id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1407.1471
Shashi Kant V
Shashi Kant, Fredrik Rusek, and Basuki E. Priyanto
A Robust Low-Complexity MIMO Detector for Rank 4 LTE/LTE-A Systems
Accepted for publication in PIMRC-2014, Washington DC, USA
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with MIMO detection for rank 4 LTE systems. The paper revolves around a previously known detector [1, by Inkyu Lee, TCOM'2010] which we shall refer to as RCSMLD (Reduced-Constellation-Size-Maximum-Likelihood-Detector). However, a direct application of the scheme in [1, by Inkyu Lee, TCOM'2010] to LTE/LTE-A rank 4 test cases results in unsatisfactory performance. The first contribution of the paper is to introduce several modifications that can jointly be applied to the basic RCSMLD scheme which, taken together, result in excellent performance. Our second contribution is the development of a highly efficient hardware structure for RCSMLD that allows for an implementation with very few multiplications.
[ { "version": "v1", "created": "Sun, 6 Jul 2014 08:38:17 GMT" } ]
2014-07-08T00:00:00
[ [ "Kant", "Shashi", "" ], [ "Rusek", "Fredrik", "" ], [ "Priyanto", "Basuki E.", "" ] ]
new_dataset
0.982465
1407.1487
Ananthanarayanan Chockalingam
T. Lakshmi Narasimhan and A. Chockalingam
Precoder Index Modulation
arXiv admin note: substantial text overlap with arXiv:1401.6543
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Index modulation, where information bits are conveyed through antenna indices (spatial modulation) and subcarrier indices (subcarrier index modulation) in addition to information bits conveyed through conventional modulation symbols, is getting increased research attention. In this paper, we introduce {\em precoder index modulation}, where information bits are conveyed through the choice of a precoder matrix at the transmitter from a set of pre-determined pseudo-random phase precoder (PRPP) matrices. Combining precoder index modulation (PIM) and spatial modulation (SM), we introduce a PIM-SM scheme which conveys information bits through both antenna index as well as precoder index. Spectral efficiency (in bits per channel use) and bit error performance of these index modulation schemes are presented.
[ { "version": "v1", "created": "Sun, 6 Jul 2014 11:51:06 GMT" } ]
2014-07-08T00:00:00
[ [ "Narasimhan", "T. Lakshmi", "" ], [ "Chockalingam", "A.", "" ] ]
new_dataset
0.991425
1407.1640
Bin Gao
Bin Gao, Jiang Bian, and Tie-Yan Liu
WordRep: A Benchmark for Research on Learning Word Representations
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/3.0/
WordRep is a benchmark collection for the research on learning distributed word representations (or word embeddings), released by Microsoft Research. In this paper, we describe the details of the WordRep collection and show how to use it in different types of machine learning research related to word embedding. Specifically, we describe how the evaluation tasks in WordRep are selected, how the data are sampled, and how the evaluation tool is built. We then compare several state-of-the-art word representations on WordRep, report their evaluation performance, and make discussions on the results. After that, we discuss new potential research topics that can be supported by WordRep, in addition to algorithm comparison. We hope that this paper can help people gain deeper understanding of WordRep, and enable more interesting research on learning distributed word representations and related topics.
[ { "version": "v1", "created": "Mon, 7 Jul 2014 09:31:21 GMT" } ]
2014-07-08T00:00:00
[ [ "Gao", "Bin", "" ], [ "Bian", "Jiang", "" ], [ "Liu", "Tie-Yan", "" ] ]
new_dataset
0.99956
1407.1232
Abdullah Dertli Mr.
Abdullah Dertli, Yasemin Cengellenmis, Senol Eren
On Quantum Codes Obtained From Cyclic Codes Over F_2+vF_2+v^2F_2
null
null
null
null
cs.IT math.IT math.RA quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new Gray map which is both an isometry and a weight preserving map from R=F_2+vF_2+v^2F_2 to (F_2)^3 is defined. A construction for quantum error correcting codes from cyclic codes over finite ring R=F_2+vF_2+v^2F_2, v^3=v is given. The parameters of quantum codes which are obtained from cyclic codes over R are determined.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 08:12:51 GMT" } ]
2014-07-07T00:00:00
[ [ "Dertli", "Abdullah", "" ], [ "Cengellenmis", "Yasemin", "" ], [ "Eren", "Senol", "" ] ]
new_dataset
0.9925
1407.1237
Vinit Kumar
Vinit Kumar and Ajay Agarwal
HT-Paxos: High Throughput State-Machine Replication Protocol for Large Clustered Data Centers
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paxos is a prominent theory of state machine replication. Recent data intensive Systems those implement state machine replication generally require high throughput. Earlier versions of Paxos as few of them are classical Paxos, fast Paxos and generalized Paxos have a major focus on fault tolerance and latency but lacking in terms of throughput and scalability. A major reason for this is the heavyweight leader. Through offloading the leader, we can further increase throughput of the system. Ring Paxos, Multi Ring Paxos and S-Paxos are few prominent attempts in this direction for clustered data centers. In this paper, we are proposing HT-Paxos, a variant of Paxos that one is the best suitable for any large clustered data center. HT-Paxos further offloads the leader very significantly and hence increases the throughput and scalability of the system. While at the same time, among high throughput state-machine replication protocols, HT-Paxos provides reasonably low latency and response time.
[ { "version": "v1", "created": "Fri, 4 Jul 2014 13:58:50 GMT" } ]
2014-07-07T00:00:00
[ [ "Kumar", "Vinit", "" ], [ "Agarwal", "Ajay", "" ] ]
new_dataset
0.983777
1407.1307
Yang Guan
Yang Guan, Yao Xiao, Hao Feng, Chien-Chung Shen, Leonard J. Cimini Jr
MobiCacher: Mobility-Aware Content Caching in Small-Cell Networks
Accepted by Globecom 2014
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Small-cell networks have been proposed to meet the demand of ever growing mobile data traffic. One of the prominent challenges faced by small-cell networks is the lack of sufficient backhaul capacity to connect small-cell base stations (small-BSs) to the core network. We exploit the effective application layer semantics of both spatial and temporal locality to reduce the backhaul traffic. Specifically, small-BSs are equipped with storage facility to cache contents requested by users. As the {\em cache hit ratio} increases, most of the users' requests can be satisfied locally without incurring traffic over the backhaul. To make informed caching decisions, the mobility patterns of users must be carefully considered as users might frequently migrate from one small cell to another. We study the issue of mobility-aware content caching, which is formulated into an optimization problem with the objective to maximize the caching utility. As the problem is NP-complete, we develop a polynomial-time heuristic solution termed {\em MobiCacher} with bounded approximation ratio. We also conduct trace-based simulations to evaluate the performance of {\em MobiCacher}, which show that {\em MobiCacher} yields better caching utility than existing solutions.
[ { "version": "v1", "created": "Fri, 4 Jul 2014 19:47:03 GMT" } ]
2014-07-07T00:00:00
[ [ "Guan", "Yang", "" ], [ "Xiao", "Yao", "" ], [ "Feng", "Hao", "" ], [ "Shen", "Chien-Chung", "" ], [ "Cimini", "Leonard J.", "Jr" ] ]
new_dataset
0.995744
1407.0697
Anuradha Rana
Anuradha Rana, Pratima Sharma
How to Track Online SLA
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SLA (Service level agreement) is defined by an organization to fulfil its client requirements, the time within which the deliverables should be turned over to the clients. Tracking of SLA can be done manually by checking the status, priority of any particular task. Manual SLA tracking takes time as one has to go over each and every task that needs to be completed. For instance, you ordered a product from a website and you are not happy with the quality of the product and want to replace the same on urgent basis, You send mail to the customer support department, the query/complaint will be submitted in a queue and will be processed basis of its priority and urgency (The SLA for responding back to customers concern are listed in the policy). This online SLA tracking system will ensure that no queries/complaints are missed and are processed in an organized manner as per their priority and the date by when it should be handled. The portal will provide the status of the complaints for that particular day and the ones which have been pending since last week. The information can be refreshed as per the client need (within what time frame the complaint should be addressed).
[ { "version": "v1", "created": "Wed, 2 Jul 2014 16:37:18 GMT" } ]
2014-07-04T00:00:00
[ [ "Rana", "Anuradha", "" ], [ "Sharma", "Pratima", "" ] ]
new_dataset
0.982522
1407.0713
Hulya Seferoglu
Hulya Seferoglu and Yuxuan Xing
Device-Centric Cooperation in Mobile Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing popularity of applications such as video streaming in today's mobile devices introduces higher demand for throughput, and puts a strain especially on cellular links. Cooperation among mobile devices by exploiting both cellular and local area connections is a promising approach to meet the increasing demand. In this paper, we consider that a group of cooperative mobile devices, exploiting both cellular and local area links and within proximity of each other, are interested in the same video content. Traditional network control algorithms introduce high overhead and delay in this setup as the network control and cooperation decisions are made in a source-centric manner. Instead, we develop a device-centric stochastic cooperation scheme. Our device-centric scheme; DcC allows mobile devices to make control decisions such as flow control, scheduling, and cooperation without loss of optimality. Thanks to being device-centric, DcC reduces; (i) overhead; i.e., the number of control packets that should be transmitted over cellular links, so cellular links are used more efficiently, and (ii) the amount of delay that each packet experiences, which improves quality of service. The simulation results demonstrate the benefits of DcC.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 20:10:48 GMT" } ]
2014-07-04T00:00:00
[ [ "Seferoglu", "Hulya", "" ], [ "Xing", "Yuxuan", "" ] ]
new_dataset
0.995092
1407.1031
Rossano Schifanella
Daniele Quercia, Rossano Schifanella, Luca Maria Aiello
The Shortest Path to Happiness: Recommending Beautiful, Quiet, and Happy Routes in the City
11 pages, 7 figures, Proceedings of ACM Hypertext 2014
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When providing directions to a place, web and mobile mapping services are all able to suggest the shortest route. The goal of this work is to automatically suggest routes that are not only short but also emotionally pleasant. To quantify the extent to which urban locations are pleasant, we use data from a crowd-sourcing platform that shows two street scenes in London (out of hundreds), and a user votes on which one looks more beautiful, quiet, and happy. We consider votes from more than 3.3K individuals and translate them into quantitative measures of location perceptions. We arrange those locations into a graph upon which we learn pleasant routes. Based on a quantitative validation, we find that, compared to the shortest routes, the recommended ones add just a few extra walking minutes and are indeed perceived to be more beautiful, quiet, and happy. To test the generality of our approach, we consider Flickr metadata of more than 3.7M pictures in London and 1.3M in Boston, compute proxies for the crowdsourced beauty dimension (the one for which we have collected the most votes), and evaluate those proxies with 30 participants in London and 54 in Boston. These participants have not only rated our recommendations but have also carefully motivated their choices, providing insights for future work.
[ { "version": "v1", "created": "Thu, 3 Jul 2014 19:47:19 GMT" } ]
2014-07-04T00:00:00
[ [ "Quercia", "Daniele", "" ], [ "Schifanella", "Rossano", "" ], [ "Aiello", "Luca Maria", "" ] ]
new_dataset
0.995051
1407.0454
Yingyi Bu
Sattam Alsubaiee, Yasser Altowim, Hotham Altwaijry, Alexander Behm, Vinayak Borkar, Yingyi Bu, Michael Carey, Inci Cetindil, Madhusudan Cheelangi, Khurram Faraaz, Eugenia Gabrielova, Raman Grover, Zachary Heilbron, Young-Seok Kim, Chen Li, Guangqiang Li, Ji Mahn Ok, Nicola Onose, Pouria Pirzadeh, Vassilis Tsotras, Rares Vernica, Jian Wen, Till Westmann
AsterixDB: A Scalable, Open Source BDMS
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
AsterixDB is a new, full-function BDMS (Big Data Management System) with a feature set that distinguishes it from other platforms in today's open source Big Data ecosystem. Its features make it well-suited to applications like web data warehousing, social data storage and analysis, and other use cases related to Big Data. AsterixDB has a flexible NoSQL style data model; a query language that supports a wide range of queries; a scalable runtime; partitioned, LSM-based data storage and indexing (including B+-tree, R-tree, and text indexes); support for external as well as natively stored data; a rich set of built-in types; support for fuzzy, spatial, and temporal types and queries; a built-in notion of data feeds for ingestion of data; and transaction support akin to that of a NoSQL store. Development of AsterixDB began in 2009 and led to a mid-2013 initial open source release. This paper is the first complete description of the resulting open source AsterixDB system. Covered herein are the system's data model, its query language, and its software architecture. Also included are a summary of the current status of the project and a first glimpse into how AsterixDB performs when compared to alternative technologies, including a parallel relational DBMS, a popular NoSQL store, and a popular Hadoop-based SQL data analytics platform, for things that both technologies can do. Also included is a brief description of some initial trials that the system has undergone and the lessons learned (and plans laid) based on those early "customer" engagements.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 04:29:54 GMT" } ]
2014-07-03T00:00:00
[ [ "Alsubaiee", "Sattam", "" ], [ "Altowim", "Yasser", "" ], [ "Altwaijry", "Hotham", "" ], [ "Behm", "Alexander", "" ], [ "Borkar", "Vinayak", "" ], [ "Bu", "Yingyi", "" ], [ "Carey", "Michael", "" ], [ "Cetindil", "Inci", "" ], [ "Cheelangi", "Madhusudan", "" ], [ "Faraaz", "Khurram", "" ], [ "Gabrielova", "Eugenia", "" ], [ "Grover", "Raman", "" ], [ "Heilbron", "Zachary", "" ], [ "Kim", "Young-Seok", "" ], [ "Li", "Chen", "" ], [ "Li", "Guangqiang", "" ], [ "Ok", "Ji Mahn", "" ], [ "Onose", "Nicola", "" ], [ "Pirzadeh", "Pouria", "" ], [ "Tsotras", "Vassilis", "" ], [ "Vernica", "Rares", "" ], [ "Wen", "Jian", "" ], [ "Westmann", "Till", "" ] ]
new_dataset
0.997104
1407.0466
Tingshao Zhu
Li Guan, Bibo Hao, and Tingshao Zhu
How did the Suicide Act and Speak Differently Online? Behavioral and Linguistic Features of China's Suicide Microblog Users
17 pages, 5 tables
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Suicide issue is of great concern in China. Social media provides an active approach to understanding suicide individuals in terms of their behavior and language use. Aims: This study investigates how suicide Microblog users in China act and speak differently on social media from others. Methods: Hypothesis testing in behavioral and linguistic features was performed between a target group of 33 Chinese Microblog users who have committed suicide and a control group of 30 active users without suicidal ideation. Results: Suicide group significantly outnumbered control group in the extent of openly published posts and self-reference, and the intensity of using 7 word categories: negative words/social process words/cognitive process words/emotion process words/negative emotion words/exclusive words/physiological process words. Limitations: Information collection and confirmation of suicide users remain difficult. Conclusions: It is revealed that suicide people vary from others in certain behavioral and linguistic features in social media. This study fills the niche of suicide studies by noting specified indicators of suicide ideation for Chinese individuals online, providing insights of constructing an online alarm system for early detection and intervention of suicidal individuals.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 06:49:11 GMT" } ]
2014-07-03T00:00:00
[ [ "Guan", "Li", "" ], [ "Hao", "Bibo", "" ], [ "Zhu", "Tingshao", "" ] ]
new_dataset
0.995685
1407.0549
Antonio Barresi
Mathias Payer, Antonio Barresi, Thomas R. Gross
Lockdown: Dynamic Control-Flow Integrity
ETH Technical Report
null
10.3929/ethz-a-010171214
null
cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such applications despite all currently deployed defenses by exploiting memory corruption vulnerabilities. Control-Flow Integrity (CFI) is a promising defense mechanism that restricts open control-flow transfers to a static set of well-known locations. We present Lockdown, an approach to dynamic CFI that protects legacy, binary-only executables and libraries. Lockdown adaptively learns the control-flow graph of a running process using information from a trusted dynamic loader. The sandbox component of Lockdown restricts interactions between different shared objects to imported and exported functions by enforcing fine-grained CFI checks. Our prototype implementation shows that dynamic CFI results in low performance overhead.
[ { "version": "v1", "created": "Wed, 2 Jul 2014 13:10:37 GMT" } ]
2014-07-03T00:00:00
[ [ "Payer", "Mathias", "" ], [ "Barresi", "Antonio", "" ], [ "Gross", "Thomas R.", "" ] ]
new_dataset
0.981924
1401.2818
Alan Brunton
Alan Brunton, Timo Bolkart, Stefanie Wuhrer
Multilinear Wavelets: A Statistical Shape Space for Human Faces
10 pages, 7 figures; accepted to ECCV 2014
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a statistical model for $3$D human faces in varying expression, which decomposes the surface of the face using a wavelet transform, and learns many localized, decorrelated multilinear models on the resulting coefficients. Using this model we are able to reconstruct faces from noisy and occluded $3$D face scans, and facial motion sequences. Accurate reconstruction of face shape is important for applications such as tele-presence and gaming. The localized and multi-scale nature of our model allows for recovery of fine-scale detail while retaining robustness to severe noise and occlusion, and is computationally efficient and scalable. We validate these properties experimentally on challenging data in the form of static scans and motion sequences. We show that in comparison to a global multilinear model, our model better preserves fine detail and is computationally faster, while in comparison to a localized PCA model, our model better handles variation in expression, is faster, and allows us to fix identity parameters for a given subject.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 12:48:39 GMT" }, { "version": "v2", "created": "Tue, 1 Jul 2014 09:26:10 GMT" } ]
2014-07-02T00:00:00
[ [ "Brunton", "Alan", "" ], [ "Bolkart", "Timo", "" ], [ "Wuhrer", "Stefanie", "" ] ]
new_dataset
0.999405
1404.6055
Ziqiang Chen
Feng Lu and Ziqiang Chen
A General Homogeneous Matrix Formulation to 3D Rotation Geometric Transformations
8 pages, 13 references, 1 table. arXiv admin note: substantial text overlap with arXiv:1307.0998
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present algebraic projective geometry definitions of 3D rotations so as to bridge a small gap between the applications and the definitions of 3D rotations in homogeneous matrix form. A general homogeneous matrix formulation to 3D rotation geometric transformations is proposed which suits for the cases when the rotation axis is unnecessarily through the coordinate system origin given their rotation axes and rotation angles.
[ { "version": "v1", "created": "Thu, 24 Apr 2014 08:49:52 GMT" }, { "version": "v2", "created": "Wed, 14 May 2014 03:50:17 GMT" } ]
2014-07-02T00:00:00
[ [ "Lu", "Feng", "" ], [ "Chen", "Ziqiang", "" ] ]
new_dataset
0.999495
1407.0039
Edinah Gnang K
Edinah K. Gnang
Integer formula encoding SageTeX package
null
null
null
null
cs.MS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes a SageTeX implementation of an integer encoding procedures.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 00:13:14 GMT" } ]
2014-07-02T00:00:00
[ [ "Gnang", "Edinah K.", "" ] ]
new_dataset
0.964646
1407.0049
Erik Cuevas
Erik Cuevas, Daniel Zaldivar and Marco Perez
Low-cost commercial LEGO platform for mobile robotics
10 Pages
International Journal of Electrical Engineering Education 47 (2), (2010), pp. 132-150
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows the potential of a Lego\c{opyright} based low-cost commercial robotic platform for learning and testing prototypes in higher education and research. The overall setup aims to explain mobile robotic issues strongly related to several fields such as Mechatronics, Robotics, and Automatic Control theory. The capabilities and limitations of LEGO robots are studied within two projects. The first one involves a robotic vehicle which is able to follow several predefined paths. The second project concerns to the classical problem of position control. Algorithms and additional tools have been fully designed, applied and documented with results shown throughout the paper. The platform is found to be suitable for teaching and researching on key issues related to the aforementioned fields.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 20:33:08 GMT" } ]
2014-07-02T00:00:00
[ [ "Cuevas", "Erik", "" ], [ "Zaldivar", "Daniel", "" ], [ "Perez", "Marco", "" ] ]
new_dataset
0.997693
1407.0114
Travis Gagie
Travis Gagie
Suffix Arrays for Spaced-SNP Databases
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single-nucleotide polymorphisms (SNPs) account for most variations between human genomes. We show how, if the genomes in a database differ only by a reasonable number of SNPs and the substrings between those SNPs are unique, then we can store a fast compressed suffix array for that database.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 06:38:45 GMT" } ]
2014-07-02T00:00:00
[ [ "Gagie", "Travis", "" ] ]
new_dataset
0.997051
1403.6230
Alexey Sorokin
Alexey Sorokin
Pumping lemma and Ogden lemma for displacement context-free grammars
Shortened version accepted to DLT 2014 conference
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pumping lemma and Ogden lemma offer a powerful method to prove that a particular language is not context-free. In 2008 Kanazawa proved an analogue of pumping lemma for well-nested multiple-context free languages. However, the statement of lemma is too weak for practical usage. We prove a stronger variant of pumping lemma and an analogue of Ogden lemma for this language family. We also use these statements to prove that some natural context-sensitive languages cannot be generated by tree-adjoining grammars.
[ { "version": "v1", "created": "Tue, 25 Mar 2014 04:43:21 GMT" }, { "version": "v2", "created": "Sun, 6 Apr 2014 16:43:10 GMT" }, { "version": "v3", "created": "Mon, 30 Jun 2014 18:25:54 GMT" } ]
2014-07-01T00:00:00
[ [ "Sorokin", "Alexey", "" ] ]
new_dataset
0.996254
1405.1861
{\L}ukasz Mazurek
Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and {\L}ukasz Mazurek
Modeling Bitcoin Contracts by Timed Automata
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitcoin is a peer-to-peer cryptographic currency system. Since its introduction in 2008, Bitcoin has gained noticeable popularity, mostly due to its following properties: (1) the transaction fees are very low, and (2) it is not controlled by any central authority, which in particular means that nobody can "print" the money to generate inflation. Moreover, the transaction syntax allows to create the so-called contracts, where a number of mutually-distrusting parties engage in a protocol to jointly perform some financial task, and the fairness of this process is guaranteed by the properties of Bitcoin. Although the Bitcoin contracts have several potential applications in the digital economy, so far they have not been widely used in real life. This is partly due to the fact that they are cumbersome to create and analyze, and hence risky to use. In this paper we propose to remedy this problem by using the methods originally developed for the computer-aided analysis for hardware and software systems, in particular those based on the timed automata. More concretely, we propose a framework for modeling the Bitcoin contracts using the timed automata in the UPPAAL model checker. Our method is general and can be used to model several contracts. As a proof-of-concept we use this framework to model some of the Bitcoin contracts from our recent previous work. We then automatically verify their security in UPPAAL, finding (and correcting) some subtle errors that were difficult to spot by the manual analysis. We hope that our work can draw the attention of the researchers working on formal modeling to the problem of the Bitcoin contract verification, and spark off more research on this topic.
[ { "version": "v1", "created": "Thu, 8 May 2014 10:01:28 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2014 21:22:33 GMT" } ]
2014-07-01T00:00:00
[ [ "Andrychowicz", "Marcin", "" ], [ "Dziembowski", "Stefan", "" ], [ "Malinowski", "Daniel", "" ], [ "Mazurek", "Łukasz", "" ] ]
new_dataset
0.999627
1406.7338
Li-Yi Wei
Li-Yi Wei and Marc Levoy
Order-Independent Texture Synthesis
This is a combination of Stanford Computer Science Department Technical Report 2002-01 and a subsequent submission to SIGGRAPH 2003
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search-based texture synthesis algorithms are sensitive to the order in which texture samples are generated; different synthesis orders yield different textures. Unfortunately, most polygon rasterizers and ray tracers do not guarantee the order with which surfaces are sampled. To circumvent this problem, textures are synthesized beforehand at some maximum resolution and rendered using texture mapping. We describe a search-based texture synthesis algorithm in which samples can be generated in arbitrary order, yet the resulting texture remains identical. The key to our algorithm is a pyramidal representation in which each texture sample depends only on a fixed number of neighboring samples at each level of the pyramid. The bottom (coarsest) level of the pyramid consists of a noise image, which is small and predetermined. When a sample is requested by the renderer, all samples on which it depends are generated at once. Using this approach, samples can be generated in any order. To make the algorithm efficient, we propose storing texture samples and their dependents in a pyramidal cache. Although the first few samples are expensive to generate, there is substantial reuse, so subsequent samples cost less. Fortunately, most rendering algorithms exhibit good coherence, so cache reuse is high.
[ { "version": "v1", "created": "Sat, 28 Jun 2014 00:47:30 GMT" } ]
2014-07-01T00:00:00
[ [ "Wei", "Li-Yi", "" ], [ "Levoy", "Marc", "" ] ]
new_dataset
0.999098
1406.7399
Ghassan Samara
Ghassan Samara, Tareq Alhmiedat
Intelligent Emergency Message Broadcasting in VANET Using PSO
11 pages
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 7, 90-100, 2014
null
null
cs.NI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The new type of Mobile Ad hoc Network which is called Vehicular Ad hoc Networks (VANET) created a fertile environment for research. In this research, a protocol Particle Swarm Optimization Contention Based Broadcast (PCBB) is proposed, for fast andeffective dissemination of emergency messages within a geographical area to distribute the emergency message and achieve the safety system, this research will help the VANET system to achieve its safety goals in intelligent and efficient way.
[ { "version": "v1", "created": "Sat, 28 Jun 2014 13:31:17 GMT" } ]
2014-07-01T00:00:00
[ [ "Samara", "Ghassan", "" ], [ "Alhmiedat", "Tareq", "" ] ]
new_dataset
0.998958
1406.7483
Alicia Gonz\'alez Mart\'inez
Alicia Gonzalez Martinez, Susana Lopez Hervas, Doaa Samy, Carlos G. Arques, Antonio Moreno Sandoval
Jabalin: a Comprehensive Computational Model of Modern Standard Arabic Verbal Morphology Based on Traditional Arabic Prosody
Jabalin implementation is available at http://sourceforge.net/projects/jabalin/
Systems and Frameworks for Computational Morphology, Springer Berlin Heidelberg, (2013) pp. 35-52
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The computational handling of Modern Standard Arabic is a challenge in the field of natural language processing due to its highly rich morphology. However, several authors have pointed out that the Arabic morphological system is in fact extremely regular. The existing Arabic morphological analyzers have exploited this regularity to variable extent, yet we believe there is still some scope for improvement. Taking inspiration in traditional Arabic prosody, we have designed and implemented a compact and simple morphological system which in our opinion takes further advantage of the regularities encountered in the Arabic morphological system. The output of the system is a large-scale lexicon of inflected forms that has subsequently been used to create an Online Interface for a morphological analyzer of Arabic verbs. The Jabalin Online Interface is available at http://elvira.lllf.uam.es/jabalin/, hosted at the LLI-UAM lab. The generation system is also available under a GNU GPL 3 license.
[ { "version": "v1", "created": "Sun, 29 Jun 2014 10:08:54 GMT" } ]
2014-07-01T00:00:00
[ [ "Martinez", "Alicia Gonzalez", "" ], [ "Hervas", "Susana Lopez", "" ], [ "Samy", "Doaa", "" ], [ "Arques", "Carlos G.", "" ], [ "Sandoval", "Antonio Moreno", "" ] ]
new_dataset
0.999434
1406.7662
Harish M Kittur
Mohammed Zackriya. V, Harish M Kittur
Selective Match-Line Energizer Content Addressable Memory(SMLE -CAM)
6 pages, 12 figures. Accepted for publication, International Journal of applied Engineering Research,Vol. 8 No. 19, 2013
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Content Addressable Memory (CAM) is a memory primarily designed for high speed search operation. Parallel search scheme forms the basis of CAM, thus power reduction is the challenge associated with a large amount of parallel active circuits. We are presenting a novel algorithm and architecture described as Selective Match-Line Energizer Content Addressable Memory (SMLE-CAM) which energizes only those MLs (Match-Line) whose first three bits are conditionally matched with corresponding first three search bit using special architecture which comprises of novel XNOR-CAM cell and novel XOR-CAM cell. The rest of the CAM chain is followed by NOR-CAM cell. The 256 X 144 bit SMLE-CAM is implemented in TSMC 90 nm technology and its robustness across PVT variation is verified. The post-layout simulation result shows, it has energy metric of 0.115 fJ/bit/search with search time 361.6 ps, the best reported so far. The maximum operating frequency is 1GHz.
[ { "version": "v1", "created": "Mon, 30 Jun 2014 10:46:50 GMT" } ]
2014-07-01T00:00:00
[ [ "Zackriya.", "Mohammed", "V" ], [ "Kittur", "Harish M", "" ] ]
new_dataset
0.967734
1301.2474
Aur\'elie Lagoutte
Nicolas Bousquet, Aur\'elie Lagoutte and St\'ephan Thomass\'e
Clique versus Independent Set
null
European Journal of Combinatorics, 40:73-92, 2014
10.1016/j.ejc.2014.02.003
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Yannakakis' Clique versus Independent Set problem (CL-IS) in communication complexity asks for the minimum number of cuts separating cliques from stable sets in a graph, called CS-separator. Yannakakis provides a quasi-polynomial CS-separator, i.e. of size $O(n^{\log n})$, and addresses the problem of finding a polynomial CS-separator. This question is still open even for perfect graphs. We show that a polynomial CS-separator almost surely exists for random graphs. Besides, if H is a split graph (i.e. has a vertex-partition into a clique and a stable set) then there exists a constant $c_H$ for which we find a $O(n^{c_H})$ CS-separator on the class of H-free graphs. This generalizes a result of Yannakakis on comparability graphs. We also provide a $O(n^{c_k})$ CS-separator on the class of graphs without induced path of length k and its complement. Observe that on one side, $c_H$ is of order $O(|H| \log |H|)$ resulting from Vapnik-Chervonenkis dimension, and on the other side, $c_k$ is exponential. One of the main reason why Yannakakis' CL-IS problem is fascinating is that it admits equivalent formulations. Our main result in this respect is to show that a polynomial CS-separator is equivalent to the polynomial Alon-Saks-Seymour Conjecture, asserting that if a graph has an edge-partition into k complete bipartite graphs, then its chromatic number is polynomially bounded in terms of k. We also show that the classical approach to the stubborn problem (arising in CSP) which consists in covering the set of all solutions by $O(n^{\log n})$ instances of 2-SAT is again equivalent to the existence of a polynomial CS-separator.
[ { "version": "v1", "created": "Fri, 11 Jan 2013 12:22:54 GMT" }, { "version": "v2", "created": "Mon, 18 Mar 2013 12:48:43 GMT" }, { "version": "v3", "created": "Fri, 27 Jun 2014 08:04:22 GMT" } ]
2014-06-30T00:00:00
[ [ "Bousquet", "Nicolas", "" ], [ "Lagoutte", "Aurélie", "" ], [ "Thomassé", "Stéphan", "" ] ]
new_dataset
0.99111
1307.1662
Rami Al-Rfou
Rami Al-Rfou, Bryan Perozzi, Steven Skiena
Polyglot: Distributed Word Representations for Multilingual NLP
10 pages, 2 figures, Proceedings of Conference on Computational Natural Language Learning CoNLL'2013
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed word representations (word embeddings) have recently contributed to competitive performance in language modeling and several NLP tasks. In this work, we train word embeddings for more than 100 languages using their corresponding Wikipedias. We quantitatively demonstrate the utility of our word embeddings by using them as the sole features for training a part of speech tagger for a subset of these languages. We find their performance to be competitive with near state-of-art methods in English, Danish and Swedish. Moreover, we investigate the semantic features captured by these embeddings through the proximity of word groupings. We will release these embeddings publicly to help researchers in the development and enhancement of multilingual applications.
[ { "version": "v1", "created": "Fri, 5 Jul 2013 16:52:09 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2014 17:31:33 GMT" } ]
2014-06-30T00:00:00
[ [ "Al-Rfou", "Rami", "" ], [ "Perozzi", "Bryan", "" ], [ "Skiena", "Steven", "" ] ]
new_dataset
0.99661
1307.4538
Federico Polito
Laura Sacerdote, Michele Garetto, Federico Polito, Matteo Sereno
Superprocesses as models for information dissemination in the Future Internet
null
Proceedings of Mathematical Models and Methods for Planet Earth, 157-170, Springer, 2014
10.1007/978-3-319-02657-2_13
null
cs.NI math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future Internet will be composed by a tremendous number of potentially interconnected people and devices, offering a variety of services, applications and communication opportunities. In particular, short-range wireless communications, which are available on almost all portable devices, will enable the formation of the largest cloud of interconnected, smart computing devices mankind has ever dreamed about: the Proximate Internet. In this paper, we consider superprocesses, more specifically super Brownian motion, as a suitable mathematical model to analyse a basic problem of information dissemination arising in the context of Proximate Internet. The proposed model provides a promising analytical framework to both study theoretical properties related to the information dissemination process and to devise efficient and reliable simulation schemes for very large systems.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 08:45:29 GMT" } ]
2014-06-30T00:00:00
[ [ "Sacerdote", "Laura", "" ], [ "Garetto", "Michele", "" ], [ "Polito", "Federico", "" ], [ "Sereno", "Matteo", "" ] ]
new_dataset
0.971049
1406.6786
Eric Mootz
Eric Mootz
3D Texture Coordinates on Polygon Mesh Sequences
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method for creating 3D texture coordinates for a sequence of polygon meshes with changing topology and vertex motion vectors.
[ { "version": "v1", "created": "Thu, 26 Jun 2014 07:02:33 GMT" }, { "version": "v2", "created": "Fri, 27 Jun 2014 07:51:43 GMT" } ]
2014-06-30T00:00:00
[ [ "Mootz", "Eric", "" ] ]
new_dataset
0.999521
1406.7112
Vasileios Zografos
Vasileios Zografos
3D planar patch extraction from stereo using probabilistic region growing
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a novel 3D planar patch extraction method using a probabilistic region growing algorithm. Our method works by simultaneously initiating multiple planar patches from seed points, the latter determined by an intensity-based 2D segmentation algorithm in the stereo-pair images. The patches are grown incrementally and in parallel as 3D scene points are considered for membership, using a probabilistic distance likelihood measure. In addition, we have incorporated prior information based on the noise model in the 2D images and the scene configuration but also include the intensity information resulting from the initial segmentation. This method works well across many different data-sets, involving real and synthetic examples of both regularly and non-regularly sampled data, and is fast enough that may be used for robot navigation tasks of path detection and obstacle avoidance.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 08:52:54 GMT" } ]
2014-06-30T00:00:00
[ [ "Zografos", "Vasileios", "" ] ]
new_dataset
0.998144
1406.7124
Yiyin Wang
Yiyin Wang, Xiaoli Ma, Cailian Chen, Xinping Guan
UWB Signal Detection by Cyclic Features
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Ultra-wideband (UWB) impulse radio (IR) systems are well known for low transmission power, low probability of detection, and overlaying with narrowband (NB) systems. These merits in fact make UWB signal detection challenging, since several high-power wireless communication systems coexist with UWB signals. In the literature, cyclic features are exploited for signal detection. However, the high computational complexity of conventional cyclic feature based detectors burdens the receivers. In this paper, we propose computationally efficient detectors using the specific cyclic features of UWB signals. The closed-form relationships between the cyclic features and the system parameters are revealed. Then, some constant false alarm rate detectors are proposed based on the estimated cyclic autocorrelation functions (CAFs). The proposed detectors have low complexities compared to the existing ones. Extensive simulation results indicate that the proposed detectors achieve a good balance between the detection performance and the computational complexity in various scenarios, such as multipath environments, colored noise, and NB interferences.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 09:32:50 GMT" } ]
2014-06-30T00:00:00
[ [ "Wang", "Yiyin", "" ], [ "Ma", "Xiaoli", "" ], [ "Chen", "Cailian", "" ], [ "Guan", "Xinping", "" ] ]
new_dataset
0.997899
1406.6494
Nicola Apollonio
N. Apollonio, A. Galluccio
Minimally unbalanced diamond-free graphs and Dyck-paths
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $\{0,1\}$-matrix $\mathsf{A}$ is balanced if it does not contain a submatrix of odd order having exactly two 1's per row and per column. A graph is balanced if its clique-matrix is balanced. No characterization of minimally unbalanced graphs is known, and even no conjecture on the structure of such graphs has been posed, contrarily to what happened for perfect graphs. In this paper, we provide such a characterization for the class of diamond-free graphs and establish a connection between minimally unbalanced diamond-free graphs and Dyck-paths.
[ { "version": "v1", "created": "Wed, 25 Jun 2014 08:26:29 GMT" }, { "version": "v2", "created": "Thu, 26 Jun 2014 08:11:30 GMT" } ]
2014-06-27T00:00:00
[ [ "Apollonio", "N.", "" ], [ "Galluccio", "A.", "" ] ]
new_dataset
0.971511
1301.6809
Andrea Tagliasacchi
Andrea Tagliasacchi
Skeletal Representations and Applications
42 pages, SFU Depth Exam
null
null
SFU-CMPT TR 2012-55-1
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When representing a solid object there are alternatives to the use of traditional explicit (surface meshes) or implicit (zero crossing of implicit functions) methods. Skeletal representations encode shape information in a mixed fashion: they are composed of a set of explicit primitives, yet they are able to efficiently encode the shape's volume as well as its topology. I will discuss, in two dimensions, how symmetry can be used to reduce the dimensionality of the data (from a 2D solid to a 1D curve), and how this relates to the classical definition of skeletons by Medial Axis Transform. While the medial axis of a 2D shape is composed of a set of curves, in 3D it results in a set of sheets connected in a complex fashion. Because of this complexity, medial skeletons are difficult to use in practical applications. Curve skeletons address this problem by strictly requiring their geometry to be one dimensional, resulting in an intuitive yet powerful shape representation. In this report I will define both medial and curve skeletons and discuss their mutual relationship. I will also present several algorithms for their computation and a variety of scenarios where skeletons are employed, with a special focus on geometry processing and shape analysis.
[ { "version": "v1", "created": "Tue, 29 Jan 2013 00:18:00 GMT" }, { "version": "v2", "created": "Wed, 25 Jun 2014 14:49:18 GMT" } ]
2014-06-26T00:00:00
[ [ "Tagliasacchi", "Andrea", "" ] ]
new_dataset
0.990931
1304.0193
Zhenhua Yu
Z. Yu, R. J. Baxley, and G. T. Zhou
Brightness Control in Dynamic Range Constrained Visible Light OFDM Systems
null
null
10.1109/WOCC.2014.6839941
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visible light communication (VLC) systems can provide illumination and communication simultaneously via light emitting diodes (LEDs). Orthogonal frequency division multiplexing (OFDM) waveforms transmitted in a VLC system will have high peak-to-average power ratios (PAPRs). Since the transmitting LED is dynamic-range limited, OFDM signal has to be scaled and biased to avoid nonlinear distortion. Brightness control is an essential feature for the illumination function. In this paper, we will analyze the performance of dynamic range constrained visible light OFDM systems with biasing adjustment and pulse width modulation (PWM) methods. We will investigate the trade-off between duty cycle and forward ratio of PWM and find the optimum forward ratio to maximize the achievable ergodic rates.
[ { "version": "v1", "created": "Sun, 31 Mar 2013 12:07:18 GMT" }, { "version": "v2", "created": "Mon, 6 Jan 2014 19:16:13 GMT" } ]
2014-06-25T00:00:00
[ [ "Yu", "Z.", "" ], [ "Baxley", "R. J.", "" ], [ "Zhou", "G. T.", "" ] ]
new_dataset
0.993498
1406.6170
Tuvi Etzion
Netanel Raviv and Tuvi Etzion
Distributed Storage Systems based on Equidistant Subspace Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems based on equidistant constant dimension codes are presented. These equidistant codes are based on the Pl\"{u}cker embedding, which is essential in the repair and the reconstruction algorithms. These systems posses several useful properties such as high failure resilience, minimum bandwidth, low storage, simple algebraic repair and reconstruction algorithms, good locality, and compatibility with small fields.
[ { "version": "v1", "created": "Tue, 24 Jun 2014 08:47:16 GMT" } ]
2014-06-25T00:00:00
[ [ "Raviv", "Netanel", "" ], [ "Etzion", "Tuvi", "" ] ]
new_dataset
0.99776
1406.6201
Reiner Lenz
Reiner Lenz
Saccadic Eye Movements and the Generalized Pareto Distribution
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a statistical analysis of the eye tracker measurements in a database with 15 observers viewing 1003 images under free-viewing conditions. In contrast to the common approach of investigating the properties of the fixation points we analyze the properties of the transition phases between fixations. We introduce hyperbolic geometry as a tool to measure the step length between consecutive eye positions. We show that the step lengths, measured in hyperbolic and euclidean geometry, follow a generalized Pareto distribution. The results based on the hyperbolic distance are more robust than those based on euclidean geometry. We show how the structure of the space of generalized Pareto distributions can be used to characterize and identify individual observers.
[ { "version": "v1", "created": "Tue, 24 Jun 2014 10:57:50 GMT" } ]
2014-06-25T00:00:00
[ [ "Lenz", "Reiner", "" ] ]
new_dataset
0.994689
1210.6963
Lane A. Hemaspaandra
Lane A. Hemaspaandra, Rahman Lavaee, Curtis Menton
Schulze and Ranked-Pairs Voting are Fixed-Parameter Tractable to Bribe, Manipulate, and Control
null
null
null
URCS-TR-2012-982
cs.GT cs.DS cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Schulze and ranked-pairs elections have received much attention recently, and the former has quickly become a quite widely used election system. For many cases these systems have been proven resistant to bribery, control, or manipulation, with ranked pairs being particularly praised for being NP-hard for all three of those. Nonetheless, the present paper shows that with respect to the number of candidates, Schulze and ranked-pairs elections are fixed-parameter tractable to bribe, control, and manipulate: we obtain uniform, polynomial-time algorithms whose degree does not depend on the number of candidates. We also provide such algorithms for some weighted variants of these problems.
[ { "version": "v1", "created": "Thu, 25 Oct 2012 19:37:24 GMT" }, { "version": "v2", "created": "Mon, 17 Dec 2012 03:56:20 GMT" }, { "version": "v3", "created": "Fri, 14 Jun 2013 19:34:00 GMT" }, { "version": "v4", "created": "Tue, 16 Jul 2013 20:46:52 GMT" }, { "version": "v5", "created": "Sat, 21 Jun 2014 18:44:21 GMT" } ]
2014-06-24T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Lavaee", "Rahman", "" ], [ "Menton", "Curtis", "" ] ]
new_dataset
0.99977
1406.5282
Mingqiang Li
Mingqiang Li and Patrick P. C. Lee
STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures
An earlier version of this work was presented at USENIX FAST '14. This extended version presents new reliability analysis for STAIR codes and is submitted for journal review
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Practical storage systems often adopt erasure codes to tolerate device failures and sector failures, both of which are prevalent in the field. However, traditional erasure codes employ device-level redundancy to protect against sector failures, and hence incur significant space overhead. Recent sector-disk (SD) codes are available only for limited configurations. By making a relaxed but practical assumption, we construct a general family of erasure codes called \emph{STAIR codes}, which efficiently and provably tolerate both device and sector failures without any restriction on the size of a storage array and the numbers of tolerable device failures and sector failures. We propose the \emph{upstairs encoding} and \emph{downstairs encoding} methods, which provide complementary performance advantages for different configurations. We conduct extensive experiments on STAIR codes in terms of space saving, encoding/decoding speed, and update cost. We demonstrate that STAIR codes not only improve space efficiency over traditional erasure codes, but also provide better computational efficiency than SD codes based on our special code construction. Finally, we present analytical models that characterize the reliability of STAIR codes, and show that the support of a wider range of configurations by STAIR codes is critical for tolerating sector failure bursts discovered in the field.
[ { "version": "v1", "created": "Fri, 20 Jun 2014 06:07:59 GMT" }, { "version": "v2", "created": "Mon, 23 Jun 2014 08:47:39 GMT" } ]
2014-06-24T00:00:00
[ [ "Li", "Mingqiang", "" ], [ "Lee", "Patrick P. C.", "" ] ]
new_dataset
0.999375
1406.5569
Ashkan Rahimian
Ashkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi
On the Reverse Engineering of the Citadel Botnet
10 pages, 17 figures. This is an updated / edited version of a paper appeared in FPS 2013
LNCS 8352, 2014, pp 408-425
10.1007/978-3-319-05302-8_25
null
cs.CR cs.NI cs.OS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Citadel is an advanced information-stealing malware which targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. A joint operation was recently conducted by the FBI and the Microsoft Digital Crimes Unit in order to take down Citadel command-and-control servers. The operation caused some disruption in the botnet but has not stopped it completely. Due to the complex structure and advanced anti-reverse engineering techniques, the Citadel malware analysis process is both challenging and time-consuming. This allows cyber criminals to carry on with their attacks while the analysis is still in progress. In this paper, we present the results of the Citadel reverse engineering and provide additional insight into the functionality, inner workings, and open source components of the malware. In order to accelerate the reverse engineering process, we propose a clone-based analysis methodology. Citadel is an offspring of a previously analyzed malware called Zeus; thus, using the former as a reference, we can measure and quantify the similarities and differences of the new variant. Two types of code analysis techniques are provided in the methodology, namely assembly to source code matching and binary clone detection. The methodology can help reduce the number of functions requiring manual analysis. The analysis results prove that the approach is promising in Citadel malware analysis. Furthermore, the same approach is applicable to similar malware analysis scenarios.
[ { "version": "v1", "created": "Sat, 21 Jun 2014 02:04:56 GMT" } ]
2014-06-24T00:00:00
[ [ "Rahimian", "Ashkan", "" ], [ "Ziarati", "Raha", "" ], [ "Preda", "Stere", "" ], [ "Debbabi", "Mourad", "" ] ]
new_dataset
0.987272
1406.5691
John J. Camilleri
John J. Camilleri, Gabriele Paganelli, Gerardo Schneider
A CNL for Contract-Oriented Diagrams
null
null
null
null
cs.CL cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a first step towards a framework for defining and manipulating normative documents or contracts described as Contract-Oriented (C-O) Diagrams. These diagrams provide a visual representation for such texts, giving the possibility to express a signatory's obligations, permissions and prohibitions, with or without timing constraints, as well as the penalties resulting from the non-fulfilment of a contract. This work presents a CNL for verbalising C-O Diagrams, a web-based tool allowing editing in this CNL, and another for visualising and manipulating the diagrams interactively. We then show how these proof-of-concept tools can be used by applying them to a small example.
[ { "version": "v1", "created": "Sun, 22 Jun 2014 09:41:24 GMT" } ]
2014-06-24T00:00:00
[ [ "Camilleri", "John J.", "" ], [ "Paganelli", "Gabriele", "" ], [ "Schneider", "Gerardo", "" ] ]
new_dataset
0.999412
1406.6035
Viorel Preoteasa
Viorel Preoteasa and Stavros Tripakis
Refinement Calculus of Reactive Systems
null
null
null
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Refinement calculus is a powerful and expressive tool for reasoning about sequential programs in a compositional manner. In this paper we present an extension of refinement calculus for reactive systems. Refinement calculus is based on monotonic predicate transformers, which transform sets of post-states into sets of pre-states. To model reactive systems, we introduce monotonic property transformers, which transform sets of output traces into sets of input traces. We show how to model in this semantics refinement, sequential composition, demonic choice, and other semantic operations on reactive systems. We use primarily higher order logic to express our results, but we also show how property transformers can be defined using other formalisms more amenable to automation, such as linear temporal logic (suitable for specifications) and symbolic transition systems (suitable for implementations). Finally, we show how this framework generalizes previous work on relational interfaces so as to be able to express systems with infinite behaviors and liveness properties.
[ { "version": "v1", "created": "Mon, 23 Jun 2014 19:38:05 GMT" } ]
2014-06-24T00:00:00
[ [ "Preoteasa", "Viorel", "" ], [ "Tripakis", "Stavros", "" ] ]
new_dataset
0.993957
1406.1501
Daniele de Rigo
Christine Estreguil, Giovanni Caudullo, Daniele de Rigo
Connectivity of Natura 2000 forest sites in Europe
9 pages, from a poster published in F1000Posters 2014, 5: 485
F1000Posters 2014, 5: 485
10.6084/m9.figshare.1063300
null
cs.CE q-bio.PE
http://creativecommons.org/licenses/by/3.0/
Background/Purpose: In the context of the European Biodiversity policy, the Green Infrastructure Strategy is one supporting tool to mitigate fragmentation, inter-alia to increase the spatial and functional connectivity between protected and unprotected areas. The Joint Research Centre has developed an integrated model to provide a macro-scale set of indices to evaluate the connectivity of the Natura 2000 network, which forms the backbone of a Green Infrastructure for Europe. The model allows a wide assessment and comparison to be performed across countries in terms of structural (spatially connected or isolated sites) and functional connectivity (least-cost distances between sites influenced by distribution, distance and land cover). Main conclusion: The Natura 2000 network in Europe shows differences among countries in terms of the sizes and numbers of sites, their distribution as well as distances between sites. Connectivity has been assessed on the basis of a 500 m average inter-site distance, roads and intensive land use as barrier effects as well as the presence of "green" corridors. In all countries the Natura 2000 network is mostly made of sites which are not physically connected. Highest functional connectivity values are found for Spain, Slovakia, Romania and Bulgaria. The more natural landscape in Sweden and Finland does not result in high inter-site network connectivity due to large inter-site distances. The distribution of subnets with respect to roads explains the higher share of isolated subnets in Portugal than in Belgium.
[ { "version": "v1", "created": "Thu, 5 Jun 2014 10:13:04 GMT" }, { "version": "v2", "created": "Fri, 20 Jun 2014 12:17:28 GMT" } ]
2014-06-23T00:00:00
[ [ "Estreguil", "Christine", "" ], [ "Caudullo", "Giovanni", "" ], [ "de Rigo", "Daniele", "" ] ]
new_dataset
0.999546
1406.5369
Harald Koestler Dr.
Harald Koestler, Christian Schmitt, Sebastian Kuckuk, Frank Hannig, Juergen Teich, Ulrich Ruede
A Scala Prototype to Generate Multigrid Solver Implementations for Different Problems and Target Multi-Core Platforms
null
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many problems in computational science and engineering involve partial differential equations and thus require the numerical solution of large, sparse (non)linear systems of equations. Multigrid is known to be one of the most efficient methods for this purpose. However, the concrete multigrid algorithm and its implementation highly depend on the underlying problem and hardware. Therefore, changes in the code or many different variants are necessary to cover all relevant cases. In this article we provide a prototype implementation in Scala for a framework that allows abstract descriptions of PDEs, their discretization, and their numerical solution via multigrid algorithms. From these, one is able to generate data structures and implementations of multigrid components required to solve elliptic PDEs on structured grids. Two different test problems showcase our proposed automatic generation of multigrid solvers for both CPU and GPU target platforms.
[ { "version": "v1", "created": "Fri, 20 Jun 2014 12:46:27 GMT" } ]
2014-06-23T00:00:00
[ [ "Koestler", "Harald", "" ], [ "Schmitt", "Christian", "" ], [ "Kuckuk", "Sebastian", "" ], [ "Hannig", "Frank", "" ], [ "Teich", "Juergen", "" ], [ "Ruede", "Ulrich", "" ] ]
new_dataset
0.951777
1406.5376
Leandro Montero
Raquel \'Agueda, Valentin Borozan, Marina Groshaus, Yannis Manoussakis, Gervais Mendy, Leandro Montero
Proper Hamiltonian Paths in Edge-Coloured Multigraphs
21 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a $c$-edge-coloured multigraph, a proper Hamiltonian path is a path that contains all the vertices of the multigraph such that no two adjacent edges have the same colour. In this work we establish sufficient conditions for an edge-coloured multigraph to guarantee the existence of a proper Hamiltonian path, involving various parameters as the number of edges, the number of colours, the rainbow degree and the connectivity.
[ { "version": "v1", "created": "Fri, 20 Jun 2014 13:21:58 GMT" } ]
2014-06-23T00:00:00
[ [ "Águeda", "Raquel", "" ], [ "Borozan", "Valentin", "" ], [ "Groshaus", "Marina", "" ], [ "Manoussakis", "Yannis", "" ], [ "Mendy", "Gervais", "" ], [ "Montero", "Leandro", "" ] ]
new_dataset
0.999577
1102.3350
Felice Manganiello
Felice Manganiello, Anna-Lena Trautmann and Joachim Rosenthal
On conjugacy classes of subgroups of the general linear group and cyclic orbit codes
5 pages; Submitted to IEEE International Symposium on Information Theory (ISIT) 2011
null
10.1109/ISIT.2011.6033885
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orbit codes are a family of codes employable for communications on a random linear network coding channel. The paper focuses on the classification of these codes. We start by classifying the conjugacy classes of cyclic subgroups of the general linear group. As a result, we are able to focus the study of cyclic orbit codes to a restricted family of them.
[ { "version": "v1", "created": "Wed, 16 Feb 2011 14:43:08 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2011 16:37:58 GMT" } ]
2014-06-20T00:00:00
[ [ "Manganiello", "Felice", "" ], [ "Trautmann", "Anna-Lena", "" ], [ "Rosenthal", "Joachim", "" ] ]
new_dataset
0.999003
1112.1238
Anna-Lena Trautmann
Anna-Lena Trautmann, Felice Manganiello, Michael Braun and Joachim Rosenthal
Cyclic Orbit Codes
submitted to IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, volume 59, number 11, pages 7386-7404, 2013
10.1109/TIT.2013.2274266
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In network coding a constant dimension code consists of a set of k-dimensional subspaces of F_q^n. Orbit codes are constant dimension codes which are defined as orbits of a subgroup of the general linear group, acting on the set of all subspaces of F_q^n. If the acting group is cyclic, the corresponding orbit codes are called cyclic orbit codes. In this paper we give a classification of cyclic orbit codes and propose a decoding procedure for a particular subclass of cyclic orbit codes.
[ { "version": "v1", "created": "Tue, 6 Dec 2011 11:30:21 GMT" } ]
2014-06-20T00:00:00
[ [ "Trautmann", "Anna-Lena", "" ], [ "Manganiello", "Felice", "" ], [ "Braun", "Michael", "" ], [ "Rosenthal", "Joachim", "" ] ]
new_dataset
0.998938
1406.5038
Md Shakir Hossain
Sakir Hossain
Rain Attenuation Prediction for Terrestrial Microwave Link in Bangladesh
Journal of Electrical and Electronics Engineering (volume: 7, Issue: 1) http://electroinf.uoradea.ro/images/articles/CERCETARE/Reviste/JEEE/JEEE_V7_N1_MAY_2014/Hossain_may2014.pdf
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rain attenuation is a major shortcoming of microwave transmission. As a subtropical country, Bangladesh is one of the highest rainy areas of the world. Thus, designing a terrestrial microwave link is a serious challenge to the engineers. In this paper, the annual rain rate and monthly variation of rate are predicted for different percentage of time of the year from the measured rainfall data. Using ITU rain model for terrestrial microwave communication, the rain attenuation is predicted for five major cities of Bangladesh, namely Dhaka, Chittagong, Rajshahi, Sylhet, and Khulna. It is found that rain attenuation is the most severe in Sylhet and least in Rajshahi. The attenuation is estimated for different frequency and polarization. A horizontally polarized signal encounters 15% more rain attenuation than that of vertically polarized signal. It is also found that attenuation in Rajshahi is about 20% lesser than that in Sylhet. Thus, the horizontally polarized transmission in Rajshahi experiences about 5% less attenuation than the vertically polarized transmission in Sylhet.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 13:33:18 GMT" } ]
2014-06-20T00:00:00
[ [ "Hossain", "Sakir", "" ] ]
new_dataset
0.974761
1406.5073
Sadi Seker E
Sadi Evren Seker, Bilal Cankir, and Mehmet Lutfi Arslan
Information and Communication Technology Reputation for XU030 Quote Companies
5 pages 2 figure 1 table 21 refs. arXiv admin note: text overlap with arXiv:1401.7547
International Journal of Innovation, Management and Technology, Vol. 5, No. 3, June 2014 ISSN: 2010-0248
10.7763/IJIMT.2014.V5.517
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By the increasing spread of information technology and Internet improvements, most of the large-scale companies are paying special attention to their reputation on many types of the information and communication technology. The increasing developments and penetration of new technologies into daily life, brings out paradigm shift on the perception of reputation and creates new concepts like esocieties, techno-culture and new media. Contemporary companies are trying to control their reputation over the new communities who are mostly interacting with social networks, web pages and electronic communication technologies. In this study, the reputation of top 30 Turkish companies, quoted to the Istanbul Stock Market, is studied, based on the information technology interfaces between company and society, such as social networks, blogs, wikis and web pages. The web reputation is gathered through 17 different parameters, collected from Google, Facebook, Twitter, Bing, Alexa, etc. The reputation index is calculated by z-index and fscoring formulations after the min-max normalization of each web reputation parameter.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 03:27:39 GMT" } ]
2014-06-20T00:00:00
[ [ "Seker", "Sadi Evren", "" ], [ "Cankir", "Bilal", "" ], [ "Arslan", "Mehmet Lutfi", "" ] ]
new_dataset
0.982444
1406.5151
Martha Rosa Cordero L\'opez
Martha Rosa Cordero Lopez and Marco Antonio Dorantes Gonzalez
Tollan-Xicocotitlan: A reconstructed City by augmented reality
15 pages, 12 figures, Fourth International Conference on Advances in Computing and Information technology (ACITY 2014)
null
null
null
cs.CE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This project presents the analysis, design, implementation and results of Reconstruction Xicocotitlan Tollan-through augmented reality, which will release information about the Toltec culture supplemented by presenting an overview of the main premises of the Xicocotitlan Tollan city supported dimensional models based on the augmented reality technique showing the user a virtual representation of buildings in Tollan.
[ { "version": "v1", "created": "Thu, 19 Jun 2014 18:57:03 GMT" } ]
2014-06-20T00:00:00
[ [ "Lopez", "Martha Rosa Cordero", "" ], [ "Gonzalez", "Marco Antonio Dorantes", "" ] ]
new_dataset
0.998275
1406.4547
Patrick Sol\'e
Claude Carlet, Finley Freibert, Sylvain Guilley, Michael Kiermaier, Jon-Lark Kim, Patrick Sol\'e
Higher-order CIS codes
13 pages; 1 figure
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce {\bf complementary information set codes} of higher-order. A binary linear code of length $tk$ and dimension $k$ is called a complementary information set code of order $t$ ($t$-CIS code for short) if it has $t$ pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a $t$-CIS code, we look for the highest possible minimum distance. In this paper, this new class of codes is investigated. The existence of good long CIS codes of order $3$ is derived by a counting argument. General constructions based on cyclic and quasi-cyclic codes and on the building up construction are given. A formula similar to a mass formula is given. A classification of 3-CIS codes of length $\le 12$ is given. Nonlinear codes better than linear codes are derived by taking binary images of $\Z_4$-codes. A general algorithm based on Edmonds' basis packing algorithm from matroid theory is developed with the following property: given a binary linear code of rate $1/t$ it either provides $t$ disjoint information sets or proves that the code is not $t$-CIS. Using this algorithm, all optimal or best known $[tk, k]$ codes where $t=3, 4, \dots, 256$ and $1 \le k \le \lfloor 256/t \rfloor$ are shown to be $t$-CIS for all such $k$ and $t$, except for $t=3$ with $k=44$ and $t=4$ with $k=37$.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 21:53:21 GMT" } ]
2014-06-19T00:00:00
[ [ "Carlet", "Claude", "" ], [ "Freibert", "Finley", "" ], [ "Guilley", "Sylvain", "" ], [ "Kiermaier", "Michael", "" ], [ "Kim", "Jon-Lark", "" ], [ "Solé", "Patrick", "" ] ]
new_dataset
0.981442
1406.4690
Mehrnoosh Sadrzadeh
Mehrnoosh Sadrzadeh and Stephen Clark and Bob Coecke
The Frobenius anatomy of word meanings II: possessive relative pronouns
40 pages, Journal of Logic and Computation, Essays dedicated to Roy Dyckhoff on the occasion of his retirement, S. Graham-Lengrand and D. Galmiche (eds.), 2014
null
10.1093/logcom/exu027
null
cs.CL math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the categorical compositional distributional model of meaning, we provide semantic interpretations for the subject and object roles of the possessive relative pronoun `whose'. This is done in terms of Frobenius algebras over compact closed categories. These algebras and their diagrammatic language expose how meanings of words in relative clauses interact with each other. We show how our interpretation is related to Montague-style semantics and provide a truth-theoretic interpretation. We also show how vector spaces provide a concrete interpretation and provide preliminary corpus-based experimental evidence. In a prequel to this paper, we used similar methods and dealt with the case of subject and object relative pronouns.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 11:54:13 GMT" } ]
2014-06-19T00:00:00
[ [ "Sadrzadeh", "Mehrnoosh", "" ], [ "Clark", "Stephen", "" ], [ "Coecke", "Bob", "" ] ]
new_dataset
0.999404
1406.4852
Iwan M. Duursma
Iwan M. Duursma
Outer bounds for exact repair codes
14 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the open problem of establishing the rate region for exact-repair regenerating codes for given parameters (n,k,d). Tian determined the rate region for a (4,3,3) code and found that it lies strictly within the functional-repair rate region. Using different methods, Sasidharan, Senthoor and Kumar proved a non-vanishing gap between the functional-repair outer bound and the exact-repair outer bound for codes with k>=3. Our main results are two improved outer bounds for exact-repair regenerating codes. They capture and then extend essential parts in the proofs by Tian and by Sasidharan, Senthoor and Kumar. We show that the bounds can be combined for further improvements.
[ { "version": "v1", "created": "Wed, 18 Jun 2014 19:40:13 GMT" } ]
2014-06-19T00:00:00
[ [ "Duursma", "Iwan M.", "" ] ]
new_dataset
0.969123
1405.6483
Yi Wen tan
Wentan Yi and Shaozhen Chen
Integral Cryptanalysis of the Block Cipher E2
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Block cipher E2, designed and submitted by Nippon Telegraph and Telephone Corporation, is a first-round Advanced Encryption Standard candidate. It employs a Feistel structure as global structure and two-layer substitution-permutation network structure in round function with initial transformation IT function before the first round and final transformation FT function after the last round. The design principles influences several more recent block ciphers including Camellia, an ISO/IEC standard cipher. In this paper, we focus on the key-recovery attacks on reduced-round E2-128/192 taking both IT and FT functions in consideration with integral cryptanalysis. We first improve the relations between zero-correlation linear approximations and integral distinguishers, and then deduce some integral distinguishers from zero-correlation linear approximations over 6 rounds of E2. Furthermore, we apply these integral distinguishers to break 6-round E2-128 with 2^{120} known plaintexts (KPs), 2^{115.4} encryptions and 2^{28} bytes memory. In addition, the attack on 7-round E2-192 requires 2^{120} KPs, 2^{167.2} encryptions and 2^{60} bytes memory.
[ { "version": "v1", "created": "Mon, 26 May 2014 07:25:10 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2014 00:03:22 GMT" } ]
2014-06-18T00:00:00
[ [ "Yi", "Wentan", "" ], [ "Chen", "Shaozhen", "" ] ]
new_dataset
0.993905
1406.4162
Ahmed Alaa
Ahmed M. Alaa
Band-Sweeping M-ary PSK (BS-M-PSK) Modulation and Transceiver Design
To appear in IEEE Potentials Magazine
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel Estimation is a major problem encountered by receiver designers for wireless communications systems. The fading channels encountered by the system are usually time variant for a mobile receiver. Besides, the frequency response of the channel is frequency selective for urban environments where the delay spread is quite large compared to the symbol duration. Estimating the channel is essential for equalizing the received data and removing the Inter-Symbol Interference (ISI) resulting from the dispersive channel. Hence, conventional transceivers insert pilot symbols of known values and detect the changes in it in order to deduce the channel response. Because these pilots carry no information, the throughput of the system is reduced. A Novel modulation scheme is presented in this work. The technique depends on using a carrier signal that has no fixed frequency, the carrier tone sweeps the band dedicated for transmission and detects the transfer function gain within the band. A carrier signal that is Frequency Modulated (FM) by a periodic ramp signal becomes Amplitude Modulated (AM) by the channel transfer function, and thus, the receiver obtains an estimate for the channel response without using pilots that decrease the systems throughput or data rate. The carrier signal itself acts as a dynamic frequency domain pilot. The technique only works for constant energy systems, and thus it is applied to PSK transceivers. Mathematical formulation, transceiver design and performance analysis of the proposed modulation technique are presented.
[ { "version": "v1", "created": "Thu, 30 Jan 2014 14:35:44 GMT" } ]
2014-06-18T00:00:00
[ [ "Alaa", "Ahmed M.", "" ] ]
new_dataset
0.981219
1406.4197
Scott Summers
David Furcy and Scott M. Summers
Scaled pier fractals do not strictly self-assemble
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A \emph{pier fractal} is a discrete self-similar fractal whose generator contains at least one \emph{pier}, that is, a member of the generator with exactly one adjacent point. Tree fractals and pinch-point fractals are special cases of pier fractals. In this paper, we study \emph{scaled pier fractals}, where a \emph{scaled fractal} is the shape obtained by replacing each point in the original fractal by a $c \times c$ block of points, for some $c \in \mathbb{Z}^+$. We prove that no scaled discrete self-similar pier fractal strictly self-assembles, at any temperature, in Winfree's abstract Tile Assembly Model.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 00:34:42 GMT" } ]
2014-06-18T00:00:00
[ [ "Furcy", "David", "" ], [ "Summers", "Scott M.", "" ] ]
new_dataset
0.998534
1406.4212
Fabio Brochero Martinez
F.E. Brochero Mart\'inez
Number of minimal cyclic codes with given length and dimension
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we count the quantity of minimal cyclic codes of length $n$ and dimension $k$ over a finite field $\mathbb F_q$, in the case when the prime factors of $n$ satisfy a special condition. This problem is equivalent to count the quantity of irreducible factors of $x^n-1\in \mathbb F_q[x]$ of degree $k$.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 01:36:05 GMT" } ]
2014-06-18T00:00:00
[ [ "Martínez", "F. E. Brochero", "" ] ]
new_dataset
0.999073
1406.4395
Morgane Esti\'evenart
Thomas Brihaye, Morgane Esti\'evenart, Gilles Geeraerts
On MITL and alternating timed automata over infinite words
null
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One clock alternating timed automata (OCATA) have been introduced as natural extension of (one clock) timed automata to express the semantics of MTL. In this paper, we consider the application of OCATA to the problems of model-checking and satisfiability for MITL (a syntactic fragment of MTL), interpreted over infinite words. Our approach is based on the interval semantics (recently introduced in [BEG13] in the case of finite words) extended to infinite words. We propose region-based and zone-based algorithms, based on this semantics, for MITL model-checking and satisfiability. We report on the performance of a prototype tool implementing those algorithms.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 15:03:23 GMT" } ]
2014-06-18T00:00:00
[ [ "Brihaye", "Thomas", "" ], [ "Estiévenart", "Morgane", "" ], [ "Geeraerts", "Gilles", "" ] ]
new_dataset
0.998373
1404.2505
Loet Leydesdorff
Loet Leydesdorff, F\'elix de Moya-Aneg\'on, and Wouter de Nooy
Aggregated journal-journal citation relations in Scopus and Web-of-Science matched and compared in terms of networks, maps, and interactive overlays
the paper is accepted for publication in the Journal of the Association for Information Science and Technology (JASIST)
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We compare the network of aggregated journal-journal citation relations provided by the Journal Citation Reports (JCR) 2012 of the Science and Social Science Citation Indexes (SCI and SSCI) with similar data based on Scopus 2012. First, global maps were developed for the two sets separately; sets of documents can then be compared using overlays to both maps. Using fuzzy-string matching and ISSN numbers, we were able to match 10,524 journal names between the two sets; that is, 96.4% of the 10,936 journals contained in JCR or 51.2% of the 20,554 journals covered by Scopus. Network analysis was then pursued on the set of journals shared between the two databases and the two sets of unique journals. Citations among the shared journals are more comprehensively covered in JCR than Scopus, so the network in JCR is denser and more connected than in Scopus. The ranking of shared journals in terms of indegree (that is, numbers of citing journals) or total citations is similar in both databases overall (Spearman's \r{ho} > 0.97), but some individual journals rank very differently. Journals that are unique to Scopus seem to be less important--they are citing shared journals rather than being cited by them--but the humanities are covered better in Scopus than in JCR.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 14:47:57 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2014 06:57:34 GMT" }, { "version": "v3", "created": "Sat, 14 Jun 2014 11:44:31 GMT" } ]
2014-06-17T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "de Moya-Anegón", "Félix", "" ], [ "de Nooy", "Wouter", "" ] ]
new_dataset
0.955712
1405.7102
Tim Althoff
Tim Althoff, Hyun Oh Song, Trevor Darrell
Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition
ACM Multimedia 2012
null
null
null
cs.MM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While low-level image features have proven to be effective representations for visual recognition tasks such as object recognition and scene classification, they are inadequate to capture complex semantic meaning required to solve high-level visual tasks such as multimedia event detection and recognition. Recognition or retrieval of events and activities can be improved if specific discriminative objects are detected in a video sequence. In this paper, we propose an image representation, called Detection Bank, based on the detection images from a large number of windowed object detectors where an image is represented by different statistics derived from these detections. This representation is extended to video by aggregating the key frame level image representations through mean and max pooling. We empirically show that it captures complementary information to state-of-the-art representations such as Spatial Pyramid Matching and Object Bank. These descriptors combined with our Detection Bank representation significantly outperforms any of the representations alone on TRECVID MED 2011 data.
[ { "version": "v1", "created": "Wed, 28 May 2014 02:07:29 GMT" }, { "version": "v2", "created": "Sat, 14 Jun 2014 20:17:48 GMT" } ]
2014-06-17T00:00:00
[ [ "Althoff", "Tim", "" ], [ "Song", "Hyun Oh", "" ], [ "Darrell", "Trevor", "" ] ]
new_dataset
0.988164
1406.3812
Petr Golovach
Petr A. Golovach, Pinar Heggernes, Pim van 't Hof, and Christophe Paul
Hadwiger number of graphs with small chordality
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hadwiger number of a graph G is the largest integer h such that G has the complete graph K_h as a minor. We show that the problem of determining the Hadwiger number of a graph is NP-hard on co-bipartite graphs, but can be solved in polynomial time on cographs and on bipartite permutation graphs. We also consider a natural generalization of this problem that asks for the largest integer h such that G has a minor with h vertices and diameter at most $s$. We show that this problem can be solved in polynomial time on AT-free graphs when s>=2, but is NP-hard on chordal graphs for every fixed s>=2.
[ { "version": "v1", "created": "Sun, 15 Jun 2014 13:08:56 GMT" } ]
2014-06-17T00:00:00
[ [ "Golovach", "Petr A.", "" ], [ "Heggernes", "Pinar", "" ], [ "Hof", "Pim van 't", "" ], [ "Paul", "Christophe", "" ] ]
new_dataset
0.997491
1406.3860
Taylor Gordon
Taylor Gordon
The Minimum Bends in a Polyline Drawing with Fixed Vertex Locations
12 pages, 5 figures
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider embeddings of planar graphs in $R^2$ where vertices map to points and edges map to polylines. We refer to such an embedding as a polyline drawing, and ask how few bends are required to form such a drawing for an arbitrary planar graph. It has long been known that even when the vertex locations are completely fixed, a planar graph admits a polyline drawing where edges bend a total of $O(n^2)$ times. Our results show that this number of bends is optimal. In particular, we show that $\Omega(n^2)$ total bends is required to form a polyline drawing on any set of fixed vertex locations for almost all planar graphs. This result generalizes all previously known lower bounds, which only applied to convex point sets, and settles 2 open problems.
[ { "version": "v1", "created": "Sun, 15 Jun 2014 21:16:45 GMT" } ]
2014-06-17T00:00:00
[ [ "Gordon", "Taylor", "" ] ]
new_dataset
0.998263
1406.3876
Shawn Jones
Shawn M. Jones, Michael L. Nelson, Harihar Shankar, Herbert Van de Sompel
Bringing Web Time Travel to MediaWiki: An Assessment of the Memento MediaWiki Extension
23 pages, 18 figures, 9 tables, 17 listings
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have implemented the Memento MediaWiki Extension Version 2.0, which brings the Memento Protocol to MediaWiki, used by Wikipedia and the Wikimedia Foundation. Test results show that the extension has a negligible impact on performance. Two 302 status code datetime negotiation patterns, as defined by Memento, have been examined for the extension: Pattern 1.1, which requires 2 requests, versus Pattern 2.1, which requires 3 requests. Our test results and mathematical review find that, contrary to intuition, Pattern 2.1 performs better than Pattern 1.1 due to idiosyncrasies in MediaWiki. In addition to implementing Memento, Version 2.0 allows administrators to choose the optional 200-style datetime negotiation Pattern 1.2 instead of Pattern 2.1. It also permits administrators the ability to have the Memento MediaWiki Extension return full HTTP 400 and 500 status codes rather than using standard MediaWiki error pages. Finally, version 2.0 permits administrators to turn off recommended Memento headers if desired. Seeing as much of our work focuses on producing the correct revision of a wiki page in response to a user's datetime input, we also examine the problem of finding the correct revisions of the embedded resources, including images, stylesheets, and JavaScript; identifying the issues and discussing whether or not MediaWiki must be changed to support this functionality.
[ { "version": "v1", "created": "Mon, 16 Jun 2014 01:01:54 GMT" } ]
2014-06-17T00:00:00
[ [ "Jones", "Shawn M.", "" ], [ "Nelson", "Michael L.", "" ], [ "Shankar", "Harihar", "" ], [ "Van de Sompel", "Herbert", "" ] ]
new_dataset
0.99914
1406.4048
Abuzer Yakaryilmaz
A. C. Cem Say and Abuzer Yakaryilmaz
Quantum finite automata: A modern introduction
15 pages
null
null
null
cs.FL cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present five examples where quantum finite automata (QFAs) outperform their classical counterparts. This may be useful as a relatively simple technique to introduce quantum computation concepts to computer scientists. We also describe a modern QFA model involving superoperators that is able to simulate all known QFA and classical finite automaton variants.
[ { "version": "v1", "created": "Mon, 16 Jun 2014 15:33:18 GMT" } ]
2014-06-17T00:00:00
[ [ "Say", "A. C. Cem", "" ], [ "Yakaryilmaz", "Abuzer", "" ] ]
new_dataset
0.998581
1406.4057
Aarne Ranta
Aarne Ranta
Embedded Controlled Languages
7 pages, extended abstract, preprint for CNL 2014 in Galway
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by embedded programming languages, an embedded CNL (controlled natural language) is a proper fragment of an entire natural language (its host language), but it has a parser that recognizes the entire host language. This makes it possible to process out-of-CNL input and give useful feedback to users, instead of just reporting syntax errors. This extended abstract explains the main concepts of embedded CNL implementation in GF (Grammatical Framework), with examples from machine translation and some other ongoing work.
[ { "version": "v1", "created": "Mon, 16 Jun 2014 16:11:32 GMT" } ]
2014-06-17T00:00:00
[ [ "Ranta", "Aarne", "" ] ]
new_dataset
0.996896
1406.4086
Leon Abdillah
Leon Andretti Abdillah
Social media as political party campaign in Indonesia
10 pages
Jurnal Ilmiah MATRIK, vol. 16, pp. 1-10, 2014
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media as a trend in the Internet is now used as a medium for political campaigns. Author explores the advantages and social media implementation of any political party in Indonesia legislative elections 2014. Author visited and analyzed social media used by the contestants, such as: Facebook, and Twitter. Author collected data from social media until the end of April 2014. This article discusses the use of social media by political parties and their features. The results of this study indicate that social media are: 1) effective tool for current and future political campaigns, 2) reach the voters and supporters instantly, 3) used by Political parties to show their logo/icon, and 4) last but not least quick count results also show that political parties which using social media as part of their campaigns won the legislative elections.
[ { "version": "v1", "created": "Mon, 16 Jun 2014 17:58:18 GMT" } ]
2014-06-17T00:00:00
[ [ "Abdillah", "Leon Andretti", "" ] ]
new_dataset
0.996868
1406.4110
Bernardo Cuenca Grau
Bernardo Cuenca Grau, Ian Horrocks, Markus Kr\"otzsch, Clemens Kupke, Despoina Magka, Boris Motik, Zhe Wang
Acyclicity Notions for Existential Rules and Their Application to Query Answering in Ontologies
null
Journal Of Artificial Intelligence Research, Volume 47, pages 741-808, 2013
10.1613/jair.3949
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Answering conjunctive queries (CQs) over a set of facts extended with existential rules is a prominent problem in knowledge representation and databases. This problem can be solved using the chase algorithm, which extends the given set of facts with fresh facts in order to satisfy the rules. If the chase terminates, then CQs can be evaluated directly in the resulting set of facts. The chase, however, does not terminate necessarily, and checking whether the chase terminates on a given set of rules and facts is undecidable. Numerous acyclicity notions were proposed as sufficient conditions for chase termination. In this paper, we present two new acyclicity notions called model-faithful acyclicity (MFA) and model-summarising acyclicity (MSA). Furthermore, we investigate the landscape of the known acyclicity notions and establish a complete taxonomy of all notions known to us. Finally, we show that MFA and MSA generalise most of these notions. Existential rules are closely related to the Horn fragments of the OWL 2 ontology language; furthermore, several prominent OWL 2 reasoners implement CQ answering by using the chase to materialise all relevant facts. In order to avoid termination problems, many of these systems handle only the OWL 2 RL profile of OWL 2; furthermore, some systems go beyond OWL 2 RL, but without any termination guarantees. In this paper we also investigate whether various acyclicity notions can provide a principled and practical solution to these problems. On the theoretical side, we show that query answering for acyclic ontologies is of lower complexity than for general ontologies. On the practical side, we show that many of the commonly used OWL 2 ontologies are MSA, and that the number of facts obtained by materialisation is not too large. Our results thus suggest that principled development of materialisation-based OWL 2 reasoners is practically feasible.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 01:44:16 GMT" } ]
2014-06-17T00:00:00
[ [ "Grau", "Bernardo Cuenca", "" ], [ "Horrocks", "Ian", "" ], [ "Krötzsch", "Markus", "" ], [ "Kupke", "Clemens", "" ], [ "Magka", "Despoina", "" ], [ "Motik", "Boris", "" ], [ "Wang", "Zhe", "" ] ]
new_dataset
0.972572
1405.2736
Elisa Gorla
Elisa Gorla, Alberto Ravagnani
Subspace codes from Ferrers diagrams
minor edits
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we give new constructions of Ferrer diagram rank metric codes, which achieve the largest possible dimension. In particular, we prove several cases of a conjecture by T. Etzion and N. Silberstein. We also establish a sharp lower bound on the dimension of linear rank metric anticodes with a given profile. Combining our results with the multilevel construction, we produce examples of subspace codes with the largest known cardinality for the given parameters.
[ { "version": "v1", "created": "Mon, 12 May 2014 13:01:37 GMT" }, { "version": "v2", "created": "Fri, 13 Jun 2014 09:03:54 GMT" } ]
2014-06-16T00:00:00
[ [ "Gorla", "Elisa", "" ], [ "Ravagnani", "Alberto", "" ] ]
new_dataset
0.993708
1406.3400
Petr Novikov
Sasa Jokic, Petr Novikov, Stuart Maggs, Dori Sadan, Shihui Jin, Cristina Nan
Robotic positioning device for three-dimensional printing
14 pages, 9 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Additive manufacturing brings a variety of new possibilities to the construction industry, extending the capabilities of existing fabrication methods whilst also creating new possibilities. Currently three-dimensional printing is used to produce small-scale objects; large-scale three-dimensional printing is difficult due to the size of positioning devices and machine elements. Presently fixed Computer Numerically Controlled (CNC) routers and robotic arms are used to position print-heads. Fixed machines have work envelope limitations and can't produce objects outside of these limits. Large-scale three-dimensional printing requires large machines that are costly to build and hard to transport. This paper presents a compact print-head positioning device for Fused Deposition Modeling (FDM) a method of three-dimensional printing independent from the size of the object it prints.
[ { "version": "v1", "created": "Fri, 13 Jun 2014 01:09:16 GMT" } ]
2014-06-16T00:00:00
[ [ "Jokic", "Sasa", "" ], [ "Novikov", "Petr", "" ], [ "Maggs", "Stuart", "" ], [ "Sadan", "Dori", "" ], [ "Jin", "Shihui", "" ], [ "Nan", "Cristina", "" ] ]
new_dataset
0.997323
1406.3405
Sanguthevar Rajasekaran
Sanguthevar Rajasekaran and Marius Nicolae
An error correcting parser for context free grammars that takes less than cubic time
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of parsing has been studied extensively for various formal grammars. Given an input string and a grammar, the parsing problem is to check if the input string belongs to the language generated by the grammar. A closely related problem of great importance is one where the input are a string ${\cal I}$ and a grammar $G$ and the task is to produce a string ${\cal I}'$ that belongs to the language generated by $G$ and the `distance' between ${\cal I}$ and ${\cal I}'$ is the smallest (from among all the strings in the language). Specifically, if ${\cal I}$ is in the language generated by $G$, then the output should be ${\cal I}$. Any parser that solves this version of the problem is called an {\em error correcting parser}. In 1972 Aho and Peterson presented a cubic time error correcting parser for context free grammars. Since then this asymptotic time bound has not been improved under the (standard) assumption that the grammar size is a constant. In this paper we present an error correcting parser for context free grammars that runs in $O(T(n))$ time, where $n$ is the length of the input string and $T(n)$ is the time needed to compute the tropical product of two $n\times n$ matrices. In this paper we also present an $\frac{n}{M}$-approximation algorithm for the {\em language edit distance problem} that has a run time of $O(Mn^\omega)$, where $O(n^\omega)$ is the time taken to multiply two $n\times n$ matrices. To the best of our knowledge, no approximation algorithms have been proposed for error correcting parsing for general context free grammars.
[ { "version": "v1", "created": "Fri, 13 Jun 2014 02:05:37 GMT" } ]
2014-06-16T00:00:00
[ [ "Rajasekaran", "Sanguthevar", "" ], [ "Nicolae", "Marius", "" ] ]
new_dataset
0.984926
1406.3567
Siamak Sarmady
Siamak Sarmady, Fazilah Haron and Abdullah Zawawi Talib
Simulation of Pedestrian Movements Using Fine Grid Cellular Automata Model
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crowd simulation is used for evacuation and crowd safety inspections, study of performance in crowd systems and animations. Cellular automata has been extensively used in modelling the crowd. In regular cellular automata models, each pedestrian occupies a single cell with the size of a pedestrian body. Since the space is divided into relatively large cells, the movements of pedestrians look like the movements of pieces on a chess board. Furthermore, all pedestrians have the same body size and speed. In this paper, a method called fine grid cellular automata is proposed in which smaller cells are used and pedestrian body may occupy several cells. The model allows the use of different body sizes, shapes and speeds for pedestrian. The proposed model is used for simulating movements of pedestrians toward a target. A typical walkway scenario is used to test and evaluate the model. The movements of pedestrians are smoother because of the finer grain discretization of movements and the simulation results match empirical speed-density graphs with good accuracy.
[ { "version": "v1", "created": "Fri, 13 Jun 2014 15:25:32 GMT" } ]
2014-06-16T00:00:00
[ [ "Sarmady", "Siamak", "" ], [ "Haron", "Fazilah", "" ], [ "Talib", "Abdullah Zawawi", "" ] ]
new_dataset
0.998893
1406.2807
Yin Li
Yin Li, Xiaodi Hou, Christof Koch, James M. Rehg, Alan L. Yuille
The Secrets of Salient Object Segmentation
15 pages, 8 figures. Conference version was accepted by CVPR 2014
null
null
CBMM Memmo #14
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we provide an extensive evaluation of fixation prediction and salient object segmentation algorithms as well as statistics of major datasets. Our analysis identifies serious design flaws of existing salient object benchmarks, called the dataset design bias, by over emphasizing the stereotypical concepts of saliency. The dataset design bias does not only create the discomforting disconnection between fixations and salient object segmentation, but also misleads the algorithm designing. Based on our analysis, we propose a new high quality dataset that offers both fixation and salient object segmentation ground-truth. With fixations and salient object being presented simultaneously, we are able to bridge the gap between fixations and salient objects, and propose a novel method for salient object segmentation. Finally, we report significant benchmark progress on three existing datasets of segmenting salient objects
[ { "version": "v1", "created": "Wed, 11 Jun 2014 07:46:03 GMT" }, { "version": "v2", "created": "Thu, 12 Jun 2014 17:35:08 GMT" } ]
2014-06-13T00:00:00
[ [ "Li", "Yin", "" ], [ "Hou", "Xiaodi", "" ], [ "Koch", "Christof", "" ], [ "Rehg", "James M.", "" ], [ "Yuille", "Alan L.", "" ] ]
new_dataset
0.990202
1406.3117
Anh Nguyen
Anh Nguyen, Amy Banic
Low-cost Augmented Reality prototype for controlling network devices
null
null
null
null
cs.HC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the evolution of mobile devices, and smart-phones in particular, comes the ability to create new experiences that enhance the way we see, interact, and manipulate objects, within the world that surrounds us. It is now possible to blend data from our senses and our devices in numerous ways that simply were not possible before using Augmented Reality technology. In a near future, when all of the office devices as well as your personal electronic gadgets are on a common wireless network, operating them using a universal remote controller would be possible. This paper presents an off-the-shelf, low-cost prototype that leverages the Augmented Reality technology to deliver a novel and interactive way of operating office network devices around using a mobile device. We believe this type of system may provide benefits to controlling multiple integrated devices and visualizing interconnectivity or utilizing visual elements to pass information from one device to another, or may be especially beneficial to control devices when interacting with them physically may be difficult or pose danger or harm.
[ { "version": "v1", "created": "Thu, 12 Jun 2014 04:46:32 GMT" } ]
2014-06-13T00:00:00
[ [ "Nguyen", "Anh", "" ], [ "Banic", "Amy", "" ] ]
new_dataset
0.999415
1406.3149
Christian Napoli
Francesco Bonanno, Giacomo Capizzi, Grazia Lo Sciuto, Christian Napoli, Giuseppe Pappalardo, Emiliano Tramontana
A Cascade Neural Network Architecture investigating Surface Plasmon Polaritons propagation for thin metals in OpenMP
null
International conference on Artificial Intelligence and Soft Computing (ICAISC 2014), Vol I, 22-33 (2014)
null
null
cs.NE cond-mat.mes-hall cond-mat.mtrl-sci cs.DC cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Surface plasmon polaritons (SPPs) confined along metal-dielectric interface have attracted a relevant interest in the area of ultracompact photonic circuits, photovoltaic devices and other applications due to their strong field confinement and enhancement. This paper investigates a novel cascade neural network (NN) architecture to find the dependance of metal thickness on the SPP propagation. Additionally, a novel training procedure for the proposed cascade NN has been developed using an OpenMP-based framework, thus greatly reducing training time. The performed experiments confirm the effectiveness of the proposed NN architecture for the problem at hand.
[ { "version": "v1", "created": "Thu, 12 Jun 2014 08:40:04 GMT" } ]
2014-06-13T00:00:00
[ [ "Bonanno", "Francesco", "" ], [ "Capizzi", "Giacomo", "" ], [ "Sciuto", "Grazia Lo", "" ], [ "Napoli", "Christian", "" ], [ "Pappalardo", "Giuseppe", "" ], [ "Tramontana", "Emiliano", "" ] ]
new_dataset
0.966442
1406.2795
Adrian Kosowski
Shantanu Das (LIF), Dariusz Dereniowski, Adrian Kosowski (INRIA Rocquencourt, LIAFA), Przemyslaw Uznanski (LIF)
Rendezvous of Distance-aware Mobile Agents in Unknown Graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size and to depend only on the initial distance between the agents and some local parameters such as the degree of the vertices, and the size of the agent's label. It is well known that even for simple graphs of degree $\Delta$, the rendezvous time can be exponential in $\Delta$ in the worst case. In this paper, we introduce a new version of the rendezvous problem where the agents are equipped with a device that measures its distance to the other agent after every step. We show that these \emph{distance-aware} agents are able to rendezvous in any unknown graph, in time polynomial in all the local parameters such the degree of the nodes, the initial distance $D$ and the size of the smaller of the two agent labels $l = \min(l_1, l_2)$. Our algorithm has a time complexity of $O(\Delta(D+\log{l}))$ and we show an almost matching lower bound of $\Omega(\Delta(D+\log{l}/\log{\Delta}))$ on the time complexity of any rendezvous algorithm in our scenario. Further, this lower bound extends existing lower bounds for the general rendezvous problem without distance awareness.
[ { "version": "v1", "created": "Wed, 11 Jun 2014 07:01:42 GMT" } ]
2014-06-12T00:00:00
[ [ "Das", "Shantanu", "", "LIF" ], [ "Dereniowski", "Dariusz", "", "INRIA\n Rocquencourt, LIAFA" ], [ "Kosowski", "Adrian", "", "INRIA\n Rocquencourt, LIAFA" ], [ "Uznanski", "Przemyslaw", "", "LIF" ] ]
new_dataset
0.998844
1406.2823
Roberto Lopez-Herrejon
Roberto E. Lopez-Herrejon and Javier Ferrer and Francisco Chicano and Lukas Linsbauer and Alexander Egyed and Enrique Alba
A Hitchhiker's Guide to Search-Based Software Engineering for Software Product Lines
null
null
null
null
cs.SE cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search Based Software Engineering (SBSE) is an emerging discipline that focuses on the application of search-based optimization techniques to software engineering problems. The capacity of SBSE techniques to tackle problems involving large search spaces make their application attractive for Software Product Lines (SPLs). In recent years, several publications have appeared that apply SBSE techniques to SPL problems. In this paper, we present the results of a systematic mapping study of such publications. We identified the stages of the SPL life cycle where SBSE techniques have been used, what case studies have been employed and how they have been analysed. This mapping study revealed potential venues for further research as well as common misunderstanding and pitfalls when applying SBSE techniques that we address by providing a guideline for researchers and practitioners interested in exploiting these techniques.
[ { "version": "v1", "created": "Wed, 11 Jun 2014 08:43:51 GMT" } ]
2014-06-12T00:00:00
[ [ "Lopez-Herrejon", "Roberto E.", "" ], [ "Ferrer", "Javier", "" ], [ "Chicano", "Francisco", "" ], [ "Linsbauer", "Lukas", "" ], [ "Egyed", "Alexander", "" ], [ "Alba", "Enrique", "" ] ]
new_dataset
0.986053
1402.2143
Uli Fahrenberg
Uli Fahrenberg and Axel Legay and Louis-Marie Traonouez
Structural Refinement for the Modal nu-Calculus
Accepted at ICTAC 2014
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new notion of structural refinement, a sound abstraction of logical implication, for the modal nu-calculus. Using new translations between the modal nu-calculus and disjunctive modal transition systems, we show that these two specification formalisms are structurally equivalent. Using our translations, we also transfer the structural operations of composition and quotient from disjunctive modal transition systems to the modal nu-calculus. This shows that the modal nu-calculus supports composition and decomposition of specifications.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 13:46:55 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2014 12:53:50 GMT" } ]
2014-06-11T00:00:00
[ [ "Fahrenberg", "Uli", "" ], [ "Legay", "Axel", "" ], [ "Traonouez", "Louis-Marie", "" ] ]
new_dataset
0.971879
1404.5034
Musheer Ahmad
Parvez Mahmood Khan, M M Sufyan Beg, Musheer Ahmad
Sustaining IT PMOs during Cycles of Global Recession
null
European Journal of Scientific Research, vol. 114, no. 3, pp. 376-385, November 2013
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Growth in the number of PMOs established by the industry over last decade and ever growing body of literature on PMO related research in academia is a clear indication that there is very clear interest of researchers, practitioners and industries across the globe to understand and explore value propositions of PMO. However, there is still a lack of consensus on many critical aspects of PMOs. While there are many PMOs being established, but there are also many being closed and disbanded, which is definitely a matter of concern. In industry environment, a narrow majority of PMOs are well-regarded by their organizations and are seen as contributing business value, many of the others are still struggling to show value for money and some are failing, causing a high mortality rate among PMOs. This paper is the result of a study undertaken to get a deeper understanding of factors that may be causing mortality and failure of PMOs. Post Implementation Reviews of 4-failed & 3-challenged PMOs in IT-Industry were carried out with concerned Project Managers & PMO-staff, using grounded theory research method, with support from the concerned enterprise from IT-Industry.
[ { "version": "v1", "created": "Sun, 20 Apr 2014 12:03:08 GMT" }, { "version": "v2", "created": "Tue, 10 Jun 2014 13:17:46 GMT" } ]
2014-06-11T00:00:00
[ [ "Khan", "Parvez Mahmood", "" ], [ "Beg", "M M Sufyan", "" ], [ "Ahmad", "Musheer", "" ] ]
new_dataset
0.998858
1406.2495
Paolo Missier
Hugo Firth and Paolo Missier
ProvGen: generating synthetic PROV graphs with predictable structure
IPAW'14 paper, In Procs. IPAW 2014 (Provenance and Annotations). Koln, Germany: Springer, 2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces provGen, a generator aimed at producing large synthetic provenance graphs with predictable properties and of arbitrary size. Synthetic provenance graphs serve two main purposes. Firstly, they provide a variety of controlled workloads that can be used to test storage and query capabilities of provenance management systems at scale. Secondly, they provide challenging testbeds for experimenting with graph algorithms for provenance analytics, an area of increasing research interest. provGen produces PROV graphs and stores them in a graph DBMS (Neo4J). A key feature is to let users control the relationship makeup and topological features of the graph, by providing a seed provenance pattern along with a set of constraints, expressed using a custom Domain Specific Language. We also propose a simple method for evaluating the quality of the generated graphs, by measuring how realistically they simulate the structure of real-world patterns.
[ { "version": "v1", "created": "Tue, 10 Jun 2014 10:20:33 GMT" } ]
2014-06-11T00:00:00
[ [ "Firth", "Hugo", "" ], [ "Missier", "Paolo", "" ] ]
new_dataset
0.997471
1406.2538
Guntis Barzdins
Guntis Barzdins
FrameNet CNL: a Knowledge Representation and Information Extraction Language
CNL-2014 camera-ready version. The final publication is available at link.springer.com
null
null
null
cs.CL cs.AI cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a FrameNet-based information extraction and knowledge representation framework, called FrameNet-CNL. The framework is used on natural language documents and represents the extracted knowledge in a tailor-made Frame-ontology from which unambiguous FrameNet-CNL paraphrase text can be generated automatically in multiple languages. This approach brings together the fields of information extraction and CNL, because a source text can be considered belonging to FrameNet-CNL, if information extraction parser produces the correct knowledge representation as a result. We describe a state-of-the-art information extraction parser used by a national news agency and speculate that FrameNet-CNL eventually could shape the natural language subset used for writing the newswire articles.
[ { "version": "v1", "created": "Tue, 10 Jun 2014 13:16:36 GMT" } ]
2014-06-11T00:00:00
[ [ "Barzdins", "Guntis", "" ] ]
new_dataset
0.999095
1406.2544
Thomas Nowak
Matthias F\"ugger and Robert Najvirt and Thomas Nowak and Ulrich Schmid
Faithful Glitch Propagation in Binary Circuit Models
18 pages, 7 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern digital circuit design relies on fast digital timing simulation tools and, hence, on accurate binary-valued circuit models that faithfully model signal propagation, even throughout a complex design. Unfortunately, it was recently proved [F\"ugger et al., ASYNC'13] that no existing binary-valued circuit model proposed so far, including the two most commonly used pure and inertial delay channels, faithfully captures glitch propagation: For the simple Short-Pulse Filtration (SPF) problem, which is related to a circuit's ability to suppress a single glitch, we showed that the quite broad class of bounded single-history channels either contradict the unsolvability of SPF in bounded time or the solvability of SPF in unbounded time in physical circuits. In this paper, we propose a class of binary circuit models that do not suffer from this deficiency: Like bounded single-history channels, our involution channels involve delays that may depend on the time of the previous output transition. Their characteristic property are delay functions which are based on involutions, i.e., functions that form their own inverse. A concrete example of such a delay function, which is derived from a generalized first-order analog circuit model, reveals that this is not an unrealistic assumption. We prove that, in sharp contrast to what is possible with bounded single-history channels, SPF cannot be solved in bounded time due to the nonexistence of a lower bound on the delay of involution channels, whereas it is easy to provide an unbounded SPF implementation. It hence follows that binary-valued circuit models based on involution channels allow to solve SPF precisely when this is possible in physical circuits. To the best of our knowledge, our model is hence the very first candidate for a model that indeed guarantees faithful glitch propagation.
[ { "version": "v1", "created": "Tue, 10 Jun 2014 13:37:19 GMT" } ]
2014-06-11T00:00:00
[ [ "Függer", "Matthias", "" ], [ "Najvirt", "Robert", "" ], [ "Nowak", "Thomas", "" ], [ "Schmid", "Ulrich", "" ] ]
new_dataset
0.967399
1201.4342
Tobias Buer
Tobias Buer and Herbert Kopfer
A Pareto-metaheuristic for a bi-objective winner determination problem in a combinatorial reverse auction
Accepted for publication in Computers & Operations Research, available online, Computers & Operations Research, 2013
Computers & Operations Research 41 (2014), 208-220
10.1016/j.cor.2013.04.004
null
cs.GT cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bi-objective winner determination problem (2WDP-SC) of a combinatorial procurement auction for transport contracts is characterized by a set B of bundle bids, with each bundle bid b in B consisting of a bidding carrier c_b, a bid price p_b, and a set tau_b transport contracts which is a subset of the set T of tendered transport contracts. Additionally, the transport quality q_{t,c_b} is given which is expected to be realized when a transport contract t is executed by a carrier c_b. The task of the auctioneer is to find a set X of winning bids (X subset B), such that each transport contract is part of at least one winning bid, the total procurement costs are minimized, and the total transport quality is maximized. This article presents a metaheuristic approach for the 2WDP-SC which integrates the greedy randomized adaptive search procedure with a two-stage candidate component selection procedure, large neighborhood search, and self-adaptive parameter setting in order to find a competitive set of non-dominated solutions. The heuristic outperforms all existing approaches. For seven small benchmark instances, the heuristic is the sole approach that finds all Pareto-optimal solutions. For 28 out of 30 large instances, none of the existing approaches is able to compute a solution that dominates a solution found by the proposed heuristic.
[ { "version": "v1", "created": "Fri, 20 Jan 2012 17:09:22 GMT" }, { "version": "v2", "created": "Mon, 22 Apr 2013 12:25:42 GMT" } ]
2014-06-10T00:00:00
[ [ "Buer", "Tobias", "" ], [ "Kopfer", "Herbert", "" ] ]
new_dataset
0.993463
1312.1411
Vincent Nimal
Jade Alglave, Daniel Kroening, Vincent Nimal, Daniel Poetzl
Don't sit on the fence: A static analysis approach to automatic fence insertion
19 pages, 19 figures
null
null
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern architectures rely on memory fences to prevent undesired weakenings of memory consistency. As the fences' semantics may be subtle, the automation of their placement is highly desirable. But precise methods for restoring consistency do not scale to deployed systems code. We choose to trade some precision for genuine scalability: our technique is suitable for large code bases. We implement it in our new musketeer tool, and detail experiments on more than 350 executables of packages found in Debian Linux 7.1, e.g. memcached (about 10000 LoC).
[ { "version": "v1", "created": "Thu, 5 Dec 2013 02:11:11 GMT" }, { "version": "v2", "created": "Mon, 9 Jun 2014 17:54:46 GMT" } ]
2014-06-10T00:00:00
[ [ "Alglave", "Jade", "" ], [ "Kroening", "Daniel", "" ], [ "Nimal", "Vincent", "" ], [ "Poetzl", "Daniel", "" ] ]
new_dataset
0.996448
1405.7143
Vimalkumar Jeyakumar
Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim, and David Mazi\`eres
Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility (Extended Version)
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a practical approach to rapidly introduce new dataplane functionality into networks: End-hosts embed tiny programs into packets to actively query and manipulate a network's internal state. We show how this "tiny packet program" (TPP) interface gives end-hosts unprecedented visibility into network behavior, enabling them to work with the network to achieve a common goal. Our design leverages what each component does best: (a) switches forward and execute tiny packet programs (at most 5 instructions) at line rate, and (b) end-hosts perform arbitrary computation on network state, which are easy to evolve. Using a hardware prototype on a NetFPGA, we show our design is feasible, at a reasonable cost. By implementing three different research proposals, we show that TPPs are also useful. And finally, we present an architecture in which they can be made secure.
[ { "version": "v1", "created": "Wed, 28 May 2014 07:22:23 GMT" }, { "version": "v2", "created": "Tue, 3 Jun 2014 08:00:30 GMT" }, { "version": "v3", "created": "Sat, 7 Jun 2014 01:59:56 GMT" } ]
2014-06-10T00:00:00
[ [ "Jeyakumar", "Vimalkumar", "" ], [ "Alizadeh", "Mohammad", "" ], [ "Geng", "Yilong", "" ], [ "Kim", "Changhoon", "" ], [ "Mazières", "David", "" ] ]
new_dataset
0.999512
1406.1794
Anita Bommegowda
Anita B, Beena Sheril, Ramesh B. E
Advanced vehicle safety and content distribution system
4 pages, 2 figures, Published with International Journal of Engineering Trends and Technology (IJETT)
Volume 11 Number 9 - May 2014, IJETT-V11P284
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advanced vehicle content distribution system (ACDS)is complemented by improved network connectivity with Mobile Network 3G, 4G network. Advanced content distribution system uses Access Points deployed along roadside. APs co-ordinate and collaborate to distribute content to vehicles in mobility. The infrastructure of deployed APs solves real time issues like predicting errors in movement, limited information shared to vehicles on movement due to limited resources. The advances vehicle content distribution system structures APs in to form a map which is considering the vehicle contact pattern which is analyzed by APs. The system is more effective by optimizing the network consumption by sharing prefectched data between APs. The process depends on APs storage, bandwidth and load on the origin APs which is connected to internet. With the features Advanced System to distribute the content the system takes care of improving road safety, delivery accuracy and important content distribution.
[ { "version": "v1", "created": "Sat, 7 Jun 2014 09:06:33 GMT" } ]
2014-06-10T00:00:00
[ [ "B", "Anita", "" ], [ "Sheril", "Beena", "" ], [ "E", "Ramesh B.", "" ] ]
new_dataset
0.99837
1406.1848
Bocong Chen
Bocong Chen, Hai Q. Dinh, Hongwei Liu
Repeated-root constacyclic codes of length $2\ell^mp^n$
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For any different odd primes $\ell$ and $p$, structure of constacyclic codes of length $2\ell^mp^n$ over a finite field $\mathbb F_q$ of characteritic $p$ and their duals is established in term of their generator polynomials. Among other results, all linear complimentary dual and self-dual constacyclic codes of length $2\ell^mp^n$ over $\mathbb F_q$ are obtained.
[ { "version": "v1", "created": "Sat, 7 Jun 2014 02:04:50 GMT" } ]
2014-06-10T00:00:00
[ [ "Chen", "Bocong", "" ], [ "Dinh", "Hai Q.", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.999412
1406.1886
Raul Rojas Prof.
Raul Rojas
The Z1: Architecture and Algorithms of Konrad Zuse's First Computer
24 pages, 20 figures
null
null
DCIS-14-1
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides the first comprehensive description of the Z1, the mechanical computer built by the German inventor Konrad Zuse in Berlin from 1936 to 1938. The paper describes the main structural elements of the machine, the high-level architecture, and the dataflow between components. The computer could perform the four basic arithmetic operations using floating-point numbers. Instructions were read from punched tape. A program consisted of a sequence of arithmetical operations, intermixed with memory store and load instructions, interrupted possibly by input and output operations. Numbers were stored in a mechanical memory. The machine did not include conditional branching in the instruction set. While the architecture of the Z1 is similar to the relay computer Zuse finished in 1941 (the Z3) there are some significant differences. The Z1 implements operations as sequences of microinstructions, as in the Z3, but does not use rotary switches as micro-steppers. The Z1 uses a digital incrementer and a set of conditions which are translated into microinstructions for the exponent and mantissa units, as well as for the memory blocks. Microinstructions select one out of 12 layers in a machine with a 3D mechanical structure of binary mechanical elements. The exception circuits for mantissa zero, necessary for normalized floating-point, were lacking; they were first implemented in the Z3. The information for this article was extracted from careful study of the blueprints drawn by Zuse for the reconstruction of the Z1 for the German Technology Museum in Berlin, from some letters, and from sketches in notebooks. Although the machine has been in exhibition since 1989 (non-operational), no detailed high-level description of the machine's architecture had been available. This paper fills that gap.
[ { "version": "v1", "created": "Sat, 7 Jun 2014 11:23:31 GMT" } ]
2014-06-10T00:00:00
[ [ "Rojas", "Raul", "" ] ]
new_dataset
0.998033
1406.1998
Paolo Missier
Paolo Missier and Jeremy Bryans and Carl Gamble and Vasa Curcin and Roxana Danger
ProvAbs: model, policy, and tooling for abstracting PROV graphs
In Procs. IPAW 2014 (Provenance and Annotations). Koln, Germany: Springer, 2014
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Provenance metadata can be valuable in data sharing settings, where it can be used to help data consumers form judgements regarding the reliability of the data produced by third parties. However, some parts of provenance may be sensitive, requiring access control, or they may need to be simplified for the intended audience. Both these issues can be addressed by a single mechanism for creating abstractions over provenance, coupled with a policy model to drive the abstraction. Such mechanism, which we refer to as abstraction by grouping, simultaneously achieves partial disclosure of provenance, and facilitates its consumption. In this paper we introduce a formal foundation for this type of abstraction, grounded in the W3C PROV model; describe the associated policy model; and briefly present its implementation, the Provabs tool for interactive experimentation with policies and abstractions.
[ { "version": "v1", "created": "Sun, 8 Jun 2014 16:26:53 GMT" } ]
2014-06-10T00:00:00
[ [ "Missier", "Paolo", "" ], [ "Bryans", "Jeremy", "" ], [ "Gamble", "Carl", "" ], [ "Curcin", "Vasa", "" ], [ "Danger", "Roxana", "" ] ]
new_dataset
0.95391
1406.2015
Kalyan Veeramachaneni
Kalyan Veeramachaneni, Sherif Halawa, Franck Dernoncourt, Una-May O'Reilly, Colin Taylor, Chuong Do
MOOCdb: Developing Standards and Systems to Support MOOC Data Science
null
null
null
null
cs.IR cs.CY cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a shared data model for enabling data science in Massive Open Online Courses (MOOCs). The model captures students interactions with the online platform. The data model is platform agnostic and is based on some basic core actions that students take on an online learning platform. Students usually interact with the platform in four different modes: Observing, Submitting, Collaborating and giving feedback. In observing mode students are simply browsing the online platform, watching videos, reading material, reading book or watching forums. In submitting mode, students submit information to the platform. This includes submissions towards quizzes, homeworks, or any assessment modules. In collaborating mode students interact with other students or instructors on forums, collaboratively editing wiki or chatting on google hangout or other hangout venues. With this basic definitions of activities, and a data model to store events pertaining to these activities, we then create a common terminology to map Coursera and edX data into this shared data model. This shared data model called MOOCdb becomes the foundation for a number of collaborative frameworks that enable progress in data science without the need to share the data.
[ { "version": "v1", "created": "Sun, 8 Jun 2014 19:19:45 GMT" } ]
2014-06-10T00:00:00
[ [ "Veeramachaneni", "Kalyan", "" ], [ "Halawa", "Sherif", "" ], [ "Dernoncourt", "Franck", "" ], [ "O'Reilly", "Una-May", "" ], [ "Taylor", "Colin", "" ], [ "Do", "Chuong", "" ] ]
new_dataset
0.993817
1406.2021
James Whiting
James G.H. Whiting, Ben P.J. de Lacy Costello and Andrew Adamatzky
Slime Mould Logic Gates Based on Frequency Changes of Electrical Potential Oscillation
10 Pages, 3 Figures, 4 Tables
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physarum polycephalum is a large single amoeba cell, which in its plasmodial phase,forages and connects nearby food sources with protoplasmic tubes. The organism forages for food by growing these tubes towards detected food stuffs, this foraging behaviour is governed by simple rules of photoavoidance and chemotaxis. The electrical activity of the tubes oscillates, creating a peristaltic like action within the tubes, forcing cytoplasm along the lumen; the frequency of this oscillation controls the speed and direction of growth. External stimuli such as light and food cause changes in the oscillation frequency. We demonstrate that using these stimuli as logical inputs we can approximate logic gates using these tubes and derive combinational logic circuits by cascading the gates, with software analysis providing the output of each gate and determining the input of the following gate. Basic gates OR, AND and NOT were correct 90%, 77.8% and 91.7% of the time respectively. Derived logic circuits XOR, Half Adder and Full Adder were 70.8%, 65% and 58.8% accurate respectively. Accuracy of the combinational logic decreases as the number of gates is increased, however they are at least as accurate as previous logic approximations using spatial growth of Physarum polycephalum and up to 30 times as fast at computing the logical output. The results shown here demonstrate a significant advancement in organism-based computing, providing a solid basis for hybrid computers of the future.
[ { "version": "v1", "created": "Sun, 8 Jun 2014 19:54:01 GMT" } ]
2014-06-10T00:00:00
[ [ "Whiting", "James G. H.", "" ], [ "Costello", "Ben P. J. de Lacy", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999596
1406.2023
Gian Luca Pozzato
Laura Giordano, Valentina Gliozzi, Nicola Olivetti, Gian Luca Pozzato
Rational Closure in SHIQ
30 pages, extended version of paper accepted to DL2014
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a notion of rational closure for the logic SHIQ, which does not enjoys the finite model property, building on the notion of rational closure introduced by Lehmann and Magidor in [23]. We provide a semantic characterization of rational closure in SHIQ in terms of a preferential semantics, based on a finite rank characterization of minimal models. We show that the rational closure of a TBox can be computed in EXPTIME using entailment in SHIQ.
[ { "version": "v1", "created": "Sun, 8 Jun 2014 20:16:30 GMT" } ]
2014-06-10T00:00:00
[ [ "Giordano", "Laura", "" ], [ "Gliozzi", "Valentina", "" ], [ "Olivetti", "Nicola", "" ], [ "Pozzato", "Gian Luca", "" ] ]
new_dataset
0.997452
1406.2060
EPTCS
Michael Hicks (University of Maryland, College Park), Gavin Bierman (Microsoft Research), Nataliya Guts (University of Maryland, College Park), Daan Leijen (Microsoft Research), Nikhil Swamy (Microsoft Research)
Polymonadic Programming
In Proceedings MSFP 2014, arXiv:1406.1534
EPTCS 153, 2014, pp. 79-99
10.4204/EPTCS.153.7
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monads are a popular tool for the working functional programmer to structure effectful computations. This paper presents polymonads, a generalization of monads. Polymonads give the familiar monadic bind the more general type forall a,b. L a -> (a -> M b) -> N b, to compose computations with three different kinds of effects, rather than just one. Polymonads subsume monads and parameterized monads, and can express other constructions, including precise type-and-effect systems and information flow tracking; more generally, polymonads correspond to Tate's productoid semantic model. We show how to equip a core language (called lambda-PM) with syntactic support for programming with polymonads. Type inference and elaboration in lambda-PM allows programmers to write polymonadic code directly in an ML-like syntax--our algorithms compute principal types and produce elaborated programs wherein the binds appear explicitly. Furthermore, we prove that the elaboration is coherent: no matter which (type-correct) binds are chosen, the elaborated program's semantics will be the same. Pleasingly, the inferred types are easy to read: the polymonad laws justify (sometimes dramatic) simplifications, but with no effect on a type's generality.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 03:30:05 GMT" } ]
2014-06-10T00:00:00
[ [ "Hicks", "Michael", "", "University of Maryland, College Park" ], [ "Bierman", "Gavin", "", "Microsoft Research" ], [ "Guts", "Nataliya", "", "University of Maryland, College Park" ], [ "Leijen", "Daan", "", "Microsoft Research" ], [ "Swamy", "Nikhil", "", "Microsoft Research" ] ]
new_dataset
0.997635
1406.2068
EPTCS
Bettina Braitling, Luis Mar\'ia Ferrer Fioriti, Hassan Hatefi, Ralf Wimmer, Bernd Becker, Holger Hermanns
MeGARA: Menu-based Game Abstraction and Abstraction Refinement of Markov Automata
In Proceedings QAPL 2014, arXiv:1406.1567
EPTCS 154, 2014, pp. 48-63
10.4204/EPTCS.154.4
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Markov automata combine continuous time, probabilistic transitions, and nondeterminism in a single model. They represent an important and powerful way to model a wide range of complex real-life systems. However, such models tend to be large and difficult to handle, making abstraction and abstraction refinement necessary. In this paper we present an abstraction and abstraction refinement technique for Markov automata, based on the game-based and menu-based abstraction of probabilistic automata. First experiments show that a significant reduction in size is possible using abstraction.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 03:48:05 GMT" } ]
2014-06-10T00:00:00
[ [ "Braitling", "Bettina", "" ], [ "Fioriti", "Luis María Ferrer", "" ], [ "Hatefi", "Hassan", "" ], [ "Wimmer", "Ralf", "" ], [ "Becker", "Bernd", "" ], [ "Hermanns", "Holger", "" ] ]
new_dataset
0.995541
1406.2096
Paul Brillant Feuto Njonko
Paul Brillant Feuto Njonko, Sylviane Cardey, Peter Greenfield, and Walid El Abed
RuleCNL: A Controlled Natural Language for Business Rule Specifications
12 pages, 7 figures, Fourth Workshop on Controlled Natural Language (CNL 2014) Proceedings
null
null
null
cs.SE cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Business rules represent the primary means by which companies define their business, perform their actions in order to reach their objectives. Thus, they need to be expressed unambiguously to avoid inconsistencies between business stakeholders and formally in order to be machine-processed. A promising solution is the use of a controlled natural language (CNL) which is a good mediator between natural and formal languages. This paper presents RuleCNL, which is a CNL for defining business rules. Its core feature is the alignment of the business rule definition with the business vocabulary which ensures traceability and consistency with the business domain. The RuleCNL tool provides editors that assist end-users in the writing process and automatic mappings into the Semantics of Business Vocabulary and Business Rules (SBVR) standard. SBVR is grounded in first order logic and includes constructs called semantic formulations that structure the meaning of rules.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 07:19:53 GMT" } ]
2014-06-10T00:00:00
[ [ "Njonko", "Paul Brillant Feuto", "" ], [ "Cardey", "Sylviane", "" ], [ "Greenfield", "Peter", "" ], [ "Abed", "Walid El", "" ] ]
new_dataset
0.998523
1406.2103
James Hales
Tim French, James Hales and Edwin Tay
A composable language for action models
Extended version of a paper to appear in the 10th International Conference on Advances in Modal Logic (AiML)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Action models are semantic structures similar to Kripke models that represent a change in knowledge in an epistemic setting. Whereas the language of action model logic embeds the semantic structure of an action model directly within the language, this paper introduces a language that represents action models using syntactic operators inspired by relational actions. This language admits an intuitive description of the action models it represents, and we show in several settings that it is sufficient to represent any action model up to a given modal depth and to represent the results of action model synthesis, and give a sound and complete axiomatisation in some of these settings.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 08:12:07 GMT" } ]
2014-06-10T00:00:00
[ [ "French", "Tim", "" ], [ "Hales", "James", "" ], [ "Tay", "Edwin", "" ] ]
new_dataset
0.993135
1406.2110
Marc Bagnol
Cl\'ement Aubert, Marc Bagnol, Paolo Pistone, Thomas Seiller
Logic Programming and Logarithmic Space
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present an algebraic view on logic programming, related to proof theory and more specifically linear logic and geometry of interaction. Within this construction, a characterization of logspace (deterministic and non-deterministic) computation is given via a synctactic restriction, using an encoding of words that derives from proof theory. We show that the acceptance of a word by an observation (the counterpart of a program in the encoding) can be decided within logarithmic space, by reducing this problem to the acyclicity of a graph. We show moreover that observations are as expressive as two-ways multi-heads finite automata, a kind of pointer machines that is a standard model of logarithmic space computation.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 08:58:59 GMT" } ]
2014-06-10T00:00:00
[ [ "Aubert", "Clément", "" ], [ "Bagnol", "Marc", "" ], [ "Pistone", "Paolo", "" ], [ "Seiller", "Thomas", "" ] ]
new_dataset
0.987603
1406.2125
Remy Haemmerle
Falco Nogatz and Thom Fr\"uhwirth
From XML Schema to JSON Schema: Translation with CHR
Part of CHR 2014 proceedings (arXiv:1406.1510)
null
null
CHR/2014/2
cs.DB cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite its rising popularity as data format especially for web services, the software ecosystem around the JavaScript Object Notation (JSON) is not as widely distributed as that of XML. For both data formats there exist schema languages to specify the structure of instance documents, but there is currently no opportunity to translate already existing XML Schema documents into equivalent JSON Schemas. In this paper we introduce an implementation of a language translator. It takes an XML Schema and creates its equivalent JSON Schema document. Our approach is based on Prolog and CHR. By unfolding the XML Schema document into CHR constraints, it is possible to specify the concrete translation rules in a declarative way.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 10:33:41 GMT" } ]
2014-06-10T00:00:00
[ [ "Nogatz", "Falco", "" ], [ "Frühwirth", "Thom", "" ] ]
new_dataset
0.998662
1406.2161
Tiago de Lima
Tiago de Lima and Andreas Herzig
Tableaux for Dynamic Logic of Propositional Assignments
20 pages
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Dynamic Logic for Propositional Assignments (DL-PA) has recently been studied as an alternative to Propositional Dynamic Logic (PDL). In DL-PA, the abstract atomic programs of PDL are replaced by assignments of propositional variables to truth values. This makes DL-PA enjoy some interesting meta-logical properties that PDL does not, such as eliminability of the Kleene star, compactness and interpolation. We define and analytic tableaux calculus for DL-PA and show that it matches the known complexity results.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 12:54:41 GMT" } ]
2014-06-10T00:00:00
[ [ "de Lima", "Tiago", "" ], [ "Herzig", "Andreas", "" ] ]
new_dataset
0.998359
1406.2204
Sandra Williams
Sandra Williams, Richard Power and Allan Third
How Easy is it to Learn a Controlled Natural Language for Building a Knowledge Base?
CNL 2014 : Fourth Workshop on Controlled Natural Language
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent developments in controlled natural language editors for knowledge engineering (KE) have given rise to expectations that they will make KE tasks more accessible and perhaps even enable non-engineers to build knowledge bases. This exploratory research focussed on novices and experts in knowledge engineering during their attempts to learn a controlled natural language (CNL) known as OWL Simplified English and use it to build a small knowledge base. Participants' behaviours during the task were observed through eye-tracking and screen recordings. This was an attempt at a more ambitious user study than in previous research because we used a naturally occurring text as the source of domain knowledge, and left them without guidance on which information to select, or how to encode it. We have identified a number of skills (competencies) required for this difficult task and key problems that authors face.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 14:54:22 GMT" } ]
2014-06-10T00:00:00
[ [ "Williams", "Sandra", "" ], [ "Power", "Richard", "" ], [ "Third", "Allan", "" ] ]
new_dataset
0.997898
1406.2285
Navya Chodisetti
Navya Chodisetti
A Piggybank Protocol for Quantum Cryptography
6 pages, 2 figures, 1 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to use two communications: one with the encrypted message, and the other regarding the encryption transformation which the receiver must decipher first. In the quantum mechanical version of the protocol, the encrypting unitary transformation information is sent separately but just deciphering it is not enough to break the system. The proposed quantum protocol consists of two stages.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 19:07:01 GMT" } ]
2014-06-10T00:00:00
[ [ "Chodisetti", "Navya", "" ] ]
new_dataset
0.998173
1406.2294
John Lamping
John Lamping, Eric Veach
A Fast, Minimal Memory, Consistent Hash Algorithm
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present jump consistent hash, a fast, minimal memory, consistent hash algorithm that can be expressed in about 5 lines of code. In comparison to the algorithm of Karger et al., jump consistent hash requires no storage, is faster, and does a better job of evenly dividing the key space among the buckets and of evenly dividing the workload when the number of buckets changes. Its main limitation is that the buckets must be numbered sequentially, which makes it more suitable for data storage applications than for distributed web caching.
[ { "version": "v1", "created": "Mon, 9 Jun 2014 19:30:12 GMT" } ]
2014-06-10T00:00:00
[ [ "Lamping", "John", "" ], [ "Veach", "Eric", "" ] ]
new_dataset
0.971213
1404.3034
EPTCS
J\'onathan Heras (School of Computing, University of Dundee, UK), Ekaterina Komendantskaya (School of Computing, University of Dundee, UK)
ACL2(ml): Machine-Learning for ACL2
In Proceedings ACL2 2014, arXiv:1406.1238
EPTCS 152, 2014, pp. 61-75
10.4204/EPTCS.152.5
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ACL2(ml) is an extension for the Emacs interface of ACL2. This tool uses machine-learning to help the ACL2 user during the proof-development. Namely, ACL2(ml) gives hints to the user in the form of families of similar theorems, and generates auxiliary lemmas automatically. In this paper, we present the two most recent extensions for ACL2(ml). First, ACL2(ml) can suggest now families of similar function definitions, in addition to the families of similar theorems. Second, the lemma generation tool implemented in ACL2(ml) has been improved with a method to generate preconditions using the guard mechanism of ACL2. The user of ACL2(ml) can also invoke directly the latter extension to obtain preconditions for his own conjectures.
[ { "version": "v1", "created": "Fri, 11 Apr 2014 08:49:03 GMT" }, { "version": "v2", "created": "Fri, 6 Jun 2014 01:47:42 GMT" } ]
2014-06-09T00:00:00
[ [ "Heras", "Jónathan", "", "School of Computing, University of Dundee, UK" ], [ "Komendantskaya", "Ekaterina", "", "School of Computing, University of Dundee, UK" ] ]
new_dataset
0.993085
1406.1558
EPTCS
Benjamin Selfridge (University of Texas at Austin), Eric Smith (Kestrel Institute)
Polymorphic Types in ACL2
In Proceedings ACL2 2014, arXiv:1406.1238
EPTCS 152, 2014, pp. 49-59
10.4204/EPTCS.152.4
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a tool suite for the ACL2 programming language which incorporates certain ideas from the Hindley-Milner paradigm of functional programming (as exemplified in popular languages like ML and Haskell), including a "typed" style of programming with the ability to define polymorphic types. These ideas are introduced via macros into the language of ACL2, taking advantage of ACL2's guard-checking mechanism to perform type checking on both function definitions and theorems. Finally, we discuss how these macros were used to implement features of Specware, a software specification and implementation system.
[ { "version": "v1", "created": "Fri, 6 Jun 2014 01:47:31 GMT" } ]
2014-06-09T00:00:00
[ [ "Selfridge", "Benjamin", "", "University of Texas at Austin" ], [ "Smith", "Eric", "", "Kestrel Institute" ] ]
new_dataset
0.990737