id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1403.4829
Qinggang Yue
Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao
Blind Recognition of Touched Keys: Attack and Countermeasures
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a novel computer vision based attack that discloses inputs on a touch enabled device, while the attacker cannot see any text or popups from a video of the victim tapping on the touch screen. In the attack, we use the optical flow algorithm to identify touching frames where the finger touches the screen surface. We innovatively use intersections of detected edges of the touch screen to derive the homography matrix mapping the touch screen surface in video frames to a reference image of the virtual keyboard. We analyze the shadow formation around the fingertip and use the k-means clustering algorithm to identify touched points. Homography can then map these touched points to keys of the virtual keyboard. Our work is substantially different from existing work. We target password input and are able to achieve a high success rate. We target scenarios like classrooms, conferences and similar gathering places and use a webcam or smartphone camera. In these scenes, single-lens reflex (SLR) cameras and high-end camcorders used in related work will appear suspicious. To defeat such computer vision based attacks, we design, implement and evaluate the Privacy Enhancing Keyboard (PEK) where a randomized virtual keyboard is used to input sensitive information.
[ { "version": "v1", "created": "Wed, 19 Mar 2014 14:55:17 GMT" } ]
2014-03-20T00:00:00
[ [ "Yue", "Qinggang", "" ], [ "Ling", "Zhen", "" ], [ "Liu", "Benyuan", "" ], [ "Fu", "Xinwen", "" ], [ "Zhao", "Wei", "" ] ]
new_dataset
0.998989
1403.4847
Emil Bj\"ornson
Emil Bj\"ornson, Michail Matthaiou and M\'erouane Debbah
Massive MIMO Systems with Hardware-Constrained Base Stations
Published at IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), 5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive multiple-input multiple-output (MIMO) systems are cellular networks where the base stations (BSs) are equipped with unconventionally many antennas. Such large antenna arrays offer huge spatial degrees-of-freedom for transmission optimization; in particular, great signal gains, resilience to imperfect channel knowledge, and small inter-user interference are all achievable without extensive inter-cell coordination. The key to cost-efficient deployment of large arrays is the use of hardware-constrained base stations with low-cost antenna elements, as compared to today's expensive and power-hungry BSs. Low-cost transceivers are prone to hardware imperfections, but it has been conjectured that the excessive degrees-of-freedom of massive MIMO would bring robustness to such imperfections. We herein prove this claim for an uplink channel with multiplicative phase-drift, additive distortion noise, and noise amplification. Specifically, we derive a closed-form scaling law that shows how fast the imperfections increase with the number of antennas.
[ { "version": "v1", "created": "Wed, 19 Mar 2014 15:38:33 GMT" } ]
2014-03-20T00:00:00
[ [ "Björnson", "Emil", "" ], [ "Matthaiou", "Michail", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.99943
1403.4928
Leon Derczynski
Steven Bethard, Leon Derczynski, James Pustejovsky, Marc Verhagen
Clinical TempEval
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the Clinical TempEval task which is currently in preparation for the SemEval-2015 evaluation exercise. This task involves identifying and describing events, times and the relations between them in clinical text. Six discrete subtasks are included, focusing on recognising mentions of times and events, describing those mentions for both entity types, identifying the relation between an event and the document creation time, and identifying narrative container relations.
[ { "version": "v1", "created": "Wed, 19 Mar 2014 19:59:49 GMT" } ]
2014-03-20T00:00:00
[ [ "Bethard", "Steven", "" ], [ "Derczynski", "Leon", "" ], [ "Pustejovsky", "James", "" ], [ "Verhagen", "Marc", "" ] ]
new_dataset
0.99849
1203.3705
Artur Je\.z
Artur Je\.z
Recompression: a simple and powerful technique for word equations
Submitted to a journal. Since previous version the proofs were simplified, overall presentation improved
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an application of a simple technique of local recompression, previously developed by the author in the context of compressed membership problems and compressed pattern matching, to word equations. The technique is based on local modification of variables (replacing X by aX or Xa) and iterative replacement of pairs of letters appearing in the equation by a `fresh' letter, which can be seen as a bottom-up compression of the solution of the given word equation, to be more specific, building an SLP (Straight-Line Programme) for the solution of the word equation. Using this technique we give a new, independent and self-contained proofs of most of the known results for word equations. To be more specific, the presented (nondeterministic) algorithm runs in O(n log n) space and in time polynomial in log N, where N is the size of the length-minimal solution of the word equation. The presented algorithm can be easily generalised to a generator of all solutions of the given word equation (without increasing the space usage). Furthermore, a further analysis of the algorithm yields a doubly exponential upper bound on the size of the length-minimal solution. The presented algorithm does not use exponential bound on the exponent of periodicity. Conversely, the analysis of the algorithm yields an independent proof of the exponential bound on exponent of periodicity. We believe that the presented algorithm, its idea and analysis are far simpler than all previously applied. Furthermore, thanks to it we can obtain a unified and simple approach to most of known results for word equations. As a small additional result we show that for O(1) variables (with arbitrary many appearances in the equation) word equations can be solved in linear space, i.e. they are context-sensitive.
[ { "version": "v1", "created": "Fri, 16 Mar 2012 13:43:45 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2012 10:45:05 GMT" }, { "version": "v3", "created": "Tue, 18 Mar 2014 12:49:35 GMT" } ]
2014-03-19T00:00:00
[ [ "Jeż", "Artur", "" ] ]
new_dataset
0.988692
1403.4357
Yunquan Dong
Yunquan Dong, Pingyi Fan, Khaled Ben Letaief
High Speed Railway Wireless Communications: Efficiency v.s. Fairness
16 pages, 6 figures
IEEE Trans. Veh. Technol., vol. 62, no. 2, 2014, pp: 925-930
10.1109/TVT.2013.2281401
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High speed railways (HSRs) have been deployed widely all over the world in recent years. Different from traditional cellular communication, its high mobility makes it essential to implement power allocation along the time. In the HSR case, the transmission rate depends greatly on the distance between the base station (BS) and the train. As a result, the train receives a time varying data rate service when passing by a BS. It is clear that the most efficient power allocation will spend all the power when the train is nearest from the BS, which will cause great unfairness along the time. On the other hand, the channel inversion allocation achieves the best fairness in terms of constant rate transmission. However, its power efficiency is much lower. Therefore, the power efficiency and the fairness along time are two incompatible objects. For the HSR cellular system considered in this paper, a trade-off between the two is achieved by proposing a temporal proportional fair power allocation scheme. Besides, near optimal closed form solution and one algorithm finding the $\epsilon$-optimal allocation are presented.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 06:32:44 GMT" } ]
2014-03-19T00:00:00
[ [ "Dong", "Yunquan", "" ], [ "Fan", "Pingyi", "" ], [ "Letaief", "Khaled Ben", "" ] ]
new_dataset
0.977387
1403.4452
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen
The Homogeneous Weight Partition and its Character-Theoretic Dual
null
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The values of the normalized homogeneous weight are determined for arbitrary finite Frobenius rings and expressed in a form that is independent from a generating character and the M\"obius function on the ring. The weight naturally induces a partition of the ring, which is invariant under left or right multiplication by units. It is shown that the character-theoretic left-sided dual of this partition coincides with the right-sided dual, and even more, the left- and right-sided Krawtchouk coefficients coincide. An example is provided showing that this is not the case for general invariant partitions if the ring is not semisimple.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 13:48:45 GMT" } ]
2014-03-19T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ] ]
new_dataset
0.956921
1403.4469
Rahul Upadhyay
Rahul R Upadhyay
Synchronous Relaying Of Sensor Data
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data . Smart phones are becoming very common and they are laced with a number of sensors that can not only be used in native applications but can also be sent to external nodes to be used by third parties for application and service development.
[ { "version": "v1", "created": "Sat, 15 Mar 2014 15:55:26 GMT" } ]
2014-03-19T00:00:00
[ [ "Upadhyay", "Rahul R", "" ] ]
new_dataset
0.985314
1403.4482
Pili Hu
Pili Hu, Qijiang Fan, Wing Cheong Lau
SNSAPI: A Cross-Platform Middleware for Rapid Deployment of Decentralized Social Networks
null
null
null
null
cs.SI cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the design, implementation and our year-long maintenance experience of SNSAPI, a Python-based middleware which unifies the interfaces and data structures of heterogeneous Social Networking Services (SNS). Unlike most prior works, our middleware is user-oriented and requires zero infrastructure support. It enables a user to readily conduct online social activities in a programmable, cross-platform fashion while gradually reducing the dependence on centralized Online Social Networks (OSN). More importantly, as the SNSAPI middleware can be used to support decentralized social networking services via conventional communication channels such as RSS or Email, it enables the deployment of Decentralized Social Networks (DSN) in an incremental, ad hoc manner. To demonstrate the viability of such type of DSNs, we have deployed an experimental 6000-node SNSAPI-based DSN on PlanetLab and evaluate its performance by replaying traces of online social activities collected from a mainstream OSN. Our results show that, with only mild resource consumption, the SNSAPI-based DSN can achieve acceptable forwarding latency comparable to that of a centralized OSN. We also develop an analytical model to characterize the trade-offs between resource consumption and message forwarding delay in our DSN. Via 20 parameterized experiments on PlanetLab, we have found that the empirical measurement results match reasonably with the performance predicted by our analytical model.
[ { "version": "v1", "created": "Tue, 18 Mar 2014 14:43:15 GMT" } ]
2014-03-19T00:00:00
[ [ "Hu", "Pili", "" ], [ "Fan", "Qijiang", "" ], [ "Lau", "Wing Cheong", "" ] ]
new_dataset
0.999162
1403.3752
Gav Wood
Gavin Wood
Martta: A C++ Language Workbench
null
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language-orientated programming promises to elevate programmer productivity through increased abstrac- tion capabilities. Structural programming environments provide apparatus to reduce the difficulties with syntax. The language workbench, a conceptual combination of these two approaches, is a comparatively novel approach to software development and has so far been attempted only in dynamic-dispatch, run-time-compiled languages (e.g. Java). However, it must be remembered that several fields of engineering exist, each having their own priorities. In the video games industry, where large, complex and diverse projects are routinely developed, efficiency is paramount and as such C++, as a development platform, is widely used. I explore the possibility of a language workbench capable of a gradual transition in both skills and code from the traditional C++ development environment. This article is the design for a language workbench. It uses novel techniques including a context-sensitive event- driven input system and a hybrid single/multiple-inherited class model and through a prototype implementation demon- strates that is both concise and practical for C++. I refute the hitherto implicit hypothesis that the language workbench paradigm is not applicable to the C++ language, showing that C++ can be used for creating an effective development framework usable in otherwise pure-C++ programming environments.
[ { "version": "v1", "created": "Sat, 15 Mar 2014 04:12:39 GMT" } ]
2014-03-18T00:00:00
[ [ "Wood", "Gavin", "" ] ]
new_dataset
0.999367
1403.3829
Wei Di
Zixuan Wang, Wei Di, Anurag Bhardwaj, Vignesh Jagadeesh, Robinson Piramuthu
Geometric VLAD for Large Scale Image Search
8 pages
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
We present a novel compact image descriptor for large scale image search. Our proposed descriptor - Geometric VLAD (gVLAD) is an extension of VLAD (Vector of Locally Aggregated Descriptors) that incorporates weak geometry information into the VLAD framework. The proposed geometry cues are derived as a membership function over keypoint angles which contain evident and informative information but yet often discarded. A principled technique for learning the membership function by clustering angles is also presented. Further, to address the overhead of iterative codebook training over real-time datasets, a novel codebook adaptation strategy is outlined. Finally, we demonstrate the efficacy of proposed gVLAD based retrieval framework where we achieve more than 15% improvement in mAP over existing benchmarks.
[ { "version": "v1", "created": "Sat, 15 Mar 2014 17:35:26 GMT" } ]
2014-03-18T00:00:00
[ [ "Wang", "Zixuan", "" ], [ "Di", "Wei", "" ], [ "Bhardwaj", "Anurag", "" ], [ "Jagadeesh", "Vignesh", "" ], [ "Piramuthu", "Robinson", "" ] ]
new_dataset
0.997431
1403.3992
Elena Pribavkina
Vladimir V. Gusev, Elena V. Pribavkina
Reset thresholds of automata with two cycle lengths
11 pages, 5 figures, submitted to CIAA 2014
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present several series of synchronizing automata with multiple parameters, generalizing previously known results. Let p and q be two arbitrary co-prime positive integers, q > p. We describe reset thresholds of the colorings of primitive digraphs with exactly one cycle of length p and one cycle of length q. Also, we study reset thresholds of the colorings of primitive digraphs with exactly one cycle of length q and two cycles of length p.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 04:02:50 GMT" } ]
2014-03-18T00:00:00
[ [ "Gusev", "Vladimir V.", "" ], [ "Pribavkina", "Elena V.", "" ] ]
new_dataset
0.973733
1403.3996
Vineeth Kashyap
Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf
JSAI: Designing a Sound, Configurable, and Efficient Static Analyzer for JavaScript
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe JSAI, an abstract interpreter for JavaScript. JSAI uses novel abstract domains to compute a reduced product of type inference, pointer analysis, string analysis, integer and boolean constant propagation, and control-flow analysis. In addition, JSAI allows for analysis control-flow sensitivity (i.e., context-, path-, and heap-sensitivity) to be modularly configured without requiring any changes to the analysis implementation. JSAI is designed to be provably sound with respect to a specific concrete semantics for JavaScript, which has been extensively tested against existing production-quality JavaScript implementations. We provide a comprehensive evaluation of JSAI's performance and precision using an extensive benchmark suite. This benchmark suite includes real-world JavaScript applications, machine-generated JavaScript code via Emscripten, and browser addons. We use JSAI's configurability to evaluate a large number of analysis sensitivities (some well-known, some novel) and observe some surprising results. We believe that JSAI's configurability and its formal specifications position it as a useful research platform to experiment on novel sensitivities, abstract domains, and client analyses for JavaScript.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 04:29:25 GMT" } ]
2014-03-18T00:00:00
[ [ "Kashyap", "Vineeth", "" ], [ "Dewey", "Kyle", "" ], [ "Kuefner", "Ethan A.", "" ], [ "Wagner", "John", "" ], [ "Gibbons", "Kevin", "" ], [ "Sarracino", "John", "" ], [ "Wiedermann", "Ben", "" ], [ "Hardekopf", "Ben", "" ] ]
new_dataset
0.9976
1403.4026
Jingwei Chen
Yong Feng, Jingwei Chen, Wenyuan Wu
A Short Note on Zero-error Computation for Algebraic Numbers by IPSLQ
4 pages
ACM Communications in Computer Algebra, 47(3), 2013
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The PSLQ algorithm is one of the most popular algorithm for finding nontrivial integer relations for several real numbers. In the present work, we present an incremental version of PSLQ. For some applications needing to call PSLQ many times, such as finding the minimal polynomial of an algebraic number without knowing the degree, the incremental PSLQ algorithm is more efficient than PSLQ, both theoretically and practically.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 08:32:59 GMT" } ]
2014-03-18T00:00:00
[ [ "Feng", "Yong", "" ], [ "Chen", "Jingwei", "" ], [ "Wu", "Wenyuan", "" ] ]
new_dataset
0.968516
1403.4232
Tanushri Chakravorty
Tanushri Chakravorty, Guillaume-Alexandre Bilodeau, Eric Granger
Automatic Image Registration in Infrared-Visible Videos using Polygon Vertices
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an automatic method is proposed to perform image registration in visible and infrared pair of video sequences for multiple targets. In multimodal image analysis like image fusion systems, color and IR sensors are placed close to each other and capture a same scene simultaneously, but the videos are not properly aligned by default because of different fields of view, image capturing information, working principle and other camera specifications. Because the scenes are usually not planar, alignment needs to be performed continuously by extracting relevant common information. In this paper, we approximate the shape of the targets by polygons and use affine transformation for aligning the two video sequences. After background subtraction, keypoints on the contour of the foreground blobs are detected using DCE (Discrete Curve Evolution)technique. These keypoints are then described by the local shape at each point of the obtained polygon. The keypoints are matched based on the convexity of polygon's vertices and Euclidean distance between them. Only good matches for each local shape polygon in a frame, are kept. To achieve a global affine transformation that maximises the overlapping of infrared and visible foreground pixels, the matched keypoints of each local shape polygon are stored temporally in a buffer for a few number of frames. The matrix is evaluated at each frame using the temporal buffer and the best matrix is selected, based on an overlapping ratio criterion. Our experimental results demonstrate that this method can provide highly accurate registered images and that we outperform a previous related method.
[ { "version": "v1", "created": "Mon, 17 Mar 2014 19:58:14 GMT" } ]
2014-03-18T00:00:00
[ [ "Chakravorty", "Tanushri", "" ], [ "Bilodeau", "Guillaume-Alexandre", "" ], [ "Granger", "Eric", "" ] ]
new_dataset
0.979765
1301.0014
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia), Vladimir Potapov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
Propelinear 1-perfect codes from quadratic functions
4 IEEE pages. v2: minor revision, + upper bound (Sect. III.B), +remarks (Sect. V.A); v3: minor revision, + length 15 (Sect. V.B)
IEEE Trans. Inf. Theory 60(4) 2014, 2065-2068
10.1109/TIT.2014.2303158
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Perfect codes obtained by the Vasil'ev--Sch\"onheim construction from a linear base code and quadratic switching functions are transitive and, moreover, propelinear. This gives at least $\exp(cN^2)$ propelinear $1$-perfect codes of length $N$ over an arbitrary finite field, while an upper bound on the number of transitive codes is $\exp(C(N\ln N)^2)$. Keywords: perfect code, propelinear code, transitive code, automorphism group, Boolean function.
[ { "version": "v1", "created": "Mon, 31 Dec 2012 21:05:29 GMT" }, { "version": "v2", "created": "Thu, 26 Dec 2013 02:33:42 GMT" }, { "version": "v3", "created": "Thu, 20 Feb 2014 07:53:27 GMT" } ]
2014-03-17T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ], [ "Potapov", "Vladimir", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
new_dataset
0.99963
1403.3547
Rakesh Kumar Pandey
Rakesh Kumar Pandey, Dilip Kumar
Distributed Transformer Monitoring System Based On Zigbee Technology
3 Pages, 5 Figures, International Journal of Engineering Trends and Technology (IJETT)-Volume4 Issue5-May (2013)
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Distributed transformer networks remote monitoring system is developed and constructed,for monitor and record the parameters like temperature, oil level status, of a distribution transformer.The system consists of a micro controller based circuit,with solid-state components for handling sensors,power back-up,real time clock and data communication module which based on ZigBee protocol.
[ { "version": "v1", "created": "Fri, 14 Mar 2014 12:08:22 GMT" } ]
2014-03-17T00:00:00
[ [ "Pandey", "Rakesh Kumar", "" ], [ "Kumar", "Dilip", "" ] ]
new_dataset
0.996368
1403.3660
Delaram Kahrobaei
Delaram Kahrobaei, Charalambos Koupparis, and Vladimir Shpilrain
A CCA secure cryptosystem using matrices over group rings
null
null
null
null
cs.CR math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a cryptosystem based on matrices over group rings and claim that it is secure against adaptive chosen ciphertext attack.
[ { "version": "v1", "created": "Fri, 14 Mar 2014 18:14:40 GMT" } ]
2014-03-17T00:00:00
[ [ "Kahrobaei", "Delaram", "" ], [ "Koupparis", "Charalambos", "" ], [ "Shpilrain", "Vladimir", "" ] ]
new_dataset
0.987084
1309.7937
Matthew Bellman
Matthew J. Bellman and Teng-Hu Cheng and Ryan J. Downey and Warren E. Dixon
Stationary Cycling Induced by Switched Functional Electrical Stimulation Control
8 pages, 3 figures, submitted to ACC 2014
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/3.0/
Functional electrical stimulation (FES) is used to activate the dysfunctional lower limb muscles of individuals with neuromuscular disorders to produce cycling as a means of exercise and rehabilitation. However, FES-cycling is still metabolically inefficient and yields low power output at the cycle crank compared to able-bodied cycling. Previous literature suggests that these problems are symptomatic of poor muscle control and non-physiological muscle fiber recruitment. The latter is a known problem with FES in general, and the former motivates investigation of better control methods for FES-cycling.In this paper, a stimulation pattern for quadriceps femoris-only FES-cycling is derived based on the effectiveness of knee joint torque in producing forward pedaling. In addition, a switched sliding-mode controller is designed for the uncertain, nonlinear cycle-rider system with autonomous state-dependent switching. The switched controller yields ultimately bounded tracking of a desired trajectory in the presence of an unknown, time-varying, bounded disturbance, provided a reverse dwell-time condition is satisfied by appropriate choice of the control gains and a sufficient desired cadence. Stability is derived through Lyapunov methods for switched systems, and experimental results demonstrate the performance of the switched control system under typical cycling conditions.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 17:39:04 GMT" }, { "version": "v2", "created": "Thu, 3 Oct 2013 14:50:46 GMT" }, { "version": "v3", "created": "Thu, 13 Mar 2014 06:18:20 GMT" } ]
2014-03-14T00:00:00
[ [ "Bellman", "Matthew J.", "" ], [ "Cheng", "Teng-Hu", "" ], [ "Downey", "Ryan J.", "" ], [ "Dixon", "Warren E.", "" ] ]
new_dataset
0.996735
1403.3118
Rodrigo da Silva Moreira
Rodrigo da Silva Moreira and Nelson Francisco Favilla Ebecken
Parallel WiSARD object tracker: a ram-based tracking system
15 pages, 7 figures
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No. 1, February 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes the Parallel WiSARD Object Tracker (PWOT), a new object tracker based on the WiSARD weightless neural network that is robust against quantization errors. Object tracking in video is an important and challenging task in many applications. Difficulties can arise due to weather conditions, target trajectory and appearance, occlusions, lighting conditions and noise. Tracking is a high-level application and requires the object location frame by frame in real time. This paper proposes a fast hybrid image segmentation (threshold and edge detection) in YcbCr color model and a parallel RAM based discriminator that improves efficiency when quantization errors occur. The original WiSARD training algorithm was changed to allow the tracking.
[ { "version": "v1", "created": "Wed, 12 Mar 2014 21:23:52 GMT" } ]
2014-03-14T00:00:00
[ [ "Moreira", "Rodrigo da Silva", "" ], [ "Ebecken", "Nelson Francisco Favilla", "" ] ]
new_dataset
0.97806
1403.3336
Kenneth Knowles
Kenneth Knowles
Executable Refinement Types
Ph.D. dissertation. Accepted by the University of California, Santa Cruz, in March 2014. 278 pages (295 including frontmatter)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This dissertation introduces executable refinement types, which refine structural types by semi-decidable predicates, and establishes their metatheory and accompanying implementation techniques. These results are useful for undecidable type systems in general. Particular contributions include: (1) Type soundness and a logical relation for extensional equivalence for executable refinement types (though type checking is undecidable); (2) hybrid type checking for executable refinement types, which blends static and dynamic checks in a novel way, in some sense performing better statically than any decidable approximation; (3) a type reconstruction algorithm - reconstruction is decidable even though type checking is not, when suitably redefined to apply to undecidable type systems; (4) a novel use of existential types with dependent types to ensure that the language of logical formulae is closed under type checking (5) a prototype implementation, Sage, of executable refinement types such that all dynamic errors are communicated back to the compiler and are thenceforth static errors.
[ { "version": "v1", "created": "Thu, 13 Mar 2014 17:31:39 GMT" } ]
2014-03-14T00:00:00
[ [ "Knowles", "Kenneth", "" ] ]
new_dataset
0.99784
1403.3366
Anupam Das
Anupam Das, Nikita Borisov, Matthew Caesar
Fingerprinting Smart Devices Through Embedded Acoustic Components
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awareness. We propose a novel fingerprinting approach that uses the microphones and speakers of smart phones to uniquely identify an individual device. During fabrication, subtle imperfections arise in device microphones and speakers which induce anomalies in produced and received sounds. We exploit this observation to fingerprint smart devices through playback and recording of audio samples. We use audio-metric tools to analyze and explore different acoustic features and analyze their ability to successfully fingerprint smart devices. Our experiments show that it is even possible to fingerprint devices that have the same vendor and model; we were able to accurately distinguish over 93% of all recorded audio clips from 15 different units of the same model. Our study identifies the prominent acoustic features capable of fingerprinting devices with high success rate and examines the effect of background noise and other variables on fingerprinting accuracy.
[ { "version": "v1", "created": "Thu, 13 Mar 2014 18:56:56 GMT" } ]
2014-03-14T00:00:00
[ [ "Das", "Anupam", "" ], [ "Borisov", "Nikita", "" ], [ "Caesar", "Matthew", "" ] ]
new_dataset
0.984167
1403.2980
Rocio Gonzalez-Diaz
Rocio Gonzalez-Diaz, Maria-Jose Jimenez, Belen Medrano
3D Well-composed Polyhedral Complexes
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binary three-dimensional (3D) image $I$ is well-composed if the boundary surface of its continuous analog is a 2D manifold. Since 3D images are not often well-composed, there are several voxel-based methods ("repairing" algorithms) for turning them into well-composed ones but these methods either do not guarantee the topological equivalence between the original image and its corresponding well-composed one or involve sub-sampling the whole image. In this paper, we present a method to locally "repair" the cubical complex $Q(I)$ (embedded in $\mathbb{R}^3$) associated to $I$ to obtain a polyhedral complex $P(I)$ homotopy equivalent to $Q(I)$ such that the boundary of every connected component of $P(I)$ is a 2D manifold. The reparation is performed via a new codification system for $P(I)$ under the form of a 3D grayscale image that allows an efficient access to cells and their faces.
[ { "version": "v1", "created": "Wed, 12 Mar 2014 15:44:17 GMT" } ]
2014-03-13T00:00:00
[ [ "Gonzalez-Diaz", "Rocio", "" ], [ "Jimenez", "Maria-Jose", "" ], [ "Medrano", "Belen", "" ] ]
new_dataset
0.992027
1403.2499
Guanghui Zhang
Bocong Chen, San Ling, Guanghui Zhang
Application of Constacyclic codes to Quantum MDS Codes
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum maximal-distance-separable (MDS) codes form an important class of quantum codes. To get $q$-ary quantum MDS codes, it suffices to find linear MDS codes $C$ over $\mathbb{F}_{q^2}$ satisfying $C^{\perp_H}\subseteq C$ by the Hermitian construction and the quantum Singleton bound. If $C^{\perp_{H}}\subseteq C$, we say that $C$ is a dual-containing code. Many new quantum MDS codes with relatively large minimum distance have been produced by constructing dual-containing constacyclic MDS codes (see \cite{Guardia11}, \cite{Kai13}, \cite{Kai14}). These works motivate us to make a careful study on the existence condition for nontrivial dual-containing constacyclic codes. This would help us to avoid unnecessary attempts and provide effective ideas in order to construct dual-containing codes. Several classes of dual-containing MDS constacyclic codes are constructed and their parameters are computed. Consequently, new quantum MDS codes are derived from these parameters. The quantum MDS codes exhibited here have parameters better than the ones available in the literature.
[ { "version": "v1", "created": "Tue, 11 Mar 2014 08:39:08 GMT" } ]
2014-03-12T00:00:00
[ [ "Chen", "Bocong", "" ], [ "Ling", "San", "" ], [ "Zhang", "Guanghui", "" ] ]
new_dataset
0.985391
1403.2548
Neenu George
Neenu George, T.K.Parani
Detection of Node Clones in Wireless Sensor Network Using Detection Protocols
6 pages,5 figures,"Published with International Journal of Engineering Trends and Technology (IJETT)"Volume8 Number 6-Feb2014
nternational Journal of Engineering Trends and Technology (IJETT) Volume8 Number 6-Feb2014
10.14445/22315381/IJETT-V8P253
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node clones. The later one is using probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication cost and detection probability is done using NS2 and obtained randomly directed exploration is the best one having low communication cost and storage consumption and has good detection probability. Keywords: wireless sensor networks (wsn), distributed hash table, randomly directed exploration.
[ { "version": "v1", "created": "Tue, 11 Mar 2014 12:06:26 GMT" } ]
2014-03-12T00:00:00
[ [ "George", "Neenu", "" ], [ "Parani", "T. K.", "" ] ]
new_dataset
0.997038
1403.2630
Edinah Gnang K
Edinah K. Gnang, Ori Parzanchevski, Yuval Filmus
A SageTeX Hypermatrix Algebra Package
null
null
null
null
cs.MS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe here a rudimentary sage implementation of the Bhattacharya-Mesner hypermatrix algebra package.
[ { "version": "v1", "created": "Tue, 11 Mar 2014 16:23:23 GMT" } ]
2014-03-12T00:00:00
[ [ "Gnang", "Edinah K.", "" ], [ "Parzanchevski", "Ori", "" ], [ "Filmus", "Yuval", "" ] ]
new_dataset
0.991181
1207.3574
Lawrence Ong
Lawrence Ong, Sarah J. Johnson, Christopher M. Kellett
On the Capacity of the Binary-Symmetric Parallel-Relay Network
Author's final version (to appear in Transactions on Emerging Telecommunications Technologies)
Transactions on Emerging Telecommunications Technologies, Volume 25, Issue 2, pages 217-230, February 2014
10.1002/ett.2561
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the binary-symmetric parallel-relay network where there is one source, one destination, and multiple relays in parallel. We show that forwarding relays, where the relays merely transmit their received signals, achieve the capacity in two ways: with coded transmission at the source and a finite number of relays, or uncoded transmission at the source and a sufficiently large number of relays. On the other hand, decoding relays, where the relays decode the source message, re-encode, and forward it to the destination, achieve the capacity when the number of relays is small. In addition, we show that any coding scheme that requires decoding at any relay is suboptimal in large parallel-relay networks, where forwarding relays achieve strictly higher rates.
[ { "version": "v1", "created": "Mon, 16 Jul 2012 04:28:58 GMT" } ]
2014-03-11T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Johnson", "Sarah J.", "" ], [ "Kellett", "Christopher M.", "" ] ]
new_dataset
0.998515
1307.2661
Sourangsu Banerji
Sourangsu Banerji, Rahul Singha Chowdhury
On IEEE 802.11: Wireless LAN Technology
19 pages, 4 figures, 3 tables
International Journal of Mobile Network Communications & Telematics (IJMNCT),Volume 3,Issue 4, August 2013
10.5121/ijmnct.2013.3405
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network technologies are traditionally based on wireline solutions. But the introduction of the IEEE 802.11 standards have made a huge impact on the market such that laptops, PCs, printers, cellphones, and VoIP phones, MP3 players in our homes, in offices and even in public areas have incorporated the wireless LAN technology. Wireless broadband technologies nowadays provide unlimited broadband access to users which were previously offered only to wireline users. In this paper, we review and summarize one of the emerging wireless broadband technology i.e. IEEE 802.11,which is a set of physical layer standard for implementing wireless local area network computer communication in the 2.4,3.6,5 and 60GHz frequency band. They fix technology issues or add functionality which is expected to be required by future applications. Though some of the earlier versions of these technologies are obsolete (such as HiperLAN) now but still we have included them in this review for the sake of completeness.
[ { "version": "v1", "created": "Wed, 10 Jul 2013 03:27:15 GMT" }, { "version": "v2", "created": "Thu, 11 Jul 2013 05:02:02 GMT" }, { "version": "v3", "created": "Sun, 4 Aug 2013 16:21:50 GMT" }, { "version": "v4", "created": "Thu, 15 Aug 2013 06:29:51 GMT" }, { "version": "v5", "created": "Fri, 23 Aug 2013 15:14:11 GMT" }, { "version": "v6", "created": "Sun, 16 Feb 2014 18:43:31 GMT" }, { "version": "v7", "created": "Sun, 9 Mar 2014 08:36:05 GMT" } ]
2014-03-11T00:00:00
[ [ "Banerji", "Sourangsu", "" ], [ "Chowdhury", "Rahul Singha", "" ] ]
new_dataset
0.999221
1312.3422
Travis Gagie
Travis Gagie, Giovanni Manzini and Daniel Valenzuela
Compressed Spaced Suffix Arrays
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spaced seeds are important tools for similarity search in bioinformatics, and using several seeds together often significantly improves their performance. With existing approaches, however, for each seed we keep a separate linear-size data structure, either a hash table or a spaced suffix array (SSA). In this paper we show how to compress SSAs relative to normal suffix arrays (SAs) and still support fast random access to them. We first prove a theoretical upper bound on the space needed to store an SSA when we already have the SA. We then present experiments indicating that our approach works even better in practice.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 09:15:47 GMT" }, { "version": "v2", "created": "Fri, 21 Feb 2014 22:31:53 GMT" }, { "version": "v3", "created": "Sun, 9 Mar 2014 10:40:30 GMT" } ]
2014-03-11T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Manzini", "Giovanni", "" ], [ "Valenzuela", "Daniel", "" ] ]
new_dataset
0.992593
1403.1890
Sherin Abdel Hamid M.Sc.
Sherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara
Vehicle as a Resource (VaaR)
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent vehicles are considered key enablers for intelligent transportation systems. They are equipped with resources/components to enable services for vehicle occupants, other vehicles on the road, and third party recipients. In-vehicle sensors, communication modules, and on-board units with computing and storage capabilities allow the intelligent vehicle to work as a mobile service provider of sensing, data storage, computing, cloud, data relaying, infotainment, and localization services. In this paper, we introduce the concept of Vehicle as a Resource (VaaR) and shed light on the services a vehicle can potentially provide on the road or parked. We anticipate that an intelligent vehicle can be a significant service provider in a variety of situations, including emergency scenarios.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 22:37:18 GMT" } ]
2014-03-11T00:00:00
[ [ "Hamid", "Sherin Abdel", "" ], [ "Hassanein", "Hossam S.", "" ], [ "Takahara", "Glen", "" ] ]
new_dataset
0.999683
1403.1988
Konstantinos Georgiou
Konstantinos Georgiou, Evangelos Kranakis, Danny Krizanc
Excuse Me! or The Courteous Theatregoers' Problem
21 pages, 5 figures. An extended abstract of this paper appears in the Proceedings of Seventh International Conference on Fun with Algorithms, July 1--3, 2014, Lipari Island, Sicily, Italy, Springer LNCS
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a theatre consisting of $m$ rows each containing $n$ seats. Theatregoers enter the theatre along aisles and pick a row which they enter along one of its two entrances so as to occupy a seat. Assume they select their seats uniformly and independently at random among the empty ones. A row of seats is narrow and an occupant who is already occupying a seat is blocking passage to new incoming theatregoers. As a consequence, occupying a specific seat depends on the courtesy of theatregoers and their willingness to get up so as to create free space that will allow passage to others. Thus, courtesy facilitates and may well increase the overall seat occupancy of the theatre. We say a theatregoer is courteous if (s)he will get up to let others pass. Otherwise, the theatregoer is selfish. A set of theatregoers is $p$-courteous if each theatregoer in the set is courteous with probability $p$, randomly and independently. It is assumed that the behaviour of a theatregoer does not change during the occupancy of the row. In this paper, we are interested in the following question: what is the expected number of occupied seats as a function of the total number of seats in a theatre, $n$, and the probability that a theatregoer is courteous, $p$? We study and analyze interesting variants of this problem reflecting behaviour of the theatregoers as entirely selfish, and $p$-courteous for a row of seats with one or two entrances and as a consequence for a theatre with $m$ rows of seats with multiple aisles. We also consider the case where seats in a row are chosen according to the geometric distribution and the Zipf distibrution (as opposed to the uniform distribution) and provide bounds on the occupancy of a row (and thus the theatre) in each case.
[ { "version": "v1", "created": "Sat, 8 Mar 2014 17:23:59 GMT" } ]
2014-03-11T00:00:00
[ [ "Georgiou", "Konstantinos", "" ], [ "Kranakis", "Evangelos", "" ], [ "Krizanc", "Danny", "" ] ]
new_dataset
0.988909
1403.2000
Simon Kramer
Simon Kramer
A Galois-Connection between Myers-Briggs' Type Indicators and Szondi's Personality Profiles
null
null
null
null
cs.CE cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
We propose a computable Galois-connection between Myers-Briggs' Type Indicators (MBTIs), the most widely-used personality measure for non-psychiatric populations (based on C.G. Jung's personality types), and Szondi's personality profiles (SPPs), a less well-known but, as we show, finer personality measure for psychiatric as well as non-psychiatric populations (conceived as a unification of the depth psychology of S. Freud, C.G. Jung, and A. Adler). The practical significance of our result is that our Galois-connection provides a pair of computable, interpreting translations between the two personality spaces of MBTIs and SPPs: one concrete from MBTI-space to SPP-space (because SPPs are finer) and one abstract from SPP-space to MBTI-space (because MBTIs are coarser). Thus Myers-Briggs' and Szondi's personality-test results are mutually interpretable and inter-translatable, even automatically by computers.
[ { "version": "v1", "created": "Sat, 8 Mar 2014 19:25:36 GMT" } ]
2014-03-11T00:00:00
[ [ "Kramer", "Simon", "" ] ]
new_dataset
0.950274
1403.2031
Asha V
V.Asha, N.U.Bhajantri, P.Nagabhushan
Texture Defect Detection in Gradient Space
4 pages, ICFoCS-2011
null
null
ICFoCS-2011
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a machine vision algorithm for automatically detecting defects in patterned textures with the help of gradient space and its energy. Experiments on real fabric images with defects show that the proposed method can be used for automatic detection of fabric defects in textile industries.
[ { "version": "v1", "created": "Sun, 9 Mar 2014 06:53:13 GMT" } ]
2014-03-11T00:00:00
[ [ "Asha", "V.", "" ], [ "Bhajantri", "N. U.", "" ], [ "Nagabhushan", "P.", "" ] ]
new_dataset
0.99245
1403.2036
Mathew McLean
Mathew W. McLean
Straightforward Bibliography Management in R with the RefManageR Package
30 pages
null
null
null
cs.DL cs.MS stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work introduces the R package RefManageR, which provides tools for importing and working with bibliographic references. It extends the bibentry class in R in a number of useful ways, including providing R with previously unavailable support for BibLaTeX. BibLaTeX provides a superset of the functionality of BibTeX, including full Unicode support, no memory limitations, additional fields and entry types, and more sophisticated sorting of references. RefManageR provides functions for citing and generating a bibliography with hyperlinks for documents prepared with RMarkdown or RHTML. Existing .bib files can be read into R and converted from BibTeX to BibLaTeX and vice versa. References can also be imported via queries to NCBI's Entrez, Zotero libraries, Google Scholar, and CrossRef. Additionally, references can be created by reading PDFs stored on the user's machine with the help of Poppler. Entries stored in the reference manager can be easily searched by any field, by date ranges, and by various formats for name lists (author by last names, translator by full names, etc.). Entries can also be updated, combined, sorted, printed in a number of styles, and exported.
[ { "version": "v1", "created": "Sun, 9 Mar 2014 08:09:02 GMT" } ]
2014-03-11T00:00:00
[ [ "McLean", "Mathew W.", "" ] ]
new_dataset
0.999204
1403.2042
Niharika Sachdeva
Niharika Sachdeva and Ponnurangam Kumaraguru
Online Social Media and Police in India: Behavior, Perceptions, Challenges
null
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Police agencies across the globe are increasingly using Online Social Media (OSM) to acquire intelligence and connect with citizens. Developed nations have well thought of strategies to use OSM for policing. However, developing nations like India are exploring and evolving OSM as a policing solution. India, in recent years, experienced many events where rumors and fake content on OSM instigated communal violence. In contrast to traditional media (e.g. television and print media) used by Indian police departments, OSM offers velocity, variety, veracity and large volume of information. These introduce new challenges for police like platforms selection, secure usage strategy, developing trust, handling offensive comments, and security / privacy implication of information shared through OSM. Success of police initiatives on OSM to maintain law and order depends both on their understanding of OSM and citizen's acceptance / participation on these platforms. This study provides multidimensional understanding of behavior, perceptions, interactions, and expectation regarding policing through OSM. First, we examined recent updates from four different police pages- Delhi, Bangalore, Uttar Pradesh and Chennai to comprehend various dimensions of police interaction with citizens on OSM. Second, we conducted 20 interviews with IPS officers (Indian Police Service) and 17 interviews with citizens to understand decision rationales and expectation gaps between two stakeholders (police and citizens); this was followed up with 445 policemen surveys and 204 citizen surveys. We also present differences between police expectations of Indian and police departments in developed countries.
[ { "version": "v1", "created": "Sun, 9 Mar 2014 09:57:48 GMT" } ]
2014-03-11T00:00:00
[ [ "Sachdeva", "Niharika", "" ], [ "Kumaraguru", "Ponnurangam", "" ] ]
new_dataset
0.998283
1403.2111
Tsung-Yi Chen
Tsung-Yi Chen, Kasra Vakilinia, Dariush Divsalar, Richard D. Wesel
Protograph-Based Raptor-Like LDPC Codes
12 pages, 9 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a class of rate-compatible LDPC codes, called protograph-based Raptor-like (PBRL) codes. The construction is focused on binary codes for BI-AWGN channels. As with the Raptor codes, additional parity bits are produced by exclusive-OR operations on the precoded bits, providing extensive rate compatibility. Unlike Raptor codes, the structure of each additional parity bit in the protograph is explicitly designed through density evolution. The construction method provides low iterative decoding thresholds and the lifted codes result in excellent error rate performance for long-blocklength PBRL codes. For short-blocklength PBRL codes the protograph design and lifting must avoid undesired graphical structures such as trapping sets and absorbing sets while also seeking to minimize the density evolution threshold. Simulation results are shown in information block sizes of $k=192$, $16368$ and $16384$. Comparing at the same information block size of $k=16368$ bits, the PBRL codes outperform the best known standardized code, the AR4JA codes in the waterfall region. The PBRL codes also perform comparably to DVB-S2 codes even though the DVB-S2 codes use LDPC codes with longer blocklengths and are concatenated with outer BCH codes.
[ { "version": "v1", "created": "Sun, 9 Mar 2014 22:41:52 GMT" } ]
2014-03-11T00:00:00
[ [ "Chen", "Tsung-Yi", "" ], [ "Vakilinia", "Kasra", "" ], [ "Divsalar", "Dariush", "" ], [ "Wesel", "Richard D.", "" ] ]
new_dataset
0.995527
1403.2331
Guang Tan
Bo Xie, Guang Tan, Yunhuai Liu, Mingming Lu, Kongyang Chen, and Tian He
LIPS: A Light Intensity Based Positioning System For Indoor Environments
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents LIPS, a Light Intensity based Positioning System for indoor environments. The system uses off-the-shelf LED lamps as signal sources, and uses light sensors as signal receivers. The design is inspired by the observation that a light sensor has deterministic sensitivity to both distance and incident angle of light signal, an under-utilized feature of photodiodes now widely found on mobile devices. We develop a stable and accurate light intensity model to capture the phenomenon, based on which a new positioning principle, Multi-Face Light Positioning (MFLP), is established that uses three collocated sensors to uniquely determine the receiver's position, assuming merely a single source of light. We have implemented a prototype on both dedicated embedded systems and smartphones. Experimental results show average positioning accuracy within 0.4 meters across different environments, with high stability against interferences from obstacles, ambient lights, temperature variation, etc.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 07:55:41 GMT" } ]
2014-03-11T00:00:00
[ [ "Xie", "Bo", "" ], [ "Tan", "Guang", "" ], [ "Liu", "Yunhuai", "" ], [ "Lu", "Mingming", "" ], [ "Chen", "Kongyang", "" ], [ "He", "Tian", "" ] ]
new_dataset
0.999208
1309.1536
Weibing Deng
W.B. Deng, A.E. Allahverdyan, B. Li, Q.A. Wang
Rank-frequency relation for Chinese characters
To appear in European Physical Journal B (EPJ B), 2014 (22 pages, 7 figures)
Eur. Phys. J. B (2014) 87: 47
10.1140/epjb/e2014-40805-2
null
cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the Zipf's law for Chinese characters perfectly holds for sufficiently short texts (few thousand different characters). The scenario of its validity is similar to the Zipf's law for words in short English texts. For long Chinese texts (or for mixtures of short Chinese texts), rank-frequency relations for Chinese characters display a two-layer, hierarchic structure that combines a Zipfian power-law regime for frequent characters (first layer) with an exponential-like regime for less frequent characters (second layer). For these two layers we provide different (though related) theoretical descriptions that include the range of low-frequency characters (hapax legomena). The comparative analysis of rank-frequency relations for Chinese characters versus English words illustrates the extent to which the characters play for Chinese writers the same role as the words for those writing within alphabetical systems.
[ { "version": "v1", "created": "Fri, 6 Sep 2013 04:48:19 GMT" }, { "version": "v2", "created": "Sun, 26 Jan 2014 15:47:54 GMT" } ]
2014-03-10T00:00:00
[ [ "Deng", "W. B.", "" ], [ "Allahverdyan", "A. E.", "" ], [ "Li", "B.", "" ], [ "Wang", "Q. A.", "" ] ]
new_dataset
0.99766
1402.4515
Trent Rogers
Jacob Hendricks, Matthew J. Patitz, Trent A. Rogers, and Scott M. Summers
The Power of Duples (in Self-Assembly): It's Not So Hip To Be Square
null
null
null
null
cs.ET cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we define the Dupled abstract Tile Assembly Model (DaTAM), which is a slight extension to the abstract Tile Assembly Model (aTAM) that allows for not only the standard square tiles, but also "duple" tiles which are rectangles pre-formed by the joining of two square tiles. We show that the addition of duples allows for powerful behaviors of self-assembling systems at temperature 1, meaning systems which exclude the requirement of cooperative binding by tiles (i.e., the requirement that a tile must be able to bind to at least 2 tiles in an existing assembly if it is to attach). Cooperative binding is conjectured to be required in the standard aTAM for Turing universal computation and the efficient self-assembly of shapes, but we show that in the DaTAM these behaviors can in fact be exhibited at temperature 1. We then show that the DaTAM doesn't provide asymptotic improvements over the aTAM in its ability to efficiently build thin rectangles. Finally, we present a series of results which prove that the temperature-2 aTAM and temperature-1 DaTAM have mutually exclusive powers. That is, each is able to self-assemble shapes that the other can't, and each has systems which cannot be simulated by the other. Beyond being of purely theoretical interest, these results have practical motivation as duples have already proven to be useful in laboratory implementations of DNA-based tiles.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 22:23:27 GMT" }, { "version": "v2", "created": "Fri, 7 Mar 2014 00:52:37 GMT" } ]
2014-03-10T00:00:00
[ [ "Hendricks", "Jacob", "" ], [ "Patitz", "Matthew J.", "" ], [ "Rogers", "Trent A.", "" ], [ "Summers", "Scott M.", "" ] ]
new_dataset
0.998503
1403.1628
Francisco Soulignac
Martiniano Egu\'ia and Francisco J. Soulignac
Disimplicial arcs, transitive vertices, and disimplicial eliminations
17 pags., 3 figs
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we deal with the problems of finding the disimplicial arcs of a digraph and recognizing some interesting graph classes defined by their existence. A diclique of a digraph is a pair $V \to W$ of sets of vertices such that $v \to w$ is an arc for every $v \in V$ and $w \in W$. An arc $v \to w$ is disimplicial when $N^-(w) \to N^+(v)$ is a diclique. We show that the problem of finding the disimplicial arcs is equivalent, in terms of time and space complexity, to that of locating the transitive vertices. As a result, an efficient algorithm to find the bisimplicial edges of bipartite graphs is obtained. Then, we develop simple algorithms to build disimplicial elimination schemes, which can be used to generate bisimplicial elimination schemes for bipartite graphs. Finally, we study two classes related to perfect disimplicial elimination digraphs, namely weakly diclique irreducible digraphs and diclique irreducible digraphs. The former class is associated to finite posets, while the latter corresponds to dedekind complete finite posets.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 00:59:55 GMT" } ]
2014-03-10T00:00:00
[ [ "Eguía", "Martiniano", "" ], [ "Soulignac", "Francisco J.", "" ] ]
new_dataset
0.976409
1403.1687
Laurent Sifre
Laurent SIfre and St\'ephane Mallat
Rigid-Motion Scattering for Texture Classification
19 pages, submitted to International Journal of Computer Vision
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rigid-motion scattering computes adaptive invariants along translations and rotations, with a deep convolutional network. Convolutions are calculated on the rigid-motion group, with wavelets defined on the translation and rotation variables. It preserves joint rotation and translation information, while providing global invariants at any desired scale. Texture classification is studied, through the characterization of stationary processes from a single realization. State-of-the-art results are obtained on multiple texture data bases, with important rotation and scaling variabilities.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 08:57:12 GMT" } ]
2014-03-10T00:00:00
[ [ "SIfre", "Laurent", "" ], [ "Mallat", "Stéphane", "" ] ]
new_dataset
0.972602
1403.1706
Johannes K\"oster
Johannes K\"oster, Sven Rahmann
Massively parallel read mapping on GPUs with PEANUT
null
null
null
null
cs.DS cs.DC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present PEANUT (ParallEl AligNment UTility), a highly parallel GPU-based read mapper with several distinguishing features, including a novel q-gram index (called the q-group index) with small memory footprint built on-the-fly over the reads and the possibility to output both the best hits or all hits of a read. Designing the algorithm particularly for the GPU architecture, we were able to reach maximum core occupancy for several key steps. Our benchmarks show that PEANUT outperforms other state-of- the-art mappers in terms of speed and sensitivity. The software is available at http://peanut.readthedocs.org.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 10:10:07 GMT" } ]
2014-03-10T00:00:00
[ [ "Köster", "Johannes", "" ], [ "Rahmann", "Sven", "" ] ]
new_dataset
0.968947
1403.1727
Yukihiro Kamada
Yukihiro Kamada and Kiyonori Miyasaki
On the Sequence of State Configurations in the Garden of Eden
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous threshold element circuit networks are used to investigate the structure of neural networks. With these circuits, as the transition functions are threshold functions, it is necessary to consider the existence of sequences of state configurations that cannot be transitioned. In this study, we focus on all logical functions of four or fewer variables, and we discuss the periodic sequences and transient series that transition from all sequences of state configurations. Furthermore, by using the sequences of state configurations in the Garden of Eden, we show that it is easy to obtain functions that determine the operation of circuit networks.
[ { "version": "v1", "created": "Fri, 7 Mar 2014 11:49:23 GMT" } ]
2014-03-10T00:00:00
[ [ "Kamada", "Yukihiro", "" ], [ "Miyasaki", "Kiyonori", "" ] ]
new_dataset
0.999049
1403.1314
Roshan Ragel
R. G. Ragel, P. Herath and U. Senanayake
Authorship detection of SMS messages using unigrams
null
Industrial and Information Systems (ICIIS), 2013 8th IEEE International Conference on, pp. 387-392 , 17-20 Dec. 2013
10.1109/ICIInfS.2013.6732015
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SMS messaging is a popular media of communication. Because of its popularity and privacy, it could be used for many illegal purposes. Additionally, since they are part of the day to day life, SMSes can be used as evidence for many legal disputes. Since a cellular phone might be accessible to people close to the owner, it is important to establish the fact that the sender of the message is indeed the owner of the phone. For this purpose, the straight forward solutions seem to be the use of popular stylometric methods. However, in comparison with the data used for stylometry in the literature, SMSes have unusual characteristics making it hard or impossible to apply these methods in a conventional way. Our target is to come up with a method of authorship detection of SMS messages that could still give a usable accuracy. We argue that, considering the methods of author attribution, the best method that could be applied to SMS messages is an n-gram method. To prove our point, we checked two different methods of distribution comparison with varying number of training and testing data. We specifically try to compare how well our algorithms work under less amount of testing data and large number of candidate authors (which we believe to be the real world scenario) against controlled tests with less number of authors and selected SMSes with large number of words. To counter the lack of information in an SMS message, we propose the method of stacking together few SMSes.
[ { "version": "v1", "created": "Thu, 6 Mar 2014 01:33:55 GMT" } ]
2014-03-07T00:00:00
[ [ "Ragel", "R. G.", "" ], [ "Herath", "P.", "" ], [ "Senanayake", "U.", "" ] ]
new_dataset
0.98118
1403.1381
Daniel Zaragoza
Daniel Zaragoza
The TCP-modified Engset Model Revisited
arXiv admin note: substantial text overlap with arXiv:1401.8173
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit the TCP-modified Engset model proposed by Heyman et al. in [1]. The model deals with the superposition of a limited number of TCP connections alternating between file transmission and silence in a web-like fashion. We consider homogeneous sources only. (a) We take into account the effects of slow start and limited receiver window as well as small average file sizes. (b) We propose an alternative way for calculating the average connection rate in the superposition. (c) From the model we propose a way for calculating the queuing behavior; i.e., the overflow probability. (d) From this last point, we propose a new link buffer sizing rule. Comparison with extensive simulations shows that the average rate and duration, as well as, link utilization are accurately predicted for exponentially distributed file sizes. For longer tail distributions, the model remains accurate provided the receiver window is adjusted appropriately. The accuracy increases with increasing load. As concerns the queuing behavior, the same observation applies. Finally, the revisited model cannot be used to predict losses larger than about 1%. The model overestimates loss rates above that threshold.
[ { "version": "v1", "created": "Thu, 6 Mar 2014 09:27:47 GMT" } ]
2014-03-07T00:00:00
[ [ "Zaragoza", "Daniel", "" ] ]
new_dataset
0.963854
1310.5037
Riccardo Dondi
Niko Beerenwinkel, Stefano Beretta, Paola Bonizzoni, Riccardo Dondi, Yuri Pirola
Covering Pairs in Directed Acyclic Graphs
null
Proc. of Language and Automata Theory and Applications (LATA 2014), LNCS Vol. 8370, 2014, pp 126-137
10.1007/978-3-319-04921-2_10
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Minimum Path Cover problem on directed acyclic graphs (DAGs) is a classical problem that provides a clear and simple mathematical formulation for several applications in different areas and that has an efficient algorithmic solution. In this paper, we study the computational complexity of two constrained variants of Minimum Path Cover motivated by the recent introduction of next-generation sequencing technologies in bioinformatics. The first problem (MinPCRP), given a DAG and a set of pairs of vertices, asks for a minimum cardinality set of paths "covering" all the vertices such that both vertices of each pair belong to the same path. For this problem, we show that, while it is NP-hard to compute if there exists a solution consisting of at most three paths, it is possible to decide in polynomial time whether a solution consisting of at most two paths exists. The second problem (MaxRPSP), given a DAG and a set of pairs of vertices, asks for a path containing the maximum number of the given pairs of vertices. We show its NP-hardness and also its W[1]-hardness when parametrized by the number of covered pairs. On the positive side, we give a fixed-parameter algorithm when the parameter is the maximum overlapping degree, a natural parameter in the bioinformatics applications of the problem.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 14:33:06 GMT" } ]
2014-03-06T00:00:00
[ [ "Beerenwinkel", "Niko", "" ], [ "Beretta", "Stefano", "" ], [ "Bonizzoni", "Paola", "" ], [ "Dondi", "Riccardo", "" ], [ "Pirola", "Yuri", "" ] ]
new_dataset
0.998898
1403.1120
Carlos Luis Gonz\'alez-Valiente
C. L. Gonz\'alez-Valiente, Y. S\'anchez-Rodr\'iguez, Y. Lezcano-P\'erez
Estudio exploratorio sobre las competencias informacionales de los estudiantes de la Universidad de La Habana
http://www.redalyc.org/pdf/1814/181423798009.pdf
Ciencias de la Informaci\'on; 2012, 43 (2): 61-68
null
null
cs.CY
http://creativecommons.org/licenses/by/3.0/
The present article shows the results of a survey aimed at identifying the informational abilities of Havana University students. Several methods such as the survey, expert's interviews and content and document analysis are used. The questionnaire has been structured base on three basic variables: information search, information analysis and release and self evaluation elements. The identification of these abilities was a key element for guiding libraries in the development of actions focused on their communities.
[ { "version": "v1", "created": "Wed, 5 Mar 2014 13:34:55 GMT" } ]
2014-03-06T00:00:00
[ [ "González-Valiente", "C. L.", "" ], [ "Sánchez-Rodríguez", "Y.", "" ], [ "Lezcano-Pérez", "Y.", "" ] ]
new_dataset
0.985906
1403.1169
J. G. Wolff
J Gerard Wolff
A proof challenge: multiple alignment and information compression
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These notes pose a "proof challenge": a proof, or disproof, of the proposition that "For any given body of information, I, expressed as a one-dimensional sequence of atomic symbols, a multiple alignment concept, described in the document, provides a means of encoding all the redundancy that may exist in I. Aspects of the challenge are described.
[ { "version": "v1", "created": "Tue, 4 Mar 2014 17:00:19 GMT" } ]
2014-03-06T00:00:00
[ [ "Wolff", "J Gerard", "" ] ]
new_dataset
0.973682
1403.1218
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen and Katherine Morrison and Carolyn Troha
Cyclic Orbit Codes and Stabilizer Subfields
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic orbit codes are constant dimension subspace codes that arise as the orbit of a cyclic subgroup of the general linear group acting on subspaces in the given ambient space. With the aid of the largest subfield over which the given subspace is a vector space, the cardinality of the orbit code can be determined, and estimates for its distance can be found. This subfield is closely related to the stabilizer of the generating subspace. Finally, with a linkage construction larger, and longer, constant dimension codes can be derived from cyclic orbit codes without compromising the distance.
[ { "version": "v1", "created": "Wed, 5 Mar 2014 18:41:23 GMT" } ]
2014-03-06T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Morrison", "Katherine", "" ], [ "Troha", "Carolyn", "" ] ]
new_dataset
0.99961
1304.0357
Arkadiusz Stopczynski Mr.
Arkadiusz Stopczynski, Carsten Stahlhut, Jakob Eg Larsen, Michael Kai Petersen, and Lars Kai Hansen
The Smartphone Brain Scanner: A Mobile Real-time Neuroimaging System
null
null
10.1371/journal.pone.0086733
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Combining low cost wireless EEG sensors with smartphones offers novel opportunities for mobile brain imaging in an everyday context. We present a framework for building multi-platform, portable EEG applications with real-time 3D source reconstruction. The system - Smartphone Brain Scanner - combines an off-the-shelf neuroheadset or EEG cap with a smartphone or tablet, and as such represents the first fully mobile system for real-time 3D EEG imaging. We discuss the benefits and challenges of a fully portable system, including technical limitations as well as real-time reconstruction of 3D images of brain activity. We present examples of the brain activity captured in a simple experiment involving imagined finger tapping, showing that the acquired signal in a relevant brain region is similar to that obtained with standard EEG lab equipment. Although the quality of the signal in a mobile solution using a off-the-shelf consumer neuroheadset is lower compared to that obtained using high density standard EEG equipment, we propose that mobile application development may offset the disadvantages and provide completely new opportunities for neuroimaging in natural settings.
[ { "version": "v1", "created": "Mon, 1 Apr 2013 13:51:52 GMT" } ]
2014-03-05T00:00:00
[ [ "Stopczynski", "Arkadiusz", "" ], [ "Stahlhut", "Carsten", "" ], [ "Larsen", "Jakob Eg", "" ], [ "Petersen", "Michael Kai", "" ], [ "Hansen", "Lars Kai", "" ] ]
new_dataset
0.996617
1310.0070
Nariman Farsad Mr.
Nariman Farsad and Weisi Guo and Andrew W. Eckford
Table-Top Molecular Communication: Text Messages Through Chemical Signals
null
null
10.1371/journal.pone.0082935
null
cs.ET cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we describe the first modular, and programmable platform capable of transmitting a text message using chemical signalling -- a method also known as molecular communication. This form of communication is attractive for applications where conventional wireless systems perform poorly, from nanotechnology to urban health monitoring. Using examples, we demonstrate the use of our platform as a testbed for molecular communication, and illustrate the features of these communication systems using experiments. By providing a simple and inexpensive means of performing experiments, our system fills an important gap in the molecular communication literature, where much current work is done in simulation with simplified system models. A key finding in this paper is that these systems are often nonlinear in practice, whereas current simulations and analysis often assume that the system is linear. However, as we show in this work, despite the nonlinearity, reliable communication is still possible. Furthermore, this work motivates future studies on more realistic modelling, analysis, and design of theoretical models and algorithms for these systems.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 21:46:37 GMT" } ]
2014-03-05T00:00:00
[ [ "Farsad", "Nariman", "" ], [ "Guo", "Weisi", "" ], [ "Eckford", "Andrew W.", "" ] ]
new_dataset
0.998089
1402.7122
Anonymous Anonymous Mr.
Meghyn Bienvenu, Diego Calvanese, Magdalena Ortiz, Mantas Simkus
Nested Regular Path Queries in Description Logics
added Figure 1
null
null
null
cs.LO cs.AI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-way regular path queries (2RPQs) have received increased attention recently due to their ability to relate pairs of objects by flexibly navigating graph-structured data. They are present in property paths in SPARQL 1.1, the new standard RDF query language, and in the XML query language XPath. In line with XPath, we consider the extension of 2RPQs with nesting, which allows one to require that objects along a path satisfy complex conditions, in turn expressed through (nested) 2RPQs. We study the computational complexity of answering nested 2RPQs and conjunctions thereof (CN2RPQs) in the presence of domain knowledge expressed in description logics (DLs). We establish tight complexity bounds in data and combined complexity for a variety of DLs, ranging from lightweight DLs (DL-Lite, EL) up to highly expressive ones. Interestingly, we are able to show that adding nesting to (C)2RPQs does not affect worst-case data complexity of query answering for any of the considered DLs. However, in the case of lightweight DLs, adding nesting to 2RPQs leads to a surprising jump in combined complexity, from P-complete to Exp-complete.
[ { "version": "v1", "created": "Fri, 28 Feb 2014 02:52:57 GMT" }, { "version": "v2", "created": "Tue, 4 Mar 2014 18:18:00 GMT" } ]
2014-03-05T00:00:00
[ [ "Bienvenu", "Meghyn", "" ], [ "Calvanese", "Diego", "" ], [ "Ortiz", "Magdalena", "" ], [ "Simkus", "Mantas", "" ] ]
new_dataset
0.958107
1403.0802
Jianting Zhang
Jianting Zhang Simin You
Large-Scale Geospatial Processing on Multi-Core and Many-Core Processors: Evaluations on CPUs, GPUs and MICs
10 pages
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geospatial Processing, such as queries based on point-to-polyline shortest distance and point-in-polygon test, are fundamental to many scientific and engineering applications, including post-processing large-scale environmental and climate model outputs and analyzing traffic and travel patterns from massive GPS collections in transportation engineering and urban studies. Commodity parallel hardware, such as multi-core CPUs, many-core GPUs and Intel MIC accelerators, provide enormous computing power which can potentially achieve significant speedups on existing geospatial processing and open the opportunities for new applications. However, the realizable potential for geospatial processing on these new hardware devices is largely unknown due to the complexity in porting serial algorithms to diverse parallel hardware platforms. In this study, we aim at experimenting our data-parallel designs and implementations of point-to-polyline shortest distance computation (P2P) and point-in-polygon topological test (PIP) on different commodity hardware using real large-scale geospatial data, comparing their performance and discussing important factors that may significantly affect the performance. Our experiments have shown that, while GPUs can be several times faster than multi-core CPUs without utilizing the increasingly available SIMD computing power on Vector Processing Units (VPUs) that come with multi-core CPUs and MICs, multi-core CPUs and MICs can be several times faster than GPUs when VPUs are utilized. By adopting a Domain Specific Language (DSL) approach to exploiting the VPU computing power in geospatial processing, we are free from programming SIMD intrinsic functions directly which makes the new approach more effective, portable and scalable. Our designs, implementations and experiments can serve as case studies for parallel geospatial computing on modern commodity parallel hardware.
[ { "version": "v1", "created": "Tue, 4 Mar 2014 14:46:29 GMT" } ]
2014-03-05T00:00:00
[ [ "You", "Jianting Zhang Simin", "" ] ]
new_dataset
0.966625
1403.0804
Mehdi Samadieh
Mehdi Samadieh and Mohammad Gholamiy
Double Cylinder Cycle codes of Arbitrary Girth
e.g.: 10 pages, 5 figures
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A particular class of low-density parity-check codes referred to as cylinder-type BC-LDPC codes is proposed by Gholami and Eesmaeili. In this paper We represent a double cylinder-type parity-check matrix H by a graph called the block-structure graph of H and denoted by BSG(H). Using the properties of BSG(H) we propose some mother matrices with column-weight two such that the rate of corresponding cycle codes are greater tan cycle codes constructed by Gholami with same girth.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 11:57:56 GMT" } ]
2014-03-05T00:00:00
[ [ "Samadieh", "Mehdi", "" ], [ "Gholamiy", "Mohammad", "" ] ]
new_dataset
0.997773
1403.0930
Ahmed Alaa
Ahmed M. Alaa, Mahmoud H. Ismail, and Hazim Tawfik
Spectrum Sensing Via Reconfigurable Antennas: Fundamental Limits and Potential Gains
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel paradigm for spectrum sensing in cognitive radio networks that provides diversity and capacity benefits using a single antenna at the Secondary User (SU) receiver. The proposed scheme is based on a reconfigurable antenna: an antenna that is capable of altering its radiation characteristics by changing its geometric configuration. Each configuration is designated as an antenna mode or state and corresponds to a distinct channel realization. Based on an abstract model for the reconfigurable antenna, we tackle two different settings for the cognitive radio problem and present fundamental limits on the achievable diversity and throughput gains. First, we explore the (to cooperate or not to cooperate) tradeoff between the diversity and coding gains in conventional cooperative and noncooperative spectrum sensing schemes, showing that cooperation is not always beneficial. Based on this analysis, we propose two sensing schemes based on reconfigurable antennas that we term as state switching and state selection. It is shown that each of these schemes outperform both cooperative and non-cooperative spectrum sensing under a global energy constraint. Next, we study the (sensing-throughput) trade-off, and demonstrate that using reconfigurable antennas, the optimal sensing time is reduced allowing for a longer transmission time, and thus better throughput. Moreover, state selection can be applied to boost the capacity of SU transmission.
[ { "version": "v1", "created": "Tue, 4 Mar 2014 20:12:11 GMT" } ]
2014-03-05T00:00:00
[ [ "Alaa", "Ahmed M.", "" ], [ "Ismail", "Mahmoud H.", "" ], [ "Tawfik", "Hazim", "" ] ]
new_dataset
0.999664
1403.0052
Laurent Romary
Laurent Romary (IDSL, INRIA Saclay - Ile de France, CMB)
TBX goes TEI -- Implementing a TBX basic extension for the Text Encoding Initiative guidelines
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an attempt to customise the TEI (Text Encoding Initiative) guidelines in order to offer the possibility to incorporate TBX (TermBase eXchange) based terminological entries within any kind of TEI documents. After presenting the general historical, conceptual and technical contexts, we describe the various design choices we had to take while creating this customisation, which in turn have led to make various changes in the actual TBX serialisation. Keeping in mind the objective to provide the TEI guidelines with, again, an onomasiological model, we try to identify the best comprise in maintaining both the isomorphism with the existing TBX Basic standard and the characteristics of the TEI framework.
[ { "version": "v1", "created": "Sat, 1 Mar 2014 06:46:11 GMT" } ]
2014-03-04T00:00:00
[ [ "Romary", "Laurent", "", "IDSL, INRIA Saclay - Ile de France, CMB" ] ]
new_dataset
0.998459
1403.0062
Quentin Merigot
Pedro Machado Manh\~aes De Castro (CIn), Quentin M\'erigot (LJK), Boris Thibert (LJK)
Intersection of paraboloids and application to Minkowski-type problems
null
null
null
null
cs.CG math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we study the intersection (or union) of the convex hull of N confocal paraboloids (or ellipsoids) of revolution. This study is motivated by a Minkowski-type problem arising in geometric optics. We show that in each of the four cases, the combinatorics is given by the intersection of a power diagram with the unit sphere. We prove the complexity is O(N) for the intersection of paraboloids and Omega(N^2) for the intersection and the union of ellipsoids. We provide an algorithm to compute these intersections using the exact geometric computation paradigm. This algorithm is optimal in the case of the intersection of ellipsoids and is used to solve numerically the far-field reflector problem.
[ { "version": "v1", "created": "Sat, 1 Mar 2014 07:59:19 GMT" } ]
2014-03-04T00:00:00
[ [ "De Castro", "Pedro Machado Manhães", "", "CIn" ], [ "Mérigot", "Quentin", "", "LJK" ], [ "Thibert", "Boris", "", "LJK" ] ]
new_dataset
0.996306
1403.0335
Sanjaya Kumar Panda
Sanjaya Kumar Panda, Debasis Dash, Jitendra Kumar Rout
A Group based Time Quantum Round Robin Algorithm using Min-Max Spread Measure
7 pages, 16 figures
International Journal of Computer Applications 2013
10.5120/10667-5445
pxc3885445
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Round Robin (RR) Scheduling is the basis of time sharing environment. It is the combination of First Come First Served (FCFS) scheduling algorithm and preemption among processes. It is basically used in a time sharing operating system. It switches from one process to another process in a time interval. The time interval or Time Quantum (TQ) is fixed for all available processes. So, the larger process suffers from Context Switches (CS). To increase efficiency, we have to select different TQ for processes. The main objective of RR is to reduce the CS, maximize the utilization of CPU and minimize the turn around and the waiting time. In this paper, we have considered different TQ for a group of processes. It reduces CS as well as enhancing the performance of RR algorithm. TQ can be calculated using min-max dispersion measure. Our experimental analysis shows that Group Based Time Quantum (GBTQ) RR algorithm performs better than existing RR algorithm with respect to Average Turn Around Time (ATAT), Average Waiting Time (AWT) and CS.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 08:27:29 GMT" } ]
2014-03-04T00:00:00
[ [ "Panda", "Sanjaya Kumar", "" ], [ "Dash", "Debasis", "" ], [ "Rout", "Jitendra Kumar", "" ] ]
new_dataset
0.995103
1403.0338
Sanjaya Kumar Panda
Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda
SFTP : A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET
6 pages, 9 figures
International Journal of Computer Applications 2013
10.5120/10623-5343
pxc3885343
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 08:36:22 GMT" } ]
2014-03-04T00:00:00
[ [ "Rout", "Jitendra Kumar", "" ], [ "Bhoi", "Sourav Kumar", "" ], [ "Panda", "Sanjaya Kumar", "" ] ]
new_dataset
0.999522
1403.0531
Josiah Zayner Ph.D.
Josiah P. Zayner
We Tweet Like We Talk and Other Interesting Observations: An Analysis of English Communication Modalities
9 pages, 8 figures, 7 tables
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modalities of communication for human beings are gradually increasing in number with the advent of new forms of technology. Many human beings can readily transition between these different forms of communication with little or no effort, which brings about the question: How similar are these different communication modalities? To understand technology$\text{'}$s influence on English communication, four different corpora were analyzed and compared: Writing from Books using the 1-grams database from the Google Books project, Twitter, IRC Chat, and transcribed Talking. Multi-word confusion matrices revealed that Talking has the most similarity when compared to the other modes of communication, while 1-grams were the least similar form of communication analyzed. Based on the analysis of word usage, word usage frequency distributions, and word class usage, among other things, Talking is also the most similar to Twitter and IRC Chat. This suggests that communicating using Twitter and IRC Chat evolved from Talking rather than Writing. When we communicate online, even though we are writing, we do not Tweet or Chat how we write books; we Tweet and Chat how we Speak. Nonfiction and Fiction writing were clearly differentiable from our analysis with Twitter and Chat being much more similar to Fiction than Nonfiction writing. These hypotheses were then tested using author and journalists Cory Doctorow. Mr. Doctorow$\text{'}$s Writing, Twitter usage, and Talking were all found to have very similar vocabulary usage patterns as the amalgamized populations, as long as the writing was Fiction. However, Mr. Doctorow$\text{'}$s Nonfiction writing is different from 1-grams and other collected Nonfiction writings. This data could perhaps be used to create more entertaining works of Nonfiction.
[ { "version": "v1", "created": "Mon, 3 Mar 2014 19:27:23 GMT" } ]
2014-03-04T00:00:00
[ [ "Zayner", "Josiah P.", "" ] ]
new_dataset
0.997781
1309.5671
Nicolas Schiper
Robbert Van Renesse, Nicolas Schiper, and Fred B. Schneider
Vive la Diff\'erence: Paxos vs. Viewstamped Replication vs. Zab
16 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paxos, Viewstamped Replication, and Zab are replication protocols that ensure high-availability in asynchronous environments with crash failures. Various claims have been made about similarities and differences between these protocols. But how does one determine whether two protocols are the same, and if not, how significant the differences are? We propose to address these questions using refinement mappings, where protocols are expressed as succinct specifications that are progressively refined to executable implementations. Doing so enables a principled understanding of the correctness of the different design decisions that went into implementing the various protocols. Additionally, it allowed us to identify key differences that have a significant impact on performance.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 00:31:36 GMT" }, { "version": "v2", "created": "Mon, 30 Sep 2013 20:08:06 GMT" }, { "version": "v3", "created": "Thu, 27 Feb 2014 23:40:26 GMT" } ]
2014-03-03T00:00:00
[ [ "Van Renesse", "Robbert", "" ], [ "Schiper", "Nicolas", "" ], [ "Schneider", "Fred B.", "" ] ]
new_dataset
0.998554
1311.0680
Bartosz Hawelka
Bartosz Hawelka, Izabela Sitko, Euro Beinat, Stanislav Sobolevsky, Pavlos Kazakopoulos and Carlo Ratti
Geo-located Twitter as the proxy for global mobility patterns
17 pages, 13 figures
null
10.1080/15230406.2014.890072
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the advent of a pervasive presence of location sharing services researchers gained an unprecedented access to the direct records of human activity in space and time. This paper analyses geo-located Twitter messages in order to uncover global patterns of human mobility. Based on a dataset of almost a billion tweets recorded in 2012 we estimate volumes of international travelers in respect to their country of residence. We examine mobility profiles of different nations looking at the characteristics such as mobility rate, radius of gyration, diversity of destinations and a balance of the inflows and outflows. The temporal patterns disclose the universal seasons of increased international mobility and the peculiar national nature of overseen travels. Our analysis of the community structure of the Twitter mobility network, obtained with the iterative network partitioning, reveals spatially cohesive regions that follow the regional division of the world. Finally, we validate our result with the global tourism statistics and mobility models provided by other authors, and argue that Twitter is a viable source to understand and quantify global mobility patterns.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 12:46:08 GMT" }, { "version": "v2", "created": "Sat, 28 Dec 2013 13:40:30 GMT" } ]
2014-03-03T00:00:00
[ [ "Hawelka", "Bartosz", "" ], [ "Sitko", "Izabela", "" ], [ "Beinat", "Euro", "" ], [ "Sobolevsky", "Stanislav", "" ], [ "Kazakopoulos", "Pavlos", "" ], [ "Ratti", "Carlo", "" ] ]
new_dataset
0.995114
1402.7035
Patrick Butler
Naren Ramakrishnan, Patrick Butler, Sathappan Muthiah, Nathan Self, Rupinder Khandpur, Parang Saraf, Wei Wang, Jose Cadena, Anil Vullikanti, Gizem Korkmaz, Chris Kuhlman, Achla Marathe, Liang Zhao, Ting Hua, Feng Chen, Chang-Tien Lu, Bert Huang, Aravind Srinivasan, Khoa Trinh, Lise Getoor, Graham Katz, Andy Doyle, Chris Ackermann, Ilya Zavorin, Jim Ford, Kristen Summers, Youssef Fayed, Jaime Arredondo, Dipak Gupta, David Mares
'Beating the news' with EMBERS: Forecasting Civil Unrest using Open Source Indicators
null
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the design, implementation, and evaluation of EMBERS, an automated, 24x7 continuous system for forecasting civil unrest across 10 countries of Latin America using open source indicators such as tweets, news sources, blogs, economic indicators, and other data sources. Unlike retrospective studies, EMBERS has been making forecasts into the future since Nov 2012 which have been (and continue to be) evaluated by an independent T&E team (MITRE). Of note, EMBERS has successfully forecast the uptick and downtick of incidents during the June 2013 protests in Brazil. We outline the system architecture of EMBERS, individual models that leverage specific data sources, and a fusion and suppression engine that supports trading off specific evaluation criteria. EMBERS also provides an audit trail interface that enables the investigation of why specific predictions were made along with the data utilized for forecasting. Through numerous evaluations, we demonstrate the superiority of EMBERS over baserate methods and its capability to forecast significant societal happenings.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 19:40:02 GMT" }, { "version": "v2", "created": "Fri, 28 Feb 2014 02:25:57 GMT" } ]
2014-03-03T00:00:00
[ [ "Ramakrishnan", "Naren", "" ], [ "Butler", "Patrick", "" ], [ "Muthiah", "Sathappan", "" ], [ "Self", "Nathan", "" ], [ "Khandpur", "Rupinder", "" ], [ "Saraf", "Parang", "" ], [ "Wang", "Wei", "" ], [ "Cadena", "Jose", "" ], [ "Vullikanti", "Anil", "" ], [ "Korkmaz", "Gizem", "" ], [ "Kuhlman", "Chris", "" ], [ "Marathe", "Achla", "" ], [ "Zhao", "Liang", "" ], [ "Hua", "Ting", "" ], [ "Chen", "Feng", "" ], [ "Lu", "Chang-Tien", "" ], [ "Huang", "Bert", "" ], [ "Srinivasan", "Aravind", "" ], [ "Trinh", "Khoa", "" ], [ "Getoor", "Lise", "" ], [ "Katz", "Graham", "" ], [ "Doyle", "Andy", "" ], [ "Ackermann", "Chris", "" ], [ "Zavorin", "Ilya", "" ], [ "Ford", "Jim", "" ], [ "Summers", "Kristen", "" ], [ "Fayed", "Youssef", "" ], [ "Arredondo", "Jaime", "" ], [ "Gupta", "Dipak", "" ], [ "Mares", "David", "" ] ]
new_dataset
0.992709
1402.7224
Nela Lekic
Alexander Grigoriev, Steven Kelk, Nela Lekic
On low treewidth graphs and supertrees
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compatibility of unrooted phylogenetic trees is a well studied problem in phylogenetics. It asks to determine whether for a set of k input trees there exists a larger tree (called a supertree) that contains the topologies of all k input trees. When any such supertree exists we call the instance compatible and otherwise incompatible. It is known that the problem is NP-hard and FPT, although a constructive FPT algorithm is not known. It has been shown that whenever the treewidth of an auxiliary structure known as the display graph is strictly larger than the number of input trees, the instance is incompatible. Here we show that whenever the treewidth of the display graph is at most 2, the instance is compatible. Furthermore, we give a polynomial-time algorithm to construct a supertree in this case. Finally, we demonstrate both compatible and incompatible instances that have display graphs with treewidth 3, highlighting that the treewidth of the display graph is (on its own) not sufficient to determine compatibility.
[ { "version": "v1", "created": "Fri, 28 Feb 2014 12:37:40 GMT" } ]
2014-03-03T00:00:00
[ [ "Grigoriev", "Alexander", "" ], [ "Kelk", "Steven", "" ], [ "Lekic", "Nela", "" ] ]
new_dataset
0.999457
1402.7228
Henning Hasemann
Henning Hasemann, Alexander Kr\"oller, Max Pagel
The Wiselib TupleStore: A Modular RDF Database for the Internet of Things
null
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet of Things movement provides self-configuring and universally interoperable devices. While such devices are often built with a specific application in mind, they often turn out to be useful in other contexts as well. We claim that by describing the devices' knowledge in a universal way, IoT devices can become first-class citizens in the Internet. They can then exchange data between heterogeneous hardware, different applications and large data sources on the Web. Our key idea --- in contrast to most existing approaches --- is to not restrict the domain of knowledge that can be expressed on the device in any way and, at the same time, allow this knowledge to be machine-understandable and linkable across different locations. We propose an architecture that allows to connect embedded devices to the Semantic Web by expressing their knowledge in the Resource Description Framework (RDF). We present the Wiselib TupleStore, a modular embedded database tailored specifically for the storage of RDF. The Wiselib TupleStore is portable to many platforms including Contiki and TinyOS and allows a variety of trade-offs, making it able to scale to a large variety of hardware scenarios. We discuss the applicability of RDF to heterogeneous resource-constrained devices and compare our system to the existing embedded tuple stores Antelope and TeenyLIME.
[ { "version": "v1", "created": "Fri, 28 Feb 2014 12:52:47 GMT" } ]
2014-03-03T00:00:00
[ [ "Hasemann", "Henning", "" ], [ "Kröller", "Alexander", "" ], [ "Pagel", "Max", "" ] ]
new_dataset
0.977602
1303.7127
Alexios Balatsoukas-Stimming
A. Balatsoukas-Stimming, A. J. Raymond, W. J. Gross, and A. Burg
Hardware Architecture for List SC Decoding of Polar Codes
null
null
null
null
cs.IT cs.AR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a hardware architecture and algorithmic improvements for list SC decoding of polar codes. More specifically, we show how to completely avoid copying of the likelihoods, which is algorithmically the most cumbersome part of list SC decoding. The hardware architecture was synthesized for a blocklength of N = 1024 bits and list sizes L = 2, 4 using a UMC 90nm VLSI technology. The resulting decoder can achieve a coded throughput of 181 Mbps at a frequency of 459 MHz.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 14:04:54 GMT" }, { "version": "v2", "created": "Fri, 14 Jun 2013 14:51:17 GMT" }, { "version": "v3", "created": "Thu, 27 Feb 2014 15:53:10 GMT" } ]
2014-02-28T00:00:00
[ [ "Balatsoukas-Stimming", "A.", "" ], [ "Raymond", "A. J.", "" ], [ "Gross", "W. J.", "" ], [ "Burg", "A.", "" ] ]
new_dataset
0.98992
1312.3245
Hien Thi Thu Truong
Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya
The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators
null
null
10.1145/2566486.2568046
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is little information from independent sources in the public domain about mobile malware infection rates. The only previous independent estimate (0.0009%) [12], was based on indirect measurements obtained from domain name resolution traces. In this paper, we present the first independent study of malware infection rates and associated risk factors using data collected directly from over 55,000 Android devices. We find that the malware infection rates in Android devices estimated using two malware datasets (0.28% and 0.26%), though small, are significantly higher than the previous independent estimate. Using our datasets, we investigate how indicators extracted inexpensively from the devices correlate with malware infection. Based on the hypothesis that some application stores have a greater density of malicious applications and that advertising within applications and cross-promotional deals may act as infection vectors, we investigate whether the set of applications used on a device can serve as an indicator for infection of that device. Our analysis indicates that this alone is not an accurate indicator for pinpointing infection. However, it is a very inexpensive but surprisingly useful way for significantly narrowing down the pool of devices on which expensive monitoring and analysis mechanisms must be deployed. Using our two malware datasets we show that this indicator performs 4.8 and 4.6 times (respectively) better at identifying infected devices than the baseline of random checks. Such indicators can be used, for example, in the search for new or previously undetected malware. It is therefore a technique that can complement standard malware scanning by anti-malware tools. Our analysis also demonstrates a marginally significant difference in battery use between infected and clean devices.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 17:06:16 GMT" }, { "version": "v2", "created": "Thu, 27 Feb 2014 16:58:12 GMT" } ]
2014-02-28T00:00:00
[ [ "Truong", "Hien Thi Thu", "" ], [ "Lagerspetz", "Eemil", "" ], [ "Nurmi", "Petteri", "" ], [ "Oliner", "Adam J.", "" ], [ "Tarkoma", "Sasu", "" ], [ "Asokan", "N.", "" ], [ "Bhattacharya", "Sourav", "" ] ]
new_dataset
0.993168
1402.6783
EPTCS
Yu-Fang Chen (Academia Sinica, Taiwan), Bow-Yaw Wang (Academia Sinica, Taiwan), Di-De Yen (Academia Sinica, Taiwan)
A Finite Exact Representation of Register Automata Configurations
In Proceedings INFINITY 2013, arXiv:1402.6610
EPTCS 140, 2014, pp. 16-34
10.4204/EPTCS.140.2
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A register automaton is a finite automaton with finitely many registers ranging from an infinite alphabet. Since the valuations of registers are infinite, there are infinitely many configurations. We describe a technique to classify infinite register automata configurations into finitely many exact representative configurations. Using the finitary representation, we give an algorithm solving the reachability problem for register automata. We moreover define a computation tree logic for register automata and solve its model checking problem.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 03:44:51 GMT" } ]
2014-02-28T00:00:00
[ [ "Chen", "Yu-Fang", "", "Academia Sinica, Taiwan" ], [ "Wang", "Bow-Yaw", "", "Academia Sinica,\n Taiwan" ], [ "Yen", "Di-De", "", "Academia Sinica, Taiwan" ] ]
new_dataset
0.967248
1402.6888
Adam Erskine
Adam Erskine, J Michael Herrmann
CriPS: Critical Dynamics in Particle Swarm Optimization
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Particle Swarm Optimisation (PSO) makes use of a dynamical system for solving a search task. Instead of adding search biases in order to improve performance in certain problems, we aim to remove algorithm-induced scales by controlling the swarm with a mechanism that is scale-free except possibly for a suppression of scales beyond the system size. In this way a very promising performance is achieved due to the balance of large-scale exploration and local search. The resulting algorithm shows evidence for self-organised criticality, brought about via the intrinsic dynamics of the swarm as it interacts with the objective function, rather than being explicitly specified. The Critical Particle Swarm (CriPS) can be easily combined with many existing extensions such as chaotic exploration, additional force terms or non-trivial topologies.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 12:35:27 GMT" } ]
2014-02-28T00:00:00
[ [ "Erskine", "Adam", "" ], [ "Herrmann", "J Michael", "" ] ]
new_dataset
0.96505
1402.6942
Jakub Nalepa
Jakub Nalepa and Zbigniew J. Czech
A Parallel Memetic Algorithm to Solve the Vehicle Routing Problem with Time Windows
15 pages
Studia Informatica 33 (1), pp 91-106 (2012)
null
null
cs.DC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a parallel memetic algorithm for solving the vehicle routing problem with time windows (VRPTW). The VRPTW is a well-known NP-hard discrete optimization problem with two objectives. The main objective is to minimize the number of vehicles serving customers scattered on the map, and the second one is to minimize the total distance traveled by the vehicles. Here, the fleet size is minimized in the first phase of the proposed method using the parallel heuristic algorithm (PHA), and the traveled distance is minimized in the second phase by the parallel memetic algorithm (PMA). In both parallel algorithms, the parallel components co-operate periodically in order to exchange the best solutions found so far. An extensive experimental study performed on the Gehring and Homberger's benchmark proves the high convergence capabilities and robustness of both PHA and PMA. Also, we present the speedup analysis of the PMA.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 15:41:05 GMT" } ]
2014-02-28T00:00:00
[ [ "Nalepa", "Jakub", "" ], [ "Czech", "Zbigniew J.", "" ] ]
new_dataset
0.997708
1402.6973
Michael Markovitch
Michael Markovitch, Gabriel Scalosub
Bounded Delay Scheduling with Packet Dependencies
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common situation occurring when dealing with multimedia traffic is having large data frames fragmented into smaller IP packets, and having these packets sent independently through the network. For real-time multimedia traffic, dropping even few packets of a frame may render the entire frame useless. Such traffic is usually modeled as having {\em inter-packet dependencies}. We study the problem of scheduling traffic with such dependencies, where each packet has a deadline by which it should arrive at its destination. Such deadlines are common for real-time multimedia applications, and are derived from stringent delay constraints posed by the application. The figure of merit in such environments is maximizing the system's {\em goodput}, namely, the number of frames successfully delivered. We study online algorithms for the problem of maximizing goodput of delay-bounded traffic with inter-packet dependencies, and use competitive analysis to evaluate their performance. We present competitive algorithms for the problem, as well as matching lower bounds that are tight up to a constant factor. We further present the results of a simulation study which further validates our algorithmic approach and shows that insights arising from our analysis are indeed manifested in practice.
[ { "version": "v1", "created": "Thu, 27 Feb 2014 17:02:30 GMT" } ]
2014-02-28T00:00:00
[ [ "Markovitch", "Michael", "" ], [ "Scalosub", "Gabriel", "" ] ]
new_dataset
0.998918
1402.7019
Ossi Kaltiokallio J.
Ossi Kaltiokallio, H\"useyin Yi\u{g}itler, and Riku J\"antti
A Three-State Received Signal Strength Model for Device-free Localization
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The indoor radio propagation channel is typically modeled as a two-state time-variant process where one of the states represents the channel when the environment is static, whereas the other state characterizes the medium when it is altered by people. In this paper, the aforementioned process is augmented with an additional state. It is shown that the changes in received signal strength are dictated by: i) electronic noise, when a person is not present in the monitored area; ii) reflection, when a person is moving in the close vicinity of the line-of-sight; iii) shadowing, when a person is obstructing the line-of-sight component of the transmitter-receiver pair. Statistical and spatial models for the three states are derived and the models are empirically validated. Based on the models, a simplistic device-free localization application is designed which aims to: first, estimate the temporal state of the channel using a hidden Markov model; second, track a person using a particle filter. The results suggest that the tracking accuracy is enhanced by at least 65% while the link's sensitivity region is increased by 100% or more with respect to empirical models presented in earlier works.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 18:31:56 GMT" } ]
2014-02-28T00:00:00
[ [ "Kaltiokallio", "Ossi", "" ], [ "Yiğitler", "Hüseyin", "" ], [ "Jäntti", "Riku", "" ] ]
new_dataset
0.997475
1306.6584
Alberto Mart\'in-Mart\'in
Daniel Torres-Salinas, Alberto Mart\'in-Mart\'in, Enrique Fuente-Guti\'errez
An introduction to the coverage of the Data Citation Index (Thomson-Reuters): disciplines, document types and repositories
null
Rev. Esp. Doc. Cient., 37(1), enero-marzo 2014, e036. ISSN-L: 0210-0614
10.3989/redc.2014.1.1114
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past years, the movement of data sharing has been enjoying great popularity. Within this context, Thomson Reuters launched at the end of 2012 a new product inside the Web of Knowledge family: the Data Citation Index. The aim of this tool is to enable discovery and access, from a single place, to data from a variety of data repositories from different subject areas and from around the world. In this short note we present some preliminary results from the analysis of the Data Citation Index. Specifically, we address the following issues: discipline coverage, data types present in the database, and repositories that were included at the time of the study
[ { "version": "v1", "created": "Thu, 27 Jun 2013 17:43:33 GMT" }, { "version": "v2", "created": "Wed, 26 Feb 2014 19:51:38 GMT" } ]
2014-02-27T00:00:00
[ [ "Torres-Salinas", "Daniel", "" ], [ "Martín-Martín", "Alberto", "" ], [ "Fuente-Gutiérrez", "Enrique", "" ] ]
new_dataset
0.9916
1107.1630
Anke van Zuylen
Jiawei Qian, Frans Schalekamp, David P. Williamson, Anke van Zuylen
On the Integrality Gap of the Subtour LP for the 1,2-TSP
Changes wrt previous version: upper bound on integrality gap improved to 5/4 (using the same techniques as in the previous version)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the integrality gap of the subtour LP relaxation for the traveling salesman problem in the special case when all edge costs are either 1 or 2. For the general case of symmetric costs that obey triangle inequality, a famous conjecture is that the integrality gap is 4/3. Little progress towards resolving this conjecture has been made in thirty years. We conjecture that when all edge costs $c_{ij}\in \{1,2\}$, the integrality gap is $10/9$. We show that this conjecture is true when the optimal subtour LP solution has a certain structure. Under a weaker assumption, which is an analog of a recent conjecture by Schalekamp, Williamson and van Zuylen, we show that the integrality gap is at most $7/6$. When we do not make any assumptions on the structure of the optimal subtour LP solution, we can show that integrality gap is at most $5/4$; this is the first bound on the integrality gap of the subtour LP strictly less than $4/3$ known for an interesting special case of the TSP. We show computationally that the integrality gap is at most $10/9$ for all instances with at most 12 cities.
[ { "version": "v1", "created": "Fri, 8 Jul 2011 13:39:09 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2012 14:13:11 GMT" }, { "version": "v3", "created": "Tue, 25 Feb 2014 03:48:15 GMT" } ]
2014-02-26T00:00:00
[ [ "Qian", "Jiawei", "" ], [ "Schalekamp", "Frans", "" ], [ "Williamson", "David P.", "" ], [ "van Zuylen", "Anke", "" ] ]
new_dataset
0.961046
1402.6013
Joaquin Vanschoren
Joaquin Vanschoren and Mikio L. Braun and Cheng Soon Ong
Open science in machine learning
null
null
null
null
cs.LG cs.DL
http://creativecommons.org/licenses/by/3.0/
We present OpenML and mldata, open science platforms that provides easy access to machine learning data, software and results to encourage further study and application. They go beyond the more traditional repositories for data sets and software packages in that they allow researchers to also easily share the results they obtained in experiments and to compare their solutions with those of others.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 23:12:42 GMT" } ]
2014-02-26T00:00:00
[ [ "Vanschoren", "Joaquin", "" ], [ "Braun", "Mikio L.", "" ], [ "Ong", "Cheng Soon", "" ] ]
new_dataset
0.983635
1402.6050
Saurabh Ariyan
Saurabh Kumar Ariyan, Eshant Bagela, Akanksha Priyadarshin
Abiot: A Low cost agile sonic pest control tricopter
4 pages; workshop paper
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we introduce the concept of an agile electronic pest control intelligent device for commercial usage and we have evaluated its performance in comparison with other existing similar technologies. The frequency and intensities are changed with respect to the target pest however human behavior has been found to be inert with their exposure. The unit has been tested in lab conditions as well as field testing done have given encouraging results. The device can be a standalone unit and hence work for small scale viz. kitchen garden on the other hand multiple devices acting in coordination with each other give the desired output on a larger scale.
[ { "version": "v1", "created": "Tue, 25 Feb 2014 04:27:53 GMT" } ]
2014-02-26T00:00:00
[ [ "Ariyan", "Saurabh Kumar", "" ], [ "Bagela", "Eshant", "" ], [ "Priyadarshin", "Akanksha", "" ] ]
new_dataset
0.999093
1402.6282
Ayad Ghany Ismaeel
Ayad Ghany Ismaeel, Nur Gaylan Hamead
Mobile GIS and Open Source Platform Based on Android: Technology for System Pregnant Women
8 pages, 16 figures, 1 Table
International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014, Pages 847-854
10.14299/000000
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The statistic of World Health Organization shows at one year about 287000 women died most of them during and following pregnancy and childbirth in Africa and south Asia. This paper suggests system for serving pregnant women using open source based on Android technology, the proposed system works based on mobile GIS to select closest care centre or hospital maternity on Google map for the pregnant woman, which completed an online registration by sending SMS via GPRS network (or internet) contains her name and phone number and region (Longitude and Latitude) and other required information the server will save the information in server database then find the closest care centre and call her for first review at the selected care centre, the proposed system allowed the pregnant women from her location (home, market, etc) can send a help request in emergency cases (via SMS by click one button) contains the ID for this pregnant woman, and her coordinates (Longitude and Latitude) via GPRS network, then the server will locate the pregnant on Google map and retrieve the pregnant information from the database. This information will be used by the server to send succoring to pregnant woman at her location and at the same time notify the nearest hospital and moreover, the server will send SMS over IP to inform her husband and the hospital doctors. Implement and applied this proposed system of pregnant women shows more effective cost than other systems because it works in economic mode (SMS), and the services of proposed system are flexible (open source platform) as well as rapidly (mobile GIS based on Android) achieved locally registration, succoring in emergency cases, change the review date of pregnant woman, addition to different types of advising according to pregnancy. Index Terms: Build-in GPS; GPRS; Mobile GIS; SoIP; Open Source; Google Maps API ; Android Technology
[ { "version": "v1", "created": "Tue, 25 Feb 2014 19:14:44 GMT" } ]
2014-02-26T00:00:00
[ [ "Ismaeel", "Ayad Ghany", "" ], [ "Hamead", "Nur Gaylan", "" ] ]
new_dataset
0.998703
1308.3603
Renaud Lambiotte
Vsevolod Salnikov, Daniel Schien, Hyejin Youn, Renaud Lambiotte and Michael T. Gastner
The geography and carbon footprint of mobile phone use in Cote d'Ivoire
23 pages, 8 figures, 1 table
EPJ Data Science 2014, 3:3
10.1140/epjds21
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The newly released Orange D4D mobile phone data base provides new insights into the use of mobile technology in a developing country. Here we perform a series of spatial data analyses that reveal important geographic aspects of mobile phone use in Cote d'Ivoire. We first map the locations of base stations with respect to the population distribution and the number and duration of calls at each base station. On this basis, we estimate the energy consumed by the mobile phone network. Finally, we perform an analysis of inter-city mobility, and identify high-traffic roads in the country.
[ { "version": "v1", "created": "Fri, 16 Aug 2013 11:14:57 GMT" }, { "version": "v2", "created": "Mon, 24 Feb 2014 13:48:27 GMT" } ]
2014-02-25T00:00:00
[ [ "Salnikov", "Vsevolod", "" ], [ "Schien", "Daniel", "" ], [ "Youn", "Hyejin", "" ], [ "Lambiotte", "Renaud", "" ], [ "Gastner", "Michael T.", "" ] ]
new_dataset
0.999672
1402.5477
Huazi Zhang
Huazi Zhang, Zhaoyang Zhang, Huaiyu Dai
Mobile Conductance and Gossip-based Information Spreading in Mobile Networks
arXiv admin note: substantial text overlap with arXiv:1202.2586
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a general analytical framework for information spreading in mobile networks based on a new performance metric, mobile conductance, which allows us to separate the details of mobility models from the study of mobile spreading time. We derive a general result for the information spreading time in mobile networks in terms of this new metric, and instantiate it through several popular mobility models. Large scale network simulation is conducted to verify our analysis.
[ { "version": "v1", "created": "Sat, 22 Feb 2014 04:35:09 GMT" } ]
2014-02-25T00:00:00
[ [ "Zhang", "Huazi", "" ], [ "Zhang", "Zhaoyang", "" ], [ "Dai", "Huaiyu", "" ] ]
new_dataset
0.978789
1402.5592
Shamim Ripon
Shamim Ripon, Mohammad Salah Uddin and Aoyan Barua
Web Service Composition - BPEL vs cCSP Process Algebra
6 pages, 4 figures, Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on
null
10.1109/ACSAT.2012.47
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web services technology provides a platform on which we can develop distributed services. The interoperability among these services is achieved by various standard protocols. In recent years, several researches suggested that process algebras provide a satisfactory assistance to the whole process of web services development. Business transactions, on the other hand, involve the coordination and interaction between multiple partners. With the emergence of web services, business transactions are conducted using these services. The coordination among the business processes is crucial, so is the handling of faults that can arise at any stage of a transaction. BPEL models the behavior of business process interaction by providing a XML based grammar to describe the control logic required to coordinate the web services participating in a process flow. However BPEL lacks a proper formal description where the composition of business processes cannot be formally verified. Process algebra, on the other hand, facilitates a formal foundation for rigorous verification of the composition. This paper presents a comparison of web service composition between BPEL and process algebra, cCSP.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 09:55:51 GMT" } ]
2014-02-25T00:00:00
[ [ "Ripon", "Shamim", "" ], [ "Uddin", "Mohammad Salah", "" ], [ "Barua", "Aoyan", "" ] ]
new_dataset
0.993886
1402.5639
Zhen Kan
Zhen Kan, Justin Klotz, Eduardo L. Pasiliao Jr, John M. Shea, Warren E. Dixon
Decentralized Rendezvous of Nonholonomic Robots with Sensing and Connectivity Constraints
9 pages, 5 figures, submitted to Automatica
null
null
null
cs.SY cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A group of wheeled robots with nonholonomic constraints is considered to rendezvous at a common specified setpoint with a desired orientation while maintaining network connectivity and ensuring collision avoidance within the robots. Given communication and sensing constraints for each robot, only a subset of the robots are aware or informed of the global destination, and the remaining robots must move within the network connectivity constraint so that the informed robots can guide the group to the goal. The mobile robots are also required to avoid collisions with each other outside a neighborhood of the common rendezvous point. To achieve the rendezvous control objective, decentralized time-varying controllers are developed based on a navigation function framework to steer the robots to perform rendezvous while preserving network connectivity and ensuring collision avoidance. Only local sensing feedback, which includes position feedback from immediate neighbors and absolute orientation measurement, is used to navigate the robots and enables radio silence during navigation. Simulation results demonstrate the performance of the developed approach.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 17:24:48 GMT" } ]
2014-02-25T00:00:00
[ [ "Kan", "Zhen", "" ], [ "Klotz", "Justin", "" ], [ "Pasiliao", "Eduardo L.", "Jr" ], [ "Shea", "John M.", "" ], [ "Dixon", "Warren E.", "" ] ]
new_dataset
0.991905
1402.5644
Zhen Kan
Zhen Kan, Justin Klotz, Eduardo L. Pasiliao Jr, Warren E. Dixon
Containment Control for a Social Network with State-Dependent Connectivity
9 pages, 2 figures, submitted to Automatica
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social interactions influence our thoughts, opinions and actions. In this paper, social interactions are studied within a group of individuals composed of influential social leaders and followers. Each person is assumed to maintain a social state, which can be an emotional state or an opinion. Followers update their social states based on the states of local neighbors, while social leaders maintain a constant desired state. Social interactions are modeled as a general directed graph where each directed edge represents an influence from one person to another. Motivated by the non-local property of fractional-order systems, the social response of individuals in the network are modeled by fractional-order dynamics whose states depend on influences from local neighbors and past experiences. A decentralized influence method is then developed to maintain existing social influence between individuals (i.e., without isolating peers in the group) and to influence the social group to a common desired state (i.e., within a convex hull spanned by social leaders). Mittag-Leffler stability methods are used to prove asymptotic stability of the networked fractional-order system.
[ { "version": "v1", "created": "Sun, 23 Feb 2014 18:13:47 GMT" } ]
2014-02-25T00:00:00
[ [ "Kan", "Zhen", "" ], [ "Klotz", "Justin", "" ], [ "Pasiliao", "Eduardo L.", "Jr" ], [ "Dixon", "Warren E.", "" ] ]
new_dataset
0.996491
1402.5692
Rodrigo de Lamare
A. G. D. Uchoa, C. T. Healy and R. C. de Lamare
Repeat Accumulate Based Designs for LDPC Codes on Fading Channels
5 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Irregular repeat-accumulate Root-Check LDPC codes based on Progressive Edge Growth (PEG) techniques for block-fading channels are proposed. The proposed Root-Check LDPC codes are {both suitable for channels under $F = 2, 3$ independent fadings per codeword and} for fast fading channels. An IRA(A) Root-Check structure is devised for $F = 2, 3$ independent fadings. The performance of the new codes is investigated in terms of the Frame Error Rate (FER). Numerical results show that the IRAA LDPC codes constructed by the proposed algorithm {outperform by about 1dB the existing} IRA Root-Check LDPC codes under fast-fading channels.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 00:09:28 GMT" } ]
2014-02-25T00:00:00
[ [ "Uchoa", "A. G. D.", "" ], [ "Healy", "C. T.", "" ], [ "de Lamare", "R. C.", "" ] ]
new_dataset
0.998661
1402.5708
Lavdim Kurtaj
Lavdim Kurtaj, Ilir Limani, Vjosa Shatri and Avni Skeja
The Cerebellum: New Computational Model that Reveals its Primary Function to Calculate Multibody Dynamics Conform to Lagrange-Euler Formulation
18 pages, 4 figures
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 5, No 2, September 2013
null
null
cs.NE cs.CE cs.RO q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cerebellum is part of the brain that occupies only 10% of the brain volume, but it contains about 80% of total number of brain neurons. New cerebellar function model is developed that sets cerebellar circuits in context of multibody dynamics model computations, as important step in controlling balance and movement coordination, functions performed by two oldest parts of the cerebellum. Model gives new functional interpretation for granule cells-Golgi cell circuit, including distinct function for upper and lower Golgi cell dendritc trees, and resolves issue of sharing Granule cells between Purkinje cells. Sets new function for basket cells, and for stellate cells according to position in molecular layer. New model enables easily and direct integration of sensory information from vestibular system and cutaneous mechanoreceptors, for balance, movement and interaction with environments. Model gives explanation of Purkinje cells convergence on deep-cerebellar nuclei.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 02:40:05 GMT" } ]
2014-02-25T00:00:00
[ [ "Kurtaj", "Lavdim", "" ], [ "Limani", "Ilir", "" ], [ "Shatri", "Vjosa", "" ], [ "Skeja", "Avni", "" ] ]
new_dataset
0.998869
1402.5734
Cunsheng Ding
Cunsheng Ding, Longjiang Qu, Qiang Wang, Jin Yuan and Pingzhi Yuan
Permutation trinomials over finite fields with even characteristic
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Permutation polynomials have been a subject of study for a long time and have applications in many areas of science and engineering. However, only a small number of specific classes of permutation polynomials are described in the literature so far. In this paper we present a number of permutation trinomials over finite fields, which are of different forms.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 06:58:44 GMT" } ]
2014-02-25T00:00:00
[ [ "Ding", "Cunsheng", "" ], [ "Qu", "Longjiang", "" ], [ "Wang", "Qiang", "" ], [ "Yuan", "Jin", "" ], [ "Yuan", "Pingzhi", "" ] ]
new_dataset
0.992373
1212.3883
Mir Mahmood H
Mir H. Mahmood, Mark R. Bell
Bayes Information-theoretic Radar Waveform Design and Delay-Doppler Resolution for Extended Targets
The paper has been withdrawn because a more efficient algorithm for waveform design has been proposed the authors. The journal version of the paper will be uploaded shortly
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of information-theoretic waveform design for active sensing systems such as radar for extended targets. Contrary to the popular formulation of the problem in the estimation-theoretic context, we are rather interested in a Bayes decision theoretic approach where a target present in the environment belongs to two or more classes whose priors are known. Optimal information theory based transmit waveforms are designed by maximizing mutual information (MI) between the received signal and the target impulse response, resulting in a novel iterative design equation. We also derive signal to noise ratio (SNR) maximization based waveforms. In an effort to quantize the benefits of such a design approach, the delay-Doppler ambiguity function of information-theoretic waveforms are presented and is compared with Barker codes of similar time-bandwidth product. It is found that the ambiguity function of information-theoretic waveforms has very sharp main lobe in general and excellent time autocorrelation properties in particular.
[ { "version": "v1", "created": "Mon, 17 Dec 2012 04:47:05 GMT" }, { "version": "v2", "created": "Fri, 21 Feb 2014 06:32:34 GMT" } ]
2014-02-24T00:00:00
[ [ "Mahmood", "Mir H.", "" ], [ "Bell", "Mark R.", "" ] ]
new_dataset
0.972282
1402.5188
Chao Wang
Chao Wang
Collision free autonomous navigation and formation building for non-holonomic ground robots
null
null
null
null
cs.RO math.OC
http://creativecommons.org/licenses/by/3.0/
The primary objective of a safe navigation algorithm is to guide the object from its current position to the target position while avoiding any collision with the en-route obstacles, and the appropriate obstacle avoidance strategies are the key factors to ensure safe navigation tasks in dynamic environments. In this report, three different obstacle avoidance strategies for safe navigation in dynamic environments have been presented. The biologically-inspired navigation algorithm (BINA) is efficient in terms of avoidance time. The equidistant based navigation algorithm (ENA) is able to achieve navigation task with in uncertain dynamic environments. The navigation algorithm algorithm based on an integrated environment representation (NAIER) allows the object to seek a safe path through obstacles in unknown dynamic environment in a human-like fashion. The performances and features of the proposed navigation algorithms are confirmed by extensive simulation results and experiments with a real non-holonomic mobile robot. The algorithms have been implemented on two real control systems: intelligent wheelchair and robotic hospital bed. The performance of the proposed algorithms with SAM and Flexbed demonstrate their capabilities to achieve navigation tasks in complicated real time scenarios. The proposed algorithms are easy to be implemented in real time and costly efficient. An extra study on networked multi-robots formation building algorithm is presented in this paper. A constructive and easy-to-implement decentralised control is proposed for a formation building of a group of random positioned objects. Furthermore, the problem of formation building with anonymous objects is addressed. This randomised decentralised navigation algorithm achieves the convergence to a desired configuration with probability 1.
[ { "version": "v1", "created": "Fri, 21 Feb 2014 02:22:57 GMT" } ]
2014-02-24T00:00:00
[ [ "Wang", "Chao", "" ] ]
new_dataset
0.977364
1402.5196
Kensuke Nakanishi
Kensuke Nakanishi, Shinsuke Hara, Takahiro Matsuda, Kenichi Takizawa, Fumie Ono, and Ryu Miura
Synchronization-Free Delay Tomography Based on Compressed Sensing
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Delay tomography has so far burdened source and receiver measurement nodes in a network with two requirements such as path establishment and clock synchronization between them. In this letter, we focus on the clock synchronization problem in delay tomography and propose a synchronization-free delay tomography scheme. The proposed scheme selects a path between source and receiver measurement nodes as a reference path, which results in a loss of equation in a conventional delay tomography problem. However, by utilizing compressed sensing, the proposed scheme becomes robust to the loss. Simulation experiments confirm that the proposed scheme works comparable to a conventional delay tomography scheme in networks with no clock synchronization between source and receiver measurement nodes.
[ { "version": "v1", "created": "Fri, 21 Feb 2014 03:33:24 GMT" } ]
2014-02-24T00:00:00
[ [ "Nakanishi", "Kensuke", "" ], [ "Hara", "Shinsuke", "" ], [ "Matsuda", "Takahiro", "" ], [ "Takizawa", "Kenichi", "" ], [ "Ono", "Fumie", "" ], [ "Miura", "Ryu", "" ] ]
new_dataset
0.994894
1402.4826
Federico Maggi
Andrea Gianazza and Federico Maggi and Aristide Fattori and Lorenzo Cavallaro and Stefano Zanero
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Popularity and complexity of malicious mobile applications are rising, making their analysis difficult and labor intensive. Mobile application analysis is indeed inherently different from desktop application analysis: In the latter, the interaction of the user (i.e., victim) is crucial for the malware to correctly expose all its malicious behaviors. We propose a novel approach to analyze (malicious) mobile applications. The goal is to exercise the user interface (UI) of an Android application to effectively trigger malicious behaviors, automatically. Our key intuition is to record and reproduce the UI interactions of a potential victim of the malware, so as to stimulate the relevant behaviors during dynamic analysis. To make our approach scale, we automatically re-execute the recorded UI interactions on apps that are similar to the original ones. These characteristics make our system orthogonal and complementary to current dynamic analysis and UI-exercising approaches. We developed our approach and experimentally shown that our stimulation allows to reach a higher code coverage than automatic UI exercisers, so to unveil interesting malicious behaviors that are not exposed when using other approaches. Our approach is also suitable for crowdsourcing scenarios, which would push further the collection of new stimulation traces. This can potentially change the way we conduct dynamic analysis of (mobile) applications, from fully automatic only, to user-centric and collaborative too.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 21:08:11 GMT" } ]
2014-02-21T00:00:00
[ [ "Gianazza", "Andrea", "" ], [ "Maggi", "Federico", "" ], [ "Fattori", "Aristide", "" ], [ "Cavallaro", "Lorenzo", "" ], [ "Zanero", "Stefano", "" ] ]
new_dataset
0.995665
1402.4958
Dan Dobre Dan Dobre
Elli Androulaki, Christian Cachin, Dan Dobre, Marko Vukolic
Erasure-Coded Byzantine Storage with Separate Metadata
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We present AWE, the first erasure-coded distributed implementation of a multi-writer multi-reader read/write storage object that is, at the same time: (1) asynchronous, (2) wait-free, (3) atomic, (4) amnesic, (i.e., with data nodes storing a bounded number of values) and (5) Byzantine fault-tolerant (BFT) using the optimal number of nodes. Furthermore, AWE is efficient since it does not use public-key cryptography and requires data nodes that support only reads and writes, further reducing the cost of deployment and ownership of a distributed storage solution. Notably, AWE stores metadata separately from $k$-out-of-$n$ erasure-coded fragments. This enables AWE to be the first BFT protocol that uses as few as $2t+k$ data nodes to tolerate $t$ Byzantine nodes, for any $k \ge 1$.
[ { "version": "v1", "created": "Thu, 20 Feb 2014 10:53:07 GMT" } ]
2014-02-21T00:00:00
[ [ "Androulaki", "Elli", "" ], [ "Cachin", "Christian", "" ], [ "Dobre", "Dan", "" ], [ "Vukolic", "Marko", "" ] ]
new_dataset
0.954439
1311.0709
Yanshan Wang
Yanshan Wang
A novel soft keyboard for touchscreen phones: QWERT
null
Int. J. of Human Factors and Ergonomics, 2013 Vol.2, No.4, pp.246 - 261
10.1504/IJHFE.2013.059374
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The popularity of touchscreen phones has been growing around the world since the iPhones and Android phones were released. More and more mobile phones with large touchscreen have been produced, however, the phones with small size displays are still in the majority of touch phones. The foremost interface on touch smartphones is the information input module using soft keyboards. Traditional input methods on touch phones have either too small key buttons (such as QWERTY) or too many functions (such as 3$\times$4 keyboard), which are inconvenient to use. Moreover, the conventional soft keyboards only use tapping to input texts while current touch smartphones allow various gestures on the touchscreen, such as sliding. In this paper, a novel soft keyboard called QWERT is proposed for touchscreen-based smartphones. The users can interact with phones via finger gestures of tapping or sliding when input text by using the QWERT. In doing so, the interactions between users and smartphones will be faster and easier. An experiment carried out on inexperienced human subjects shows that they can learn very fast due to their familiarities with QWERTY. A simulation experiment based on a cognitive architecture, ACT-R, was also conducted to predict the movement time (MT) of experienced human subjects. The simulation results show that the MT using QWERT outperforms other default keyboards. These outcomes imply that the novel QWERT is a viable option for touch smartphone users. Based on the novel design, an application is released on Android systems. This application is expected to give better user experience for customers who use touch smartphones.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 14:25:29 GMT" } ]
2014-02-20T00:00:00
[ [ "Wang", "Yanshan", "" ] ]
new_dataset
0.999715
1311.1013
Per Zetterberg
Per Zetterberg
Interference Alignment (IA) and Coordinated Multi-Point (CoMP) with IEEE802.11ac feedback compression: testbed results
To appear in ICASSP 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have implemented interference alignment (IA) and joint transmission coordinated multipoint (CoMP) on a wireless testbed using the feedback compression scheme of the new 802.11ac standard. The performance as a function of the frequency domain granularity is assessed. Realistic throughput gains are obtained by probing each spatial modulation stream with ten different coding and modulation schemes. The gain of IA and CoMP over TDMA MIMO is found to be 26% and 71%, respectively under stationary conditions. In our dense indoor office deployment, the frequency domain granularity of the feedback can be reduced down to every 8th subcarrier (2.5MHz), without sacrificing performance.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 11:15:54 GMT" }, { "version": "v2", "created": "Wed, 19 Feb 2014 14:12:09 GMT" } ]
2014-02-20T00:00:00
[ [ "Zetterberg", "Per", "" ] ]
new_dataset
0.99893
1402.4543
Boyu Li
Dengkui Zhu, Boyu Li, Ping Liang
Normalized Volume of Hyperball in Complex Grassmann Manifold and Its Application in Large-Scale MU-MIMO Communication Systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides a solution to a critical issue in large-scale Multi-User Multiple-Input Multiple-Output (MU-MIMO) communication systems: how to estimate the Signal-to-Interference-plus-Noise-Ratios (SINRs) and their expectations in MU-MIMO mode at the Base Station (BS) side when only the Channel Quality Information (CQI) in Single-User MIMO (SU-MIMO) mode and non-ideal Channel State Information (CSI) are known? A solution to this problem would be very beneficial for the BS to predict the capacity of MU-MIMO and choose the proper modulation and channel coding for MU-MIMO. To that end, this paper derives a normalized volume formula of a hyperball based on the probability density function of the canonical angle between any two points in a complex Grassmann manifold, and shows that this formula provides a solution to the aforementioned issue. It enables the capability of a BS to predict the capacity loss due to non-ideal CSI, group users in MU-MIMO mode, choose the proper modulation and channel coding, and adaptively switch between SU-MIMO and MU-MIMO modes, as well as between Conjugate Beamforming (CB) and Zero-Forcing (ZF) precoding. Numerical results are provided to verify the validity and accuracy of the solution.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 01:35:40 GMT" } ]
2014-02-20T00:00:00
[ [ "Zhu", "Dengkui", "" ], [ "Li", "Boyu", "" ], [ "Liang", "Ping", "" ] ]
new_dataset
0.988153
1402.4778
Jan Bergstra
Jan A. Bergstra and Peter Weijland
Bitcoin: a Money-like Informational Commodity
null
null
null
Report TCS 1402
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The question "what is Bitcoin" allows for many answers depending on the objectives aimed at when providing such answers. The question addressed in this paper is to determine a top-level classification, or type, for Bitcoin. We will classify Bitcoin as a system of type money-like informational commodity (MLIC).
[ { "version": "v1", "created": "Wed, 19 Feb 2014 19:25:15 GMT" } ]
2014-02-20T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Weijland", "Peter", "" ] ]
new_dataset
0.999808
1402.4164
Eduardo R. B. Marques
Eduardo R. B. Marques
Fine-grained Patches for Java Software Upgrades
In Proc. HotSWUp'13, 6 pages, 4 figures, 1 table
Proc. 5th Workshop on Hot Topics in Software Upgrades, USENIX, 2013
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel methodology for deriving fine-grained patches of Java software. We consider an abstract-syntax tree (AST) representation of Java classes compiled to the Java Virtual Machine (JVM) format, and a difference analysis over the AST representation to derive patches. The AST representation defines an appropriate abstraction level for analyzing differences, yielding compact patches that correlate modularly to actual source code changes. The approach contrasts to other common, coarse-grained approaches, like plain binary differences, which may easily lead to disproportionately large patches. We present the main traits of the methodology, a prototype tool called aspa that implements it, and a case-study analysis on the use of aspa to derive patches for the Java 2 SE API. The case-study results illustrate that aspa patches have a significantly smaller size than patches derived by binary differencing tools.
[ { "version": "v1", "created": "Mon, 17 Feb 2014 22:05:42 GMT" } ]
2014-02-19T00:00:00
[ [ "Marques", "Eduardo R. B.", "" ] ]
new_dataset
0.995638
1402.4465
Marijn Heule
Peter van der Tak and Marijn J.H. Heule and Armin Biere
Concurrent Cube-and-Conquer
Third International Workshop on Pragmatics of SAT (PoS 2012)
null
null
null
cs.DS cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work introduced the cube-and-conquer technique to solve hard SAT instances. It partitions the search space into cubes using a lookahead solver. Each cube is tackled by a conflict-driven clause learning (CDCL) solver. Crucial for strong performance is the cutoff heuristic that decides when to switch from lookahead to CDCL. Yet, this offline heuristic is far from ideal. In this paper, we present a novel hybrid solver that applies the cube and conquer steps simultaneously. A lookahead and a CDCL solver work together on each cube, while communication is restricted to synchronization. Our concurrent cube-and-conquer solver can solve many instances faster than pure lookahead, pure CDCL and offline cube-and-conquer, and can abort early in favor of a pure CDCL search if an instance is not suitable for cube-and-conquer techniques.
[ { "version": "v1", "created": "Tue, 18 Feb 2014 20:39:30 GMT" } ]
2014-02-19T00:00:00
[ [ "van der Tak", "Peter", "" ], [ "Heule", "Marijn J. H.", "" ], [ "Biere", "Armin", "" ] ]
new_dataset
0.998454
1306.5606
Barry Hurley
Barry Hurley, Lars Kotthoff, Yuri Malitsky, Barry O'Sullivan
Proteus: A Hierarchical Portfolio of Solvers and Transformations
11th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems. The final publication is available at link.springer.com
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, portfolio approaches to solving SAT problems and CSPs have become increasingly common. There are also a number of different encodings for representing CSPs as SAT instances. In this paper, we leverage advances in both SAT and CSP solving to present a novel hierarchical portfolio-based approach to CSP solving, which we call Proteus, that does not rely purely on CSP solvers. Instead, it may decide that it is best to encode a CSP problem instance into SAT, selecting an appropriate encoding and a corresponding SAT solver. Our experimental evaluation used an instance of Proteus that involved four CSP solvers, three SAT encodings, and six SAT solvers, evaluated on the most challenging problem instances from the CSP solver competitions, involving global and intensional constraints. We show that significant performance improvements can be achieved by Proteus obtained by exploiting alternative view-points and solvers for combinatorial problem-solving.
[ { "version": "v1", "created": "Mon, 24 Jun 2013 13:11:54 GMT" }, { "version": "v2", "created": "Mon, 17 Feb 2014 12:26:45 GMT" } ]
2014-02-18T00:00:00
[ [ "Hurley", "Barry", "" ], [ "Kotthoff", "Lars", "" ], [ "Malitsky", "Yuri", "" ], [ "O'Sullivan", "Barry", "" ] ]
new_dataset
0.954347
1310.1530
Henry Hong-Ning Dai Dr.
Hong-Ning Dai and Raymond Chi-Wing Wong and Qinglin Zhao
Multi-channel Wireless Networks with Infrastructure Support: Capacity and Delay
12 pages, 6 figures, 3 tables
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a novel multi-channel network with infrastructure support, called an \textit{MC-IS} network, which has not been studied in the literature. To the best of our knowledge, we are the first to study such an \textit{MC-IS} network. Our \textit{MC-IS} network is equipped with a number of infrastructure nodes which can communicate with common nodes using a number of channels where a communication between a common node and an infrastructure node is called an infrastructure communication and a communication between two common nodes is called an ad-hoc communication. Our proposed \textit{MC-IS} network has a number of advantages over three existing conventional networks, namely a single-channel wireless ad hoc network (called an \textit{SC-AH} network), a multi-channel wireless ad hoc network (called an \textit{MC-AH} network) and a single-channel network with infrastructure support (called an \textit{SC-IS} network). In particular, the \textit{network capacity} of our proposed \textit{MC-IS} network is $\sqrt{n \log n}$ times higher than that of an \textit{SC-AH} network and an \textit{MC-AH} network and the same as that of an \textit{SC-IS} network, where $n$ is the number of nodes in the network. The \textit{average delay} of our \textit{MC-IS} network is $\sqrt{\log n/n}$ times lower than that of an \textit{SC-AH} network and an \textit{MC-AH} network, and $\min(C_I,m)$ times lower than the average delay of an \textit{SC-IS} network, where $C_I$ and $m$ denote the number of channels dedicated for infrastructure communications and the number of interfaces mounted at each infrastructure node, respectively.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 02:41:49 GMT" }, { "version": "v2", "created": "Sat, 15 Feb 2014 04:14:27 GMT" } ]
2014-02-18T00:00:00
[ [ "Dai", "Hong-Ning", "" ], [ "Wong", "Raymond Chi-Wing", "" ], [ "Zhao", "Qinglin", "" ] ]
new_dataset
0.996202
1312.4190
Jakub Konecny
Jakub Kone\v{c}n\'y and Michal Hagara
One-Shot-Learning Gesture Recognition using HOG-HOF Features
20 pages, 10 figures, 2 tables To appear in Journal of Machine Learning Research subject to minor revision
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this paper is to describe one-shot-learning gesture recognition systems developed on the \textit{ChaLearn Gesture Dataset}. We use RGB and depth images and combine appearance (Histograms of Oriented Gradients) and motion descriptors (Histogram of Optical Flow) for parallel temporal segmentation and recognition. The Quadratic-Chi distance family is used to measure differences between histograms to capture cross-bin relationships. We also propose a new algorithm for trimming videos --- to remove all the unimportant frames from videos. We present two methods that use combination of HOG-HOF descriptors together with variants of Dynamic Time Warping technique. Both methods outperform other published methods and help narrow down the gap between human performance and algorithms on this task. The code has been made publicly available in the MLOSS repository.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 20:58:21 GMT" }, { "version": "v2", "created": "Sat, 15 Feb 2014 17:47:11 GMT" } ]
2014-02-18T00:00:00
[ [ "Konečný", "Jakub", "" ], [ "Hagara", "Michal", "" ] ]
new_dataset
0.994764
1402.2184
Boris Konev
Boris Konev and Alexei Lisitsa
A SAT Attack on the Erdos Discrepancy Conjecture
8 pages. The description of the automata is clarified
null
null
null
cs.DM math.CO math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1930s Paul Erdos conjectured that for any positive integer C in any infinite +1 -1 sequence (x_n) there exists a subsequence x_d, x_{2d}, ... , x_{kd} for some positive integers k and d, such that |x_d + x_{2d} + ... + x_{kd}|> C. The conjecture has been referred to as one of the major open problems in combinatorial number theory and discrepancy theory. For the particular case of C=1 a human proof of the conjecture exists; for C=2 a bespoke computer program had generated sequences of length 1124 having discrepancy 2, but the status of the conjecture remained open even for such a small bound. We show that by encoding the problem into Boolean satisfiability and applying the state of the art SAT solvers, one can obtain a sequence of length 1160 with discrepancy 2 and a proof of the Erdos discrepancy conjecture for C=2, claiming that no sequence of length 1161 and discrepancy 2 exists. We also present our partial results for the case of C=3.
[ { "version": "v1", "created": "Mon, 10 Feb 2014 15:33:07 GMT" }, { "version": "v2", "created": "Mon, 17 Feb 2014 09:06:41 GMT" } ]
2014-02-18T00:00:00
[ [ "Konev", "Boris", "" ], [ "Lisitsa", "Alexei", "" ] ]
new_dataset
0.997611
1402.3689
Radu Horaud P
Maxime Janvier, Xavier Alameda-Pineda, Laurent Girin and Radu Horaud
Sound Representation and Classification Benchmark for Domestic Robots
8 pages, 2 figures
null
null
null
cs.SD cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of sound representation and classification and present results of a comparative study in the context of a domestic robotic scenario. A dataset of sounds was recorded in realistic conditions (background noise, presence of several sound sources, reverberations, etc.) using the humanoid robot NAO. An extended benchmark is carried out to test a variety of representations combined with several classifiers. We provide results obtained with the annotated dataset and we assess the methods quantitatively on the basis of their classification scores, computation times and memory requirements. The annotated dataset is publicly available at https://team.inria.fr/perception/nard/.
[ { "version": "v1", "created": "Sat, 15 Feb 2014 13:27:01 GMT" } ]
2014-02-18T00:00:00
[ [ "Janvier", "Maxime", "" ], [ "Alameda-Pineda", "Xavier", "" ], [ "Girin", "Laurent", "" ], [ "Horaud", "Radu", "" ] ]
new_dataset
0.999656