id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1405.3033
Zeeshan Bhatti
Zeeshan Bhatti, Ahmad Waqas, Imdad Ali Ismaili, Dil Nawaz Hakro, Waseem Javaid Soomro
Phonetic based SoundEx & ShapeEx algorithm for Sindhi Spell Checker System
9 pages, 6 figures, 5 Tables, Sindhi Computing, Sindhi Language
Adv. Environ. Biol., 8(4), 1147-1155, AENSI Publisher, 2014
null
null
cs.CL
http://creativecommons.org/licenses/by/3.0/
This paper presents a novel combinational phonetic algorithm for Sindhi Language, to be used in developing Sindhi Spell Checker which has yet not been developed prior to this work. The compound textual forms and glyphs of Sindhi language presents a substantial challenge for developing Sindhi spell checker system and generating similar suggestion list for misspelled words. In order to implement such a system, phonetic based Sindhi language rules and patterns must be considered into account for increasing the accuracy and efficiency. The proposed system is developed with a blend between Phonetic based SoundEx algorithm and ShapeEx algorithm for pattern or glyph matching, generating accurate and efficient suggestion list for incorrect or misspelled Sindhi words. A table of phonetically similar sounding Sindhi characters for SoundEx algorithm is also generated along with another table containing similar glyph or shape based character groups for ShapeEx algorithm. Both these are first ever attempt of any such type of categorization and representation for Sindhi Language.
[ { "version": "v1", "created": "Tue, 13 May 2014 04:33:04 GMT" } ]
2014-05-14T00:00:00
[ [ "Bhatti", "Zeeshan", "" ], [ "Waqas", "Ahmad", "" ], [ "Ismaili", "Imdad Ali", "" ], [ "Hakro", "Dil Nawaz", "" ], [ "Soomro", "Waseem Javaid", "" ] ]
new_dataset
0.972611
1405.3094
Olfa Boubaker
Olfa Boubaker
The inverted Pendulum: A fundamental Benchmark in Control Theory and Robotics
IEEE International Conference on Education and e-Learning Innovations (ICEELI), 1-3 July 2012, Sousse, Tunisia
null
10.1109/ICEELI.2012.6360606
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For at least fifty years, the inverted pendulum has been the most popular benchmark, among others, for teaching and researches in control theory and robotics. This paper presents the key motivations for the use of that system and explains, in details, the main reflections on how the inverted pendulum benchmark gives an effective and efficient application. Several real experiences, virtual models and web-based remote control laboratories will be presented with emphasis on the practical design implementation of this system. A bibliographical survey of different design control approaches and trendy robotic problems will be presented through applications to the inverted pendulum system. In total, 150 references in the open literature, dating back to 1960, are compiled to provide an overall picture of historical, current and challenging developments.
[ { "version": "v1", "created": "Tue, 13 May 2014 10:38:02 GMT" } ]
2014-05-14T00:00:00
[ [ "Boubaker", "Olfa", "" ] ]
new_dataset
0.997319
1405.3199
Hasnae Rahimi
Hasnae Rahimi and Hanan EL Bakkali
A New Trust Reputation System for E-Commerce Applications
7 pages, 12 references. International Journal of Computer Science Issues (IJCSI) 2013
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust Trust Reputation Systems (TRS) provide a most trustful reputation score for a specific product or service so as to support relying parties taking the right decision while interacting with an e-commerce application. Thus, TRS must rely on an appropriate architecture and suitable algorithms that are able to improve the selection, storage, generation and classification of textual feedbacks. In this work, we propose a new architecture for TRS in e-commerce applications. In fact, we propose an intelligent layer which displays to each feedback provider, who has already given his recommendation on a product, a collection of prefabricated feedbacks related to the same product. The proposed reputation algorithm generates better trust degree of the user, trust degree of the feedback and a better global reputation score of the product.
[ { "version": "v1", "created": "Tue, 13 May 2014 15:51:57 GMT" } ]
2014-05-14T00:00:00
[ [ "Rahimi", "Hasnae", "" ], [ "Bakkali", "Hanan EL", "" ] ]
new_dataset
0.987248
1307.0118
Yanshu Zhu
Yanshu Zhu, Feng Sun, Yi-King Choi, Bert J\"uttler, Wenping Wang
Computing a Compact Spline Representation of the Medial Axis Transform of a 2D Shape
GMP14 (Geometric Modeling and Processing)
null
10.1016/j.gmod.2014.03.007
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a full pipeline for computing the medial axis transform of an arbitrary 2D shape. The instability of the medial axis transform is overcome by a pruning algorithm guided by a user-defined Hausdorff distance threshold. The stable medial axis transform is then approximated by spline curves in 3D to produce a smooth and compact representation. These spline curves are computed by minimizing the approximation error between the input shape and the shape represented by the medial axis transform. Our results on various 2D shapes suggest that our method is practical and effective, and yields faithful and compact representations of medial axis transforms of 2D shapes.
[ { "version": "v1", "created": "Sat, 29 Jun 2013 15:32:23 GMT" }, { "version": "v2", "created": "Tue, 3 Dec 2013 11:44:55 GMT" }, { "version": "v3", "created": "Sat, 10 May 2014 19:56:31 GMT" } ]
2014-05-13T00:00:00
[ [ "Zhu", "Yanshu", "" ], [ "Sun", "Feng", "" ], [ "Choi", "Yi-King", "" ], [ "Jüttler", "Bert", "" ], [ "Wang", "Wenping", "" ] ]
new_dataset
0.985527
1401.5980
Dimitri Kartsaklis
Dimitri Kartsaklis, Mehrnoosh Sadrzadeh, Stephen Pulman, Bob Coecke
Reasoning about Meaning in Natural Language with Compact Closed Categories and Frobenius Algebras
null
null
null
null
cs.CL cs.AI math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compact closed categories have found applications in modeling quantum information protocols by Abramsky-Coecke. They also provide semantics for Lambek's pregroup algebras, applied to formalizing the grammatical structure of natural language, and are implicit in a distributional model of word meaning based on vector spaces. Specifically, in previous work Coecke-Clark-Sadrzadeh used the product category of pregroups with vector spaces and provided a distributional model of meaning for sentences. We recast this theory in terms of strongly monoidal functors and advance it via Frobenius algebras over vector spaces. The former are used to formalize topological quantum field theories by Atiyah and Baez-Dolan, and the latter are used to model classical data in quantum protocols by Coecke-Pavlovic-Vicary. The Frobenius algebras enable us to work in a single space in which meanings of words, phrases, and sentences of any structure live. Hence we can compare meanings of different language constructs and enhance the applicability of the theory. We report on experimental results on a number of language tasks and verify the theoretical predictions.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 14:20:58 GMT" } ]
2014-05-13T00:00:00
[ [ "Kartsaklis", "Dimitri", "" ], [ "Sadrzadeh", "Mehrnoosh", "" ], [ "Pulman", "Stephen", "" ], [ "Coecke", "Bob", "" ] ]
new_dataset
0.994535
1405.2602
Guanghui Zhang
Bocong Chen, San Ling, Guanghui Zhang
Self-dual cyclic codes over finite chain rings
15 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $R$ be a finite commutative chain ring with unique maximal ideal $\langle \gamma\rangle$, and let $n$ be a positive integer coprime with the characteristic of $R/\langle \gamma\rangle$. In this paper, the algebraic structure of cyclic codes of length $n$ over $R$ is investigated. Some new necessary and sufficient conditions for the existence of nontrivial self-dual cyclic codes are provided. An enumeration formula for the self-dual cyclic codes is also studied.
[ { "version": "v1", "created": "Sun, 11 May 2014 23:31:19 GMT" } ]
2014-05-13T00:00:00
[ [ "Chen", "Bocong", "" ], [ "Ling", "San", "" ], [ "Zhang", "Guanghui", "" ] ]
new_dataset
0.975845
1405.2605
Hassan Ghozlan
Hassan Ghozlan and Gerhard Kramer
Phase Modulation for Discrete-time Wiener Phase Noise Channels with Oversampling at High SNR
To appear in ISIT 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A discrete-time Wiener phase noise channel model is introduced in which multiple samples are available at the output for every input symbol. A lower bound on the capacity is developed. At high signal-to-noise ratio (SNR), if the number of samples per symbol grows with the square root of the SNR, the capacity pre-log is at least 3/4. This is strictly greater than the capacity pre-log of the Wiener phase noise channel with only one sample per symbol, which is 1/2. It is shown that amplitude modulation achieves a pre-log of 1/2 while phase modulation achieves a pre-log of at least 1/4.
[ { "version": "v1", "created": "Mon, 12 May 2014 00:25:06 GMT" } ]
2014-05-13T00:00:00
[ [ "Ghozlan", "Hassan", "" ], [ "Kramer", "Gerhard", "" ] ]
new_dataset
0.962132
cs/0401020
Gabriele Scheler
Gabriele Scheler and Johann Schumann
Presynaptic modulation as fast synaptic switching: state-dependent modulation of task performance
6 pages, 13 figures
Neural Networks, 2003. Proceedings of the International Joint Conference on (Volume:1 ) 218 - 223
10.1109/IJCNN.2003.1223347
null
cs.NE q-bio.NC
null
Neuromodulatory receptors in presynaptic position have the ability to suppress synaptic transmission for seconds to minutes when fully engaged. This effectively alters the synaptic strength of a connection. Much work on neuromodulation has rested on the assumption that these effects are uniform at every neuron. However, there is considerable evidence to suggest that presynaptic regulation may be in effect synapse-specific. This would define a second "weight modulation" matrix, which reflects presynaptic receptor efficacy at a given site. Here we explore functional consequences of this hypothesis. By analyzing and comparing the weight matrices of networks trained on different aspects of a task, we identify the potential for a low complexity "modulation matrix", which allows to switch between differently trained subtasks while retaining general performance characteristics for the task. This means that a given network can adapt itself to different task demands by regulating its release of neuromodulators. Specifically, we suggest that (a) a network can provide optimized responses for related classification tasks without the need to train entirely separate networks and (b) a network can blend a "memory mode" which aims at reproducing memorized patterns and a "novelty mode" which aims to facilitate classification of new patterns. We relate this work to the known effects of neuromodulators on brain-state dependent processing.
[ { "version": "v1", "created": "Sun, 25 Jan 2004 04:22:00 GMT" } ]
2014-05-13T00:00:00
[ [ "Scheler", "Gabriele", "" ], [ "Schumann", "Johann", "" ] ]
new_dataset
0.996848
1404.6851
Fabio Brochero Martinez
F.E. Brochero Mart\'inez, C. R. Giraldo Vergara
Weight enumerator of some irreducible cyclic codes
Submitted to Designs, Codes and Cryptography, 8 pages
null
null
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we show explicitly all possible weight enumerators for every irreducible cyclic code of length $n$ over a finite field $\mathbb F_q$, in the case which each prime divisor of $n$ is also a divisor of $q-1$.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 01:28:30 GMT" }, { "version": "v2", "created": "Thu, 8 May 2014 21:13:33 GMT" } ]
2014-05-12T00:00:00
[ [ "Martínez", "F. E. Brochero", "" ], [ "Vergara", "C. R. Giraldo", "" ] ]
new_dataset
0.988322
1405.1833
Bart Bogaerts
Bart Bogaerts, Joost Vennekens, Marc Denecker, Jan Van den Bussche
FO(C): A Knowledge Representation Language of Causality
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cause-effect relations are an important part of human knowledge. In real life, humans often reason about complex causes linked to complex effects. By comparison, existing formalisms for representing knowledge about causal relations are quite limited in the kind of specifications of causes and effects they allow. In this paper, we present the new language C-Log, which offers a significantly more expressive representation of effects, including such features as the creation of new objects. We show how C-Log integrates with first-order logic, resulting in the language FO(C). We also compare FO(C) with several related languages and paradigms, including inductive definitions, disjunctive logic programming, business rules and extensions of Datalog.
[ { "version": "v1", "created": "Thu, 8 May 2014 08:25:52 GMT" }, { "version": "v2", "created": "Fri, 9 May 2014 08:20:22 GMT" } ]
2014-05-12T00:00:00
[ [ "Bogaerts", "Bart", "" ], [ "Vennekens", "Joost", "" ], [ "Denecker", "Marc", "" ], [ "Bussche", "Jan Van den", "" ] ]
new_dataset
0.996179
1306.3604
Tian-Xian Zhang
Tian-Xian Zhang and Xiang-Gen Xia
OFDM Synthetic Aperture Radar Imaging with Sufficient Cyclic Prefix
This version has been accepted by IEEE Transactions on Geoscience and Remote Sensing. IEEE Transactions on Geoscience and Remote Sensing 2014
null
10.1109/TGRS.2014.2322813
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
The existing linear frequency modulated (LFM) (or step frequency) and random noise synthetic aperture radar (SAR) systems may correspond to the frequency hopping (FH) and direct sequence (DS) spread spectrum systems in the past second and third generation wireless communications. Similar to the current and future wireless communications generations, in this paper, we propose OFDM SAR imaging, where a sufficient cyclic prefix (CP) is added to each OFDM pulse. The sufficient CP insertion converts an inter-symbol interference (ISI) channel from multipaths into multiple ISI-free subchannels as the key in a wireless communications system, and analogously, it provides an inter-range-cell interference (IRCI) free (high range resolution) SAR image in a SAR system. The sufficient CP insertion along with our newly proposed SAR imaging algorithm particularly for the OFDM signals also differentiates this paper from all the existing studies in the literature on OFDM radar signal processing. Simulation results are presented to illustrate the high range resolution performance of our proposed CP based OFDM SAR imaging algorithm.
[ { "version": "v1", "created": "Sat, 15 Jun 2013 20:29:10 GMT" }, { "version": "v2", "created": "Wed, 7 May 2014 20:24:11 GMT" } ]
2014-05-09T00:00:00
[ [ "Zhang", "Tian-Xian", "" ], [ "Xia", "Xiang-Gen", "" ] ]
new_dataset
0.999294
1403.7014
Takeshi Takahashi
Keita Emura and Akira Kanaoka and Satoshi Ohta and Takeshi Takahashi
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation
This is a preprint version of our paper presented in SAC'14, March 24-28, 2014, Gyeongju, Korea. ACMSAC 2014
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers. One simple approach for realizing anonymously authenticated communication is their simple combination, but this gives rise to another issue; how to build a secure channel. The current public key infrastructure cannot be used since the user's public key identifies the user. To cope with this issue, we propose a protocol that uses identity-based encryption for packet encryption without sacrificing anonymity, and group signature for anonymous user authentication. Communications in the protocol take place through proxy entities that conceal users' IP addresses from service providers. The underlying group signature is customized to meet our objective and improve its efficiency. We also introduce a proof-of-concept implementation to demonstrate the protocol's feasibility. We compare its performance to SSL communication and demonstrate its practicality, and conclude that the protocol realizes secure, anonymous, and authenticated communication between users and service providers with practical performance.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 13:14:20 GMT" }, { "version": "v2", "created": "Thu, 3 Apr 2014 00:50:59 GMT" }, { "version": "v3", "created": "Thu, 8 May 2014 00:49:54 GMT" } ]
2014-05-09T00:00:00
[ [ "Emura", "Keita", "" ], [ "Kanaoka", "Akira", "" ], [ "Ohta", "Satoshi", "" ], [ "Takahashi", "Takeshi", "" ] ]
new_dataset
0.993331
1403.8123
Jihua Lu Dr
Jihua Lu, Jianping An, Xiangming Li, Jie Yang and Lei Yang
A Percolation based M2M Networking Architecture for Data Transmission and Routing
15 pages, 7 figures. We propose a percolation based routing and data transmission method for the M2M network, which consists of routing phase and transmission phases. In the routing phase, probes packets are transmitted and flowed in the network, multiple paths are built to form a route. After that, the data file will be fountain encoded and the transmitted
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 6, NO. 2, Feb 2012
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.
[ { "version": "v1", "created": "Mon, 31 Mar 2014 18:47:17 GMT" }, { "version": "v2", "created": "Thu, 8 May 2014 11:48:38 GMT" } ]
2014-05-09T00:00:00
[ [ "Lu", "Jihua", "" ], [ "An", "Jianping", "" ], [ "Li", "Xiangming", "" ], [ "Yang", "Jie", "" ], [ "Yang", "Lei", "" ] ]
new_dataset
0.986574
1405.1916
Tuan Phung-Duc
Kazuki Kajiwara and Tuan Phung-Duc
Asymptotic and Numerical Analysis of Multiserver Retrial Queue with Guard Channel for Cellular Networks
null
Proceedings of the Eight International Conference on Matrix-Analytic Methods in Stochastic Models (MAM8), NIT Calicut, Kerala, India, pp. 85--102, January 06--10, 2014
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a retrial queueing model for a base station in cellular networks where fresh calls and handover calls are available. Fresh calls are initiated from the cell of the base station. On the other hand, a handover call has been connecting to a base station and moves to another one. In order to keep the continuation of the communication, it is desired that an available channel in the new base station is immediately assigned to the handover call. To this end, a channel is reserved as the guard channel for handover calls in base stations. Blocked fresh and handover calls join a virtual orbit and repeat their attempts in a later time. We assume that a base station can recognize retrial calls and give them the same priority as that of handover calls. We model a base station by a multiserver retrial queue with priority customers for which a level-dependent QBD process is formulated. We obtain Taylor series expansion for the nonzero elements of the rate matrices of the level-dependent QBD. Using the expansion results, we obtain an asymptotic upper bound for the joint stationary distribution of the number of busy channels and that of customers in the orbit. Furthermore, we derive an efficient numerical algorithm to calculate the joint stationary distribution.
[ { "version": "v1", "created": "Thu, 8 May 2014 13:17:09 GMT" } ]
2014-05-09T00:00:00
[ [ "Kajiwara", "Kazuki", "" ], [ "Phung-Duc", "Tuan", "" ] ]
new_dataset
0.999774
1405.1980
Sergio Consoli
Sergio Consoli, Jose Andres Moreno-Perez, Kenneth Darby-Dowman, Nenad Mladenovic
Mejora de la exploracion y la explotacion de las heuristicas constructivas para el MLSTP
9 pages, in Spanish. Quinto Congreso Espanol de Metaheuristicas, Algoritmos Evolutivos y Bioinspirados (MAEB 2007), Tenerife, Spain, available at: http://www.redheur.org/files/MAEBs/MAEB07.pdf; Proceedings of the Quinto Congreso Espanol de Metaheuristicas, Algoritmos Evolutivos y Bioinspirados, 2007
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies constructive heuristics for the minimum labelling spanning tree (MLST) problem. The purpose is to find a spanning tree that uses edges that are as similar as possible. Given an undirected labeled connected graph (i.e., with a label or color for each edge), the minimum labeling spanning tree problem seeks a spanning tree whose edges have the smallest possible number of distinct labels. The model can represent many real-world problems in telecommunication networks, electric networks, and multimodal transportation networks, among others, and the problem has been shown to be NP-complete even for complete graphs. A primary heuristic, named the maximum vertex covering algorithm has been proposed. Several versions of this constructive heuristic have been proposed to improve its efficiency. Here we describe the problem, review the literature and compare some variants of this algorithm.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 11:02:02 GMT" } ]
2014-05-09T00:00:00
[ [ "Consoli", "Sergio", "" ], [ "Moreno-Perez", "Jose Andres", "" ], [ "Darby-Dowman", "Kenneth", "" ], [ "Mladenovic", "Nenad", "" ] ]
new_dataset
0.967576
1405.1993
Mbida Mohamed
Mbida Mohamed and Ezzati Abdellah
OSCMAC_Duty_Cycle_with_Multi_Helpers_CT_Mode_WILEM_Technology_in_Wireless_Sensor_Networks
7 pages , 4 figures, International Journal of wireless and Mobile Networks IJWMN ( 2014 )
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Wireless Sensor Networks (WSNs) grow to be one of the dominant technology trends; new needs are continuously emerging and demanding more complex constraints in a duty cycle, such as extend the life time communication . The MAC layer plays a crucial role in these networks; it controls the communication module and manages the medium sharing. In this work we use OSC-MAC tackles combining with the performance of cooperative transmission (CT) in multi-hop WSN and the Wi-Lem technology
[ { "version": "v1", "created": "Thu, 8 May 2014 16:07:15 GMT" } ]
2014-05-09T00:00:00
[ [ "Mohamed", "Mbida", "" ], [ "Abdellah", "Ezzati", "" ] ]
new_dataset
0.999233
1211.4775
Carlo Alberto Furia
H.-Christian Estler, Carlo A. Furia, Martin Nordio, Marco Piccioni, and Bertrand Meyer
Contracts in Practice
null
Proceedings of the 19th International Symposium on Formal Methods (FM). Lecture Notes in Computer Science, 8442:230--246, Springer, May 2014
10.1007/978-3-319-06410-9_17
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contracts are a form of lightweight formal specification embedded in the program text. Being executable parts of the code, they encourage programmers to devote proper attention to specifications, and help maintain consistency between specification and implementation as the program evolves. The present study investigates how contracts are used in the practice of software development. Based on an extensive empirical analysis of 21 contract-equipped Eiffel, C#, and Java projects totaling more than 260 million lines of code over 7700 revisions, it explores, among other questions: 1) which kinds of contract elements (preconditions, postconditions, class invariants) are used more often; 2) how contracts evolve over time; 3) the relationship between implementation changes and contract changes; and 4) the role of inheritance in the process. It has found, among other results, that: the percentage of program elements that include contracts is above 33% for most projects and tends to be stable over time; there is no strong preference for a certain type of contract element; contracts are quite stable compared to implementations; and inheritance does not significantly affect qualitative trends of contract usage.
[ { "version": "v1", "created": "Tue, 20 Nov 2012 15:26:17 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2013 21:59:09 GMT" }, { "version": "v3", "created": "Sun, 19 May 2013 09:11:07 GMT" }, { "version": "v4", "created": "Tue, 28 May 2013 08:13:57 GMT" }, { "version": "v5", "created": "Fri, 15 Nov 2013 20:31:44 GMT" }, { "version": "v6", "created": "Wed, 26 Feb 2014 09:35:22 GMT" } ]
2014-05-08T00:00:00
[ [ "Estler", "H. -Christian", "" ], [ "Furia", "Carlo A.", "" ], [ "Nordio", "Martin", "" ], [ "Piccioni", "Marco", "" ], [ "Meyer", "Bertrand", "" ] ]
new_dataset
0.99275
1405.1605
Marco Guerini
Jacopo Staiano and Marco Guerini
DepecheMood: a Lexicon for Emotion Analysis from Crowd-Annotated News
To appear at ACL 2014. 7 pages
null
null
null
cs.CL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While many lexica annotated with words polarity are available for sentiment analysis, very few tackle the harder task of emotion analysis and are usually quite limited in coverage. In this paper, we present a novel approach for extracting - in a totally automated way - a high-coverage and high-precision lexicon of roughly 37 thousand terms annotated with emotion scores, called DepecheMood. Our approach exploits in an original way 'crowd-sourced' affective annotation implicitly provided by readers of news articles from rappler.com. By providing new state-of-the-art performances in unsupervised settings for regression and classification tasks, even using a na\"{\i}ve approach, our experiments show the beneficial impact of harvesting social media data for affective lexicon building.
[ { "version": "v1", "created": "Wed, 7 May 2014 13:40:47 GMT" } ]
2014-05-08T00:00:00
[ [ "Staiano", "Jacopo", "" ], [ "Guerini", "Marco", "" ] ]
new_dataset
0.997803
1211.5933
Yixin Cao
Yixin Cao and D\'aniel Marx
Interval Deletion is Fixed-Parameter Tractable
Final version, to appear in ACM Transactions on Algorithms
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the minimum \emph{interval deletion} problem, which asks for the removal of a set of at most $k$ vertices to make a graph of $n$ vertices into an interval graph. We present a parameterized algorithm of runtime $10^k \cdot n^{O(1)}$ for this problem, that is, we show the problem is fixed-parameter tractable.
[ { "version": "v1", "created": "Mon, 26 Nov 2012 12:42:52 GMT" }, { "version": "v2", "created": "Tue, 14 May 2013 14:53:58 GMT" }, { "version": "v3", "created": "Tue, 6 May 2014 19:33:50 GMT" } ]
2014-05-07T00:00:00
[ [ "Cao", "Yixin", "" ], [ "Marx", "Dániel", "" ] ]
new_dataset
0.996173
1405.1063
Hien Ngo Quoc
Hien Quoc Ngo, Himal A. Suraweera, Michail Matthaiou, Erik G. Larsson
Multipair Full-Duplex Relaying with Massive Arrays and Linear Processing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multipair decode-and-forward relay channel, where multiple sources transmit simultaneously their signals to multiple destinations with the help of a full-duplex relay station. We assume that the relay station is equipped with massive arrays, while all sources and destinations have a single antenna. The relay station uses channel estimates obtained from received pilots and zero-forcing (ZF) or maximum-ratio combining/maximum-ratio transmission (MRC/MRT) to process the signals. To reduce significantly the loop interference effect, we propose two techniques: i) using a massive receive antenna array; or ii) using a massive transmit antenna array together with very low transmit power at the relay station. We derive an exact achievable rate in closed-form for MRC/MRT processing and an analytical approximation of the achievable rate for ZF processing. This approximation is very tight, especially for large number of relay station antennas. These closed-form expressions enable us to determine the regions where the full-duplex mode outperforms the half-duplex mode, as well as, to design an optimal power allocation scheme. This optimal power allocation scheme aims to maximize the energy efficiency for a given sum spectral efficiency and under peak power constraints at the relay station and sources. Numerical results verify the effectiveness of the optimal power allocation scheme. Furthermore, we show that, by doubling the number of transmit/receive antennas at the relay station, the transmit power of each source and of the relay station can be reduced by 1.5dB if the pilot power is equal to the signal power, and by 3dB if the pilot power is kept fixed, while maintaining a given quality-of-service.
[ { "version": "v1", "created": "Mon, 5 May 2014 20:19:35 GMT" } ]
2014-05-07T00:00:00
[ [ "Ngo", "Hien Quoc", "" ], [ "Suraweera", "Himal A.", "" ], [ "Matthaiou", "Michail", "" ], [ "Larsson", "Erik G.", "" ] ]
new_dataset
0.982698
1405.1114
EPTCS
Cornelius Diekmann (Technische Universit\"at M\"unchen), Lars Hupel (Technische Universit\"at M\"unchen), Georg Carle (Technische Universit\"at M\"unchen)
Directed Security Policies: A Stateful Network Implementation
In Proceedings ESSS 2014, arXiv:1405.0554
EPTCS 150, 2014, pp. 20-34
10.4204/EPTCS.150.3
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.
[ { "version": "v1", "created": "Tue, 6 May 2014 00:53:42 GMT" } ]
2014-05-07T00:00:00
[ [ "Diekmann", "Cornelius", "", "Technische Universität München" ], [ "Hupel", "Lars", "", "Technische Universität München" ], [ "Carle", "Georg", "", "Technische Universität\n München" ] ]
new_dataset
0.957093
1405.1124
Marcello Balduccini
Marcello Balduccini, William C. Regli, Duc N. Nguyen
An ASP-Based Architecture for Autonomous UAVs in Dynamic Environments: Progress Report
Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional AI reasoning techniques have been used successfully in many domains, including logistics, scheduling and game playing. This paper is part of a project aimed at investigating how such techniques can be extended to coordinate teams of unmanned aerial vehicles (UAVs) in dynamic environments. Specifically challenging are real-world environments where UAVs and other network-enabled devices must communicate to coordinate---and communication actions are neither reliable nor free. Such network-centric environments are common in military, public safety and commercial applications, yet most research (even multi-agent planning) usually takes communications among distributed agents as a given. We address this challenge by developing an agent architecture and reasoning algorithms based on Answer Set Programming (ASP). ASP has been chosen for this task because it enables high flexibility of representation, both of knowledge and of reasoning tasks. Although ASP has been used successfully in a number of applications, and ASP-based architectures have been studied for about a decade, to the best of our knowledge this is the first practical application of a complete ASP-based agent architecture. It is also the first practical application of ASP involving a combination of centralized reasoning, decentralized reasoning, execution monitoring, and reasoning about network communications. This work has been empirically validated using a distributed network-centric software evaluation testbed and the results provide guidance to designers in how to understand and control intelligent systems that operate in these environments.
[ { "version": "v1", "created": "Tue, 6 May 2014 02:05:04 GMT" } ]
2014-05-07T00:00:00
[ [ "Balduccini", "Marcello", "" ], [ "Regli", "William C.", "" ], [ "Nguyen", "Duc N.", "" ] ]
new_dataset
0.995164
1405.1127
Wanchun Jiang
Wanchun Jiang, Fengyuan Ren, Xin Yue, Chuang Lin
Scale Congestion Control to Ultra-High Speed Ethernet
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Currently, Ethernet is broadly used in LAN, datacenter and enterprise networks, storage networks, high performance computing networks and so on. Along with the popularity of Ethernet comes the requirement of enhancing Ethernet with congestion control. On the other hand, Ethernet speed extends to 40Gbps and 100Gbps recently, and even 400Gbps in the near future. The ultra-high speed requires congestion control algorithms to adapt to the broad changes of bandwidth, and highlights the impacts of small delay by enlarging the bandwidth delay product. The state-of-art standard QCN is heuristically designed for the 1Gbps and 10Gbps Ethernet, and unaware of the challenges accompanying the ultra-high speed. To scale congestion control to ultra-high speed Ethernet, we propose the Adaptive Sliding Mode (ASM) congestion control algorithm, which is simple, stable, has fast and smooth convergence process, can tolerate the impacts of delay and adapt to the wide changes of bandwidth. Real experiments and simulations confirm these good properties and show that ASM outperforms QCN. Designing ASM, we find that the derivative of queue length is helpful to rate adjustment because it reflects the difference between bandwidth and aggregated sending rate. We also argue for enforcing congestion control system staying at the congestion boundary line, along which it automatically slides to stable point. These insights are also valuable to develop other congestion control algorithms in ultra-high speed networks.
[ { "version": "v1", "created": "Tue, 6 May 2014 02:15:44 GMT" } ]
2014-05-07T00:00:00
[ [ "Jiang", "Wanchun", "" ], [ "Ren", "Fengyuan", "" ], [ "Yue", "Xin", "" ], [ "Lin", "Chuang", "" ] ]
new_dataset
0.99592
1405.1155
Hatem Abou-zeid
Hatem Abou-zeid, Hossam S. Hassanein, Stefan Valentin, Mohamed Feteiha
A Lookback Scheduling Framework for Long-Term Quality-of-Service Over Multiple Cells
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In current cellular networks, schedulers allocate wireless channel resources to users based on instantaneous channel gains and short-term moving averages of user rates and queue lengths. By using only such short-term information, schedulers ignore the users' service history in previous cells and, thus, cannot guarantee long-term Quality of Service (QoS) when users traverse multiple cells with varying load and capacity. In this paper, we propose a new Long-term Lookback Scheduling (LLS) framework, which extends conventional short-term scheduling with long-term QoS information from previously traversed cells. We demonstrate the application of LLS for common channel-aware, as well as channel and queue-aware schedulers. The developed long-term schedulers also provide a controllable trade-off between emphasizing the immediate user QoS or the long-term measures. Our simulation results show high gains in long-term QoS without sacrificing short-term user requirements. Therefore, the proposed scheduling approach improves subscriber satisfaction and increases operational efficiency.
[ { "version": "v1", "created": "Tue, 6 May 2014 05:34:54 GMT" } ]
2014-05-07T00:00:00
[ [ "Abou-zeid", "Hatem", "" ], [ "Hassanein", "Hossam S.", "" ], [ "Valentin", "Stefan", "" ], [ "Feteiha", "Mohamed", "" ] ]
new_dataset
0.98602
1405.1183
Daniel Le Berre
Daniel Le Berre
Some thoughts about benchmarks for NMR
Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NMR community would like to build a repository of benchmarks to push forward the design of systems implementing NMR as it has been the case for many other areas in AI. There are a number of lessons which can be learned from the experience of other communi- ties. Here are a few thoughts about the requirements and choices to make before building such a repository.
[ { "version": "v1", "created": "Tue, 6 May 2014 08:09:13 GMT" } ]
2014-05-07T00:00:00
[ [ "Berre", "Daniel Le", "" ] ]
new_dataset
0.98371
1405.1374
Naman Agarwal
Naman Agarwal and Guy Kindler and Alexandra Kolla and Luca Trevisan
Unique Games on the Hypercube
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the validity of the Unique Games Conjecture when the constraint graph is the boolean hypercube. We construct an almost optimal integrality gap instance on the Hypercube for the Goemans-Williamson semidefinite program (SDP) for Max-2-LIN$(\mathbb{Z}_2)$. We conjecture that adding triangle inequalities to the SDP provides a polynomial time algorithm to solve Unique Games on the hypercube.
[ { "version": "v1", "created": "Sat, 3 May 2014 22:18:05 GMT" } ]
2014-05-07T00:00:00
[ [ "Agarwal", "Naman", "" ], [ "Kindler", "Guy", "" ], [ "Kolla", "Alexandra", "" ], [ "Trevisan", "Luca", "" ] ]
new_dataset
0.985045
1405.1403
Hyunsuk Ko
Rui Song, Hyunsuk Ko and C.C. Jay Kuo
MCL-3D: a database for stereoscopic image quality assessment using 2D-image-plus-depth source
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new stereoscopic image quality assessment database rendered using the 2D-image-plus-depth source, called MCL-3D, is described and the performance benchmarking of several known 2D and 3D image quality metrics using the MCL-3D database is presented in this work. Nine image-plus-depth sources are first selected, and a depth image-based rendering (DIBR) technique is used to render stereoscopic image pairs. Distortions applied to either the texture image or the depth image before stereoscopic image rendering include: Gaussian blur, additive white noise, down-sampling blur, JPEG and JPEG-2000 (JP2K) compression and transmission error. Furthermore, the distortion caused by imperfect rendering is also examined. The MCL-3D database contains 693 stereoscopic image pairs, where one third of them are of resolution 1024x728 and two thirds are of resolution 1920x1080. The pair-wise comparison was adopted in the subjective test for user friendliness, and the Mean Opinion Score (MOS) can be computed accordingly. Finally, we evaluate the performance of several 2D and 3D image quality metrics applied to MCL-3D. All texture images, depth images, rendered image pairs in MCL-3D and their MOS values obtained in the subjective test are available to the public (http://mcl.usc.edu/mcl-3d-database/) for future research and development.
[ { "version": "v1", "created": "Sun, 23 Mar 2014 23:31:49 GMT" } ]
2014-05-07T00:00:00
[ [ "Song", "Rui", "" ], [ "Ko", "Hyunsuk", "" ], [ "Kuo", "C. C. Jay", "" ] ]
new_dataset
0.999634
1405.1406
Sallam Abualhaija
Sallam Abualhaija, Karl-Heinz Zimmermann
D-Bees: A Novel Method Inspired by Bee Colony Optimization for Solving Word Sense Disambiguation
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Word sense disambiguation (WSD) is a problem in the field of computational linguistics given as finding the intended sense of a word (or a set of words) when it is activated within a certain context. WSD was recently addressed as a combinatorial optimization problem in which the goal is to find a sequence of senses that maximize the semantic relatedness among the target words. In this article, a novel algorithm for solving the WSD problem called D-Bees is proposed which is inspired by bee colony optimization (BCO)where artificial bee agents collaborate to solve the problem. The D-Bees algorithm is evaluated on a standard dataset (SemEval 2007 coarse-grained English all-words task corpus)and is compared to simulated annealing, genetic algorithms, and two ant colony optimization techniques (ACO). It will be observed that the BCO and ACO approaches are on par.
[ { "version": "v1", "created": "Tue, 6 May 2014 19:26:35 GMT" } ]
2014-05-07T00:00:00
[ [ "Abualhaija", "Sallam", "" ], [ "Zimmermann", "Karl-Heinz", "" ] ]
new_dataset
0.995783
1203.2834
Bin Li
Bin Li and Atilla Eryilmaz
A Fast-CSMA Algorithm for Deadline-Constrained Scheduling over Wireless Fading Channels
This work appears in workshop on Resource Allocation and Cooperation in Wireless Networks (RAWNET), Princeton, NJ, May, 2011
The journal version of this paper is published in IEEE Transactions on Wireless Communications, 12(7): 3278-3288, 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, low-complexity and distributed Carrier Sense Multiple Access (CSMA)-based scheduling algorithms have attracted extensive interest due to their throughput-optimal characteristics in general network topologies. However, these algorithms are not well-suited for serving real-time traffic under time-varying channel conditions for two reasons: (1) the mixing time of the underlying CSMA Markov Chain grows with the size of the network, which, for large networks, generates unacceptable delay for deadline-constrained traffic; (2) since the dynamic CSMA parameters are influenced by the arrival and channel state processes, the underlying CSMA Markov Chain may not converge to a steady-state under strict deadline constraints and fading channel conditions. In this paper, we attack the problem of distributed scheduling for serving real-time traffic over time-varying channels. Specifically, we consider fully-connected topologies with independently fading channels (which can model cellular networks) in which flows with short-term deadline constraints and long-term drop rate requirements are served. To that end, we first characterize the maximal set of satisfiable arrival processes for this system and, then, propose a Fast-CSMA (FCSMA) policy that is shown to be optimal in supporting any real-time traffic that is within the maximal satisfiable set. These theoretical results are further validated through simulations to demonstrate the relative efficiency of the FCSMA policy compared to some of the existing CSMA-based algorithms.
[ { "version": "v1", "created": "Tue, 13 Mar 2012 15:29:40 GMT" } ]
2014-05-06T00:00:00
[ [ "Li", "Bin", "" ], [ "Eryilmaz", "Atilla", "" ] ]
new_dataset
0.990791
1206.3804
Dimitris S. Papailiopoulos
Dimitris S. Papailiopoulos and Alexandros G. Dimakis
Locally Repairable Codes
presented at ISIT 2012, accepted for publication in IEEE Trans. IT, 2014
null
null
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems for large-scale applications typically use replication for reliability. Recently, erasure codes were used to reduce the large storage overhead, while increasing data reliability. A main limitation of off-the-shelf erasure codes is their high-repair cost during single node failure events. A major open problem in this area has been the design of codes that {\it i)} are repair efficient and {\it ii)} achieve arbitrarily high data rates. In this paper, we explore the repair metric of {\it locality}, which corresponds to the number of disk accesses required during a {\color{black}single} node repair. Under this metric we characterize an information theoretic trade-off that binds together locality, code distance, and the storage capacity of each node. We show the existence of optimal {\it locally repairable codes} (LRCs) that achieve this trade-off. The achievability proof uses a locality aware flow-graph gadget which leads to a randomized code construction. Finally, we present an optimal and explicit LRC that achieves arbitrarily high data-rates. Our locality optimal construction is based on simple combinations of Reed-Solomon blocks.
[ { "version": "v1", "created": "Sun, 17 Jun 2012 22:47:08 GMT" }, { "version": "v2", "created": "Sat, 3 May 2014 16:22:02 GMT" } ]
2014-05-06T00:00:00
[ [ "Papailiopoulos", "Dimitris S.", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
new_dataset
0.999206
1312.3665
David Wolinsky
David Isaac Wolinsky and Bryan Ford
Managing NymBoxes for Identity and Tracking Protection
16 pages, 7 figure, 1 table
null
null
null
cs.OS cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the attempts of well-designed anonymous communication tools to protect users from tracking or identification, flaws in surrounding software (such as web browsers) and mistakes in configuration may leak the user's identity. We introduce Nymix, an anonymity-centric operating system architecture designed "top-to-bottom" to strengthen identity- and tracking-protection. Nymix's core contribution is OS support for nym-browsing: independent, parallel, and ephemeral web sessions. Each web session, or pseudonym, runs in a unique virtual machine (VM) instance evolving from a common base state with support for long-lived sessions which can be anonymously stored to the cloud, avoiding de-anonymization despite potential confiscation or theft. Nymix allows a user to safely browse the Web using various different transports simultaneously through a pluggable communication model that supports Tor, Dissent, and a private browsing mode. In evaluations, Nymix consumes 600 MB per nymbox and loads within 15 to 25 seconds.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 22:38:08 GMT" }, { "version": "v2", "created": "Mon, 5 May 2014 16:05:35 GMT" } ]
2014-05-06T00:00:00
[ [ "Wolinsky", "David Isaac", "" ], [ "Ford", "Bryan", "" ] ]
new_dataset
0.998026
1405.0650
Djamal Ziani
Djamal Ziani
Configuration in ERP SaaS Multi-Tenancy
17 pages, 9 figures
D. Ziani, "Configuration in ERP SaaS Multi-Tenancy",International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), April 2014,Volume 4, Number 2
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software as a Service (SaaS) becomes in this decade the focus of many enterprises and research. SaaS provides software application as Web based delivery to server many customers. This sharing of infrastructure and application provided by Saas has a great benefit to customers, since it reduces costs, minimizes risks, improves their competitive positioning, as well as seeks out innovative. SaaS application is generally developed with standardized software functionalities to serve as many customers as possible. However many customers ask to change the standardized provided functions according to their specific business needs, and this can be achieve through the configuration and customization provided by the SaaS vendor. Allowing many customers to change software configurations without impacting others customers and with preserving security and efficiency of the provided services, becomes a big challenge to SaaS vendors, who are oblige to design new strategies and architectures. Multi-tenancy (MT) architectures allow multiple customers to be consolidated into the same operational system without changing anything in the vendor source code. In this paper, we will present how the configuration can be done on an ERP web application in a Multi-Tenancy SaaS environment.
[ { "version": "v1", "created": "Sun, 4 May 2014 05:45:59 GMT" } ]
2014-05-06T00:00:00
[ [ "Ziani", "Djamal", "" ] ]
new_dataset
0.993513
1405.0660
He Jin
Jin He, Mianxiong Dong, Kaoru Ota, Minyu Fan, Guangwei Wang
NetSecCC: A Scalable and Fault-tolerant Architecture without Outsourcing Cloud Network Security
10pages, 10figures
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern cloud computing platforms based on virtual machine monitors carry a variety of complex business that present many network security vulnerabilities. At present, the traditional architecture employs a number of security devices at front-end of cloud computing to protect its network security. Under the new environment, however, this approach can not meet the needs of cloud security. New cloud security vendors and academia also made great efforts to solve network security of cloud computing, unfortunately, they also cannot provide a perfect and effective method to solve this problem. We introduce a novel network security architecture for cloud computing (NetSecCC) that addresses this problem. NetSecCC not only provides an effective solution for network security issues of cloud computing, but also greatly improves in scalability, fault-tolerant, resource utilization, etc. We have implemented a proof-of-concept prototype about NetSecCC and proved by experiments that NetSecCC is an effective architecture with minimal performance overhead that can be applied to the extensive practical promotion in cloud computing.
[ { "version": "v1", "created": "Sun, 4 May 2014 07:31:42 GMT" } ]
2014-05-06T00:00:00
[ [ "He", "Jin", "" ], [ "Dong", "Mianxiong", "" ], [ "Ota", "Kaoru", "" ], [ "Fan", "Minyu", "" ], [ "Wang", "Guangwei", "" ] ]
new_dataset
0.999163
1405.0712
Ling Cheng
Bo Cheng (Guangdong University of Foreign Studies) and Ling Cheng (University of the Witwatersrand)
Single machine slack due-window assignment and scheduling of linear time-dependent deteriorating jobs and a deteriorating maintenance activity
Submitted - Under Review
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the slack due-window assignment model and study a single machine scheduling problem of linear time-dependent deteriorating jobs and a deteriorating maintenance activity. The cost for each job consists of four components: earliness, tardiness, window location and window size. The objective is to schedule the jobs and to assign the maintenance activity and due-windows such that the total cost among all the jobs is minimized. A polynomial-time algorithm with the running time not exceeding $O(n^2logn)$ to give a solution to this problem is introduced, where $n$ is the number of jobs.
[ { "version": "v1", "created": "Sun, 4 May 2014 16:24:38 GMT" } ]
2014-05-06T00:00:00
[ [ "Cheng", "Bo", "", "Guangdong University of Foreign Studies" ], [ "Cheng", "Ling", "", "University of the Witwatersrand" ] ]
new_dataset
0.954854
1405.0749
Salman Hooshmand
Seyed M. Mirtaheri, Mustafa Emre Din\c{c}kt\"urk, Salman Hooshmand, Gregor V. Bochmann, Guy-Vincent Jourdan, Iosif Viorel Onut
A Brief History of Web Crawlers
null
Proc. of CASCON 2013, Toronto, Nov. 2013
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web crawlers visit internet applications, collect data, and learn about new web pages from visited pages. Web crawlers have a long and interesting history. Early web crawlers collected statistics about the web. In addition to collecting statistics about the web and indexing the applications for search engines, modern crawlers can be used to perform accessibility and vulnerability checks on the application. Quick expansion of the web, and the complexity added to web applications have made the process of crawling a very challenging one. Throughout the history of web crawling many researchers and industrial groups addressed different issues and challenges that web crawlers face. Different solutions have been proposed to reduce the time and cost of crawling. Performing an exhaustive crawl is a challenging question. Additionally capturing the model of a modern web application and extracting data from it automatically is another open question. What follows is a brief history of different technique and algorithms used from the early days of crawling up to the recent days. We introduce criteria to evaluate the relative performance of web crawlers. Based on these criteria we plot the evolution of web crawlers and compare their performance
[ { "version": "v1", "created": "Mon, 5 May 2014 00:06:25 GMT" } ]
2014-05-06T00:00:00
[ [ "Mirtaheri", "Seyed M.", "" ], [ "Dinçktürk", "Mustafa Emre", "" ], [ "Hooshmand", "Salman", "" ], [ "Bochmann", "Gregor V.", "" ], [ "Jourdan", "Guy-Vincent", "" ], [ "Onut", "Iosif Viorel", "" ] ]
new_dataset
0.998278
1405.0806
Pei Dongbin
X. R. Li, D.B. Pei, Q. Liu and R.Shen
Design of a capacitor-less low-dropout voltage regulator
6pages,7figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A solution to the stability of capacitor-less low-dropout regulators with a 4pF Miller capacitor in Multi-level current amplifier is proposed. With the Miller compensation, a more than 50{\deg}phase margin is guaranteed in full load. An extra fast transient circuit is adopted to reduce stable time and peak voltage. When the load changes from light to heavy, the peak voltage is 40mV and chip quiescent current is only 45uA.
[ { "version": "v1", "created": "Mon, 5 May 2014 07:40:42 GMT" } ]
2014-05-06T00:00:00
[ [ "Li", "X. R.", "" ], [ "Pei", "D. B.", "" ], [ "Liu", "Q.", "" ], [ "Shen", "R.", "" ] ]
new_dataset
0.998587
1405.0822
Sakthivel P
P. Sakthivel, P. Krishna Sankar
Multi-Path Routing and Wavelength Assignment (RWA) Algorithm for WDM Based Optical Networks
6 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In optical WDM networks, transmission of information along optical lines is advantageous since it has high transmission capacity, scalability, feasibility and also high reliability. But large amount of information is being carried; any problem during transmission can lead to severe damage to the data being carried. Hence it is essential to consider the routing as well as the wavelength assignment problems and then develop a combined solution for both the problems. In this paper, we propose to develop a routing and wavelength assignment algorithm for selecting the suitable alternate path for the data packets transmission. Two stages are based on the available bandwidth and the number of wavelength used in the link as construction of alternate paths, route and wavelength selection. In proposed work, Adaptive Routing and First-Fit Wavelength Assignment (AR-FFWA) algorithm to be used. For each pair of source and destination, the path with the minimum granularity values are selected as the primary path for data transmission, allocating the sufficient wavelength and the performances will be evaluated by using ns-2 simulation models. When we compared to existing system the overall blocking probability will be reduced to too low.
[ { "version": "v1", "created": "Mon, 5 May 2014 08:34:25 GMT" } ]
2014-05-06T00:00:00
[ [ "Sakthivel", "P.", "" ], [ "Sankar", "P. Krishna", "" ] ]
new_dataset
0.985366
1405.0877
Simon Kramer
Simon Kramer
A Galois-Connection between Cattell's and Szondi's Personality Profiles
closely related to arXiv:1403.2000 as explained in the first paragraph
null
null
null
cs.CE cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
We propose a computable Galois-connection between, on the one hand, Cattell's 16-Personality-Factor (16PF) Profiles, one of the most comprehensive and widely-used personality measures for non-psychiatric populations and their containing PsychEval Personality Profiles (PPPs) for psychiatric populations, and, on the other hand, Szondi's personality profiles (SPPs), a less well-known but, as we show, finer personality measure for psychiatric as well as non-psychiatric populations (conceived as a unification of the depth psychology of S. Freud, C.G. Jung, and A. Adler). The practical significance of our result is that our Galois-connection provides a pair of computable, interpreting translations between the two personality spaces of PPPs (containing the 16PFs) and SPPs: one concrete from PPP-space to SPP-space (because SPPs are finer than PPPs) and one abstract from SPP-space to PPP-space (because PPPs are coarser than SPPs). Thus Cattell's and Szondi's personality-test results are mutually interpretable and inter-translatable, even automatically by computers.
[ { "version": "v1", "created": "Mon, 5 May 2014 12:45:11 GMT" } ]
2014-05-06T00:00:00
[ [ "Kramer", "Simon", "" ] ]
new_dataset
0.994045
1405.0910
Michelle Silv\'eria
Michelle Kr\"uger Silv\'eria
Virtual Windshields: Merging Reality and Digital Content to Improve the Driving Experience
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the use of the automobile as the primary mode of transportation has been increasing and driving has become an important part of daily life. Driving is a multi-sensory experience as drivers rely on their senses to provide them with important information. In a vehicular context human senses are all too often limited and obstructed. Today, road accidents constitute the eighth leading cause of death. The escalation of technology has propelled new ways in which driver's senses may be augmented. The enclosed aspect of a car, allied with the configuration of the controls and displays directed towards the driver, offer significant advantages for augmented reality (AR) systems when considering the amount of immersion it can provide to the user. In addition, the inherent mobility and virtually unlimited power autonomy transform cars into perfect mobile computing platforms. However, automobiles currently present limited network connectivity and thus the created augmented objects are merely providing information captured by in-vehicle sensors, cameras and other databases. By combining the new paradigm of Vehicular Ad Hoc Networking (VANET) with AR human machine interfaces, we show that it is possible to design novel cooperative Advanced Driver Assistance Systems (ADAS), that base the creation of AR content on the information collected from neighbouring vehicles or roadside infrastructures. As such we implement prototypes of both visual and acoustic AR systems, which can significantly improve the driving experience. We believe our results contribute to the formulation of a vision where the vehicle is perceived as an extension of the body which permeates the human senses to the world outside the vessel, where the car is used as a better, multi-sensory immersive version of a mobile phone that integrates touch, vision and sound enhancements, leveraging unique properties of VANET.
[ { "version": "v1", "created": "Mon, 5 May 2014 14:28:13 GMT" } ]
2014-05-06T00:00:00
[ [ "Silvéria", "Michelle Krüger", "" ] ]
new_dataset
0.971306
1405.0329
Yixin Cao
Yixin Cao, Luciano N. Grippo, Mart\'in D. Safe
Forbidden Induced Subgraphs of Normal Helly Circular-Arc Graphs: Characterization and Detection
Preliminary results of this paper appeared in the proceedings of SBPO 2012 and FAW 2014
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A normal Helly circular-arc graph is the intersection graph of arcs on a circle of which no three or less arcs cover the whole circle. Lin, Soulignac, and Szwarcfiter [Discrete Appl. Math. 2013] characterized circular-arc graphs that are not normal Helly circular-arc graphs, and used it to develop the first recognition algorithm for this graph class. As open problems, they ask for the forbidden induced subgraph characterization and a direct recognition algorithm for normal Helly circular-arc graphs, both of which are resolved by the current paper. Moreover, when the input is not a normal Helly circular-arc graph, our recognition algorithm finds in linear time a minimal forbidden induced subgraph as certificate.
[ { "version": "v1", "created": "Fri, 2 May 2014 01:03:56 GMT" } ]
2014-05-05T00:00:00
[ [ "Cao", "Yixin", "" ], [ "Grippo", "Luciano N.", "" ], [ "Safe", "Martín D.", "" ] ]
new_dataset
0.994785
1405.0413
Renato J Cintra
F. M. Bayer, R. J. Cintra, A. Madanayake, U. S. Potluri
Multiplierless Approximate 4-point DCT VLSI Architectures for Transform Block Coding
5 pages, 1 figure, corrected Figure 1 (published paper in EL is incorrect)
Electronics Letters, vol. 49, no. 24, pp. 1532-1534, 2013
10.1049/el.2013.1352
null
cs.AR cs.MM cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two multiplierless algorithms are proposed for 4x4 approximate-DCT for transform coding in digital video. Computational architectures for 1-D/2-D realisations are implemented using Xilinx FPGA devices. CMOS synthesis at the 45 nm node indicate real-time operation at 1 GHz yielding 4x4 block rates of 125 MHz at less than 120 mW of dynamic power consumption.
[ { "version": "v1", "created": "Fri, 2 May 2014 14:29:02 GMT" } ]
2014-05-05T00:00:00
[ [ "Bayer", "F. M.", "" ], [ "Cintra", "R. J.", "" ], [ "Madanayake", "A.", "" ], [ "Potluri", "U. S.", "" ] ]
new_dataset
0.974094
1405.0006
William Patera
Moritz Kassner, William Patera, Andreas Bulling
Pupil: An Open Source Platform for Pervasive Eye Tracking and Mobile Gaze-based Interaction
10 pages, 9 figures
null
null
null
cs.CV cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Commercial head-mounted eye trackers provide useful features to customers in industry and research but are expensive and rely on closed source hardware and software. This limits the application areas and use of mobile eye tracking to expert users and inhibits user-driven development, customisation, and extension. In this paper we present Pupil -- an accessible, affordable, and extensible open source platform for mobile eye tracking and gaze-based interaction. Pupil comprises 1) a light-weight headset with high-resolution cameras, 2) an open source software framework for mobile eye tracking, as well as 3) a graphical user interface (GUI) to playback and visualize video and gaze data. Pupil features high-resolution scene and eye cameras for monocular and binocular gaze estimation. The software and GUI are platform-independent and include state-of-the-art algorithms for real-time pupil detection and tracking, calibration, and accurate gaze estimation. Results of a performance evaluation show that Pupil can provide an average gaze estimation accuracy of 0.6 degree of visual angle (0.08 degree precision) with a latency of the processing pipeline of only 0.045 seconds.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 16:21:56 GMT" } ]
2014-05-02T00:00:00
[ [ "Kassner", "Moritz", "" ], [ "Patera", "William", "" ], [ "Bulling", "Andreas", "" ] ]
new_dataset
0.99295
1405.0054
Marco Montali
Giuseppe De Giacomo and Riccardo De Masellis and Marco Grasso and Fabrizio Maggi and Marco Montali
LTLf and LDLf Monitoring: A Technical Report
null
null
null
null
cs.AI cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Runtime monitoring is one of the central tasks to provide operational decision support to running business processes, and check on-the-fly whether they comply with constraints and rules. We study runtime monitoring of properties expressed in LTL on finite traces (LTLf) and in its extension LDLf. LDLf is a powerful logic that captures all monadic second order logic on finite traces, which is obtained by combining regular expressions and LTLf, adopting the syntax of propositional dynamic logic (PDL). Interestingly, in spite of its greater expressivity, LDLf has exactly the same computational complexity of LTLf. We show that LDLf is able to capture, in the logic itself, not only the constraints to be monitored, but also the de-facto standard RV-LTL monitors. This makes it possible to declaratively capture monitoring metaconstraints, and check them by relying on usual logical services instead of ad-hoc algorithms. This, in turn, enables to flexibly monitor constraints depending on the monitoring state of other constraints, e.g., "compensation" constraints that are only checked when others are detected to be violated. In addition, we devise a direct translation of LDLf formulas into nondeterministic automata, avoiding to detour to Buechi automata or alternating automata, and we use it to implement a monitoring plug-in for the PROM suite.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 23:16:16 GMT" } ]
2014-05-02T00:00:00
[ [ "De Giacomo", "Giuseppe", "" ], [ "De Masellis", "Riccardo", "" ], [ "Grasso", "Marco", "" ], [ "Maggi", "Fabrizio", "" ], [ "Montali", "Marco", "" ] ]
new_dataset
0.998524
1405.0060
Haoyu Song Haoyu Song
Haoyu Song, Jun Gong, Hongfei Chen, Justin Dustzadeh
Unified POF Programming for Diversified SDN Data Plane
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many real-world OpenFlow-based SDN deployments, the ability to program heterogeneous forwarding elements built with different forwarding architectures is a desirable capability. In this paper, we discuss a data plane programming framework suitable for a flexible and protocol-oblivious data plane and show how OpenFlow can evolve to provide a generic interface for platform-independent programming and platform-specific compiling. We also show how an abstract instruction set can play a pivotal role to support different programming styles mapping to different forwarding chip architectures. As an example, we compare the compiler-mode and interpreter-mode implementations for an NPU-based forwarding element and conclude that the compiler-mode implementation can achieve a performance similar to that of a conventional non-SDN implementation. Built upon our protocol-oblivious forwarding (POF) vision, this work presents our continuous efforts to complete the ecosystem and pave the SDN evolving path. The programming framework could be considered as a proposal for the OpenFlow 2.0 standard.
[ { "version": "v1", "created": "Thu, 1 May 2014 00:15:00 GMT" } ]
2014-05-02T00:00:00
[ [ "Song", "Haoyu", "" ], [ "Gong", "Jun", "" ], [ "Chen", "Hongfei", "" ], [ "Dustzadeh", "Justin", "" ] ]
new_dataset
0.970663
1405.0087
Hovhannes Tananyan
Hovhannes G. Tananyan
Domination games played on line graphs of complete multipartite graphs
7 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The domination game on a graph $G$ (introduced by B. Bre\v{s}ar, S. Klav\v{z}ar, D.F. Rall \cite{BKR2010}) consists of two players, Dominator and Staller, who take turns choosing a vertex from $G$ such that whenever a vertex is chosen by either player, at least one additional vertex is dominated. Dominator wishes to dominate the graph in as few steps as possible, and Staller wishes to delay this process as much as possible. The game domination number $\gamma _{{\small g}}(G)$ is the number of vertices chosen when Dominator starts the game; when Staller starts, it is denoted by $\gamma _{{\small g}}^{\prime }(G).$ In this paper, the domination game on line graph $L\left( K_{\overline{m}}\right) $ of complete multipartite graph $K_{\overline{m}}$ $(\overline{m}\equiv (m_{1},...,m_{n})\in \mathbb{N} ^{n})$ is considered, the exact values for game domination numbers are obtained and optimal strategy for both players is described. Particularly, it is proved that for $m_{1}\leq m_{2}\leq ...\leq m_{n}$ both $\gamma _{{\small g}}\left( L\left( K_{\overline{m}}\right) \right) =\min \left\{ \left\lceil \frac{2}{3}\left\vert V\left( K_{\overline{m}}\right) \right\vert \right\rceil ,\right.$ $\left. 2\max \left\{ \left\lceil \frac{1}{2}\left( m_{1}+...+m_{n-1}\right) \right\rceil ,\text{ }m_{n-1}\right\} \right\} -1$ when $n\geq 2$ and $\gamma _{g}^{\prime }(L\left( K_{\overline{m}}\right) )=\min \left\{ \left\lceil \frac{2}{3}\left( \left\vert V(K_{_{\overline{m}}})\right\vert -2\right) \right\rceil ,\right.$ $\left. 2\max \left\{ \left\lceil \frac{1}{2}\left( m_{1}+...+m_{n-1}-1\right) \right\rceil ,\text{ }m_{n-1}\right\} \right\} $ when $n\geq 4$.
[ { "version": "v1", "created": "Thu, 1 May 2014 04:05:03 GMT" } ]
2014-05-02T00:00:00
[ [ "Tananyan", "Hovhannes G.", "" ] ]
new_dataset
0.998333
1405.0088
Nagaraju Dasari
C. Venkatesh, D.Nagaraju, T.Sunil Kumar Reddy
Binary Protector: Intrusion Detection in Multitier Web Applications
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The services of internet place a key role in the daily life by enabling the in sequence from anywhere. To provide somewhere to stay the communication and management in applications the web services has stimulated to multitier design. In this multitier the web servers contain front end logic and data with database servers. In this paper, we present binary protector intrusion detection systems which designs the network behavior of user sessions across both the front-end web server and the back-end database. By examining both web and subsequent database requests, we are able to rummage out attacks that independent IDS would not be able to distinguish.
[ { "version": "v1", "created": "Thu, 1 May 2014 04:10:46 GMT" } ]
2014-05-02T00:00:00
[ [ "Venkatesh", "C.", "" ], [ "Nagaraju", "D.", "" ], [ "Reddy", "T. Sunil Kumar", "" ] ]
new_dataset
0.999089
1404.7509
Ana Mihut
Sami Alajrami
On Cloud-Based Engineering of Dependable Systems
EDCC-2014, Student-Forum, Cloud Computing, Cloud Workflow Systems, Dependable, Systems, Software Engineering
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cloud computing paradigm is being adopted by many organizations in different application domains as it is cost effective and offers a virtually unlimited pool of resources. Engineering critical systems can benefit from clouds in attaining all dependability means: fault tolerance, fault prevention, fault removal and fault forecasting. Our research aims to investigate the potential of supporting engineering of dependable software systems with cloud computing and proposes an open, extensible, and elastic cloud-based software engineering workflow system which represents and executes software processes to improve collaboration, reliability and quality assurance, and automation in software projects.
[ { "version": "v1", "created": "Tue, 29 Apr 2014 20:01:55 GMT" } ]
2014-05-01T00:00:00
[ [ "Alajrami", "Sami", "" ] ]
new_dataset
0.996456
1404.7736
Chiara Risi
Chiara Risi, Daniel Persson, and Erik G. Larsson
Massive MIMO with 1-bit ADC
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate massive multiple-input-multiple output (MIMO) uplink systems with 1-bit analog-to-digital converters (ADCs) on each receiver antenna. Receivers that rely on 1-bit ADC do not need energy-consuming interfaces such as automatic gain control (AGC). This decreases both ADC building and operational costs. Our design is based on maximal ratio combining (MRC), zero-forcing (ZF), and least squares (LS) detection, taking into account the effects of the 1-bit ADC on channel estimation. Through numerical results, we show good performance of the system in terms of mutual information and symbol error rate (SER). Furthermore, we provide an analytical approach to calculate the mutual information and SER of the MRC receiver. The analytical approach reduces complexity in the sense that a symbol and channel noise vectors Monte Carlo simulation is avoided.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 14:27:23 GMT" } ]
2014-05-01T00:00:00
[ [ "Risi", "Chiara", "" ], [ "Persson", "Daniel", "" ], [ "Larsson", "Erik G.", "" ] ]
new_dataset
0.978124
1404.7758
Sigve Hortemo S{\ae}ther
Sigve Hortemo S{\ae}ther, Jan Arne Telle
Between Treewidth and Clique-width
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many hard graph problems can be solved efficiently when restricted to graphs of bounded treewidth, and more generally to graphs of bounded clique-width. But there is a price to be paid for this generality, exemplified by the four problems MaxCut, Graph Coloring, Hamiltonian Cycle and Edge Dominating Set that are all FPT parameterized by treewidth but none of which can be FPT parameterized by clique-width unless FPT = W[1], as shown by Fomin et al [7, 8]. We therefore seek a structural graph parameter that shares some of the generality of clique-width without paying this price. Based on splits, branch decompositions and the work of Vatshelle [18] on Maximum Matching-width, we consider the graph parameter sm-width which lies between treewidth and clique-width. Some graph classes of unbounded treewidth, like distance-hereditary graphs, have bounded sm-width. We show that MaxCut, Graph Coloring, Hamiltonian Cycle and Edge Dominating Set are all FPT parameterized by sm-width.
[ { "version": "v1", "created": "Wed, 30 Apr 2014 15:13:45 GMT" } ]
2014-05-01T00:00:00
[ [ "Sæther", "Sigve Hortemo", "" ], [ "Telle", "Jan Arne", "" ] ]
new_dataset
0.996099
1404.4502
Arnaud Lallouet
Thi-Van-Anh Nguyen and Arnaud Lallouet
A Complete Solver for Constraint Games
17 pages
null
null
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Game Theory studies situations in which multiple agents having conflicting objectives have to reach a collective decision. The question of a compact representation language for agents utility function is of crucial importance since the classical representation of a $n$-players game is given by a $n$-dimensional matrix of exponential size for each player. In this paper we use the framework of Constraint Games in which CSP are used to represent utilities. Constraint Programming --including global constraints-- allows to easily give a compact and elegant model to many useful games. Constraint Games come in two flavors: Constraint Satisfaction Games and Constraint Optimization Games, the first one using satisfaction to define boolean utilities. In addition to multimatrix games, it is also possible to model more complex games where hard constraints forbid certain situations. In this paper we study complete search techniques and show that our solver using the compact representation of Constraint Games is faster than the classical game solver Gambit by one to two orders of magnitude.
[ { "version": "v1", "created": "Thu, 17 Apr 2014 12:09:51 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 09:14:33 GMT" } ]
2014-04-30T00:00:00
[ [ "Nguyen", "Thi-Van-Anh", "" ], [ "Lallouet", "Arnaud", "" ] ]
new_dataset
0.987023
1404.6383
Pierre de Buyl
Valentin Haenel
Bloscpack: a compressed lightweight serialization format for numerical data
Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2013-02
cs.MS cs.PL
http://creativecommons.org/licenses/by/3.0/
This paper introduces the Bloscpack file format and the accompanying Python reference implementation. Bloscpack is a lightweight, compressed binary file-format based on the Blosc codec and is designed for lightweight, fast serialization of numerical data. This article presents the features of the file-format and some some API aspects of the reference implementation, in particular the ability to handle Numpy ndarrays. Furthermore, in order to demonstrate its utility, the format is compared both feature- and performance-wise to a few alternative lightweight serialization solutions for Numpy ndarrays. The performance comparisons take the form of some comprehensive benchmarks over a range of different artificial datasets with varying size and complexity, the results of which are presented as the last section of this article.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 10:53:23 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 14:16:55 GMT" } ]
2014-04-30T00:00:00
[ [ "Haenel", "Valentin", "" ] ]
new_dataset
0.974951
1404.6390
Pierre de Buyl
Stefan Richthofer
JyNI - Using native CPython-Extensions in Jython
Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2013-09
cs.PL
http://creativecommons.org/licenses/by/3.0/
Jython is a Java based Python implementation and the most seamless way to integrate Python and Java. However, it does not support native extensions written for CPython like NumPy or SciPy. Since most scientific Python code fundamentally depends on exactly such native extensions directly or indirectly, it usually cannot be run with Jython. JyNI (Jython Native Interface) aims to close this gap. It is a layer that enables Jython users to load native CPython extensions and access them from Jython the same way as they would do in CPython. In order to leverage the JyNI functionality, you just have to put it on the Java classpath when Jython is launched. It neither requires you to recompile the extension code, nor to build a customized Jython fork. That means, it is binary compatible with existing extension builds. At the time of writing, JyNI does not fully implement the Python C-API and it is only capable of loading simple examples that only involve most basic built-in types. The concept is rather complete though and our goal is to provide the C-API needed to load NumPy as soon as possible. After that we will focus on SciPy and others. We expect that our work will also enable Java developers to use CPython extensions like NumPy in their Java code.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 10:56:33 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 14:23:37 GMT" } ]
2014-04-30T00:00:00
[ [ "Richthofer", "Stefan", "" ] ]
new_dataset
0.998089
1404.6391
Pierre de Buyl
Robert Cimrman
SfePy - Write Your Own FE Application
Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2013-10
cs.CE cs.PL
http://creativecommons.org/licenses/by/3.0/
SfePy (Simple Finite Elements in Python) is a framework for solving various kinds of problems (mechanics, physics, biology, ...) described by partial differential equations in two or three space dimensions by the finite element method. The paper illustrates its use in an interactive environment or as a framework for building custom finite-element based solvers.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 10:56:35 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 14:28:34 GMT" } ]
2014-04-30T00:00:00
[ [ "Cimrman", "Robert", "" ] ]
new_dataset
0.99861
1404.7121
Umakant Mishra
Umakant Mishra
Inventions on Drag and Drop in GUI
7 pages, 3 figures. arXiv admin note: text overlap with arXiv:1404.6752
Umakant Mishra, Inventions on Drag and Drop in GUI (September 7, 2007). Available at SSRN:http://ssrn.com/abstract=1264691 or http://dx.doi.org/10.2139/ssrn.1264691
10.2139/ssrn.1264691
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Drag and drop operation is one of the key capabilities of any Graphical User Interface. The user can do quite complex operations simply by visually dragging and dropping objects from one location to another. It saves user from remembering and typing a lot of commands. The result of a drag and drop operation may vary depending the type of source object and type of destination object. For example dragging a file and dropping on a folder may copy or move the file to the destination folder, dropping that file to a remote FTP location may upload that file using internet, dropping that file on a printer icon may print that file, dropping that file on the trash can may delete that file, and dropping that file on an executable may play or open or compute or manipulate that file. Although a drag and drop operation prima facie seems to be a simple operation, it can become extremely complicated depending on the type of source objects dragged and the type of destination objects selected for dropping. There are many limitations of a conventional drag and drop operation. This article points out the difficulties of a drag and drop operation and illustrates the solutions disclosed by various inventions to overcome those difficulties.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 16:00:55 GMT" } ]
2014-04-30T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.996839
1211.6024
Santhosh Kumar
Santhosh Kumar, Jean-Francois Chamberland, Gregory H. Huff
Reconfigurable Antennas, Preemptive Switching and Virtual Channel Management
To appear in IEEE Transactions on Communications
IEEE Transactions on Communications, ISSN 0090-6778, Vol. 62, No. 4, pp. 1272-1282, April 2014
10.1109/TCOMM.2014.020514.130592
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article considers the performance of wireless communication systems that utilize reconfigurable or pattern-dynamic antennas. The focus is on finite-state channels with memory and performance is assessed in terms of real-time behavior. In a wireless setting, when a slow fading channel enters a deep fade, the corresponding communication system faces the threat of successive decoding failures at the destination. Under such circumstances, rapidly getting out of deep fades becomes a priority. Recent advances in fast reconfigurable antennas provide new means to alter the statistical profile of fading channels and thereby reduce the probability of prolonged fades. Fast reconfigurable antennas are therefore poised to improve overall performance, especially for delay-sensitive traffic in slow-fading environments. This potential for enhanced performance motivates this study of the temporal behavior of point-to-point communication systems with reconfigurable antennas. Specifically, agile wireless communication schemes over erasure channels are analyzed; situations where using reconfigurable antennas yield substantial performance gains in terms of throughput and average delay are identified. Scenarios where only partial state information is available at the receiver are also examined, naturally leading to partially observable decision processes.
[ { "version": "v1", "created": "Mon, 26 Nov 2012 16:57:46 GMT" }, { "version": "v2", "created": "Tue, 28 Jan 2014 17:35:56 GMT" } ]
2014-04-29T00:00:00
[ [ "Kumar", "Santhosh", "" ], [ "Chamberland", "Jean-Francois", "" ], [ "Huff", "Gregory H.", "" ] ]
new_dataset
0.96281
1310.0046
Mark Newman
Xiao Zhang, Raj Rao Nadakuditi, and M. E. J. Newman
Spectra of random graphs with community structure and arbitrary degrees
9 pages, 3 figures
Phys. Rev. E 89, 042816 (2014)
10.1103/PhysRevE.89.042816
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using methods from random matrix theory researchers have recently calculated the full spectra of random networks with arbitrary degrees and with community structure. Both reveal interesting spectral features, including deviations from the Wigner semicircle distribution and phase transitions in the spectra of community structured networks. In this paper we generalize both calculations, giving a prescription for calculating the spectrum of a network with both community structure and an arbitrary degree distribution. In general the spectrum has two parts, a continuous spectral band, which can depart strongly from the classic semicircle form, and a set of outlying eigenvalues that indicate the presence of communities.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 20:40:16 GMT" } ]
2014-04-29T00:00:00
[ [ "Zhang", "Xiao", "" ], [ "Nadakuditi", "Raj Rao", "" ], [ "Newman", "M. E. J.", "" ] ]
new_dataset
0.975379
1312.4921
Sundeep Rangan
Mustafa Riza Akdeniz, Yuanpeng Liu, Mathew K. Samimi, Shu Sun, Sundeep Rangan, Theodore S. Rappaport, Elza Erkip
Millimeter Wave Channel Modeling and Cellular Capacity Evaluation
15 pages, 13 figures. arXiv admin note: substantial text overlap with arXiv:1304.3963
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the severe spectrum shortage in conventional cellular bands, millimeter wave (mmW) frequencies between 30 and 300 GHz have been attracting growing attention as a possible candidate for next-generation micro- and picocellular wireless networks. The mmW bands offer orders of magnitude greater spectrum than current cellular allocations and enable very high-dimensional antenna arrays for further gains via beamforming and spatial multiplexing. This paper uses recent real-world measurements at 28 and 73 GHz in New York City to derive detailed spatial statistical models of the channels and uses these models to provide a realistic assessment of mmW micro- and picocellular networks in a dense urban deployment. Statistical models are derived for key channel parameters including the path loss, number of spatial clusters, angular dispersion and outage. It is found that, even in highly non-line-of-sight environments, strong signals can be detected 100 m to 200 m from potential cell sites, potentially with multiple clusters to support spatial multiplexing. Moreover, a system simulation based on the models predicts that mmW systems can offer an order of magnitude increase in capacity over current state-of-the-art 4G cellular networks with no increase in cell density from current urban deployments.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 19:58:25 GMT" }, { "version": "v2", "created": "Sat, 11 Jan 2014 20:34:28 GMT" }, { "version": "v3", "created": "Fri, 25 Apr 2014 20:49:14 GMT" } ]
2014-04-29T00:00:00
[ [ "Akdeniz", "Mustafa Riza", "" ], [ "Liu", "Yuanpeng", "" ], [ "Samimi", "Mathew K.", "" ], [ "Sun", "Shu", "" ], [ "Rangan", "Sundeep", "" ], [ "Rappaport", "Theodore S.", "" ], [ "Erkip", "Elza", "" ] ]
new_dataset
0.962064
1401.2398
Marco Dalai
Marco Dalai
An Elias Bound on the Bhattacharyya Distance of Codes for Channels with a Zero-Error Capacity
ISIT 2014
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an upper bound on the minimum Bhattacharyya distance of codes for channels with a zero-error capacity. The bound is obtained by combining an extension of the Elias bound introduced by Blahut, with an extension of a bound previously introduced by the author, which builds upon ideas of Gallager, Lov\'asz and Marton.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 16:41:16 GMT" }, { "version": "v2", "created": "Mon, 28 Apr 2014 14:14:05 GMT" } ]
2014-04-29T00:00:00
[ [ "Dalai", "Marco", "" ] ]
new_dataset
0.991677
1401.2560
Sundeep Rangan
Sundeep Rangan, Theodore S. Rappaport and Elza Erkip
Millimeter Wave Cellular Wireless Networks: Potentials and Challenges
17 pages, 15 figures. arXiv admin note: text overlap with arXiv:1312.4921
Proceedings of the IEEE , vol.102, no.3, pp.366,385, March 2014
10.1109/JPROC.2014.2299397
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave (mmW) frequencies between 30 and 300 GHz are a new frontier for cellular communication that offers the promise of orders of magnitude greater bandwidths combined with further gains via beamforming and spatial multiplexing from multi-element antenna arrays. This paper surveys measurements and capacity studies to assess this technology with a focus on small cell deployments in urban environments. The conclusions are extremely encouraging; measurements in New York City at 28 and 73 GHz demonstrate that, even in an urban canyon environment, significant non-line-of-sight (NLOS) outdoor, street-level coverage is possible up to approximately 200 m from a potential low power micro- or picocell base station. In addition, based on statistical channel models from these measurements, it is shown that mmW systems can offer more than an order of magnitude increase in capacity over current state-of-the-art 4G cellular networks at current cell densities. Cellular systems, however, will need to be significantly redesigned to fully achieve these gains. Specifically, the requirement of highly directional and adaptive transmissions, directional isolation between links and significant possibilities of outage have strong implications on multiple access, channel structure, synchronization and receiver design. To address these challenges, the paper discusses how various technologies including adaptive beamforming, multihop relaying, heterogeneous network architectures and carrier aggregation can be leveraged in the mmW context.
[ { "version": "v1", "created": "Sat, 11 Jan 2014 20:16:02 GMT" } ]
2014-04-29T00:00:00
[ [ "Rangan", "Sundeep", "" ], [ "Rappaport", "Theodore S.", "" ], [ "Erkip", "Elza", "" ] ]
new_dataset
0.999723
1401.7006
Aria Ghasemian Sahebi
Aria G. Sahebi and S. Sandeep Pradhan
Polar Codes for Some Multi-terminal Communications Problems
arXiv admin note: substantial text overlap with arXiv:1401.6482
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that polar coding schemes achieve the known achievable rate regions for several multi-terminal communications problems including lossy distributed source coding, multiple access channels and multiple descriptions coding. The results are valid for arbitrary alphabet sizes (binary or nonbinary) and arbitrary distributions (symmetric or asymmetric).
[ { "version": "v1", "created": "Sat, 25 Jan 2014 05:13:23 GMT" }, { "version": "v2", "created": "Mon, 28 Apr 2014 02:12:00 GMT" } ]
2014-04-29T00:00:00
[ [ "Sahebi", "Aria G.", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
new_dataset
0.999709
1404.6583
Andreas Beyer
Andreas Beyer, Hubert Mara, Susanne Kr\"omker
ILATO Project: Fusion of Optical Surface Models and Volumetric CT Data
Part of the OAGM 2014 proceedings (arXiv:1404.3538)
null
null
OAGM/2014/17
cs.CG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Project ILATO focuses on Improving Limited Angle computed Tomography by Optical data integration in order to enhance image quality and shorten acquisition times in X-ray based industrial quality inspection. Limited angle computed tomography is indicated whenever specimen dimensions exceed cone beam limits or the object is impenetrable from certain angles. Thus, acquiring only a subset of a full circle CT scan poses problems for reconstruction algorithms due to incomplete data which introduces blurred edges and other artifacts. To support volumetric data reconstruction algorithm a surface mesh of the object obtained via structured light optical scan acts as a mask defining boundaries of the reconstructed image. The registration of optically acquired surfaces with data acquired from computed tomography is our current challenge. This article presents our setup, the methods applied and discusses the problems arising from registration of data sets created with considerably different imaging techniques.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 23:08:04 GMT" } ]
2014-04-29T00:00:00
[ [ "Beyer", "Andreas", "" ], [ "Mara", "Hubert", "" ], [ "Krömker", "Susanne", "" ] ]
new_dataset
0.999241
1404.6605
EPTCS
David R. Cok, Scott C. Johnson
SPEEDY: An Eclipse-based IDE for invariant inference
In Proceedings F-IDE 2014, arXiv:1404.5785
EPTCS 149, 2014, pp. 44-57
10.4204/EPTCS.149.5
null
cs.LO cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SPEEDY is an Eclipse-based IDE for exploring techniques that assist users in generating correct specifications, particularly including invariant inference algorithms and tools. It integrates with several back-end tools that propose invariants and will incorporate published algorithms for inferring object and loop invariants. Though the architecture is language-neutral, current SPEEDY targets C programs. Building and using SPEEDY has confirmed earlier experience demonstrating the importance of showing and editing specifications in the IDEs that developers customarily use, automating as much of the production and checking of specifications as possible, and showing counterexample information directly in the source code editing environment. As in previous work, automation of specification checking is provided by back-end SMT solvers. However, reducing the effort demanded of software developers using formal methods also requires a GUI design that guides users in writing, reviewing, and correcting specifications and automates specification inference.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 05:32:34 GMT" } ]
2014-04-29T00:00:00
[ [ "Cok", "David R.", "" ], [ "Johnson", "Scott C.", "" ] ]
new_dataset
0.999223
1404.6607
EPTCS
Fran\c{c}ois Pessaux (ENSTA ParisTech)
FoCaLiZe: Inside an F-IDE
In Proceedings F-IDE 2014, arXiv:1404.5785
EPTCS 149, 2014, pp. 64-78
10.4204/EPTCS.149.7
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For years, Integrated Development Environments have demonstrated their usefulness in order to ease the development of software. High-level security or safety systems require proofs of compliance to standards, based on analyses such as code review and, increasingly nowadays, formal proofs of conformance to specifications. This implies mixing computational and logical aspects all along the development, which naturally raises the need for a notion of Formal IDE. This paper examines the FoCaLiZe environment and explores the implementation issues raised by the decision to provide a single language to express specification properties, source code and machine-checked proofs while allowing incremental development and code reusability. Such features create strong dependencies between functions, properties and proofs, and impose an particular compilation scheme, which is described here. The compilation results are runnable OCaml code and a checkable Coq term. All these points are illustrated through a running example.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 05:32:57 GMT" } ]
2014-04-29T00:00:00
[ [ "Pessaux", "François", "", "ENSTA ParisTech" ] ]
new_dataset
0.983978
1404.6608
EPTCS
David R. Cok (GrammaTech, Inc.)
OpenJML: Software verification for Java 7 using JML, OpenJDK, and Eclipse
In Proceedings F-IDE 2014, arXiv:1404.5785
EPTCS 149, 2014, pp. 79-92
10.4204/EPTCS.149.8
null
cs.SE cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OpenJML is a tool for checking code and specifications of Java programs. We describe our experience building the tool on the foundation of JML, OpenJDK and Eclipse, as well as on many advances in specification-based software verification. The implementation demonstrates the value of integrating specification tools directly in the software development IDE and in automating as many tasks as possible. The tool, though still in progress, has now been used for several college-level courses on software specification and verification and for small-scale studies on existing Java programs.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 05:33:03 GMT" } ]
2014-04-29T00:00:00
[ [ "Cok", "David R.", "", "GrammaTech, Inc." ] ]
new_dataset
0.999821
1404.6645
Camilla Hollanti
Camilla Hollanti, David Karpuk, Amaro Barreal, and Hsiao-feng Francis Lu
Space-Time Storage Codes for Wireless Distributed Storage Systems
6 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems (DSSs) have gained a lot of interest recently, thanks to their robustness and scalability compared to single-device storage. Majority of the related research has exclusively concerned the network layer. At the same time, the number of users of, e.g., peer-to-peer (p2p) and device-to-device (d2d) networks as well as proximity based services is growing rapidly, and the mobility of users is considered more and more important. This motivates, in contrast to the existing literature, the study of the physical layer functionality of wireless distributed storage systems. In this paper, we take the first step towards protecting the storage repair transmissions from physical layer errors when the transmission takes place over a fading channel. To this end, we introduce the notion of a space-time storage code, drawing together the aspects of network layer and physical layer functionality and resulting in cross-layer robustness. It is also pointed out that existing space-time codes are too complex to be utilized in storage networks when the number of helpers involved is larger than the number of receive antennas at the newcomer or data collector, hence creating a call for less complex transmission protocols.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 14:13:17 GMT" } ]
2014-04-29T00:00:00
[ [ "Hollanti", "Camilla", "" ], [ "Karpuk", "David", "" ], [ "Barreal", "Amaro", "" ], [ "Lu", "Hsiao-feng Francis", "" ] ]
new_dataset
0.995492
1404.6662
Vamsi Sashank Kotagiri
Vamsi Sashank Kotagiri
A Wireless System Using Random Residue Sequences
3 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the architecture of wireless communication system using random residue sequences. The basic scheme is that of spread spectrum but instead of using PN sequences for coding, we use random residue sequences. Such a system can provide cryptographic security whose strength would depend on the number of code sequences being used.
[ { "version": "v1", "created": "Sat, 26 Apr 2014 16:54:25 GMT" } ]
2014-04-29T00:00:00
[ [ "Kotagiri", "Vamsi Sashank", "" ] ]
new_dataset
0.994405
1404.6719
Parisa Jalili Marandi
Parisa Jalili Marandi, Samuel Benz, Fernando Pedone, Ken Birman
Practical Experience Report: The Performance of Paxos in the Cloud
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This experience report presents the results of an extensive performance evaluation conducted using four open-source implementations of Paxos deployed in Amazon's EC2. Paxos is a fundamental algorithm for building fault-tolerant services, at the core of state-machine replication. Implementations of Paxos are currently used in many prototypes and production systems in both academia and industry. Although all protocols surveyed in the paper implement Paxos, they are optimized in a number of different ways, resulting in very different behavior, as we show in the paper. We have considered a variety of configurations and failure-free and faulty executions. In addition to reporting our findings, we propose and assess additional optimizations to existing implementations.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 07:14:47 GMT" } ]
2014-04-29T00:00:00
[ [ "Marandi", "Parisa Jalili", "" ], [ "Benz", "Samuel", "" ], [ "Pedone", "Fernando", "" ], [ "Birman", "Ken", "" ] ]
new_dataset
0.982752
1404.6745
Umakant Mishra
Umakant Mishra
Inventions on Adaptable Menu: A TRIZ based analysis
10 pages, 6 figures
Mishra, Umakant, Inventions on Adaptable Menu: A TRIZ Based Analysis. December 6, 2006, Available at SSRN: http://ssrn.com/abstract=949236
10.2139/ssrn.949236
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The menu is one of the most widely used elements of a graphical user interface. The objective of a menu system is to provide various commands and functions to the user in an easy way so that the user can just select the desired operation from a given list instead of typing a complex command in the command prompt. In a conventional menu system the menu items or options are hard-coded in the computer program. The programmer or developer composes menu items at the time of development. The developer tries to include all options that he feels may be required by the user in future. Although the items are decided from "requirement analysis" and other studies, it is difficult to know the exact need of a user at a future period of time. This leads to inclusion of a lot of items in the menu, which leads to user confusion and frustration. Thus there is a need for adaptable menu that can be changed according to user requirement. The items of the adaptable menu should change from user to user and from time to time depending on the program context and likelihood of user selection. This article defines the Ideal Final Result of a dropdown menu system, defines the desirable functions of an adaptable menu, finds and solves the contradictions faced in achieving the desirable functions, and illustrates six selected cases on adaptable menu from US patent database.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 13:36:52 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999621
1404.6750
Umakant Mishra
Umakant Mishra
10 Inventions on Command Buttons in a Graphical User Interface
12 pages
Mishra, Umakant, 10 Inventions on Command Buttons in a Graphical User Interface, (December 6, 2006) Available at SSRN: http://ssrn.com/abstract=949240
10.2139/ssrn.949240
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A command button may contain a textual label or a graphic image or both. It may be static or animated. There can be many different features to make a command button attractive and effective. As command button is a typical GUI element, most improvement on GUI in general will also be applicable to command buttons. Besides, there are also inventions to improve various aspects of command buttons in specific. This article illustrates 10 selected inventions from US patent database. Each invention is followed by a TRIZ based analysis in brief.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 13:57:05 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999665
1404.6754
Umakant Mishra
Umakant Mishra
Inventions on dialog boxes used in GUI
Available at SSRN: http://ssrn.com/abstract=949247. Mishra, Umakant, Inventions on Dialog Boxes Used in GUI, (December 6, 2006)
null
10.2139/ssrn.949247
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dialog boxes are useful in case of displaying warnings, errors, confirmations etc. in special situations. A typical dialog box is displayed in a small window with some text message along with a few options for the user to select. However, there are certain difficulties associated in programming and implementing a conventional dialog box, such as, severe programming effort, rigidity of the hard coded message, obscuring screen space and so on. There is a need to overcome these difficulties of the dialog box to make them more efficient and useful. The modality of the dialog boxes also creates some limitations. While modal dialog boxes needs to be closed explicitly by the user, modeless dialog boxes can grow in number and become difficult to control. Thus, an ideal dialog box should be deprived of all the above-mentioned drawbacks. The dialog box should not obscure the screen. The user should be able open multiple dialog boxes but without obscuring the screen. This article analyses 5 interesting inventions on dialog boxes selected from US Patent database. Each invention tries to overcome some limitations of a conventional dialog box and provides some innovative features. Each solution is also analyzed from a TRIZ perspective.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 14:12:20 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.986087
1404.6757
Umakant Mishra
Umakant Mishra
Inventions on expressing emotions In Graphical User Interface
7 pages, 4 figures. Umakant Mishra, Inventions on Expressing Emotions in Graphical User Interface, (December 6, 2006), Available at SSRN: http://ssrn.com/abstract=949250
null
10.2139/ssrn.949250
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The conventional GUI is more mechanical and does not recognize or communicate emotions. The modern GUIs are trying to infer the likely emotional state and personality of the user and communicate through a corresponding emotional state. Emotions are expressed in graphical icons, sounds, pictures and other means. The emotions are found to be useful in especially in communication software, interactive learning systems, robotics and other adaptive environments. Various mechanisms have been developed to express emotions through graphical user interfaces. This article illustrates some interesting inventions selected from US patent database.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 14:29:01 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.983239
1404.6761
Umakant Mishra
Umakant Mishra
Inventions on GUI for Touch Sensitive Screens
6 pages, 4 figures
Umakant Mishra, Inventions on GUI for Touch Sensitive Screens (September 7, 2007). Available at SSRN: http://ssrn.com/abstract=1264684 or http://dx.doi.org/10.2139/ssrn.1264684
10.2139/ssrn.1264684
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A touch sensitive screen displays the information on the screen and also receives the input by sensing a user's touch on the same screen. This mechanism facilitates system interaction directly through the screen without needing a mouse or keyboard. This method has the advantage to make the system compact by removing keyboard, mouse and similar interactive device. However there are certain difficulties to implement a touch screen interface. The display screens of portable devices are becoming smaller thereby leaving lesser space for display of data, menu or touch screen interaction. Besides some screens need to display so much of information that they hardly can afford any space to display touch screen buttons. This article illustrates various inventions which have successfully eliminated these difficulties by applying appropriate Inventive principles.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 15:05:44 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.998449
1404.6765
Umakant Mishra
Umakant Mishra
Inventions on GUI for Eye Cursor Controls Systems
6 pages, 4 figures
Mishra, Umakant, Inventions on GUI for Eye Cursor Control Systems (September 7, 2007), Available at SSRN: http://ssrn.com/abstract=1264687 or http://dx.doi.org/10.2139/ssrn.1264687
10.2139/ssrn.1264687
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Operating a GUI through eyeball is a complex mechanism and not used as often as mouse or trackball. But there are situations where eye-mouse devices can play a tremendous role especially where the hands of the user are not available or busy to perform other activities. The difficulties of implementing an eye-cursor control system are many. The article illustrates some inventions on eye-cursor control system, which attempt to eliminate the difficulties of the prior art mechanisms.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 15:18:54 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999513
1404.6776
Umakant Mishra
Umakant Mishra
Inventions on GUI Aesthetics
9 pages, 7 figures
Umakant Mishra, Inventions on GUI Aesthetics (September 7, 2007). Available at SSRN: http://ssrn.com/abstract=1264690 or http://dx.doi.org/10.2139/ssrn.1264690
10.2139/ssrn.1264690
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aesthetics or "look and feel" is one of the most important features of any graphical user interface. Better aesthetics makes the interface user-friendlier and more popular. Better aesthetics helps the user to understand the meaning of various components and memorize the navigation paths. A better look and feel ultimately makes a GUI more efficient and effective. Various methods are adopted to improve the aesthetics of a GUI, such as, by using colors, using 3D graphics, using pictorial icons, using sound etc. It is important to provide links to all the important features on a desktop or on a quick access panel. But too many icons or buttons sometimes creates confusion. Hence it is important to restrict the temptation of putting everything on the first screen or load the rarely used buttons on the toolbar. One should ensure that the aesthetics of a GUI is not compromising with its accessibility and other important features. This article illustrates some inventions made on GUI aesthetics.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 15:51:51 GMT" } ]
2014-04-29T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.992774
1404.6883
Jozef Frtus
Jozef Frt\'us
Credulous and Skeptical Argument Games for Complete Semantics in Conflict Resolution based Argumentation
appears in the Proceedings of the 15th International Workshop on Non-Monotonic Reasoning (NMR 2014)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Argumentation is one of the most popular approaches of defining a~non-monotonic formalism and several argumentation based semantics were proposed for defeasible logic programs. Recently, a new approach based on notions of conflict resolutions was proposed, however with declarative semantics only. This paper gives a more procedural counterpart by developing skeptical and credulous argument games for complete semantics and soundness and completeness theorems for both games are provided. After that, distribution of defeasible logic program into several contexts is investigated and both argument games are adapted for multi-context system.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 07:24:57 GMT" } ]
2014-04-29T00:00:00
[ [ "Frtús", "Jozef", "" ] ]
new_dataset
0.966985
1404.7053
Sergey Yakhontov V
Sergey V. Yakhontov
Computable real function F such that F is not polynomial time computable on [0,1]
5 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A computable real function F on [0,1] is constructed such that there exists an exponential time algorithm for the evaluation of the function on [0,1] on Turing machine but there does not exist any polynomial time algorithm for the evaluation of the function on [0,1] on Turing machine (moreover, it holds for any rational point on (0,1))
[ { "version": "v1", "created": "Fri, 25 Apr 2014 02:31:06 GMT" } ]
2014-04-29T00:00:00
[ [ "Yakhontov", "Sergey V.", "" ] ]
new_dataset
0.9956
1305.3376
Thomas Zemen
Laura Bernad\'o, Thomas Zemen, Fredrik Tufvesson, Andreas F. Molisch, Christoph F. Mecklenbr\"auker
Delay and Doppler Spreads of Non-Stationary Vehicular Channels for Safety Relevant Scenarios
18 pages, 5 figures, submitted to IEEE Transactions on Vehicular Communications for possible publication
IEEE Transactions on Vehicular Technology, vol. 63, no. 1, pp. 82-93, January 2014
10.1109/TVT.2013.2271956
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular communication channels are characterized by a non-stationary time- and frequency-selective fading process due to rapid changes in the environment. The non-stationary fading process can be characterized by assuming local stationarity for a region with finite extent in time and frequency. For this finite region the wide-sense stationarity and uncorrelated-scattering (WSSUS) assumption holds approximately and we are able to calculate a time and frequency dependent local scattering function (LSF). In this paper, we estimate the LSF from a large set of measurements collected in the DRIVEWAY'09 measurement campaign, which focuses on scenarios for intelligent transportation systems. We then obtain the time-frequency-varying power delay profile (PDP) and the time-frequency-varying Doppler power spectral density (DSD) from the LSF. Based on the PDP and the DSD, we analyze the time-frequency-varying root mean square (RMS) delay spread and the RMS Doppler spread. We show that the distribution of these channel parameters follows a bi-modal Gaussian mixture distribution. High RMS delay spread values are observed in situations with rich scattering, while high RMS Doppler spreads are obtained in drive-by scenarios.
[ { "version": "v1", "created": "Wed, 15 May 2013 07:22:46 GMT" } ]
2014-04-28T00:00:00
[ [ "Bernadó", "Laura", "" ], [ "Zemen", "Thomas", "" ], [ "Tufvesson", "Fredrik", "" ], [ "Molisch", "Andreas F.", "" ], [ "Mecklenbräuker", "Christoph F.", "" ] ]
new_dataset
0.999492
1404.6387
Pierre de Buyl
Kelsey D'Souza
PySTEMM: Executable Concept Modeling for K-12 STEM Learning
Part of the Proceedings of the 6th European Conference on Python in Science (EuroSciPy 2013), Pierre de Buyl and Nelle Varoquaux editors, (2014)
null
null
euroscipy-proceedings2013-06
cs.CY cs.PL
http://creativecommons.org/licenses/by/3.0/
Modeling should play a central role in K-12 STEM education, where it could make classes much more engaging. A model underlies every scientific theory, and models are central to all the STEM disciplines (Science, Technology, Engineering, Math). This paper describes executable concept modeling of STEM concepts using immutable objects and pure functions in Python. I present examples in math, physics, chemistry, and engineering, built using a proof-of-concept tool called PySTEMM . The approach applies to all STEM areas and supports learning with pictures, narrative, animation, and graph plots. Models can extend each other, simplifying getting started. The functional-programming style reduces incidental complexity and code debugging.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 10:55:44 GMT" } ]
2014-04-28T00:00:00
[ [ "D'Souza", "Kelsey", "" ] ]
new_dataset
0.984941
1404.6413
Georg Waltner
Georg Waltner and Thomas Mauthner and Horst Bischof
Indoor Activity Detection and Recognition for Sport Games Analysis
Part of the OAGM 2014 proceedings (arXiv:1404.3538)
null
null
OAGM/2014/03
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Activity recognition in sport is an attractive field for computer vision research. Game, player and team analysis are of great interest and research topics within this field emerge with the goal of automated analysis. The very specific underlying rules of sports can be used as prior knowledge for the recognition task and present a constrained environment for evaluation. This paper describes recognition of single player activities in sport with special emphasis on volleyball. Starting from a per-frame player-centered activity recognition, we incorporate geometry and contextual information via an activity context descriptor that collects information about all player's activities over a certain timespan relative to the investigated player. The benefit of this context information on single player activity recognition is evaluated on our new real-life dataset presenting a total amount of almost 36k annotated frames containing 7 activity classes within 6 videos of professional volleyball games. Our incorporation of the contextual information improves the average player-centered classification performance of 77.56% by up to 18.35% on specific classes, proving that spatio-temporal context is an important clue for activity recognition.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 13:25:09 GMT" } ]
2014-04-28T00:00:00
[ [ "Waltner", "Georg", "" ], [ "Mauthner", "Thomas", "" ], [ "Bischof", "Horst", "" ] ]
new_dataset
0.988304
1404.6503
Fabian Reiter
Fabian Reiter
Distributed Graph Automata
Master's Thesis, 64 pages
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by distributed algorithms, we introduce a new class of finite graph automata that recognize precisely the graph languages definable in monadic second-order logic. For the cases of words and trees, it has been long known that the regular languages are precisely those definable in monadic second-order logic. In this regard, the automata proposed in the present work can be seen, to some extent, as a generalization of finite automata to graphs. Furthermore, we show that, unlike for finite automata on words and trees, the deterministic, nondeterministic and alternating variants of our automata form a strict hierarchy with respect to their expressive power. For the weaker variants, the emptiness problem is decidable.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 18:58:40 GMT" } ]
2014-04-28T00:00:00
[ [ "Reiter", "Fabian", "" ] ]
new_dataset
0.96715
1312.5424
Chandranath Adak
Chandranath Adak
Dual Layer Textual Message Cryptosystem with Randomized Sequence of Symmetric Key
Ethical Hacking-Issues & Challenges (EHIC)-2012
The Bulletin of Engineering and Science, ISSN: 0974-7176, Vol. 4 No. 2, 2012
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new concept of textual message encryption and decryption through a pool of randomized symmetric key and the dual layer cryptosystem with the concept of visual cryptography and steganography. A textual message is converted into two image slides, and the images are encrypted through two different randomized sequences of symmetric key. The decryption is done in the reverse way. The encrypted images are decrypted by those two symmetric keys. The decrypted image slides are merged together and converted into textual message. Here the image sharing is done through the concept of visual cryptography and the textual message to image conversion is done through the concept of steganography.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 07:18:18 GMT" } ]
2014-04-25T00:00:00
[ [ "Adak", "Chandranath", "" ] ]
new_dataset
0.952739
1404.5870
Apostolos Syropoulos
Apostolos Syropoulos and Athanasios Stavrianos
Using Scripting Languages to Teach Programming
13 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, scripting programming languages like Python, Perl and Ruby are widely used in system programming, scientific computing, etc. Although solving a particular problem in these languages requires less time, less programming effort, and less concepts to be taught to achieve the desired goal, still they are not used as teaching tools. Therefore, the use of scripting languages as a teaching vehicle for programming course is very promising. On the other hand, GUI programming, when performed with such languages, is easy and rewarding, since one sees the result of her work immediately. Thus, we are sure that scripting languages combined with GUI toolkits will be the next big thing in computer education.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 18:48:29 GMT" } ]
2014-04-24T00:00:00
[ [ "Syropoulos", "Apostolos", "" ], [ "Stavrianos", "Athanasios", "" ] ]
new_dataset
0.988637
1404.5929
Fabio G. Guerrero-Moreno
Maribell Sacanamboy Franco and Fabio G. Guerrero
FPGA design of a cdma2000 turbo decoder
In Spanish, 14 pages, 13 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the FPGA hardware design of a turbo decoder for the cdma2000 standard. The work includes a study and mathematical analysis of the turbo decoding process, based on the MAX-Log-MAP algorithm. Results of decoding for a packet size of two hundred fifty bits are presented, as well as an analysis of area versus performance, and the key variables for hardware design in turbo decoding.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 19:09:19 GMT" } ]
2014-04-24T00:00:00
[ [ "Franco", "Maribell Sacanamboy", "" ], [ "Guerrero", "Fabio G.", "" ] ]
new_dataset
0.999389
1404.5385
Badr Benmammar
Mohammed Zakarya Baba-Ahmed (LTT), Badr Benmammar (LTT), Fethi Tarik Bendimerad (LTT)
Vers l'auto-gestion d'un r\'eseau de radio cognitive
in French. International Congress on Telecommunication and Application'14 (2014)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive Radio (CR) operates in different fields as varied, one of these is cognitive radio networks. In this paper, we propose a new approach used CR, which aims to manage potential failures of computer systems and applications through the introduction of two aspects of autonomous networks to make systems capable of managing themselves with minimum human intervention.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 06:26:18 GMT" } ]
2014-04-23T00:00:00
[ [ "Baba-Ahmed", "Mohammed Zakarya", "", "LTT" ], [ "Benmammar", "Badr", "", "LTT" ], [ "Bendimerad", "Fethi Tarik", "", "LTT" ] ]
new_dataset
0.991911
1404.5393
Sujathakumari K
Sujathakumari K, Dersanambika K.S
Cooperating distributed context-free hexagonal array grammar systems with permitting contexts
16 pages, 6 figures, Published with International Journal of Mathematics Trends and Technology (IJMTT)
International Journal of Mathematical Trends and Technology (IJMTT). V7:156-171 March 2014
10.14445/22315373/IJMTT-V7P520
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we associate permitting symbols with rules of Grammars in the components of cooperating distributed context free hexagonal array grammar systems as a control mechanism and investigating the generative power of the resulting systems in the terminal mode. This feature of associating permitting symbols with rules when extended to patterns in the form of connected arrays also requires checking of symbols, but this is simpler than usual pattern matching. The benefit of allowing permitting symbols is that it enables us to reduce the number of components required in a cooperating distributed hexagonal array grammar system for generating a set of picture arrays.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 06:53:20 GMT" } ]
2014-04-23T00:00:00
[ [ "K", "Sujathakumari", "" ], [ "S", "Dersanambika K.", "" ] ]
new_dataset
0.997392
1404.5454
Adish Singla
Adish Singla, Eric Horvitz, Ece Kamar, Ryen White
Stochastic Privacy
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online services such as web search and e-commerce applications typically rely on the collection of data about users, including details of their activities on the web. Such personal data is used to enhance the quality of service via personalization of content and to maximize revenues via better targeting of advertisements and deeper engagement of users on sites. To date, service providers have largely followed the approach of either requiring or requesting consent for opting-in to share their data. Users may be willing to share private information in return for better quality of service or for incentives, or in return for assurances about the nature and extend of the logging of data. We introduce \emph{stochastic privacy}, a new approach to privacy centering on a simple concept: A guarantee is provided to users about the upper-bound on the probability that their personal data will be used. Such a probability, which we refer to as \emph{privacy risk}, can be assessed by users as a preference or communicated as a policy by a service provider. Service providers can work to personalize and to optimize revenues in accordance with preferences about privacy risk. We present procedures, proofs, and an overall system for maximizing the quality of services, while respecting bounds on allowable or communicated privacy risk. We demonstrate the methodology with a case study and evaluation of the procedures applied to web search personalization. We show how we can achieve near-optimal utility of accessing information with provable guarantees on the probability of sharing data.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 10:55:19 GMT" } ]
2014-04-23T00:00:00
[ [ "Singla", "Adish", "" ], [ "Horvitz", "Eric", "" ], [ "Kamar", "Ece", "" ], [ "White", "Ryen", "" ] ]
new_dataset
0.956549
1404.5468
Madhumangal Pal Dr.
Madhumangal Pal
Intersection Graphs: An Introduction
49 pages
Annals of Pure and Applied Mathematics, vol. 4, No. 1, 2013, 43-91
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intersection graphs are very important in both theoretical as well as application point of view. Depending on the geometrical representation, different type of intersection graphs are defined. Among them interval, circular-arc, permutation, trapezoid, chordal, disk, circle graphs are more important. In this article, a brief introduction of each of these intersection graphs is given. Some basic properties and algorithmic status of few problems on these graphs are cited. This article will help to the beginners to start work in this direction. Since the article contains a lot of information in a compact form it is also useful for the expert researchers too.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 12:22:31 GMT" } ]
2014-04-23T00:00:00
[ [ "Pal", "Madhumangal", "" ] ]
new_dataset
0.99905
1012.5494
Serguei Mokhov
Serguei A. Mokhov
Contents of COMP6411 Summer 2010 Final Reports on Comparative Studies of Programming Languages
an index
null
null
null
cs.PL
http://creativecommons.org/licenses/by/3.0/
This index covers the lecture notes and the final course project reports for COMP6411 Summer 2010 at Concordia University, Montreal, Canada, Comparative Study of Programming Languages by 4 teams trying compare a set of common criteria and their applicability to about 10 distinct programming languages, where 5 language choices were provided by the instructor and five were picked by each team and each student individually compared two of the 10 and then the team did a summary synthesis across all 10 languages. Their findings are posted here for further reference, comparative studies, and analysis.
[ { "version": "v1", "created": "Sun, 26 Dec 2010 03:33:09 GMT" }, { "version": "v2", "created": "Sat, 19 Apr 2014 20:28:54 GMT" } ]
2014-04-22T00:00:00
[ [ "Mokhov", "Serguei A.", "" ] ]
new_dataset
0.997468
1311.7113
Tuvi Etzion
Sarit Buzaglo, Eitan Yaakobi, Tuvi Etzion, Jehoshua Bruck
Systematic Codes for Rank Modulation
to be presented ISIT2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to construct systematic error-correcting codes for permutations and multi-permutations in the Kendall's $\tau$-metric. These codes are important in new applications such as rank modulation for flash memories. The construction is based on error-correcting codes for multi-permutations and a partition of the set of permutations into error-correcting codes. For a given large enough number of information symbols $k$, and for any integer $t$, we present a construction for ${(k+r,k)}$ systematic $t$-error-correcting codes, for permutations from $S_{k+r}$, with less redundancy symbols than the number of redundancy symbols in the codes of the known constructions. In particular, for a given $t$ and for sufficiently large $k$ we can obtain $r=t+1$. The same construction is also applied to obtain related systematic error-correcting codes for multi-permutations.
[ { "version": "v1", "created": "Wed, 27 Nov 2013 20:28:20 GMT" }, { "version": "v2", "created": "Thu, 9 Jan 2014 12:53:30 GMT" }, { "version": "v3", "created": "Sun, 20 Apr 2014 07:06:04 GMT" } ]
2014-04-22T00:00:00
[ [ "Buzaglo", "Sarit", "" ], [ "Yaakobi", "Eitan", "" ], [ "Etzion", "Tuvi", "" ], [ "Bruck", "Jehoshua", "" ] ]
new_dataset
0.975921
1303.6422
Frank H. Lutz
Bruno Benedetti and Frank H. Lutz
Random Discrete Morse Theory and a New Library of Triangulations
35 pages, 5 figures, 7 tables
Experimental Mathematics, Vol. 23, Issue 1 (2014), 66-94
null
CPH-SYM-DNRF92
cs.CG math.AT math.CO math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
1) We introduce random discrete Morse theory as a computational scheme to measure the complicatedness of a triangulation. The idea is to try to quantify the frequence of discrete Morse matchings with a certain number of critical cells. Our measure will depend on the topology of the space, but also on how nicely the space is triangulated. (2) The scheme we propose looks for optimal discrete Morse functions with an elementary random heuristic. Despite its na\"ivet\'e, this approach turns out to be very successful even in the case of huge inputs. (3) In our view the existing libraries of examples in computational topology are `too easy' for testing algorithms based on discrete Morse theory. We propose a new library containing more complicated (and thus more meaningful) test examples.
[ { "version": "v1", "created": "Tue, 26 Mar 2013 10:11:26 GMT" }, { "version": "v2", "created": "Wed, 27 Nov 2013 19:23:38 GMT" } ]
2014-04-21T00:00:00
[ [ "Benedetti", "Bruno", "" ], [ "Lutz", "Frank H.", "" ] ]
new_dataset
0.97535
1310.6719
Sujeet Patole
Sujeet Patole and Murat Torlak
Two Dimensional Array Imaging with Beam Steered Data
null
IEEE Transactions on Image Processing Dec. 2013 (Volume:22, Issue: 12, Page(s):5181 - 5189 )
10.1109/TIP.2013.2282115
ISSN: 1057-7149
cs.CV cs.IT math.IT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses different approaches used for millimeter wave imaging of two-dimensional objects. Imaging of a two dimensional object requires reflected wave data to be collected across two distinct dimensions. In this paper, we propose a reconstruction method that uses narrowband waveforms along with two dimensional beam steering. The beam is steered in azimuthal and elevation direction, which forms the two distinct dimensions required for the reconstruction. The Reconstruction technique uses inverse Fourier transform along with amplitude and phase correction factors. In addition, this reconstruction technique does not require interpolation of the data in either wavenumber or spatial domain. Use of the two dimensional beam steering offers better performance in the presence of noise compared with the existing methods, such as switched array imaging system. Effects of RF impairments such as quantization of the phase of beam steering weights and timing jitter which add to phase noise, are analyzed.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 19:33:50 GMT" }, { "version": "v2", "created": "Thu, 17 Apr 2014 23:01:54 GMT" } ]
2014-04-21T00:00:00
[ [ "Patole", "Sujeet", "" ], [ "Torlak", "Murat", "" ] ]
new_dataset
0.954255
1403.5012
Yong Wang
Kai Li, Yong Wang, Meilin Liu
A Non-Cooperative Game Model for Reliability-Based Task Scheduling in Cloud Computing
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing is a newly emerging distributed system which is evolved from Grid computing. Task scheduling is the core research of cloud computing which studies how to allocate the tasks among the physical nodes, so that the tasks can get a balanced allocation or each task's execution cost decreases to the minimum, or the overall system performance is optimal. Unlike task scheduling based on time or cost before, aiming at the special reliability requirements in cloud computing, we propose a non-cooperative game model for reliability-based task scheduling approach. This model takes the steady-state availability that computing nodes provide as the target, takes the task slicing strategy of the schedulers as the game strategy, then finds the Nash equilibrium solution. And also, we design a task scheduling algorithm based on this model. The experiments can be seen that our task scheduling algorithm is better than the so-called balanced scheduling algorithm.
[ { "version": "v1", "created": "Thu, 20 Mar 2014 00:48:42 GMT" }, { "version": "v2", "created": "Fri, 18 Apr 2014 03:36:23 GMT" } ]
2014-04-21T00:00:00
[ [ "Li", "Kai", "" ], [ "Wang", "Yong", "" ], [ "Liu", "Meilin", "" ] ]
new_dataset
0.986723
1404.4744
Ghassan Karame
Jens Mathias Bohli, Dan Dobre, Ghassan O. Karame, Wenting Li
PrivLoc: Preventing Location Tracking in Geofencing Services
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Location-based services are increasingly used in our daily activities. In current services, users however have to give up their location privacy in order to acquire the service. The literature features a large number of contributions which aim at enhancing user privacy in location-based services. Most of these contributions obfuscate the locations of users using spatial and/or temporal cloaking in order to provide k-anonymity. Although such schemes can indeed strengthen the location privacy of users, they often decrease the service quality and do not necessarily prevent the possible tracking of user movements (i.e., direction, trajectory, velocity). With the rise of Geofencing applications, tracking of movements becomes more evident since, in these settings, the service provider is not only requesting a single location of the user, but requires the movement vectors of users to determine whether the user has entered/exited a Geofence of interest. In this paper, we propose a novel solution, PrivLoc, which enables the privacy-preserving outsourcing of Geofencing and location-based services to the cloud without leaking any meaningful information about the location, trajectory, and velocity of the users. Notably, PrivLoc enables an efficient and privacy-preserving intersection of movement vectors with any polygon of interest, leveraging functionality from existing Geofencing services or spatial databases. We analyze the security and privacy provisions of PrivLoc and we evaluate the performance of our scheme by means of implementation. Our results show that the performance overhead introduced by PrivLoc can be largely tolerated in realistic deployment settings.
[ { "version": "v1", "created": "Fri, 18 Apr 2014 10:51:23 GMT" } ]
2014-04-21T00:00:00
[ [ "Bohli", "Jens Mathias", "" ], [ "Dobre", "Dan", "" ], [ "Karame", "Ghassan O.", "" ], [ "Li", "Wenting", "" ] ]
new_dataset
0.998781
1301.0313
Subhash Kak
Subhash Kak
The Piggy Bank Cryptographic Trope
7 pages, 6 figures
Infocommunications Journal 6: 22-25 (2014)
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of the box. We show how this idea can help increase the security of cryptographic protocols for classical systems as well as those based on "single-state" systems. More specifically, we propose the use of a hashing digest (instead of the coded letter) to detect loss of key bits to the eavesdropper and use in communication systems where error correction is an important issue.
[ { "version": "v1", "created": "Tue, 1 Jan 2013 18:17:21 GMT" } ]
2014-04-18T00:00:00
[ [ "Kak", "Subhash", "" ] ]
new_dataset
0.990258
1404.4391
Rick Zhang
Rick Zhang and Marco Pavone
Control of Robotic Mobility-On-Demand Systems: a Queueing-Theoretical Perspective
10 pages, To appear at RSS 2014
null
null
null
cs.RO cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present and analyze a queueing-theoretical model for autonomous mobility-on-demand (MOD) systems where robotic, self-driving vehicles transport customers within an urban environment and rebalance themselves to ensure acceptable quality of service throughout the entire network. We cast an autonomous MOD system within a closed Jackson network model with passenger loss. It is shown that an optimal rebalancing algorithm minimizing the number of (autonomously) rebalancing vehicles and keeping vehicles availabilities balanced throughout the network can be found by solving a linear program. The theoretical insights are used to design a robust, real-time rebalancing algorithm, which is applied to a case study of New York City. The case study shows that the current taxi demand in Manhattan can be met with about 8,000 robotic vehicles (roughly 60% of the size of the current taxi fleet). Finally, we extend our queueing-theoretical setup to include congestion effects, and we study the impact of autonomously rebalancing vehicles on overall congestion. Collectively, this paper provides a rigorous approach to the problem of system-wide coordination of autonomously driving vehicles, and provides one of the first characterizations of the sustainability benefits of robotic transportation networks.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 21:35:03 GMT" } ]
2014-04-18T00:00:00
[ [ "Zhang", "Rick", "" ], [ "Pavone", "Marco", "" ] ]
new_dataset
0.99135
1404.4448
Zohair Abu Shaban
Zohair Abu-Shaban, Hani Mehrpouyan, Joel Grotz, Bjorn Ottersten
Overloaded Satellite Receiver Using SIC with Hybrid Beamforming and ML Detection
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new receiver structure that is intended to detect the signals from multiple adjacent satellites in the presence of other interfering satellites is proposed. We tackle the worst case interference conditions, i.e., it is assumed that uncoded signals that fully overlap in frequency arrive at a multiple-element small-size parabolic antenna in a spatially correlated noise environment. The proposed successive interference cancellation (SIC) receiver, denoted by SIC Hy/ML, employs hybrid beamforming and disjoint maximum likelihood (ML) detection. Depending on the individual signals spatial position, the proposed SIC Hy/ML scheme takes advantage of two types of beamformers: a maximum ratio combining (MRC) beamformer and a compromised array response (CAR) beamformer. The performance of the proposed receiver is compared to an SIC receiver that uses only MRC beamforming scheme with ML detection for all signals, a joint ML detector, and a minimum mean square error detector. It is found that SIC Hy/ML outperforms the other schemes by a large margin.
[ { "version": "v1", "created": "Thu, 17 Apr 2014 08:29:09 GMT" } ]
2014-04-18T00:00:00
[ [ "Abu-Shaban", "Zohair", "" ], [ "Mehrpouyan", "Hani", "" ], [ "Grotz", "Joel", "" ], [ "Ottersten", "Bjorn", "" ] ]
new_dataset
0.994224
1404.4478
Deepak Rajendraprasad
L. Sunil Chandran, Deepak Rajendraprasad and Marek Tesa\v{r}
Rainbow Colouring of Split Graphs
This is the full version of a paper to be presented at ICGT 2014. This complements the results in arXiv:1205.1670 (which were presented in COCOON 2013), and both will be merged into a single journal submission
null
null
null
cs.DM cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rainbow path in an edge coloured graph is a path in which no two edges are coloured the same. A rainbow colouring of a connected graph G is a colouring of the edges of G such that every pair of vertices in G is connected by at least one rainbow path. The minimum number of colours required to rainbow colour G is called its rainbow connection number. Between them, Chakraborty et al. [J. Comb. Optim., 2011] and Ananth et al. [FSTTCS, 2012] have shown that for every integer k, k \geq 2, it is NP-complete to decide whether a given graph can be rainbow coloured using k colours. A split graph is a graph whose vertex set can be partitioned into a clique and an independent set. Chandran and Rajendraprasad have shown that the problem of deciding whether a given split graph G can be rainbow coloured using 3 colours is NP-complete and further have described a linear time algorithm to rainbow colour any split graph using at most one colour more than the optimum [COCOON, 2012]. In this article, we settle the computational complexity of the problem on split graphs and thereby discover an interesting dichotomy. Specifically, we show that the problem of deciding whether a given split graph can be rainbow coloured using k colours is NP-complete for k \in {2,3}, but can be solved in polynomial time for all other values of k.
[ { "version": "v1", "created": "Thu, 17 Apr 2014 10:41:32 GMT" } ]
2014-04-18T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Rajendraprasad", "Deepak", "" ], [ "Tesař", "Marek", "" ] ]
new_dataset
0.993075
1404.4572
Behrang Qasemizadeh
Behrang Qasemizadeh, Saeed Rahimi, Behrooz Mahmoodi Bakhtiari
The First Parallel Multilingual Corpus of Persian: Toward a Persian BLARK
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we have introduced the first parallel corpus of Persian with more than 10 other European languages. This article describes primary steps toward preparing a Basic Language Resources Kit (BLARK) for Persian. Up to now, we have proposed morphosyntactic specification of Persian based on EAGLE/MULTEXT guidelines and specific resources of MULTEXT-East. The article introduces Persian Language, with emphasis on its orthography and morphosyntactic features, then a new Part-of-Speech categorization and orthography for Persian in digital environments is proposed. Finally, the corpus and related statistic will be analyzed.
[ { "version": "v1", "created": "Thu, 17 Apr 2014 16:22:40 GMT" } ]
2014-04-18T00:00:00
[ [ "Qasemizadeh", "Behrang", "" ], [ "Rahimi", "Saeed", "" ], [ "Bakhtiari", "Behrooz Mahmoodi", "" ] ]
new_dataset
0.988258
1402.0087
Reza Ebrahimi Atani
Mehran Alidoost Nia, Reza Ebrahimi Atani
A novel datatype architecture support for programming languages
This paper is accepted and published in International journal of Programming Languages and applications
International journal of Programming Languages and applications Vol. 4 No.1 2014
10.5121/ijpla
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In programmers point of view, Datatypes in programming language level have a simple description but inside hardware, huge machine codes are responsible to describe type features. Datatype architecture design is a novel approach to match programming features along with hardware design. In this paper a novel Data type-Based Code Reducer (TYPELINE) architecture is proposed and implemented according to significant data types (SDT) of programming languages. TYPELINE uses TEUs for processing various SDT operations. This architecture design leads to reducing the number of machine codes, and increases execution speed, and also improves some parallelism level. This is because this architecture supports some operation for the execution of Abstract Data Types in parallel. Also it ensures to maintain data type features and entire application level specifications using the proposed type conversion unit. This framework includes compiler level identifying execution modes and memory management unit for decreasing object read/write in heap memory by ISA support. This energy-efficient architecture is completely compatible with object oriented programming languages and in combination mode it can process complex C++ data structures with respect to parallel TYPELINE architecture support.
[ { "version": "v1", "created": "Sat, 1 Feb 2014 14:07:59 GMT" } ]
2014-04-17T00:00:00
[ [ "Nia", "Mehran Alidoost", "" ], [ "Atani", "Reza Ebrahimi", "" ] ]
new_dataset
0.999202
1403.4640
Nabeel Gillani
Nabeel Gillani, Rebecca Eynon, Michael Osborne, Isis Hjorth, Stephen Roberts
Communication Communities in MOOCs
10 pages, 3 figures, 1 table. Submitted for review to UAI 2014
null
null
null
cs.CY cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive Open Online Courses (MOOCs) bring together thousands of people from different geographies and demographic backgrounds -- but to date, little is known about how they learn or communicate. We introduce a new content-analysed MOOC dataset and use Bayesian Non-negative Matrix Factorization (BNMF) to extract communities of learners based on the nature of their online forum posts. We see that BNMF yields a superior probabilistic generative model for online discussions when compared to other models, and that the communities it learns are differentiated by their composite students' demographic and course performance indicators. These findings suggest that computationally efficient probabilistic generative modelling of MOOCs can reveal important insights for educational researchers and practitioners and help to develop more intelligent and responsive online learning environments.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 22:57:24 GMT" }, { "version": "v2", "created": "Wed, 16 Apr 2014 15:50:48 GMT" } ]
2014-04-17T00:00:00
[ [ "Gillani", "Nabeel", "" ], [ "Eynon", "Rebecca", "" ], [ "Osborne", "Michael", "" ], [ "Hjorth", "Isis", "" ], [ "Roberts", "Stephen", "" ] ]
new_dataset
0.991025