id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1404.4100
Liang Gong
Liang Gong, Hongyu Zhang, Hyunmin Seo and Sunghun Kim
Locating Crashing Faults based on Crash Stack Traces
11 pages, this works is done in 2011 when the first author(Liang Gong) was a master student in Tsinghua University
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software crashes due to its increasing complexity. Once a crash happens, a crash report could be sent to software developers for investigation upon user permission. Because of the large number of crash reports and limited information, debugging for crashes is often a tedious and labor-intensive task. In this paper, we propose a statistical fault localization framework to help developers locate functions that contain crashing faults. We generate the execution traces for the failing traces based on the crash stack, and the passing traces from normal executions. We form program spectra by combining generated passing and failing trace, and then apply statistical fault localization techniques such as Ochiai to locate the crashing faults. We also propose two heuristics to improve the fault localization performance. We evaluate our approach using the real-world Firefox crash report data. The results show that the performance of our method is promising. Our approach permits developers to locate 63.9% crashing faults by examining only 5% Firefox 3.6 functions in the spectra.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 22:32:21 GMT" } ]
2014-04-17T00:00:00
[ [ "Gong", "Liang", "" ], [ "Zhang", "Hongyu", "" ], [ "Seo", "Hyunmin", "" ], [ "Kim", "Sunghun", "" ] ]
new_dataset
0.999745
1312.1450
Liang Liu
Liang Liu, Rui Zhang, and Kee-Chaing Chua
Multi-Antenna Wireless Powered Communication with Energy Beamforming
submitted for possible publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The newly emerging wireless powered communication networks (WPCNs) have recently drawn significant attention, where radio signals are used to power wireless terminals for information transmission. In this paper, we study a WPCN where one multi-antenna access point (AP) coordinates energy transfer and information transfer to/from a set of single-antenna users. A harvest-then-transmit protocol is assumed where the AP first broadcasts wireless power to all users via energy beamforming in the downlink (DL), and then the users send their independent information to the AP simultaneously in the uplink (UL) using their harvested energy. To optimize the users' throughput and yet guarantee their rate fairness, we maximize the minimum throughput among all users by a joint design of the DL-UL time allocation, the DL energy beamforming, and the UL transmit power allocation plus receive beamforming. We solve this non-convex problem optimally by two steps. First, we fix the DL-UL time allocation and obtain the optimal DL energy beamforming, UL power allocation and receive beamforming to maximize the minimum signal-to-interference-plus-noise ratio (SINR) of all users. This problem is shown to be in general non-convex; however, we convert it equivalently to a spectral radius minimization problem, which can be solved efficiently by applying the alternating optimization based on the non-negative matrix theory. Then, the optimal time allocation is found by a one-dimension search to maximize the minimum rate of all users. Furthermore, two suboptimal designs of lower complexity are proposed, and their throughput performance is compared against that of the optimal solution.
[ { "version": "v1", "created": "Thu, 5 Dec 2013 07:01:06 GMT" }, { "version": "v2", "created": "Thu, 19 Dec 2013 14:04:42 GMT" }, { "version": "v3", "created": "Tue, 15 Apr 2014 08:24:52 GMT" } ]
2014-04-16T00:00:00
[ [ "Liu", "Liang", "" ], [ "Zhang", "Rui", "" ], [ "Chua", "Kee-Chaing", "" ] ]
new_dataset
0.998833
1404.3820
Joshua Grochow
Joshua A. Grochow and Toniann Pitassi
Circuit complexity, proof complexity, and polynomial identity testing
null
null
null
null
cs.CC cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new algebraic proof system, which has tight connections to (algebraic) circuit complexity. In particular, we show that any super-polynomial lower bound on any Boolean tautology in our proof system implies that the permanent does not have polynomial-size algebraic circuits (VNP is not equal to VP). As a corollary to the proof, we also show that super-polynomial lower bounds on the number of lines in Polynomial Calculus proofs (as opposed to the usual measure of number of monomials) imply the Permanent versus Determinant Conjecture. Note that, prior to our work, there was no proof system for which lower bounds on an arbitrary tautology implied any computational lower bound. Our proof system helps clarify the relationships between previous algebraic proof systems, and begins to shed light on why proof complexity lower bounds for various proof systems have been so much harder than lower bounds on the corresponding circuit classes. In doing so, we highlight the importance of polynomial identity testing (PIT) for understanding proof complexity. More specifically, we introduce certain propositional axioms satisfied by any Boolean circuit computing PIT. We use these PIT axioms to shed light on AC^0[p]-Frege lower bounds, which have been open for nearly 30 years, with no satisfactory explanation as to their apparent difficulty. We show that either: a) Proving super-polynomial lower bounds on AC^0[p]-Frege implies VNP does not have polynomial-size circuits of depth d - a notoriously open question for d at least 4 - thus explaining the difficulty of lower bounds on AC^0[p]-Frege, or b) AC^0[p]-Frege cannot efficiently prove the depth d PIT axioms, and hence we have a lower bound on AC^0[p]-Frege. Using the algebraic structure of our proof system, we propose a novel way to extend techniques from algebraic circuit complexity to prove lower bounds in proof complexity.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 05:54:46 GMT" } ]
2014-04-16T00:00:00
[ [ "Grochow", "Joshua A.", "" ], [ "Pitassi", "Toniann", "" ] ]
new_dataset
0.970028
1404.3920
Aske Plaat
Catholijn Jonker, Joost Broekens, Aske Plaat
Virtual Reflexes
null
null
null
null
cs.CY cs.HC
http://creativecommons.org/licenses/by/3.0/
Virtual Reality is used successfully to treat people for regular phobias. A new challenge is to develop Virtual Reality Exposure Training for social skills. Virtual actors in such systems have to show appropriate social behavior including emotions, gaze, and keeping distance. The behavior must be realistic and real-time. Current approaches consist of four steps: 1) trainee social signal detection, 2) cognitive-affective interpretation, 3) determination of the appropriate bodily responses, and 4) actuation. The "cognitive" detour of such approaches does not match the directness of human bodily reflexes and causes unrealistic responses and delay. Instead, we propose virtual reflexes as concurrent sensory-motor processes to control virtual actors. Here we present a virtual reflexes architecture, explain how emotion and cognitive modulation are embedded, detail its workings, and give an example description of an aggression training application.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 14:07:09 GMT" } ]
2014-04-16T00:00:00
[ [ "Jonker", "Catholijn", "" ], [ "Broekens", "Joost", "" ], [ "Plaat", "Aske", "" ] ]
new_dataset
0.987286
1310.6422
Dheerendra Mishra Mr.
Dheerendra Mishra
Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic ID-based remote user authentication schemes ensure efficient and anonymous mutual authentication between entities. In 2013, Khan et al. proposed an improved dynamic ID-based authentication scheme to overcome the security flaws of Wang et al.'s authentication scheme. Recently, Sun and Cao showed that Khan et al. does not satisfies the claim of the user's privacy and proposed an efficient authentication scheme with user anonymity. The Sun and Cao's scheme achieve improvement over Khan et al.'s scheme in both privacy and performance point of view. Unfortunately, we identify that Sun and Cao's scheme does not resist password guessing attack. Additionally, Sun and Cao's scheme does not achieve forward secrecy.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 22:43:48 GMT" }, { "version": "v2", "created": "Sun, 13 Apr 2014 06:20:34 GMT" } ]
2014-04-15T00:00:00
[ [ "Mishra", "Dheerendra", "" ] ]
new_dataset
0.968484
1402.1377
Edward Haeusler
Davi Romero de Vasconcelos and Edward Hermann Haeusler
Reasoning about Games via a First-order Modal Model Checking Approach
Extended version of article published in the SBMF 2007. Accepted to ENTCS. Withdrawn from ENTCS in 2014 in virtue to submission to other venue
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present a logic based on first-order CTL, namely Game Analysis Logic (GAL), in order to reason about games. We relate models and solution concepts of Game Theory as models and formulas of GAL, respectively. Precisely, we express extensive games with perfect in- formation as models of GAL, and Nash equilibrium and subgame perfect equilibrium by means of formulas of GAL. From a practical point of view, we provide a GAL model checker in order to analyze games automatically. We use our model checker in at least two directions: to find solution con- cepts of Game Theory; and, to analyze players that are based on standard algorithms of the AI community, such as the minimax procedure.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 15:29:21 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2014 15:54:46 GMT" } ]
2014-04-15T00:00:00
[ [ "de Vasconcelos", "Davi Romero", "" ], [ "Haeusler", "Edward Hermann", "" ] ]
new_dataset
0.972064
1404.3316
Luiz Cortinhas
Luiz Cortinhas, Patrick Monteiro, Amir Zahlan, Gabriel Vianna and Marcio Moscoso
Embed System for Robotic Arm with 3 Degree of Freedom Controller using Computational Vision on Real-Time
8 pages,9 figures, published on AIFL 2014 conference (AIFL-2014 Submission 20)
null
null
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This Paper deals with robotic arm embed controller system, with distributed system based on protocol communication between one server supporting multiple points and mobile applications trough sockets .The proposed system utilizes hand with glove gesture in three-dimensional recognition using fuzzy implementation to set x,y,z coordinates. This approach present all implementation over: two raspberry PI arm based computer running client program, x64 PC running server program, and one robot arm controlled by ATmega328p based board.
[ { "version": "v1", "created": "Sat, 12 Apr 2014 19:30:32 GMT" } ]
2014-04-15T00:00:00
[ [ "Cortinhas", "Luiz", "" ], [ "Monteiro", "Patrick", "" ], [ "Zahlan", "Amir", "" ], [ "Vianna", "Gabriel", "" ], [ "Moscoso", "Marcio", "" ] ]
new_dataset
0.99748
1404.3341
Andrea Ballatore
Andrea Ballatore
Defacing the map: Cartographic vandalism in the digital commons
24 pages, 4 figures, 1 table.The Cartographic Journal, 2014
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article addresses the emergent phenomenon of carto-vandalism, the intentional defacement of collaborative cartographic digital artefacts in the context of volunteered geographic information. Through a qualitative analysis of reported incidents in WikiMapia and OpenStreetMap, a typology of this kind of vandalism is outlined, including play, ideological, fantasy, artistic, and industrial carto-vandalism, as well as carto-spam. Two families of counter-strategies deployed in amateur mapping communities are discussed. First, the contributors organise forms of policing, based on volunteered community involvement, patrolling the maps and reporting incidents. Second, the detection of carto-vandalism can be supported by automated tools, based either on explicit rules or on machine learning.
[ { "version": "v1", "created": "Sun, 13 Apr 2014 02:57:51 GMT" } ]
2014-04-15T00:00:00
[ [ "Ballatore", "Andrea", "" ] ]
new_dataset
0.992954
1404.3707
Samir Lemes
Samir Lemes
Information Security Management of Web Portals Based on Joomla CMS
Proceedings of the 15th International Research/Expert Conference "Trends in the Development of Machinery and Associated Technology" TMT 2011, (S. Ekinovic, J. Vivancos, E. Tacer, editors), pp 509-512, ISSN 1840-4944, Prague, Czech Republic, 12-18 September 2011
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information is the key asset of all organizations and can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by mail or by electronic means, shown in films, or spoken in conversation. In today's competitive business environment, such information is constantly under threat from many sources, which can be internal, external, accidental, or malicious. Joomla is a very popular Content Management System (CMS) used for web page maintenance. This highly versatile software has found itself in both large corporate web portals, and simple web pages such as blogs. Such popularity increases its vulnerability to potential attacks and therefore needs an appropriate security management. ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) created the series of standards aimed at providing a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an Information Security Management System (ISMS). This paper shows how principles set in ISO/IEC 27000 series of standards can be used to improve security of Joomla based web portals.
[ { "version": "v1", "created": "Mon, 14 Apr 2014 19:31:53 GMT" } ]
2014-04-15T00:00:00
[ [ "Lemes", "Samir", "" ] ]
new_dataset
0.976229
cs/0606103
Chengpu Wang
Chengpu Wang
Precision Arithmetic: A New Floating-Point Arithmetic
54 Pages, 32 Figures
null
null
null
cs.DM cs.DS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new deterministic floating-point arithmetic called precision arithmetic is developed to track precision for arithmetic calculations. It uses a novel rounding scheme to avoid excessive rounding error propagation of conventional floating-point arithmetic. Unlike interval arithmetic, its uncertainty tracking is based on statistics and the central limit theorem, with a much tighter bounding range. Its stable rounding error distribution is approximated by a truncated normal distribution. Generic standards and systematic methods for validating uncertainty-bearing arithmetics are discussed. The precision arithmetic is found to be better than interval arithmetic in both uncertainty-tracking and uncertainty-bounding for normal usages. The precision arithmetic is available publicly at http://precisionarithm.sourceforge.net.
[ { "version": "v1", "created": "Sun, 25 Jun 2006 18:56:28 GMT" }, { "version": "v10", "created": "Wed, 13 Oct 2010 02:39:44 GMT" }, { "version": "v11", "created": "Sat, 30 Oct 2010 03:49:06 GMT" }, { "version": "v12", "created": "Thu, 11 Nov 2010 20:25:56 GMT" }, { "version": "v13", "created": "Mon, 6 Dec 2010 21:56:48 GMT" }, { "version": "v14", "created": "Wed, 5 Jan 2011 04:43:49 GMT" }, { "version": "v15", "created": "Mon, 21 Feb 2011 02:07:43 GMT" }, { "version": "v16", "created": "Mon, 14 Mar 2011 20:40:47 GMT" }, { "version": "v17", "created": "Tue, 26 Jul 2011 02:22:36 GMT" }, { "version": "v18", "created": "Sat, 10 Dec 2011 19:13:43 GMT" }, { "version": "v19", "created": "Wed, 12 Sep 2012 01:57:05 GMT" }, { "version": "v2", "created": "Tue, 15 Aug 2006 01:33:34 GMT" }, { "version": "v20", "created": "Tue, 18 Mar 2014 04:17:22 GMT" }, { "version": "v21", "created": "Thu, 3 Apr 2014 11:40:24 GMT" }, { "version": "v22", "created": "Sat, 12 Apr 2014 02:02:06 GMT" }, { "version": "v3", "created": "Wed, 19 May 2010 03:16:25 GMT" }, { "version": "v4", "created": "Thu, 20 May 2010 21:42:30 GMT" }, { "version": "v5", "created": "Fri, 9 Jul 2010 18:50:07 GMT" }, { "version": "v6", "created": "Wed, 21 Jul 2010 02:26:26 GMT" }, { "version": "v7", "created": "Sun, 25 Jul 2010 22:54:13 GMT" }, { "version": "v8", "created": "Mon, 27 Sep 2010 15:35:14 GMT" }, { "version": "v9", "created": "Wed, 6 Oct 2010 01:21:06 GMT" } ]
2014-04-15T00:00:00
[ [ "Wang", "Chengpu", "" ] ]
new_dataset
0.994166
1202.3625
Thomas B\"achler
Wilhelm Plesken, Thomas B\"achler
From Linear Codes to Hyperplane Arrangements via Thomas Decomposition
This has been rejected since it contains some mistakes. A similar work has been publish in Documenta Math. vol. 19
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a connection between linear codes and hyperplane arrangements using the Thomas decomposition of polynomial systems and the resulting counting polynomial. This yields both a generalization and a refinement of the weight enumerator of a linear code. In particular, one can deal with infinitely many finite fields simultaneously by defining a weight enumerator for codes over infinite fields.
[ { "version": "v1", "created": "Thu, 16 Feb 2012 15:38:00 GMT" }, { "version": "v2", "created": "Fri, 11 Apr 2014 15:20:18 GMT" } ]
2014-04-14T00:00:00
[ [ "Plesken", "Wilhelm", "" ], [ "Bächler", "Thomas", "" ] ]
new_dataset
0.998739
1404.2946
Timotheos Aslanidis
Timotheos Aslanidis and Marios-Evangelos Kogias
Algorithms for Packet Routing in Switching Networks with Reconfiguration Overhead
7 pages, 2 figures, CCNET 2014 Conference
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Given a set of messages to be transmitted in packages from a set of sending stations to a set of receiving stations, we are required to schedule the packages so as to achieve the minimum possible time from the moment the 1st transmission initiates to the concluding of the last. Preempting packets in order to reroute message remains, as part of some other packet to be transmitted at a later time would be a great means to achieve our goal, if not for the fact that each preemption will come with a reconfiguration cost that will delay our entire effort. The problem has been extensively studied in the past and various algorithms have been proposed to handle many variations of the problem. In this paper we propose an improved algorithm that we call the Split-Graph Algorithm (SGA). To establish its efficiency we compare it, to two of the algorithms developed in the past. These two are the best presented in bibliography so far, one in terms of approximation ratio and one in terms of experimental results.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 20:41:18 GMT" } ]
2014-04-14T00:00:00
[ [ "Aslanidis", "Timotheos", "" ], [ "Kogias", "Marios-Evangelos", "" ] ]
new_dataset
0.980159
1404.3001
Runxin Wang
Runxin Wang, Rongke Liu, Yi Hou
Joint Successive Cancellation Decoding of Polar Codes over Intersymbol Interference Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are a class of capacity-achieving codes for the binary-input discrete memoryless channels (B-DMCs). However, when applied in channels with intersymbol interference (ISI), the codes may perform poorly with BCJR equalization and conventional decoding methods. To deal with the ISI problem, in this paper a new joint successive cancellation (SC) decoding algorithm is proposed for polar codes in ISI channels, which combines the equalization and conventional decoding. The initialization information of the decoding method is the likelihood functions of ISI codeword symbols rather than the codeword symbols. The decoding adopts recursion formulas like conventional SC decoding and is without iterations. This is in contrast to the conventional iterative algorithm which performs iterations between the equalizer and decoder. In addition, the proposed SC trellis decoding can be easily extended to list decoding which can further improve the performance. Simulation shows that the proposed scheme significantly outperforms the conventional decoding schemes in ISI channels.
[ { "version": "v1", "created": "Fri, 11 Apr 2014 04:53:16 GMT" } ]
2014-04-14T00:00:00
[ [ "Wang", "Runxin", "" ], [ "Liu", "Rongke", "" ], [ "Hou", "Yi", "" ] ]
new_dataset
0.996207
1404.3162
Harald Kr\"oll
Harald Kr\"oll, Stefan Zwicky, Reto Odermatt, Lukas Bruderer, Andreas Burg, Qiuting Huang
A Signal Processor for Gaussian Message Passing
accepted to the IEEE IEEE International Symposium on Circuits and Systems (ISCAS) 2014
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel signal processing unit built upon the theory of factor graphs, which is able to address a wide range of signal processing algorithms. More specifically, the demonstrated factor graph processor (FGP) is tailored to Gaussian message passing algorithms. We show how to use a highly configurable systolic array to solve the message update equations of nodes in a factor graph efficiently. A proper instruction set and compilation procedure is presented. In a recursive least squares channel estimation example we show that the FGP can compute a message update faster than a state-ofthe- art DSP. The results demonstrate the usabilty of the FGP architecture as a flexible HW accelerator for signal-processing and communication systems.
[ { "version": "v1", "created": "Fri, 11 Apr 2014 17:28:54 GMT" } ]
2014-04-14T00:00:00
[ [ "Kröll", "Harald", "" ], [ "Zwicky", "Stefan", "" ], [ "Odermatt", "Reto", "" ], [ "Bruderer", "Lukas", "" ], [ "Burg", "Andreas", "" ], [ "Huang", "Qiuting", "" ] ]
new_dataset
0.960588
1205.2548
Bartosz Walczak
Kolja Knauer, Piotr Micek, Bartosz Walczak
Outerplanar graph drawings with few slopes
Major revision of the whole paper
Comput.Geom. 47 (2014) 614-624
10.1016/j.comgeo.2014.01.003
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider straight-line outerplanar drawings of outerplanar graphs in which a small number of distinct edge slopes are used, that is, the segments representing edges are parallel to a small number of directions. We prove that $\Delta-1$ edge slopes suffice for every outerplanar graph with maximum degree $\Delta\ge 4$. This improves on the previous bound of $O(\Delta^5)$, which was shown for planar partial 3-trees, a superclass of outerplanar graphs. The bound is tight: for every $\Delta\ge 4$ there is an outerplanar graph with maximum degree $\Delta$ that requires at least $\Delta-1$ distinct edge slopes in an outerplanar straight-line drawing.
[ { "version": "v1", "created": "Fri, 11 May 2012 15:07:51 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2014 07:35:04 GMT" } ]
2014-04-11T00:00:00
[ [ "Knauer", "Kolja", "" ], [ "Micek", "Piotr", "" ], [ "Walczak", "Bartosz", "" ] ]
new_dataset
0.999769
1403.0017
Zoran Majkic
Zoran Majkic
Intensional RDB Manifesto: a Unifying NewSQL Model for Flexible Big Data
29 pages. arXiv admin note: text overlap with arXiv:1103.0967, arXiv:1103.0680
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new family of Intensional RDBs (IRDBs) which extends the traditional RDBs with the Big Data and flexible and 'Open schema' features, able to preserve the user-defined relational database schemas and all preexisting user's applications containing the SQL statements for a deployment of such a relational data. The standard RDB data is parsed into an internal vector key/value relation, so that we obtain a column representation of data used in Big Data applications, covering the key/value and column-based Big Data applications as well, into a unifying RDB framework. We define a query rewriting algorithm, based on the GAV Data Integration methods, so that each user-defined SQL query is rewritten into a SQL query over this vector relation, and hence the user-defined standard RDB schema is maintained as an empty global schema for the RDB schema modeling of data and as the SQL interface to stored vector relation. Such an IRDB architecture is adequate for the massive migrations from the existing slow RDBMSs into this new family of fast IRDBMSs by offering a Big Data and new flexible schema features as well.
[ { "version": "v1", "created": "Fri, 28 Feb 2014 21:48:30 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2014 18:52:29 GMT" } ]
2014-04-11T00:00:00
[ [ "Majkic", "Zoran", "" ] ]
new_dataset
0.991983
1403.6089
Zoran Majkic
Zoran Majkic
Intensional RDB for Big Data Interoperability
30 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1103.0967, arXiv:1403.0017
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new family of Intensional RDBs (IRDBs), introduced in [1], extends the traditional RDBs with the Big Data and flexible and 'Open schema' features, able to preserve the user-defined relational database schemas and all preexisting user's applications containing the SQL statements for a deployment of such a relational data. The standard RDB data is parsed into an internal vector key/value relation, so that we obtain a column representation of data used in Big Data applications, covering the key/value and column-based Big Data applications as well, into a unifying RDB framework. Such an IRDB architecture is adequate for the massive migrations from the existing slow RDBMSs into this new family of fast IRDBMSs by offering a Big Data and new flexible schema features as well. Here we present the interoperability features of the IRDBs by permitting the queries also over the internal vector relations created by parsing of each federated database in a given Multidatabase system. We show that the SchemaLog with the second-order syntax and ad hoc Logic Programming and its querying fragment can be embedded into the standard SQL IRDBMSs, so that we obtain a full interoperabilty features of IRDBs by using only the standard relational SQL for querying both data and meta-data.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 19:15:37 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 2014 19:00:09 GMT" } ]
2014-04-11T00:00:00
[ [ "Majkic", "Zoran", "" ] ]
new_dataset
0.980649
1404.2656
Muhammad Nazmul Islam
Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge Koymen, Narayan B. Mandayam
Wireless Backhaul Node Placement for Small Cell Networks
Invited paper at Conference on Information Science & Systems (CISS) 2014
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Small cells have been proposed as a vehicle for wireless networks to keep up with surging demand. Small cells come with a significant challenge of providing backhaul to transport data to(from) a gateway node in the core network. Fiber based backhaul offers the high rates needed to meet this requirement, but is costly and time-consuming to deploy, when not readily available. Wireless backhaul is an attractive option for small cells as it provides a less expensive and easy-to-deploy alternative to fiber. However, there are multitude of bands and features (e.g. LOS/NLOS, spatial multiplexing etc.) associated with wireless backhaul that need to be used intelligently for small cells. Candidate bands include: sub-6 GHz band that is useful in non-line-of-sight (NLOS) scenarios, microwave band (6-42 GHz) that is useful in point-to-point line-of-sight (LOS) scenarios, and millimeter wave bands (e.g. 60, 70 and 80 GHz) that are recently being commercially used in LOS scenarios. In many deployment topologies, it is advantageous to use aggregator nodes, located at the roof tops of tall buildings near small cells. These nodes can provide high data rate to multiple small cells in NLOS paths, sustain the same data rate to gateway nodes using LOS paths and take advantage of all available bands. This work performs the joint cost optimal aggregator node placement, power allocation, channel scheduling and routing to optimize the wireless backhaul network. We formulate mixed integer nonlinear programs (MINLP) to capture the different interference and multiplexing patterns at sub-6 GHz and microwave band. We solve the MINLP through linear relaxation and branch-and-bound algorithm and apply our algorithm in an example wireless backhaul network of downtown Manhattan.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 00:31:44 GMT" } ]
2014-04-11T00:00:00
[ [ "Islam", "Muhammad Nazmul", "" ], [ "Sampath", "Ashwin", "" ], [ "Maharshi", "Atul", "" ], [ "Koymen", "Ozge", "" ], [ "Mandayam", "Narayan B.", "" ] ]
new_dataset
0.98954
1404.2796
Vitaly Skachek
Helger Lipmaa and Vitaly Skachek
Linear Batch Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an application, where a client wants to obtain many elements from a large database, it is often desirable to have some load balancing. Batch codes (introduced by Ishai et al. in STOC 2004) make it possible to do exactly that: the large database is divided between many servers, so that the client has to only make a small number of queries to every server to obtain sufficient information to reconstruct all desired elements. Other important parameters of the batch codes are total storage and the number of servers. Batch codes also have applications in cryptography (namely, in the construction of multi-query computationally-private information retrieval protocols). In this work, we initiate the study of linear batch codes. These codes, in particular, are of potential use in distributed storage systems. We show that a generator matrix of a binary linear batch code is also a generator matrix of classical binary linear error-correcting code. This immediately yields that a variety of upper bounds, which were developed for error-correcting codes, are applicable also to binary linear batch codes. We also propose new methods to construct large linear batch codes from the smaller ones.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 13:28:09 GMT" } ]
2014-04-11T00:00:00
[ [ "Lipmaa", "Helger", "" ], [ "Skachek", "Vitaly", "" ] ]
new_dataset
0.999523
1404.2816
Marina Maslennikova
Marina Maslennikova
Reset Complexity of Ideal Languages
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new characteristic of a regular ideal language called reset complexity. We find some bounds on the reset complexity in terms of the state complexity of a given language. We also compare the reset complexity and the state complexity for languages related to slowly synchronizing automata and study uniqueness question for automata yielding the minimum of reset complexity.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 14:08:18 GMT" } ]
2014-04-11T00:00:00
[ [ "Maslennikova", "Marina", "" ] ]
new_dataset
0.983984
1404.2863
Daniel Moskovich
Avishy Y. Carmi and Daniel Moskovich
Tangle Machines II: Invariants
26 pages, 30 figures
null
null
null
cs.IT cs.SY math.GT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The preceding paper constructed tangle machines as diagrammatic models, and illustrated their utility with a number of examples. The information content of a tangle machine is contained in characteristic quantities associated to equivalence classes of tangle machines, which are called invariants. This paper constructs invariants of tangle machines. Chief among these are the prime factorizations of a machine, which are essentially unique. This is proven using low dimensional topology, through representing a colour-suppressed machine as a diagram for a network of jointly embedded spheres and intervals in 4-space. The complexity of a tangle machine is defined as its number of prime factors.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 16:07:57 GMT" } ]
2014-04-11T00:00:00
[ [ "Carmi", "Avishy Y.", "" ], [ "Moskovich", "Daniel", "" ] ]
new_dataset
0.996998
1404.2889
Fekri Abduljalil Dr.
Fekri M. Abduljalil
A Novel Real-Time Video and Data Capture of Vehicular Accident in Intelligent Transportation Systems
null
null
10.5121/ijcnc.2014.6205
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel real-time video and data capture of vehicle accident is proposed in Intelligent Transportation System (ITS). The proposed scheme solves the problem of huge storage needed for recording vehicle accident in the smart vehicle and in the remote ITS server. It works efficiently with small amount of storage size and guarantee saving accident video in secondary storage. It enables user to capture real-time video and data of running vehicle. It enables user to get vehicle accident video and data anytime anywhere. The scheme is implemented using testbed and its performance is evaluated. The results show that the proposed scheme guarantees record the vehicle accident in the ITS server. The proposed scheme has better results in comparison with full time video recording scheme.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 17:49:51 GMT" } ]
2014-04-11T00:00:00
[ [ "Abduljalil", "Fekri M.", "" ] ]
new_dataset
0.999
1404.2921
Martin Reisslein
Xing Wei, Frank Aurzada, Michael P. McGarry, and Martin Reisslein
DyCaPPON: Dynamic Circuit and Packet Passive Optical Network (Extended Version)
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic circuits are well suited for applications that require predictable service with a constant bit rate for a prescribed period of time, such as cloud computing and e-science applications. Past research on upstream transmission in passive optical networks (PONs) has mainly considered packet-switched traffic and has focused on optimizing packet-level performance metrics, such as reducing mean delay. This study proposes and evaluates a dynamic circuit and packet PON (DyCaPPON) that provides dynamic circuits along with packet-switched service. DyCaPPON provides $(i)$ flexible packet-switched service through dynamic bandwidth allocation in periodic polling cycles, and $(ii)$ consistent circuit service by allocating each active circuit a fixed-duration upstream transmission window during each fixed-duration polling cycle. We analyze circuit-level performance metrics, including the blocking probability of dynamic circuit requests in DyCaPPON through a stochastic knapsack-based analysis. Through this analysis we also determine the bandwidth occupied by admitted circuits. The remaining bandwidth is available for packet traffic and we conduct an approximate analysis of the resulting mean delay of packet traffic. Through extensive numerical evaluations and verifying simulations we demonstrate the circuit blocking and packet delay trade-offs in DyCaPPON.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 19:52:57 GMT" } ]
2014-04-11T00:00:00
[ [ "Wei", "Xing", "" ], [ "Aurzada", "Frank", "" ], [ "McGarry", "Michael P.", "" ], [ "Reisslein", "Martin", "" ] ]
new_dataset
0.998605
1403.4060
Fernando Hernando
Carlos Galindo and Fernando Hernando
Quantum codes from affine variety codes and their subfield-subcodes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use affine variety codes and their subfield-subcodes for obtaining quantum stabilizer codes via the CSS code construction. With this procedure, we get codes with good parameters and a code whose parameters exceed the CSS quantum Gilbert-Varshamov bound given by Feng and Ma.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 10:50:29 GMT" }, { "version": "v2", "created": "Wed, 9 Apr 2014 08:37:54 GMT" } ]
2014-04-10T00:00:00
[ [ "Galindo", "Carlos", "" ], [ "Hernando", "Fernando", "" ] ]
new_dataset
0.99974
1404.2347
Timur Mirzoev
Dr. Timur Mirzoev
Automation Security
null
Proceedings of the Second International Seminar, Saint Petersburg State University of Aerospace Instrumentation. January 2007
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation s critical infrastructure and require protection from a variety of threats that exist in cyber space today.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 01:41:35 GMT" } ]
2014-04-10T00:00:00
[ [ "Mirzoev", "Dr. Timur", "" ] ]
new_dataset
0.992145
1404.2348
Xiaojun Feng
Xiaojun Feng, Peng Lin, Qian Zhang
FlexAuc: Serving Dynamic Demands in a Spectrum Trading Market with Flexible Auction
11 pages, 7 figures, Preliminary version accepted in INFOCOM 2014
null
null
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In secondary spectrum trading markets, auctions are widely used by spectrum holders (SHs) to redistribute their unused channels to secondary wireless service providers (WSPs). As sellers, the SHs design proper auction schemes to stimulate more participants and maximize the revenue from the auction. As buyers, the WSPs determine the bidding strategies in the auction to better serve their end users. In this paper, we consider a three-layered spectrum trading market consisting of the SH, the WSPs and the end users. We jointly study the strategies of the three parties. The SH determines the auction scheme and spectrum supplies to optimize its revenue. The WSPs have flexible bidding strategies in terms of both demands and valuations considering the strategies of the end users. We design FlexAuc, a novel auction mechanism for this market to enable dynamic supplies and demands in the auction. We prove theoretically that FlexAuc not only maximizes the social welfare but also preserves other nice properties such as truthfulness and computational tractability.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 01:44:58 GMT" } ]
2014-04-10T00:00:00
[ [ "Feng", "Xiaojun", "" ], [ "Lin", "Peng", "" ], [ "Zhang", "Qian", "" ] ]
new_dataset
0.99938
1404.2364
Rashmi Jain
Dr Manju Kaushik and Rashmi Jain
Gesture Based Interaction NUI: An Overview
4 pages."Published with International Journal of Engineering Trends and Technology (IJETT)"
International Journal of Engineering Trends and Technology (IJETT) 9(12), March 2014. Published by Seventh Sense Research Group
10.14445/22315381/IJETT-V9P319
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Touch,face,voice recognition and movement sensors all are part of an emerging field of computing often called natural user interface, or NUI. Interacting with technology in these humanistic ways is no longer limited to high tech secret agents. Gesture Touch, face, voice recognition and movement sensors all are part of an emerging field of computing often called natural user interface, or NUI. Interacting with technology in these humanistic ways is no longer limited to high tech secret agents. Gesture recognition is the process by which gestures formed by a user are made known to the system. In completely immersive VR environments, the keyboard is generally not included, Technology incorporates face, voice, gesture, and object recognition to give users a variety of ways to interact with the console, all without needing a controller. This paper focuses on the emerging way of human computer interaction, Gesture recognition concept and gesture types.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 04:43:27 GMT" } ]
2014-04-10T00:00:00
[ [ "Kaushik", "Dr Manju", "" ], [ "Jain", "Rashmi", "" ] ]
new_dataset
0.998537
1404.2584
Selma Belhadj Amor
Selma Belhadj Amor, Yossef Steinberg, and Mich\`ele Wigger
MIMO MAC-BC Duality with Linear-Feedback Coding Schemes
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that for the multi-antenna Gaussian multi-access channel (MAC) and broadcast channel (BC) with perfect feedback, the rate regions achieved by linear-feedback coding schemes (called linear-feedback capacity regions) coincide when the same total input-power constraint is imposed on both channels and when the MAC channel matrices are the transposes of the BC channel matrices. Such a pair of MAC and BC is called dual. We also identify sub-classes of linear-feedback coding schemes that achieve the linear-feedback capacity regions of these two channels and present multi-letter expressions for the linear-feedback capacity regions. Moreover, within the two sub-classes of coding schemes that achieve the linear-feedback capacity regions for a given MAC and its dual BC, we identify for each MAC scheme a BC scheme and for each BC scheme a MAC scheme so that the two schemes have same total input power and achieve the same rate regions.
[ { "version": "v1", "created": "Wed, 9 Apr 2014 19:28:24 GMT" } ]
2014-04-10T00:00:00
[ [ "Amor", "Selma Belhadj", "" ], [ "Steinberg", "Yossef", "" ], [ "Wigger", "Michèle", "" ] ]
new_dataset
0.999529
1404.1911
Bahador Saket
Bahador Saket, Paolo Simonetto, Stephen Kobourov and Katy Borner
Node, Node-Link, and Node-Link-Group Diagrams: An Evaluation
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effectively showing the relationships between objects in a dataset is one of the main tasks in information visualization. Typically there is a well-defined notion of distance between pairs of objects, and traditional approaches such as principal component analysis or multi-dimensional scaling are used to place the objects as points in 2D space, so that similar objects are close to each other. In another typical setting, the dataset is visualized as a network graph, where related nodes are connected by links. More recently, datasets are also visualized as maps, where in addition to nodes and links, there is an explicit representation of groups and clusters. We consider these three Techniques, characterized by a progressive increase of the amount of encoded information: node diagrams, node-link diagrams and node-link-group diagrams. We assess these three types of diagrams with a controlled experiment that covers nine different tasks falling broadly in three categories: node-based tasks, network-based tasks and group-based tasks. Our findings indicate that adding links, or links and group representations, does not negatively impact performance (time and accuracy) of node-based tasks. Similarly, adding group representations does not negatively impact the performance of network-based tasks. Node-link-group diagrams outperform the others on group-based tasks. These conclusions contradict results in other studies, in similar but subtly different settings. Taken together, however, such results can have significant implications for the design of standard and domain specific visualizations tools.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 20:01:40 GMT" } ]
2014-04-09T00:00:00
[ [ "Saket", "Bahador", "" ], [ "Simonetto", "Paolo", "" ], [ "Kobourov", "Stephen", "" ], [ "Borner", "Katy", "" ] ]
new_dataset
0.99503
1404.1981
Rodrigo de Lamare
A. G. D. Uchoa, C. T. Healy, R. C. de Lamare, and P. Li
Iterative Detection and LDPC Decoding Algorithms for MIMO Systems in Block-Fading Channels
10 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an Iterative Detection and Decoding (IDD) scheme with Low Density Parity Check (LDPC) codes for Multiple Input Multiple Output (MIMO) systems for block-fading $F = 2$ and fast fading Rayleigh channels. An IDD receiver with soft information processing that exploits the code structure and the behaviour of the log likelihood ratios (LLR)'s is developed. Minimum Mean Square Error (MMSE) with Successive Interference Cancellation (SIC) and with Parallel Interference Cancellation (PIC) schemes are considered. The soft \textit{a posteriori} output of the decoder in a block-fading channel with Root-Check LDPC codes has allowed us to create a new strategy to improve the Bit Error Rate (BER) of a MIMO IDD scheme. Our proposed strategy in some scenarios has resulted in up to 3dB of gain in terms of BER for block-fading channels and up to 1dB in fast fading channels.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 01:19:00 GMT" } ]
2014-04-09T00:00:00
[ [ "Uchoa", "A. G. D.", "" ], [ "Healy", "C. T.", "" ], [ "de Lamare", "R. C.", "" ], [ "Li", "P.", "" ] ]
new_dataset
0.974562
1404.2116
Tshilidzi Marwala
Tshilidzi Marwala
Rational Counterfactuals
To appear in Artificial Intelligence for Rational Decision Making (Springer-Verlag)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the concept of rational countefactuals which is an idea of identifying a counterfactual from the factual (whether perceived or real) that maximizes the attainment of the desired consequent. In counterfactual thinking if we have a factual statement like: Saddam Hussein invaded Kuwait and consequently George Bush declared war on Iraq then its counterfactuals is: If Saddam Hussein did not invade Kuwait then George Bush would not have declared war on Iraq. The theory of rational counterfactuals is applied to identify the antecedent that gives the desired consequent necessary for rational decision making. The rational countefactual theory is applied to identify the values of variables Allies, Contingency, Distance, Major Power, Capability, Democracy, as well as Economic Interdependency that gives the desired consequent Peace.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 13:15:06 GMT" } ]
2014-04-09T00:00:00
[ [ "Marwala", "Tshilidzi", "" ] ]
new_dataset
0.998129
1404.2153
Timur Mirzoev
Timur Mirzoev, Gerard Gingo, Mike Stawchansky, Tracy White
Apple IOS Devices for Network Administrators
null
World of Computer Science and Information Technology Journal (WCSIT)ISSN: 2221-0741 Vol. 3, No. 6, 114-119, 2013
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiquitous laptop or desktop entirely. Operating exclusively from a tablet device, specifically Apple IOS tablet devices creates unique challenges in a corporate environment traditionally dominated by Microsoft Windows operating systems. Interactions with file shares, presentation media, VPN, and remote access present barriers that users and helpdesk support are unfamiliar with in a relation to an iPad or iPhone. Many solutions are being offered to these challenges some of which are analyzed by this manuscript.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 14:35:06 GMT" } ]
2014-04-09T00:00:00
[ [ "Mirzoev", "Timur", "" ], [ "Gingo", "Gerard", "" ], [ "Stawchansky", "Mike", "" ], [ "White", "Tracy", "" ] ]
new_dataset
0.999807
1404.2187
Ernie Cohen
Ernie Cohen
Coherent Causal Memory
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coherent causal memory (CCM) is causal memory in which prefixes of an execution can be mapped to global memory states in a consistent way. While CCM requires conflicting pairs of writes to be globally ordered, it allows writes to remain unordered with respect to both reads and nonconflicting writes. Nevertheless, it supports assertional, state-based program reasoning using generalized Owicki-Gries proof outlines (where assertions can be attached to any causal program edge). Indeed, we show that from a reasoning standpoint, CCM differs from sequentially consistent (SC) memory only in that ghost code added by the user is not allowed to introduce new write-write races. While CCM provides most of the formal reasoning leverage of SC memory, it is much more efficiently implemented. As an illustration, we describe a simple programming discipline that provides CCM on top of x86-TSO. The discipline is considerably more relaxed than the one needed to ensure SC; for example, it introduces no burden whatsoever for programs in which at most one thread writes to any variable.
[ { "version": "v1", "created": "Wed, 12 Mar 2014 22:58:50 GMT" } ]
2014-04-09T00:00:00
[ [ "Cohen", "Ernie", "" ] ]
new_dataset
0.969811
1404.2237
Lukasz Swierczewski
Monika Kwiatkowska, Lukasz Swierczewski
Steganography - coding and intercepting the information from encoded pictures in the absence of any initial information
10 pages, 5 figures, 5 tables, LVEE 2014 Conference Proceedings
null
null
null
cs.MM cs.CR cs.DC
http://creativecommons.org/licenses/by/3.0/
The work includes implementation and extraction algorithms capabilities test, without any additional data (starting position, the number of bits used, gap between the amount of data encoded) information from encoded files (mostly images). The software is written using OpenMP standard [1], which allowed them to run on parallel computers. Performance tests were carried out on computers, Blue Gene/P [2], Blue Gene/Q [3] and the system consisting of four AMD Opteron 6272 [4]. Source code is available under GNU GPL v3 license and are available in a repository OLib [5].
[ { "version": "v1", "created": "Sun, 2 Feb 2014 17:09:56 GMT" } ]
2014-04-09T00:00:00
[ [ "Kwiatkowska", "Monika", "" ], [ "Swierczewski", "Lukasz", "" ] ]
new_dataset
0.982111
1404.2259
Taylor T Johnson
Luan Viet Nguyen and Taylor T. Johnson
Virtual Prototyping and Distributed Control for Solar Array with Distributed Multilevel Inverter
Preprint draft under review, submitted on March 18, 2014 to IEEE Transactions on Energy Conversion, Special Issue: Advanced Distributed Control of Energy Conversion Devices and Systems
null
null
null
cs.DC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the virtual prototyping of a solar array with a grid-tie implemented as a distributed inverter and controlled using distributed algorithms. Due to the distributed control and inherent redundancy in the array composed of many panels and inverter modules, the virtual prototype exhibits fault-tolerance capabilities. The distributed identifier algorithm allows the system to keep track of the number of operating panels to appropriately regulate the DC voltage output of the panels using buck-boost converters, and determine appropriate switching times for H-bridges in the grid-tie. We evaluate the distributed inverter, its control strategy, and fault-tolerance through simulation in Simulink/Stateflow. Our virtual prototyping framework allows for generating arrays and grid-ties consisting of many panels, and we evaluate arrays of five to dozens of panels. Our analysis suggests the achievable total harmonic distortion (THD) of the system may allow for operating the array in spite of failures of the power electronics, control software, and other subcomponents.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 19:40:47 GMT" } ]
2014-04-09T00:00:00
[ [ "Nguyen", "Luan Viet", "" ], [ "Johnson", "Taylor T.", "" ] ]
new_dataset
0.996198
1404.2261
Mehran Alidoost Nia
Mehran Alidoost Nia, Aida Ghorbani and Reza Ebrahimi Atani
A Novel Anonymous Cloud Architecture Design; Providing Secure Online Services and Electronic Payments
in proceeding of the first international conference on Electronic Commerce and Economy, Tehran, April 2013
null
null
null
cs.CR cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anonymous cloud architecture provides secure environment for business and also e-commerce approaches. By using this type of architecture, we can propose anonymous online applications. Customers who need secure and reliable online services should pay for provided services. A big problem is electronic payment that is needed for billing customers. But customer identity should be remained anonymous during and also after payment procedure. In this paper we propose a novel and modified anonymous architecture that ensures customers that hide their identity from others. This architecture is used from common network protocols and we eliminate Tor anonymous service from architecture design space because of independency. The here is introduced scalability parameter in anonymous cloud architecture design space. After all we compare proposed architecture with other popular cloud architectures in this range and we obtain its advantages according to efficiency, security and anonymity.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 19:49:02 GMT" } ]
2014-04-09T00:00:00
[ [ "Nia", "Mehran Alidoost", "" ], [ "Ghorbani", "Aida", "" ], [ "Atani", "Reza Ebrahimi", "" ] ]
new_dataset
0.999463
1112.2993
Steven Heilman
Steven Heilman, Aukosh Jagannath, Assaf Naor
Solution of the propeller conjecture in $\mathbb{R}^3$
null
Discrete & Computational Geometry. 50 (2013), no. 2, 263-305
null
null
cs.CC math.FA math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that every measurable partition ${A_1,..., A_k}$ of $\mathbb{R}^3$ satisfies $$\sum_{i=1}^k||\int_{A_i} xe^{-\frac12||x||_2^2}dx||_2^2\le 9\pi^2.\qquad(*)$$ Let ${P_1,P_2,P_3}$ be the partition of $\mathbb{R}^2$ into $120^\circ$ sectors centered at the origin. The bound is sharp, with equality holding if $A_i=P_i\times \mathbb{R}$ for $i\in {1,2,3}$ and $A_i=\emptyset$ for $i\in \{4,...,k\}$ (up to measure zero corrections, orthogonal transformations and renumbering of the sets $\{A_1,...,A_k\}$). This settles positively the 3-dimensional Propeller Conjecture of Khot and Naor (FOCS 2008). The proof of reduces the problem to a finite set of numerical inequalities which are then verified with full rigor in a computer-assisted fashion. The main consequence (and motivation) of $(*)$ is complexity-theoretic: the Unique Games hardness threshold of the Kernel Clustering problem with $4 \times 4$ centered and spherical hypothesis matrix equals $\frac{2\pi}{3}$.
[ { "version": "v1", "created": "Tue, 13 Dec 2011 18:27:03 GMT" }, { "version": "v2", "created": "Sun, 6 Apr 2014 02:38:44 GMT" } ]
2014-04-08T00:00:00
[ [ "Heilman", "Steven", "" ], [ "Jagannath", "Aukosh", "" ], [ "Naor", "Assaf", "" ] ]
new_dataset
0.988701
1312.1812
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Long multiplication by instruction sequences with backward jump instructions
17 pages, the preliminaries are about the same as the preliminaries in arXiv:1308.0219 [cs.PL] and arXiv:1312.1529 [cs.PL]; minor errors corrected, references added; section on indirect addressing added
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Backward jump instructions are not necessary for this, but instruction sequences can be significantly shorter with them. We take the function on bit strings that models the multiplication of natural numbers on their representation in the binary number system to demonstrate this by means of a concrete example. The example is reason to discuss points concerning the halting problem and the concept of an algorithm.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 09:41:06 GMT" }, { "version": "v2", "created": "Wed, 18 Dec 2013 12:47:24 GMT" }, { "version": "v3", "created": "Sun, 6 Apr 2014 14:56:30 GMT" } ]
2014-04-08T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
new_dataset
0.981382
1404.1395
Sven Bugiel
Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky
Android Security Framework: Enabling Generic and Extensible Access Control on Android
null
null
null
A/01/2014
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based security modules. The design of ASF reflects lessons learned from the literature on established security frameworks (such as Linux Security Modules or the BSD MAC Framework) and intertwines them with the particular requirements and challenges from the design of Android's software stack. ASF provides a novel security API that supports authors of Android security extensions in developing their modules. This overcomes the current unsatisfactory situation to provide security solutions as separate patches to the Android software stack or to embed them into Android's mainline codebase. As a result, ASF provides different practical benefits such as a higher degree of acceptance, adaptation, and maintenance of security solutions than previously possible on Android. We present a prototypical implementation of ASF and demonstrate its effectiveness and efficiency by modularizing different security models from related work, such as context-aware access control, inlined reference monitoring, and type enforcement.
[ { "version": "v1", "created": "Fri, 4 Apr 2014 21:11:18 GMT" } ]
2014-04-08T00:00:00
[ [ "Backes", "Michael", "" ], [ "Bugiel", "Sven", "" ], [ "Gerling", "Sebastian", "" ], [ "von Styp-Rekowsky", "Philipp", "" ] ]
new_dataset
0.986904
1404.1449
Hamidou Tembine
Hamidou Tembine
Non-Asymptotic Mean-Field Games
36 pages, 2 figures. Accepted and to appear in IEEE Transactions on Systems, Man, and Cybernetics, Part B 2014
null
null
null
cs.GT cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mean-field games have been studied under the assumption of very large number of players. For such large systems, the basic idea consists to approximate large games by a stylized game model with a continuum of players. The approach has been shown to be useful in some applications. However, the stylized game model with continuum of decision-makers is rarely observed in practice and the approximation proposed in the asymptotic regime is meaningless for networks with few entities. In this paper we propose a mean-field framework that is suitable not only for large systems but also for a small world with few number of entities. The applicability of the proposed framework is illustrated through various examples including dynamic auction with asymmetric valuation distributions, and spiteful bidders.
[ { "version": "v1", "created": "Sat, 5 Apr 2014 09:11:05 GMT" } ]
2014-04-08T00:00:00
[ [ "Tembine", "Hamidou", "" ] ]
new_dataset
0.988819
1404.1511
Aske Plaat
Aske Plaat
MTD(f), A Minimax Algorithm Faster Than NegaScout
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
MTD(f) is a new minimax search algorithm, simpler and more efficient than previous algorithms. In tests with a number of tournament game playing programs for chess, checkers and Othello it performed better, on average, than NegaScout/PVS (the AlphaBeta variant used in practically all good chess, checkers, and Othello programs). One of the strongest chess programs of the moment, MIT's parallel chess program Cilkchess uses MTD(f) as its search algorithm, replacing NegaScout, which was used in StarSocrates, the previous version of the program.
[ { "version": "v1", "created": "Sat, 5 Apr 2014 19:51:05 GMT" } ]
2014-04-08T00:00:00
[ [ "Plaat", "Aske", "" ] ]
new_dataset
0.999124
1404.0743
Geoffrey Irving
Geoffrey Irving
Pentago is a First Player Win: Strongly Solving a Game Using Parallel In-Core Retrograde Analysis
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/3.0/
We present a strong solution of the board game pentago, computed using exhaustive parallel retrograde analysis in 4 hours on 98304 ($3 \times 2^{15}$) threads of NERSC's Cray Edison. At $3.0 \times 10^{15}$ states, pentago is the largest divergent game solved to date by two orders of magnitude, and the only example of a nontrivial divergent game solved using retrograde analysis. Unlike previous retrograde analyses, our computation was performed entirely in-core, writing only a small portion of the results to disk; an out-of-core implementation would have been much slower. Symmetry was used to reduce branching factor and exploit instruction level parallelism. Despite a theoretically embarrassingly parallel structure, asynchronous message passing was required to fit the computation into available RAM, causing latency problems on an older Cray machine. All code and data for the project are open source, together with a website which combines database lookup and on-the-fly computation to interactively explore the strong solution.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 01:01:21 GMT" }, { "version": "v2", "created": "Fri, 4 Apr 2014 00:47:00 GMT" } ]
2014-04-07T00:00:00
[ [ "Irving", "Geoffrey", "" ] ]
new_dataset
0.996346
1404.1286
Ardavan Rahimian
Ardavan Rahimian
Steerable Antennas for Automotive Communication Systems
MEng Dissertation, School of EECE, University of Birmingham [Rohde & Schwarz Technology Prize Winner]
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research project undertakes a comprehensive analysis of RF beamforming techniques for design, simulation, fabrication, and measurement of Butler Matrix and Rotman Lens beamforming networks. It is aimed to develop novel and well-established designs for steerable antenna systems that can be used in vehicular telematics and automotive communication systems based on microwave and millimeter-wave techniques.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 11:15:38 GMT" } ]
2014-04-07T00:00:00
[ [ "Rahimian", "Ardavan", "" ] ]
new_dataset
0.996808
1404.1338
Siarhei Charapitsa V.
Siarhei V. Charapitsa, Irina Ya. Dubovskaya, Alexander S. Lobko, Tatiana A. Savitskaya, Svetlana N. Sytova
Structure of Belarusian educational and research web portal of nuclear knowledge
11 pages, 1 figure, submitted to Nuclear Physics and Atomic Energy
null
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objectives and instruments to develop Belarusian educational and research web portal of nuclear knowledge are discussed. Draft structure of portal is presented.
[ { "version": "v1", "created": "Fri, 4 Apr 2014 18:47:10 GMT" } ]
2014-04-07T00:00:00
[ [ "Charapitsa", "Siarhei V.", "" ], [ "Dubovskaya", "Irina Ya.", "" ], [ "Lobko", "Alexander S.", "" ], [ "Savitskaya", "Tatiana A.", "" ], [ "Sytova", "Svetlana N.", "" ] ]
new_dataset
0.963217
1105.2432
Krzysztof R. Apt
Krzysztof R. Apt, Guido Schaefer
Selfishness Level of Strategic Games
34 pages
Journal of AI Research (JAIR) 49 (2014), pp. 207-240, doi:10.1613/jair.4164
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new measure of the discrepancy in strategic games between the social welfare in a Nash equilibrium and in a social optimum, that we call selfishness level. It is the smallest fraction of the social welfare that needs to be offered to each player to achieve that a social optimum is realized in a pure Nash equilibrium. The selfishness level is unrelated to the price of stability and the price of anarchy and is invariant under positive linear transformations of the payoff functions. Also, it naturally applies to other solution concepts and other forms of games. We study the selfishness level of several well-known strategic games. This allows us to quantify the implicit tension within a game between players' individual interests and the impact of their decisions on the society as a whole. Our analyses reveal that the selfishness level often provides a deeper understanding of the characteristics of the underlying game that influence the players' willingness to cooperate. In particular, the selfishness level of finite ordinal potential games is finite, while that of weakly acyclic games can be infinite. We derive explicit bounds on the selfishness level of fair cost sharing games and linear congestion games, which depend on specific parameters of the underlying game but are independent of the number of players. Further, we show that the selfishness level of the $n$-players Prisoner's Dilemma is $c/(b(n-1)-c)$, where $b$ and $c$ are the benefit and cost for cooperation, respectively, that of the $n$-players public goods game is $(1-\frac{c}{n})/(c-1)$, where $c$ is the public good multiplier, and that of the Traveler's Dilemma game is $\frac{1}{2}(b-1)$, where $b$ is the bonus. Finally, the selfishness level of Cournot competition (an example of an infinite ordinal potential game, Tragedy of the Commons, and Bertrand competition is infinite.
[ { "version": "v1", "created": "Thu, 12 May 2011 11:38:21 GMT" }, { "version": "v2", "created": "Thu, 9 Feb 2012 13:41:19 GMT" }, { "version": "v3", "created": "Fri, 1 Jun 2012 09:51:43 GMT" }, { "version": "v4", "created": "Thu, 29 Nov 2012 13:17:41 GMT" }, { "version": "v5", "created": "Mon, 8 Apr 2013 14:34:21 GMT" }, { "version": "v6", "created": "Thu, 5 Dec 2013 12:51:17 GMT" }, { "version": "v7", "created": "Thu, 3 Apr 2014 14:28:03 GMT" } ]
2014-04-04T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Schaefer", "Guido", "" ] ]
new_dataset
0.997504
1308.2747
Andrew Duly
Andrew J. Duly, Taejoon Kim, David J. Love, James V. Krogmeier
Closed-Loop Beam Alignment for Massive MIMO Channel Estimation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Training sequences are designed to probe wireless channels in order to obtain channel state information for block-fading channels. Optimal training sounds the channel using orthogonal beamforming vectors to find an estimate that optimizes some cost function, such as mean square error. As the number of transmit antennas increases, however, the training overhead becomes significant. This creates a need for alternative channel estimation schemes for increasingly large transmit arrays. In this work, we relax the orthogonal restriction on sounding vectors. The use of a feedback channel after each forward channel use during training enables closed-loop sounding vector design. A misalignment cost function is introduced, which provides a metric to sequentially design sounding vectors. In turn, the structure of the sounding vectors aligns the transmit beamformer with the true channel direction, thereby increasing beamforming gain. This beam alignment scheme for massive MIMO is shown to improve beamforming gain over conventional orthogonal training for a MISO channel.
[ { "version": "v1", "created": "Tue, 13 Aug 2013 04:03:04 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2014 22:01:33 GMT" } ]
2014-04-04T00:00:00
[ [ "Duly", "Andrew J.", "" ], [ "Kim", "Taejoon", "" ], [ "Love", "David J.", "" ], [ "Krogmeier", "James V.", "" ] ]
new_dataset
0.97521
1404.0696
Spyros Sioutas SS
S. Sioutas, E. Sakkopoulos, A. Panaretos, D. Tsoumakos, P. Gerolymatos, G. Tzimas and Y. Manolopoulos
D-P2P-Sim+:A Novel Distributed Framework for P2P Protocols Performance Testing
51 pages, 37 figures, submitted to JSS (Elsevier)
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent IoT (Internet of Things) and Web 2.0 technologies, a critical problem arises with respect to storing and processing the large amount of collected data. In this paper we develop and evaluate distributed infrastructures for storing and processing large amount of such data. We present a distributed framework that supports customized deployment of a variety of indexing engines over million-node overlays. The proposed framework provides the appropriate integrated set of tools that allows applications processing large amount of data, to evaluate and test the performance of various application protocols for very large scale deployments (multi million nodes - billions of keys). The key aim is to provide the appropriate environment that contributes in taking decisions regarding the choice of the protocol in storage P2P systems for a variety of big data applications. Using lightweight and efficient collection mechanisms, our system enables real-time registration of multiple measures, integrating support for real-life parameters such as node failure models and recovery strategies. Experiments have been performed at the PlanetLab network and at a typical research laboratory in order to verify scalability and show maximum re-usability of our setup. D-P2P-Sim+ framework is publicly available at http://code.google.com/p/d-p2p-sim/downloads/list.
[ { "version": "v1", "created": "Wed, 2 Apr 2014 20:31:12 GMT" } ]
2014-04-04T00:00:00
[ [ "Sioutas", "S.", "" ], [ "Sakkopoulos", "E.", "" ], [ "Panaretos", "A.", "" ], [ "Tsoumakos", "D.", "" ], [ "Gerolymatos", "P.", "" ], [ "Tzimas", "G.", "" ], [ "Manolopoulos", "Y.", "" ] ]
new_dataset
0.993825
1404.0841
EPTCS
Cl\'audia Nalon (Department of Computer Science, University of Bras\'ilia, Brazil), Lan Zhang (Information School Capital University of Economics and Business, China), Clare Dixon (Department of Computer Science, University of Liverpool, UK), Ullrich Hustadt (Department of Computer Science, University of Liverpool, UK)
A Resolution Prover for Coalition Logic
In Proceedings SR 2014, arXiv:1404.0414
EPTCS 146, 2014, pp. 65-73
10.4204/EPTCS.146.9
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a prototype tool for automated reasoning for Coalition Logic, a non-normal modal logic that can be used for reasoning about cooperative agency. The theorem prover CLProver is based on recent work on a resolution-based calculus for Coalition Logic that operates on coalition problems, a normal form for Coalition Logic. We provide an overview of coalition problems and of the resolution-based calculus for Coalition Logic. We then give details of the implementation of CLProver and present the results for a comparison with an existing tableau-based solver.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 10:38:34 GMT" } ]
2014-04-04T00:00:00
[ [ "Nalon", "Cláudia", "", "Department of Computer Science, University of\n Brasília, Brazil" ], [ "Zhang", "Lan", "", "Information School Capital University of\n Economics and Business, China" ], [ "Dixon", "Clare", "", "Department of Computer Science,\n University of Liverpool, UK" ], [ "Hustadt", "Ullrich", "", "Department of Computer\n Science, University of Liverpool, UK" ] ]
new_dataset
0.999698
1404.0843
EPTCS
Benjamin Aminof (IST Austria), Sasha Rubin (IST Austria and TU Wien)
First Cycle Games
In Proceedings SR 2014, arXiv:1404.0414
EPTCS 146, 2014, pp. 83-90
10.4204/EPTCS.146.11
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First cycle games (FCG) are played on a finite graph by two players who push a token along the edges until a vertex is repeated, and a simple cycle is formed. The winner is determined by some fixed property Y of the sequence of labels of the edges (or nodes) forming this cycle. These games are traditionally of interest because of their connection with infinite-duration games such as parity and mean-payoff games. We study the memory requirements for winning strategies of FCGs and certain associated infinite duration games. We exhibit a simple FCG that is not memoryless determined (this corrects a mistake in \it Memoryless determinacy of parity and mean payoff games: a simple proof by Bj\"orklund, Sandberg, Vorobyov (2004) that claims that FCGs for which Y is closed under cyclic permutations are memoryless determined). We show that /Theta(n)! memory (where n is the number of nodes in the graph), which is always sufficient, may be necessary to win some FCGs. On the other hand, we identify easy to check conditions on Y (i.e., Y is closed under cyclic permutations, and both Y and its complement are closed under concatenation) that are sufficient to ensure that the corresponding FCGs and their associated infinite duration games are memoryless determined. We demonstrate that many games considered in the literature, such as mean-payoff, parity, energy, etc., satisfy these conditions. On the complexity side, we show (for efficiently computable Y) that while solving FCGs is in PSPACE, solving some families of FCGs is PSPACE-hard.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 10:38:54 GMT" } ]
2014-04-04T00:00:00
[ [ "Aminof", "Benjamin", "", "IST Austria" ], [ "Rubin", "Sasha", "", "IST Austria and TU Wien" ] ]
new_dataset
0.991675
1404.0967
Steffen Kopecki
Lila Kari, Steffen Kopecki, Pierre-\'Etienne Meunier, Matthew J. Patitz, Shinnosuke Seki
Binary pattern tile set synthesis is NP-hard
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the field of algorithmic self-assembly, a long-standing unproven conjecture has been that of the NP-hardness of binary pattern tile set synthesis (2-PATS). The $k$-PATS problem is that of designing a tile assembly system with the smallest number of tile types which will self-assemble an input pattern of $k$ colors. Of both theoretical and practical significance, $k$-PATS has been studied in a series of papers which have shown $k$-PATS to be NP-hard for $k = 60$, $k = 29$, and then $k = 11$. In this paper, we close the fundamental conjecture that 2-PATS is NP-hard, concluding this line of study. While most of our proof relies on standard mathematical proof techniques, one crucial lemma makes use of a computer-assisted proof, which is a relatively novel but increasingly utilized paradigm for deriving proofs for complex mathematical problems. This tool is especially powerful for attacking combinatorial problems, as exemplified by the proof of the four color theorem by Appel and Haken (simplified later by Robertson, Sanders, Seymour, and Thomas) or the recent important advance on the Erd\H{o}s discrepancy problem by Konev and Lisitsa using computer programs. We utilize a massively parallel algorithm and thus turn an otherwise intractable portion of our proof into a program which requires approximately a year of computation time, bringing the use of computer-assisted proofs to a new scale. We fully detail the algorithm employed by our code, and make the code freely available online.
[ { "version": "v1", "created": "Thu, 3 Apr 2014 15:26:13 GMT" } ]
2014-04-04T00:00:00
[ [ "Kari", "Lila", "" ], [ "Kopecki", "Steffen", "" ], [ "Meunier", "Pierre-Étienne", "" ], [ "Patitz", "Matthew J.", "" ], [ "Seki", "Shinnosuke", "" ] ]
new_dataset
0.97663
1205.4977
Alan Mink
Alan Mink and Anastase Nakassis
LDPC for QKD Reconciliation
9 pages with Pseudo code and matrix correction performance
null
null
null
cs.CR quant-ph
http://creativecommons.org/licenses/publicdomain/
We present the Low Density Parity Check (LDPC) forward error correction algorithm adapted for the Quantum Key Distribution (QKD) protocol in a form readily applied by developers. A sparse parity check matrix is required for the LDPC algorithm and we suggest using some that have been defined by the IEEE and ETSI standards organizations for use in various communication protocols. We evaluate the QKD performance of these various parity check matrices as a function of the quantum bit error rate. We also discuss the computational precision required for this LPDC algorithm. As QKD evolves towards deployment, complete algorithm descriptions and performance analysis, as we present, will be required.
[ { "version": "v1", "created": "Tue, 22 May 2012 16:50:40 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2014 19:26:47 GMT" } ]
2014-04-03T00:00:00
[ [ "Mink", "Alan", "" ], [ "Nakassis", "Anastase", "" ] ]
new_dataset
0.991788
1311.3728
Jingcheng Liu
Jingcheng Liu and Pinyan Lu
FPTAS for Counting Monotone CNF
24 pages, 2 figures. version 1=>2: minor edits, highlighted the picture of set cover/packing, and an implication of our previous result in 3D matching
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A monotone CNF formula is a Boolean formula in conjunctive normal form where each variable appears positively. We design a deterministic fully polynomial-time approximation scheme (FPTAS) for counting the number of satisfying assignments for a given monotone CNF formula when each variable appears in at most $5$ clauses. Equivalently, this is also an FPTAS for counting set covers where each set contains at most $5$ elements. If we allow variables to appear in a maximum of $6$ clauses (or sets to contain $6$ elements), it is NP-hard to approximate it. Thus, this gives a complete understanding of the approximability of counting for monotone CNF formulas. It is also an important step towards a complete characterization of the approximability for all bounded degree Boolean #CSP problems. In addition, we study the hypergraph matching problem, which arises naturally towards a complete classification of bounded degree Boolean #CSP problems, and show an FPTAS for counting 3D matchings of hypergraphs with maximum degree $4$. Our main technique is correlation decay, a powerful tool to design deterministic FPTAS for counting problems defined by local constraints among a number of variables. All previous uses of this design technique fall into two categories: each constraint involves at most two variables, such as independent set, coloring, and spin systems in general; or each variable appears in at most two constraints, such as matching, edge cover, and holant problem in general. The CNF problems studied here have more complicated structures than these problems and require new design and proof techniques. As it turns out, the technique we developed for the CNF problem also works for the hypergraph matching problem. We believe that it may also find applications in other CSP or more general counting problems.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 05:06:27 GMT" }, { "version": "v2", "created": "Wed, 2 Apr 2014 11:45:10 GMT" } ]
2014-04-03T00:00:00
[ [ "Liu", "Jingcheng", "" ], [ "Lu", "Pinyan", "" ] ]
new_dataset
0.988243
1404.0607
Mostafizur Rahman
Mostafizur Rahman, Santosh Khasanvis, Jiajun Shi, Mingyu Li, and Csaba Andras Moritz
Skybridge: 3-D Integrated Circuit Technology Alternative to CMOS
53 Pages
null
null
null
cs.ET cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continuous scaling of CMOS has been the major catalyst in miniaturization of integrated circuits (ICs) and crucial for global socio-economic progress. However, scaling to sub-20nm technologies is proving to be challenging as MOSFETs are reaching their fundamental limits and interconnection bottleneck is dominating IC operational power and performance. Migrating to 3-D, as a way to advance scaling, has eluded us due to inherent customization and manufacturing requirements in CMOS that are incompatible with 3-D organization. Partial attempts with die-die and layer-layer stacking have their own limitations. We propose a 3-D IC fabric technology, Skybridge[TM], which offers paradigm shift in technology scaling as well as design. We co-architect Skybridge's core aspects, from device to circuit style, connectivity, thermal management, and manufacturing pathway in a 3-D fabric-centric manner, building on a uniform 3-D template. Our extensive bottom-up simulations, accounting for detailed material system structures, manufacturing process, device, and circuit parasitics, carried through for several designs including a designed microprocessor, reveal a 30-60x density, 3.5x performance per watt benefits, and 10X reduction in interconnect lengths vs. scaled 16-nm CMOS. Fabric-level heat extraction features are shown to successfully manage IC thermal profiles in 3-D. Skybridge can provide continuous scaling of integrated circuits beyond CMOS in the 21st century.
[ { "version": "v1", "created": "Wed, 2 Apr 2014 16:41:11 GMT" } ]
2014-04-03T00:00:00
[ [ "Rahman", "Mostafizur", "" ], [ "Khasanvis", "Santosh", "" ], [ "Shi", "Jiajun", "" ], [ "Li", "Mingyu", "" ], [ "Moritz", "Csaba Andras", "" ] ]
new_dataset
0.962402
1404.0615
Mostafizur Rahman
Mostafizur Rahman, Santosh Khasanvis, and Csaba Andras Moritz
Nanowire Volatile RAM as an Alternative to SRAM
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maintaining benefits of CMOS technology scaling is becoming challenging due to increased manufacturing complexities and unwanted passive power dissipations. This is particularly challenging in SRAM, where manufacturing precision and leakage power control are critical issues. To alleviate some of these challenges a novel non-volatile memory alternative to SRAM was proposed called nanowire volatile RAM (NWRAM). Due to NWRAMs regular grid based layout and innovative circuit style, manufacturing complexity is reduced and at the same time considerable benefits are attained in terms of performance and leakage power reduction. In this paper, we elaborate more on NWRAM circuit aspects and manufacturability, and quantify benefits at 16nm technology node through simulation against state-of-the-art 6T-SRAM and gridded 8T-SRAM designs. Our results show the 10T-NWRAM to be 2x faster and 35x better in terms of leakage when compared to high performance gridded 8T-SRAM design.
[ { "version": "v1", "created": "Wed, 2 Apr 2014 17:00:30 GMT" } ]
2014-04-03T00:00:00
[ [ "Rahman", "Mostafizur", "" ], [ "Khasanvis", "Santosh", "" ], [ "Moritz", "Csaba Andras", "" ] ]
new_dataset
0.995106
1309.1542
Oluwagbenga Ogunduyile O
O. O. Ogunduyile, K. Zuva, O. A. Randle, T. Zuva
Ubiquitous healthcare monitoring system using integrated triaxial accelerometer,spo2 and location sensors
13 pages, 6 figures, International Journal of UbiComp (IJU), Vol.4, No.2
International Journal of UbiComp (IJU), Vol.4, No.2,April 2013
10.5121/iju.2013.4201
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the challenges encountered in healthcare environment. In contribution to this area, this study developed a system prototype that recommends diagonostic services based on physiological data collected in real time from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The uploaded information can be accessed in real time by medical practitioners through a web application.
[ { "version": "v1", "created": "Fri, 6 Sep 2013 06:03:12 GMT" } ]
2014-04-02T00:00:00
[ [ "Ogunduyile", "O. O.", "" ], [ "Zuva", "K.", "" ], [ "Randle", "O. A.", "" ], [ "Zuva", "T.", "" ] ]
new_dataset
0.996114
1404.0084
EPTCS
Adriana Compagnoni (Stevens Institute of Technology), Paola Giannini (Universit\`a del Piemonte Orientale), Catherine Kim (Stevens Institute of Technology), Matthew Milideo (Stevens Institute of Technology), Vishakha Sharma (Stevens Institute of Technology)
A Calculus of Located Entities
In Proceedings DCM 2013, arXiv:1403.7685
EPTCS 144, 2014, pp. 41-56
10.4204/EPTCS.144.4
null
cs.PL cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define BioScapeL, a stochastic pi-calculus in 3D-space. A novel aspect of BioScapeL is that entities have programmable locations. The programmer can specify a particular location where to place an entity, or a location relative to the current location of the entity. The motivation for the extension comes from the need to describe the evolution of populations of biochemical species in space, while keeping a sufficiently high level description, so that phenomena like diffusion, collision, and confinement can remain part of the semantics of the calculus. Combined with the random diffusion movement inherited from BioScape, programmable locations allow us to capture the assemblies of configurations of polymers, oligomers, and complexes such as microtubules or actin filaments. Further new aspects of BioScapeL include random translation and scaling. Random translation is instrumental in describing the location of new entities relative to the old ones. For example, when a cell secretes a hydronium ion, the ion should be placed at a given distance from the originating cell, but in a random direction. Additionally, scaling allows us to capture at a high level events such as division and growth; for example, daughter cells after mitosis have half the size of the mother cell.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 00:39:01 GMT" } ]
2014-04-02T00:00:00
[ [ "Compagnoni", "Adriana", "", "Stevens Institute of Technology" ], [ "Giannini", "Paola", "", "Università del Piemonte Orientale" ], [ "Kim", "Catherine", "", "Stevens Institute of\n Technology" ], [ "Milideo", "Matthew", "", "Stevens Institute of Technology" ], [ "Sharma", "Vishakha", "", "Stevens Institute of Technology" ] ]
new_dataset
0.968826
1404.0087
EPTCS
Karin Quaas (University of Leipzig)
MTL-Model Checking of One-Clock Parametric Timed Automata is Undecidable
In Proceedings SynCoP 2014, arXiv:1403.7841
EPTCS 145, 2014, pp. 5-17
10.4204/EPTCS.145.3
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Parametric timed automata extend timed automata (Alur and Dill, 1991) in that they allow the specification of parametric bounds on the clock values. Since their introduction in 1993 by Alur, Henzinger, and Vardi, it is known that the emptiness problem for parametric timed automata with one clock is decidable, whereas it is undecidable if the automaton uses three or more parametric clocks. The problem is open for parametric timed automata with two parametric clocks. Metric temporal logic, MTL for short, is a widely used specification language for real-time systems. MTL-model checking of timed automata is decidable, no matter how many clocks are used in the timed automaton. In this paper, we prove that MTL-model checking for parametric timed automata is undecidable, even if the automaton uses only one clock and one parameter and is deterministic.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 00:39:33 GMT" } ]
2014-04-02T00:00:00
[ [ "Quaas", "Karin", "", "University of Leipzig" ] ]
new_dataset
0.997842
1404.0106
Shiu Kumar
Shiu Kumar, Eun Sik Ham and Seong Ro Lee
Traffic Monitoring Using M2M Communication
2 pages, 2 figures, presented in local conference in Korea South
General Fall Conference of Korea Information and Communications Society (KICS) 2012, Seoul, South Korea, 2012, pp. 233-234
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an intelligent traffic monitoring system using wireless vision sensor network that captures and processes the real-time video image to obtain the traffic flow rate and vehicle speeds along different urban roadways. This system will display the traffic states on the front roadways that can guide the drivers to select the right way and avoid potential traffic congestions. On the other hand, it will also monitor the vehicle speeds and store the vehicle details, for those breaking the roadway speed limits, in its database. The real-time traffic data is processed by the Personal Computer (PC) at the sub roadway station and the traffic flow rate data is transmitted to the main roadway station Arduino 3G via email, where the data is extracted and traffic flow rate displayed.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 02:05:55 GMT" } ]
2014-04-02T00:00:00
[ [ "Kumar", "Shiu", "" ], [ "Ham", "Eun Sik", "" ], [ "Lee", "Seong Ro", "" ] ]
new_dataset
0.960907
1404.0144
Julian-Steffen M\"uller
Juha Kontinen and Julian-Steffen M\"uller and Henning Schnoor and Heribert Vollmer
Modal Independence Logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces modal independence logic MIL, a modal logic that can explicitly talk about independence among propositional variables. Formulas of MIL are not evaluated in worlds but in sets of worlds, so called teams. In this vein, MIL can be seen as a variant of V\"a\"an\"anen's modal dependence logic MDL. We show that MIL embeds MDL and is strictly more expressive. However, on singleton teams, MIL is shown to be not more expressive than usual modal logic, but MIL is exponentially more succinct. Making use of a new form of bisimulation, we extend these expressivity results to modal logics extended by various generalized dependence atoms. We demonstrate the expressive power of MIL by giving a specification of the anonymity requirement of the dining cryptographers protocol in MIL. We also study complexity issues of MIL and show that, though it is more expressive, its satisfiability and model checking problem have the same complexity as for MDL.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 06:57:00 GMT" } ]
2014-04-02T00:00:00
[ [ "Kontinen", "Juha", "" ], [ "Müller", "Julian-Steffen", "" ], [ "Schnoor", "Henning", "" ], [ "Vollmer", "Heribert", "" ] ]
new_dataset
0.999736
1404.0296
Mostafizur Rahman
Mostafizur Rahman, Pritish Narayanan and Csaba Andras Moritz
Metal-Gated Junctionless Nanowire Transistors
null
null
null
null
cs.ET cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Junctionless Nanowire Field-Effect Transistors (JNFETs), where the channel region is uniformly doped without the need for source-channel and drain-channel junctions or lateral doping abruptness, are considered an attractive alternative to conventional CMOS FETs. Previous theoretical and experimental works [1][2] on JNFETs have considered polysilicon gates and silicon-dioxide dielectric. However, with further scaling, JNFETs will suffer from deleterious effects of doped polysilicon such as high resistance, additional capacitance due to gate-oxide interface depletion, and incompatibility with high-k dielectrics[3][4]. In this paper, novel metal- gated high-k JNFETs are investigated through detailed process and device simulations. These MJNFETs are also ideally suited for new types of nano-architectures such as N3ASICs [5] which utilize regular nanowire arrays with limited customization. In such nano- systems, the simplified device geometry in conjunction with a single-type FET circuit style [6] would imply that logic arrays could be patterned out of pre-doped SOI wafers without the need for any additional ion implantation.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 16:12:12 GMT" } ]
2014-04-02T00:00:00
[ [ "Rahman", "Mostafizur", "" ], [ "Narayanan", "Pritish", "" ], [ "Moritz", "Csaba Andras", "" ] ]
new_dataset
0.999709
1107.3441
Thijs Laarhoven
Thijs Laarhoven and Benne de Weger
Optimal symmetric Tardos traitor tracing schemes
16 pages, 1 figure
Designs, Codes and Cryptography, vol. 71, no. 1, pp. 83-103, 2014
10.1007/s10623-012-9718-y
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Skoric et al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to 4 times shorter than Blayer and Tassa's, and up to 2 times shorter than the codes from Skoric et al. Asymptotically, we achieve the theoretical optimal codelength for Tardos' distribution function and the symmetric score function. For large coalitions, our codelengths are asymptotically about 4.93% of Tardos' original codelengths, which also improves upon results from Nuida et al.
[ { "version": "v1", "created": "Mon, 18 Jul 2011 14:07:06 GMT" }, { "version": "v2", "created": "Tue, 15 Nov 2011 19:43:27 GMT" } ]
2014-04-01T00:00:00
[ [ "Laarhoven", "Thijs", "" ], [ "de Weger", "Benne", "" ] ]
new_dataset
0.968467
1308.2002
Peng Qin
Peng Qin and Bin Dai and Kui Wu and Benxiong Huang and Guan Xu
Taking A Free Ride for Routing Topology Inference in Peer-to-Peer Networks
11 pages
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
A Peer-to-Peer (P2P) network can boost its performance if peers are provided with underlying network-layer routing topology. The task of inferring the network-layer routing topology and link performance from an end host to a set of other hosts is termed as network tomography, and it normally requires host computers to send probing messages. We design a passive network tomography method that does not requires any probing messages and takes a free ride over data flows in P2P networks. It infers routing topology based on end-to-end delay correlation estimation (DCE) without requiring any synchronization or cooperation from the intermediate routers. We implement and test our method in the real world Internet environment and achieved the accuracy of 92% in topology recovery. We also perform extensive simulation in OMNet++ to evaluate its performance over large scale networks, showing that its topology recovery accuracy is about 95% for large networks.
[ { "version": "v1", "created": "Fri, 9 Aug 2013 00:16:37 GMT" }, { "version": "v2", "created": "Sat, 29 Mar 2014 05:32:05 GMT" } ]
2014-04-01T00:00:00
[ [ "Qin", "Peng", "" ], [ "Dai", "Bin", "" ], [ "Wu", "Kui", "" ], [ "Huang", "Benxiong", "" ], [ "Xu", "Guan", "" ] ]
new_dataset
0.952645
1403.6237
Thi Minh Tam Nguyen
Thi-Minh-Tam Nguyen, Viet-Trung Vu, The-Vinh Doan and Duc-Khanh Tran
Resolution in Linguistic First Order Logic based on Linear Symmetrical Hedge Algebra
IPMU 2014 Full paper (14 pages)
null
null
null
cs.LO
http://creativecommons.org/licenses/by/3.0/
This paper focuses on resolution in linguistic first order logic with truth value taken from linear symmetrical hedge algebra. We build the basic components of linguistic first order logic, including syntax and semantics. We present a resolution principle for our logic to resolve on two clauses having contradictory linguistic truth values. Since linguistic information is uncertain, inference in our linguistic logic is approximate. Therefore, we introduce the concept of reliability in order to capture the natural approximation of the resolution inference rule.
[ { "version": "v1", "created": "Tue, 25 Mar 2014 05:38:32 GMT" }, { "version": "v2", "created": "Sun, 30 Mar 2014 08:58:34 GMT" } ]
2014-04-01T00:00:00
[ [ "Nguyen", "Thi-Minh-Tam", "" ], [ "Vu", "Viet-Trung", "" ], [ "Doan", "The-Vinh", "" ], [ "Tran", "Duc-Khanh", "" ] ]
new_dataset
0.999131
1403.7697
Keang-Po Ho
Keang-Po Ho and Shi Cheng and Jianhan Liu
MIMO Beamforming in Millimeter-Wave Directional Wi-Fi
10 pages, 6 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Beamforming is indispensable in the operation of 60-GHz millimeter-wave directional multi-gigabit Wi-Fi. Simple power method and its extensions enable the transmitting and receiving antenna arrays to form a beam for single spatial stream. To further improve the spectral efficiency in future 60-GHz directional Wi-Fi, alternating least square (ALS) algorithm can form multiple beams between the transmitter and receiver for multi-input-multi-output (MIMO) operations. For both shared and split MIMO architecture, the ALS beamforming algorithm can be operated in both frequency-flat and frequency-selective channels. In the split architecture, MIMO beamforming approximately maximizes the capacity of the beam-formed MIMO channel.
[ { "version": "v1", "created": "Sun, 30 Mar 2014 03:14:56 GMT" } ]
2014-04-01T00:00:00
[ [ "Ho", "Keang-Po", "" ], [ "Cheng", "Shi", "" ], [ "Liu", "Jianhan", "" ] ]
new_dataset
0.996846
1403.7755
Liqi Wang
Liqi Wang, Shixin Zhu
On the Construction of Optimal Asymmetric Quantum Codes
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Constacyclic codes are important classes of linear codes that have been applied to the construction of quantum codes. Six new families of asymmetric quantum codes derived from constacyclic codes are constructed in this paper. Moreover, the constructed asymmetric quantum codes are optimal and different from the codes available in the literature.
[ { "version": "v1", "created": "Sun, 30 Mar 2014 13:25:02 GMT" } ]
2014-04-01T00:00:00
[ [ "Wang", "Liqi", "" ], [ "Zhu", "Shixin", "" ] ]
new_dataset
0.999458
1403.7791
Camille Coti
Camille Coti
POSH: Paris OpenSHMEM: A High-Performance OpenSHMEM Implementation for Shared Memory Systems
This is an extended version (featuring the full proofs) of a paper accepted at ICCS'14
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the design and implementation of POSH, an Open-Source implementation of the OpenSHMEM standard. We present a model for its communications, and prove some properties on the memory model defined in the OpenSHMEM specification. We present some performance measurements of the communication library featured by POSH and compare them with an existing one-sided communication library. POSH can be downloaded from \url{http://www.lipn.fr/~coti/POSH}. % 9 - 67
[ { "version": "v1", "created": "Sun, 30 Mar 2014 17:43:21 GMT" } ]
2014-04-01T00:00:00
[ [ "Coti", "Camille", "" ] ]
new_dataset
0.998124
1403.7828
Alexander Merry
Alexander Merry
Reasoning with !-Graphs
DPhil (PhD) thesis; University of Oxford; 172 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this thesis is to present an extension to the string graphs of Dixon, Duncan and Kissinger that allows the finite representation of certain infinite families of graphs and graph rewrite rules, and to demonstrate that a logic can be built on this to allow the formalisation of inductive proofs in the string diagrams of compact closed and traced symmetric monoidal categories. String diagrams provide an intuitive method for reasoning about monoidal categories. However, this does not negate the ability for those using them to make mistakes in proofs. To this end, there is a project (Quantomatic) to build a proof assistant for string diagrams, at least for those based on categories with a notion of trace. The development of string graphs has provided a combinatorial formalisation of string diagrams, laying the foundations for this project. The prevalence of commutative Frobenius algebras (CFAs) in quantum information theory, a major application area of these diagrams, has led to the use of variable-arity nodes as a shorthand for normalised networks of Frobenius algebra morphisms, so-called "spider notation". This notation greatly eases reasoning with CFAs, but string graphs are inadequate to properly encode this reasoning. This dissertation extends string graphs to allow for variable-arity nodes to be represented at all, and then introduces !-box notation (and structures to encode it) to represent string graph equations containing repeated subgraphs, where the number of repetitions is abitrary. It then demonstrates how we can reason directly about !-graphs, viewed as (typically infinite) families of string graphs. Of particular note is the presentation of a form of graph-based induction, allowing the formal encoding of proofs that previously could only be represented as a mix of string diagrams and explanatory text.
[ { "version": "v1", "created": "Sun, 30 Mar 2014 22:55:57 GMT" } ]
2014-04-01T00:00:00
[ [ "Merry", "Alexander", "" ] ]
new_dataset
0.994444
1403.7928
Jakub Urban
J. Urban, J. Pipek, M. Hron, F. Janky, R. Pap\v{r}ok, M. Peterka, A. S. Duarte
Integrated Data Acquisition, Storage, Retrieval and Processing Using the COMPASS DataBase (CDB)
null
null
10.1016/j.fusengdes.2014.03.032
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a complex data handling system for the COMPASS tokamak, operated by IPP ASCR Prague, Czech Republic [1]. The system, called CDB (Compass DataBase), integrates different data sources as an assortment of data acquisition hardware and software from different vendors is used. Based on widely available open source technologies wherever possible, CDB is vendor and platform independent and it can be easily scaled and distributed. The data is directly stored and retrieved using a standard NAS (Network Attached Storage), hence independent of the particular technology; the description of the data (the metadata) is recorded in a relational database. Database structure is general and enables the inclusion of multi-dimensional data signals in multiple revisions (no data is overwritten). This design is inherently distributed as the work is off-loaded to the clients. Both NAS and database can be implemented and optimized for fast local access as well as secure remote access. CDB is implemented in Python language; bindings for Java, C/C++, IDL and Matlab are provided. Independent data acquisitions systems as well as nodes managed by FireSignal [2] are all integrated using CDB. An automated data post-processing server is a part of CDB. Based on dependency rules, the server executes, in parallel if possible, prescribed post-processing tasks.
[ { "version": "v1", "created": "Mon, 31 Mar 2014 09:38:37 GMT" } ]
2014-04-01T00:00:00
[ [ "Urban", "J.", "" ], [ "Pipek", "J.", "" ], [ "Hron", "M.", "" ], [ "Janky", "F.", "" ], [ "Papřok", "R.", "" ], [ "Peterka", "M.", "" ], [ "Duarte", "A. S.", "" ] ]
new_dataset
0.986787
1403.8028
Mohamed El-Zawawy Dr.
Mohamed A. El-Zawawy, Adel I. AlSalem
ImNet: An Imperative Network Programming Language
8 pages, 8 figures, Mohamed A. El-Zawawy and Adel I. AlSalem. ImNet: An Imperative Network Programming Language. Proceedings of The 14th International Conference on Applied Computer Science, ACS 2014, Constantin Buzatu (Ed): Modern Computer Applications in Science and Education, pp. 149--156
null
null
null
cs.PL cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most recent architectures of networks is Software-Defined Networks (SDNs) using a con- troller appliance to control the set of switches on the network. The controlling process includes installing or uninstalling packet-processing rules on flow tables of switches. This paper presents a high-level imperative network programming language, called ImNet, to facilitate writing efficient, yet simple, programs executed by controller to manage switches. ImNet is simply-structured, expressive, compositional, and imperative. This paper also introduces an operational semantics to ImNet. Detailed examples of programs (with their operational semantics) constructed in ImNet are illustrated in the paper as well.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 19:20:18 GMT" } ]
2014-04-01T00:00:00
[ [ "El-Zawawy", "Mohamed A.", "" ], [ "AlSalem", "Adel I.", "" ] ]
new_dataset
0.997939
1403.8086
Glencora Borradaile
Glencora Borradaile, Erin Wolf Chambers
Covering nearly surface-embedded graphs with a fixed number of balls
To appear in DCG
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent result of Chepoi, Estellon and Vaxes [DCG '07] states that any planar graph of diameter at most 2R can be covered by a constant number of balls of size R; put another way, there are a constant-sized subset of vertices within which every other vertex is distance half the diameter. We generalize this result to graphs embedded on surfaces of fixed genus with a fixed number of apices, making progress toward the conjecture that graphs excluding a fixed minor can also be covered by a constant number of balls. To do so, we develop two tools which may be of independent interest. The first gives a bound on the density of graphs drawn on a surface of genus $g$ having a limit on the number of pairwise-crossing edges. The second bounds the size of a non-contractible cycle in terms of the Euclidean norm of the degree sequence of a graph embedded on surface.
[ { "version": "v1", "created": "Mon, 31 Mar 2014 16:57:36 GMT" } ]
2014-04-01T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Chambers", "Erin Wolf", "" ] ]
new_dataset
0.999432
1307.6458
Ayoub Otmani
Alain Couvreur and Philippe Gaborit and Val\'erie Gauthier-Uma\~na and Ayoub Otmani and Jean-Pierre Tillich
Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes
A short version appeared in the proceedings of the workshop on Coding and Cryptography 2013 (WCC' 2013). This paper supersedes arXiv:1203.6686 [cs.CR] and arXiv:1204.6459 [cs.CR]
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Because of their interesting algebraic properties, several authors promote the use of generalized Reed-Solomon codes in cryptography. Niederreiter was the first to suggest an instantiation of his cryptosystem with them but Sidelnikov and Shestakov showed that this choice is insecure. Wieschebrink proposed a variant of the McEliece cryptosystem which consists in concatenating a few random columns to a generator matrix of a secretly chosen generalized Reed-Solomon code. More recently, new schemes appeared which are the homomorphic encryption scheme proposed by Bogdanov and Lee, and a variation of the McEliece cryptosystem proposed by Baldi et \textit{al.} which hides the generalized Reed-Solomon code by means of matrices of very low rank. In this work, we show how to mount key-recovery attacks against these public-key encryption schemes. We use the concept of distinguisher which aims at detecting a behavior different from the one that one would expect from a random code. All the distinguishers we have built are based on the notion of component-wise product of codes. It results in a powerful tool that is able to recover the secret structure of codes when they are derived from generalized Reed-Solomon codes. Lastly, we give an alternative to Sidelnikov and Shestakov attack by building a filtration which enables to completely recover the support and the non-zero scalars defining the secret generalized Reed-Solomon code.
[ { "version": "v1", "created": "Wed, 24 Jul 2013 15:28:56 GMT" }, { "version": "v2", "created": "Fri, 28 Mar 2014 09:54:32 GMT" } ]
2014-03-31T00:00:00
[ [ "Couvreur", "Alain", "" ], [ "Gaborit", "Philippe", "" ], [ "Gauthier-Umaña", "Valérie", "" ], [ "Otmani", "Ayoub", "" ], [ "Tillich", "Jean-Pierre", "" ] ]
new_dataset
0.963363
1403.1631
Adrian Tang
Adrian Tang, Simha Sethumadhavan, Salvatore Stolfo
Unsupervised Anomaly-based Malware Detection using Hardware Features
1 page, Latex; added description for feature selection in Section 4, results unchanged
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent works have shown promise in using microarchitectural execution patterns to detect malware programs. These detectors belong to a class of detectors known as signature-based detectors as they catch malware by comparing a program's execution pattern (signature) to execution patterns of known malware programs. In this work, we propose a new class of detectors - anomaly-based hardware malware detectors - that do not require signatures for malware detection, and thus can catch a wider range of malware including potentially novel ones. We use unsupervised machine learning to build profiles of normal program execution based on data from performance counters, and use these profiles to detect significant deviations in program behavior that occur as a result of malware exploitation. We show that real-world exploitation of popular programs such as IE and Adobe PDF Reader on a Windows/x86 platform can be detected with nearly perfect certainty. We also examine the limits and challenges in implementing this approach in face of a sophisticated adversary attempting to evade anomaly-based detection. The proposed detector is complementary to previously proposed signature-based detectors and can be used together to improve security.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 01:44:58 GMT" }, { "version": "v2", "created": "Fri, 28 Mar 2014 14:49:44 GMT" } ]
2014-03-31T00:00:00
[ [ "Tang", "Adrian", "" ], [ "Sethumadhavan", "Simha", "" ], [ "Stolfo", "Salvatore", "" ] ]
new_dataset
0.976894
1403.7248
Axel Polleres
Albin Ahmeti and Diego Calvanese and Axel Polleres
Updating RDFS ABoxes and TBoxes in SPARQL
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Updates in RDF stores have recently been standardised in the SPARQL 1.1 Update specification. However, computing answers entailed by ontologies in triple stores is usually treated orthogonal to updates. Even the W3C's recent SPARQL 1.1 Update language and SPARQL 1.1 Entailment Regimes specifications explicitly exclude a standard behaviour how SPARQL endpoints should treat entailment regimes other than simple entailment in the context of updates. In this paper, we take a first step to close this gap. We define a fragment of SPARQL basic graph patterns corresponding to (the RDFS fragment of) DL-Lite and the corresponding SPARQL update language, dealing with updates both of ABox and of TBox statements. We discuss possible semantics along with potential strategies for implementing them. We treat both, (i) materialised RDF stores, which store all entailed triples explicitly, and (ii) reduced RDF Stores, that is, redundancy-free RDF stores that do not store any RDF triples (corresponding to DL-Lite ABox statements) entailed by others already.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 23:43:38 GMT" } ]
2014-03-31T00:00:00
[ [ "Ahmeti", "Albin", "" ], [ "Calvanese", "Diego", "" ], [ "Polleres", "Axel", "" ] ]
new_dataset
0.975127
1403.7260
EPTCS
Harsh Beohar (Center for Research on Embedded Systems Halmstad University, Sweden), Mohammad Reza Mousavi (Center for Research on Embedded Systems Halmstad University, Sweden)
Spinal Test Suites for Software Product Lines
In Proceedings MBT 2014, arXiv:1403.7044
EPTCS 141, 2014, pp. 44-55
10.4204/EPTCS.141.4
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major challenge in testing software product lines is efficiency. In particular, testing a product line should take less effort than testing each and every product individually. We address this issue in the context of input-output conformance testing, which is a formal theory of model-based testing. We extend the notion of conformance testing on input-output featured transition systems with the novel concept of spinal test suites. We show how this concept dispenses with retesting the common behavior among different, but similar, products of a software product line.
[ { "version": "v1", "created": "Fri, 28 Mar 2014 01:04:50 GMT" } ]
2014-03-31T00:00:00
[ [ "Beohar", "Harsh", "", "Center for Research on Embedded Systems Halmstad\n University, Sweden" ], [ "Mousavi", "Mohammad Reza", "", "Center for Research on Embedded\n Systems Halmstad University, Sweden" ] ]
new_dataset
0.966455
1403.7293
Roshan Ragel
D. Jayasinghe, R. G. Ragel, D. Elkaduwe
Constant time encryption as a countermeasure against remote cache timing attacks
null
Information and Automation for Sustainability (ICIAfS), 2012 IEEE 6th International Conference on, 27-29 Sept 2012, pp 129-134, Beijing
10.1109/ICIAFS.2012.6419893
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a side channel in its software implementation. Over the years, a number of countermeasures have been proposed against cache timing attacks both using hardware and software. Although the software based countermeasures are flexible and easy to deploy, most of such countermeasures are vulnerable to statistical analysis. In this paper, we propose a novel software based countermeasure against cache timing attacks, known as constant time encryption, which we believe is secure against statistical analysis. The countermeasure we proposed performs rescheduling of instructions such that the encryption rounds will consume constant time independent of the cache hits and misses. Through experiments, we prove that our countermeasure is secure against Bernstein's cache timing attack.
[ { "version": "v1", "created": "Fri, 28 Mar 2014 07:37:26 GMT" } ]
2014-03-31T00:00:00
[ [ "Jayasinghe", "D.", "" ], [ "Ragel", "R. G.", "" ], [ "Elkaduwe", "D.", "" ] ]
new_dataset
0.994677
1403.7350
Andrew Adamatzky
Andrew Adamatzky
Slime mould electronic oscillators
null
null
null
null
cs.ET physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct electronic oscillator from acellular slime mould Physarum polycephalum. The slime mould oscillator is made of two electrodes connected by a protoplasmic tube of the living slime mould. A protoplasmic tube has an average resistance of 3~MOhm. The tube's resistance is changing over time due to peristaltic contractile activity of the tube. The resistance of the protoplasmic tube oscillates with average period of 73~sec and average amplitude of 0.6~MOhm. We present experimental laboratory results on dynamics of Physarum oscillator under direct current voltage up to 15~V and speculate that slime mould P. polycephalum can be employed as a living electrical oscillator in biological and hybrid circuits.
[ { "version": "v1", "created": "Fri, 28 Mar 2014 12:01:12 GMT" } ]
2014-03-31T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999149
1403.6823
Theresa Schubert
Theresa Schubert
ChromaPhy - A Living Wearable Connecting Humans and Their Environment
Extended abstracts (3 pages)
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research presents an artistic project aiming to make cyberfiction become reality and exemplifying a current trend in art and science collaborations. Chroma+Phy is a speculative design for a living wearable that combines the protoplasmic structure of the amoeboid acellular organism Physarum polycephalum and the chromatophores of the reptile Chameleon. The underpin-ning idea is that in a future far away or close, on planet earth or in outer space, humans will need some tools to help them in their social life and day-to-day routine. Chroma+Phy enhances the body aiming at humans in extreme habitats for an aggression-free and healthy life. Our approach will address actual issues of scientific discovery for society and catalyse idea translation through art and design experiments at frontiers of science.
[ { "version": "v1", "created": "Wed, 26 Mar 2014 18:49:41 GMT" } ]
2014-03-28T00:00:00
[ [ "Schubert", "Theresa", "" ] ]
new_dataset
0.999646
1403.6919
Malini P
Harikrishnan.R, Shajna S. Hammed, P.Malini
Marine Buoy Location Finding and Tracking System for Linux Supporting Mobiles
3pages, 5figures
International Journal of Engineering Trends and Technology Volume 9 Number 8 - Mar 2014
null
null
cs.OH
http://creativecommons.org/licenses/by-nc-sa/3.0/
Marine buoy is an important part of underwater acoustic communication system. It is of great significance to track and locate it. It is widely used in ocean environment three - dimensional monitoring, underwater multimedia communication, underwater mobile carrier navigation and positioning, marine resources detection, remote control of submarine topography mapping and offshore oil industry, data acquisition, etc. This paper describes the application of the monitoring service of GPRS / GPS module at Marine buoy. It can achieve real - time location of underwater acoustic communication devices and route tracking to avoid the loss of the device, as well as assist to retrieve the lost device.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 05:57:10 GMT" } ]
2014-03-28T00:00:00
[ [ "R", "Harikrishnan.", "" ], [ "Hammed", "Shajna S.", "" ], [ "Malini", "P.", "" ] ]
new_dataset
0.982352
1403.6946
David Budden
Josiah Walker, Trent Houliston, Brendan Annable, Alex Biddulph, Andrew Dabson, Jake Fountain, Taylor Johnson, Jordan Johnson, Mitchell Metcalfe, Anita Sugo, Stephan K. Chalup, Robert A.R. King, Alexandre Mendes, and Peter Turner
The NUbots Team Description Paper 2014
RoboCup 2014 humanoid league team description paper
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NUbots team, from The University of Newcastle, Australia, has had a strong record of success in the RoboCup Standard Platform League since first entering in 2002. The team has also competed within the RoboCup Humanoid Kid-Size League since 2012. The 2014 team brings a renewed focus on software architecture, modularity, and the ability to easily share code. This paper summarizes the history of the NUbots team, describes the roles and research of the team members, gives an overview of the NUbots' robots and software system, and addresses relevant research projects within the the Newcastle Robotics Laboratory.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 08:22:09 GMT" } ]
2014-03-28T00:00:00
[ [ "Walker", "Josiah", "" ], [ "Houliston", "Trent", "" ], [ "Annable", "Brendan", "" ], [ "Biddulph", "Alex", "" ], [ "Dabson", "Andrew", "" ], [ "Fountain", "Jake", "" ], [ "Johnson", "Taylor", "" ], [ "Johnson", "Jordan", "" ], [ "Metcalfe", "Mitchell", "" ], [ "Sugo", "Anita", "" ], [ "Chalup", "Stephan K.", "" ], [ "King", "Robert A. R.", "" ], [ "Mendes", "Alexandre", "" ], [ "Turner", "Peter", "" ] ]
new_dataset
0.999638
1403.6950
Manuel Marin-Jimenez
F.M. Castro and M.J. Marin-Jimenez and R. Medina-Carnicer
Pyramidal Fisher Motion for Multiview Gait Recognition
Submitted to International Conference on Pattern Recognition, ICPR, 2014
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to identify individuals by analyzing their gait. Instead of using binary silhouettes as input data (as done in many previous works) we propose and evaluate the use of motion descriptors based on densely sampled short-term trajectories. We take advantage of state-of-the-art people detectors to define custom spatial configurations of the descriptors around the target person. Thus, obtaining a pyramidal representation of the gait motion. The local motion features (described by the Divergence-Curl-Shear descriptor) extracted on the different spatial areas of the person are combined into a single high-level gait descriptor by using the Fisher Vector encoding. The proposed approach, coined Pyramidal Fisher Motion, is experimentally validated on the recent `AVA Multiview Gait' dataset. The results show that this new approach achieves promising results in the problem of gait recognition.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 08:39:31 GMT" } ]
2014-03-28T00:00:00
[ [ "Castro", "F. M.", "" ], [ "Marin-Jimenez", "M. J.", "" ], [ "Medina-Carnicer", "R.", "" ] ]
new_dataset
0.981461
1403.5824
Terence H. Chan
Guanghua Zhu and Linda M. Davis and Terence Chan
Energy-Throughput Trade-offs in a Wireless Sensor Network with Mobile Relay
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyze the trade-offs between energy and throughput for links in a wireless sensor network. Our application of interest is one in which a number of low-powered sensors need to wirelessly communicate their measurements to a communications sink, or destination node, for communication to a central processor. We focus on one particular sensor source, and consider the case where the distance to the destination is beyond the peak power of the source. A relay node is required. Transmission energy of the sensor and the relay can be adjusted to minimize the total energy for a given throughput of the connection from sensor source to destination. We introduce a bounded random walk model for movement of the relay between the sensor and destination nodes, and characterize the total transmission energy and throughput performance using Markov steady state analysis. Based on the trade-offs between total energy and throughput we propose a new time-sharing protocol to exploit the movement of the relay to reduce the total energy. We demonstrate the effectiveness of time-sharing for minimizing the total energy consumption while achieving the throughput requirement. We then show that the time-sharing scheme is more energy efficient than the popular sleep mode scheme.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 01:05:49 GMT" } ]
2014-03-27T00:00:00
[ [ "Zhu", "Guanghua", "" ], [ "Davis", "Linda M.", "" ], [ "Chan", "Terence", "" ] ]
new_dataset
0.990187
1403.6487
Christopher Brown
Christopher W. Brown
Model-based construction of Open Non-uniform Cylindrical Algebraic Decompositions
null
null
null
null
cs.SC
http://creativecommons.org/licenses/publicdomain/
In this paper we introduce the notion of an Open Non-uniform Cylindrical Algebraic Decomposition (NuCAD), and present an efficient model-based algorithm for constructing an Open NuCAD from an input formula. A NuCAD is a generalization of Cylindrical Algebraic Decomposition (CAD) as defined by Collins in his seminal work from the early 1970s, and as extended in concepts like Hong's partial CAD. A NuCAD, like a CAD, is a decomposition of n-dimensional real space into cylindrical cells. But unlike a CAD, the cells in a NuCAD need not be arranged cylindrically. It is in this sense that NuCADs are not uniformly cylindrical. However, NuCADs--- like CADs --- carry a tree-like structure that relates different cells. It is a very different tree but, as with the CAD tree structure, it allows some operations to be performed efficiently, for example locating the containing cell for an arbitrary input point.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 02:10:31 GMT" } ]
2014-03-27T00:00:00
[ [ "Brown", "Christopher W.", "" ] ]
new_dataset
0.965495
1403.6518
Edouard Bonnet
Edouard Bonnet, Florian Jamain and Abdallah Saffidine
Havannah and TwixT are PSPACE-complete
13 pages, 7 figures. Accepted in CG'13
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Numerous popular abstract strategy games ranging from Hex and Havannah to Lines of Action belong to the class of connection games. Still, very few complexity results on such games have been obtained since Hex was proved PSPACE-complete in the early eighties. We study the complexity of two connection games among the most widely played. Namely, we prove that Havannah and TwixT are PSPACE-complete. The proof for Havannah involves a reduction from Generalized Geography and is based solely on ring-threats to represent the input graph. On the other hand, the reduction for TwixT builds up on previous work as it is a straightforward encoding of Hex.
[ { "version": "v1", "created": "Tue, 25 Mar 2014 21:55:25 GMT" } ]
2014-03-27T00:00:00
[ [ "Bonnet", "Edouard", "" ], [ "Jamain", "Florian", "" ], [ "Saffidine", "Abdallah", "" ] ]
new_dataset
0.999742
1403.6636
Arturo Tlaca\'elel Curiel D\'iaz
Arturo Curiel, Christophe Collet
Sign Language Lexical Recognition With Propositional Dynamic Logic
6 pages, Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), August, 2013
In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, vol. 2, pp. 328-333. 2013
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper explores the use of Propositional Dynamic Logic (PDL) as a suitable formal framework for describing Sign Language (SL), the language of deaf people, in the context of natural language processing. SLs are visual, complete, standalone languages which are just as expressive as oral languages. Signs in SL usually correspond to sequences of highly specific body postures interleaved with movements, which make reference to real world objects, characters or situations. Here we propose a formal representation of SL signs, that will help us with the analysis of automatically-collected hand tracking data from French Sign Language (FSL) video corpora. We further show how such a representation could help us with the design of computer aided SL verification tools, which in turn would bring us closer to the development of an automatic recognition system for these languages.
[ { "version": "v1", "created": "Wed, 26 Mar 2014 11:47:37 GMT" } ]
2014-03-27T00:00:00
[ [ "Curiel", "Arturo", "" ], [ "Collet", "Christophe", "" ] ]
new_dataset
0.998659
1403.6644
Christopher Casey
C. Jasson Casey, Andrew Sutton, Alex Sprintson
tinyNBI: Distilling an API from essential OpenFlow abstractions
null
null
null
null
cs.NI cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If simplicity is a key strategy for success as a network protocol OpenFlow is not winning. At its core OpenFlow presents a simple idea, which is a network switch data plane abstraction along with a control protocol for manipulating that abstraction. The result of this idea has been far from simple: a new version released each year, five active versions, com- plex feature dependencies, unstable version negotiation, lack of state machine definition, etc. This complexity represents roadblocks for network, software, and hardware engineers. We have distilled the core abstractions present in 5 existing versions of OpenFlow and refactored them into a simple API called tinyNBI. Our work does not provide high-level network abstractions (address pools, VPN maps, etc.), instead it focuses on providing a clean low level interface that supports the development of these higher layer abstractions. The goal of tinyNBI is to allow configuration of all existing OpenFlow abstractions without having to deal with the unique personalities of each version of OpenFlow or their level of support in target switches.
[ { "version": "v1", "created": "Wed, 26 Mar 2014 12:15:11 GMT" } ]
2014-03-27T00:00:00
[ [ "Casey", "C. Jasson", "" ], [ "Sutton", "Andrew", "" ], [ "Sprintson", "Alex", "" ] ]
new_dataset
0.998731
1402.6500
Changtao Zhong
Changtao Zhong and Mostafa Salehi and Sunil Shah and Marius Cobzarenco and Nishanth Sastry and Meeyoung Cha
Social Bootstrapping: How Pinterest and Last.fm Social Communities Benefit by Borrowing Links from Facebook
Proc. 23rd International World Wide Web Conference (WWW), 2014
null
10.1145/2566486.2568031
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How does one develop a new online community that is highly engaging to each user and promotes social interaction? A number of websites offer friend-finding features that help users bootstrap social networks on the website by copying links from an established network like Facebook or Twitter. This paper quantifies the extent to which such social bootstrapping is effective in enhancing a social experience of the website. First, we develop a stylised analytical model that suggests that copying tends to produce a giant connected component (i.e., a connected community) quickly and preserves properties such as reciprocity and clustering, up to a linear multiplicative factor. Second, we use data from two websites, Pinterest and Last.fm, to empirically compare the subgraph of links copied from Facebook to links created natively. We find that the copied subgraph has a giant component, higher reciprocity and clustering, and confirm that the copied connections see higher social interactions. However, the need for copying diminishes as users become more active and influential. Such users tend to create links natively on the website, to users who are more similar to them than their Facebook friends. Our findings give new insights into understanding how bootstrapping from established social networks can help engage new users by enhancing social interactivity.
[ { "version": "v1", "created": "Wed, 26 Feb 2014 11:40:40 GMT" }, { "version": "v2", "created": "Mon, 24 Mar 2014 14:13:19 GMT" } ]
2014-03-25T00:00:00
[ [ "Zhong", "Changtao", "" ], [ "Salehi", "Mostafa", "" ], [ "Shah", "Sunil", "" ], [ "Cobzarenco", "Marius", "" ], [ "Sastry", "Nishanth", "" ], [ "Cha", "Meeyoung", "" ] ]
new_dataset
0.976978
1403.5641
Valery Ugrinovskii
V. Ugrinovskii and C. Langbort
Control over adversarial packet-dropping communication networks revisited
This paper has been accepted for presentation at the 2014 American Control Conference, Portland, Oregon
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit a one-step control problem over an adversarial packet-dropping link. The link is modeled as a set of binary channels controlled by a strategic jammer whose intention is to wage a `denial of service' attack on the plant by choosing a most damaging channel-switching strategy. The paper introduces a class of zero-sum games between the jammer and controller as a scenario for such attack, and derives necessary and sufficient conditions for these games to have a nontrivial saddle-point equilibrium. At this equilibrium, the jammer's optimal policy is to randomize in a region of the plant's state space, thus requiring the controller to undertake a nontrivial response which is different from what one would expect in a standard stochastic control problem over a packet dropping channel.
[ { "version": "v1", "created": "Sat, 22 Mar 2014 10:43:43 GMT" } ]
2014-03-25T00:00:00
[ [ "Ugrinovskii", "V.", "" ], [ "Langbort", "C.", "" ] ]
new_dataset
0.988346
1403.5830
Emanuele Natale
Luciano Gual\`a and Stefano Leucci and Emanuele Natale
Bejeweled, Candy Crush and other Match-Three Games are (NP-)Hard
21 pages, 12 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The twentieth century has seen the rise of a new type of video games targeted at a mass audience of "casual" gamers. Many of these games require the player to swap items in order to form matches of three and are collectively known as \emph{tile-matching match-three games}. Among these, the most influential one is arguably \emph{Bejeweled} in which the matched items (gems) pop and the above gems fall in their place. Bejeweled has been ported to many different platforms and influenced an incredible number of similar games. Very recently one of them, named \emph{Candy Crush Saga} enjoyed a huge popularity and quickly went viral on social networks. We generalize this kind of games by only parameterizing the size of the board, while all the other elements (such as the rules or the number of gems) remain unchanged. Then, we prove that answering many natural questions regarding such games is actually \NP-Hard. These questions include determining if the player can reach a certain score, play for a certain number of turns, and others. We also \href{http://candycrush.isnphard.com}{provide} a playable web-based implementation of our reduction.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 01:51:19 GMT" } ]
2014-03-25T00:00:00
[ [ "Gualà", "Luciano", "" ], [ "Leucci", "Stefano", "" ], [ "Natale", "Emanuele", "" ] ]
new_dataset
0.999651
1403.5871
David Bild
Yue Liu, David R. Bild, Robert P. Dick, Z. Morley Mao, and Dan S. Wallach
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation - something not exposed on commodity 802.11 devices - or valid RSSI observations from multiple trusted sources, e.g., corporate access points - something not directly available in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these techniques to be practical for wireless ad hoc networks of commodity 802.11 devices. Specifically, we propose two efficient methods for separating the valid RSSI observations of behaving nodes from those falsified by malicious participants. Further, we note that prior signalprint methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We illustrate its performance in several real-world scenarios.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 07:21:43 GMT" } ]
2014-03-25T00:00:00
[ [ "Liu", "Yue", "" ], [ "Bild", "David R.", "" ], [ "Dick", "Robert P.", "" ], [ "Mao", "Z. Morley", "" ], [ "Wallach", "Dan S.", "" ] ]
new_dataset
0.997267
1403.5919
Daniel Freedman
Daniel Freedman, Eyal Krupka, Yoni Smolin, Ido Leichter, Mirko Schmidt
SRA: Fast Removal of General Multipath for ToF Sensors
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major issue with Time of Flight sensors is the presence of multipath interference. We present Sparse Reflections Analysis (SRA), an algorithm for removing this interference which has two main advantages. First, it allows for very general forms of multipath, including interference with three or more paths, diffuse multipath resulting from Lambertian surfaces, and combinations thereof. SRA removes this general multipath with robust techniques based on $L_1$ optimization. Second, due to a novel dimension reduction, we are able to produce a very fast version of SRA, which is able to run at frame rate. Experimental results on both synthetic data with ground truth, as well as real images of challenging scenes, validate the approach.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 11:28:52 GMT" } ]
2014-03-25T00:00:00
[ [ "Freedman", "Daniel", "" ], [ "Krupka", "Eyal", "" ], [ "Smolin", "Yoni", "" ], [ "Leichter", "Ido", "" ], [ "Schmidt", "Mirko", "" ] ]
new_dataset
0.978797
1403.6006
Hong Cao Dr
Hong Cao
A Tablet Based Learning Environment
34 pages, 14 figures
null
null
null
cs.CY cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Pen computing tools such as Tablet PC, Tablet Monitors and its various supporting software tool offer another dimension to enhance our today's digitally integrated and connected classroom learning environment. This paper first reviews the various state-of-the-art pen-computing hardware and software that have been applied in the classroom setting to introduce student-centric learning, collaboration and making annotations and designing classroom activities easier. We then propose a new classroom environment which is fully equipped with Tablet devices and the supporting software tools for the goals of 1) easy electronic ink annotations with least constraints; 2) enhanced active learning with timely feedback; 3) enhanced student collaborations and 4) lecture recording. The classroom has been put into practical teaching and learning environment as a pilot project in our higher learning environment. After overcoming the initial learning curves, the environment received positive feedbacks from the teaching faculties as well as from the students.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 15:39:43 GMT" } ]
2014-03-25T00:00:00
[ [ "Cao", "Hong", "" ] ]
new_dataset
0.99856
1403.6060
Alexey Sorokin
Alexey Sorokin
Monoid automata for displacement context-free languages
Revised version for ESSLLI Student Session 2013 selected papers
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2007 Kambites presented an algebraic interpretation of Chomsky-Schutzenberger theorem for context-free languages. We give an interpretation of the corresponding theorem for the class of displacement context-free languages which are equivalent to well-nested multiple context-free languages. We also obtain a characterization of k-displacement context-free languages in terms of monoid automata and show how such automata can be simulated on two stacks. We introduce the simultaneous two-stack automata and compare different variants of its definition. All the definitions considered are shown to be equivalent basing on the geometric interpretation of memory operations of these automata.
[ { "version": "v1", "created": "Mon, 24 Mar 2014 17:51:32 GMT" } ]
2014-03-25T00:00:00
[ [ "Sorokin", "Alexey", "" ] ]
new_dataset
0.99955
1403.6090
Mohammad Gholami
Mohammad Gholami, Ghaffar Raeisi
Column Weight Two and Three LDPC Codes with High Rates and Large Girths
6 pages, 6 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the concept of the {\it broken diagonal pair} in the chess-like square board is used to define some well-structured block designs whose incidence matrices can be considered as the parity-check matrices of some high rate cycle codes with girth 12. The structure of the proposed parity-check matrices significantly reduces the complexity of encoding and decoding. Interestingly, the constructed regular cycle codes with row-weights $t$, $3\leq t \leq 20$, $t\neq 7, 15, 16$, have the best lengths among the known regular girth-12 cycle codes. In addition, the proposed cycle codes can be easily extended to some high rate column weight-3 LDPC codes with girth 6. Simulation results show that the constructed codes achieve excellent performances, specially the constructed column weight 3 LDPC codes outperform LDPC codes based on Steiner triple systems (STS).
[ { "version": "v1", "created": "Mon, 24 Mar 2014 19:15:45 GMT" } ]
2014-03-25T00:00:00
[ [ "Gholami", "Mohammad", "" ], [ "Raeisi", "Ghaffar", "" ] ]
new_dataset
0.981744
1402.4843
Aleksandar Perisic
Aleksandar Perisic
Exercise: +-1 bug and center of an array problem
18 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A problem that is constantly cropping up in designing even the simplest algorithm or a program is dealing with +-1 bug when we calculate positions within an array, very noticeably while splitting it in half. This bug is often found in buffer overflow type of bugs. While designing one complicated algorithm, we needed various ways of splitting an array, and we found lack of general guidance for this apparently minor problem. We present an exercise that tracks the cause of the problem and leads to the solution. This problem looks trivial because it seems obvious or insignificant, however treating it without outmost precision can lead to subtle bugs, unbalanced solution, not transparent expressions for various languages. Basically, the exercise is about dealing with <= < as well as n/2, n/2-1, (n+1)/2, n-1 and similar expressions when they are rounded down to the nearest integer and used to define a range.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 22:50:29 GMT" }, { "version": "v2", "created": "Sun, 2 Mar 2014 12:51:39 GMT" }, { "version": "v3", "created": "Wed, 5 Mar 2014 12:33:13 GMT" }, { "version": "v4", "created": "Wed, 12 Mar 2014 07:59:05 GMT" }, { "version": "v5", "created": "Fri, 21 Mar 2014 08:44:07 GMT" } ]
2014-03-24T00:00:00
[ [ "Perisic", "Aleksandar", "" ] ]
new_dataset
0.994785
1403.3431
Marzio De Biasi
Marzio De Biasi
Minimal TSP Tour is coNP-Complete
5 pages, 1 figure
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of deciding if a Traveling Salesman Problem (TSP) tour is minimal was proved to be coNP-complete by Papadimitriou and Steiglitz. We give an alternative proof based on a polynomial time reduction from 3SAT. Like the original proof, our reduction also shows that given a graph $G$ and an Hamiltonian path of $G$, it is NP-complete to check if $G$ contains an Hamiltonian cycle (Restricted Hamiltonian Cycle problem).
[ { "version": "v1", "created": "Thu, 13 Mar 2014 21:00:36 GMT" }, { "version": "v2", "created": "Fri, 21 Mar 2014 07:54:49 GMT" } ]
2014-03-24T00:00:00
[ [ "De Biasi", "Marzio", "" ] ]
new_dataset
0.996211
1403.5345
Xinyang Deng
Xiaoge Zhang, Andrew Adamatzky, Xin-She Yang, Hai Yang, Sankaran Mahadevan, Yong Deng
A Physarum-Inspired Approach to Optimal Supply Chain Network Design at Minimum Total Cost with Demand Satisfaction
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A supply chain is a system which moves products from a supplier to customers. The supply chains are ubiquitous. They play a key role in all economic activities. Inspired by biological principles of nutrients' distribution in protoplasmic networks of slime mould Physarum polycephalum we propose a novel algorithm for a supply chain design. The algorithm handles the supply networks where capacity investments and product flows are variables. The networks are constrained by a need to satisfy product demands. Two features of the slime mould are adopted in our algorithm. The first is the continuity of a flux during the iterative process, which is used in real-time update of the costs associated with the supply links. The second feature is adaptivity. The supply chain can converge to an equilibrium state when costs are changed. Practicality and flexibility of our algorithm is illustrated on numerical examples.
[ { "version": "v1", "created": "Fri, 21 Mar 2014 02:32:20 GMT" } ]
2014-03-24T00:00:00
[ [ "Zhang", "Xiaoge", "" ], [ "Adamatzky", "Andrew", "" ], [ "Yang", "Xin-She", "" ], [ "Yang", "Hai", "" ], [ "Mahadevan", "Sankaran", "" ], [ "Deng", "Yong", "" ] ]
new_dataset
0.988945
1403.5401
Reza Chandra
Renny Renny and Reza Chandra and Syamsi Ruhama and Mochammad Wisuda Sarjono
Exploring Indonesian Web Based Career Center Discrepancy of Web Popularity and Type of Services
Journal of Advances in Computer Science and its Applications
UACEE International Journal of Advances in Computer Science and its Applications IJCSIA Volume 3 Issue 2 Publication Date 5 June 2013
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Utilization of the Internet in higher education focus on the learning process or the provision of academic information for students. The subject of this research is in the form of web-based management alumnus Career Center with specific sub domain. Colleges that already have a Career Center only 34 of the 264 colleges as sample. Type the service the most are information jobs, while others are still rarely available as a forum of alumni and career consultation. Ownership Career Center contributed to the popularity of college website. Providing services such as communication and consultation career impact on the popularity of the Career Center website.
[ { "version": "v1", "created": "Fri, 21 Mar 2014 09:28:22 GMT" } ]
2014-03-24T00:00:00
[ [ "Renny", "Renny", "" ], [ "Chandra", "Reza", "" ], [ "Ruhama", "Syamsi", "" ], [ "Sarjono", "Mochammad Wisuda", "" ] ]
new_dataset
0.997999
1312.6173
Karl Moritz Hermann
Karl Moritz Hermann and Phil Blunsom
Multilingual Distributed Representations without Word Alignment
To appear at ICLR 2014
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed representations of meaning are a natural way to encode covariance relationships between words and phrases in NLP. By overcoming data sparsity problems, as well as providing information about semantic relatedness which is not available in discrete representations, distributed representations have proven useful in many NLP tasks. Recent work has shown how compositional semantic representations can successfully be applied to a number of monolingual applications such as sentiment analysis. At the same time, there has been some initial success in work on learning shared word-level representations across languages. We combine these two approaches by proposing a method for learning distributed representations in a multilingual setup. Our model learns to assign similar embeddings to aligned sentences and dissimilar ones to sentence which are not aligned while not requiring word alignments. We show that our representations are semantically informative and apply them to a cross-lingual document classification task where we outperform the previous state of the art. Further, by employing parallel corpora of multiple language pairs we find that our model learns representations that capture semantic relationships across languages for which no parallel data was used.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 23:13:38 GMT" }, { "version": "v2", "created": "Fri, 21 Feb 2014 20:24:06 GMT" }, { "version": "v3", "created": "Mon, 17 Mar 2014 17:52:13 GMT" }, { "version": "v4", "created": "Thu, 20 Mar 2014 13:55:02 GMT" } ]
2014-03-21T00:00:00
[ [ "Hermann", "Karl Moritz", "" ], [ "Blunsom", "Phil", "" ] ]
new_dataset
0.982382
1403.5128
Parul Pandey ms
Parul Pandey, Mahshwari Tripathi
A Novel Quorum Protocol
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the traditional mechanisms used in distributed systems for maintaining the consistency of replicated data is voting. A problem involved in voting mechanisms is the size of the Quorums needed on each access to the data. In this paper, we present a novel and efficient distributed algorithm for managing replicated data. We impose a logical wheel structure on the set of copies of an object. The protocol ensures minimum read quorum size of one, by reading one copy of an object while guaranteeing fault-tolerance of write operations.Wheel structure has a wider application area as it can be imposed in a network with any number of nodes.
[ { "version": "v1", "created": "Thu, 20 Mar 2014 13:20:07 GMT" } ]
2014-03-21T00:00:00
[ [ "Pandey", "Parul", "" ], [ "Tripathi", "Mahshwari", "" ] ]
new_dataset
0.986849
1403.4795
James Whiting
James Gerald Holland Whiting, Ben de Lacy Costello, Andrew Adamatzky
Sensory fusion in Physarum polycephalum and implementing multi-sensory functional computation
18 pages, 2 figures, 4 tables
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Surface electrical potential and observational growth recordings were made of a protoplasmic tube of the slime mould Physarum polycephalum in response to a multitude of stimuli with regards to sensory fusion or multisensory integration. Each stimulus was tested alone and in combination in order to evaluate for the first time the effect that multiple stimuli have on the frequency of streaming oscillation. White light caused a decrease in frequency whilst increasing the temperature and applying a food source in the form of oat flakes both increased the frequency. Simultaneously stimulating P. polycephalum with light and oat flake produced no net change in frequency, while combined light and heat stimuli showed an increase in frequency smaller than that observed for heat alone. When the two positive stimuli, oat flakes and heat, were combined, there was a net increase in frequency similar to the cumulative increases caused by the individual stimuli. Boolean logic gates were derived from the measured frequency change.
[ { "version": "v1", "created": "Wed, 19 Mar 2014 13:24:54 GMT" } ]
2014-03-20T00:00:00
[ [ "Whiting", "James Gerald Holland", "" ], [ "Costello", "Ben de Lacy", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.997464