L.", "" ], [ "Manza", "Ramesh R.", "" ], [ "Yannawar", "Pravin L.", "" ] ]
new_dataset
0.980288
1410.6909
Sunil Kumar Kopparapu Dr
Sunil Kumar Kopparapu and Lajish V. L
A Framework for On-Line Devanagari Handwritten Character Recognition
29 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main challenge in on-line handwritten character recognition in Indian lan- guage is the large size of the character set, larger similarity between different characters in the script and the huge variation in writing style. In this paper we propose a framework for on-line handwitten script recognition taking cues from speech signal processing literature. The framework is based on identify- ing strokes, which in turn lead to recognition of handwritten on-line characters rather that the conventional character identification. Though the framework is described for Devanagari script, the framework is general and can be applied to any language. The proposed platform consists of pre-processing, feature extraction, recog- nition and post processing like the conventional character recognition but ap- plied to strokes. The on-line Devanagari character recognition reduces to one of recognizing one of 69 primitives and recognition of a character is performed by recognizing a sequence of such primitives. We further show the impact of noise removal on on-line raw data which is usually noisy. The use of Fuzzy Direc- tional Features to enhance the accuracy of stroke recognition is also described. The recognition results are compared with commonly used directional features in literature using several classifiers.
[ { "version": "v1", "created": "Sat, 25 Oct 2014 10:13:02 GMT" } ]
2014-10-28T00:00:00
[ [ "Kopparapu", "Sunil Kumar", "" ], [ "L", "Lajish V.", "" ] ]
new_dataset
0.99317
1311.1928
Narasimhan Sadagopan
Mahati Kumar, S.Manasvini, N.Sadagopan, and Adithya Seshadri
On Uni Chord Free Graphs
This paper has been withdrawn due to a bug in the algorithm
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is unichord free if it does not contain a cycle with exactly one chord as its subgraph. In [3], it is shown that a graph is unichord free if and only if every minimal vertex separator is a stable set. In this paper, we first show that such a graph can be recognized in polynomial time. Further, we show that the chromatic number of unichord free graphs is one of (2,3, \omega(G)). We also present a polynomial-time algorithm to produce a coloring with \omega(G) colors.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 10:46:04 GMT" }, { "version": "v2", "created": "Thu, 16 Jan 2014 10:20:48 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2014 08:57:14 GMT" } ]
2014-10-27T00:00:00
[ [ "Kumar", "Mahati", "" ], [ "Manasvini", "S.", "" ], [ "Sadagopan", "N.", "" ], [ "Seshadri", "Adithya", "" ] ]
new_dataset
0.999329
1410.6500
Tarik Anouari
Tarik Anouari and Abdelkrim Haqiq
QoE-Based Scheduling Algorithm in WiMAX Network using Manhattan Grid Mobility Model
6 pages, 7 figures. arXiv admin note: substantial text overlap with arXiv:1410.6154, arXiv:1410.5944
The World of Computer Science and Information Technology Journal (WSCIT). 2014, Volume 4, Issue 10. pp. 133.138
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WiMAX (acronym for Worldwide Interoperability for Microwave Access) is a family of technical standards based on IEEE 802.16 standard that defines the high speed connection through radio waves unlike DSL (Digital Subscriber Line) or other wired technology. It can provide coverage to remote rural areas of several kilometers in radius, it's an adequate response to some rural or inaccessible areas. WiMAX can provide point-to-point (P2P) and point-to-multipoint (PMP) modes. In parallel, it was observed that, unlike the traditional assessment methods for quality, nowadays, current research focuses on the user perceived quality, the existing scheduling approaches take into account the quality of service (QoS) and many technical parameters, but does not take into account the quality of experience (QoE). In this paper, we present a scheduling algorithm to provide QoE in WiMAX network under Manhattan Mobility. A new approach is proposed, particularly for the Best Effort (BE) service class WiMAX, in this approach, if a packet loss occurs on a link connection, the system then reduces the transmission rate of this connection to obtain its minimum allowable transmission rate. The NS-2 simulation results show that the QoE provided to users is enhanced in terms of throughput, jitter, packet loss rate and delay.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 09:23:40 GMT" } ]
2014-10-27T00:00:00
[ [ "Anouari", "Tarik", "" ], [ "Haqiq", "Abdelkrim", "" ] ]
new_dataset
0.993272
1410.6520
Jason S. Ku
Erik D. Demaine and Jason S. Ku
Filling a Hole in a Crease Pattern: Isometric Mapping from Prescribed Boundary Folding
13 pages, 7 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a sheet of paper and a prescribed folding of its boundary, is there a way to fold the paper's interior without stretching so that the boundary lines up with the prescribed boundary folding? For polygonal boundaries nonexpansively folded at finitely many points, we prove that a consistent isometric mapping of the polygon interior always exists and is computable in polynomial time.
[ { "version": "v1", "created": "Thu, 23 Oct 2014 22:52:59 GMT" } ]
2014-10-27T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Ku", "Jason S.", "" ] ]
new_dataset
0.998887
1410.6532
Ziming Zhang
Ziming Zhang, Yuting Chen, Venkatesh Saligrama
A Novel Visual Word Co-occurrence Model for Person Re-identification
Accepted at ECCV Workshop on Visual Surveillance and Re-Identification, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Person re-identification aims to maintain the identity of an individual in diverse locations through different non-overlapping camera views. The problem is fundamentally challenging due to appearance variations resulting from differing poses, illumination and configurations of camera views. To deal with these difficulties, we propose a novel visual word co-occurrence model. We first map each pixel of an image to a visual word using a codebook, which is learned in an unsupervised manner. The appearance transformation between camera views is encoded by a co-occurrence matrix of visual word joint distributions in probe and gallery images. Our appearance model naturally accounts for spatial similarities and variations caused by pose, illumination & configuration change across camera views. Linear SVMs are then trained as classifiers using these co-occurrence descriptors. On the VIPeR and CUHK Campus benchmark datasets, our method achieves 83.86% and 85.49% at rank-15 on the Cumulative Match Characteristic (CMC) curves, and beats the state-of-the-art results by 10.44% and 22.27%.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 01:04:37 GMT" } ]
2014-10-27T00:00:00
[ [ "Zhang", "Ziming", "" ], [ "Chen", "Yuting", "" ], [ "Saligrama", "Venkatesh", "" ] ]
new_dataset
0.997485
1410.6589
Lan Zhang
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu
Outsource Photo Sharing and Searching for Mobile Devices With Privacy Protection
10 pages, 13 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the proliferation of mobile devices, cloud-based photo sharing and searching services are becoming common due to the mobile devices' resource constrains. Meanwhile, there is also increasing concern about privacy in photos. In this work, we present a framework \ourprotocolNSP, which enables cloud servers to provide privacy-preserving photo sharing and search as a service to mobile device users. Privacy-seeking users can share their photos via our framework to allow only their authorized friends to browse and search their photos using resource-bounded mobile devices. This is achieved by our carefully designed architecture and novel outsourced privacy-preserving computation protocols, through which no information about the outsourced photos or even the search contents (including the results) would be revealed to the cloud servers. Our framework is compatible with most of the existing image search technologies, and it requires few changes to the existing cloud systems. The evaluation of our prototype system with 31,772 real-life images shows the communication and computation efficiency of our system.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 06:21:58 GMT" } ]
2014-10-27T00:00:00
[ [ "Zhang", "Lan", "" ], [ "Jung", "Taeho", "" ], [ "Liu", "Cihang", "" ], [ "Ding", "Xuan", "" ], [ "Li", "Xiang-Yang", "" ], [ "Liu", "Yunhao", "" ] ]
new_dataset
0.999243
1410.6629
Gianluca Stringhini
Gianluca Stringhini, Olivier Thonnard
That Ain't You: Detecting Spearphishing Emails Before They Are Sent
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the ways in which attackers try to steal sensitive information from corporations is by sending spearphishing emails. This type of emails typically appear to be sent by one of the victim's coworkers, but have instead been crafted by an attacker. A particularly insidious type of spearphishing emails are the ones that do not only claim to come from a trusted party, but were actually sent from that party's legitimate email account that was compromised in the first place. In this paper, we propose a radical change of focus in the techniques used for detecting such malicious emails: instead of looking for particular features that are indicative of attack emails, we look for possible indicators of impersonation of the legitimate owners. We present IdentityMailer, a system that validates the authorship of emails by learning the typical email-sending behavior of users over time, and comparing any subsequent email sent from their accounts against this model. Our experiments on real world e-mail datasets demonstrate that our system can effectively block advanced email attacks sent from genuine email accounts, which traditional protection systems are unable to detect. Moreover, we show that it is resilient to an attacker willing to evade the system. To the best of our knowledge, IdentityMailer is the first system able to identify spearphishing emails that are sent from within an organization, by a skilled attacker having access to a compromised email account.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 09:45:03 GMT" } ]
2014-10-27T00:00:00
[ [ "Stringhini", "Gianluca", "" ], [ "Thonnard", "Olivier", "" ] ]
new_dataset
0.992756
1410.6651
Martin Monperrus
Matias Martinez, Martin Monperrus
ASTOR: Evolutionary Automatic Software Repair for Java
null
null
null
hal-01075976
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context: During last years, many automatic software repair approaches have been presented by the software engineering research community. According to the corresponding papers, these approaches are able to repair real defects from open source projects. Problematic: Some previous publications in the automatic repair field do not provide the implementation of theirs approaches. Consequently, it is not possible for the research community to re-execute the original evaluation, to set up new evaluations (for example, to evaluate the performance against new defects) or to compare approaches against each others. Solution: We propose a publicly available automatic software repair tool called Astor. It implements three state-of-the-art automatic software repair approaches in the context of Java programs (including GenProg and a subset of PAR's templates). The source code of Astor is licensed under the GNU General Public Licence (GPL v2).
[ { "version": "v1", "created": "Fri, 24 Oct 2014 11:38:38 GMT" } ]
2014-10-27T00:00:00
[ [ "Martinez", "Matias", "" ], [ "Monperrus", "Martin", "" ] ]
new_dataset
0.992547
1410.6656
Benedikt Boehm
Benedikt Boehm
StegExpose - A Tool for Detecting LSB Steganography
null
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Steganalysis tools play an important part in saving time and providing new angles of attack for forensic analysts. StegExpose is a solution designed for use in the real world, and is able to analyse images for LSB steganography in bulk using proven attacks in a time efficient manner. When steganalytic methods are combined intelligently, they are able generate even more accurate results. This is the prime focus of StegExpose.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 11:52:00 GMT" } ]
2014-10-27T00:00:00
[ [ "Boehm", "Benedikt", "" ] ]
new_dataset
0.989816
1410.5816
Andrey Bogomolov
Andrey Bogomolov, Bruno Lepri, Michela Ferron, Fabio Pianesi, Alex (Sandy) Pentland
Daily Stress Recognition from Mobile Phone Data, Weather Conditions and Individual Traits
ACM Multimedia 2014, November 3-7, 2014, Orlando, Florida, USA
null
10.1145/2647868.2654933
null
cs.CY cs.LG physics.data-an stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research has proven that stress reduces quality of life and causes many diseases. For this reason, several researchers devised stress detection systems based on physiological parameters. However, these systems require that obtrusive sensors are continuously carried by the user. In our paper, we propose an alternative approach providing evidence that daily stress can be reliably recognized based on behavioral metrics, derived from the user's mobile phone activity and from additional indicators, such as the weather conditions (data pertaining to transitory properties of the environment) and the personality traits (data concerning permanent dispositions of individuals). Our multifactorial statistical model, which is person-independent, obtains the accuracy score of 72.28% for a 2-class daily stress recognition problem. The model is efficient to implement for most of multimedia applications due to highly reduced low-dimensional feature space (32d). Moreover, we identify and discuss the indicators which have strong predictive power.
[ { "version": "v1", "created": "Tue, 21 Oct 2014 18:54:53 GMT" } ]
2014-10-23T00:00:00
[ [ "Bogomolov", "Andrey", "", "Sandy" ], [ "Lepri", "Bruno", "", "Sandy" ], [ "Ferron", "Michela", "", "Sandy" ], [ "Pianesi", "Fabio", "", "Sandy" ], [ "Alex", "", "", "Sandy" ], [ "Pentland", "", "" ] ]
new_dataset
0.998037
1410.2960
Shihao Yan
Shihao Yan, Robert Malaney, Ido Nevat, and Gareth W. Peters
Location Spoofing Detection for VANETs by a Single Base Station in Rician Fading Channels
6 pages, 5 figures, Added further clarification on constraints imposed on the detection minimization strategy. Minor typos fixed
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we examine the performance of a Location Spoofing Detection System (LSDS) for vehicular networks in the realistic setting of Rician fading channels. In the LSDS, an authorized Base Station (BS) equipped with multiple antennas utilizes channel observations to identify a malicious vehicle, also equipped with multiple antennas, that is spoofing its location. After deriving the optimal transmit power and the optimal directional beamformer of a potentially malicious vehicle, robust theoretical analysis and detailed simulations are conducted in order to determine the impact of key system parameters on the LSDS performance. Our analysis shows how LSDS performance increases as the Rician K-factor of the channel between the BS and legitimate vehicles increases, or as the number of antennas at the BS or legitimate vehicle increases. We also obtain the counter-intuitive result that the malicious vehicle's optimal number of antennas conditioned on its optimal directional beamformer is equal to the legitimate vehicle's number of antennas. The results we provide here are important for the verification of location information reported in IEEE 1609.2 safety messages.
[ { "version": "v1", "created": "Sat, 11 Oct 2014 07:17:20 GMT" }, { "version": "v2", "created": "Tue, 21 Oct 2014 06:38:43 GMT" } ]
2014-10-22T00:00:00
[ [ "Yan", "Shihao", "" ], [ "Malaney", "Robert", "" ], [ "Nevat", "Ido", "" ], [ "Peters", "Gareth W.", "" ] ]
new_dataset
0.988372
1410.5604
Roger Ten-Valls
Joaquim Borges, Cristina Fern\'andez-C\'ordoba, Roger Ten-Valls
Z2-double cyclic codes
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binary linear code $C$ is a $\mathbb{Z}_2$-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the $\mathbb{Z}_2[x]$-module $\mathbb{Z}_2[x]/(x^r-1)\times\mathbb{Z}_2[x]/(x^s-1).$ We determine the structure of $\mathbb{Z}_2$-double cyclic codes giving the generator polynomials of these codes. The related polynomial representation of $\mathbb{Z}_2$-double cyclic codes and its duals, and the relations between the polynomial generators of these codes are studied.
[ { "version": "v1", "created": "Tue, 21 Oct 2014 10:12:42 GMT" } ]
2014-10-22T00:00:00
[ [ "Borges", "Joaquim", "" ], [ "Fernández-Córdoba", "Cristina", "" ], [ "Ten-Valls", "Roger", "" ] ]
new_dataset
0.999084
1410.5777
Leon Abdillah
Ahmad Josi and Leon Andretti Abdillah and Suryayusra
Penerapan teknik web scraping pada mesin pencari artikel ilmiah
6 pages, Jurnal Sistem Informasi (SISFO), vol. 5, 2014
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search engines are a combination of hardware and computer software supplied by a particular company through the website which has been determined. Search engines collect information from the web through bots or web crawlers that crawls the web periodically. The process of retrieval of information from existing websites is called "web scraping." Web scraping is a technique of extracting information from websites. Web scraping is closely related to Web indexing, as for how to develop a web scraping technique that is by first studying the program makers HTML document from the website will be taken to the information in the HTML tag flanking the aim is for information collected after the program makers learn navigation techniques on the website information will be taken to a web application mimicked the scraping that we will create. It should also be noted that the implementation of this writing only scraping involves a free search engine such as: portal garuda, Indonesian scientific journal databases (ISJD), google scholar.
[ { "version": "v1", "created": "Sat, 18 Oct 2014 11:20:07 GMT" } ]
2014-10-22T00:00:00
[ [ "Josi", "Ahmad", "" ], [ "Abdillah", "Leon Andretti", "" ], [ "Suryayusra", "", "" ] ]
new_dataset
0.999786
0905.4160
Murat Guzeltepe Mr
Murat Guzeltepe, Mehmet Ozen
Codes over Quaternion Integers with Respect to Lipschitz Metric
The paper cannot give enough novalities. The technic had been already known
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I want to withdraw this paper.
[ { "version": "v1", "created": "Tue, 26 May 2009 10:47:37 GMT" }, { "version": "v2", "created": "Fri, 18 Dec 2009 12:48:51 GMT" }, { "version": "v3", "created": "Tue, 23 Mar 2010 07:48:56 GMT" }, { "version": "v4", "created": "Tue, 10 May 2011 07:46:51 GMT" }, { "version": "v5", "created": "Sat, 18 Oct 2014 06:47:45 GMT" } ]
2014-10-21T00:00:00
[ [ "Guzeltepe", "Murat", "" ], [ "Ozen", "Mehmet", "" ] ]
new_dataset
0.950815
0912.5009
Murat Guzeltepe Mr
Murat Guzeltepe, Mehmet Ozen
The MacWilliams Theorem for Four-Dimensional Modulo Metrics
A similar paper had been already published by Jay Wood
null
null
null
cs.IT cs.DM math.IT
http://creativecommons.org/licenses/by/3.0/
In this paper, the MacWilliams theorem is stated for codes over finite field with four-dimensional modulo metrics.
[ { "version": "v1", "created": "Sun, 27 Dec 2009 11:16:48 GMT" }, { "version": "v2", "created": "Sat, 18 Oct 2014 06:38:46 GMT" } ]
2014-10-21T00:00:00
[ [ "Guzeltepe", "Murat", "" ], [ "Ozen", "Mehmet", "" ] ]
new_dataset
0.993816
1405.6157
Natalia Silberstein
Natalia Silberstein
Fractional Repetition and Erasure Batch Codes
Was presented at the fourth International Castle Meeting on Coding Theory and Applications (4ICMCTA), Palmela, Portugal, September 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Batch codes are a family of codes that represent a distributed storage system (DSS) of $n$ nodes so that any batch of $t$ data symbols can be retrieved by reading at most one symbol from each node. Fractional repetition codes are a family of codes for DSS that enable efficient uncoded repairs of failed nodes. In this work these two families of codes are combined to obtain fractional repetition batch (FRB) codes which provide both uncoded repairs and parallel reads of subsets of stored symbols. In addition, new batch codes which can tolerate node failures are considered. This new family of batch codes is called erasure combinatorial batch codes (ECBCs). Some properties of FRB codes and ECBCs and examples of their constructions based on transversal designs and affine planes are presented.
[ { "version": "v1", "created": "Sun, 4 May 2014 13:04:14 GMT" }, { "version": "v2", "created": "Mon, 20 Oct 2014 08:36:40 GMT" } ]
2014-10-21T00:00:00
[ [ "Silberstein", "Natalia", "" ] ]
new_dataset
0.999822
1410.4868
Michael Bloodgood
Kathryn Baker, Michael Bloodgood, Bonnie J. Dorr, Nathaniel W. Filardo, Lori Levin and Christine Piatko
A Modality Lexicon and its use in Automatic Tagging
6 pages, 5 figures; appeared in Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC'10), May 2010
In Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC'10), pages 1402-1407, Valletta, Malta, May 2010. European Language Resources Association
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes our resource-building results for an eight-week JHU Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration (SCALE-2009) on Semantically-Informed Machine Translation. Specifically, we describe the construction of a modality annotation scheme, a modality lexicon, and two automated modality taggers that were built using the lexicon and annotation scheme. Our annotation scheme is based on identifying three components of modality: a trigger, a target and a holder. We describe how our modality lexicon was produced semi-automatically, expanding from an initial hand-selected list of modality trigger words and phrases. The resulting expanded modality lexicon is being made publicly available. We demonstrate that one tagger---a structure-based tagger---results in precision around 86% (depending on genre) for tagging of a standard LDC data set. In a machine translation application, using the structure-based tagger to annotate English modalities on an English-Urdu training corpus improved the translation quality score for Urdu by 0.3 Bleu points in the face of sparse training data.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 21:19:15 GMT" } ]
2014-10-21T00:00:00
[ [ "Baker", "Kathryn", "" ], [ "Bloodgood", "Michael", "" ], [ "Dorr", "Bonnie J.", "" ], [ "Filardo", "Nathaniel W.", "" ], [ "Levin", "Lori", "" ], [ "Piatko", "Christine", "" ] ]
new_dataset
0.998598
1410.4928
Wajeb Gharibi
Wajeb Gharibi, Gharib Gharibi
Gharibi_FaceCard for Contacts and Easy Personal - Information Exchange
2 pages. Proceedings of the 8th INDIACom; INDIACom-2014
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code (GC) for each personal mobile and creating a personal information file called Gharibi Face Card (GFC), which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the process of communication and exchanging the specified personal data easily, especially when acquaintance. Mobile number, phone and e-mail address, for example, will be sent in a few seconds using a simple code that does not exceed six characters long to transfer a huge amount of personal data through mobile devices rather than using traditional business or visiting cards.
[ { "version": "v1", "created": "Sat, 18 Oct 2014 09:28:15 GMT" } ]
2014-10-21T00:00:00
[ [ "Gharibi", "Wajeb", "" ], [ "Gharibi", "Gharib", "" ] ]
new_dataset
0.999732
1410.5021
Shuiyin Liu
Shuiyin Liu, Yi Hong, and Emanuele Viterbo
Unshared Secret Key Cryptography
13 pages, 4 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current security techniques can be implemented with either secret key exchange or physical layer wiretap codes. In this work, we investigate an alternative solution for MIMO wiretap channels. Inspired by the artificial noise (AN) technique, we propose the unshared secret key (USK) cryptosystem, where the AN is redesigned as a one-time pad secret key aligned within the null space between transmitter and legitimate receiver. The proposed USK cryptosystem is a new physical layer cryptographic scheme, obtained by combining traditional network layer cryptography and physical layer security. Unlike previously studied artificial noise techniques, rather than ensuring non-zero secrecy capacity, the USK is valid for an infinite lattice input alphabet and guarantees Shannon's ideal secrecy and perfect secrecy, without the need of secret key exchange. We then show how ideal secrecy can be obtained for finite lattice constellations with an arbitrarily small outage.
[ { "version": "v1", "created": "Sun, 19 Oct 2014 01:10:52 GMT" } ]
2014-10-21T00:00:00
[ [ "Liu", "Shuiyin", "" ], [ "Hong", "Yi", "" ], [ "Viterbo", "Emanuele", "" ] ]
new_dataset
0.995023
1410.5107
Tang Liu
Tang Liu, Daniela Tuninetti, Syed A. Jafar
The DoF of the Asymmetric MIMO Interference Channel with Square Direct Link Channel Matrices
Presented at 52nd Allerton Conference, 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the sum Degrees of Freedom (DoF) of $K$-user {\em asymmetric} MIMO Interference Channel (IC) with square direct link channel matrices, that is, the $u$-th transmitter and its intended receiver have $M_u\in\mathbb{N}$ antennas each, where $M_u$ need not be the same for all $u\in[1:K]$. Starting from a $3$-user example, it is shown that existing cooperation-based outer bounds are insufficient to characterize the DoF. Moreover, it is shown that two distinct operating regimes exist. With a {\it dominant} user, i.e., a user that has more antennas than the other two users combined, %(say $M_1\geq M_2+M_3$), it is DoF optimal to let that user transmit alone on the IC. Otherwise, it is DoF optimal to {\em decompose} and operate the 3-user MIMO IC as an $(M_1+ M_2+M_3)$-user SISO IC. This indicates that MIMO operations are useless from a DoF perspective in systems without a dominant user. The main contribution of the paper is the derivation of a novel outer bound for the general $K$-user case that is tight in the regime where a dominant user is not present; this is done by generalizing the insights from the 3-user example to an arbitrary number of users.
[ { "version": "v1", "created": "Sun, 19 Oct 2014 19:45:41 GMT" } ]
2014-10-21T00:00:00
[ [ "Liu", "Tang", "" ], [ "Tuninetti", "Daniela", "" ], [ "Jafar", "Syed A.", "" ] ]
new_dataset
0.981718
1410.5257
Zhiyong Chen
Hui Liu, Zhiyong Chen, Xiaohua Tian, Xinbing Wang, Meixia Tao
On Content-centric Wireless Delivery Networks
20 pages, 7 figures,accepted by IEEE Wireless Communications,Sept.2014
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The flux of social media and the convenience of mobile connectivity has created a mobile data phenomenon that is expected to overwhelm the mobile cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the growth rate of wireless data has far exceeded the capacity increase of the mobile networks. A fundamentally new design paradigm is required to tackle the ever-growing wireless data challenge. In this article, we investigate the problem of massive content delivery over wireless networks and present a systematic view on content-centric network design and its underlying challenges. Towards this end, we first review some of the recent advancements in Information Centric Networking (ICN) which provides the basis on how media contents can be labeled, distributed, and placed across the networks. We then formulate the content delivery task into a content rate maximization problem over a share wireless channel, which, contrasting the conventional wisdom that attempts to increase the bit-rate of a unicast system, maximizes the content delivery capability with a fixed amount of wireless resources. This conceptually simple change enables us to exploit the "content diversity" and the "network diversity" by leveraging the abundant computation sources (through application-layer encoding, pushing and caching, etc.) within the existing wireless networks. A network architecture that enables wireless network crowdsourcing for content delivery is then described, followed by an exemplary campus wireless network that encompasses the above concepts.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 13:04:26 GMT" } ]
2014-10-21T00:00:00
[ [ "Liu", "Hui", "" ], [ "Chen", "Zhiyong", "" ], [ "Tian", "Xiaohua", "" ], [ "Wang", "Xinbing", "" ], [ "Tao", "Meixia", "" ] ]
new_dataset
0.99714
1410.5349
Fredrick Ishengoma
Fredrick R. Ishengoma, Adam B. Mtaho
3D Printing: Developing Countries Perspectives
4 pages, International Journal of Computer Applications Volume 104-Number 11, 2014
null
10.5120/18249-9329
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past decade, 3D printing (3DP) has become popular due to availability of low-cost 3D printers such as RepRap and Fab@Home; and better software, which offers a broad range of manufacturing platform that enables users to create customizable products. 3DP offers everybody with the power to convert a digital design into a three dimensional physical object. While the application of 3DP in developing countries is still at an early stage, the technology application promises vast solutions to existing problems. This paper presents a critical review of the current state of art of 3DP with a particular focus on developing countries. Moreover, it discusses the challenges, opportunities and future insights of 3DP in developing countries. This paper will serve as a basis for discussion and further research on this area.
[ { "version": "v1", "created": "Mon, 20 Oct 2014 16:44:11 GMT" } ]
2014-10-21T00:00:00
[ [ "Ishengoma", "Fredrick R.", "" ], [ "Mtaho", "Adam B.", "" ] ]
new_dataset
0.99835
1306.4774
Anyu Wang
Anyu Wang and Zhifang Zhang
Repair Locality with Multiple Erasure Tolerance
14 pages
IEEE Transactions on Information Theory, Volume 60, Issue 11, pp. 6979 - 6987, Oct 2014
10.1109/TIT.2014.2351404
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In distributed storage systems, erasure codes with locality $r$ is preferred because a coordinate can be recovered by accessing at most $r$ other coordinates which in turn greatly reduces the disk I/O complexity for small $r$. However, the local repair may be ineffective when some of the $r$ coordinates accessed for recovery are also erased. To overcome this problem, we propose the $(r,\delta)_c$-locality providing $\delta -1$ local repair options for a coordinate. Consequently, the repair locality $r$ can tolerate $\delta-1$ erasures in total. We derive an upper bound on the minimum distance $d$ for any linear $[n,k]$ code with information $(r,\delta)_c$-locality. For general parameters, we prove existence of the codes that attain this bound when $n\geq k(r(\delta-1)+1)$, implying tightness of this bound. Although the locality $(r,\delta)$ defined by Prakash et al provides the same level of locality and local repair tolerance as our definition, codes with $(r,\delta)_c$-locality are proved to have more advantage in the minimum distance. In particular, we construct a class of codes with all symbol $(r,\delta)_c$-locality where the gain in minimum distance is $\Omega(\sqrt{r})$ and the information rate is close to 1.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 07:35:09 GMT" } ]
2014-10-20T00:00:00
[ [ "Wang", "Anyu", "" ], [ "Zhang", "Zhifang", "" ] ]
new_dataset
0.994486
1401.2607
Anyu Wang
Anyu Wang, Zhifang Zhang
Repair Locality From a Combinatorial Perspective
null
null
10.1109/ISIT.2014.6875178
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Repair locality is a desirable property for erasure codes in distributed storage systems. Recently, different structures of local repair groups have been proposed in the definitions of repair locality. In this paper, the concept of regenerating set is introduced to characterize the local repair groups. A definition of locality $r^{(\delta -1)}$ (i.e., locality $r$ with repair tolerance $\delta -1$) under the most general structure of regenerating sets is given. All previously studied locality turns out to be special cases of this definition. Furthermore, three representative concepts of locality proposed before are reinvestigated under the framework of regenerating sets, and their respective upper bounds on the minimum distance are reproved in a uniform and brief form. Additionally, a more precise distance bound is derived for the square code which is a class of linear codes with locality $r^{(2)}$ and high information rate, and an explicit code construction attaining the optimal distance bound is obtained.
[ { "version": "v1", "created": "Sun, 12 Jan 2014 11:29:18 GMT" } ]
2014-10-20T00:00:00
[ [ "Wang", "Anyu", "" ], [ "Zhang", "Zhifang", "" ] ]
new_dataset
0.975645
1407.0385
Alex Horn
Alex Horn and Jade Alglave
Concurrent Kleene Algebra of Partial Strings
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Concurrent Kleene Algebra (CKA) is a recently proposed algebraic structure by Hoare and collaborators that unifies the laws of concurrent programming. The unifying power of CKA rests largely on the so-called exchange law that describes how concurrent and sequential composition operators can be interchanged. Based on extensive theoretical work on true concurrency in the past, this paper extends Gischer's pomset model with least fixed point operators and formalizes the program refinement relation by \'{E}sik's monotonic bijective morphisms to construct a partial order model of CKA. The existence of such a model is relevant when we want to prove and disprove properties about concurrent programs with loops. In particular, it gives a foundation for the analysis of programs that concurrently access relaxed memory as shown in subsequent work.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 19:59:41 GMT" }, { "version": "v2", "created": "Thu, 3 Jul 2014 17:51:17 GMT" }, { "version": "v3", "created": "Thu, 31 Jul 2014 11:35:04 GMT" }, { "version": "v4", "created": "Fri, 17 Oct 2014 19:55:45 GMT" } ]
2014-10-20T00:00:00
[ [ "Horn", "Alex", "" ], [ "Alglave", "Jade", "" ] ]
new_dataset
0.998134
1410.4470
Raviteja Vemulapalli
Raviteja Vemulapalli, Vinay Praneeth Boda, and Rama Chellappa
MKL-RT: Multiple Kernel Learning for Ratio-trace Problems via Convex Optimization
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent past, automatic selection or combination of kernels (or features) based on multiple kernel learning (MKL) approaches has been receiving significant attention from various research communities. Though MKL has been extensively studied in the context of support vector machines (SVM), it is relatively less explored for ratio-trace problems. In this paper, we show that MKL can be formulated as a convex optimization problem for a general class of ratio-trace problems that encompasses many popular algorithms used in various computer vision applications. We also provide an optimization procedure that is guaranteed to converge to the global optimum of the proposed optimization problem. We experimentally demonstrate that the proposed MKL approach, which we refer to as MKL-RT, can be successfully used to select features for discriminative dimensionality reduction and cross-modal retrieval. We also show that the proposed convex MKL-RT approach performs better than the recently proposed non-convex MKL-DR approach.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 15:51:50 GMT" }, { "version": "v2", "created": "Fri, 17 Oct 2014 06:12:37 GMT" } ]
2014-10-20T00:00:00
[ [ "Vemulapalli", "Raviteja", "" ], [ "Boda", "Vinay Praneeth", "" ], [ "Chellappa", "Rama", "" ] ]
new_dataset
0.976972
1410.4612
Hirosuke Yamamoto
Hirosuke Yamamoto and Masashi Ueda
Identification Codes to Identify Multiple Objects
14 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the case of ordinary identification coding, a code is devised to identify a single object among $N$ objects. But, in this paper, we consider an identification coding problem to identify $K$ objects at once among $N$ objects in the both cases that $K$ objects are ranked or not ranked. By combining Kurosawa-Yoshida scheme with Moulin-Koetter scheme, an efficient identification coding scheme is proposed, which can attain high coding rate and error exponents compared with the case that an ordinary identification code is used $K$ times. Furthermore, the achievable triplet of rate and error exponents of type I and type II decoding error probabilities are derived for the proposed coding scheme.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 00:31:21 GMT" } ]
2014-10-20T00:00:00
[ [ "Yamamoto", "Hirosuke", "" ], [ "Ueda", "Masashi", "" ] ]
new_dataset
0.958559
1410.4673
Zhiding Yu
Weiyang Liu, Zhiding Yu, Lijia Lu, Yandong Wen, Hui Li and Yuexian Zou
KCRC-LCD: Discriminative Kernel Collaborative Representation with Locality Constrained Dictionary for Visual Categorization
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the image classification problem via kernel collaborative representation classification with locality constrained dictionary (KCRC-LCD). Specifically, we propose a kernel collaborative representation classification (KCRC) approach in which kernel method is used to improve the discrimination ability of collaborative representation classification (CRC). We then measure the similarities between the query and atoms in the global dictionary in order to construct a locality constrained dictionary (LCD) for KCRC. In addition, we discuss several similarity measure approaches in LCD and further present a simple yet effective unified similarity measure whose superiority is validated in experiments. There are several appealing aspects associated with LCD. First, LCD can be nicely incorporated under the framework of KCRC. The LCD similarity measure can be kernelized under KCRC, which theoretically links CRC and LCD under the kernel method. Second, KCRC-LCD becomes more scalable to both the training set size and the feature dimension. Example shows that KCRC is able to perfectly classify data with certain distribution, while conventional CRC fails completely. Comprehensive experiments on many public datasets also show that KCRC-LCD is a robust discriminative classifier with both excellent performance and good scalability, being comparable or outperforming many other state-of-the-art approaches.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 09:40:20 GMT" } ]
2014-10-20T00:00:00
[ [ "Liu", "Weiyang", "" ], [ "Yu", "Zhiding", "" ], [ "Lu", "Lijia", "" ], [ "Wen", "Yandong", "" ], [ "Li", "Hui", "" ], [ "Zou", "Yuexian", "" ] ]
new_dataset
0.996316
1410.4730
Junhui Hou
Junhui Hou and Lap-Pui Chau and Nadia Magnenat-Thalmann and Ying He
Human Motion Capture Data Tailored Transform Coding
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human motion capture (mocap) is a widely used technique for digitalizing human movements. With growing usage, compressing mocap data has received increasing attention, since compact data size enables efficient storage and transmission. Our analysis shows that mocap data have some unique characteristics that distinguish themselves from images and videos. Therefore, directly borrowing image or video compression techniques, such as discrete cosine transform, does not work well. In this paper, we propose a novel mocap-tailored transform coding algorithm that takes advantage of these features. Our algorithm segments the input mocap sequences into clips, which are represented in 2D matrices. Then it computes a set of data-dependent orthogonal bases to transform the matrices to frequency domain, in which the transform coefficients have significantly less dependency. Finally, the compression is obtained by entropy coding of the quantized coefficients and the bases. Our method has low computational cost and can be easily extended to compress mocap databases. It also requires neither training nor complicated parameter setting. Experimental results demonstrate that the proposed scheme significantly outperforms state-of-the-art algorithms in terms of compression performance and speed.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 14:16:08 GMT" } ]
2014-10-20T00:00:00
[ [ "Hou", "Junhui", "" ], [ "Chau", "Lap-Pui", "" ], [ "Magnenat-Thalmann", "Nadia", "" ], [ "He", "Ying", "" ] ]
new_dataset
0.957698
1309.2402
Ke Xu
Rui Fan, Jichang Zhao, Yan Chen and Ke Xu
Anger is More Influential Than Joy: Sentiment Correlation in Weibo
null
PLoS ONE 9(10): e110184, 2014
10.1371/journal.pone.0110184
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed the tremendous growth of the online social media. In China, Weibo, a Twitter-like service, has attracted more than 500 million users in less than four years. Connected by online social ties, different users influence each other emotionally. We find the correlation of anger among users is significantly higher than that of joy, which indicates that angry emotion could spread more quickly and broadly in the network. While the correlation of sadness is surprisingly low and highly fluctuated. Moreover, there is a stronger sentiment correlation between a pair of users if they share more interactions. And users with larger number of friends posses more significant sentiment influence to their neighborhoods. Our findings could provide insights for modeling sentiment influence and propagation in online social networks.
[ { "version": "v1", "created": "Tue, 10 Sep 2013 07:59:02 GMT" } ]
2014-10-17T00:00:00
[ [ "Fan", "Rui", "" ], [ "Zhao", "Jichang", "" ], [ "Chen", "Yan", "" ], [ "Xu", "Ke", "" ] ]
new_dataset
0.999159
1405.6671
Abuzer Yakaryilmaz
Viliam Geffert and Abuzer Yakaryilmaz
Classical automata on promise problems
21 pages, significantly improved with a correction (the single sentence statement given just before Corollary 4 in the previous version and (in the conference version) is not correct). A preliminary version appeared in DCFS2014 [vol. 8614 of LNCS, pp. 126--137, Springer-Verlag, 2014]
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Promise problems were mainly studied in quantum automata theory. Here we focus on state complexity of classical automata for promise problems. First, it was known that there is a family of unary promise problems solvable by quantum automata by using a single qubit, but the number of states required by corresponding one-way deterministic automata cannot be bounded by a constant. For this family, we show that even two-way nondeterminism does not help to save a single state. By comparing this with the corresponding state complexity of alternating machines, we then get a tight exponential gap between two-way nondeterministic and one-way alternating automata solving unary promise problems. Second, despite of the existing quadratic gap between Las Vegas realtime probabilistic automata and one-way deterministic automata for language recognition, we show that, by turning to promise problems, the tight gap becomes exponential. Last, we show that the situation is different for one-way probabilistic automata with two-sided bounded-error. We present a family of unary promise problems that is very easy for these machines; solvable with only two states, but the number of states in two-way alternating or any simpler automata is not limited by a constant. Moreover, we show that one-way bounded-error probabilistic automata can solve promise problems not solvable at all by any other classical model.
[ { "version": "v1", "created": "Mon, 26 May 2014 18:34:55 GMT" }, { "version": "v2", "created": "Thu, 16 Oct 2014 16:57:05 GMT" } ]
2014-10-17T00:00:00
[ [ "Geffert", "Viliam", "" ], [ "Yakaryilmaz", "Abuzer", "" ] ]
new_dataset
0.995542
1410.4256
Aude Marzuoli
Aude Marzuoli, Emmanuel Boidot, Eric Feron, Paul B.C. van Erp, Alexis Ucko, Alexandre Bayen, Mark Hansen
Anatomy of a Crash
null
null
null
null
cs.SY cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transportation networks constitute a critical infrastructure enabling the transfers of passengers and goods, with a significant impact on the economy at different scales. Transportation modes, whether air, road or rail, are coupled and interdependent. The frequent occurrence of perturbations on one or several modes disrupts passengers' entire journeys, directly and through ripple effects. The present paper provides a case report of the Asiana Crash in San Francisco International Airport on July 6th 2013 and its repercussions on the multimodal transportation network. It studies the resulting propagation of disturbances on the transportation infrastructure in the United States. The perturbation takes different forms and varies in scale and time frame : cancellations and delays snowball in the airspace, highway traffic near the airport is impacted by congestion in previously never congested locations, and transit passenger demand exhibit unusual traffic peaks in between airports in the Bay Area. This paper, through a case study, aims at stressing the importance of further data-driven research on interdependent infrastructure networks for increased resilience. The end goal is to form the basis for optimization models behind providing more reliable passenger door-to-door journeys.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 23:18:12 GMT" } ]
2014-10-17T00:00:00
[ [ "Marzuoli", "Aude", "" ], [ "Boidot", "Emmanuel", "" ], [ "Feron", "Eric", "" ], [ "van Erp", "Paul B. C.", "" ], [ "Ucko", "Alexis", "" ], [ "Bayen", "Alexandre", "" ], [ "Hansen", "Mark", "" ] ]
new_dataset
0.997582
1410.4290
Peng Wang
Peng Wang, Yonghui Li, Lingyang Song, and Branka Vucetic
Multi-Gigabits Millimetre Wave Wireless Communications for 5G: From Fixed Access to Cellular Networks
25 pages, 4 figures, 2 tables, to appear in IEEE Communications Magazine
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the formidable growth of various booming wireless communication services that require ever-increasing data throughputs, the conventional microwave band below 10 GHz, which is currently used by almost all mobile communication systems, is going to reach its saturation point within just a few years. Therefore, the attention of radio system designers has been pushed towards ever-higher segments of the frequency spectrum in a quest for capacity increase. In this article, we investigate the feasibility, advantages and challenges of future wireless communications over the E-band frequencies. We start from a brief review of the history of E-band spectrum and its light licensing policy as well as benefits/challenges. Then we introduce the propagation characteristics of E-band signals, based on which some potential fixed and mobile applications at the E-band are investigated. In particular, we analyze the achievability of non-trivial multiplexing gain in fixed point-to-point E-band links and propose an E-band mobile broadband (EMB) system as a candidate for the next generation mobile communication networks. The channelization and frame structure of the EMB system are discussed in details.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 04:50:21 GMT" } ]
2014-10-17T00:00:00
[ [ "Wang", "Peng", "" ], [ "Li", "Yonghui", "" ], [ "Song", "Lingyang", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.997427
1410.4330
Petar Popovski
Petar Popovski
Ultra-Reliable Communication in 5G Wireless Systems
To be presented at the 1st International Conference on 5G for Ubiquitous Connectivity
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless 5G systems will not only be "4G, but faster". One of the novel features discussed in relation to 5G is Ultra-Reliable Communication (URC), an operation mode not present in today's wireless systems. URC refers to provision of certain level of communication service almost 100 % of the time. Example URC applications include reliable cloud connectivity, critical connections for industrial automation and reliable wireless coordination among vehicles. This paper puts forward a systematic view on URC in 5G wireless systems. It starts by analyzing the fundamental mechanisms that constitute a wireless connection and concludes that one of the key steps towards enabling URC is revision of the methods for encoding control information (metadata) and data. It introduces the key concept of Reliable Service Composition, where a service is designed to adapt its requirements to the level of reliability that can be attained. The problem of URC is analyzed across two different dimensions. The first dimension is the type of URC problem that is defined based on the time frame used to measure the reliability of the packet transmission. Two types of URC problems are identified: long-term URC (URC-L) and short-term URC (URC-S). The second dimension is represented by the type of reliability impairment that can affect the communication reliability in a given scenario. The main objective of this paper is to create the context for defining and solving the new engineering problems posed by URC in 5G.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 08:26:42 GMT" } ]
2014-10-17T00:00:00
[ [ "Popovski", "Petar", "" ] ]
new_dataset
0.970044
1410.4398
Biju Issac
B. Issac
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
12 pages. available in Issac, B. (2009). Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security (IJNS), ISSN 1816-353X (print), ISSN 1816-3548 (online), 8(1), 102-113
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For network computers to communicate to one another, they need to know one another's IP address and MAC address. Address Resolution Protocol (ARP) is developed to find the Ethernet address that map to a specific IP address. The source computer broadcasts the request for Ethernet address and eventually the target computer replies. The IP to Ethernet address mapping would later be stored in an ARP Cache for some time duration, after which the process is repeated. Since ARP is susceptible to ARP poisoning attacks, we propose to make it unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spoofing. The secure protocol designs are explained in detail. Lastly we also discuss some performance issues to show how the proposed protocols work.
[ { "version": "v1", "created": "Thu, 16 Oct 2014 12:43:21 GMT" } ]
2014-10-17T00:00:00
[ [ "Issac", "B.", "" ] ]
new_dataset
0.999372
1410.4507
Tobias Isenberg
Tobias Isenberg and Heike Wehrheim
Proof-Carrying Hardware via IC3
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proof-carrying hardware (PCH) is an approach to achieving safety of dynamically reconfigurable hardware, transferring the idea of proof-carrying code to the hardware domain. Current PCH approaches are, however, either limited to combinational and bounded unfoldings of sequential circuits, or only provide semi-automatic proof generation. We propose a new approach to PCH which employs IC3 as proof generator, making automatic PCH applicable to sequential circuits in their full generality. We demonstrate feasibility of our approach by showing that proof validation is several orders of magnitude faster than original proof generation while (most often) generating smaller proofs than current PCHs.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 12:38:49 GMT" } ]
2014-10-17T00:00:00
[ [ "Isenberg", "Tobias", "" ], [ "Wehrheim", "Heike", "" ] ]
new_dataset
0.994818
1310.7665
Madhav Jha
Madhav Jha, C. Seshadhri, Ali Pinar
Counting Triangles in Real-World Graph Streams: Dealing with Repeated Edges and Time Windows
null
null
null
null
cs.DS cs.DM cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-world graphs often manifest as a massive temporal stream of edges. The need for real-time analysis of such large graph streams has led to progress on low memory, one-pass streaming graph algorithms. These algorithms were designed for simple graphs, assuming an edge is not repeated in the stream. Real graph streams however, are almost always multigraphs i.e., they contain many duplicate edges. The assumption of no repeated edges requires an extra pass *storing all the edges* just for deduplication, which defeats the purpose of small memory algorithms. We describe an algorithm for estimating the triangle count of a multigraph stream of edges. We show that all previous streaming algorithms for triangle counting fail for multigraph streams, despite their impressive accuracies for simple graphs. The bias created by duplicate edges is a major problem, and leads these algorithms astray. Our algorithm avoids these biases through careful debiasing strategies and has provable theoretical guarantees and excellent empirical performance. Our algorithm builds on the previously introduced wedge sampling methodology. Another challenge in analyzing temporal graphs is finding the right temporal window size. Our algorithm seamlessly handles multiple time windows, and does not require committing to any window size(s) a priori. We apply our algorithm to discover fascinating transitivity and triangle trends in real-world graph streams.
[ { "version": "v1", "created": "Tue, 29 Oct 2013 02:36:20 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2014 20:57:33 GMT" } ]
2014-10-16T00:00:00
[ [ "Jha", "Madhav", "" ], [ "Seshadhri", "C.", "" ], [ "Pinar", "Ali", "" ] ]
new_dataset
0.99312
1405.0029
Namyoon Lee
Namyoon Lee and Robert W. Heath Jr
Space-Time Physical-Layer Network Coding
To appear in IEEE JSAC special issue on "Fundamental Approaches to Network Coding in Wireless Communication Systems.""
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A space-time physical-layer network coding (ST- PNC) method is presented for information exchange among multiple users over fully-connected multi-way relay networks. The method involves two steps: i) side-information learning and ii) space-time relay transmission. In the first step, different sets of users are scheduled to send signals over networks and the remaining users and relays overhear the transmitted signals, thereby learning the interference patterns. In the second step, multiple relays cooperatively send out linear combinations of signals received in the previous phase using space-time precoding so that all users efficiently exploit their side-information in the form of: 1) what they sent and 2) what they overheard in decoding. This coding concept is illustrated through two simple network examples. It is shown that ST-PNC improves the sum of degrees of freedom (sum-DoF) of the network compared to existing interference management methods. With ST-PNC, the sum-DoF of a general multi-way relay network without channel knowledge at the users is characterized in terms of relevant system parameters, chiefly the number of users, the number of relays, and the number of antennas at relays. A major implication of the derived results is that efficiently harnessing both transmit- ted and overheard signals as side-information brings significant performance improvements to fully-connected multi-way relay networks.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 20:43:33 GMT" }, { "version": "v2", "created": "Wed, 15 Oct 2014 19:59:46 GMT" } ]
2014-10-16T00:00:00
[ [ "Lee", "Namyoon", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.997825
1410.3932
Mei Kuan Lim
Mei Kuan Lim, Chee Seng Chan, Dorothy Monekosso, Paolo Remagnino
Detection of Salient Regions in Crowded Scenes
Accepted in Electronics Letters Vol. 5, Issue 5
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing number of cameras and a handful of human operators to monitor the video inputs from hundreds of cameras leave the system ill equipped to fulfil the task of detecting anomalies. Thus, there is a dire need to automatically detect regions that require immediate attention for a more effective and proactive surveillance. We propose a framework that utilises the temporal variations in the flow field of a crowd scene to automatically detect salient regions, while eliminating the need to have prior knowledge of the scene or training. We deem the flow fields to be a dynamic system and adopt the stability theory of dynamical systems, to determine the motion dynamics within a given area. In the context of this work, salient regions refer to areas with high motion dynamics, where points in a particular region are unstable. Experimental results on public, crowd scenes have shown the effectiveness of the proposed method in detecting salient regions which correspond to unstable flow, occlusions, bottlenecks, entries and exits.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 05:24:16 GMT" } ]
2014-10-16T00:00:00
[ [ "Lim", "Mei Kuan", "" ], [ "Chan", "Chee Seng", "" ], [ "Monekosso", "Dorothy", "" ], [ "Remagnino", "Paolo", "" ] ]
new_dataset
0.980926
1410.3977
Ting-Yu Ho
Ting-Yu Ho, Yi-Nung Yeh, and De-Nian Yang
Multi-View 3D Video Multicast for Broadband IP Networks
9 pages, 10 figures, IEEE ICC 2015
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the recent emergence of 3D-supported TVs, video service providers now face an opportunity to provide high resolution multi-view 3D videos over IP networks. One simple way to support efficient communications between a video server and multiple clients is to deliver each desired view in a multicast stream. Nevertheless, it is expected that significantly increased bandwidth will be required to support the transmission of all views in multi-view 3D videos. However, the recent emergence of a new video synthesis technique called Depth-Image-Based Rendering (DIBR) suggests that multi-view 3D video does not necessarily require the transmission of all views. Therefore, we formulate a new problem, named Multi-view and Multicast Delivery Selection Problem (MMDS), and design an algorithm, called MMDEA, to find the optimal solution. Simulation results manifest that using DIBR can effectively reduce bandwidth consumption by 35% compared to the original multicast delivery scheme.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 09:09:10 GMT" } ]
2014-10-16T00:00:00
[ [ "Ho", "Ting-Yu", "" ], [ "Yeh", "Yi-Nung", "" ], [ "Yang", "De-Nian", "" ] ]
new_dataset
0.983807
1410.4019
Subhadip Basu
Dipak Kumar Kole, Subhadip Basu
An Automated Group Key Authentication System Using Secret Image Sharing Scheme
null
Proceedings of the International Conference on Recent trends in Information Systems (IRIS-06), pp. 98-106, Kovilpatti, Tamil Nadu, India, 2006
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an open network environment, privacy of group communication and integrity of the communication data are the two major issues related to secured information exchange. The required level of security may be achieved by authenticating a group key in the communication channel, where contribution from each group member becomes a part of the overall group key. In the current work, we have developed an authentication system through Central Administrative Server (CAS) for automatic integration and validation of the group key. For secured group communication, the CAS generates a secret alphanumeric group key image. Using secret image sharing scheme, this group key image shares are distributed among all the participating group members in the open network. Some or all the secret shares may be merged to reconstruct the group key image at CAS. A k-nearest neighbor classifier with 48 features to represent the images, is used to validate the reconstructed image with the one stored in the CAS. 48 topological features are used to represent the reconstructed group key image. We have achieved 99.1% classification accuracy for 26 printed English uppercase characters and 10 numeric digits.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 11:38:21 GMT" } ]
2014-10-16T00:00:00
[ [ "Kole", "Dipak Kumar", "" ], [ "Basu", "Subhadip", "" ] ]
new_dataset
0.988315
1410.4078
Bernhard Rumpe
Bernhard Rumpe, Christian Berger, Holger Krahn
Softwaretechnische Absicherung intelligenter Systeme im Fahrzeug
14 pages, 1 figure in German
Proceedings der 21. VDI/VW-Gemeinschaftstagung - Integrierte Sicherheit und Fahrerassistenzsysteme. 12.-13. Oktober 2006, Wolfsburg
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
"This article describes software engineering techniques to be used in order to ensure the necessary quality of intelligent and therefore massive software-based systems in vehicles. Quality assurance for intelligent software is achieved through a bundle of modern software engineering methods. Architecture and design patterns for securing the software components are supplemented by test concepts and frameworks for validation and checks of robustness of the implementation. These patterns describe established and therefore consolidated solutions for certain problems as for instance reliability or efficient execution. -- Dieser Artikel skizziert, welche Software-Entwurfstechniken heute zum Einsatz kommen k\"onnen, um intelligente, Software-lastige Systeme im Fahrzeug abzusichern. Dabei spielt zun\"achst das Qualit\"atsmanagement durch Software-technische Ma{\ss}nahmen eine zentrale Rolle. Architektur- und Entwurfmuster f\"ur die Software-technische Absicherung von Komponenten werden erg\"anzt um Test-Konzepte zur Validierung von Spezifikationen und der Robustheit der Implementierung. Architekturen und Entwurfs-Muster beschreiben erprobte und damit konsolidierte L\"osungen f\"ur bestimmte Problemklassen wie etwa Zuverl\"assigkeit oder effiziente Ausf\"uhrung.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 14:48:52 GMT" } ]
2014-10-16T00:00:00
[ [ "Rumpe", "Bernhard", "" ], [ "Berger", "Christian", "" ], [ "Krahn", "Holger", "" ] ]
new_dataset
0.995494
1410.4085
Alessandro De Luca
Aldo de Luca and Alessandro De Luca
Sturmian words and the Stern sequence
35 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Central, standard, and Christoffel words are three strongly interrelated classes of binary finite words which represent a finite counterpart of characteristic Sturmian words. A natural arithmetization of the theory is obtained by representing central and Christoffel words by irreducible fractions labeling respectively two binary trees, the Raney (or Calkin-Wilf) tree and the Stern-Brocot tree. The sequence of denominators of the fractions in Raney's tree is the famous Stern diatomic numerical sequence. An interpretation of the terms $s(n)$ of Stern's sequence as lengths of Christoffel words when $n$ is odd, and as minimal periods of central words when $n$ is even, allows one to interpret several results on Christoffel and central words in terms of Stern's sequence and, conversely, to obtain a new insight in the combinatorics of Christoffel and central words by using properties of Stern's sequence. One of our main results is a non-commutative version of the "alternating bit sets theorem" by Calkin and Wilf. We also study the length distribution of Christoffel words corresponding to nodes of equal height in the tree, obtaining some interesting bounds and inequalities.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 14:57:10 GMT" } ]
2014-10-16T00:00:00
[ [ "de Luca", "Aldo", "" ], [ "De Luca", "Alessandro", "" ] ]
new_dataset
0.998031
1410.4141
Shadman Sakib
Shadman Sakib, Rakibul Haq and Tariq Wazed
Unified mobile public health care system (UMPHCS) for underdeveloped countries
6 pages, 8 figures, 3 tables. Published in the proceedings of 3rd International Conference on Informatics, Electronics & Vision, Dhaka, Bangladesh. Available in IEEExplore. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6850801&url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6850801
Proceedings of 3rd International Conference on Informatics, Electronics & Vision-2014, Dhaka, Bangladesh. Published in IEEExplore
10.1109/ICIEV.2014.6850801
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have proposed a new smartphone based system for health care, monitoring and diagnosis, which is specially designed to efficiently increase the public health care system in the distant, rural, unreached areas of the underdeveloped and developing countries. In this all-in-one system, we have digitized the health monitoring and diagnostic devices in a way so that each device works as a minimum `plug and play' sensor module of the total system, reducing the cost radically. Besides, the easy-to-use smartphone application for operating the whole system reduces the necessity of skilled and trained manpower, making it a perfect toolbox for the government health workers in the unreached rural areas.
[ { "version": "v1", "created": "Wed, 15 Oct 2014 17:17:14 GMT" } ]
2014-10-16T00:00:00
[ [ "Sakib", "Shadman", "" ], [ "Haq", "Rakibul", "" ], [ "Wazed", "Tariq", "" ] ]
new_dataset
0.993419
1410.4147
Belal Amro
Belal Amro
Mobile Agent Systems, Recent Security Threats and Counter Measures
international journal of computer science issues, march 2014
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code has been used in the form of remote job entry systems. Today's mobile agents can be characterized in a number of ways ranging from simple distributed objects to highly organized intelligent softwares. As a result of this rapid evolvement of mobile agents, plenty of critical security issues has risen and plenty of work is being done to address these problems. The aim is to provide trusted mobile agent systems that can be easily deployed and widely adopted. In this paper, we provide an overview of the most recent threats facing the designers of agent platforms and the developers of agent-based applications. The paper also identifies security objectives, and measures for countering the identified threats and fulfilling those security objectives.
[ { "version": "v1", "created": "Mon, 6 Oct 2014 19:35:22 GMT" } ]
2014-10-16T00:00:00
[ [ "Amro", "Belal", "" ] ]
new_dataset
0.999242
1410.3628
Jan Vr\v{s}ek
Jan Vr\v{s}ek and Miroslav L\'avi\v{c}ka
Recognizing implicitly given rational canal surfaces
10 pages, 1 figure
null
null
null
cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is still a challenging task of today to recognize the type of a given algebraic surface which is described only by its implicit representation. In~this paper we will investigate in more detail the case of canal surfaces that are often used in geometric modelling, Computer-Aided Design and technical practice (e.g. as blending surfaces smoothly joining two parts with circular ends). It is known that if the squared medial axis transform is a rational curve then so is also the corresponding surface. However, starting from a polynomial it is not known how to decide if the corresponding algebraic surface is rational canal surface or not. Our goal is to formulate a simple and efficient algorithm whose input is a~polynomial with the coefficients from some subfield of real numbers and the output is the answer whether the surface is a rational canal surface. In the affirmative case we also compute a rational parameterization of the squared medial axis transform which can be then used for finding a rational parameterization of the implicitly given canal surface.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 09:46:44 GMT" } ]
2014-10-15T00:00:00
[ [ "Vršek", "Jan", "" ], [ "Lávička", "Miroslav", "" ] ]
new_dataset
0.9985
1410.3710
Jisun An
Haewoon Kwak and Jisun An
Understanding News Geography and Major Determinants of Global News Coverage of Disasters
Presented at Computation+Jounalism Symposium (C+J Symposium) 2014
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we reveal the structure of global news coverage of disasters and its determinants by using a large-scale news coverage dataset collected by the GDELT (Global Data on Events, Location, and Tone) project that monitors news media in over 100 languages from the whole world. Significant variables in our hierarchical (mixed-effect) regression model, such as the number of population, the political stability, the damage, and more, are well aligned with a series of previous research. Yet, strong regionalism we found in news geography highlights the necessity of the comprehensive dataset for the study of global news coverage.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 14:36:29 GMT" } ]
2014-10-15T00:00:00
[ [ "Kwak", "Haewoon", "" ], [ "An", "Jisun", "" ] ]
new_dataset
0.996693
1410.3735
Adam Petcher
Adam Petcher and Greg Morrisett
The Foundational Cryptography Framework
null
null
null
null
cs.PL cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Foundational Cryptography Framework (FCF) for developing and checking complete proofs of security for cryptographic schemes within a proof assistant. This is a general-purpose framework that is capable of modeling and reasoning about a wide range of cryptographic schemes, security definitions, and assumptions. Security is proven in the computational model, and the proof provides concrete bounds as well as asymptotic conclusions. FCF provides a language for probabilistic programs, a theory that is used to reason about programs, and a library of tactics and definitions that are useful in proofs about cryptography. The framework is designed to leverage fully the existing theory and capabilities of the Coq proof assistant in order to reduce the effort required to develop proofs.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 15:34:39 GMT" } ]
2014-10-15T00:00:00
[ [ "Petcher", "Adam", "" ], [ "Morrisett", "Greg", "" ] ]
new_dataset
0.998018
1410.3791
Rami Al-Rfou
Rami Al-Rfou, Vivek Kulkarni, Bryan Perozzi, Steven Skiena
POLYGLOT-NER: Massive Multilingual Named Entity Recognition
9 pages, 4 figures, 5 tables
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing diversity of languages used on the web introduces a new level of complexity to Information Retrieval (IR) systems. We can no longer assume that textual content is written in one language or even the same language family. In this paper, we demonstrate how to build massive multilingual annotators with minimal human expertise and intervention. We describe a system that builds Named Entity Recognition (NER) annotators for 40 major languages using Wikipedia and Freebase. Our approach does not require NER human annotated datasets or language specific resources like treebanks, parallel corpora, and orthographic rules. The novelty of approach lies therein - using only language agnostic techniques, while achieving competitive performance. Our method learns distributed word representations (word embeddings) which encode semantic and syntactic features of words in each language. Then, we automatically generate datasets from Wikipedia link structure and Freebase attributes. Finally, we apply two preprocessing stages (oversampling and exact surface form matching) which do not require any linguistic expertise. Our evaluation is two fold: First, we demonstrate the system performance on human annotated datasets. Second, for languages where no gold-standard benchmarks are available, we propose a new method, distant evaluation, based on statistical machine translation.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 18:37:32 GMT" } ]
2014-10-15T00:00:00
[ [ "Al-Rfou", "Rami", "" ], [ "Kulkarni", "Vivek", "" ], [ "Perozzi", "Bryan", "" ], [ "Skiena", "Steven", "" ] ]
new_dataset
0.989972
1410.3812
Yi-Peng Wei
Yi-Peng Wei and Sennur Ulukus
Polar Coding for the General Wiretap Channel
Submitted to IEEE ITW 2015
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic security is an important problem. By applying the two recently developed techniques for polar codes, we propose a polar coding scheme to achieve the secrecy capacity of the general wiretap channel.
[ { "version": "v1", "created": "Tue, 14 Oct 2014 19:41:48 GMT" } ]
2014-10-15T00:00:00
[ [ "Wei", "Yi-Peng", "" ], [ "Ulukus", "Sennur", "" ] ]
new_dataset
0.998938
1405.5410
Kato Mivule
Kato Mivule
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
8 Pages, 15 Figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genomic data provides clinical researchers with vast opportunities to study various patient ailments. Yet the same data contains revealing information, some of which a patient might want to remain concealed. The question then arises: how can an entity transact in full DNA data while concealing certain sensitive pieces of information in the genome sequence, and maintain DNA data utility? As a response to this question, we propose a codon frequency obfuscation heuristic, in which a redistribution of codon frequency values with highly expressed genes is done in the same amino acid group, generating an obfuscated DNA sequence. Our preliminary results show that it might be possible to publish an obfuscated DNA sequence with a desired level of similarity (utility) to the original DNA sequence.
[ { "version": "v1", "created": "Wed, 21 May 2014 13:25:34 GMT" }, { "version": "v2", "created": "Sun, 12 Oct 2014 18:54:40 GMT" } ]
2014-10-14T00:00:00
[ [ "Mivule", "Kato", "" ] ]
new_dataset
0.981238
1406.2076
Hieu Nguyen
Hieu D. Nguyen and Greg E. Coxson
Doppler Tolerance, Complementary Code Sets and the Generalized Thue-Morse Sequence
12 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We generalize the construction of Doppler-tolerant Golay complementary waveforms by Pezeshki-Calderbank-Moran-Howard to complementary code sets having more than two codes. This is accomplished by exploiting number-theoretic results involving the sum-of-digits function, equal sums of like powers, and a generalization to more than two symbols of the classical two-symbol Prouhet-Thue-Morse sequence.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 04:36:09 GMT" }, { "version": "v2", "created": "Tue, 19 Aug 2014 14:51:33 GMT" }, { "version": "v3", "created": "Sat, 11 Oct 2014 02:55:49 GMT" } ]
2014-10-14T00:00:00
[ [ "Nguyen", "Hieu D.", "" ], [ "Coxson", "Greg E.", "" ] ]
new_dataset
0.999098
1409.7092
Mo Dong
Mo Dong and Qingxi Li and Doron Zarchy and Brighten Godfrey and Michael Schapira
PCC: Re-architecting Congestion Control for Consistent High Performance
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TCP and its variants have suffered from surprisingly poor performance for decades. We argue the TCP family has little hope to achieve consistent high performance due to a fundamental architectural deficiency: hardwiring packet-level events to control responses without understanding the real performance result of its actions. We propose Performance-oriented Congestion Control (PCC), a new congestion control architecture in which each sender continuously observes the connection between its actions and empirically experienced performance, enabling it to consistently adopt actions that result in high performance. We prove that PCC converges to a stable and fair equilibrium. Across many real-world and challenging environments, PCC shows consistent and often 10x performance improvement, with better fairness and stability than TCP. PCC requires no router hardware support or new packet format.
[ { "version": "v1", "created": "Wed, 24 Sep 2014 20:43:01 GMT" }, { "version": "v2", "created": "Tue, 30 Sep 2014 18:08:14 GMT" }, { "version": "v3", "created": "Sat, 11 Oct 2014 02:24:24 GMT" } ]
2014-10-14T00:00:00
[ [ "Dong", "Mo", "" ], [ "Li", "Qingxi", "" ], [ "Zarchy", "Doron", "" ], [ "Godfrey", "Brighten", "" ], [ "Schapira", "Michael", "" ] ]
new_dataset
0.97786
1409.7489
Jisun An
Jisun An, Daniele Quercia, Jon Crowcroft
Recommending Investors for Crowdfunding Projects
Published in Proc. of WWW 2014
null
null
null
cs.SI cs.CY cs.HC physics.soc-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To bring their innovative ideas to market, those embarking in new ventures have to raise money, and, to do so, they have often resorted to banks and venture capitalists. Nowadays, they have an additional option: that of crowdfunding. The name refers to the idea that funds come from a network of people on the Internet who are passionate about supporting others' projects. One of the most popular crowdfunding sites is Kickstarter. In it, creators post descriptions of their projects and advertise them on social media sites (mainly Twitter), while investors look for projects to support. The most common reason for project failure is the inability of founders to connect with a sufficient number of investors, and that is mainly because hitherto there has not been any automatic way of matching creators and investors. We thus set out to propose different ways of recommending investors found on Twitter for specific Kickstarter projects. We do so by conducting hypothesis-driven analyses of pledging behavior and translate the corresponding findings into different recommendation strategies. The best strategy achieves, on average, 84% of accuracy in predicting a list of potential investors' Twitter accounts for any given project. Our findings also produced key insights about the whys and wherefores of investors deciding to support innovative efforts.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 07:57:28 GMT" }, { "version": "v2", "created": "Sun, 12 Oct 2014 11:23:36 GMT" } ]
2014-10-14T00:00:00
[ [ "An", "Jisun", "" ], [ "Quercia", "Daniele", "" ], [ "Crowcroft", "Jon", "" ] ]
new_dataset
0.983546
1410.2889
Omar Rafique
Omar Rafique
Area Versus Speed Trade-off Analysis of a WiMAX Deinterleaver Circuit Design
four pages, two figures and six tables
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Trade-off is one of the main design parameters in the field of electronic circuit design. Whereas smaller electronics devices which use less hardware due to techniques like hardware multiplexing or due to smaller devices created due to techniques developed by nanotechnology and MEMS, are more appealing, a trade-off between area, power and speed is inevitable. This paper analyses the trade-off in the design of WiMAX deinterleaver. The main aim is to reduce the hardware utilization in a deinterleaver but speed and power consumption are important parameters which cannot be overlooked.
[ { "version": "v1", "created": "Fri, 10 Oct 2014 06:14:09 GMT" } ]
2014-10-14T00:00:00
[ [ "Rafique", "Omar", "" ] ]
new_dataset
0.960563
1410.2910
Daoud Clarke
Daoud Clarke
Riesz Logic
null
null
null
null
cs.LO cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce Riesz Logic, whose models are abelian lattice ordered groups, which generalise Riesz spaces (vector lattices), and show soundness and completeness. Our motivation is to provide a logic for distributional semantics of natural language, where words are typically represented as elements of a vector space whose dimensions correspond to contexts in which words may occur. This basis provides a lattice ordering on the space, and this ordering may be interpreted as "distributional entailment". Several axioms of Riesz Logic are familiar from Basic Fuzzy Logic, and we show how the models of these two logics may be related; Riesz Logic may thus be considered a new fuzzy logic. In addition to applications in natural language processing, there is potential for applying the theory to neuro-fuzzy systems.
[ { "version": "v1", "created": "Fri, 10 Oct 2014 21:14:02 GMT" } ]
2014-10-14T00:00:00
[ [ "Clarke", "Daoud", "" ] ]
new_dataset
0.999365
1410.3013
Mustafa Kocak
Mustafa Anil Kocak, Elza Erkip
Communicating Lists Over a Noisy Channel
Submitted to 52nd Annual Allerton Conference on Communication, Control, and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work considers a communication scenario where the transmitter chooses a list of size K from a total of M messages to send over a noisy communication channel, the receiver generates a list of size L and communication is considered successful if the intersection of the lists at two terminals has cardinality greater than a threshold T. In traditional communication systems K=L=T=1. The fundamental limits of this setup in terms of K, L, T and the Shannon capacity of the channel between the terminals are examined. Specifically, necessary and/or sufficient conditions for asymptotically error free communication are provided.
[ { "version": "v1", "created": "Sat, 11 Oct 2014 17:18:32 GMT" } ]
2014-10-14T00:00:00
[ [ "Kocak", "Mustafa Anil", "" ], [ "Erkip", "Elza", "" ] ]
new_dataset
0.983771
1410.3334
Nick Bassiliades
Kalliopi Kravari, Nick Bassiliades
DISARM: A Social Distributed Agent Reputation Model based on Defeasible Logic
Paper under review. Keywords: Semantic Web, Intelligent Multi-agent Systems, Agent Reputation, Defeasible Reasoning
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent Agents act in open and thus risky environments, hence making the appropriate decision about who to trust in order to interact with, could be a challenging process. As intelligent agents are gradually enriched with Semantic Web technology, acting on behalf of their users with limited or no human intervention, their ability to perform assigned tasks is scrutinized. Hence, trust and reputation models, based on interaction trust or witness reputation, have been proposed, yet they often presuppose the use of a centralized authority. Although such mechanisms are more popular, they are usually faced with skepticism, since users may question the trustworthiness and the robustness of a central authority. Distributed models, on the other hand, are more complex but they provide personalized estimations based on each agent's interests and preferences. To this end, this article proposes DISARM, a novel distributed reputation model. DISARM deals MASs as social networks, enabling agents to establish and maintain relationships, limiting the disadvantages of the common distributed approaches. Additionally, it is based on defeasible logic, modeling the way intelligent agents, like humans, draw reasonable conclusions from incomplete and possibly conflicting (thus inconclusive) information. Finally, we provide an evaluation that illustrates the usability of the proposed model.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 14:56:03 GMT" } ]
2014-10-14T00:00:00
[ [ "Kravari", "Kalliopi", "" ], [ "Bassiliades", "Nick", "" ] ]
new_dataset
0.994779
1410.2075
Oliver Schaudt
Van Bang Le and Andrea Oversberg and Oliver Schaudt
Squares of $3$-sun-free split graphs
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The square of a graph $G$, denoted by $G^2$, is obtained from $G$ by putting an edge between two distinct vertices whenever their distance is two. Then $G$ is called a square root of $G^2$. Deciding whether a given graph has a square root is known to be NP-complete, even if the root is required to be a split graph, that is, a graph in which the vertex set can be partitioned into a stable set and a clique. We give a wide range of polynomial time solvable cases for the problem of recognizing if a given graph is the square of some special kind of split graph. To the best of our knowledge, our result properly contains all previously known such cases. Our polynomial time algorithms are build on a structural investigation of graphs that admit a split square root that is 3-sun-free, and may pave the way toward a dichotomy theorem for recognizing squares of (3-sun-free) split graphs.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 12:05:59 GMT" } ]
2014-10-13T00:00:00
[ [ "Le", "Van Bang", "" ], [ "Oversberg", "Andrea", "" ], [ "Schaudt", "Oliver", "" ] ]
new_dataset
0.997525
1410.2757
Shenghao Yang
Shenghao Yang, Soung Chang Liew, Lizhao You and Yi Chen
Linearly-Coupled Fountain Codes
37 pages, submitted for journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network-coded multiple access (NCMA) is a communication scheme for wireless multiple-access networks where physical-layer network coding (PNC) is employed. In NCMA, a user encodes and spreads its message into multiple packets. Time is slotted and multiple users transmit packets (one packet each) simultaneously in each timeslot. A sink node aims to decode the messages of all the users from the sequence of receptions over successive timeslots. For each timeslot, the NCMA receiver recovers multiple linear combinations of the packets transmitted in that timeslot, forming a system of linear equations. Different systems of linear equations are recovered in different timeslots. A message decoder then recovers the original messages of all the users by jointly solving multiple systems of linear equations obtained over different timeslots. We propose a low-complexity digital fountain approach for this coding problem, where each source node encodes its message into a sequence of packets using a fountain code. The aforementioned systems of linear equations recovered by the NCMA receiver effectively couple these fountain codes together. We refer to the coupling of the fountain codes as a linearly-coupled (LC) fountain code. The ordinary belief propagation (BP) decoding algorithm for conventional fountain codes is not optimal for LC fountain codes. We propose a batched BP decoding algorithm and analyze the convergence of the algorithm for general LC fountain codes. We demonstrate how to optimize the degree distributions and show by numerical results that the achievable rate region is nearly optimal. Our approach significantly reduces the decoding complexity compared with the previous NCMA schemes based on Reed-Solomon codes and random linear codes, and hence has the potential to increase throughput and decrease delay in computation-limited NCMA systems.
[ { "version": "v1", "created": "Fri, 10 Oct 2014 12:12:28 GMT" } ]
2014-10-13T00:00:00
[ [ "Yang", "Shenghao", "" ], [ "Liew", "Soung Chang", "" ], [ "You", "Lizhao", "" ], [ "Chen", "Yi", "" ] ]
new_dataset
0.998978
1410.2381
Mohamed Sayedelahl Dr
R. M. Farouk, S. Badr and M. Sayed Elahl
Recognition of cDNA microarray image Using Feedforward artificial neural network
17 pages, 7 figures and 23 References
International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 5, No. 5, September 2014
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The complementary DNA (cDNA) sequence is considered to be the magic biometric technique for personal identification. In this paper, we present a new method for cDNA recognition based on the artificial neural network (ANN). Microarray imaging is used for the concurrent identification of thousands of genes. We have segmented the location of the spots in a cDNA microarray. Thus, a precise localization and segmenting of a spot are essential to obtain a more accurate intensity measurement, leading to a more precise expression measurement of a gene. The segmented cDNA microarray image is resized and it is used as an input for the proposed artificial neural network. For matching and recognition, we have trained the artificial neural network. Recognition results are given for the galleries of cDNA sequences . The numerical results show that, the proposed matching technique is an effective in the cDNA sequences process. We also compare our results with previous results and find out that, the proposed technique is an effective matching performance.
[ { "version": "v1", "created": "Thu, 9 Oct 2014 08:37:21 GMT" } ]
2014-10-10T00:00:00
[ [ "Farouk", "R. M.", "" ], [ "Badr", "S.", "" ], [ "Elahl", "M. Sayed", "" ] ]
new_dataset
0.998076
1410.1735
Joshua Davis
Joshua Davis
A Covert Channel Based on Web Read-time Modulation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A network covert channel is created that operates by modulating the time between web resource accesses, with an 'average web user' read-time used as a reference. While the covert channel may be classified as timing based, it does not operate by changing deterministic protocol attributes such as inter-packet delay, as do most timing based network covert channels. Instead, our channel communicates by modulating transaction level read-time, which in the web browsing case has significant non-deterministic components. The channel is thus immune to methods typically used to detect timing based network covert channels.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 14:03:41 GMT" }, { "version": "v2", "created": "Wed, 8 Oct 2014 08:33:31 GMT" } ]
2014-10-09T00:00:00
[ [ "Davis", "Joshua", "" ] ]
new_dataset
0.993752