id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1308.2903
|
Markus Miettinen
|
Markus Miettinen and Stephan Heuser and Wiebke Kronz and Ahmad-Reza
Sadeghi and N. Asokan
|
ConXsense - Automated Context Classification for Context-Aware Access
Control
|
Recipient of the Best Paper Award
|
Proceedings of the 9th ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2014), pp. 293-304, June 4-6, Kyoto, Japan,
ACM, 2014
|
10.1145/2590296.2590337
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present ConXsense, the first framework for context-aware access control on
mobile devices based on context classification. Previous context-aware access
control systems often require users to laboriously specify detailed policies or
they rely on pre-defined policies not adequately reflecting the true
preferences of users. We present the design and implementation of a
context-aware framework that uses a probabilistic approach to overcome these
deficiencies. The framework utilizes context sensing and machine learning to
automatically classify contexts according to their security and privacy-related
properties. We apply the framework to two important smartphone-related use
cases: protection against device misuse using a dynamic device lock and
protection against sensory malware. We ground our analysis on a sociological
survey examining the perceptions and concerns of users related to contextual
smartphone security and analyze the effectiveness of our approach with
real-world context data. We also demonstrate the integration of our framework
with the FlaskDroid architecture for fine-grained access control enforcement on
the Android platform.
|
[
{
"version": "v1",
"created": "Tue, 13 Aug 2013 15:57:51 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Jun 2014 15:36:00 GMT"
}
] | 2014-06-06T00:00:00 |
[
[
"Miettinen",
"Markus",
""
],
[
"Heuser",
"Stephan",
""
],
[
"Kronz",
"Wiebke",
""
],
[
"Sadeghi",
"Ahmad-Reza",
""
],
[
"Asokan",
"N.",
""
]
] |
new_dataset
| 0.970985 |
1406.1224
|
Xuhui Li
|
Xuhui Li, Mengchi Liu, Shanfeng Zhu, Arif Ghafoor
|
XTQ: A Declarative Functional XML Query Language
|
65 pages
| null | null | null |
cs.PL cs.DB
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Various query languages have been proposed to extract and restructure
information in XML documents. These languages, usually claiming to be
declarative, mainly consider the conjunctive relationships among data elements.
In order to present the operations where the hierarchical and the disjunctive
relationships need to be considered, such as restructuring hierarchy and
handling heterogeneity, the programs in these languages often exhibit a
procedural style and thus the declarativeness in them is not so prominent as in
conventional query languages like SQL.
In this paper, we propose a declarative pattern-based functional XML query
language named XML Tree Query (XTQ). XTQ adopts expressive composite patterns
to present data extraction, meanwhile establishing the conjunctive, the
disjunctive and the hierarchical relationships among data elements. It uses the
matching terms, a composite structure of the variables bound to the matched
data elements, to present a global sketch of the extracted data, and develops a
deductive restructuring mechanism of matching terms to indicate data
transformation, especially for restructuring hierarchy and handling
heterogeneity. Based on matching terms, XTQ employs a coherent approach to
function declaration and invocation to consistently extract and construct
composite data structure, which integrates features of conventional functional
languages and pattern-based query languages. Additionally, XTQ also supports
data filtering on composite data structure such as hierarchical data, which is
seldom deliberately considered in other studies. We demonstrate with various
examples that XTQ can declaratively present complex XML queries which are
common in practice.
|
[
{
"version": "v1",
"created": "Wed, 4 Jun 2014 22:03:20 GMT"
}
] | 2014-06-06T00:00:00 |
[
[
"Li",
"Xuhui",
""
],
[
"Liu",
"Mengchi",
""
],
[
"Zhu",
"Shanfeng",
""
],
[
"Ghafoor",
"Arif",
""
]
] |
new_dataset
| 0.991827 |
1406.1238
|
EPTCS
|
Freek Verbeek (Open University of The Netherlands), Julien Schmaltz
(Eindhoven University of Technology)
|
Proceedings Twelfth International Workshop on the ACL2 Theorem Prover
and its Applications
| null |
EPTCS 152, 2014
|
10.4204/EPTCS.152
| null |
cs.LO cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the Twelfth International Workshop on
the ACL2 Theorem Prover and Its Applications, ACL2'14, a two-day workshop held
in Vienna, Austria, on July 12-13, 2014. ACL2 workshops occur at approximately
18-month intervals and provide a major technical forum for researchers to
present and discuss improvements and extensions to the theorem prover,
comparisons of ACL2 with other systems, and applications of ACL2 in formal
verification. These proceedings include 13 peer reviewed technical papers.
ACL2 is a state-of-the-art automated reasoning system that has been
successfully applied in academia, government, and industry for specification
and verification of computing systems and in teaching computer science courses.
In 2005, Boyer, Kaufmann, and Moore were awarded the 2005 ACM Software System
Award for their work in ACL2 and the other theorem provers in the Boyer-Moore
family.
|
[
{
"version": "v1",
"created": "Wed, 4 Jun 2014 23:49:33 GMT"
}
] | 2014-06-06T00:00:00 |
[
[
"Verbeek",
"Freek",
"",
"Open University of The Netherlands"
],
[
"Schmaltz",
"Julien",
"",
"Eindhoven University of Technology"
]
] |
new_dataset
| 0.995375 |
1406.1281
|
Bahattin Yildiz
|
Nesibe Tufekci and Bahattin Yildiz
|
On codes over R_{k,m} and constructions for new binary self-dual codes
|
17 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we study codes over the ring
R_{k,m}=F_2[u,v]/<u^{k},v^{m},uv-vu>, which is a family of Frobenius,
characteristic 2 extensions of the binary field. We introduce a distance and
duality preserving Gray map from R_{k,m} to F_2^{km} together with a Lee
weight. After proving the MacWilliams identities for codes over R_{k,m} for all
the relevant weight enumerators, we construct many binary self-dual codes as
the Gray images of self-dual codes over R_{k,m}. In addition to many extremal
binary self-dual codes obtained in this way, including a new construction for
the extended binary Golay code, we find 175 new Type I binary self-dual codes
of parameters [72,36,12] and 105 new Type II binary self-dual codes of
parameter [72,36,12].
|
[
{
"version": "v1",
"created": "Thu, 5 Jun 2014 07:16:06 GMT"
}
] | 2014-06-06T00:00:00 |
[
[
"Tufekci",
"Nesibe",
""
],
[
"Yildiz",
"Bahattin",
""
]
] |
new_dataset
| 0.995423 |
1406.1423
|
Joshua Amavi
|
Joshua Amavi, Jacques Chabin, Mirian Halfeld Ferrari, Pierre R\'ety
|
A ToolBox for Conservative XML Schema Evolution and Document Adaptation
|
15 pages, DEXA'14
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper proposes a set of tools to help dealing with XML database
evolution. It aims at establishing a multi-system environment where a global
integrated system works in harmony with some local original ones, allowing data
translation in both directions and, thus, activities on both levels. To deal
with schemas, we propose an algorithm that computes a mapping capable of
obtaining a global schema which is a conservative extension of original local
schemas. The role of the obtained mapping is then twofold: it ensures schema
evolution, via composition and inversion, and it guides the construction of a
document translator, allowing automatic data adaptation w.r.t. type evolution.
This paper applies, extends and put together some of our previous
contributions.
|
[
{
"version": "v1",
"created": "Thu, 5 Jun 2014 15:59:42 GMT"
}
] | 2014-06-06T00:00:00 |
[
[
"Amavi",
"Joshua",
""
],
[
"Chabin",
"Jacques",
""
],
[
"Ferrari",
"Mirian Halfeld",
""
],
[
"Réty",
"Pierre",
""
]
] |
new_dataset
| 0.973585 |
1406.0975
|
George Fragulis
|
Ioannis A. Skordas, George F. Fragulis and Athanassios G.
Triantafyllou
|
A.Q.M.E.I.S.: Air Quality Meteorological and Enviromental Information
System in Western Macedonia, Hellas
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An operational monitoring, as well as high resolution local-scale
meteorological and air quality forecasting information system for Western
Macedonia, Hellas, has been developed and is operated by the Laboratory of
Atmospheric Pollution and Environmental Physics / TEI Western Macedonia since
2002, continuously improved. In this paper the novelty of information system is
presented, in a dynamic, easily accessible and user-friendly manner. It
consists of a structured system that users have access to and they can
manipulate thoroughly, as well as of a system for accessing and managing
results of measurements in a direct and dynamic way. It provides updates about
the weather and pollution forecast for the next few days (based on current day
information) in Western Macedonia. These forecasts are displayed through
dynamic-interactive web charts and the visual illustration of the atmospheric
pollution of the region in a map using images and animation images.
|
[
{
"version": "v1",
"created": "Wed, 4 Jun 2014 08:42:35 GMT"
}
] | 2014-06-05T00:00:00 |
[
[
"Skordas",
"Ioannis A.",
""
],
[
"Fragulis",
"George F.",
""
],
[
"Triantafyllou",
"Athanassios G.",
""
]
] |
new_dataset
| 0.986714 |
1406.1055
|
Patrick Sol\'e
|
Lin Sok, Patrick Sol\'e, Aslan Tchamkerten
|
Lattice Codes for the Binary Deletion Channel
|
2 figs; presented in part in ISIT 2013; submitted to IEEE trans. on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The construction of deletion codes for the Levenshtein metric is reduced to
the construction of codes over the integers for the Manhattan metric by run
length coding. The latter codes are constructed by expurgation of translates of
lattices. These lattices, in turn, are obtained from Construction~A applied to
binary codes and $\Z_4-$codes. A lower bound on the size of our codes for the
Manhattan distance are obtained through generalized theta series of the
corresponding lattices.
|
[
{
"version": "v1",
"created": "Wed, 4 Jun 2014 14:26:47 GMT"
}
] | 2014-06-05T00:00:00 |
[
[
"Sok",
"Lin",
""
],
[
"Solé",
"Patrick",
""
],
[
"Tchamkerten",
"Aslan",
""
]
] |
new_dataset
| 0.99971 |
1004.1672
|
Yixin Cao
|
Yixin Cao, Jianer Chen, and Yang Liu
|
On Feedback Vertex Set: New Measure and New Structures
|
Final version, to appear in Algorithmica
| null |
10.1007/s00453-014-9904-6
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new parameterized algorithm for the {feedback vertex set}
problem ({\sc fvs}) on undirected graphs. We approach the problem by
considering a variation of it, the {disjoint feedback vertex set} problem ({\sc
disjoint-fvs}), which finds a feedback vertex set of size $k$ that has no
overlap with a given feedback vertex set $F$ of the graph $G$. We develop an
improved kernelization algorithm for {\sc disjoint-fvs} and show that {\sc
disjoint-fvs} can be solved in polynomial time when all vertices in $G
\setminus F$ have degrees upper bounded by three. We then propose a new
branch-and-search process on {\sc disjoint-fvs}, and introduce a new
branch-and-search measure. The process effectively reduces a given graph to a
graph on which {\sc disjoint-fvs} becomes polynomial-time solvable, and the new
measure more accurately evaluates the efficiency of the process. These
algorithmic and combinatorial studies enable us to develop an
$O^*(3.83^k)$-time parameterized algorithm for the general {\sc fvs} problem,
improving all previous algorithms for the problem.
|
[
{
"version": "v1",
"created": "Sat, 10 Apr 2010 03:05:53 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jun 2014 21:29:33 GMT"
}
] | 2014-06-04T00:00:00 |
[
[
"Cao",
"Yixin",
""
],
[
"Chen",
"Jianer",
""
],
[
"Liu",
"Yang",
""
]
] |
new_dataset
| 0.990228 |
1206.0956
|
Eirik Rosnes
|
Nicolas Bitouz\'e, Alexandre Graell i Amat, and Eirik Rosnes
|
Using Short Synchronous WOM Codes to Make WOM Codes Decodable
|
To appear in IEEE Transactions on Communications. The material in
this paper was presented in part at the 2012 IEEE International Symposium on
Information Theory, Cambridge, MA, July 2012
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the framework of write-once memory (WOM) codes, it is important to
distinguish between codes that can be decoded directly and those that require
that the decoder knows the current generation to successfully decode the state
of the memory. A widely used approach to construct WOM codes is to design first
nondecodable codes that approach the boundaries of the capacity region, and
then make them decodable by appending additional cells that store the current
generation, at an expense of a rate loss. In this paper, we propose an
alternative method to make nondecodable WOM codes decodable by appending cells
that also store some additional data. The key idea is to append to the original
(nondecodable) code a short synchronous WOM code and write generations of the
original code and of the synchronous code simultaneously. We consider both the
binary and the nonbinary case. Furthermore, we propose a construction of
synchronous WOM codes, which are then used to make nondecodable codes
decodable. For short-to-moderate block lengths, the proposed method
significantly reduces the rate loss as compared to the standard method.
|
[
{
"version": "v1",
"created": "Tue, 5 Jun 2012 15:14:24 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Nov 2013 09:18:44 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Mar 2014 14:37:26 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Jun 2014 11:36:32 GMT"
}
] | 2014-06-04T00:00:00 |
[
[
"Bitouzé",
"Nicolas",
""
],
[
"Amat",
"Alexandre Graell i",
""
],
[
"Rosnes",
"Eirik",
""
]
] |
new_dataset
| 0.997971 |
1305.2275
|
Jinho Choi
|
Jinho Choi, Seung Min Yu and Seong-Lyun Kim
|
Spreading Information in Mobile Wireless Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Device-to-device (D2D) communication enables us to spread information in the
local area without infrastructure support. In this paper, we focus on
information spreading in mobile wireless networks where all nodes move around.
The source nodes deliver a given information packet to mobile users using D2D
communication as an underlay to the cellular uplink. By stochastic geometry, we
derive the average number of nodes that have successfully received a given
information packet as a function of the transmission power and the number of
transmissions. Based on these results, we formulate a redundancy minimization
problem under the maximum transmission power and delay constraints. By solving
the problem, we provide an optimal rule for the transmission power of the
source node.
|
[
{
"version": "v1",
"created": "Fri, 10 May 2013 07:56:37 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Aug 2013 07:46:54 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Oct 2013 06:20:17 GMT"
},
{
"version": "v4",
"created": "Wed, 7 May 2014 05:47:36 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Jun 2014 08:15:08 GMT"
}
] | 2014-06-04T00:00:00 |
[
[
"Choi",
"Jinho",
""
],
[
"Yu",
"Seung Min",
""
],
[
"Kim",
"Seong-Lyun",
""
]
] |
new_dataset
| 0.991565 |
1406.0532
|
Gon\c{c}alo Silva
|
Gon\c{c}alo Amaral da Silva
|
Multimodal vs. Unimodal Physiological Control in Videogames for Enhanced
Realism and Depth
|
MSc Thesis, English-written, 89 pages, University of Porto
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(arXiv abridged abstract) In the last two decades, videogames have evolved in
a nearly explosive way from the pixelated graphics to today's near-realistic 3D
environments. The interaction devices traditionally used in videogames have not
evolved with the same intensity, but recent HCI studies have explored
biofeedback interaction - the explicit manipulation of a person's physiological
data as input to a system - as an alternative to them. Traditional biofeedback
prototypes apply 1 sensor to each game mechanic (unimodality).
In this dissertation, we introduce the combination of 2 physiological sensors
simultaneously per game mechanic (multimodality) and present a First-Person
Shooter game comprised of 8 game mechanics with three interaction flavours (no
biofeedback/vanilla, unimodal and multimodal). An empirical study with 32
regular players was employed to explore and study differences between the three
interaction types and where they can be best employed.
Players compared the three games in terms of Fun, Ease of Use, Originality,
Playability and Favourite Condition. For the sake of completeness, other
evaluation methods were used as well: IMI Questionnaire, keywords association
and open-ended commentaries. The vanilla version was considered easier to use,
but both biofeedback versions were considered the most fun. Both versions were
praised differently: the unimodal version for its simplicity of use, and the
multimodal for its realism, activation safety of game mechanics and depth added
to the game. Our conclusion is that multimodal biofeedback can have a relevant
impact in terms of added depth, depending on the way it is used inside the
game. On a boundary case, it can be used to increase the feeling of empowerment
on the player when using certain abilities, or to intentionally make in-game
actions more difficult by demanding more physical effort from the player.
|
[
{
"version": "v1",
"created": "Mon, 2 Jun 2014 20:51:11 GMT"
}
] | 2014-06-04T00:00:00 |
[
[
"da Silva",
"Gonçalo Amaral",
""
]
] |
new_dataset
| 0.997852 |
1404.7753
|
Raphael kena Poss
|
Raphael Poss and Sebastian Altmeyer and Mark Thompson and Rob Jelier
|
Aca 2.0: Questions and Answers
|
18 pages, 2 tables, comments, suggestions and further contributions
welcome
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Academia 2.0" is a proposal to organize scientific publishing around true
peer-to-peer distributed dissemination channels and eliminate the traditional
role of the academic publisher. This model will be first presented at the 2014
workshop on Reproducible Research Methodologies and New Publication Models in
Computer Engineering (TRUST'14) in the form of a high-level overview, so as to
stimulate discussion and gather feedback on its merits and feasibility. This
report complements the 6-page introductory article presented at TRUST, by
detailing the review processes, some use scenarios and answering the reviewer's
comments in detail.
|
[
{
"version": "v1",
"created": "Wed, 30 Apr 2014 15:03:02 GMT"
},
{
"version": "v2",
"created": "Sat, 10 May 2014 11:19:09 GMT"
},
{
"version": "v3",
"created": "Tue, 27 May 2014 04:54:00 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Jun 2014 07:11:11 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Poss",
"Raphael",
""
],
[
"Altmeyer",
"Sebastian",
""
],
[
"Thompson",
"Mark",
""
],
[
"Jelier",
"Rob",
""
]
] |
new_dataset
| 0.992517 |
1405.3899
|
Tianxian Zhang
|
Xiang-Gen Xia, Tianxian Zhang, and Lingjiang Kong
|
MIMO OFDM Radar IRCI Free Range Reconstruction with Sufficient Cyclic
Prefix
|
36 pages, 9 figures
| null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper, we propose MIMO OFDM radar with sufficient cyclic prefix (CP),
where all OFDM pulses transmitted from different transmitters share the same
frequency band and are orthogonal to each other for every subcarrier in the
discrete frequency domain. The orthogonality is not affected by time delays
from transmitters. Thus, our proposed MIMO OFDM radar has the same range
resolution as single transmitter radar and achieves full spatial diversity.
Orthogonal designs are used to achieve this orthogonality across the
transmitters, with which it is only needed to design OFDM pulses for the first
transmitter. We also propose a joint pulse compression and pulse coherent
integration for range reconstruction. In order to achieve the optimal SNR for
the range reconstruction, we apply the paraunitary filterbank theory to design
the OFDM pulses. We then propose a modified iterative clipping and filtering
(MICF) algorithm for the designs of OFDM pulses jointly, when other important
factors, such as peak-to-average power ratio (PAPR) in time domain, are also
considered. With our proposed MIMO OFDM radar, there is no interference for the
range reconstruction not only across the transmitters but also across the range
cells in a swath called inter-range-cell interference (IRCI) free that is
similar to our previously proposed CP based OFDM radar for single transmitter.
Simulations are presented to illustrate our proposed theory and show that the
CP based MIMO OFDM radar outperforms the existing frequency-band shared MIMO
radar with polyphase codes and also frequency division MIMO radar.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 16:18:21 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Jun 2014 20:28:42 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Xia",
"Xiang-Gen",
""
],
[
"Zhang",
"Tianxian",
""
],
[
"Kong",
"Lingjiang",
""
]
] |
new_dataset
| 0.999046 |
1406.0043
|
Sam Bayless
|
Sam Bayless, Noah Bayless, Holger H. Hoos, Alan J. Hu
|
SAT Modulo Monotonic Theories
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define the concept of a monotonic theory and show how to build efficient
SMT (SAT Modulo Theory) solvers, including effective theory propagation and
clause learning, for such theories. We present examples showing that monotonic
theories arise from many common problems, e.g., graph properties such as
reachability, shortest paths, connected components, minimum spanning tree, and
max-flow/min-cut, and then demonstrate our framework by building SMT solvers
for each of these theories. We apply these solvers to procedural content
generation problems, demonstrating major speed-ups over state-of-the-art
approaches based on SAT or Answer Set Programming, and easily solving several
instances that were previously impractical to solve.
|
[
{
"version": "v1",
"created": "Sat, 31 May 2014 02:13:31 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Bayless",
"Sam",
""
],
[
"Bayless",
"Noah",
""
],
[
"Hoos",
"Holger H.",
""
],
[
"Hu",
"Alan J.",
""
]
] |
new_dataset
| 0.99755 |
1406.0154
|
Paolo Giulio Franciosa
|
Nicola Apollonio, Massimiliano Caramia, Paolo Giulio Franciosa
|
On the Galois Lattice of Bipartite Distance Hereditary Graphs
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a complete characterization of bipartite graphs having tree-like
Galois lattices. We prove that the poset obtained by deleting bottom and top
elements from the Galois lattice of a bipartite graph is tree-like if and only
if the graph is a Bipartite Distance Hereditary graph. By relying on the
interplay between bipartite distance hereditary graphs and series-parallel
graphs, we show that the lattice can be realized as the containment relation
among directed paths in an arborescence. Moreover, a compact encoding of
Bipartite Distance Hereditary graphs is proposed, that allows optimal time
computation of neighborhood intersections and maximal bicliques.
|
[
{
"version": "v1",
"created": "Sun, 1 Jun 2014 11:02:12 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Apollonio",
"Nicola",
""
],
[
"Caramia",
"Massimiliano",
""
],
[
"Franciosa",
"Paolo Giulio",
""
]
] |
new_dataset
| 0.982617 |
1406.0253
|
Soorajprasad M H
|
M H Soorajprasad, Balapradeep K N, Antony P J
|
VirtuMob : Remote Desktop Virtualization Solution for Smarphones
|
5 Pages, 4 Figures, Published with International Journal of Computer
Trends and Technology (IJCTT). arXiv admin note: text overlap with
arXiv:1310.5850 by other authors without attribution
|
International Journal of Computer Trends and Technology (IJCTT)
V11(4):169-173,May 2014
|
10.14445/22312803/IJCTT-V11P136
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobility is an important attribute in todays computing world. Mobile
devices,smartphone and tablet PC are becoming an integral part of human life
because they are most effective and convenient communication tools. This paper
proposes a system to connect and access the desktops of remote computer systems
using an android based Smartphone. Virtual Network Computing based architecture
is used to develop the proposed system. Through a VirtuMob viewer provided on
the users Smartphone, the user will be able to access and manipulate the
desktops of remote computers. Several functionality such as viewing the
desktop, mouse operations, keyboard operations, manipulation of documents can
be performed from the Smartphone. VirtuMob server should be running on the
remote system and it must be attached to a network. VirtuMob Accelerator is
used to process the RFB frames of the desktop, perform Encoding of the frames
and then relay the frames to the viewer over the internet. Several Encoding
techniques are studied and analysed to determine which is best suited for the
proposed system.
|
[
{
"version": "v1",
"created": "Mon, 2 Jun 2014 06:06:28 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Soorajprasad",
"M H",
""
],
[
"N",
"Balapradeep K",
""
],
[
"J",
"Antony P",
""
]
] |
new_dataset
| 0.996817 |
1406.0256
|
Wiseborn Manfe Danquah
|
Wiseborn Manfe Danquah and Turgay D Altilar
|
HYBRIST Mobility Model- A Novel Hybrid Mobility Model for VANET
Simulations
|
International Journal of Computers Applications. 7 pages paper with
10 figures presents a novel mobility model for VANET simulations which best
suits the fast developing BRT system type of mobility in Vehicular
communications systems
|
IJCA 86(14):15-21, January 2014
|
10.5120/15053-3408
|
IJCA Journal, Volume 86, Number 14 Year of Publication: 2014
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Simulations play a vital role in implementing, testing and validating
proposed algorithms and protocols in VANET. Mobility model, defined as the
movement pattern of vehicles, is one of the main factors that contribute
towards the efficient implementation of VANET algorithms and protocols. Using
near reality mobility models ensure that accurate results are obtained from
simulations. Mobility models that have been proposed and used to implement and
test VANET protocols and algorithms are either the urban mobility model or
highway mobility model. Algorithms and protocols implemented using urban or
highway mobility models may not produce accurate results in hybrid mobility
models without enhancement due to the vast differences in mobility patterns. It
is on this score the Hybrist, a novel hybrid mobility model is proposed. The
realistic mobility pattern trace file of the proposed Hybrist hybrid mobility
model can be imported to VANET simulators such as Veins and network simulators
such as ns2 and Qualnet to simulate VANET algorithms and protocols.
|
[
{
"version": "v1",
"created": "Mon, 2 Jun 2014 06:24:15 GMT"
}
] | 2014-06-03T00:00:00 |
[
[
"Danquah",
"Wiseborn Manfe",
""
],
[
"Altilar",
"Turgay D",
""
]
] |
new_dataset
| 0.998014 |
1304.2612
|
Yu Zhang
|
Leo Yu Zhang and Xiaobo Hu and Yuansheng Liu and Kwok-Wo Wong
|
A chaotic image encryption scheme owning temp-value feedback
|
10 pages, 4 figures
| null |
10.1016/j.cnsns.2014.03.016
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel efficient chaotic image encryption scheme, in
which the temp-value feedback mechanism is introduced to the permutation and
diffusion procedures. Firstly, a simple trick is played to map the plain-image
pixels to the initial condition of the Logistic map. Then, a pseudorandom
number sequence (PRNS) is obtained from iterating the map. The permutation
procedure is carried out by a permutation sequence which is generated by
comparing the PRNS and its sorted version. The diffusion procedure is composed
of two reversely executed rounds. During each round, the current plain-image
pixel and the last cipher-image pixel are used to produce the current
cipher-image pixel with the help of the Logistic map and a pseudorandom number
generated by the Chen system. To enhance the efficiency, only expanded XOR
operation and modulo 256 addition are employed during diffusion. Experimental
results show that the new scheme owns a large key space and can resist the
differential attack. It is also efficient.
|
[
{
"version": "v1",
"created": "Tue, 9 Apr 2013 14:36:15 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jan 2014 14:14:08 GMT"
}
] | 2014-05-30T00:00:00 |
[
[
"Zhang",
"Leo Yu",
""
],
[
"Hu",
"Xiaobo",
""
],
[
"Liu",
"Yuansheng",
""
],
[
"Wong",
"Kwok-Wo",
""
]
] |
new_dataset
| 0.99137 |
1405.7430
|
Ruben Martinez-Cantin
|
Ruben Martinez-Cantin
|
BayesOpt: A Bayesian Optimization Library for Nonlinear Optimization,
Experimental Design and Bandits
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BayesOpt is a library with state-of-the-art Bayesian optimization methods to
solve nonlinear optimization, stochastic bandits or sequential experimental
design problems. Bayesian optimization is sample efficient by building a
posterior distribution to capture the evidence and prior knowledge for the
target function. Built in standard C++, the library is extremely efficient
while being portable and flexible. It includes a common interface for C, C++,
Python, Matlab and Octave.
|
[
{
"version": "v1",
"created": "Thu, 29 May 2014 00:37:28 GMT"
}
] | 2014-05-30T00:00:00 |
[
[
"Martinez-Cantin",
"Ruben",
""
]
] |
new_dataset
| 0.972131 |
1405.7586
|
Marco Baldi
|
Marco Baldi, Nicola Maturo, Eugenio Montali, Franco Chiaraluce
|
AONT-LT: a Data Protection Scheme for Cloud and Cooperative Storage
Systems
|
6 pages, 8 figures, to be presented at the 2014 High Performance
Computing & Simulation Conference (HPCS 2014) - Workshop on Security, Privacy
and Performance in Cloud Computing
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a variant of the well-known AONT-RS scheme for dispersed storage
systems. The novelty consists in replacing the Reed-Solomon code with rateless
Luby transform codes. The resulting system, named AONT-LT, is able to improve
the performance by dispersing the data over an arbitrarily large number of
storage nodes while ensuring limited complexity. The proposed solution is
particularly suitable in the case of cooperative storage systems. It is shown
that while the AONT-RS scheme requires the adoption of fragmentation for
achieving widespread distribution, thus penalizing the performance, the new
AONT-LT scheme can exploit variable length codes which allow to achieve very
good performance and scalability.
|
[
{
"version": "v1",
"created": "Thu, 29 May 2014 15:22:58 GMT"
}
] | 2014-05-30T00:00:00 |
[
[
"Baldi",
"Marco",
""
],
[
"Maturo",
"Nicola",
""
],
[
"Montali",
"Eugenio",
""
],
[
"Chiaraluce",
"Franco",
""
]
] |
new_dataset
| 0.997585 |
1405.7619
|
David B. Wilson
|
David B. Wilson and Uri Zwick
|
A forward-backward single-source shortest paths algorithm
| null | null | null | null |
cs.DS math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a new forward-backward variant of Dijkstra's and Spira's
Single-Source Shortest Paths (SSSP) algorithms. While essentially all SSSP
algorithm only scan edges forward, the new algorithm scans some edges backward.
The new algorithm assumes that edges in the outgoing and incoming adjacency
lists of the vertices appear in non-decreasing order of weight. (Spira's
algorithm makes the same assumption about the outgoing adjacency lists, but
does not use incoming adjacency lists.) The running time of the algorithm on a
complete directed graph on $n$ vertices with independent exponential edge
weights is $O(n)$, with very high probability. This improves on the previously
best result of $O(n\log n)$, which is best possible if only forward scans are
allowed, exhibiting an interesting separation between forward-only and
forward-backward SSSP algorithms. As a consequence, we also get a new all-pairs
shortest paths algorithm. The expected running time of the algorithm on
complete graphs with independent exponential edge weights is $O(n^2)$, matching
a recent algorithm of Demetrescu and Italiano as analyzed by Peres et al.
Furthermore, the probability that the new algorithm requires more than $O(n^2)$
time is exponentially small, improving on the $O(n^{-1/26})$ probability bound
obtained by Peres et al.
|
[
{
"version": "v1",
"created": "Thu, 29 May 2014 17:13:24 GMT"
}
] | 2014-05-30T00:00:00 |
[
[
"Wilson",
"David B.",
""
],
[
"Zwick",
"Uri",
""
]
] |
new_dataset
| 0.976502 |
1405.7135
|
Samir Lemes
|
Samir Leme\v{s}
|
Odr\v{z}avanje ra\v{c}unarskih sistema
|
3. konferencija Odr\v{z}avanje - Maintenance 2014 (S. Brdarevi\'c, S.
Ja\v{s}arevi\'c, editors), ISSN 1986-583X, Zenica
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computer hardware and software are resources without which the modern
business of any organization, from manufacturing to services, is impossible.
Not enough attention is being payed to maintenance of computer systems as an
aspect of business. This paper gives some recommendations for the selection of
the computer systems maintenance approach, based on many years of experience
maintaining these systems at the University of Zenica.
|
[
{
"version": "v1",
"created": "Wed, 28 May 2014 07:01:00 GMT"
}
] | 2014-05-29T00:00:00 |
[
[
"Lemeš",
"Samir",
""
]
] |
new_dataset
| 0.99065 |
1405.7285
|
Ricardo Fernandes
|
Ricardo Q. A. Fernandes, Edward H. Haeusler, Luiz Carlos Pereira
|
PUC-Logic embedding of Lewis' Deontic Logics
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a embedding of Lewis Deontic logics in PUC-Logic. We achieve this
by representing the vary basic $\boldsymbol{CO}$ logic and showing its relative
completeness.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 01:58:00 GMT"
}
] | 2014-05-29T00:00:00 |
[
[
"Fernandes",
"Ricardo Q. A.",
""
],
[
"Haeusler",
"Edward H.",
""
],
[
"Pereira",
"Luiz Carlos",
""
]
] |
new_dataset
| 0.997188 |
1405.6815
|
Uma Gupta
|
Uma Gupta
|
Research On Permanent Magnet BLDC for small electric vehicle
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, different electric motors are studied and compared to see the
benefits of each motor and the one that is more suitable to be used in the
electric vehicle applications. There are five main electric motor types, DC,
induction, permanent magnet synchronous, switched reluctance and brush-less DC
motors are studied.
|
[
{
"version": "v1",
"created": "Tue, 27 May 2014 07:00:56 GMT"
}
] | 2014-05-28T00:00:00 |
[
[
"Gupta",
"Uma",
""
]
] |
new_dataset
| 0.992069 |
1405.6822
|
Hiba Zaidi
|
Hiba Zaidi
|
Mobile Application for GBAS Air Traffic Status Unit
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
At present, the Air Traffic Status Unit is a windows PC based application,
which receives the status of ground based augmentation system station over
Ethernet and displays on the screen. The objective of this project is to
convert the PC based Application into Mobile application using Android OS.
|
[
{
"version": "v1",
"created": "Tue, 27 May 2014 07:26:37 GMT"
}
] | 2014-05-28T00:00:00 |
[
[
"Zaidi",
"Hiba",
""
]
] |
new_dataset
| 0.999359 |
1405.7032
|
Luo Tao
|
Luo Tao and Shi zaifeng
|
An FPGA-based Parallel Architecture for Face Detection using Mixed Color
Models
|
9 pages, 7 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a reliable method for detecting human faces in color images is
proposed. This system firstly detects skin color in YCgCr and YIQ color space,
then filters binary texture and the result is morphological processed, finally
converts skin tone to the preferred skin color configured by users in YIQ color
space. The real-time adjusting circuit is implemented and some of simulation
results are given out. Experimental results demonstrate that the method has
achieved high rates and low false positives, another advantage is its
simplicity and minor computational costs.
|
[
{
"version": "v1",
"created": "Tue, 27 May 2014 19:54:35 GMT"
}
] | 2014-05-28T00:00:00 |
[
[
"Tao",
"Luo",
""
],
[
"zaifeng",
"Shi",
""
]
] |
new_dataset
| 0.991955 |
1206.5333
|
Leon Derczynski
|
Naushad UzZaman, Hector Llorens, James Allen, Leon Derczynski, Marc
Verhagen and James Pustejovsky
|
TempEval-3: Evaluating Events, Time Expressions, and Temporal Relations
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/3.0/
|
We describe the TempEval-3 task which is currently in preparation for the
SemEval-2013 evaluation exercise. The aim of TempEval is to advance research on
temporal information processing. TempEval-3 follows on from previous TempEval
events, incorporating: a three-part task structure covering event, temporal
expression and temporal relation extraction; a larger dataset; and single
overall task quality scores.
|
[
{
"version": "v1",
"created": "Fri, 22 Jun 2012 22:30:44 GMT"
},
{
"version": "v2",
"created": "Sun, 25 May 2014 19:10:12 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"UzZaman",
"Naushad",
""
],
[
"Llorens",
"Hector",
""
],
[
"Allen",
"James",
""
],
[
"Derczynski",
"Leon",
""
],
[
"Verhagen",
"Marc",
""
],
[
"Pustejovsky",
"James",
""
]
] |
new_dataset
| 0.998423 |
1405.1885
|
Tuvi Etzion
|
Antonia Wachter-Zeh and Tuvi Etzion
|
Optimal Ferrers Diagram Rank-Metric Codes
|
to be presented in Algebra, Codes, and Networks, Bordeaux, June 16 -
20, 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Optimal rank-metric codes in Ferrers diagrams are considered. Such codes
consist of matrices having zeros at certain fixed positions and can be used to
construct good codes in the projective space. Four techniques and constructions
of Ferrers diagram rank-metric codes are presented, each providing optimal
codes for different diagrams and parameters.
|
[
{
"version": "v1",
"created": "Thu, 8 May 2014 11:23:42 GMT"
},
{
"version": "v2",
"created": "Sun, 25 May 2014 09:40:46 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Wachter-Zeh",
"Antonia",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.991614 |
1405.5793
|
Swen Jacobs
|
Swen Jacobs
|
Extended AIGER Format for Synthesis
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We extend the AIGER format, as used in HWMCC, to a format that is suitable to
define synthesis problems with safety specifications. We recap the original
format and define one format for posing synthesis problems and one for
solutions of synthesis problems in this setting.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 15:25:15 GMT"
},
{
"version": "v2",
"created": "Mon, 26 May 2014 07:21:40 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Jacobs",
"Swen",
""
]
] |
new_dataset
| 0.994376 |
1405.6200
|
He Li
|
Mianxiong Dong, He Li, Kaoru Ota, Haojin Zhu
|
HVSTO: Efficient Privacy Preserving Hybrid Storage in Cloud Data Center
|
7 pages, 8 figures, in proceeding of The Second International
Workshop on Security and Privacy in Big Data (BigSecurity 2014)
| null | null | null |
cs.DC cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cloud data center, shared storage with good management is a main structure
used for the storage of virtual machines (VM). In this paper, we proposed
Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed
for the virtual machine storage in large-scale cloud data center. Unlike
traditional shared storage, HVSTO adopts a distributed structure to preserve
privacy of virtual machines, which are a threat in traditional centralized
structure. To improve the performance of I/O latency in this distributed
structure, we use a hybrid system to combine solid state disk and distributed
storage. From the evaluation of our demonstration system, HVSTO provides a
scalable and sufficient throughput for the platform as a service
infrastructure.
|
[
{
"version": "v1",
"created": "Fri, 23 May 2014 07:07:59 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Dong",
"Mianxiong",
""
],
[
"Li",
"He",
""
],
[
"Ota",
"Kaoru",
""
],
[
"Zhu",
"Haojin",
""
]
] |
new_dataset
| 0.994555 |
1405.6218
|
Nevin Vunka Jungum
|
Nevin Vunka Jungum, Razvi M. Doomun, Soulakshmee D. Ghurbhurrun,
Sameerchand Pudaruth
|
Collaborative Driving Support System in Mobile Pervasive Environments
|
pp 358-363
|
Nevin Vunka Jungum, R. Doomun, S. D. Ghurbhurrun, S. Pudaruth,
"Collaborative Driving Support System in Mobile Pervasive Environments", The
4th Intl' Conference on Wireless and Mobile Communications, pp 358-363, 2008
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Bluetooth protocol can be used for intervehicle communication equipped
with Bluetooth devices. This work investigates the challenges and feasibility
of developing intelligent driving system providing timesensitive information
about traffic conditions and roadside facilities. The architecture for
collaborative vehicle communication system is presented using the concepts of
wireless networks and Bluetooth protocol. We discuss how vehicles can form
mobile ad-hoc networks and exchange data by the on-board Bluetooth sensors. The
key design concepts of the intelligent driving service infrastructure are
analyzed showing collaborative fusion of multiple positional data could give a
better understanding of the surrounding traffic conditions for collaborative
driving. The technical feasibility of using Bluetooth for data exchange among
moving vehicles is evaluated.
|
[
{
"version": "v1",
"created": "Fri, 9 May 2014 10:41:02 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Jungum",
"Nevin Vunka",
""
],
[
"Doomun",
"Razvi M.",
""
],
[
"Ghurbhurrun",
"Soulakshmee D.",
""
],
[
"Pudaruth",
"Sameerchand",
""
]
] |
new_dataset
| 0.962482 |
1405.6249
|
Shahrouz Sharifi
|
Shahrouz Sharifi, A. Korhan Tanc, Tolga M. Duman
|
On LDPC Codes for Gaussian Interference Channels
|
ISIT 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we focus on the two-user Gaussian interference channel (GIC),
and study the Han-Kobayashi (HK) coding/decoding strategy with the objective of
designing low-density parity-check (LDPC) codes. A code optimization algorithm
is proposed which adopts a random perturbation technique via tracking the
average mutual information. The degree distribution optimization and
convergence threshold computation are carried out for strong and weak
interference channels, employing binary phase-shift keying (BPSK). Under strong
interference, it is observed that optimized codes operate close to the capacity
boundary. For the case of weak interference, it is shown that via the newly
designed codes, a nontrivial rate pair is achievable, which is not attainable
by single user codes with time-sharing. Performance of the designed LDPC codes
are also studied for finite block lengths through simulations of specific codes
picked from the optimized degree distributions.
|
[
{
"version": "v1",
"created": "Sat, 24 May 2014 00:44:46 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Sharifi",
"Shahrouz",
""
],
[
"Tanc",
"A. Korhan",
""
],
[
"Duman",
"Tolga M.",
""
]
] |
new_dataset
| 0.95737 |
1405.6539
|
Paridhi Jain
|
Paridhi Jain and Ponnurangam Kumaraguru
|
@I to @Me: An Anatomy of Username Changing Behavior on Twitter
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An identity of a user on an online social network (OSN) is defined by her
profile, content and network attributes. OSNs allow users to change their
online attributes with time, to reflect changes in their real-life. Temporal
changes in users' content and network attributes have been well studied in
literature, however little research has explored temporal changes in profile
attributes of online users. This work makes the first attempt to study changes
to a unique profile attribute of a user - username and on a popular OSN which
allows users to change usernames multiple times - Twitter. We collect, monitor
and analyze 8.7 million Twitter users at macroscopic level and 10,000 users at
microscopic level to understand username changing behavior. We find that around
10% of monitored Twitter users opt to change usernames for possible reasons
such as space gain, followers gain, and username promotion. Few users switch
back to any of their past usernames, however prefer recently dropped usernames
to switch back to. Users who change usernames are more active and popular than
users who don't. In-degree, activity and account creation year of users are
weakly correlated with their frequency of username change. We believe that past
usernames of a user and their associated benefits inferred from the past, can
help Twitter to suggest its users a set of suitable usernames to change to.
Past usernames may also help in other applications such as searching and
linking multiple OSN accounts of a user and correlating multiple Twitter
profiles to a single user.
|
[
{
"version": "v1",
"created": "Mon, 26 May 2014 10:56:17 GMT"
}
] | 2014-05-27T00:00:00 |
[
[
"Jain",
"Paridhi",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.971399 |
1403.5702
|
Dimitrios Thilikos
|
Nathann Cohen, Daniel Gon\c{c}alves, Eun Jung Kim, Christophe Paul,
Ignasi Sau, Dimitrios M. Thilikos, Mathias Weller
|
A Polynomial-time Algorithm for Outerplanar Diameter Improvement
|
24 pages
| null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Outerplanar Diameter Improvement problem asks, given a graph $G$ and an
integer $D$, whether it is possible to add edges to $G$ in a way that the
resulting graph is outerplanar and has diameter at most $D$. We provide a
dynamic programming algorithm that solves this problem in polynomial time.
Outerplanar Diameter Improvement demonstrates several structural analogues to
the celebrated and challenging Planar Diameter Improvement problem, where the
resulting graph should, instead, be planar. The complexity status of this
latter problem is open.
|
[
{
"version": "v1",
"created": "Sat, 22 Mar 2014 21:01:37 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2014 13:10:52 GMT"
},
{
"version": "v3",
"created": "Fri, 23 May 2014 07:20:37 GMT"
}
] | 2014-05-26T00:00:00 |
[
[
"Cohen",
"Nathann",
""
],
[
"Gonçalves",
"Daniel",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Paul",
"Christophe",
""
],
[
"Sau",
"Ignasi",
""
],
[
"Thilikos",
"Dimitrios M.",
""
],
[
"Weller",
"Mathias",
""
]
] |
new_dataset
| 0.979418 |
1404.2071
|
Normunds Gr\=uz\=itis
|
Dana Dann\'ells and Normunds Gr\=uz\=itis
|
Extracting a bilingual semantic grammar from FrameNet-annotated corpora
| null |
Proceedings of the 9th International Conference on Language
Resources and Evaluation (LREC), 2014, pp. 2466-2473
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the creation of an English-Swedish FrameNet-based grammar in
Grammatical Framework. The aim of this research is to make existing framenets
computationally accessible for multilingual natural language applications via a
common semantic grammar API, and to facilitate the porting of such grammar to
other languages. In this paper, we describe the abstract syntax of the semantic
grammar while focusing on its automatic extraction possibilities. We have
extracted a shared abstract syntax from ~58,500 annotated sentences in Berkeley
FrameNet (BFN) and ~3,500 annotated sentences in Swedish FrameNet (SweFN). The
abstract syntax defines 769 frame-specific valence patterns that cover 77.8%
examples in BFN and 74.9% in SweFN belonging to the shared set of 471 frames.
As a side result, we provide a unified method for comparing semantic and
syntactic valence patterns across framenets.
|
[
{
"version": "v1",
"created": "Tue, 8 Apr 2014 10:08:22 GMT"
}
] | 2014-05-26T00:00:00 |
[
[
"Dannélls",
"Dana",
""
],
[
"Grūzītis",
"Normunds",
""
]
] |
new_dataset
| 0.995593 |
1405.6164
|
Ion Androutsopoulos
|
Ion Androutsopoulos, Gerasimos Lampouras, Dimitrios Galanis
|
Generating Natural Language Descriptions from OWL Ontologies: the
NaturalOWL System
| null |
Journal Of Artificial Intelligence Research, Volume 48, pages
671-715, 2013
|
10.1613/jair.4017
| null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present NaturalOWL, a natural language generation system that produces
texts describing individuals or classes of OWL ontologies. Unlike simpler OWL
verbalizers, which typically express a single axiom at a time in controlled,
often not entirely fluent natural language primarily for the benefit of domain
experts, we aim to generate fluent and coherent multi-sentence texts for
end-users. With a system like NaturalOWL, one can publish information in OWL on
the Web, along with automatically produced corresponding texts in multiple
languages, making the information accessible not only to computer programs and
domain experts, but also end-users. We discuss the processing stages of
NaturalOWL, the optional domain-dependent linguistic resources that the system
can use at each stage, and why they are useful. We also present trials showing
that when the domain-dependent llinguistic resources are available, NaturalOWL
produces significantly better texts compared to a simpler verbalizer, and that
the resources can be created with relatively light effort.
|
[
{
"version": "v1",
"created": "Thu, 24 Apr 2014 02:47:37 GMT"
}
] | 2014-05-26T00:00:00 |
[
[
"Androutsopoulos",
"Ion",
""
],
[
"Lampouras",
"Gerasimos",
""
],
[
"Galanis",
"Dimitrios",
""
]
] |
new_dataset
| 0.997495 |
1405.6168
|
Harco Leslie Hendric Spits Warnars
|
Spits Warnars
|
Human Face as human single identity
|
6 pages, 5 figures, the 4th Indonesia Japan Joint Scientific
Symposium (IJJSS), Bali, Indonesia, Sept 29- Oct 1 2010. (ISSN : 2087-577)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human face as a physical human recognition can be used as a unique identity
for computer to recognize human by transforming human face with face algorithm
as simple text number which can be primary key for human. Human face as single
identity for human will be done by making a huge and large world centre human
face database, where the human face around the world will be recorded from time
to time and from generation to generation. Architecture database will be
divided become human face image database which will save human face images and
human face output code which will save human face output code as a
transformation human face image with face algorithm. As an improvement the
slightly and simple human face output code database will make human face
searching process become more fast. Transaction with human face as a
transaction without card can make human no need their card for the transaction
and office automation and banking system as an example for implementation
architecture. As an addition suspect human face database can be extended for
fighting crime and terrorism by doing surveillance and searching suspect human
face around the world.
|
[
{
"version": "v1",
"created": "Tue, 8 Apr 2014 03:01:33 GMT"
}
] | 2014-05-26T00:00:00 |
[
[
"Warnars",
"Spits",
""
]
] |
new_dataset
| 0.999553 |
1110.0532
|
Caleb Phillips
|
Caleb Phillips, Lee Becker, and Elizabeth Bradley
|
Strange Beta: An Assistance System for Indoor Rock Climbing Route
Setting Using Chaotic Variations and Machine Learning
|
University of Colorado Computer Science Department Technical Report
|
Chaos 22, 013130 (2012)
|
10.1063/1.3693047
|
CU-CS-1087-11
|
cs.AI cs.HC stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper applies machine learning and the mathematics of chaos to the task
of designing indoor rock-climbing routes. Chaotic variation has been used to
great advantage on music and dance, but the challenges here are quite
different, beginning with the representation. We present a formalized system
for transcribing rock climbing problems, then describe a variation generator
that is designed to support human route-setters in designing new and
interesting climbing problems. This variation generator, termed Strange Beta,
combines chaos and machine learning, using the former to introduce novelty and
the latter to smooth transitions in a manner that is consistent with the style
of the climbs This entails parsing the domain-specific natural language that
rock climbers use to describe routes and movement and then learning the
patterns in the results. We validated this approach with a pilot study in a
small university rock climbing gym, followed by a large blinded study in a
commercial climbing gym, in cooperation with experienced climbers and expert
route setters. The results show that {\sc Strange Beta} can help a human setter
produce routes that are at least as good as, and in some cases better than,
those produced in the traditional manner.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2011 22:23:46 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Phillips",
"Caleb",
""
],
[
"Becker",
"Lee",
""
],
[
"Bradley",
"Elizabeth",
""
]
] |
new_dataset
| 0.972282 |
1308.4368
|
EPTCS
|
Janusz Brzozowski (University of Waterloo), Gareth Davies (University
of Waterloo)
|
Maximally Atomic Languages
|
In Proceedings AFL 2014, arXiv:1405.5272
|
EPTCS 151, 2014, pp. 151-161
|
10.4204/EPTCS.151.10
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The atoms of a regular language are non-empty intersections of complemented
and uncomplemented quotients of the language. Tight upper bounds on the number
of atoms of a language and on the quotient complexities of atoms are known. We
introduce a new class of regular languages, called the maximally atomic
languages, consisting of all languages meeting these bounds. We prove the
following result: If L is a regular language of quotient complexity n and G is
the subgroup of permutations in the transition semigroup T of the minimal DFA
of L, then L is maximally atomic if and only if G is transitive on k-subsets of
1,...,n for 0 <= k <= n and T contains a transformation of rank n-1.
|
[
{
"version": "v1",
"created": "Tue, 20 Aug 2013 18:26:21 GMT"
},
{
"version": "v2",
"created": "Thu, 22 May 2014 02:12:59 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Brzozowski",
"Janusz",
"",
"University of Waterloo"
],
[
"Davies",
"Gareth",
"",
"University\n of Waterloo"
]
] |
new_dataset
| 0.98885 |
1308.6373
|
Jacques Wolfmann
|
Jacques Wolfmann (IMATH)
|
Special Bent and Near-bent Functions
| null |
Advances in Mathematics of Communications, 8, 1 (2014) 21-33
|
10.3934/amc.2013.8.21
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Starting from special near-bent functions in dimension 2t-1 we construct bent
functions in dimension 2t having a specific derivative. We deduce new famillies
of bent functions
|
[
{
"version": "v1",
"created": "Thu, 29 Aug 2013 06:25:38 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Nov 2013 17:55:32 GMT"
},
{
"version": "v3",
"created": "Thu, 22 May 2014 04:11:55 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Wolfmann",
"Jacques",
"",
"IMATH"
]
] |
new_dataset
| 0.997392 |
1405.3100
|
Andrea Monacchi
|
Andrea Monacchi, Dominik Egarter, Wilfried Elmenreich, Salvatore
D'Alessandro, Andrea M. Tonello
|
GREEND: An Energy Consumption Dataset of Households in Italy and Austria
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Home energy management systems can be used to monitor and optimize
consumption and local production from renewable energy. To assess solutions
before their deployment, researchers and designers of those systems demand for
energy consumption datasets. In this paper, we present the GREEND dataset,
containing detailed power usage information obtained through a measurement
campaign in households in Austria and Italy. We provide a description of
consumption scenarios and discuss design choices for the sensing
infrastructure. Finally, we benchmark the dataset with state-of-the-art
techniques in load disaggregation, occupancy detection and appliance usage
mining.
|
[
{
"version": "v1",
"created": "Tue, 13 May 2014 10:51:32 GMT"
},
{
"version": "v2",
"created": "Thu, 22 May 2014 13:57:03 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Monacchi",
"Andrea",
""
],
[
"Egarter",
"Dominik",
""
],
[
"Elmenreich",
"Wilfried",
""
],
[
"D'Alessandro",
"Salvatore",
""
],
[
"Tonello",
"Andrea M.",
""
]
] |
new_dataset
| 0.9998 |
1405.5604
|
EPTCS
|
Stefano Crespi Reghizzi (DEIB, Politecnico di Milano and CNR-IEIIT),
Pierluigi San Pietro (DEIB, Politecnico di Milano and CNR-IEIIT)
|
Commutative Languages and their Composition by Consensual Methods
|
In Proceedings AFL 2014, arXiv:1405.5272
|
EPTCS 151, 2014, pp. 216-230
|
10.4204/EPTCS.151.15
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Commutative languages with the semilinear property (SLIP) can be naturally
recognized by real-time NLOG-SPACE multi-counter machines. We show that unions
and concatenations of such languages can be similarly recognized, relying on --
and further developing, our recent results on the family of consensually
regular (CREG) languages. A CREG language is defined by a regular language on
the alphabet that includes the terminal alphabet and its marked copy. New
conditions, for ensuring that the union or concatenation of CREG languages is
closed, are presented and applied to the commutative SLIP languages. The paper
contributes to the knowledge of the CREG family, and introduces novel
techniques for language composition, based on arithmetic congruences that act
as language signatures. Open problems are listed.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 02:13:46 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Reghizzi",
"Stefano Crespi",
"",
"DEIB, Politecnico di Milano and CNR-IEIIT"
],
[
"Pietro",
"Pierluigi San",
"",
"DEIB, Politecnico di Milano and CNR-IEIIT"
]
] |
new_dataset
| 0.999405 |
1405.5607
|
EPTCS
|
L\'aszl\'o Heged\"us (University of Debrecen), Benedek Nagy
(University of Debrecen)
|
Representations of Circular Words
|
In Proceedings AFL 2014, arXiv:1405.5272
|
EPTCS 151, 2014, pp. 261-270
|
10.4204/EPTCS.151.18
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we give two different ways of representations of circular
words. Representations with tuples are intended as a compact notation, while
representations with trees give a way to easily process all conjugates of a
word. The latter form can also be used as a graphical representation of
periodic properties of finite (in some cases, infinite) words. We also define
iterative representations which can be seen as an encoding utilizing the
flexible properties of circular words. Every word over the two letter alphabet
can be constructed starting from ab by applying the fractional power and the
cyclic shift operators one after the other, iteratively.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 02:14:14 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Hegedüs",
"László",
"",
"University of Debrecen"
],
[
"Nagy",
"Benedek",
"",
"University of Debrecen"
]
] |
new_dataset
| 0.985158 |
1405.5674
|
Mathieu Mangeot
|
Mathieu Mangeot (LIG)
|
Mot\`aMot project: conversion of a French-Khmer published dictionary for
building a multilingual lexical system
|
8 pages, Languages Resources and Evaluation Conference, Reykjavik :
Iceland (2014)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Economic issues related to the information processing techniques are very
important. The development of such technologies is a major asset for developing
countries like Cambodia and Laos, and emerging ones like Vietnam, Malaysia and
Thailand. The MotAMot project aims to computerize an under-resourced language:
Khmer, spoken mainly in Cambodia. The main goal of the project is the
development of a multilingual lexical system targeted for Khmer. The
macrostructure is a pivot one with each word sense of each language linked to a
pivot axi. The microstructure comes from a simplification of the explanatory
and combinatory dictionary. The lexical system has been initialized with data
coming mainly from the conversion of the French-Khmer bilingual dictionary of
Denis Richer from Word to XML format. The French part was completed with
pronunciation and parts-of-speech coming from the FeM French-english-Malay
dictionary. The Khmer headwords noted in IPA in the Richer dictionary were
converted to Khmer writing with OpenFST, a finite state transducer tool. The
resulting resource is available online for lookup, editing, download and remote
programming via a REST API on a Jibiki platform.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 08:57:54 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Mangeot",
"Mathieu",
"",
"LIG"
]
] |
new_dataset
| 0.999439 |
1405.5741
|
Stephen Reed
|
Stephen L. Reed
|
Bitcoin Cooperative Proof-of-Stake
|
16 pages, 2 figures
| null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by/3.0/
|
A hard-fork reconfiguration of the peer to peer Bitcoin network is described
that substitutes tamper-evident logs and proof-of-stake consensus for
proof-of-work consensus. The block creation rewards and transaction fees are
reallocated to establish and staff a secure financial data network capable of
handling the world's transactions with subsecond response time. The new system
pays dividends to stake-offering bitcoin holders. In contrast to Satoshi
Nakamoto's mesh network consisting of competing peers, this system uses an
enterprise class network that is efficient, robust, and scalable, consisting of
cooperating peers. The network backbone nodes host trustless nomadic agents.
Thousands of distributed full nodes are paid to replicate a singleton
blockchain built upon every 10 minutes by a nomadic mint agent whose actions
are verified by its peers. This arrangement enables immediate acknowledgment to
an issuing node that its transaction has been accepted. Less effort means that
subsidized transaction costs will be lower. Network reconfiguration enables the
processing of numerous microtransactions. Stake-weighted distributed consensus
is achieved when necessary with less than one-half arbitrarily faulty nodes.
Important invariants of the Satoshi Social Contract between core developers and
users are maintained: The reward schedule, the blockchain format, the fixed
number of bitcoins, and the decentralized, trustless protocol are untouched.
The system remains a global distributed database, with additions to the
database by consent of the majority, based on a set of transparent rules they
follow.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 13:10:07 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Reed",
"Stephen L.",
""
]
] |
new_dataset
| 0.998804 |
1405.5867
|
Charith Perera
|
Prem Prakash Jayaraman, Charith Perera, Dimitrios Georgakopoulos,
Arkady Zaslavsky
|
MOSDEN: A Scalable Mobile Collaborative Platform for Opportunistic
Sensing Applications
|
Accepted to be published in Transactions on Collaborative Computing,
2014. arXiv admin note: substantial text overlap with arXiv:1310.4052
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile smartphones along with embedded sensors have become an efficient
enabler for various mobile applications including opportunistic sensing. The
hi-tech advances in smartphones are opening up a world of possibilities. This
paper proposes a mobile collaborative platform called MOSDEN that enables and
supports opportunistic sensing at run time. MOSDEN captures and shares sensor
data across multiple apps, smartphones and users. MOSDEN supports the emerging
trend of separating sensors from application-specific processing, storing and
sharing. MOSDEN promotes reuse and re-purposing of sensor data hence reducing
the efforts in developing novel opportunistic sensing applications. MOSDEN has
been implemented on Android-based smartphones and tablets. Experimental
evaluations validate the scalability and energy efficiency of MOSDEN and its
suitability towards real world applications. The results of evaluation and
lessons learned are presented and discussed in this paper.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 19:36:03 GMT"
}
] | 2014-05-23T00:00:00 |
[
[
"Jayaraman",
"Prem Prakash",
""
],
[
"Perera",
"Charith",
""
],
[
"Georgakopoulos",
"Dimitrios",
""
],
[
"Zaslavsky",
"Arkady",
""
]
] |
new_dataset
| 0.960497 |
1212.0027
|
Pablo Arrighi
|
Pablo Arrighi, Simon Martiel, Vincent Nesme
|
Generalized Cayley Graphs and Cellular Automata over them
|
34 pages, 10 figures, LaTeX
| null | null | null |
cs.DM cs.FL gr-qc math-ph math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cayley graphs have a number of useful features: the ability to graphically
represent finitely generated group elements and their relations; to name all
vertices relative to a point; and the fact that they have a well-defined notion
of translation. We propose a notion of graph associated to a language, which
conserves or generalizes these features. Whereas Cayley graphs are very
regular; associated graphs are arbitrary, although of a bounded degree.
Moreover, it is well-known that cellular automata can be characterized as the
set of translation-invariant continuous functions for a distance on the set of
configurations that makes it a compact metric space; this point of view makes
it easy to extend their definition from grids to Cayley graphs. Similarly, we
extend their definition to these arbitrary, bounded degree, time-varying
graphs. The obtained notion of Cellular Automata over generalized Cayley graphs
is stable under composition and under inversion. KEYWORDS: Causal Graph
Dynamics, Curtis-Hedlund-Lyndon, Dynamical networks, Boolean networks,
Generative networks automata, Graph Automata, Graph rewriting automata,
L-systems, parallel graph transformations, Amalgamated graph transformations,
Time-varying graphs, Regge calculus, Local, No-signalling, Reversibility.
|
[
{
"version": "v1",
"created": "Fri, 30 Nov 2012 22:28:33 GMT"
},
{
"version": "v2",
"created": "Wed, 21 May 2014 08:22:25 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Arrighi",
"Pablo",
""
],
[
"Martiel",
"Simon",
""
],
[
"Nesme",
"Vincent",
""
]
] |
new_dataset
| 0.999562 |
1308.3493
|
Teake Nutma
|
Teake Nutma
|
xTras: a field-theory inspired xAct package for Mathematica
|
29 pages. The package can be downloaded from
http://www.xact.es/xtras/
|
Comput. Phys. Commun. 185 (2014) 1719-1738
|
10.1016/j.cpc.2014.02.006
|
AEI-2013-236
|
cs.SC cs.MS gr-qc hep-th
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the tensor computer algebra package xTras, which provides
functions and methods frequently needed when doing (classical) field theory.
Amongst others, it can compute contractions, make Ans\"atze, and solve
tensorial equations. It is built upon the tensor computer algebra system xAct,
a collection of packages for Mathematica.
|
[
{
"version": "v1",
"created": "Thu, 15 Aug 2013 20:00:02 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Nutma",
"Teake",
""
]
] |
new_dataset
| 0.989473 |
1310.7453
|
Francesco Versaci
|
Francesco Versaci
|
OutFlank Routing: Increasing Throughput in Toroidal Interconnection
Networks
|
9 pages, 5 figures, to be presented at ICPADS 2013
| null |
10.1109/ICPADS.2013.40
| null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new, deadlock-free, routing scheme for toroidal interconnection
networks, called OutFlank Routing (OFR). OFR is an adaptive strategy which
exploits non-minimal links, both in the source and in the destination nodes.
When minimal links are congested, OFR deroutes packets to carefully chosen
intermediate destinations, in order to obtain travel paths which are only an
additive constant longer than the shortest ones. Since routing performance is
very sensitive to changes in the traffic model or in the router parameters, an
accurate discrete-event simulator of the toroidal network has been developed to
empirically validate OFR, by comparing it against other relevant routing
strategies, over a range of typical real-world traffic patterns. On the
16x16x16 (4096 nodes) simulated network OFR exhibits improvements of the
maximum sustained throughput between 14% and 114%, with respect to Adaptive
Bubble Routing.
|
[
{
"version": "v1",
"created": "Mon, 28 Oct 2013 15:11:57 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Versaci",
"Francesco",
""
]
] |
new_dataset
| 0.998278 |
1405.5272
|
EPTCS
|
Zolt\'an \'Esik (University of Szeged), Zolt\'an F\"ul\"op (University
of Szeged)
|
Proceedings 14th International Conference on Automata and Formal
Languages
| null |
EPTCS 151, 2014
|
10.4204/EPTCS.151
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 14th International Conference Automata and Formal Languages (AFL 2014)
was held in Szeged, Hungary, from the 27th to the 29th of May, 2014. The
conference was organized by the Department of Foundations of Computer Science
of the University of Szeged. Topics of interest covered the theory and
applications of automata and formal languages and related areas.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 01:15:29 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Ésik",
"Zoltán",
"",
"University of Szeged"
],
[
"Fülöp",
"Zoltán",
"",
"University\n of Szeged"
]
] |
new_dataset
| 0.997464 |
1405.5278
|
Long Yu
|
Long Yu and Hongwei Liu
|
The weight distribution of a family of p-ary cyclic codes
|
15 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let m, k be positive integers, p be an odd prime and $\pi $ be a primitive
element of $\mathbb{F}_{p^m}$. In this paper, we determine the weight
distribution of a family of cyclic codes $\mathcal{C}_t$ over $\mathbb{F}_p$,
whose duals have two zeros $\pi^{-t}$ and $-\pi^{-t}$, where $t$ satisfies
$t\equiv \frac{p^k+1}{2}p^\tau \ ({\rm mod}\ \frac{p^m-1}{2}) $ for some $\tau
\in \{0,1,\cdots, m-1\}$.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 02:03:49 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Yu",
"Long",
""
],
[
"Liu",
"Hongwei",
""
]
] |
new_dataset
| 0.993154 |
1405.5302
|
Nick Chan
|
Hai Wang, Zhe Chen, Qingyuan Gong, Weidong Xu, Xu Zhang and Xin Wang
|
Prometheus: LT Codes Meet Cooperative Transmission in Cellular Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Following fast growth of cellular networks, more users have drawn attention
to the contradiction between dynamic user data traffic and static data plans.
To address this important but largely unexplored issue, in this paper, we
design a new data plan sharing system named Prometheus, which is based on the
scenario that some smartphone users have surplus data traffic and are willing
to help others download data. To realize this system, we first propose a
mechanism that incorporates LT codes into UDP. It is robust to transmission
errors and encourages more concurrent transmissions and forwardings. It also
can be implemented easily with low implementation complexity. Then we design an
incentive mechanism using a Stackelberg game to choose assistant users ($AUs$),
all participants will gain credits in return, which can be used to ask for
future help when they need to download something. Finally real environment
experiments are conducted and the results show that users in our Prometheus not
only can manage their surplus data plan more efficiently, but also achieve a
higher speed download rate.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 05:21:23 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Wang",
"Hai",
""
],
[
"Chen",
"Zhe",
""
],
[
"Gong",
"Qingyuan",
""
],
[
"Xu",
"Weidong",
""
],
[
"Zhang",
"Xu",
""
],
[
"Wang",
"Xin",
""
]
] |
new_dataset
| 0.999619 |
1405.5326
|
Mahdi Zamani
|
Mahnush Movahedi and Jared Saia and Mahdi Zamani
|
Secure Anonymous Broadcast
|
18 Pages, 1 figure
| null | null | null |
cs.DC cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In anonymous broadcast, one or more parties want to anonymously send messages
to all parties. This problem is increasingly important as a black-box in many
privacy-preserving applications such as anonymous communication, distributed
auctions, and multi-party computation. In this paper, we design decentralized
protocols for anonymous broadcast that require each party to send (and compute)
a polylogarithmic number of bits (and operations) per anonymous bit delivered
with $O(\log n)$ rounds of communication. Our protocol is provably secure
against traffic analysis, does not require any trusted party, and is completely
load-balanced. The protocol tolerates up to $n/6$ statically-scheduled
Byzantine parties that are controlled by a computationally unbounded adversary.
Our main strategy for achieving scalability is to perform local communications
(and computations) among a logarithmic number of parties. We provide simulation
results to show that our protocol improves significantly over previous work. We
finally show that using a common cryptographic tool in our protocol one can
achieve practical results for anonymous broadcast.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 08:12:59 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Movahedi",
"Mahnush",
""
],
[
"Saia",
"Jared",
""
],
[
"Zamani",
"Mahdi",
""
]
] |
new_dataset
| 0.997935 |
1405.5365
|
Miguel Rodr\'iguez P\'erez
|
Miguel Rodr\'iguez P\'erez and Sergio Herrer\'ia-Alonso and Manuel
Fern\'andez-Veiga and C\'andido L\'opez-Garc\'ia
|
Common Problems in Delay-Based Congestion Control Algorithms: A Gallery
of Solutions
| null |
Eur. Trans. on Telecommunications, vol. 22, p. 168-179, 2011
|
10.1002/ett.1485
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although delay-based congestion control protocols such as FAST promise to
deliver better performance than traditional TCP Reno, they have not yet been
widely incorporated to the Internet. Several factors have contributed to their
lack of deployment. Probably, the main contributing factor is that they are not
able to compete fairly against loss-based congestion control protocols. In
fact, the transmission rate in equilibrium of delay-based approaches is always
less than their fair share when they share the network with traditional
TCP-Reno derivatives, that employ packet losses as their congestion signal.
There are also other performance impairments caused by the sensitivity to
errors in the measurement of the congestion signal (queuing delay) that reduce
the efficiency and the intra-protocol fairness of the algorithms. In this paper
we report, analyze and discuss some recent proposals in the literature to
improve the dynamic behavior of delay-based congestion control algorithms, and
FAST in particular. Coexistence of sources reacting differently to congestion,
identifying congestion appearance in the reverse path and the persistent
congestion problem are the issues specifically addressed.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 10:58:24 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Pérez",
"Miguel Rodríguez",
""
],
[
"Herrería-Alonso",
"Sergio",
""
],
[
"Fernández-Veiga",
"Manuel",
""
],
[
"López-García",
"Cándido",
""
]
] |
new_dataset
| 0.995808 |
1405.5390
|
Kenza Hamidouche
|
Kenza Hamidouche, Walid Saad and M\'erouane Debbah
|
Many-to-Many Matching Games for Proactive Social-Caching in Wireless
Small Cell Networks
| null | null | null | null |
cs.NI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the caching problem in small cell networks from a
game theoretic point of view. In particular, we formulate the caching problem
as a many-to-many matching game between small base stations and service
providers' servers. The servers store a set of videos and aim to cache these
videos at the small base stations in order to reduce the experienced delay by
the end-users. On the other hand, small base stations cache the videos
according to their local popularity, so as to reduce the load on the backhaul
links. We propose a new matching algorithm for the many-to-many problem and
prove that it reaches a pairwise stable outcome. Simulation results show that
the number of satisfied requests by the small base stations in the proposed
caching algorithm can reach up to three times the satisfaction of a random
caching policy. Moreover, the expected download time of all the videos can be
reduced significantly.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 12:06:13 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Hamidouche",
"Kenza",
""
],
[
"Saad",
"Walid",
""
],
[
"Debbah",
"Mérouane",
""
]
] |
new_dataset
| 0.998955 |
1405.5406
|
Erik Cuevas E
|
Erik Cuevas, Fernando Wario, Daniel Zaldivar and Marco Perez
|
Circle detection on images using Learning Automata
|
26 Pages
|
ET Computer Vision 6 (2), (2012), pp. 121-132
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Circle detection over digital images has received considerable attention from
the computer vision community over the last few years devoting a tremendous
amount of research seeking for an optimal detector. This article presents an
algorithm for the automatic detection of circular shapes from complicated and
noisy images with no consideration of conventional Hough transform principles.
The proposed algorithm is based on Learning Automata (LA) which is a
probabilistic optimization method that explores an unknown random environment
by progressively improving the performance via a reinforcement signal
(objective function). The approach uses the encoding of three non-collinear
points as a candidate circle over the edge image. A reinforcement signal
(matching function) indicates if such candidate circles are actually present in
the edge map. Guided by the values of such reinforcement signal, the
probability set of the encoded candidate circles is modified through the LA
algorithm so that they can fit to the actual circles on the edge map.
Experimental results over several complex synthetic and natural images have
validated the efficiency of the proposed technique regarding accuracy, speed
and robustness.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 13:20:44 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Cuevas",
"Erik",
""
],
[
"Wario",
"Fernando",
""
],
[
"Zaldivar",
"Daniel",
""
],
[
"Perez",
"Marco",
""
]
] |
new_dataset
| 0.995239 |
1405.5421
|
Liqi Wang
|
Liqi Wang, Shixin Zhu
|
New quantum MDS codes derived from constacyclic codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum maximal-distance-separable (MDS) codes form an important class of
quantum codes. It is very hard to construct quantum MDS codes with relatively
large minimum distance. In this paper, based on classical constacyclic codes,
we construct two classes of quantum MDS codes with parameters
$$[[\lambda(q-1),\lambda(q-1)-2d+2,d]]_q$$ where $2\leq d\leq
(q+1)/2+\lambda-1$, and $q+1=\lambda r$ with $r$ even, and
$$[[\lambda(q-1),\lambda(q-1)-2d+2,d]]_q$$ where $2\leq d\leq
(q+1)/2+\lambda/2-1$, and $q+1=\lambda r$ with $r$ odd. The quantum MDS codes
exhibited here have parameters better than the ones available in the
literature.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 13:43:16 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Wang",
"Liqi",
""
],
[
"Zhu",
"Shixin",
""
]
] |
new_dataset
| 0.999769 |
1405.5461
|
Justin Kopinsky
|
Dan Alistarh, Justin Kopinsky, Alexander Matveev, Nir Shavit
|
The LevelArray: A Fast, Practical Long-Lived Renaming Algorithm
|
ICDCS 2014
| null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The long-lived renaming problem appears in shared-memory systems where a set
of threads need to register and deregister frequently from the computation,
while concurrent operations scan the set of currently registered threads.
Instances of this problem show up in concurrent implementations of
transactional memory, flat combining, thread barriers, and memory reclamation
schemes for lock-free data structures. In this paper, we analyze a randomized
solution for long-lived renaming. The algorithmic technique we consider, called
the LevelArray, has previously been used for hashing and one-shot (single-use)
renaming. Our main contribu- tion is to prove that, in long-lived executions,
where processes may register and deregister polynomially many times, the
technique guarantees constant steps on average and O(log log n) steps with high
probability for registering, unit cost for deregistering, and O(n) steps for
collect queries, where n is an upper bound on the number of processes that may
be active at any point in time. We also show that the algorithm has the
surprising property that it is self-healing: under reasonable assumptions on
the schedule, operations running while the data structure is in a degraded
state implicitly help the data structure re-balance itself. This subtle
mechanism obviates the need for expensive periodic rebuilding procedures. Our
benchmarks validate this approach, showing that, for typical use parameters,
the average number of steps a process takes to register is less than two and
the worst-case number of steps is bounded by six, even in executions with
billions of operations. We contrast this with other randomized implementations,
whose worst-case behavior we show to be unreliable, and with deterministic
implementations, whose cost is linear in n.
|
[
{
"version": "v1",
"created": "Wed, 21 May 2014 15:57:58 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Alistarh",
"Dan",
""
],
[
"Kopinsky",
"Justin",
""
],
[
"Matveev",
"Alexander",
""
],
[
"Shavit",
"Nir",
""
]
] |
new_dataset
| 0.995304 |
1405.5523
|
Sean Blakley
|
Bob Blakley, G R Blakley, Sean M Blakley
|
How to Draw Graphs: Seeing and Redrafting Large Networks in Security and
Biology
|
14 pages, 10 figures
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph is a mathematical object consisting of a set of vertices and a set of
edges connecting vertices. Graphs can be drawn on paper in various ways, but
until recently all published methods of drawing graphs have had undesirable
properties: (i) for graphs which are not plane embeddable, intersections
between the lines representing edges appear at points which are not vertices,
creating the appearance of vertices where none exist, (ii) vertex labels can be
placed inside vertex symbols, but there is no consistent, logical, and visually
clean place to put edge labels, and (iii) representations of large graphs are
visually dense and difficult to interpret. This paper describes a new
cartographic method of drawing graphs which solves all of these problems, and
has other advantages as well. Complements, comparisons and contrasts of graphs
are usually better shown cartographically than in node-link form.
|
[
{
"version": "v1",
"created": "Mon, 3 Mar 2014 14:25:10 GMT"
}
] | 2014-05-22T00:00:00 |
[
[
"Blakley",
"Bob",
""
],
[
"Blakley",
"G R",
""
],
[
"Blakley",
"Sean M",
""
]
] |
new_dataset
| 0.999488 |
0907.3986
|
Aleksandrs Slivkins
|
Aleksandrs Slivkins
|
Contextual Bandits with Similarity Information
|
This is the full version of a conference paper in COLT 2011, to
appear in JMLR in 2014. A preliminary version of this manuscript (with all
the results) has been posted to arXiv in February 2011. An earlier version on
arXiv, which does not include the results in Section 6, dates back to July
2009. The present revision addresses various presentation issues pointed out
by journal referees
| null | null | null |
cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a multi-armed bandit (MAB) problem, an online algorithm makes a sequence
of choices. In each round it chooses from a time-invariant set of alternatives
and receives the payoff associated with this alternative. While the case of
small strategy sets is by now well-understood, a lot of recent work has focused
on MAB problems with exponentially or infinitely large strategy sets, where one
needs to assume extra structure in order to make the problem tractable. In
particular, recent literature considered information on similarity between
arms.
We consider similarity information in the setting of "contextual bandits", a
natural extension of the basic MAB problem where before each round an algorithm
is given the "context" -- a hint about the payoffs in this round. Contextual
bandits are directly motivated by placing advertisements on webpages, one of
the crucial problems in sponsored search. A particularly simple way to
represent similarity information in the contextual bandit setting is via a
"similarity distance" between the context-arm pairs which gives an upper bound
on the difference between the respective expected payoffs.
Prior work on contextual bandits with similarity uses "uniform" partitions of
the similarity space, which is potentially wasteful. We design more efficient
algorithms that are based on adaptive partitions adjusted to "popular" context
and "high-payoff" arms.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 06:41:33 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Feb 2011 00:49:41 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jun 2011 17:32:29 GMT"
},
{
"version": "v4",
"created": "Mon, 13 Jan 2014 17:30:07 GMT"
},
{
"version": "v5",
"created": "Tue, 20 May 2014 03:52:46 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Slivkins",
"Aleksandrs",
""
]
] |
new_dataset
| 0.977028 |
1305.7429
|
Petr Kuznetsov
|
Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid
|
A Distributed SDN Control Plane for Consistent Policy Updates
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software-defined networking (SDN) is a novel paradigm that out-sources the
control of packet-forwarding switches to a set of software controllers. The
most fundamental task of these controllers is the correct implementation of the
\emph{network policy}, i.e., the intended network behavior. In essence, such a
policy specifies the rules by which packets must be forwarded across the
network.
This paper studies a distributed SDN control plane that enables
\emph{concurrent} and \emph{robust} policy implementation. We introduce a
formal model describing the interaction between the data plane and a
distributed control plane (consisting of a collection of fault-prone
controllers). Then we formulate the problem of \emph{consistent} composition of
concurrent network policy updates (short: the \emph{CPC Problem}). To
anticipate scenarios in which some conflicting policy updates must be rejected,
we enable the composition via a natural \emph{transactional} interface with
all-or-nothing semantics.
We show that the ability of an $f$-resilient distributed control plane to
process concurrent policy updates depends on the tag complexity, i. e., the
number of policy labels (a.k.a. \emph{tags}) available to the controllers, and
describe a CPC protocol with optimal tag complexity $f+2$.
|
[
{
"version": "v1",
"created": "Fri, 31 May 2013 14:45:31 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2014 09:31:47 GMT"
},
{
"version": "v3",
"created": "Tue, 20 May 2014 16:40:20 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Canini",
"Marco",
""
],
[
"Kuznetsov",
"Petr",
""
],
[
"Levin",
"Dan",
""
],
[
"Schmid",
"Stefan",
""
]
] |
new_dataset
| 0.999551 |
1311.0456
|
Philip Schniter
|
Ashutosh Sabharwal, Philip Schniter, Dongning Guo, Daniel W. Bliss,
Sampath Rangarajan, and Risto Wichman
|
In-Band Full-Duplex Wireless: Challenges and Opportunities
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In-band full-duplex (IBFD) operation has emerged as an attractive solution
for increasing the throughput of wireless communication systems and networks.
With IBFD, a wireless terminal is allowed to transmit and receive
simultaneously in the same frequency band. This tutorial paper reviews the main
concepts of IBFD wireless. Because one the biggest practical impediments to
IBFD operation is the presence of self-interference, i.e., the interference
caused by an IBFD node's own transmissions to its desired receptions, this
tutorial surveys a wide range of IBFD self-interference mitigation techniques.
Also discussed are numerous other research challenges and opportunities in the
design and analysis of IBFD wireless systems.
|
[
{
"version": "v1",
"created": "Sun, 3 Nov 2013 11:01:18 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2014 19:12:21 GMT"
},
{
"version": "v3",
"created": "Tue, 20 May 2014 15:44:01 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Sabharwal",
"Ashutosh",
""
],
[
"Schniter",
"Philip",
""
],
[
"Guo",
"Dongning",
""
],
[
"Bliss",
"Daniel W.",
""
],
[
"Rangarajan",
"Sampath",
""
],
[
"Wichman",
"Risto",
""
]
] |
new_dataset
| 0.99234 |
1402.2709
|
Lachlan Gunn
|
Lachlan J. Gunn, Andrew Allison, Derek Abbott
|
A directional coupler attack against the Kish key distribution system
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Kish key distribution system has been proposed as a class ical
alternative to quantum key distribution. The idealized Kish scheme elegantly
promise s secure key distribution by exploiting thermal noise in a transmission
line. However, we demonstrate that it is vulnerable to nonidealities in its
components, such as the finite resistance of the transmission line connecting
its endpoints. We introduce a novel attack against this nonideality using
directional wave measurements, and experimentally demonstrate its efficacy. Our
attack is based on causality: in a spatially distributed system, propagation is
needed for thermodynamic equilibration, and that leaks information.
|
[
{
"version": "v1",
"created": "Wed, 12 Feb 2014 00:45:53 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Feb 2014 06:01:59 GMT"
},
{
"version": "v3",
"created": "Tue, 20 May 2014 02:10:07 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Gunn",
"Lachlan J.",
""
],
[
"Allison",
"Andrew",
""
],
[
"Abbott",
"Derek",
""
]
] |
new_dataset
| 0.976691 |
1402.3690
|
Jonathan Heras
|
J\'onathan Heras and Ekaterina Komendantskaya and Martin Schmidt
|
(Co)recursion in Logic Programming: Lazy vs Eager
|
To appear in Theory and Practice of Logic Programming (TPLP)
| null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CoAlgebraic Logic Programming (CoALP) is a dialect of Logic Programming
designed to bring a more precise compile-time and run-time analysis of
termination and productivity for recursive and corecursive functions in Logic
Programming. Its second goal is to introduce guarded lazy (co)recursion akin to
functional theorem provers into logic programming. In this paper, we explain
lazy features of CoALP, and compare them with the loop-analysis and eager
execution in Coinductive Logic Programming (CoLP). We conclude by outlining the
future directions in developing the guarded (co)recursion in logic programming.
|
[
{
"version": "v1",
"created": "Sat, 15 Feb 2014 13:28:34 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2014 21:25:25 GMT"
},
{
"version": "v3",
"created": "Mon, 19 May 2014 08:07:40 GMT"
},
{
"version": "v4",
"created": "Tue, 20 May 2014 07:46:48 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Heras",
"Jónathan",
""
],
[
"Komendantskaya",
"Ekaterina",
""
],
[
"Schmidt",
"Martin",
""
]
] |
new_dataset
| 0.991695 |
1404.3349
|
Sourangsu Banerji
|
Sourangsu Banerji
|
Computer Simulation Codes for the Quine-McCluskey Method of Logic
Minimization
|
45 pages, 8 tables
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Quine-McCluskey method is useful in minimizing logic expressions for
larger number of variables when compared with minimization by Karnaugh Map or
Boolean algebra. In this paper, we have tried to put together all of the
computer codes which are available on the internet, edited and modified them as
well as rewritten some parts of those collected codes our self, which are used
in the implementation of the Quine- McCluskey method. A brief introduction and
the logic of this method are discussed following which the codes have been
provided. The Quine-McCluskey Method has been implemented using computer
languages like C and C++ using some amount of variations. Our effort is to list
them all, so that the readers well versed in any of the particular computer
language will find it easy to follow the code written in that particular
language.
|
[
{
"version": "v1",
"created": "Sun, 13 Apr 2014 06:58:49 GMT"
},
{
"version": "v2",
"created": "Tue, 20 May 2014 09:29:49 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Banerji",
"Sourangsu",
""
]
] |
new_dataset
| 0.979721 |
1405.5009
|
Megha Arora
|
Megha Arora, Raghav Gupta and Ponnurangam Kumaraguru
|
Indian Premier League (IPL), Cricket, Online Social Media
|
8 pages
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent past online social media has played a pivotal role in sharing of
information and opinions on real time events. Events in physical space are
reflected in digital world through online social networks. Event based studies
for such content have been widely done on Twitter in the computer science
community. In this report, we performed a detailed analysis of a sports event
called the Indian Premier League (IPL'13) for both Facebook and Twitter. IPL is
the most popular cricket league in India with players from across the world. We
analysed more than 2.6 million tweets and 700 thousand Facebook posts for
temporal activity, text quality, geography of users and the spot-fixing scandal
which came up during the league. We were able to draw strong correlations
between the brand value of teams and how much they were talked about on social
media across Facebook and Twitter. Analysis of geo-tagged data showed major
activity from metropolitan suburbs however activity was not restricted to the
regions geographically associated with each team. We present a decay
calculation methodology, using which we derive that activity died down on both
Twitter and Facebook in a very similar manner. Such analysis can be used to
model events and study their penetration in social networks. We analysed text
for spot-fixing and found that user response to allegations about matches being
fixed was cold. The complete analysis presented in this report, can be
particularly useful for studying events involving crisis or events of political
importance having similar structure.
|
[
{
"version": "v1",
"created": "Tue, 20 May 2014 09:23:56 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Arora",
"Megha",
""
],
[
"Gupta",
"Raghav",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.999856 |
1405.5023
|
Christopher Thraves Caro
|
Anne-Marie Kermarrec and Christopher Thraves
|
Signed graph embedding: when everybody can sit closer to friends than
enemies
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Signed graphs are graphs with signed edges. They are commonly used to
represent positive and negative relationships in social networks. While balance
theory and clusterizable graphs deal with signed graphs to represent social
interactions, recent empirical studies have proved that they fail to reflect
some current practices in real social networks. In this paper we address the
issue of drawing signed graphs and capturing such social interactions. We relax
the previous assumptions to define a drawing as a model in which every vertex
has to be placed closer to its neighbors connected via a positive edge than its
neighbors connected via a negative edge in the resulting space. Based on this
definition, we address the problem of deciding whether a given signed graph has
a drawing in a given $\ell$-dimensional Euclidean space. We present forbidden
patterns for signed graphs that admit the introduced definition of drawing in
the Euclidean plane and line. We then focus on the $1$-dimensional case, where
we provide a polynomial time algorithm that decides if a given complete signed
graph has a drawing, and constructs it when applicable.
|
[
{
"version": "v1",
"created": "Tue, 20 May 2014 10:23:40 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Kermarrec",
"Anne-Marie",
""
],
[
"Thraves",
"Christopher",
""
]
] |
new_dataset
| 0.995688 |
1405.5096
|
Richard Combes
|
Richard Combes and Alexandre Proutiere
|
Unimodal Bandits: Regret Lower Bounds and Optimal Algorithms
|
ICML 2014 (technical report). arXiv admin note: text overlap with
arXiv:1307.7309
| null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider stochastic multi-armed bandits where the expected reward is a
unimodal function over partially ordered arms. This important class of problems
has been recently investigated in (Cope 2009, Yu 2011). The set of arms is
either discrete, in which case arms correspond to the vertices of a finite
graph whose structure represents similarity in rewards, or continuous, in which
case arms belong to a bounded interval. For discrete unimodal bandits, we
derive asymptotic lower bounds for the regret achieved under any algorithm, and
propose OSUB, an algorithm whose regret matches this lower bound. Our algorithm
optimally exploits the unimodal structure of the problem, and surprisingly, its
asymptotic regret does not depend on the number of arms. We also provide a
regret upper bound for OSUB in non-stationary environments where the expected
rewards smoothly evolve over time. The analytical results are supported by
numerical experiments showing that OSUB performs significantly better than the
state-of-the-art algorithms. For continuous sets of arms, we provide a brief
discussion. We show that combining an appropriate discretization of the set of
arms with the UCB algorithm yields an order-optimal regret, and in practice,
outperforms recently proposed algorithms designed to exploit the unimodal
structure.
|
[
{
"version": "v1",
"created": "Tue, 20 May 2014 14:15:54 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Combes",
"Richard",
""
],
[
"Proutiere",
"Alexandre",
""
]
] |
new_dataset
| 0.996963 |
1405.5119
|
Sugata Sanyal
|
Tanmoy Sarkar, Sugata Sanyal
|
Steganalysis: Detecting LSB Steganographic Techniques
|
5 pages, 1 figure
| null | null | null |
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis
is used to detect messages often encrypted using secret key from stego images
produced by steganography techniques. Recently lots of new and improved
steganography techniques are developed and proposed by researchers which
require robust steganalysis techniques to detect the stego images having
minimum false alarm rate. This paper discusses about the different Steganalysis
techniques and help to understand how, where and when this techniques can be
used based on different situations.
|
[
{
"version": "v1",
"created": "Tue, 20 May 2014 15:21:52 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Sarkar",
"Tanmoy",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.990877 |
1405.5201
|
Dongmo Zhang
|
Dongmo Zhang, Yan Zhang
|
An Ordinal Bargaining Solution with Fixed-Point Property
| null |
Journal Of Artificial Intelligence Research, Volume 33, pages
433-464, 2008
|
10.1613/jair.2656
| null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Shapleys impossibility result indicates that the two-person bargaining
problem has no non-trivial ordinal solution with the traditional game-theoretic
bargaining model. Although the result is no longer true for bargaining problems
with more than two agents, none of the well known bargaining solutions are
ordinal. Searching for meaningful ordinal solutions, especially for the
bilateral bargaining problem, has been a challenging issue in bargaining theory
for more than three decades. This paper proposes a logic-based ordinal solution
to the bilateral bargaining problem. We argue that if a bargaining problem is
modeled in terms of the logical relation of players physical negotiation items,
a meaningful bargaining solution can be constructed based on the ordinal
structure of bargainers preferences. We represent bargainers demands in
propositional logic and bargainers preferences over their demands in total
preorder. We show that the solution satisfies most desirable logical
properties, such as individual rationality (logical version), consistency,
collective rationality as well as a few typical game-theoretic properties, such
as weak Pareto optimality and contraction invariance. In addition, if all
players demand sets are logically closed, the solution satisfies a fixed-point
condition, which says that the outcome of a negotiation is the result of mutual
belief revision. Finally, we define various decision problems in relation to
our bargaining model and study their computational complexity.
|
[
{
"version": "v1",
"created": "Wed, 15 Jan 2014 05:19:50 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Zhang",
"Dongmo",
""
],
[
"Zhang",
"Yan",
""
]
] |
new_dataset
| 0.997858 |
1310.2381
|
Xunrui Yin
|
Yan Wang and Xunrui Yin and Xin Wang
|
MDR Codes: A New Class of RAID-6 Codes with Optimal Rebuilding and
Encoding
|
Accepted version. Please refer to
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6804945 for
the published version. 0733-8716/14/$31.00 \c{opyright} 2014 IEEE
|
IEEE Journal on Selected Areas in Communications, Vol 32, Issue 5,
May 2014, page 1008-1018
|
10.1109/JSAC.2014.140520
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As storage systems grow in size, device failures happen more frequently than
ever before. Given the commodity nature of hard drives employed, a storage
system needs to tolerate a certain number of disk failures while maintaining
data integrity, and to recover lost data with minimal interference to normal
disk I/O operations. RAID-6, which can tolerate up to two disk failures with
the minimum redundancy, is becoming widespread. However, traditional RAID-6
codes suffer from high disk I/O overhead during recovery. In this paper, we
propose a new family of RAID-6 codes, the Minimum Disk I/O Repairable (MDR)
codes, which achieve the optimal disk I/O overhead for single failure
recoveries. Moreover, we show that MDR codes can be encoded with the minimum
number of bit-wise XOR operations. Simulation results show that MDR codes help
to save about half of disk read operations than traditional RAID-6 codes, and
thus can reduce the recovery time by up to 40%.
|
[
{
"version": "v1",
"created": "Wed, 9 Oct 2013 07:36:52 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Nov 2013 21:34:33 GMT"
},
{
"version": "v3",
"created": "Mon, 19 May 2014 08:56:44 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Wang",
"Yan",
""
],
[
"Yin",
"Xunrui",
""
],
[
"Wang",
"Xin",
""
]
] |
new_dataset
| 0.971815 |
1312.1799
|
Kai Chen
|
Kai Chen, Kai Niu, and Jiaru Lin
|
Space-Time Polar Coded Modulation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The polar codes are proven to be capacity-achieving and are shown to have
equivalent or even better finite-length performance than the turbo/LDPC codes
under some improved decoding algorithms over the additive white Gaussian noise
(AWGN) channels. Polar coding is based on the so-called channel polarization
phenomenon induced by a transform over the underlying binary-input channel. The
channel polarization is found to be universal in many signal processing
problems and has been applied to the coded modulation schemes. In this paper,
the channel polarization is further extended to the multiple antenna
transmission following a multilevel coding principle. The multiple-input
multile-output (MIMO) channel under quadrature amplitude modulation (QAM) are
transformed into a series of synthesized binary-input channels under a
three-stage channel transform. Based on this generalized channel polarization,
the proposed space-time polar coded modulation (STPCM) scheme allows a joint
optimization of the binary polar coding, modulation and MIMO transmission. In
addition, a practical solution of polar code construction over the fading
channels is also provided, where the fading channels are approximated by an
AWGN channel which shares the same capacity with the original. The simulations
over the MIMO channel with uncorrelated Rayleigh fast fading show that the
proposed STPCM scheme can outperform the bit-interleaved turbo coded scheme in
all the simulated cases, where the latter is adopted in many existing
communication systems.
|
[
{
"version": "v1",
"created": "Fri, 6 Dec 2013 08:32:31 GMT"
},
{
"version": "v2",
"created": "Mon, 19 May 2014 02:10:34 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Chen",
"Kai",
""
],
[
"Niu",
"Kai",
""
],
[
"Lin",
"Jiaru",
""
]
] |
new_dataset
| 0.998327 |
1312.6503
|
Nicolas Gastineau
|
Nicolas Gastineau (Le2i, LIRIS), Hamamache Kheddouci (LIRIS), Olivier
Togni (Le2i)
|
On the family of $r$-regular graphs with Grundy number $r+1$
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Grundy number of a graph $G$, denoted by $\Gamma(G)$, is the largest $k$
such that there exists a partition of $V(G)$, into $k$ independent sets
$V_1,\ldots, V_k$ and every vertex of $V_i$ is adjacent to at least one vertex
in $V_j$, for every $j < i$. The objects which are studied in this article are
families of $r$-regular graphs such that $\Gamma(G) = r + 1$. Using the notion
of independent module, a characterization of this family is given for $r=3$.
Moreover, we determine classes of graphs in this family, in particular the
class of $r$-regular graphs without induced $C_4$, for $r \le 4$. Furthermore,
our propositions imply results on partial Grundy number.
|
[
{
"version": "v1",
"created": "Mon, 23 Dec 2013 10:05:36 GMT"
},
{
"version": "v2",
"created": "Mon, 19 May 2014 19:26:23 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Gastineau",
"Nicolas",
"",
"Le2i, LIRIS"
],
[
"Kheddouci",
"Hamamache",
"",
"LIRIS"
],
[
"Togni",
"Olivier",
"",
"Le2i"
]
] |
new_dataset
| 0.965112 |
1402.4963
|
Julius Hannink
|
Julius Hannink, Remco Duits and Erik Bekkers
|
Vesselness via Multiple Scale Orientation Scores
|
9 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The multi-scale Frangi vesselness filter is an established tool in (retinal)
vascular imaging. However, it cannot cope with crossings or bifurcations, since
it only looks for elongated structures. Therefore, we disentangle crossing
structures in the image via (multiple scale) invertible orientation scores. The
described vesselness filter via scale-orientation scores performs considerably
better at enhancing vessels throughout crossings and bifurcations than the
Frangi version. Both methods are evaluated on a public dataset. Performance is
measured by comparing ground truth data to the segmentation results obtained by
basic thresholding and morphological component analysis of the filtered images.
|
[
{
"version": "v1",
"created": "Thu, 20 Feb 2014 11:06:35 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Feb 2014 18:30:55 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Mar 2014 12:33:37 GMT"
},
{
"version": "v4",
"created": "Mon, 19 May 2014 09:20:06 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Hannink",
"Julius",
""
],
[
"Duits",
"Remco",
""
],
[
"Bekkers",
"Erik",
""
]
] |
new_dataset
| 0.983343 |
1405.0386
|
Michael Huth
|
Michael Huth, Jim Huan-Pu Kuo, Nir Piterman
|
Fatal Attractors in Parity Games: Building Blocks for Partial Solvers
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Attractors in parity games are a technical device for solving "alternating"
reachability of given node sets. A well known solver of parity games -
Zielonka's algorithm - uses such attractor computations recursively. We here
propose new forms of attractors that are monotone in that they are aware of
specific static patterns of colors encountered in reaching a given node set in
alternating fashion. Then we demonstrate how these new forms of attractors can
be embedded within greatest fixed-point computations to design solvers of
parity games that run in polynomial time but are partial in that they may not
decide the winning status of all nodes in the input game.
Experimental results show that our partial solvers completely solve
benchmarks that were constructed to challenge existing full solvers. Our
partial solvers also have encouraging run times in practice. For one partial
solver we prove that its run-time is at most cubic in the number of nodes in
the parity game, that its output game is independent of the order in which
monotone attractors are computed, and that it solves all Buechi games and weak
games.
We then define and study a transformation that converts partial solvers into
more precise partial solvers, and we prove that this transformation is sound
under very reasonable conditions on the input partial solvers. Noting that one
of our partial solvers meets these conditions, we apply its transformation on
1.6 million randomly generated games and so experimentally validate that the
transformation can be very effective in increasing the precision of partial
solvers.
|
[
{
"version": "v1",
"created": "Fri, 2 May 2014 11:45:18 GMT"
},
{
"version": "v2",
"created": "Mon, 19 May 2014 16:59:12 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Huth",
"Michael",
""
],
[
"Kuo",
"Jim Huan-Pu",
""
],
[
"Piterman",
"Nir",
""
]
] |
new_dataset
| 0.997888 |
1405.4375
|
Camilla Hollanti
|
Amaro Barreal, Camilla Hollanti, David Karpuk, and Hsiao-feng Lu
|
Algebraic Codes and a New Physical Layer Transmission Protocol for
Wireless Distributed Storage Systems
|
5 pages. MTNS 2014
| null | null | null |
cs.IT math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a wireless storage system, having to communicate over a fading channel
makes repair transmissions prone to physical layer errors. The first approach
to combat fading is to utilize the existing optimal space-time codes. However,
it was recently pointed out that such codes are in general too complex to
decode when the number of helper nodes is bigger than the number of antennas at
the newcomer or data collector. In this paper, a novel protocol for wireless
storage transmissions based on algebraic space-time codes is presented in order
to improve the system reliability while enabling feasible decoding. The
diversity-multiplexing gain tradeoff (DMT) of the system together with
sphere-decodability even with low number of antennas are used as the main
design criteria, thus naturally establishing a DMT-complexity tradeoff. It is
shown that the proposed protocol outperforms the simple time-division multiple
access (TDMA) protocol, while still falling behind the optimal DMT.
|
[
{
"version": "v1",
"created": "Sat, 17 May 2014 10:10:26 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Barreal",
"Amaro",
""
],
[
"Hollanti",
"Camilla",
""
],
[
"Karpuk",
"David",
""
],
[
"Lu",
"Hsiao-feng",
""
]
] |
new_dataset
| 0.999645 |
1405.4535
|
Meilian Liang
|
Xiu Baoxin, Changjun Fan, Meilian Liang
|
On Disjoint Golomb Rulers
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A set $\{a_i\:|\: 1\leq i \leq k\}$ of non-negative integers is a Golomb
ruler if differences $a_i-a_j$, for any $i \neq j$, are all distinct. A set of
$I$ disjoint Golomb rulers (DGR) each being a $J$-subset of $\{1,2,\cdots, n\}$
is called an $(I,J,n)-DGR$. Let $H(I, J)$ be the least positive $n$ such that
there is an $(I,J,n)-DGR$. In this paper, we propose a series of conjectures on
the constructions and structures of DGR. The main conjecture states that if $A$
is any set of positive integers such that $|A| = H(I, J)$, then there are $I$
disjoint Golomb rulers, each being a $J$-subset of $A$, which generalizes the
conjecture proposed by Koml{\'o}s, Sulyok and Szemer{\'e}di in 1975 on the
special case $I = 1$. These conjectures are computationally verified for some
values of $I$ and $J$ through modest computation. Eighteen exact values of
$H(I,J)$ and ten upper bounds on $H(I,J)$ are obtained by computer search for
$7 \leq I \leq 13$ and $10 \leq J \leq 13$. Moveover for $I > 13$ and $10 \leq
J \leq 13$, $H(I,J)=IJ$ are determined without difficulty.
|
[
{
"version": "v1",
"created": "Sun, 18 May 2014 18:30:57 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Baoxin",
"Xiu",
""
],
[
"Fan",
"Changjun",
""
],
[
"Liang",
"Meilian",
""
]
] |
new_dataset
| 0.997174 |
1405.4758
|
Richard Combes
|
Stefan Magureanu and Richard Combes and Alexandre Proutiere
|
Lipschitz Bandits: Regret Lower Bounds and Optimal Algorithms
|
COLT 2014
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider stochastic multi-armed bandit problems where the expected reward
is a Lipschitz function of the arm, and where the set of arms is either
discrete or continuous. For discrete Lipschitz bandits, we derive asymptotic
problem specific lower bounds for the regret satisfied by any algorithm, and
propose OSLB and CKL-UCB, two algorithms that efficiently exploit the Lipschitz
structure of the problem. In fact, we prove that OSLB is asymptotically
optimal, as its asymptotic regret matches the lower bound. The regret analysis
of our algorithms relies on a new concentration inequality for weighted sums of
KL divergences between the empirical distributions of rewards and their true
distributions. For continuous Lipschitz bandits, we propose to first discretize
the action space, and then apply OSLB or CKL-UCB, algorithms that provably
exploit the structure efficiently. This approach is shown, through numerical
experiments, to significantly outperform existing algorithms that directly deal
with the continuous set of arms. Finally the results and algorithms are
extended to contextual bandits with similarities.
|
[
{
"version": "v1",
"created": "Mon, 19 May 2014 14:56:51 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Magureanu",
"Stefan",
""
],
[
"Combes",
"Richard",
""
],
[
"Proutiere",
"Alexandre",
""
]
] |
new_dataset
| 0.991632 |
1405.4779
|
Juan Luis Valerdi
|
Juan Luis Valerdi, Fernando Raul Rodriguez
|
Una metodolog\'ia para realizar Diferenciaci\'on Autom\'atica Anidada
|
11 pages, in Spanish
| null | null | null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
En este trabajo se presenta una propuesta para realizar Diferenciaci\'on
Autom\'atica Anidada utilizando cualquier biblioteca de Diferenciaci\'on
Autom\'atica que permita sobrecarga de operadores. Para calcular las derivadas
anidadas en una misma evaluaci\'on de la funci\'on, la cual se asume que sea
anal\'itica, se trabaja con el modo forward utilizando una nueva estructura
llamada SuperAdouble, que garantiza que se aplique correctamente la
Diferenciaci\'on Autom\'atica y se calculen el valor y la derivada que se
requiera.
This paper proposes a framework to apply Nested Automatic Differentiation
using any library of Automatic Differentiation which allows operator
overloading. To compute nested derivatives of a function while it is being
evaluated, which is assumed to be analytic, a new structure called SuperAdouble
is used in the forward mode. This new class guarantees the correct application
of Automatic Differentiation to calculate the value and derivative of a
function where is required.
|
[
{
"version": "v1",
"created": "Mon, 19 May 2014 16:01:18 GMT"
}
] | 2014-05-20T00:00:00 |
[
[
"Valerdi",
"Juan Luis",
""
],
[
"Rodriguez",
"Fernando Raul",
""
]
] |
new_dataset
| 0.997465 |
1310.6992
|
Manish Gupta
|
Shalin Shah, Dixita Limbachiya and Manish K. Gupta
|
DNACloud: A Potential Tool for storing Big Data on DNA
|
revised version, 6 pages, 2 tables, 1 figure, appeared as a poster in
FNANO 2014 conference, Software available at http://www.guptalab.org/dnacloud
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The term Big Data is usually used to describe huge amount of data that is
generated by humans from digital media such as cameras, internet, phones,
sensors etc. By building advanced analytics on the top of big data, one can
predict many things about the user such as behavior, interest etc. However
before one can use the data, one has to address many issues for big data
storage. Two main issues are the need of large storage devices and the cost
associated with it. Synthetic DNA storage seems to be an appropriate solution
to address these issues of the big data. Recently in 2013, Goldman and his
collegues from European Bioinformatics Institute demonstrated the use of the
DNA as storage medium with capacity of storing 2.2 peta bytes of information on
one gram of DNA and retrived the data successfully with low error rate. This
significant step shows a promise for synthetic DNA storage as a useful
technology for the future data storage. Motivated by this, we have developed a
software called DNACloud which makes it easy to store the data on the DNA. In
this work, we present detailed description of the software.
|
[
{
"version": "v1",
"created": "Fri, 25 Oct 2013 18:01:21 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2014 13:10:48 GMT"
}
] | 2014-05-19T00:00:00 |
[
[
"Shah",
"Shalin",
""
],
[
"Limbachiya",
"Dixita",
""
],
[
"Gupta",
"Manish K.",
""
]
] |
new_dataset
| 0.998743 |
1312.1719
|
Daniel Talayco
|
Pat Bosshart, Dan Daly, Martin Izzard, Nick McKeown, Jennifer Rexford,
Cole Schlesinger, Dan Talayco, Amin Vahdat, George Varghese, David Walker
|
Programming Protocol-Independent Packet Processors
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
P4 is a high-level language for programming protocol-independent packet
processors. P4 works in conjunction with SDN control protocols like OpenFlow.
In its current form, OpenFlow explicitly specifies protocol headers on which it
operates. This set has grown from 12 to 41 fields in a few years, increasing
the complexity of the specification while still not providing the flexibility
to add new headers. In this paper we propose P4 as a strawman proposal for how
OpenFlow should evolve in the future. We have three goals: (1)
Reconfigurability in the field: Programmers should be able to change the way
switches process packets once they are deployed. (2) Protocol independence:
Switches should not be tied to any specific network protocols. (3) Target
independence: Programmers should be able to describe packet-processing
functionality independently of the specifics of the underlying hardware. As an
example, we describe how to use P4 to configure a switch to add a new
hierarchical label.
|
[
{
"version": "v1",
"created": "Thu, 5 Dec 2013 22:19:21 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Mar 2014 19:01:24 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2014 22:04:21 GMT"
}
] | 2014-05-19T00:00:00 |
[
[
"Bosshart",
"Pat",
""
],
[
"Daly",
"Dan",
""
],
[
"Izzard",
"Martin",
""
],
[
"McKeown",
"Nick",
""
],
[
"Rexford",
"Jennifer",
""
],
[
"Schlesinger",
"Cole",
""
],
[
"Talayco",
"Dan",
""
],
[
"Vahdat",
"Amin",
""
],
[
"Varghese",
"George",
""
],
[
"Walker",
"David",
""
]
] |
new_dataset
| 0.993161 |
1401.7171
|
Lei Song
|
Joost-Pieter Katoen and Lei Song and Lijun Zhang
|
Probably Safe or Live
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a formal characterisation of safety and liveness
properties \`a la Alpern and Schneider for fully probabilistic systems. As for
the classical setting, it is established that any (probabilistic tree) property
is equivalent to a conjunction of a safety and liveness property. A simple
algorithm is provided to obtain such property decomposition for flat
probabilistic CTL (PCTL). A safe fragment of PCTL is identified that provides a
sound and complete characterisation of safety properties. For liveness
properties, we provide two PCTL fragments, a sound and a complete one. We show
that safety properties only have finite counterexamples, whereas liveness
properties have none. We compare our characterisation for qualitative
properties with the one for branching time properties by Manolios and Trefler,
and present sound and complete PCTL fragments for characterising the notions of
strong safety and absolute liveness coined by Sistla.
|
[
{
"version": "v1",
"created": "Tue, 28 Jan 2014 13:22:25 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2014 10:34:19 GMT"
}
] | 2014-05-19T00:00:00 |
[
[
"Katoen",
"Joost-Pieter",
""
],
[
"Song",
"Lei",
""
],
[
"Zhang",
"Lijun",
""
]
] |
new_dataset
| 0.993754 |
1405.3860
|
Xu Chen
|
Xu Chen and Jianwei Huang
|
Spatial Spectrum Access Game
|
The paper has been accepted by IEEE Transactions on Mobile Computing
| null | null | null |
cs.NI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key feature of wireless communications is the spatial reuse. However, the
spatial aspect is not yet well understood for the purpose of designing
efficient spectrum sharing mechanisms. In this paper, we propose a framework of
spatial spectrum access games on directed interference graphs, which can model
quite general interference relationship with spatial reuse in wireless
networks. We show that a pure Nash equilibrium exists for the two classes of
games: (1) any spatial spectrum access games on directed acyclic graphs, and
(2) any games satisfying the congestion property on directed trees and directed
forests. Under mild technical conditions, the spatial spectrum access games
with random backoff and Aloha channel contention mechanisms on undirected
graphs also have a pure Nash equilibrium. We also quantify the price of anarchy
of the spatial spectrum access game. We then propose a distributed learning
algorithm, which only utilizes users' local observations to adaptively adjust
the spectrum access strategies. We show that the distributed learning algorithm
can converge to an approximate mixed-strategy Nash equilibrium for any spatial
spectrum access games. Numerical results demonstrate that the distributed
learning algorithm achieves up to superior performance improvement over a
random access algorithm.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 14:14:35 GMT"
}
] | 2014-05-19T00:00:00 |
[
[
"Chen",
"Xu",
""
],
[
"Huang",
"Jianwei",
""
]
] |
new_dataset
| 0.980479 |
1405.4092
|
Rukshan Alexander
|
Rukshan Alexander, Miroshan Alexander
|
An ICT-Based Real-Time Surveillance System for Controlling Dengue in Sri
Lanka
|
10 pages, 7 figures, 1 tables, Proceedings of the International
Conference on Contemporary Management (ICCM), 2014, Faculty of Management
Studies & Commerce, University of Jaffna, Sri Lanka. 14th & 15rd March, 2014
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dengue is a notifiable communicable disease in Sri Lanka since 1996. Dengue
fever spread rapidly among people living in most of the districts of Sri Lanka.
The present notification system of dengue communicable diseases which is
enforced by law is a passive surveillance system carried out by the public
health care professionals. The present notification of communicable disease
system is manual, slow, inefficient, and repetitive all of these lead to handle
the dengue related health problems ineffectively. Thus it is less effective in
preventing a spreading epidemic, public health care professionals and others
require an operational support system to help for managing day-to-day public
health responsibilities as well as a method to effectively detect and manage
health problems such as Dengue. On the other hand the Information and
Communication Technology (ICT) in medical world has been widely used. To give
the information technology touch, a complementary web based open source
software application environment has been developed with minimum implementation
and recurrent costs critical for developing countries like Sri Lanka and named
as eDCS: e Dengue Control System based on the same principles of manual disease
surveillance system while taking steps to provide timely, accurate information
in a reliable and useable manner. The eDCS helps to manage outbreaks through
early detection, rapid verification, and appropriate response to Dengue. It
allows health care professionals and citizens to get early awareness about the
dengue disease via Internet or mobile phone and bring them for performing
Dengue prevention and controlling operation through the social media
acceleration. The system is initially limited to dengue communicable disease.
It can be easily expanded to other communicable diseases, and non communicable
disease surveillance in future.
|
[
{
"version": "v1",
"created": "Fri, 16 May 2014 08:34:50 GMT"
}
] | 2014-05-19T00:00:00 |
[
[
"Alexander",
"Rukshan",
""
],
[
"Alexander",
"Miroshan",
""
]
] |
new_dataset
| 0.995542 |
1003.5459
|
Jean-Marie Vanherpe
|
Jean-Luc Fouquet (LIFO), Henri Thuillier (LIFO), Jean-Marie Vanherpe
(LIFO)
|
On a family of cubic graphs containing the flower snarks
| null |
Discussiones Mathematicae Graph Theory 30, 2 (2010) 289-314
|
10.7151/dmgt.1495
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider cubic graphs formed with $k \geq 2$ disjoint claws $C_i \sim
K_{1, 3}$ ($0 \leq i \leq k-1$) such that for every integer $i$ modulo $k$ the
three vertices of degree 1 of $\ C_i$ are joined to the three vertices of
degree 1 of $C_{i-1}$ and joined to the three vertices of degree 1 of
$C_{i+1}$. Denote by $t_i$ the vertex of degree 3 of $C_i$ and by $T$ the set
$\{t_1, t_2,..., t_{k-1}\}$. In such a way we construct three distinct graphs,
namely $FS(1,k)$, $FS(2,k)$ and $FS(3,k)$. The graph $FS(j,k)$ ($j \in \{1, 2,
3\}$) is the graph where the set of vertices $\cup_{i=0}^{i=k-1}V(C_i)
\setminus T$ induce $j$ cycles (note that the graphs $FS(2,2p+1)$, $p\geq2$,
are the flower snarks defined by Isaacs \cite{Isa75}). We determine the number
of perfect matchings of every $FS(j,k)$. A cubic graph $G$ is said to be {\em
2-factor hamiltonian} if every 2-factor of $G$ is a hamiltonian cycle. We
characterize the graphs $FS(j,k)$ that are 2-factor hamiltonian (note that
FS(1,3) is the "Triplex Graph" of Robertson, Seymour and Thomas \cite{RobSey}).
A {\em strong matching} $M$ in a graph $G$ is a matching $M$ such that there is
no edge of $E(G)$ connecting any two edges of $M$. A cubic graph having a
perfect matching union of two strong matchings is said to be a {\em\Jaev}. We
characterize the graphs $FS(j,k)$ that are \Jaesv.
|
[
{
"version": "v1",
"created": "Mon, 29 Mar 2010 08:45:05 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Thuillier",
"Henri",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
] |
new_dataset
| 0.997227 |
1405.2998
|
Alexander Romanovsky
|
Alexander Romanovsky, Marc-Olivier Killijian
|
The Tenth European Dependable Computer Conference
|
EDCC-2014
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 21st century society relies on computing systems more than ever.
Computers are no longer simply machines that are used by organizations or at
home. They are embedded everywhere, from cell phones to cars or industrial
control devices, and large-scale cloud computing providers are sharing them
among many organizations in an unprecedented scale. As computers have become
indispensable, their failures may significantly perturb our daily lives. The
increased hardware and software complexity, as well as the scaling of
manufacturing technologies towards nanometer size devices, pose new challenges
to the developers. As a consequence the development, testing, and benchmarking
of dependable systems has become a vital topic of research, both for academia
and industry.
EDCC is the leading European conference for presenting and discussing the
latest research in dependable computing. As in previous years, its tenth
edition aims at providing a European-hosted venue for researchers and
practitioners from all over the world to present and discuss their latest
research results on dependability, security, fault-tolerance, and testing.
Original papers are solicited on theory, techniques, systems, and tools for the
design, validation, operation and evaluation of dependable and secure computing
systems, covering any fault model, from traditional hardware and software
faults to accidental and malicious human interactions.
|
[
{
"version": "v1",
"created": "Mon, 12 May 2014 23:42:30 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2014 00:31:59 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Romanovsky",
"Alexander",
""
],
[
"Killijian",
"Marc-Olivier",
""
]
] |
new_dataset
| 0.998558 |
1405.3188
|
Majid Gerami
|
Majid Gerami, Ming Xiao, Jun Li, Carlo Fischione, Zihuai Lin
|
Repair for Distributed Storage Systems in Packet Erasure Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reliability is essential for storing files in many applications of
distributed storage systems. To maintain reliability, when a storage node
fails, a new node should be regenerated by a repair process. Most of the
previous results on the repair problem assume perfect (error-free) links in the
networks. However, in practice, especially in a wireless network, the
transmitted packets (for repair) may be lost due to, e.g., link failure or
buffer overflow. We study the repair problem of distributed storage systems in
packet erasure networks, where a packet loss is modeled as an erasure. The
minimum repair-bandwidth, namely the amount of information sent from the
surviving nodes to the new node, is established under the ideal assumption of
infinite number of packet transmissions. We also study the bandwidth-storage
tradeoffs in erasure networks. Then, the use of repairing storage nodes (nodes
with smaller storage space) is proposed to reduce the repair-bandwidth. We
study the minimal storage of repairing storage nodes. For the case of a finite
number of packet transmissions, the probability of successful repairing is
investigated. We show that the repair with a finite number of packet
transmissions may use much larger bandwidth than the minimum repair-bandwidth.
Finally, we propose a combinatorial optimization problem, which results in the
optimal repair-bandwidth for the given packet erasure probability and finite
packet transmissions.
|
[
{
"version": "v1",
"created": "Tue, 13 May 2014 15:31:33 GMT"
},
{
"version": "v2",
"created": "Wed, 14 May 2014 20:58:08 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Gerami",
"Majid",
""
],
[
"Xiao",
"Ming",
""
],
[
"Li",
"Jun",
""
],
[
"Fischione",
"Carlo",
""
],
[
"Lin",
"Zihuai",
""
]
] |
new_dataset
| 0.981979 |
1405.3694
|
Martin Gebser
|
Martin Gebser, Roland Kaminski, Benjamin Kaufmann, Torsten Schaub
|
Clingo = ASP + Control: Preliminary Report
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the new ASP system clingo 4. Unlike its predecessors, being mere
monolithic combinations of the grounder gringo with the solver clasp, the new
clingo 4 series offers high-level constructs for realizing complex reasoning
processes. Among others, such processes feature advanced forms of search, as in
optimization or theory solving, or even interact with an environment, as in
robotics or query-answering. Common to them is that the problem specification
evolves during the reasoning process, either because data or constraints are
added, deleted, or replaced. In fact, clingo 4 carries out such complex
reasoning within a single integrated ASP grounding and solving process. This
avoids redundancies in relaunching grounder and solver programs and benefits
from the solver's learning capacities. clingo 4 accomplishes this by
complementing ASP's declarative input language by control capacities expressed
via the embedded scripting languages lua and python. On the declarative side,
clingo 4 offers a new directive that allows for structuring logic programs into
named and parameterizable subprograms. The grounding and integration of these
subprograms into the solving process is completely modular and fully
controllable from the procedural side, viz. the scripting languages. By
strictly separating logic and control programs, clingo 4 also abolishes the
need for dedicated systems for incremental and reactive reasoning, like iclingo
and oclingo, respectively, and its flexibility goes well beyond the advanced
yet still rigid solving processes of the latter.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 21:33:07 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Gebser",
"Martin",
""
],
[
"Kaminski",
"Roland",
""
],
[
"Kaufmann",
"Benjamin",
""
],
[
"Schaub",
"Torsten",
""
]
] |
new_dataset
| 0.99301 |
1405.3726
|
Xi Qiu
|
Xi Qiu and Christopher Stewart
|
Topic words analysis based on LDA model
| null | null | null | null |
cs.SI cs.DC cs.IR cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social network analysis (SNA), which is a research field describing and
modeling the social connection of a certain group of people, is popular among
network services. Our topic words analysis project is a SNA method to visualize
the topic words among emails from Obama.com to accounts registered in Columbus,
Ohio. Based on Latent Dirichlet Allocation (LDA) model, a popular topic model
of SNA, our project characterizes the preference of senders for target group of
receptors. Gibbs sampling is used to estimate topic and word distribution. Our
training and testing data are emails from the carbon-free server
Datagreening.com. We use parallel computing tool BashReduce for word processing
and generate related words under each latent topic to discovers typical
information of political news sending specially to local Columbus receptors.
Running on two instances using paralleling tool BashReduce, our project
contributes almost 30% speedup processing the raw contents, comparing with
processing contents on one instance locally. Also, the experimental result
shows that the LDA model applied in our project provides precision rate 53.96%
higher than TF-IDF model finding target words, on the condition that
appropriate size of topic words list is selected.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 02:15:01 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Qiu",
"Xi",
""
],
[
"Stewart",
"Christopher",
""
]
] |
new_dataset
| 0.956492 |
1405.3772
|
Yannis Haralambous
|
Yannis Haralambous and Julie Sauvage-Vincent and John Puentes
|
INAUT, a Controlled Language for the French Coast Pilot Books
Instructions nautiques
|
10 pages, 3 figures, accepted for publication at Fourth Workshop on
Controlled Natural Language (CNL 2014), 20-22 August 2014, Galway, Ireland
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe INAUT, a controlled natural language dedicated to collaborative
update of a knowledge base on maritime navigation and to automatic generation
of coast pilot books (Instructions nautiques) of the French National
Hydrographic and Oceanographic Service SHOM. INAUT is based on French language
and abundantly uses georeferenced entities. After describing the structure of
the overall system, giving details on the language and on its generation, and
discussing the three major applications of INAUT (document production,
interaction with ENCs and collaborative updates of the knowledge base), we
conclude with future extensions and open problems.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 09:11:53 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Haralambous",
"Yannis",
""
],
[
"Sauvage-Vincent",
"Julie",
""
],
[
"Puentes",
"John",
""
]
] |
new_dataset
| 0.999018 |
1405.3775
|
Mehdi Samadieh
|
Mohammad Gholami and Mehdi Samadieh
|
Quasi Cyclic LDPC Codes Based on Finite Set Systems
|
21 page,6 figure
| null | null | null |
cs.IT cs.CR cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A finite set system (FSS) is a pair (V; B) where V is a finite set whose
members are called points, equipped with a finite collection of its subsets B
whose members are called blocks. In this paper, finite set systems are used to
define a class of Quasi-cyclic low- density parity-check (LDPC) codes, called
FSS codes, such that the constructed codes possess large girth and arbitrary
column-weight distributions. Especially, the constructed column weight-2 FSS
codes have higher rates than the column weight-2 geometric and cylinder-type
codes with the same girths. To find the maximum girth of FSS codes based on (V;
B), inevitable walks are defined in B such that the maximum girth is determined
by the smallest length of the inevitable walks in B. Simulation results show
that the constructed FSS codes have very good performance over the AWGN channel
with iterative decoding and achieve significantly large coding gains compared
to the random-like LDPC codes of the same lengths and rates.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 09:25:08 GMT"
}
] | 2014-05-16T00:00:00 |
[
[
"Gholami",
"Mohammad",
""
],
[
"Samadieh",
"Mehdi",
""
]
] |
new_dataset
| 0.999708 |
1405.3368
|
Lurong Jiang
|
Lurong Jiang, Xinyu Jin, Yongxiang Xia, Bo Ouyang, Duanpo Wu, Xi Chen
|
A Scale-Free Topology Construction Model for Wireless Sensor Networks
|
13pages, 3 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A local-area and energy-efficient (LAEE) evolution model for wireless sensor
networks is proposed. The process of topology evolution is divided into two
phases. In the first phase, nodes are distributed randomly in a fixed region.
In the second phase, according to the spatial structure of wireless sensor
networks, topology evolution starts from the sink, grows with an
energy-efficient preferential attachment rule in the new node's local-area, and
stops until all nodes are connected into network. Both analysis and simulation
results show that the degree distribution of LAEE follows the power law. This
topology construction model has better tolerance against energy depletion or
random failure than other non-scale-free WSN topologies.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 05:42:03 GMT"
}
] | 2014-05-15T00:00:00 |
[
[
"Jiang",
"Lurong",
""
],
[
"Jin",
"Xinyu",
""
],
[
"Xia",
"Yongxiang",
""
],
[
"Ouyang",
"Bo",
""
],
[
"Wu",
"Duanpo",
""
],
[
"Chen",
"Xi",
""
]
] |
new_dataset
| 0.993915 |
1405.3391
|
Julien Narboux
|
Sana Stojanovic, Julien Narboux (INRIA Nancy - Grand Est / LSIIT,
ICube), Marc Bezem, Predrag Janicic
|
A Vernacular for Coherent Logic
|
CICM 2014 - Conferences on Intelligent Computer Mathematics (2014)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a simple, yet expressive proof representation from which proofs
for different proof assistants can easily be generated. The representation uses
only a few inference rules and is based on a frag- ment of first-order logic
called coherent logic. Coherent logic has been recognized by a number of
researchers as a suitable logic for many ev- eryday mathematical developments.
The proposed proof representation is accompanied by a corresponding XML format
and by a suite of XSL transformations for generating formal proofs for
Isabelle/Isar and Coq, as well as proofs expressed in a natural language form
(formatted in LATEX or in HTML). Also, our automated theorem prover for
coherent logic exports proofs in the proposed XML format. All tools are
publicly available, along with a set of sample theorems.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 07:48:29 GMT"
}
] | 2014-05-15T00:00:00 |
[
[
"Stojanovic",
"Sana",
"",
"INRIA Nancy - Grand Est / LSIIT,\n ICube"
],
[
"Narboux",
"Julien",
"",
"INRIA Nancy - Grand Est / LSIIT,\n ICube"
],
[
"Bezem",
"Marc",
""
],
[
"Janicic",
"Predrag",
""
]
] |
new_dataset
| 0.99965 |
1405.3394
|
Shangping Wang
|
Shangping Wang, Fang Feng
|
Large Universe Attribute-Based Encryption Scheme from Lattices
|
18 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a large universe attribute-based encryption (ABE ) scheme from
lattices. It is inspired by Brent Waters' scheme which is a large universe
attribute-based encryption using bilinear map. It is a very practical scheme
but this scheme may not be security with the developing quantum computer. So we
extend their good idea of large universe attribute-based encryption to lattices
based cryptosystem. And our scheme is the first large universe ABE scheme from
lattices. In a large universe ABE system any string can be used as attribute
and attributes need not be determined at system setup. This is a desirable
feature. And the master private key of our scheme is too short too a matrix.
Moreover, our scheme is high efficient due to the ciphertext of our scheme is
divided into three parts. Finally, under Learning with Errors assumption, we
prove our scheme is secure under the select attribute attack.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 07:53:26 GMT"
}
] | 2014-05-15T00:00:00 |
[
[
"Wang",
"Shangping",
""
],
[
"Feng",
"Fang",
""
]
] |
new_dataset
| 0.99606 |
1405.3422
|
Marthe Bonamy
|
Marthe Bonamy, Benjamin L\'ev\^eque, Alexandre Pinlou
|
Planar graphs with $\Delta\geq 7$ and no triangle adjacent to a $C_4$
are minimally edge and total choosable
|
12 pages, 3 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For planar graphs, we consider the problems of \emph{list edge coloring} and
\emph{list total coloring}. Edge coloring is the problem of coloring the edges
while ensuring that two edges that are adjacent receive different colors. Total
coloring is the problem of coloring the edges and the vertices while ensuring
that two edges that are adjacent, two vertices that are adjacent, or a vertex
and an edge that are incident receive different colors. In their list
extensions, instead of having the same set of colors for the whole graph, every
vertex or edge is assigned some set of colors and has to be colored from it. A
graph is minimally edge or total choosable if it is list edge
$\Delta$-colorable or list total $(\Delta+1)$-colorable, respectively, where
$\Delta$ is the maximum degree in the graph.
It is already known that planar graphs with $\Delta\geq 8$ and no triangle
adjacent to a $C_4$ are minimally edge and total choosable (Li Xu 2011), and
that planar graphs with $\Delta\geq 7$ and no triangle sharing a vertex with a
$C_4$ or no triangle adjacent to a $C_k$ ($\forall 3 \leq k \leq 6$) are
minimally total colorable (Wang Wu 2011). We strengthen here these results and
prove that planar graphs with $\Delta\geq 7$ and no triangle adjacent to a
$C_4$ are minimally edge and total choosable.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 09:24:39 GMT"
}
] | 2014-05-15T00:00:00 |
[
[
"Bonamy",
"Marthe",
""
],
[
"Lévêque",
"Benjamin",
""
],
[
"Pinlou",
"Alexandre",
""
]
] |
new_dataset
| 0.998257 |
1405.3507
|
Munnujahan Ara
|
Samah A. M. Ghanem and Munnujahan Ara
|
Secure Data Transmission in Cooperative Modes: Relay and MAC
|
11 pages, 8 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cooperation in clouds provides a promising technique for 5G wireless
networks, supporting higher data rates. Security of data transmission over
wireless clouds could put constraints on devices; whether to cooperate or not.
Therefore, our aim is to provide analytical framework for the security on the
physical layer of such setup and to define the constraints embodied with
cooperation in small size wireless clouds. In this paper, two legitimate
transmitters Alice and John cooperate to increase the reliable transmission
rate received by their common legitimate receiver Bob, where one eavesdropper,
Eve exists. We provide the achievable secure data transmission rates with
cooperative relaying and when no cooperation exists creating a Multiple Access
Channel (MAC). The paper considers the analysis of different cooperative
scenarios: a cooperative scenario with two relaying devices, a cooperative
scenario without relaying, a non-cooperative scenario, and cooperation from one
side. We derive analytical expressions for the optimal power allocation that
maximizes the achievable secrecy rates for the different set of scenarios where
the implication of cooperation on the achievable secrecy rates was analyzed. We
propose a distributed algorithm that allows the devices to select whether to
cooperate or not and to choose their optimal power allocation based on the
cooperation framework selected. Moreover, we defined distance constraints to
enforce the benefits of cooperation between devices in a wireless cloud.
|
[
{
"version": "v1",
"created": "Wed, 14 May 2014 14:25:59 GMT"
}
] | 2014-05-15T00:00:00 |
[
[
"Ghanem",
"Samah A. M.",
""
],
[
"Ara",
"Munnujahan",
""
]
] |
new_dataset
| 0.994307 |
1308.2286
|
Pascal Koiran
|
Pascal Koiran (LIP), Natacha Portier (LIP), S\'ebastien Tavenas (LIP),
St\'ephan Thomass\'e (LIP)
|
A tau-conjecture for Newton polygons
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One can associate to any bivariate polynomial P(X,Y) its Newton polygon. This
is the convex hull of the points (i,j) such that the monomial X^i Y^j appears
in P with a nonzero coefficient. We conjecture that when P is expressed as a
sum of products of sparse polynomials, the number of edges of its Newton
polygon is polynomially bounded in the size of such an expression. We show that
this "tau-conjecture for Newton polygons," even in a weak form, implies that
the permanent polynomial is not computable by polynomial size arithmetic
circuits. We make the same observation for a weak version of an earlier "real
tau-conjecture." Finally, we make some progress toward the tau-conjecture for
Newton polygons using recent results from combinatorial geometry.
|
[
{
"version": "v1",
"created": "Sat, 10 Aug 2013 07:36:00 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2014 06:08:43 GMT"
}
] | 2014-05-14T00:00:00 |
[
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Portier",
"Natacha",
"",
"LIP"
],
[
"Tavenas",
"Sébastien",
"",
"LIP"
],
[
"Thomassé",
"Stéphan",
"",
"LIP"
]
] |
new_dataset
| 0.996966 |
1404.5278
|
Mehrnoosh Sadrzadeh
|
Mehrnoosh Sadrzadeh, Stephen Clark, Bob Coecke
|
The Frobenius anatomy of word meanings I: subject and object relative
pronouns
|
31 pages
|
Journal of Logic and Computation, Special Issue: The Incomputable,
an Isaac Newton Institute Workshop, 23(6), pp.1293-1317, 2013
|
10.1093/logcom/ext044
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper develops a compositional vector-based semantics of subject and
object relative pronouns within a categorical framework. Frobenius algebras are
used to formalise the operations required to model the semantics of relative
pronouns, including passing information between the relative clause and the
modified noun phrase, as well as copying, combining, and discarding parts of
the relative clause. We develop two instantiations of the abstract semantics,
one based on a truth-theoretic approach and one based on corpus statistics.
|
[
{
"version": "v1",
"created": "Mon, 21 Apr 2014 19:31:48 GMT"
}
] | 2014-05-14T00:00:00 |
[
[
"Sadrzadeh",
"Mehrnoosh",
""
],
[
"Clark",
"Stephen",
""
],
[
"Coecke",
"Bob",
""
]
] |
new_dataset
| 0.99902 |
1405.2906
|
Sushant Chaudhary Mr
|
Sushant Chaudhary
|
Load Frequency Control For Distributed Grid Power System Single Area &
Multi-area System
|
4Pages, 14 Figures
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This project presents decentralized control scheme for Load-Frequency Control
in power System. In this era renewable energy is most promising solution to
man's ever increasing energy needs. But the power production by these resources
cannot be controlled unlike in thermal plants. A number of optimal control
techniques are adopted to implement a reliable stabilizing controller. It is
necessary to interconnect more distributed generation in power systems because
of environmental concerns. Primary concern includes global environmental and
energy depletion problem. A serious attempt has been undertaken aiming a
investigating the load frequency control problem in a power system consisting
of two power generation unit and multiple variable load units. The robustness
and reliability of the various control schemes is examined through simulations.
A system involving thermal plants and a hydro plant is modeled using MAT LAB
2011b.
|
[
{
"version": "v1",
"created": "Mon, 12 May 2014 09:30:35 GMT"
}
] | 2014-05-14T00:00:00 |
[
[
"Chaudhary",
"Sushant",
""
]
] |
new_dataset
| 0.992172 |
1405.2908
|
Johny Paul
|
Johny Paul, Walter Stechele, Manfred Kr\"ohnert, Tamim Asfour
|
Resource-Aware Programming for Robotic Vision
|
Presented at 1st Workshop on Resource Awareness and Adaptivity in
Multi-Core Computing (Racing 2014) (arXiv:1405.2281)
| null | null |
Racing/2014/02
|
cs.CV cs.DC cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Humanoid robots are designed to operate in human centered environments. They
face changing, dynamic environments in which they need to fulfill a multitude
of challenging tasks. Such tasks differ in complexity, resource requirements,
and execution time. Latest computer architectures of humanoid robots consist of
several industrial PCs containing single- or dual-core processors. According to
the SIA roadmap for semiconductors, many-core chips with hundreds to thousands
of cores are expected to be available in the next decade. Utilizing the full
power of a chip with huge amounts of resources requires new computing paradigms
and methodologies.
In this paper, we analyze a resource-aware computing methodology named
Invasive Computing, to address these challenges. The benefits and limitations
of the new programming model is analyzed using two widely used computer vision
algorithms, the Harris Corner detector and SIFT (Scale Invariant Feature
Transform) feature matching. The result indicate that the new programming model
together with the extensions within the application layer, makes them highly
adaptable; leading to better quality in the results obtained.
|
[
{
"version": "v1",
"created": "Mon, 12 May 2014 16:40:04 GMT"
}
] | 2014-05-14T00:00:00 |
[
[
"Paul",
"Johny",
""
],
[
"Stechele",
"Walter",
""
],
[
"Kröhnert",
"Manfred",
""
],
[
"Asfour",
"Tamim",
""
]
] |
new_dataset
| 0.953432 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.