id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1401.5848
Christer B\"ackstr\"om
Christer B\"ackstr\"om, Peter Jonsson
Algorithms and Limits for Compact Plan Representations
null
Journal Of Artificial Intelligence Research, Volume 44, pages 141-177, 2012
10.1613/jair.3534
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compact representations of objects is a common concept in computer science. Automated planning can be viewed as a case of this concept: a planning instance is a compact implicit representation of a graph and the problem is to find a path (a plan) in this graph. While the graphs themselves are represented compactly as planning instances, the paths are usually represented explicitly as sequences of actions. Some cases are known where the plans always have compact representations, for example, using macros. We show that these results do not extend to the general case, by proving a number of bounds for compact representations of plans under various criteria, like efficient sequential or random access of actions. In addition to this, we show that our results have consequences for what can be gained from reformulating planning into some other problem. As a contrast to this we also prove a number of positive results, demonstrating restricted cases where plans do have useful compact representations, as well as proving that macro plans have favourable access properties. Our results are finally discussed in relation to other relevant contexts.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 02:41:51 GMT" } ]
2014-01-24T00:00:00
[ [ "Bäckström", "Christer", "" ], [ "Jonsson", "Peter", "" ] ]
new_dataset
0.999384
1401.6015
Parisa Jalili Marandi
Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone
Ring Paxos: High-Throughput Atomic Broadcast
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Atomic broadcast is an important communication primitive often used to implement state-machine replication. Despite the large number of atomic broadcast algorithms proposed in the literature, few papers have discussed how to turn these algorithms into efficient executable protocols. This paper focuses on a class of atomic broadcast algorithms based on Paxos, with its corresponding desirable properties: safety under asynchrony assumptions, liveness under weak synchrony assumptions, and resiliency-optimality. The paper presents two protocols, M-Ring Paxos and U-Ring Paxos, derived from Paxos. The protocols inherit the properties of Paxos and can be implemented very efficiently. We report a detailed performance analysis of M-Ring Paxos and U-Ring Paxos and compare them to other atomic broadcast protocols.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 15:49:17 GMT" } ]
2014-01-24T00:00:00
[ [ "Marandi", "Parisa Jalili", "" ], [ "Primi", "Marco", "" ], [ "Schiper", "Nicolas", "" ], [ "Pedone", "Fernando", "" ] ]
new_dataset
0.999599
1401.6049
Richard Hoshino
Richard Hoshino, Ken-ichi Kawarabayashi
Generating Approximate Solutions to the TTP using a Linear Distance Relaxation
null
Journal Of Artificial Intelligence Research, Volume 45, pages 257-286, 2012
10.1613/jair.3713
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In some domestic professional sports leagues, the home stadiums are located in cities connected by a common train line running in one direction. For these instances, we can incorporate this geographical information to determine optimal or nearly-optimal solutions to the n-team Traveling Tournament Problem (TTP), an NP-hard sports scheduling problem whose solution is a double round-robin tournament schedule that minimizes the sum total of distances traveled by all n teams. We introduce the Linear Distance Traveling Tournament Problem (LD-TTP), and solve it for n=4 and n=6, generating the complete set of possible solutions through elementary combinatorial techniques. For larger n, we propose a novel "expander construction" that generates an approximate solution to the LD-TTP. For n congruent to 4 modulo 6, we show that our expander construction produces a feasible double round-robin tournament schedule whose total distance is guaranteed to be no worse than 4/3 times the optimal solution, regardless of where the n teams are located. This 4/3-approximation for the LD-TTP is stronger than the currently best-known ratio of 5/3 + epsilon for the general TTP. We conclude the paper by applying this linear distance relaxation to general (non-linear) n-team TTP instances, where we develop fast approximate solutions by simply "assuming" the n teams lie on a straight line and solving the modified problem. We show that this technique surprisingly generates the distance-optimal tournament on all benchmark sets on 6 teams, as well as close-to-optimal schedules for larger n, even when the teams are located around a circle or positioned in three-dimensional space.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 16:45:07 GMT" } ]
2014-01-24T00:00:00
[ [ "Hoshino", "Richard", "" ], [ "Kawarabayashi", "Ken-ichi", "" ] ]
new_dataset
0.995561
1401.6102
Fernando Almeida Dr.
Fernando Almeida, Jos\'e D. Santos, Jos\'e A. Monteiro
e-commerce business models in the context of web3.0 paradigm
12 pages, International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 6, December 2013
null
10.5121/ijait.2013.3601
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and play, how companies use information to market and sell their products, as well as operate their businesses. The basic shift occurring in Web 3.0 is from information-centric to knowledge-centric patterns of computing. Web 3.0 will enable people and machines to connect, evolve, share and use knowledge on an unprecedented scale and in new ways that make our experience of the Internet better. Additionally, semantic technologies have the potential to drive significant improvements in capabilities and life cycle economics through cost reductions, improved efficiencies, enhanced effectiveness, and new functionalities that were not possible or economically feasible before. In this paper we look to the semantic web and Web 3.0 technologies as enablers for the creation of value and appearance of new business models. For that, we analyze the role and impact of Web 3.0 in business and we identify nine potential business models, based in direct and undirected revenue sources, which have emerged with the appearance of semantic web technologies.
[ { "version": "v1", "created": "Thu, 9 Jan 2014 15:12:19 GMT" } ]
2014-01-24T00:00:00
[ [ "Almeida", "Fernando", "" ], [ "Santos", "José D.", "" ], [ "Monteiro", "José A.", "" ] ]
new_dataset
0.999652
1401.6121
Chandra Sekhar Mr
Vorugunti Chandra Sekhar, Mrudula Sarvabhatla
A Robust Password-Based Multi-Server Authentication Scheme
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2013, Tsai et al. cryptanalyzed Yeh et al. scheme and shown that Yeh et al., scheme is vulnerable to various cryptographic attacks and proposed an improved scheme. In this poster we will show that Tsai et al., scheme is also vulnerable to undetectable online password guessing attack, on success of the attack, the adversary can perform all major cryptographic attacks. As apart of our contribution, we have proposed an improved scheme which overcomes the defects in Tsai et al. and Yeh et al. schemes.
[ { "version": "v1", "created": "Sat, 7 Dec 2013 03:48:11 GMT" } ]
2014-01-24T00:00:00
[ [ "Sekhar", "Vorugunti Chandra", "" ], [ "Sarvabhatla", "Mrudula", "" ] ]
new_dataset
0.998006
1312.4863
Ariel Gabizon
Hasan Abasi and Nader H. Bshouty and Ariel Gabizon and Elad Haramaty
On $r$-Simple $k$-Path
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An $r$-simple $k$-path is a {path} in the graph of length $k$ that passes through each vertex at most $r$ times. The $r$-SIMPLE $k$-PATH problem, given a graph $G$ as input, asks whether there exists an $r$-simple $k$-path in $G$. We first show that this problem is NP-Complete. We then show that there is a graph $G$ that contains an $r$-simple $k$-path and no simple path of length greater than $4\log k/\log r$. So this, in a sense, motivates this problem especially when one's goal is to find a short path that visits many vertices in the graph while bounding the number of visits at each vertex. We then give a randomized algorithm that runs in time $$\mathrm{poly}(n)\cdot 2^{O( k\cdot \log r/r)}$$ that solves the $r$-SIMPLE $k$-PATH on a graph with $n$ vertices with one-sided error. We also show that a randomized algorithm with running time $\mathrm{poly}(n)\cdot 2^{(c/2)k/ r}$ with $c<1$ gives a randomized algorithm with running time $\poly(n)\cdot 2^{cn}$ for the Hamiltonian path problem in a directed graph - an outstanding open problem. So in a sense our algorithm is optimal up to an $O(\log r)$ factor.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 17:08:27 GMT" }, { "version": "v2", "created": "Wed, 22 Jan 2014 15:51:18 GMT" } ]
2014-01-23T00:00:00
[ [ "Abasi", "Hasan", "" ], [ "Bshouty", "Nader H.", "" ], [ "Gabizon", "Ariel", "" ], [ "Haramaty", "Elad", "" ] ]
new_dataset
0.983694
1401.3936
Adnan Anwar
Adnan Anwar, Abdun Naser Mahmood
Cyber Security of Smart Grid Infrastructure
The State of the Art in Intrusion Prevention and Detection, CRC Press, Taylor & Francis Group, USA, January 2014
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart grid security is crucial to maintain stable and reliable power system operation during the contingency situation due to the failure of any critical power system component. Ensuring a secured smart grid involves with a less possibility of power grid collapse or equipment malfunction. Due to lack of the proper security measures, a major blackout may occur which can even lead to a cascading failure. Therefore, to protect this critical power system infrastructure and to ensure a reliable and an uninterrupted power supply to the end users, smart grid security issues must be addressed with high priority. In a smart grid environment, electric power infrastructure is modernized by incorporating the current and future requirements and advanced functionalities to its consumers. To make the smart grid happen, cyber system is integrated with the physical power system. Although adoption of cyber system has made the grid more energy efficient and modernized, it has introduced cyber-attack issues which are critical for national infrastructure security and customer satisfaction. Due to the cyber-attack, power grid may face operational failures and loss of synchronization. This operational failure may damage critical power system components which may interrupt the power supply and make the system unstable resulting high financial penalties. In this chapter, some recent cyber attack related incidents into a smart grid environment are discussed. The requirements and the state of the art of cyber security issues of a critical power system infrastructure are illustrated elaborately.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 08:53:28 GMT" }, { "version": "v2", "created": "Wed, 22 Jan 2014 05:00:21 GMT" } ]
2014-01-23T00:00:00
[ [ "Anwar", "Adnan", "" ], [ "Mahmood", "Abdun Naser", "" ] ]
new_dataset
0.98251
1401.5546
Christopher Stewart
Chen Li
GreenMail: Reducing Email Service's Carbon Emission with Minimum Cost
Master's Thesis
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet services contribute a large fraction of worldwide carbon emission nowadays, in a context of increasing number of companies tending to provide and more and more developers use Internet services. Noticeably, a trend is those service providers are trying to reduce their carbon emissions by utilizing on-site or off-site renewable energy in their datacenters in order to attract more customers. With such efforts have been paid, there are still some users who are aggressively calling for even cleaner Internet services. For example, over 500,000 Facebook users petitioned the social networking site to use renewable energy to power its datacenter. However, it seems impossible for such demand to be satisfied merely from the inside of those production datacenters, considering the transition cost and stability. Outside the existing Internet services, on the other hand, may easily set up a proxy service to attract those renewable-energy-sensitive users, by 1) using carbon neutral or even over-offsetting cloud instances to bridge the end user and traditional Internet services; and 2) estimating and offsetting the carbon emissions from the traditional Internet services. In our paper, we proposed GreenMail, which is a general IMAP proxy caching system that connects email users and traditional email services. GreenMail runs on green web hosts to cache users' emails on green cloud instances. Besides, it offsets the carbon emitted by traditional backend email services. With GreenMail, users could set a carbon emission constraint and use traditional email service without breaking any code modification of user side and email server side.
[ { "version": "v1", "created": "Wed, 22 Jan 2014 03:24:12 GMT" } ]
2014-01-23T00:00:00
[ [ "Li", "Chen", "" ] ]
new_dataset
0.998833
1401.5698
Yifan Li
Yifan Li, Petr Musilek, Marek Reformat, Loren Wyard-Scott
Identification of Pleonastic It Using the Web
null
Journal Of Artificial Intelligence Research, Volume 34, pages 339-389, 2009
10.1613/jair.2622
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a significant minority of cases, certain pronouns, especially the pronoun it, can be used without referring to any specific entity. This phenomenon of pleonastic pronoun usage poses serious problems for systems aiming at even a shallow understanding of natural language texts. In this paper, a novel approach is proposed to identify such uses of it: the extrapositional cases are identified using a series of queries against the web, and the cleft cases are identified using a simple set of syntactic rules. The system is evaluated with four sets of news articles containing 679 extrapositional cases as well as 78 cleft constructs. The identification results are comparable to those obtained by human efforts.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 05:11:43 GMT" } ]
2014-01-23T00:00:00
[ [ "Li", "Yifan", "" ], [ "Musilek", "Petr", "" ], [ "Reformat", "Marek", "" ], [ "Wyard-Scott", "Loren", "" ] ]
new_dataset
0.994553
1306.3113
Christopher Batty
Fang Da, Christopher Batty, Eitan Grinspun
Multimaterial Front Tracking
The paper has been drastically revised and submitted to a journal that requires author anonymity; while this cannot be achieved under arXiv.org policy, we have nevertheless decided to withdraw the paper to reflect our attempt to satisfy anonymity
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first triangle mesh-based technique for tracking the evolution of general three-dimensional multimaterial interfaces undergoing complex topology changes induced by deformations and collisions. Our core representation is a non-manifold triangle surface mesh with material labels assigned to each half-face to distinguish volumetric regions. We advect the vertices of the mesh in a Lagrangian manner, and employ a complete set of collision-safe mesh improvement and topological operations that track and update material labels. In particular, we develop a unified, collision-safe strategy for handling complex topological operations acting on evolving triple- and higher-valence junctions, and a flexible method to merge colliding multimaterial meshes. We demonstrate our approach with a number of challenging geometric flows, including passive advection, normal flow, and mean curvature flow.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 14:11:28 GMT" }, { "version": "v2", "created": "Tue, 21 Jan 2014 04:02:59 GMT" } ]
2014-01-22T00:00:00
[ [ "Da", "Fang", "" ], [ "Batty", "Christopher", "" ], [ "Grinspun", "Eitan", "" ] ]
new_dataset
0.999215
1401.2405
Ghassan Samara
Ghassan Samara, Tareq Alhmiedat, Amer O. Abu Salem
Dynamic Safety Message Power Control in VANET Using PSO
9 pages. arXiv admin note: substantial text overlap with arXiv:1311.2364
The World of Computer Science and Information Technology Journal (WSCIT). 2013, Volume 3, Issue 10. pp. 176.184
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the recent years Vehicular Ad hoc Networks (VANET) became one of the most challenging research area in the field of Mobile Ad hoc Networks (MANET). Vehicles in VANET send emergency and safety periodic messages through one control channel having a limited bandwidth, which causes a growing collision to the channel especially in dense traffic situations. In this paper a protocol Particle swarm optimization Beacon Power Control (PBPC) is proposed, which makes dynamic transmission power control to adjust the transmission power of the safety periodic messages that have been aggressively sent by all vehicles on the road 10 times per a second, the proposed protocol aims to decrease the packet collision resulted from periodic safety messages, which leads to control the load on the channel while ensuring a high probability of message reception within the safety distance of the sender vehicle.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 17:10:20 GMT" }, { "version": "v2", "created": "Tue, 21 Jan 2014 13:22:00 GMT" } ]
2014-01-22T00:00:00
[ [ "Samara", "Ghassan", "" ], [ "Alhmiedat", "Tareq", "" ], [ "Salem", "Amer O. Abu", "" ] ]
new_dataset
0.999602
1401.5097
Olle Fredriksson
Olle Fredriksson
Distributed call-by-value machines
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new abstract machine, called DCESH, which describes the execution of higher-order programs running in distributed architectures. DCESH implements a generalised form of Remote Procedure Call that supports calling higher-order functions across node boundaries, without sending actual code. Our starting point is a variant of the SECD machine that we call the CES machine, which implements reduction for untyped call-by-value PCF. We successively add the features that we need for distributed execution and show the correctness of each addition. First we add heaps, forming the CESH machine, which provides features necessary for more efficient execution, and show that there is a bisimulation between the CES and the CESH machine. Then we construct a two-level operational semantics, where the high level is a network of communicating machines, and the low level is given by local machine transitions. Using these networks, we arrive at our final system, the distributed CESH machine (DCESH). We show that there is a bisimulation relation also between the CESH machine and the DCESH machine. All the technical results have been formalised and proved correct in Agda, and a prototype compiler has been developed.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 21:32:38 GMT" } ]
2014-01-22T00:00:00
[ [ "Fredriksson", "Olle", "" ] ]
new_dataset
0.9995
1401.5181
Umer Asgher
Fahad Moazzam Dar, Umer Asgher, Daniyal Malik, Emmad Adil, Hassan Shahzad, Anees Ali
Automation of Prosthetic Upper Limbs for Transhumeral Amputees Using Switch-controlled Motors
7 Pages, The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE 13], San Francisco State University, CA, U.S.A., March 2013
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, 2013. e-ISSN: 2251-7545
10.7321/jscse.v3.n3.90
e-ISSN: 2251-7545
cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The issues of research required in the field of bio medical engineering and externally-powered prostheses are attracting attention of regulatory bodies and the common people in various parts of the globe. Today, 90 percent of prostheses used are conventional body powered cable-controlled ones which are very uncomfortable to the amputees as fairly large amount of forces and excursions have to be generated by the amputee. Additionally, its amount of rotation is limited. Alternatively, prosthetic limbs driven using electrical motors might deliver added functionality and improved control, accompanied by better cosmesis, however,it could be bulky and costly. Presently existing proposals usually require fewer bodily response and need additional upkeep than the cable operated prosthetic limbs. Due to the motives mentioned, proposal for mechanization of body-powered prostheses, with ease of maintenance and cost in mind, is presented in this paper. The prosthetic upper limb which is being automated is for Transhumeral type of amputees that is amputated from above elbow. The study consists of two main portions: one is lifting mechanism of the limb and the other is gripping mechanism for the hand using switch controls, which is the most cost effective and optimized solution, rather than using complex and expensive myoelectric control signals.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 05:26:34 GMT" } ]
2014-01-22T00:00:00
[ [ "Dar", "Fahad Moazzam", "" ], [ "Asgher", "Umer", "" ], [ "Malik", "Daniyal", "" ], [ "Adil", "Emmad", "" ], [ "Shahzad", "Hassan", "" ], [ "Ali", "Anees", "" ] ]
new_dataset
0.997297
1401.5208
Chen Guo
Chen Guo, Cenzhe Zhu, Teng Tiow Tay
ShAppliT: A Novel Broker-mediated Solution to Generic Application Sharing in a Cluster of Closed Operating Systems
17 pages
International Journal of Soft Computing and Software Engineering Vol. 2, No. 6, 2012
10.7321/jscse.v2.n6.2
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With advances in hardware and networking technologies and mass manufacturing, the cost of high end hardware had fall dramatically in recent years. However, software cost still remains high and is the dominant fraction of the overall computing budget. Application sharing is a promising solution to reduce the overall IT cost. Currently software licenses are still based on the number of copies installed. An organization can thus reduce the IT cost if the users are able to remotely access the software that is installed on certain computer servers instead of running the software on every local computer. In this paper, we propose a generic application sharing architecture for users' application sharing in a cluster of closed operating systems such as Microsoft Windows. We also propose a broker-mediated solution where we allow multiple users to access a single user software license on a time multiplex basis through a single logged in user. An application sharing tool called ShAppliT has been introduced and implemented in Microsoft Windows operating system. We evaluated their performance on CPU usage and memory consumption when a computer is hosting multiple concurrent shared application sessions.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 07:37:08 GMT" } ]
2014-01-22T00:00:00
[ [ "Guo", "Chen", "" ], [ "Zhu", "Cenzhe", "" ], [ "Tay", "Teng Tiow", "" ] ]
new_dataset
0.997245
1401.5234
Elodie Leducq
Elodie Leducq
On the third weight of generalized Reed-Muller codes
null
null
null
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the third weight of generalized Reed-Muller codes. We prove under some restrictive condition that the third weight of generalized Reed-Muller codes depends on the third weight of generalized Reed-Muller codes of small order with two variables. In some cases, we are able to determine the third weight and the third weight codewords of generalized Reed-Muller codes.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 09:38:33 GMT" } ]
2014-01-22T00:00:00
[ [ "Leducq", "Elodie", "" ] ]
new_dataset
0.988513
1401.5306
Anthony Marcus Ph.D.
Anthony Marcus, Ionut Cardei, Borko Furht, Osman Salem and Ahmed Mehaoua
A Mobile Device Prototype Application for the Detection and Prediction of Node Faults in Wireless Sensor Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various implementations of wireless sensor networks (i.e. personal area-, wireless body area- networks) are prone to node and network failures by such characteristics as limited node energy resources and hardware damage incurred from their surrounding environment (i.e. flooding, forest fires, a patient falling). This may jeopardize their reliability to act as early warning systems, monitoring systems for patients and athletes, and industrial and environmental observation networks. Following the current trend and widespread use of hand held, mobile communication devices, we outline an application architecture designed to detect and predict faulty nodes in wireless sensor networks. Furthermore, we implement our design as a proof of concept prototype for Android-based smartphones, which may be extended to develop other applications used for monitoring networked wireless personal area and body sensors used in other capacities. We have conducted several preliminary experiments to demonstrate the use of our design, which is capable of monitoring networks of wireless sensor devices and predicting node faults based on several localized metrics. As attributes of such networks may change over time, any models generated when the application is initialized must be updated periodically such that the applied machine learning algorithm maintains high levels of both accuracy and precision. The application is designed to discover node faults and, once identified, alert the user so that appropriate action may be taken.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 13:10:22 GMT" } ]
2014-01-22T00:00:00
[ [ "Marcus", "Anthony", "" ], [ "Cardei", "Ionut", "" ], [ "Furht", "Borko", "" ], [ "Salem", "Osman", "" ], [ "Mehaoua", "Ahmed", "" ] ]
new_dataset
0.999376
1401.5382
Tharun Prasath M
M. Tharun Prasath
Continuous Speech Recognition Based on Deterministic Finite Automata Machine using Utterance and Pitch Verification
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a set of acoustic modeling techniques for utterance verification (UV) based continuous speech recognition (CSR). Utterance verification in this work implies the ability to determine when portions of a hypothesized word string correspond to incorrectly decoded vocabulary words or out-of-vocabulary words that may appear in an utterance. This capability is implemented here as a likelihood ratio (LR). There are two UV techniques that are presented here. The first is voice verification along with the vocabulary testing, at the same time the parameters for UV models are generated based on the optimization criterion which is directly related to the LR measure. The second technique is a pitch recognition based on weighted finite-state transducers. These transducers provide a common and natural representation for major components of speech recognition systems, including hidden Markov models (HMMs), context-dependency models, pronunciation dictionaries, statistical grammars, and word or phone lattices. The finite state machine processes the acoustic parameters of UV models. The results of an experimental study presented in the paper shows that LR based parameter estimation results in a significant improvement in UV performance for this task. The study also found that the use of the LR based weighted finite-state transducers along with the UV, can provide as much as an 11% improvement in UV performance when compared to existing UV procedures. Finally, it was also found that the performance of the finite state machine was highly dependent on the use of the LR criterion in training acoustic models. Several observations are made in the paper concerning the formation of confidence measures for UV and the interaction of these techniques with statistical language models.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 16:51:07 GMT" } ]
2014-01-22T00:00:00
[ [ "Prasath", "M. Tharun", "" ] ]
new_dataset
0.968911
1204.4104
Satyadev Nandakumar
Satyadev Nandakumar, Santhosh Kumar Vangapelli
Normality and Finite-state Dimension of Liouville numbers
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Liouville numbers were the first class of real numbers which were proven to be transcendental. It is easy to construct non-normal Liouville numbers. Kano and Bugeaud have proved, using analytic techniques, that there are normal Liouville numbers. Here, for a given base k >= 2, we give two simple constructions of a Liouville number which is normal to the base k. The first construction is combinatorial, and is based on de Bruijn sequences. A real number in the unit interval is normal if and only if its finite-state dimension is 1. We generalize our construction to prove that for any rational r in the closed unit interval, there is a Liouville number with finite state dimension r. This refines Staiger's result that the set of Liouville numbers has constructive Hausdorff dimension zero, showing a new quantitative classification of Liouville numbers can be attained using finite-state dimension. In the second number-theoretic construction, we use an arithmetic property of numbers - the existence of primitive roots - to construct Liouville numbers normal in finitely many bases, assuming a Generalized Artin's conjecture on primitive roots.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 15:12:40 GMT" }, { "version": "v2", "created": "Mon, 20 Jan 2014 13:27:18 GMT" } ]
2014-01-21T00:00:00
[ [ "Nandakumar", "Satyadev", "" ], [ "Vangapelli", "Santhosh Kumar", "" ] ]
new_dataset
0.996448
1211.2496
Armin Banaei
Armin Banaei, Daren B. H. Cline, Costas N. Georghiades, and Shuguang Cui
On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad-Hoc Networks
15 pages, 11 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a methodology employing statistical analysis and stochastic geometry to study geometric routing schemes in wireless ad-hoc networks. In particular, we analyze the network layer performance of one such scheme, the random $\frac{1}{2}$disk routing scheme, which is a localized geometric routing scheme in which each node chooses the next relay randomly among the nodes within its transmission range and in the general direction of the destination. The techniques developed in this paper enable us to establish the asymptotic connectivity and the convergence results for the mean and variance of the routing path lengths generated by geometric routing schemes in random wireless networks. In particular, we approximate the progress of the routing path towards the destination by a Markov process and determine the sufficient conditions that ensure the asymptotic connectivity for both dense and large-scale ad-hoc networks deploying the random $\frac{1}{2}$disk routing scheme. Furthermore, using this Markov characterization, we show that the expected length (hop-count) of the path generated by the random $\frac{1}{2}$disk routing scheme normalized by the length of the path generated by the ideal direct-line routing, converges to $3\pi/4$ asymptotically. Moreover, we show that the variance-to-mean ratio of the routing path length converges to $9\pi^2/64-1$ asymptotically. Through simulation, we show that the aforementioned asymptotic statistics are in fact quite accurate even for finite granularity and size of the network.
[ { "version": "v1", "created": "Mon, 12 Nov 2012 02:26:53 GMT" }, { "version": "v2", "created": "Tue, 2 Jul 2013 17:57:22 GMT" }, { "version": "v3", "created": "Mon, 20 Jan 2014 01:50:49 GMT" } ]
2014-01-21T00:00:00
[ [ "Banaei", "Armin", "" ], [ "Cline", "Daren B. H.", "" ], [ "Georghiades", "Costas N.", "" ], [ "Cui", "Shuguang", "" ] ]
new_dataset
0.998189
1310.4777
Jihong Park
Jihong Park and Seong-Lyun Kim
Content-Specific Broadcast Cellular Networks based on User Demand Prediction: A Revenue Perspective
6 pages; This paper will appear in the Proc. of IEEE WCNC 2014
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Long Term Evolution (LTE) broadcast is a promising solution to cope with exponentially increasing user traffic by broadcasting common user requests over the same frequency channels. In this paper, we propose a novel network framework provisioning broadcast and unicast services simultaneously. For each serving file to users, a cellular base station determines either to broadcast or unicast the file based on user demand prediction examining the file's content specific characteristics such as: file size, delay tolerance, price sensitivity. In a network operator's revenue maximization perspective while not inflicting any user payoff degradation, we jointly optimize resource allocation, pricing, and file scheduling. In accordance with the state of the art LTE specifications, the proposed network demonstrates up to 32% increase in revenue for a single cell and more than a 7-fold increase for a 7 cell coordinated LTE broadcast network, compared to the conventional unicast cellular networks.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 17:15:47 GMT" }, { "version": "v2", "created": "Mon, 20 Jan 2014 15:55:10 GMT" } ]
2014-01-21T00:00:00
[ [ "Park", "Jihong", "" ], [ "Kim", "Seong-Lyun", "" ] ]
new_dataset
0.963146
1311.2903
Ahmed El Shafie
Ahmed El Shafie, Tamer Khattab and H. Vincent Poor
Protocol Design and Stability Analysis of Cooperative Cognitive Radio Users
Accepted in WCNC 2014
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A single cognitive radio transmitter--receiver pair shares the spectrum with two primary users communicating with their respective receivers. Each primary user has a local traffic queue, whereas the cognitive user has three queues; one storing its own traffic while the other two are relaying queues used to store primary relayed packets admitted from the two primary users. A new cooperative cognitive medium access control protocol for the described network is proposed, where the cognitive user exploits the idle periods of the primary spectrum bands. Traffic arrival to each relaying queue is controlled using a tuneable admittance factor, while relaying queues service scheduling is controlled via channel access probabilities assigned to each queue based on the band of operation. The stability region of the proposed protocol is characterized shedding light on its maximum expected throughput. Numerical results demonstrate the performance gains of the proposed cooperative cognitive protocol.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 20:05:51 GMT" }, { "version": "v2", "created": "Wed, 13 Nov 2013 02:22:43 GMT" }, { "version": "v3", "created": "Sat, 18 Jan 2014 20:31:06 GMT" } ]
2014-01-21T00:00:00
[ [ "Shafie", "Ahmed El", "" ], [ "Khattab", "Tamer", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.996194
1401.4629
Moustafa Mohamed
Moustafa Mohamed, Zheng Li, Xi Chen, Alan Mickelson
HERMES: A Hierarchical Broadcast-Based Silicon Photonic Interconnect for Scalable Many-Core Systems
10 pages
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optical interconnection networks, as enabled by recent advances in silicon photonic device and fabrication technology, have the potential to address on-chip and off-chip communication bottlenecks in many-core systems. Although several designs have shown superior power efficiency and performance compared to electrical alternatives, these networks will not scale to the thousands of cores required in the future. In this paper, we introduce Hermes, a hybrid network composed of an optimized broadcast for power-efficient low-latency global-scale coordination and circuit-switch sub-networks for high-throughput data delivery. This network will scale for use in thousand core chip systems. At the physical level, SoI-based adiabatic coupler has been designed to provide low-loss and compact optical power splitting. Based on the adiabatic coupler, a topology based on 2-ary folded butterfly is designed to provide linear power division in a thousand core layout with minimal cross-overs. To address the network agility and provide for efficient use of optical bandwidth, a flow control and routing mechanism is introduced to dynamically allocate bandwidth and provide fairness usage of network resources. At the system level, bloom filter-based filtering for localization of communication are designed for reducing global traffic. In addition, a novel greedy-based data and workload migration are leveraged to increase the locality of communication in a NUCA (non-uniform cache access) architecture. First order analytic evaluation results have indicated that Hermes is scalable to at least 1024 cores and offers significant performance improvement and power savings over prior silicon photonic designs.
[ { "version": "v1", "created": "Sun, 19 Jan 2014 03:20:40 GMT" } ]
2014-01-21T00:00:00
[ [ "Mohamed", "Moustafa", "" ], [ "Li", "Zheng", "" ], [ "Chen", "Xi", "" ], [ "Mickelson", "Alan", "" ] ]
new_dataset
0.996399
1401.4795
Tuen Wai Ng
Wai-Shun Cheung and Tuen-Wai Ng
A Three-Dimensional Voting System in Hong Kong
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The voting system in the Legislative Council of Hong Kong (Legco) is sometimes unicameral and sometimes bicameral, depending on whether the bill is proposed by the Hong Kong government. Therefore, although without any representative within Legco, the Hong Kong government has certain degree of legislative power --- as if there is a virtual representative of the Hong Kong government within the Legco. By introducing such a virtual representative of the Hong Kong government, we show that Legco is a three-dimensional voting system. We also calculate two power indices of the Hong Kong government through this virtual representative and consider the $C$-dimension and the $W$-dimension of Legco. Finally, some implications of this Legco model to the current constitutional reform in Hong Kong will be given.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 05:58:50 GMT" } ]
2014-01-21T00:00:00
[ [ "Cheung", "Wai-Shun", "" ], [ "Ng", "Tuen-Wai", "" ] ]
new_dataset
0.991766
1401.4844
Rosy Madaan
Ashish Kumar Mourya, Niraj Singhal
Managing Congestion Control in Mobile AD-HOC Network Using Mobile Agents
9 Pages. IJCEA, 2014. arXiv admin note: substantial text overlap with arXiv:0907.5441 by other authors without attribution
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In mobile adhoc networks, congestion occurs with limited resources. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. TCP congestion control works very well on the Internet. But mobile adhoc networks exhibit some unique properties that greatly affect the design of appropriate protocols and protocol stacks in general, and of congestion control mechanism in particular. As it turned out, the vastly differing environment in a mobile adhoc network is highly problematic for standard TCP. Many approaches have been proposed to overcome these difficulties. Mobile agent based congestion control Technique is proposed to avoid congestion in adhoc network. When mobile agent travels through the network, it can select a less-loaded neighbor node as its next hop and update the routing table according to the node congestion status. With the aid of mobile agents, the nodes can get the dynamic network topology in time. In this paper, a mobile agent based congestion control mechanism is presented.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 09:51:07 GMT" } ]
2014-01-21T00:00:00
[ [ "Mourya", "Ashish Kumar", "" ], [ "Singhal", "Niraj", "" ] ]
new_dataset
0.996162
1401.4917
Philipp Winter
Philipp Winter and Stefan Lindskog
Spoiled Onions: Exposing Malicious Tor Exit Relays
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous. In this paper, we seek to expose malicious exit relays and document their actions. First, we monitored the Tor network after developing a fast and modular exit relay scanner. We implemented several scanning modules for detecting common attacks and used them to probe all exit relays over a period of four months. We discovered numerous malicious exit relays engaging in different attacks. To reduce the attack surface users are exposed to, we further discuss the design and implementation of a browser extension patch which fetches and compares suspicious X.509 certificates over independent Tor circuits. Our work makes it possible to continuously monitor Tor exit relays. We are able to detect and thwart many man-in-the-middle attacks which makes the network safer for its users. All our code is available under a free license.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 14:31:24 GMT" } ]
2014-01-21T00:00:00
[ [ "Winter", "Philipp", "" ], [ "Lindskog", "Stefan", "" ] ]
new_dataset
0.985261
1401.4932
Egor Ianovski
Egor Ianovski
The existential fragment of S1S over element and successor is the co-Buchi languages
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Buchi's theorem, in establishing the equivalence between languages definable in S1S over element and < and the omega-regular languages also demonstrated that S1S over element and < is no more expressive than its existential fragment. It is also easy to see that S1S over element and < is equi-expressive with S1S over element and successor. However, it is not immediately obvious whether it is possible to adapt Buchi's argument to establish equivalence between expressivity in S1S over element and successor and its existential fragment. In this paper we show that it is not: the existential fragment of S1S over element and successor is strictly less expressive, and is in fact equivalent to the co-Buchi languages.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 15:07:42 GMT" } ]
2014-01-21T00:00:00
[ [ "Ianovski", "Egor", "" ] ]
new_dataset
0.969489
1401.5051
Olivier Cur\'e
Olivier Cur\'e and Guillaume Blin and Dominique Revuz and David Faye
WaterFowl, a Compact, Self-indexed RDF Store with Inference-enabled Dictionaries
12 pages, 3 figures
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel approach -- called WaterFowl -- for the storage of RDF triples that addresses some key issues in the contexts of big data and the Semantic Web. The architecture of our prototype, largely based on the use of succinct data structures, enables the representation of triples in a self-indexed, compact manner without requiring decompression at query answering time. Moreover, it is adapted to efficiently support RDF and RDFS entailment regimes thanks to an optimized encoding of ontology concepts and properties that does not require a complete inference materialization or extensive query rewriting algorithms. This approach implies to make a distinction between the terminological and the assertional components of the knowledge base early in the process of data preparation, i.e., preprocessing the data before storing it in our structures. The paper describes the complete architecture of this system and presents some preliminary results obtained from evaluations conducted on our first prototype.
[ { "version": "v1", "created": "Mon, 20 Jan 2014 20:48:05 GMT" } ]
2014-01-21T00:00:00
[ [ "Curé", "Olivier", "" ], [ "Blin", "Guillaume", "" ], [ "Revuz", "Dominique", "" ], [ "Faye", "David", "" ] ]
new_dataset
0.978665
1401.4443
Remus Brad
Nusrat Fatema and Remus Brad
Attacks And Counterattacks On Wireless Sensor Networks
null
Nusrat Fatema and Remus Brad, Attacks and Counterattacks on Wireless Sensor Networks, International Journal of Ad hoc, Sensor and Ubiquitous Computing, vol. 4(6), pp. 1-15, December 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The application field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides solutions for the WSN threats
[ { "version": "v1", "created": "Fri, 17 Jan 2014 19:43:42 GMT" } ]
2014-01-20T00:00:00
[ [ "Fatema", "Nusrat", "" ], [ "Brad", "Remus", "" ] ]
new_dataset
0.989407
1401.4447
Abdul Kadir
Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa
Leaf Classification Using Shape, Color, and Texture Features
6 pages, International Journal of Computer Trends and Technology- July to Aug Issue 2011
null
null
null
cs.CV cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several methods to identify plants have been proposed by several researchers. Commonly, the methods did not capture color information, because color was not recognized as an important aspect to the identification. In this research, shape and vein, color, and texture features were incorporated to classify a leaf. In this case, a neural network called Probabilistic Neural network (PNN) was used as a classifier. The experimental result shows that the method for classification gives average accuracy of 93.75% when it was tested on Flavia dataset, that contains 32 kinds of plant leaves. It means that the method gives better performance compared to the original work.
[ { "version": "v1", "created": "Wed, 20 Nov 2013 07:55:40 GMT" } ]
2014-01-20T00:00:00
[ [ "Kadir", "Abdul", "" ], [ "Nugroho", "Lukito Edi", "" ], [ "Susanto", "Adhi", "" ], [ "Santosa", "Paulus Insap", "" ] ]
new_dataset
0.971598
0801.3239
Andrij Rovenchak
Solomiya Buk, Andrij Rovenchak
Online-concordance "Perekhresni stezhky" ("The Cross-Paths"), a novel by Ivan Franko
in Ukrainian
Ivan Franko: Spirit, Science, Thought, Will (Proceedings of the International Scientific Congress dedicated to the 150th anniversary (Lviv, 27 September -- 1 October 2006, Lviv University Press, Vol. 2, pp. 203-211, 2010)
null
null
cs.CL cs.DL
null
In the article, theoretical principles and practical realization for the compilation of the concordance to "Perekhresni stezhky" ("The Cross-Paths"), a novel by Ivan Franko, are described. Two forms for the context presentation are proposed. The electronic version of this lexicographic work is available online.
[ { "version": "v1", "created": "Mon, 21 Jan 2008 17:41:57 GMT" } ]
2014-01-17T00:00:00
[ [ "Buk", "Solomiya", "" ], [ "Rovenchak", "Andrij", "" ] ]
new_dataset
0.998241
1208.1151
Minglai Cai
Vladimir Blinovsky, Minglai Cai
Classical-Quantum Arbitrarily Varying Wiretap Channel
null
null
null
null
cs.IT math.IT quant-ph
http://creativecommons.org/licenses/by/3.0/
We derive a lower bound on the capacity of classical-quantum arbitrarily varying wiretap channel and determine the capacity of the classicalquantum arbitrarily varying wiretap channel with channel state information at the transmitter.
[ { "version": "v1", "created": "Mon, 6 Aug 2012 12:48:45 GMT" }, { "version": "v2", "created": "Mon, 1 Oct 2012 09:32:06 GMT" }, { "version": "v3", "created": "Mon, 15 Oct 2012 08:28:27 GMT" } ]
2014-01-17T00:00:00
[ [ "Blinovsky", "Vladimir", "" ], [ "Cai", "Minglai", "" ] ]
new_dataset
0.977188
1302.2082
Reza Parhizkar
Reza Parhizkar, Yann Barbotin and Martin Vetterli
Sequences with Minimal Time-Frequency Uncertainty
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central problem in signal processing and communications is to design signals that are compact both in time and frequency. Heisenberg's uncertainty principle states that a given function cannot be arbitrarily compact both in time and frequency, defining an "uncertainty" lower bound. Taking the variance as a measure of localization in time and frequency, Gaussian functions reach this bound for continuous-time signals. For sequences, however, this is not true; it is known that Heisenberg's bound is generally unachievable. For a chosen frequency variance, we formulate the search for "maximally compact sequences" as an exactly and efficiently solved convex optimization problem, thus providing a sharp uncertainty principle for sequences. Interestingly, the optimization formulation also reveals that maximally compact sequences are derived from Mathieu's harmonic cosine function of order zero. We further provide rational asymptotic expansions of this sharp uncertainty bound. We use the derived bounds as a benchmark to compare the compactness of well-known window functions with that of the optimal Mathieu's functions.
[ { "version": "v1", "created": "Fri, 8 Feb 2013 16:49:22 GMT" }, { "version": "v2", "created": "Wed, 13 Mar 2013 13:55:05 GMT" }, { "version": "v3", "created": "Thu, 16 Jan 2014 14:34:57 GMT" } ]
2014-01-17T00:00:00
[ [ "Parhizkar", "Reza", "" ], [ "Barbotin", "Yann", "" ], [ "Vetterli", "Martin", "" ] ]
new_dataset
0.97925
1302.5392
Nikola Milo\v{s}evi\'c MSc
Nikola Milo\v{s}evi\'c
History of malware
11 pages, 8 figures describing history and evolution of PC malware from first PC malware to Stuxnet, DoQu and Flame. This article has been withdrawed due some errors in text and publication in the jurnal that asked to withdraw article from other sources
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we will focus on history and evolution of malware and describe most important malwares.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 19:57:06 GMT" }, { "version": "v2", "created": "Sat, 6 Jul 2013 07:49:16 GMT" }, { "version": "v3", "created": "Thu, 16 Jan 2014 10:44:59 GMT" } ]
2014-01-17T00:00:00
[ [ "Milošević", "Nikola", "" ] ]
new_dataset
0.998579
1401.3280
Krzysztof Bar
Krzysztof Bar and Jamie Vicary
Groupoid Semantics for Thermal Computing
We describe a groupoid model for thermodynamic computation, and a quantization procedure that turns encrypted communication into quantum teleportation. Everything is done using higher category theory
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A groupoid semantics is presented for systems with both logical and thermal degrees of freedom. We apply this to a syntactic model for encryption, and obtain an algebraic characterization of the heat produced by the encryption function, as predicted by Landauer's principle. Our model has a linear representation theory that reveals an underlying quantum semantics, giving for the first time a functorial classical model for quantum teleportation and other quantum phenomena.
[ { "version": "v1", "created": "Tue, 14 Jan 2014 18:48:25 GMT" }, { "version": "v2", "created": "Thu, 16 Jan 2014 11:55:56 GMT" } ]
2014-01-17T00:00:00
[ [ "Bar", "Krzysztof", "" ], [ "Vicary", "Jamie", "" ] ]
new_dataset
0.980308
1401.3824
Xiaohan Wei
Xiaohan Wei, Michael J. Neely
Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper treats power-aware throughput maximization in a multi-user file downloading system. Each user can receive a new file only after its previous file is finished. The file state processes for each user act as coupled Markov chains that form a generalized restless bandit system. First, an optimal algorithm is derived for the case of one user. The algorithm maximizes throughput subject to an average power constraint. Next, the one-user algorithm is extended to a low complexity heuristic for the multi-user problem. The heuristic uses a simple online index policy and its effectiveness is shown via simulation. For simple 3-user cases where the optimal solution can be computed offline, the heuristic is shown to be near-optimal for a wide range of parameters.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 04:18:47 GMT" } ]
2014-01-17T00:00:00
[ [ "Wei", "Xiaohan", "" ], [ "Neely", "Michael J.", "" ] ]
new_dataset
0.976957
1401.3829
Amy Greenwald
Amy Greenwald, Seong Jae Lee, Victor Naroditskiy
RoxyBot-06: Stochastic Prediction and Optimization in TAC Travel
null
Journal Of Artificial Intelligence Research, Volume 36, pages 513-546, 2009
10.1613/jair.2904
null
cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe our autonomous bidding agent, RoxyBot, who emerged victorious in the travel division of the 2006 Trading Agent Competition in a photo finish. At a high level, the design of many successful trading agents can be summarized as follows: (i) price prediction: build a model of market prices; and (ii) optimization: solve for an approximately optimal set of bids, given this model. To predict, RoxyBot builds a stochastic model of market prices by simulating simultaneous ascending auctions. To optimize, RoxyBot relies on the sample average approximation method, a stochastic optimization technique.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 04:47:45 GMT" } ]
2014-01-17T00:00:00
[ [ "Greenwald", "Amy", "" ], [ "Lee", "Seong Jae", "" ], [ "Naroditskiy", "Victor", "" ] ]
new_dataset
0.988779
1401.3844
Yagil Engel
Yagil Engel, Michael P. Wellman
Multiattribute Auctions Based on Generalized Additive Independence
null
Journal Of Artificial Intelligence Research, Volume 37, pages 479-525, 2010
10.1613/jair.3002
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop multiattribute auctions that accommodate generalized additive independent (GAI) preferences. We propose an iterative auction mechanism that maintains prices on potentially overlapping GAI clusters of attributes, thus decreases elicitation and computational burden, and creates an open competition among suppliers over a multidimensional domain. Most significantly, the auction is guaranteed to achieve surplus which approximates optimal welfare up to a small additive factor, under reasonable equilibrium strategies of traders. The main departure of GAI auctions from previous literature is to accommodate non-additive trader preferences, hence allowing traders to condition their evaluation of specific attributes on the value of other attributes. At the same time, the GAI structure supports a compact representation of prices, enabling a tractable auction process. We perform a simulation study, demonstrating and quantifying the significant efficiency advantage of more expressive preference modeling. We draw random GAI-structured utility functions with various internal structures, generate additive functions that approximate the GAI utility, and compare the performance of the auctions using the two representations. We find that allowing traders to express existing dependencies among attributes improves the economic efficiency of multiattribute auctions.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 04:55:39 GMT" } ]
2014-01-17T00:00:00
[ [ "Engel", "Yagil", "" ], [ "Wellman", "Michael P.", "" ] ]
new_dataset
0.994462
1401.3888
Dmytro Korzhyk
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
null
Journal Of Artificial Intelligence Research, Volume 41, pages 297-327, 2011
10.1613/jair.3269
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the follower's surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty. We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defender's uncertainty about the attacker's ability to observe explicit.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 05:15:53 GMT" } ]
2014-01-17T00:00:00
[ [ "Korzhyk", "Dmytro", "" ], [ "Yin", "Zhengyu", "" ], [ "Kiekintveld", "Christopher", "" ], [ "Conitzer", "Vincent", "" ], [ "Tambe", "Milind", "" ] ]
new_dataset
0.994747
1401.3903
Noa Agmon
Noa Agmon, Gal A. Kaminka, Sarit Kraus
Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent
null
Journal Of Artificial Intelligence Research, Volume 42, pages 887-916, 2011
10.1613/jair.3365
null
cs.MA cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of adversarial multi-robot patrol has gained interest in recent years, mainly due to its immediate relevance to various security applications. In this problem, robots are required to repeatedly visit a target area in a way that maximizes their chances of detecting an adversary trying to penetrate through the patrol path. When facing a strong adversary that knows the patrol strategy of the robots, if the robots use a deterministic patrol algorithm, then in many cases it is easy for the adversary to penetrate undetected (in fact, in some of those cases the adversary can guarantee penetration). Therefore this paper presents a non-deterministic patrol framework for the robots. Assuming that the strong adversary will take advantage of its knowledge and try to penetrate through the patrols weakest spot, hence an optimal algorithm is one that maximizes the chances of detection in that point. We therefore present a polynomial-time algorithm for determining an optimal patrol under the Markovian strategy assumption for the robots, such that the probability of detecting the adversary in the patrols weakest spot is maximized. We build upon this framework and describe an optimal patrol strategy for several robotic models based on their movement abilities (directed or undirected) and sensing abilities (perfect or imperfect), and in different environment models - either patrol around a perimeter (closed polygon) or an open fence (open polyline).
[ { "version": "v1", "created": "Thu, 16 Jan 2014 05:21:33 GMT" } ]
2014-01-17T00:00:00
[ [ "Agmon", "Noa", "" ], [ "Kaminka", "Gal A.", "" ], [ "Kraus", "Sarit", "" ] ]
new_dataset
0.999088
1401.4151
Steve Schneider
Chris Culnane and Steve Schneider
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems
49 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the event of malfeasance. In practice, the election authority has responsibility for implementing the web bulletin board correctly and reliably, and will wish to ensure that it behaves correctly even in the presence of failures and attacks. To ensure robustness, an implementation will typically use a number of peers to be able to provide a correct service even when some peers go down or behave dishonestly. In this paper we propose a new protocol to implement such a Web Bulletin Board, motivated by the needs of the vVote verifiable voting system. Using a distributed algorithm increases the complexity of the protocol and requires careful reasoning in order to establish correctness. Here we use the Event-B modelling and refinement approach to establish correctness of the peered design against an idealised specification of the bulletin board behaviour. In particular we show that for n peers, a threshold of t > 2n/3 peers behaving correctly is sufficient to ensure correct behaviour of the bulletin board distributed design. The algorithm also behaves correctly even if honest or dishonest peers temporarily drop out of the protocol and then return. The verification approach also establishes that the protocols used within the bulletin board do not interfere with each other. This is the first time a peered web bulletin board suite of protocols has been formally verified.
[ { "version": "v1", "created": "Thu, 16 Jan 2014 20:11:42 GMT" } ]
2014-01-17T00:00:00
[ [ "Culnane", "Chris", "" ], [ "Schneider", "Steve", "" ] ]
new_dataset
0.981238
1307.8192
Yushi Uno
Akitoshi Kawamura, Takuma Okamoto, Yuichi Tatsu, Yushi Uno, and Masahide Yamato
Morpion Solitaire 5D: a new upper bound of 121 on the maximum score
7 pages, 3 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Morpion Solitaire is a pencil-and-paper game for a single player. A move in this game consists of putting a cross at a lattice point and then drawing a line segment that passes through exactly five consecutive crosses. The objective is to make as many moves as possible, starting from a standard initial configuration of crosses. For one of the variants of this game, called 5D, we prove an upper bound of 121 on the number of moves. This is done by introducing line-based analysis, and improves the known upper bound of 138 obtained by potential-based analysis.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 02:20:10 GMT" }, { "version": "v2", "created": "Wed, 15 Jan 2014 08:39:14 GMT" } ]
2014-01-16T00:00:00
[ [ "Kawamura", "Akitoshi", "" ], [ "Okamoto", "Takuma", "" ], [ "Tatsu", "Yuichi", "" ], [ "Uno", "Yushi", "" ], [ "Yamato", "Masahide", "" ] ]
new_dataset
0.995061
1401.0190
Jerome Jaffre
Adi Adimurthi (TIFR-CAM), G. D. Veerappa Gowda (TIFR-CAM), J\'er\^ome Jaffr\'e (Inria Paris-Rocquencourt)
The DFLU flux for systems of conservation laws
This paper is published in the Journal of Computational and Applied Mathematics 247 (2013) 102-123. arXiv admin note: substantial text overlap with arXiv:0908.0320
N&deg; RR-8442 (2013)
null
RR-8442
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The DFLU numerical flux was introduced in order to solve hyperbolic scalar conservation laws with a flux function discontinuous in space. We show how this flux can be used to solve certain class of systems of conservation laws such as systems modeling polymer flooding in oil reservoir engineering. Furthermore, these results are extended to the case where the flux function is discontinuous in the space variable. Such a situation arises for example while dealing with oil reservoirs which are heterogeneous. Numerical experiments are presented to illustrate the efficiency of this new scheme compared to other standard schemes like upstream mobility, Lax-Friedrichs and Force schemes.
[ { "version": "v1", "created": "Tue, 31 Dec 2013 17:09:32 GMT" } ]
2014-01-16T00:00:00
[ [ "Adimurthi", "Adi", "", "TIFR-CAM" ], [ "Gowda", "G. D. Veerappa", "", "TIFR-CAM" ], [ "Jaffré", "Jérôme", "", "Inria Paris-Rocquencourt" ] ]
new_dataset
0.995868
1401.3485
Boris Motik
Boris Motik, Rob Shearer, Ian Horrocks
Hypertableau Reasoning for Description Logics
null
Journal Of Artificial Intelligence Research, Volume 36, pages 165-228, 2009
10.1613/jair.2811
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel reasoning calculus for the description logic SHOIQ^+---a knowledge representation formalism with applications in areas such as the Semantic Web. Unnecessary nondeterminism and the construction of large models are two primary sources of inefficiency in the tableau-based reasoning calculi used in state-of-the-art reasoners. In order to reduce nondeterminism, we base our calculus on hypertableau and hyperresolution calculi, which we extend with a blocking condition to ensure termination. In order to reduce the size of the constructed models, we introduce anywhere pairwise blocking. We also present an improved nominal introduction rule that ensures termination in the presence of nominals, inverse roles, and number restrictions---a combination of DL constructs that has proven notoriously difficult to handle. Our implementation shows significant performance improvements over state-of-the-art reasoners on several well-known ontologies.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 05:37:06 GMT" } ]
2014-01-16T00:00:00
[ [ "Motik", "Boris", "" ], [ "Shearer", "Rob", "" ], [ "Horrocks", "Ian", "" ] ]
new_dataset
0.987433
1401.3487
Alessandro Artale
Alessandro Artale, Diego Calvanese, Roman Kontchakov, Michael Zakharyaschev
The DL-Lite Family and Relations
null
Journal Of Artificial Intelligence Research, Volume 36, pages 1-69, 2009
10.1613/jair.2820
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recently introduced series of description logics under the common moniker DL-Lite has attracted attention of the description logic and semantic web communities due to the low computational complexity of inference, on the one hand, and the ability to represent conceptual modeling formalisms, on the other. The main aim of this article is to carry out a thorough and systematic investigation of inference in extensions of the original DL-Lite logics along five axes: by (i) adding the Boolean connectives and (ii) number restrictions to concept constructs, (iii) allowing role hierarchies, (iv) allowing role disjointness, symmetry, asymmetry, reflexivity, irreflexivity and transitivity constraints, and (v) adopting or dropping the unique same assumption. We analyze the combined complexity of satisfiability for the resulting logics, as well as the data complexity of instance checking and answering positive existential queries. Our approach is based on embedding DL-Lite logics in suitable fragments of the one-variable first-order logic, which provides useful insights into their properties and, in particular, computational behavior.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 05:37:57 GMT" } ]
2014-01-16T00:00:00
[ [ "Artale", "Alessandro", "" ], [ "Calvanese", "Diego", "" ], [ "Kontchakov", "Roman", "" ], [ "Zakharyaschev", "Michael", "" ] ]
new_dataset
0.996932
1401.3490
William Yeoh
William Yeoh, Ariel Felner, Sven Koenig
BnB-ADOPT: An Asynchronous Branch-and-Bound DCOP Algorithm
null
Journal Of Artificial Intelligence Research, Volume 38, pages 85-133, 2010
10.1613/jair.2849
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed constraint optimization (DCOP) problems are a popular way of formulating and solving agent-coordination problems. A DCOP problem is a problem where several agents coordinate their values such that the sum of the resulting constraint costs is minimal. It is often desirable to solve DCOP problems with memory-bounded and asynchronous algorithms. We introduce Branch-and-Bound ADOPT (BnB-ADOPT), a memory-bounded asynchronous DCOP search algorithm that uses the message-passing and communication framework of ADOPT (Modi, Shen, Tambe, and Yokoo, 2005), a well known memory-bounded asynchronous DCOP search algorithm, but changes the search strategy of ADOPT from best-first search to depth-first branch-and-bound search. Our experimental results show that BnB-ADOPT finds cost-minimal solutions up to one order of magnitude faster than ADOPT for a variety of large DCOP problems and is as fast as NCBB, a memory-bounded synchronous DCOP search algorithm, for most of these DCOP problems. Additionally, it is often desirable to find bounded-error solutions for DCOP problems within a reasonable amount of time since finding cost-minimal solutions is NP-hard. The existing bounded-error approximation mechanism allows users only to specify an absolute error bound on the solution cost but a relative error bound is often more intuitive. Thus, we present two new bounded-error approximation mechanisms that allow for relative error bounds and implement them on top of BnB-ADOPT.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 05:39:26 GMT" } ]
2014-01-16T00:00:00
[ [ "Yeoh", "William", "" ], [ "Felner", "Ariel", "" ], [ "Koenig", "Sven", "" ] ]
new_dataset
0.994442
1401.3519
Kamlesh Sharma
Kamlesh Sharma, Dr. T.V Prasad
Swar The Voice Operated PC
4 pages, 1 figure
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Keyboard, although a popular medium, is not very convenient as it requires a certain amount of skill for effective usage. A mouse on the other hand requires a good hand-eye co-ordination. Also current computer interfaces also assume a certain level of literacy from the user. It also expect the user to have certain level of proficiency in English. In our country where the literacy level is as low as 50% in some states, if information technology has to reach the grass root level; these constraints have to be eliminated. As a solution for these, Speech Recognition and hence the concept of Voice operated computer system comes into picture. In this paper we propose a technique to develop a voice recognition system which will be used for controlling computer via speech input from any user i.e. without the use of mouse and / or keyboard. Once developed this system would be of great benefit to physically handicapped people as Instead of scrolling through written procedures on a laptop or handheld computer, they can wear a headset and have their hands and eyes free.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 08:58:56 GMT" } ]
2014-01-16T00:00:00
[ [ "Sharma", "Kamlesh", "" ], [ "Prasad", "Dr. T. V", "" ] ]
new_dataset
0.999534
1401.3623
Ankit Mundra
Ankit Mundra, Geetanjali Rathee, Meenu Chawla, Nitin Rakesh, Ashsutosh Soni
Transport Information System using Query Centric Cyber Physical Systems (QCPS)
5 pages, 4 Figures
International Journal of Computer Applications 85(3):12-16, January 2014. Published by Foundation of Computer Science, New York, USA
10.5120/14820-3050
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To incorporate the computation and communication with the physical world, next generation architecture i.e. CPS is viewed as a new technology. To improve the better interaction with the physical world or to perk up the electricity delivery usage, various CPS based approaches have been introduced. Recently several GPS equipped smart phones and sensor based frameworks have been proposed which provide various services i.e. environment estimation, road safety improvement but encounter certain limitations like elevated energy consumption and high computation cost. To meet the high reliability and safety requirements, this paper introduces a novel approach based on QCPS model which provides several users services (discussed in this paper). Further, this paper proposed a Transport Information System (TIS), which provide the communication with lower cost overhead by arranging the similar sensors in the form of grids. Each grid has a coordinator which interacts with cloud to process the user query. In order to evaluate the performance of proposed approach we have implemented a test bed of 16 wireless sensor nodes and have shown the performance in terms of computation and communication cost.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 15:19:42 GMT" } ]
2014-01-16T00:00:00
[ [ "Mundra", "Ankit", "" ], [ "Rathee", "Geetanjali", "" ], [ "Chawla", "Meenu", "" ], [ "Rakesh", "Nitin", "" ], [ "Soni", "Ashsutosh", "" ] ]
new_dataset
0.976634
1401.3660
Andrea Munari
Andrea Munari, Michael Heindlmaier, Gianluigi Liva, Matteo Berioli
The Throughput of Slotted Aloha with Diversity
Accepted for publications at 51st Annual Allerton Conference on Communication, Control, and Computing
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a simple variation of classical Slotted Aloha is introduced and analyzed. The enhancement relies on adding multiple receivers that gather different observations of the packets transmitted by a user population in one slot. For each observation, the packets transmitted in one slot are assumed to be subject to independent on-off fading, so that each of them is either completely faded, and then does not bring any power or interference at the receiver, or it arrives unfaded, and then may or may not, collide with other unfaded transmissions. With this model, a novel type of diversity is introduced to the conventional SA scheme, leading to relevant throughput gains already for moderate number of receivers. The analytical framework that we introduce allows to derive closed-form expression of both throughput and packet loss rate an arbitrary number of receivers, providing interesting hints on the key trade-offs that characterize the system. We then focus on the problem of having receivers forward the full set of collected packets to a final gateway using the minimum possible amount of resources, i.e., avoiding delivery of duplicate packets, without allowing any exchange of information among them. We derive what is the minimum amount of resources needed and propose a scheme based on random linear network coding that achieves asymptotically this bound without the need for the receivers to coordinate among them.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 16:53:09 GMT" } ]
2014-01-16T00:00:00
[ [ "Munari", "Andrea", "" ], [ "Heindlmaier", "Michael", "" ], [ "Liva", "Gianluigi", "" ], [ "Berioli", "Matteo", "" ] ]
new_dataset
0.996076
1202.5150
Emil Stefanov
Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas
Path ORAM: An Extremely Simple Oblivious RAM Protocol
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM has a O(log N) bandwidth cost for blocks of size B = Omega(log^2 N) bits. For such block sizes, Path ORAM is asymptotically better than the best known ORAM schemes with small client storage. Due to its practicality, Path ORAM has been adopted in the design of secure processors since its proposal.
[ { "version": "v1", "created": "Thu, 23 Feb 2012 11:05:34 GMT" }, { "version": "v2", "created": "Fri, 17 May 2013 21:53:37 GMT" }, { "version": "v3", "created": "Tue, 14 Jan 2014 01:29:02 GMT" } ]
2014-01-15T00:00:00
[ [ "Stefanov", "Emil", "" ], [ "van Dijk", "Marten", "" ], [ "Shi", "Elaine", "" ], [ "Chan", "T-H. Hubert", "" ], [ "Fletcher", "Christopher", "" ], [ "Ren", "Ling", "" ], [ "Yu", "Xiangyao", "" ], [ "Devadas", "Srinivas", "" ] ]
new_dataset
0.999842
1401.3088
Stefano Tomasin
Stefano Tomasin and Nicola Laurenti
Secret Message Transmission by HARQ with Multiple Encoding
Proc. Int. Conference on Communications (ICC) 2014
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure transmission between two agents, Alice and Bob, over block fading channels can be achieved similarly to conventional hybrid automatic repeat request (HARQ) by letting Alice transmit multiple blocks, each containing an encoded version of the secret message, until Bob informs Alice about successful decoding by a public error-free return channel. In existing literature each block is a differently punctured version of a single codeword generated with a Wyner code that uses a common randomness for all blocks. In this paper instead we propose a more general approach where multiple codewords are generated from independent randomnesses. The class of channels for which decodability and secrecy is ensured is characterized, with derivations for the existence of secret codes. We show in particular that the classes are not a trivial subset (or superset) of those of existing schemes, thus highlighting the novelty of the proposed solution. The result is further confirmed by deriving the average achievable secrecy throughput, thus taking into account both decoding and secrecy outage.
[ { "version": "v1", "created": "Tue, 14 Jan 2014 07:26:54 GMT" } ]
2014-01-15T00:00:00
[ [ "Tomasin", "Stefano", "" ], [ "Laurenti", "Nicola", "" ] ]
new_dataset
0.98985
1401.3090
Bin Guo
Bin Guo, Zhiwen Yu, Daqing Zhang, Xingshe Zhou
From Participatory Sensing to Mobile Crowd Sensing
null
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research on the efforts of combining human and machine intelligence has a long history. With the development of mobile sensing and mobile Internet techniques, a new sensing paradigm called Mobile Crowd Sensing (MCS), which leverages the power of citizens for large-scale sensing has become popular in recent years. As an evolution of participatory sensing, MCS has two unique features: (1) it involves both implicit and explicit participation; (2) MCS collects data from two user-participant data sources: mobile social networks and mobile sensing. This paper presents the literary history of MCS and its unique issues. A reference framework for MCS systems is also proposed. We further clarify the potential fusion of human and machine intelligence in MCS. Finally, we discuss the future research trends as well as our efforts to MCS.
[ { "version": "v1", "created": "Tue, 14 Jan 2014 07:32:50 GMT" } ]
2014-01-15T00:00:00
[ [ "Guo", "Bin", "" ], [ "Yu", "Zhiwen", "" ], [ "Zhang", "Daqing", "" ], [ "Zhou", "Xingshe", "" ] ]
new_dataset
0.992227
1112.3471
Girish Nair
Girish N. Nair
A Nonstochastic Information Theory for Communication and State Estimation
null
IEEE Transactions on Automatic Control 58 (2013) 1497-1510
10.1109/TAC.2013.2241491
null
cs.SY cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In communications, unknown variables are usually modelled as random variables, and concepts such as independence, entropy and information are defined in terms of the underlying probability distributions. In contrast, control theory often treats uncertainties and disturbances as bounded unknowns having no statistical structure. The area of networked control combines both fields, raising the question of whether it is possible to construct meaningful analogues of stochastic concepts such as independence, Markovness, entropy and information without assuming a probability space. This paper introduces a framework for doing so, leading to the construction of a maximin information functional for nonstochastic variables. It is shown that the largest maximin information rate through a memoryless, error-prone channel in this framework coincides with the block-coding zero-error capacity of the channel. Maximin information is then used to derive tight conditions for uniformly estimating the state of a linear time-invariant system over such a channel, paralleling recent results of Matveev and Savkin.
[ { "version": "v1", "created": "Thu, 15 Dec 2011 10:33:11 GMT" }, { "version": "v2", "created": "Tue, 3 Jan 2012 05:09:41 GMT" }, { "version": "v3", "created": "Thu, 5 Jul 2012 08:19:11 GMT" }, { "version": "v4", "created": "Tue, 11 Sep 2012 15:58:53 GMT" }, { "version": "v5", "created": "Sat, 11 Jan 2014 16:49:10 GMT" } ]
2014-01-14T00:00:00
[ [ "Nair", "Girish N.", "" ] ]
new_dataset
0.99398
1401.2468
Erich Schikuta
Erich Schikuta and Erwin Mann
N2Sky - Neural Networks as Services in the Clouds
extended version of paper published at IJCNN 2013
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the N2Sky system, which provides a framework for the exchange of neural network specific knowledge, as neural network paradigms and objects, by a virtual organization environment. It follows the sky computing paradigm delivering ample resources by the usage of federated Clouds. N2Sky is a novel Cloud-based neural network simulation environment, which follows a pure service oriented approach. The system implements a transparent environment aiming to enable both novice and experienced users to do neural network research easily and comfortably. N2Sky is built using the RAVO reference architecture of virtual organizations which allows itself naturally integrating into the Cloud service stack (SaaS, PaaS, and IaaS) of service oriented architectures.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 21:09:36 GMT" } ]
2014-01-14T00:00:00
[ [ "Schikuta", "Erich", "" ], [ "Mann", "Erwin", "" ] ]
new_dataset
0.994158
1401.2482
Marko Horvat
Marko Horvat, Nikola Bogunovi\'c, Kre\v{s}imir \'Cosi\'c
STIMONT: A core ontology for multimedia stimuli description
27 pages, 13 figures
Multimedia tools and applications, 11042, July 2013
10.1007/s11042-013-1624-4
null
cs.MM cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Affective multimedia documents such as images, sounds or videos elicit emotional responses in exposed human subjects. These stimuli are stored in affective multimedia databases and successfully used for a wide variety of research in psychology and neuroscience in areas related to attention and emotion processing. Although important all affective multimedia databases have numerous deficiencies which impair their applicability. These problems, which are brought forward in the paper, result in low recall and precision of multimedia stimuli retrieval which makes creating emotion elicitation procedures difficult and labor-intensive. To address these issues a new core ontology STIMONT is introduced. The STIMONT is written in OWL-DL formalism and extends W3C EmotionML format with an expressive and formal representation of affective concepts, high-level semantics, stimuli document metadata and the elicited physiology. The advantages of ontology in description of affective multimedia stimuli are demonstrated in a document retrieval experiment and compared against contemporary keyword-based querying methods. Also, a software tool Intelligent Stimulus Generator for retrieval of affective multimedia and construction of stimuli sequences is presented.
[ { "version": "v1", "created": "Fri, 10 Jan 2014 23:36:51 GMT" } ]
2014-01-14T00:00:00
[ [ "Horvat", "Marko", "" ], [ "Bogunović", "Nikola", "" ], [ "Ćosić", "Krešimir", "" ] ]
new_dataset
0.996859
1401.2514
Abhijit Bhattacharya
Abhijit Bhattacharya, Akhila Rao, K. P. Naveen, P. P. Nishanth, S.V.R. Anand, and Anurag Kumar
QoS Constrained Optimal Sink and Relay Placement in Planned Wireless Sensor Networks
null
null
null
null
cs.NI cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are given a set of sensors at given locations, a set of potential locations for placing base stations (BSs, or sinks), and another set of potential locations for placing wireless relay nodes. There is a cost for placing a BS and a cost for placing a relay. The problem we consider is to select a set of BS locations, a set of relay locations, and an association of sensor nodes with the selected BS locations, so that number of hops in the path from each sensor to its BS is bounded by hmax, and among all such feasible networks, the cost of the selected network is the minimum. The hop count bound suffices to ensure a certain probability of the data being delivered to the BS within a given maximum delay under a light traffic model. We observe that the problem is NP-Hard, and is hard to even approximate within a constant factor. For this problem, we propose a polynomial time approximation algorithm (SmartSelect) based on a relay placement algorithm proposed in our earlier work, along with a modification of the greedy algorithm for weighted set cover. We have analyzed the worst case approximation guarantee for this algorithm. We have also proposed a polynomial time heuristic to improve upon the solution provided by SmartSelect. Our numerical results demonstrate that the algorithms provide good quality solutions using very little computation time in various randomly generated network scenarios.
[ { "version": "v1", "created": "Sat, 11 Jan 2014 08:44:47 GMT" } ]
2014-01-14T00:00:00
[ [ "Bhattacharya", "Abhijit", "" ], [ "Rao", "Akhila", "" ], [ "Naveen", "K. P.", "" ], [ "Nishanth", "P. P.", "" ], [ "Anand", "S. V. R.", "" ], [ "Kumar", "Anurag", "" ] ]
new_dataset
0.999578
1401.2688
Kiran Sree Pokkuluri Prof
Pokkuluri Kiran Sree, Inamupudi Ramesh Babu, SSSN Usha Devi N
PSMACA: An Automated Protein Structure Prediction Using MACA (Multiple Attractor Cellular Automata)
6 pages. arXiv admin note: substantial text overlap with arXiv:1310.4342, arXiv:1310.4495
Journal of Bioinformatics and Intelligent Control Vol 2, pp 211--215, 2013
10.1166/jbic.2013.1052
null
cs.CE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protein Structure Predication from sequences of amino acid has gained a remarkable attention in recent years. Even though there are some prediction techniques addressing this problem, the approximate accuracy in predicting the protein structure is closely 75%. An automated procedure was evolved with MACA (Multiple Attractor Cellular Automata) for predicting the structure of the protein. Most of the existing approaches are sequential which will classify the input into four major classes and these are designed for similar sequences. PSMACA is designed to identify ten classes from the sequences that share twilight zone similarity and identity with the training sequences. This method also predicts three states (helix, strand, and coil) for the structure. Our comprehensive design considers 10 feature selection methods and 4 classifiers to develop MACA (Multiple Attractor Cellular Automata) based classifiers that are build for each of the ten classes. We have tested the proposed classifier with twilight-zone and 1-high-similarity benchmark datasets with over three dozens of modern competing predictors shows that PSMACA provides the best overall accuracy that ranges between 77% and 88.7% depending on the dataset.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 00:38:52 GMT" } ]
2014-01-14T00:00:00
[ [ "Sree", "Pokkuluri Kiran", "" ], [ "Babu", "Inamupudi Ramesh", "" ], [ "N", "SSSN Usha Devi", "" ] ]
new_dataset
0.999035
1401.2716
Lingfei Jin
Yang Ding, Lingfei Jin and Chaoping Xing
Erasure List-Decodable Codes from Random and Algebraic Geometry Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure list decoding was introduced to correct a larger number of erasures with output of a list of possible candidates. In the present paper, we consider both random linear codes and algebraic geometry codes for list decoding erasure errors. The contributions of this paper are two-fold. Firstly, we show that, for arbitrary $0<R<1$ and $\epsilon>0$ ($R$ and $\epsilon$ are independent), with high probability a random linear code is an erasure list decodable code with constant list size $2^{O(1/\epsilon)}$ that can correct a fraction $1-R-\epsilon$ of erasures, i.e., a random linear code achieves the information-theoretic optimal trade-off between information rate and fraction of erasure errors. Secondly, we show that algebraic geometry codes are good erasure list-decodable codes. Precisely speaking, for any $0<R<1$ and $\epsilon>0$, a $q$-ary algebraic geometry code of rate $R$ from the Garcia-Stichtenoth tower can correct $1-R-\frac{1}{\sqrt{q}-1}+\frac{1}{q}-\epsilon$ fraction of erasure errors with list size $O(1/\epsilon)$. This improves the Johnson bound applied to algebraic geometry codes. Furthermore, list decoding of these algebraic geometry codes can be implemented in polynomial time.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 05:33:15 GMT" } ]
2014-01-14T00:00:00
[ [ "Ding", "Yang", "" ], [ "Jin", "Lingfei", "" ], [ "Xing", "Chaoping", "" ] ]
new_dataset
0.999434
1401.2920
Vincenzo De Florio
Vincenzo De Florio, Greet Deconinck, Rudy Lauwereins
The EFTOS Voting Farm: A Software Tool for Fault Masking in Message Passing Parallel Environments
Proc. of the 24th EUROMICRO Conf. on Engineering Systems and Software for the next decade, Vaesteras, Sweden, August 25-27, 1998; pp. 379-386
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a set of C functions implementing a distributed software voting mechanism for EPX or similar message passing environments, and we place it within the EFTOS framework (Embedded Fault-Tolerant Supercomputing, ESPRIT-IV Project 21012) of software tools for enhancing the dependability of a user application. The described mechanism can be used for instance to implement restoring organs i.e., N-modular redundancy systems with N-replicated voters. We show that, besides structural design goals like fault transparency, this tool achieves replication transparency, a high degree of flexibility and ease-of-use, and good performance.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 17:14:44 GMT" } ]
2014-01-14T00:00:00
[ [ "De Florio", "Vincenzo", "" ], [ "Deconinck", "Greet", "" ], [ "Lauwereins", "Rudy", "" ] ]
new_dataset
0.982863
1107.0845
Sparisoma Viridi
Suprijadi, Thomas Muliawan, Sparisoma Viridi
Automatic Road Lighting System (ARLS) Model Based on Image Processing of Moving Object
5 pages, 8 figures, 1 table, submitted to ARPN Journal of Science and Technology
ARPN Journal of Science and Technology 3 (12), 1105-1109 (2013)
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
Using a vehicle toy (in next future called vehicle) as a moving object an automatic road lighting system (ARLS) model is constructed. A digital video camera with 25 fps is used to capture the vehicle motion as it moves in the test segment of the road. Captured images are then processed to calculate vehicle speed. This information of the speed together with position of vehicle is then used to control the lighting system along the path that passes by the vehicle. Length of the road test segment is 1 m, the video camera is positioned about 1.1 m above the test segment, and the vehicle toy dimension is 13 cm \times 9.3 cm. In this model, the maximum speed that ARLS can handle is about 1.32 m/s, and the highest performance is obtained about 91% at speed 0.93 m/s.
[ { "version": "v1", "created": "Tue, 5 Jul 2011 11:06:04 GMT" }, { "version": "v2", "created": "Wed, 13 Jul 2011 00:26:49 GMT" }, { "version": "v3", "created": "Fri, 19 Aug 2011 06:32:43 GMT" }, { "version": "v4", "created": "Wed, 27 Nov 2013 03:39:17 GMT" } ]
2014-01-13T00:00:00
[ [ "Suprijadi", "", "" ], [ "Muliawan", "Thomas", "" ], [ "Viridi", "Sparisoma", "" ] ]
new_dataset
0.998036
1401.2165
Stefanie Roos
Stefanie Roos, Thorsten Strufe
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings
23 pages, 2 figures
null
null
null
cs.DS cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social Overlays suffer from high message delivery delays due to insufficient routing strategies. Limiting connections to device pairs that are owned by individuals with a mutual trust relationship in real life, they form topologies restricted to a subgraph of the social network of their users. While centralized, highly successful social networking services entail a complete privacy loss of their users, Social Overlays at higher performance represent an ideal private and censorship-resistant communication substrate for the same purpose. Routing in such restricted topologies is facilitated by embedding the social graph into a metric space. Decentralized routing algorithms have up to date mainly been analyzed under the assumption of a perfect lattice structure. However, currently deployed embedding algorithms for privacy-preserving Social Overlays cannot achieve a sufficiently accurate embedding and hence conventional routing algorithms fail. Developing Social Overlays with acceptable performance hence requires better models and enhanced algorithms, which guarantee convergence in the presence of local optima with regard to the distance to the target. We suggest a model for Social Overlays that includes inaccurate embeddings and arbitrary degree distributions. We further propose NextBestOnce, a routing algorithm that can achieve polylog routing length despite local optima. We provide analytical bounds on the performance of NextBestOnce assuming a scale-free degree distribution, and furthermore show that its performance can be improved by more than a constant factor when including Neighbor-of-Neighbor information in the routing decisions.
[ { "version": "v1", "created": "Thu, 9 Jan 2014 21:05:57 GMT" } ]
2014-01-13T00:00:00
[ [ "Roos", "Stefanie", "" ], [ "Strufe", "Thorsten", "" ] ]
new_dataset
0.997513
1401.1887
Li Shuxing
Shuxing Li, Tao Feng, Gennian Ge
On the Weight Distribution of Cyclic Codes with Niho Exponents
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been intensive research on the weight distributions of cyclic codes. In this paper, we compute the weight distributions of three classes of cyclic codes with Niho exponents. More specifically, we obtain two classes of binary three-weight and four-weight cyclic codes and a class of nonbinary four-weight cyclic codes. The weight distributions follow from the determination of value distributions of certain exponential sums. Several examples are presented to show that some of our codes are optimal and some have the best known parameters.
[ { "version": "v1", "created": "Thu, 9 Jan 2014 04:38:18 GMT" } ]
2014-01-10T00:00:00
[ [ "Li", "Shuxing", "" ], [ "Feng", "Tao", "" ], [ "Ge", "Gennian", "" ] ]
new_dataset
0.99637
1401.2058
Rachit Puri
Rachit Puri
Gesture recognition based mouse events
9 pages, IJCSIT
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
This paper presents the maneuver of mouse pointer and performs various mouse operations such as left click, right click, double click, drag etc using gestures recognition technique. Recognizing gestures is a complex task which involves many aspects such as motion modeling, motion analysis, pattern recognition and machine learning. Keeping all the essential factors in mind a system has been created which recognizes the movement of fingers and various patterns formed by them. Color caps have been used for fingers to distinguish it from the background color such as skin color. Thus recognizing the gestures various mouse events have been performed. The application has been created on MATLAB environment with operating system as windows 7.
[ { "version": "v1", "created": "Thu, 9 Jan 2014 16:26:54 GMT" } ]
2014-01-10T00:00:00
[ [ "Puri", "Rachit", "" ] ]
new_dataset
0.999307
1310.6485
Reza Hooshmand
Reza Hooshmand
Secret Key Cryptosystem based on Non-Systematic Polar Codes
null
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension. Moreover, regarding computational security, it is assumed that an attacker with a restricted processing power has unlimited access to the transmission media. Therefore, the attacker can construct the generator matrix of polar codes, especially in the case of Binary Erasure Channels, on which this matrix can be easily constructed. In this paper, we introduce a novel method to keep the generator matrix of polar codes in secret in a way that the attacker cannot access the required information to decode the intended polar code. With the help of this method, a secret key cryptosystem is proposed based on non-systematic polar codes. In fact, the main objective of this study is to achieve an acceptable level of security and reliability through taking advantage of the special properties of polar codes. The analyses revealed that our scheme resists the typical attacks on the secret key cryptosystems based on linear block codes. In addition, by employing some efficient methods, the key length of the proposed scheme is decreased compared to that of the previous cryptosystems. Moreover, this scheme enjoys other advantages including high code rate, and proper error performance as well.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 04:55:37 GMT" }, { "version": "v2", "created": "Tue, 7 Jan 2014 03:56:58 GMT" } ]
2014-01-08T00:00:00
[ [ "Hooshmand", "Reza", "" ] ]
new_dataset
0.999621
1401.1232
Yeray Cachon YC
Yeray Cachon Santana
A Cryptographic Scheme Of Mellin Transform
Cryptography using Mellin's transform
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper it has been developed an algorithm for cryptography, using the Mellin's transform. Cryptography is very important to protect data to ensure that two people, using an insecure channel, may communicate in a secure way. In the present age, ensure the communications will essential to shared data that have to be protected. The original message is a plain text, and the encrypted form as cipher text. The cipher text message contains all the information of the plain text, but is cannot be read from a human without a key and a method to decrypt it.
[ { "version": "v1", "created": "Mon, 6 Jan 2014 22:50:30 GMT" } ]
2014-01-08T00:00:00
[ [ "Santana", "Yeray Cachon", "" ] ]
new_dataset
0.986506
1401.1318
Chandra Sekhar Mr
Vorugunti Chandra Sekhar and Mrudula Sarvabhatla
A Robust Biometric-Based Three-factor Remote User Authentication Scheme
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnerable to known session specific temporary information attack, on successfully performing the attack, the adversary can perform all other major cryptographic attacks. As a part of our contribution, we will propose an improved scheme which is resistance to all major cryptographic attacks and overcomes the defects in Ankita et al. scheme.
[ { "version": "v1", "created": "Tue, 7 Jan 2014 09:29:57 GMT" } ]
2014-01-08T00:00:00
[ [ "Sekhar", "Vorugunti Chandra", "" ], [ "Sarvabhatla", "Mrudula", "" ] ]
new_dataset
0.992938
1401.0734
Megasthenis Asteris
Megasthenis Asteris, Alexandros G. Dimakis
Repairable Fountain Codes
To appear in IEEE Journal on Selected Areas in Communications, Issue on Communication Methodologies for Next-Generation Storage Systems 2013, 11 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new family of Fountain codes that are systematic and also have sparse parities. Given an input of $k$ symbols, our codes produce an unbounded number of output symbols, generating each parity independently by linearly combining a logarithmic number of randomly selected input symbols. The construction guarantees that for any $\epsilon>0$ accessing a random subset of $(1+\epsilon)k$ encoded symbols, asymptotically suffices to recover the $k$ input symbols with high probability. Our codes have the additional benefit of logarithmic locality: a single lost symbol can be repaired by accessing a subset of $O(\log k)$ of the remaining encoded symbols. This is a desired property for distributed storage systems where symbols are spread over a network of storage nodes. Beyond recovery upon loss, local reconstruction provides an efficient alternative for reading symbols that cannot be accessed directly. In our code, a logarithmic number of disjoint local groups is associated with each systematic symbol, allowing multiple parallel reads. Our main mathematical contribution involves analyzing the rank of sparse random matrices with specific structure over finite fields. We rely on establishing that a new family of sparse random bipartite graphs have perfect matchings with high probability.
[ { "version": "v1", "created": "Fri, 3 Jan 2014 21:18:12 GMT" } ]
2014-01-07T00:00:00
[ [ "Asteris", "Megasthenis", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
new_dataset
0.997728
1401.1190
Purnendu Banerjee
Souvik Bhowmick, Purnendu Banerjee
Bangla Text Recognition from Video Sequence: A New Focus
null
NATIONAL CONFERENCE ON COMPUTING AND SYSTEMS (NaCCS), pp. 62-67,2012
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extraction and recognition of Bangla text from video frame images is challenging due to complex color background, low-resolution etc. In this paper, we propose an algorithm for extraction and recognition of Bangla text form such video frames with complex background. Here, a two-step approach has been proposed. First, the text line is segmented into words using information based on line contours. First order gradient value of the text blocks are used to find the word gap. Next, a local binarization technique is applied on each word and text line is reconstructed using those words. Secondly, this binarized text block is sent to OCR for recognition purpose.
[ { "version": "v1", "created": "Mon, 6 Jan 2014 20:25:26 GMT" } ]
2014-01-07T00:00:00
[ [ "Bhowmick", "Souvik", "" ], [ "Banerjee", "Purnendu", "" ] ]
new_dataset
0.99841
1312.0910
Derek Groen
Derek Groen, Steven Rieder and Simon Portegies Zwart
MPWide: a light-weight library for efficient message passing over wide area networks
accepted by the Journal Of Open Research Software, 13 pages, 4 figures, 1 table
Journal of Open Research Software 1(1):e9, 2013
10.5334/jors.ah
null
cs.DC cs.NI
http://creativecommons.org/licenses/by/3.0/
We present MPWide, a light weight communication library which allows efficient message passing over a distributed network. MPWide has been designed to connect application running on distributed (super)computing resources, and to maximize the communication performance on wide area networks for those without administrative privileges. It can be used to provide message-passing between application, move files, and make very fast connections in client-server environments. MPWide has already been applied to enable distributed cosmological simulations across up to four supercomputers on two continents, and to couple two different bloodflow simulations to form a multiscale simulation.
[ { "version": "v1", "created": "Tue, 3 Dec 2013 19:17:57 GMT" } ]
2014-01-06T00:00:00
[ [ "Groen", "Derek", "" ], [ "Rieder", "Steven", "" ], [ "Zwart", "Simon Portegies", "" ] ]
new_dataset
0.96651
1401.0561
Janne Lindqvist
Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, Teemu Roos
User-Generated Free-Form Gestures for Authentication: Security and Memorability
null
null
null
null
cs.CR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we collected a dataset with a generate-test-retest paradigm where participants (N=63) generated free-form gestures, repeated them, and were later retested for memory. Half of the participants decided to generate one-finger gestures, and the other half generated multi-finger gestures. Although there has been recent work on template-based gestures, there are yet no metrics to analyze security of either template or free-form gestures. For example, entropy-based metrics used for text-based passwords are not suitable for capturing the security and memorability of free-form gestures. Hence, we modify a recently proposed metric for analyzing information capacity of continuous full-body movements for this purpose. Our metric computed estimated mutual information in repeated sets of gestures. Surprisingly, one-finger gestures had higher average mutual information. Gestures with many hard angles and turns had the highest mutual information. The best-remembered gestures included signatures and simple angular shapes. We also implemented a multitouch recognizer to evaluate the practicality of free-form gestures in a real authentication system and how they perform against shoulder surfing attacks. We conclude the paper with strategies for generating secure and memorable free-form gestures, which present a robust method for mobile authentication.
[ { "version": "v1", "created": "Thu, 2 Jan 2014 23:15:27 GMT" } ]
2014-01-06T00:00:00
[ [ "Sherman", "Michael", "" ], [ "Clark", "Gradeigh", "" ], [ "Yang", "Yulong", "" ], [ "Sugrim", "Shridatt", "" ], [ "Modig", "Arttu", "" ], [ "Lindqvist", "Janne", "" ], [ "Oulasvirta", "Antti", "" ], [ "Roos", "Teemu", "" ] ]
new_dataset
0.999801
1401.0585
Thomas Sandholm
Thomas Sandholm, Dongman Lee, Bjorn Tegelund, Seonyeong Han, Byoungheon Shin, Byoungoh Kim
CloudFridge: A Testbed for Smart Fridge Interactions
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a testbed for exploring novel smart refrigerator interactions, and identify three key adoption-limiting interaction shortcomings of state-of-the-art smart fridges: lack of 1) user experience focus, 2) low-intrusion object recognition and 2) automatic item position detection. Our testbed system addresses these limitations by a combination of sensors, software filters, architectural components and a RESTful API to track interaction events in real-time, and retrieve current state and historical data to learn patterns and recommend user actions. We evaluate the accuracy and overhead of our system in a realistic interaction flow. The accuracy was measured to 83-88% and the overhead compared to a representative state-of-the-art barcode scanner improved by 27%. We also showcase two applications built on top of our testbed, one for finding expired items and ingredients of dishes; and one to monitor your health. The pattern that these applications have in common is that they cast the interaction as an item-recommendation problem triggered when the user takes something out. Our testbed could help reveal further user-experience centric interaction patterns and new classes of applications for smart fridges that inherently, by relying on our testbed primitives, mitigate the issues with existing approaches.
[ { "version": "v1", "created": "Fri, 3 Jan 2014 04:45:49 GMT" } ]
2014-01-06T00:00:00
[ [ "Sandholm", "Thomas", "" ], [ "Lee", "Dongman", "" ], [ "Tegelund", "Bjorn", "" ], [ "Han", "Seonyeong", "" ], [ "Shin", "Byoungheon", "" ], [ "Kim", "Byoungoh", "" ] ]
new_dataset
0.99804
1401.0598
Wu Wu
Wu Wu, Jiulin Hu, Xiaofang Huang, Huijie Chen, Bo Sun
Flight trajectory recreation and playback system of aerial mission based on ossimplanet
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recreation of flight trajectory is important among research areas. The design of a flight trajectory recreation and playback system is presented in this paper. Rather than transferring the flight data to diagram, graph and table, flight data is visualized on the 3D global of ossimPlanet. ossimPlanet is an open-source 3D global geo-spatial viewer and the system realization is based on analysis it. Users are allowed to choose their interested flight of aerial mission. The aerial photographs and corresponding configuration files in which flight data is included would be read in. And the flight statuses would be stored. The flight trajectory is then recreated. Users can view the photographs and flight trajectory marks on the correct positions of 3D global. The scene along flight trajectory is also simulated at the plane's eye point. This paper provides a more intuitive way for recreation of flight trajectory. The cost is decreased remarkably and security is ensured by secondary development on open-source platform.
[ { "version": "v1", "created": "Fri, 3 Jan 2014 07:10:25 GMT" } ]
2014-01-06T00:00:00
[ [ "Wu", "Wu", "" ], [ "Hu", "Jiulin", "" ], [ "Huang", "Xiaofang", "" ], [ "Chen", "Huijie", "" ], [ "Sun", "Bo", "" ] ]
new_dataset
0.999137
1205.5838
Linh Anh Nguyen D.Sc.
Linh Anh Nguyen
ExpTime Tableaux for the Description Logic SHIQ Based on Global State Caching and Integer Linear Feasibility Checking
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first ExpTime (complexity-optimal) tableau decision procedure for checking satisfiability of a knowledge base in the description logic SHIQ when numbers are coded in unary. Our procedure is based on global state caching and integer linear feasibility checking.
[ { "version": "v1", "created": "Fri, 25 May 2012 23:58:40 GMT" }, { "version": "v2", "created": "Sun, 11 Nov 2012 19:08:17 GMT" }, { "version": "v3", "created": "Wed, 20 Feb 2013 19:41:42 GMT" }, { "version": "v4", "created": "Tue, 31 Dec 2013 16:03:58 GMT" } ]
2014-01-03T00:00:00
[ [ "Nguyen", "Linh Anh", "" ] ]
new_dataset
0.970677
1207.0561
Naoki Masuda Dr.
Naoki Masuda, Issei Kurahashi, Hiroko Onari
Suicide ideation of individuals in online social networks
4 figures, 9 tables
PLOS ONE, 8 (4), e62262 (2013)
10.1371/journal.pone.0062262
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suicide explains the largest number of death tolls among Japanese adolescents in their twenties and thirties. Suicide is also a major cause of death for adolescents in many other countries. Although social isolation has been implicated to influence the tendency to suicidal behavior, the impact of social isolation on suicide in the context of explicit social networks of individuals is scarcely explored. To address this question, we examined a large data set obtained from a social networking service dominant in Japan. The social network is composed of a set of friendship ties between pairs of users created by mutual endorsement. We carried out the logistic regression to identify users' characteristics, both related and unrelated to social networks, which contribute to suicide ideation. We defined suicide ideation of a user as the membership to at least one active user-defined community related to suicide. We found that the number of communities to which a user belongs to, the intransitivity (i.e., paucity of triangles including the user), and the fraction of suicidal neighbors in the social network, contributed the most to suicide ideation in this order. Other characteristics including the age and gender contributed little to suicide ideation. We also found qualitatively the same results for depressive symptoms.
[ { "version": "v1", "created": "Tue, 3 Jul 2012 01:40:29 GMT" }, { "version": "v2", "created": "Mon, 20 Aug 2012 01:55:41 GMT" }, { "version": "v3", "created": "Tue, 31 Dec 2013 12:32:02 GMT" } ]
2014-01-03T00:00:00
[ [ "Masuda", "Naoki", "" ], [ "Kurahashi", "Issei", "" ], [ "Onari", "Hiroko", "" ] ]
new_dataset
0.996026
1212.6382
Jasine Babu
Jasine Babu and Manu Basavaraju and L. Sunil Chandran and Deepak Rajendraprasad
2-connecting Outerplanar Graphs without Blowing Up the Pathwidth
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a connected outerplanar graph G of pathwidth p, we give an algorithm to add edges to G to get a supergraph of G, which is 2-vertex-connected, outerplanar and of pathwidth O(p). This settles an open problem raised by Biedl, in the context of computing minimum height planar straight line drawings of outerplanar graphs, with their vertices placed on a two dimensional grid. In conjunction with the result of this paper, the constant factor approximation algorithm for this problem obtained by Biedl for 2-vertex-connected outerplanar graphs will work for all outer planar graphs.
[ { "version": "v1", "created": "Thu, 27 Dec 2012 15:09:02 GMT" }, { "version": "v2", "created": "Sat, 5 Jan 2013 13:32:57 GMT" }, { "version": "v3", "created": "Wed, 1 Jan 2014 18:20:32 GMT" } ]
2014-01-03T00:00:00
[ [ "Babu", "Jasine", "" ], [ "Basavaraju", "Manu", "" ], [ "Chandran", "L. Sunil", "" ], [ "Rajendraprasad", "Deepak", "" ] ]
new_dataset
0.999815
1312.3740
Ashish Jain
Ashish Jain, Narendra S. Chaudhari
Analytical Observations on Knapsack Cipher 0/255
article submitted in the reputed journal
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We observed few important facts that concerns with the new proposal of knapsack cipher 0/255, recently published by Pham [1]. The author claimed that the time complexity for solving new improved trapdoor knapsack is O(256^N). In this paper, we show that the knapsack cipher 0/255 can be solved in the same time that is required for solving the basic knapsack-cipher proposed by Merkle and Hellman [2]. In other words we claim that the improved version proposed by Pham [1] is technically same as the basic Merkle and Hellman Knapsack-based cryptosystem.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 09:23:52 GMT" }, { "version": "v2", "created": "Mon, 16 Dec 2013 05:56:17 GMT" }, { "version": "v3", "created": "Tue, 31 Dec 2013 08:21:07 GMT" } ]
2014-01-03T00:00:00
[ [ "Jain", "Ashish", "" ], [ "Chaudhari", "Narendra S.", "" ] ]
new_dataset
0.993325
1401.0114
Andrea Detti PhD
Nicola Blefari Melazzi, Andrea Detti, Mayutan Arumaithurai, K.K. Ramakrishnan
Internames: a name-to-name principle for the future Internet
6 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Internames, an architectural framework in which names are used to identify all entities involved in communication: contents, users, devices, logical as well as physical points involved in the communication, and services. By not having a static binding between the name of a communication entity and its current location, we allow entities to be mobile, enable them to be reached by any of a number of basic communication primitives, enable communication to span networks with different technologies and allow for disconnected operation. Furthermore, with the ability to communicate between names, the communication path can be dynamically bound to any of a number of end-points, and the end-points themselves could change as needed. A key benefit of our architecture is its ability to accommodate gradual migration from the current IP infrastructure to a future that may be a ubiquitous Information Centric Network. Basic building blocks of Internames are: i) a name-based Application Programming Interface; ii) a separation of identifiers (names) and locators; iii) a powerful Name Resolution Service (NRS) that dynamically maps names to locators, as a function of time/location/context/service; iv) a built-in capacity of evolution, allowing a transparent migration from current networks and the ability to include as particular cases current specific architectures. To achieve this vision, shared by many other researchers, we exploit and expand on Information Centric Networking principles, extending ICN functionality beyond content retrieval, easing send-to-name and push services, and allowing to use names also to route data in the return path. A key role in this architecture is played by the NRS, which allows for the co-existence of multiple network "realms", including current IP and non-IP networks, glued together by a name-to-name overarching communication primitive.
[ { "version": "v1", "created": "Tue, 31 Dec 2013 09:05:06 GMT" } ]
2014-01-03T00:00:00
[ [ "Melazzi", "Nicola Blefari", "" ], [ "Detti", "Andrea", "" ], [ "Arumaithurai", "Mayutan", "" ], [ "Ramakrishnan", "K. K.", "" ] ]
new_dataset
0.998724
1401.0437
Omer Melih Gul
Omer Melih Gul, Elif Uysal-Biyikoglu
UROP: A Simple, Near-Optimal Scheduling Policy for Energy Harvesting Sensors
32 pages, 10 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a single-hop wireless network where a central node (or fusion center, FC) collects data from a set of m energy harvesting (EH) nodes (e.g. nodes of a wireless sensor network). In each time slot, k of m nodes can be scheduled by the FC for transmission over k orthogonal channels. FC has no knowledge about EH processes and current battery states of nodes; however, it knows outcomes of previous transmission attempts. The objective is to find a low complexity scheduling policy that maximizes total throughput of the data backlogged system using the harvested energy, for all types (uniform, non-uniform, independent, correlated (i.e. Markovian), etc.) EH processes. Energy is assumed to be stored losslessly in the nodes batteries, up to a storage capacity (the infinite capacity case is also considered.) The problem is treated in finite and infinite problem horizons. A low-complexity policy, UROP (Uniformizing Random Ordered Policy) is proposed, whose near optimality is shown. Numerical examples indicate that under a reasonable-sized battery capacity, UROP uses the arriving energy with almost perfect efficiency. As the problem is a restless multi-armed bandit (RMAB) problem with an average reward criterion, UROP may have a wider application area than communication networks.
[ { "version": "v1", "created": "Thu, 2 Jan 2014 13:49:28 GMT" } ]
2014-01-03T00:00:00
[ [ "Gul", "Omer Melih", "" ], [ "Uysal-Biyikoglu", "Elif", "" ] ]
new_dataset
0.990469
1003.1520
Zolt\'an K\'asa
Zolt\'an K\'asa
On arc-disjoint Hamiltonian cycles in De Bruijn graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give two equivalent formulations of a conjecture [2,4] on the number of arc-disjoint Hamiltonian cycles in De Bruijn graphs.
[ { "version": "v1", "created": "Sun, 7 Mar 2010 20:31:39 GMT" }, { "version": "v2", "created": "Tue, 9 Mar 2010 05:59:10 GMT" }, { "version": "v3", "created": "Mon, 30 Dec 2013 12:05:27 GMT" } ]
2013-12-31T00:00:00
[ [ "Kása", "Zoltán", "" ] ]
new_dataset
0.992573
1304.4758
Jan Bergstra
Jan A. Bergstra and Karl de Leeuw
Bitcoin and Beyond: Exclusively Informational Monies
82 pages. Revision of v2: the Paragraph on monopresence and pseudomonopresence has been improved and extended; the paragraph on units for monies of account has been extended; several minor clarifications have been included; 8 additional references were added; improvements were made of small errors throughout the paper
null
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent but are not owned by any agent. INCOs of an EXIM cannot be stolen, but they can be lost, or thrown away. The difference between an EXIM and a TIM shows up when considering a user perspective on security matters. Security for an EXIM user is discussed in substantial detail, with the remarkable conclusion that computer security (security models, access control, user names, passwords, firewalls etc.) is not always essential for an EXIM, while the application of cryptography based information security is unavoidable for the use of an EXIM. Bitcoin seems to meet the criteria of an EXIM, but the assertion that "Bitcoin is an EXIM", might also be considered problematic. As a thought experiment we will contemplate Bitguilder, a hypothetical copy of Bitcoin that qualifies as an EXIM. A business ethics assessment of Bitcoin is made which reveals a number of worries. By combining Bitguilder with a so-called technical informational near-money (TINM) a dual money system, having two units with a fluctuating rate, may be obtained. It seems that a dual money can remedy some, but not all, of the ethical worries that arise when contemplating Bitcoin after hypothetically having become a dominant form of money. The contributions that Bitcoin's designers can potentially make to the evolution of EXIMs and TIMs is analyzed in terms of the update of the portfolio of money related natural kinds that comes with Bitcoin.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 10:21:55 GMT" }, { "version": "v2", "created": "Sun, 12 May 2013 14:48:57 GMT" }, { "version": "v3", "created": "Mon, 30 Dec 2013 16:39:27 GMT" } ]
2013-12-31T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "de Leeuw", "Karl", "" ] ]
new_dataset
0.997127
1312.7363
Andrew Adamatzky
Andrew Adamatzky
How beta-skeletons lose their edges
null
Adamatzky A. How {\beta}-skeletons lose their edges. Information Sciences 254 (2014) 213-224
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A {\beta}-skeleton is a proximity graphs with node neighbourhood defined by continuous-valued parameter {\beta}. Two nodes in a {\beta}-skeleton are connected by an edge if their lune-based neighbourhood contains no other nodes. With increase of {\beta} some edges a skeleton are disappear. We study how a number of edges in {\beta}-skeleton depends on {\beta}. We speculate how this dependence can be used to discriminate between random and non-random planar sets. We also analyse stability of {\beta}-skeletons and their sensitivity to perturbations.
[ { "version": "v1", "created": "Fri, 27 Dec 2013 22:30:13 GMT" } ]
2013-12-31T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.994893
1312.7522
Piotr Borowiecki
Gabor Bacso, Piotr Borowiecki, Mihaly Hujter and Zsolt Tuza
Minimum order of graphs with given coloring parameters
23 pages, 6 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete $k$-coloring of a graph $G=(V,E)$ is an assignment $\varphi:V\to\{1,\ldots,k\}$ of colors to the vertices such that no two vertices of the same color are adjacent, and the union of any two color classes contains at least one edge. Three extensively investigated graph invariants related to complete colorings are the minimum and maximum number of colors in a complete coloring (chromatic number $\chi(G)$ and achromatic number $\psi(G)$, respectively), and the Grundy number $\Gamma(G)$ defined as the largest $k$ admitting a complete coloring $\varphi$ with exactly $k$ colors such that every vertex $v\in V$ of color $\varphi(v)$ has a neighbor of color $i$ for all $1\le i<\varphi(v)$. The inequality chain $\chi(G)\le \Gamma(G)\le \psi(G)$ obviously holds for all graphs $G$. A triple $(f,g,h)$ of positive integers at least 2 is called realizable if there exists a connected graph $G$ with $\chi(G)=f$, $\Gamma(G)=g$, and $\psi(G)=h$. Chartrand et al. (A note on graphs with prescribed complete coloring numbers, J. Combin. Math. Combin. Comput. LXXIII (2010) 77-84) found the list of realizable triples. In this paper we determine the minimum number of vertices in a connected graph with chromatic number $f$, Grundy number $g$, and achromatic number $h$, for all realizable triples $(f,g,h)$ of integers. Furthermore, for $f=g=3$ we describe the (two) extremal graphs for each $h \geq 6$. For $h=4$ and $5$, there are more extremal graphs, their description is contained as well.
[ { "version": "v1", "created": "Sun, 29 Dec 2013 11:31:32 GMT" } ]
2013-12-31T00:00:00
[ [ "Bacso", "Gabor", "" ], [ "Borowiecki", "Piotr", "" ], [ "Hujter", "Mihaly", "" ], [ "Tuza", "Zsolt", "" ] ]
new_dataset
0.953194
1312.7844
Felix Ming Fai Wong
Felix Ming Fai Wong, Carlee Joe-Wong, Sangtae Ha, Zhenming Liu, Mung Chiang
Mind Your Own Bandwidth: An Edge Solution to Peak-hour Broadband Congestion
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by recent increases in network traffic, we propose a decentralized network edge-based solution to peak-hour broadband congestion that incentivizes users to moderate their bandwidth demands to their actual needs. Our solution is centered on smart home gateways that allocate bandwidth in a two-level hierarchy: first, a gateway purchases guaranteed bandwidth from the Internet Service Provider (ISP) with virtual credits. It then self-limits its bandwidth usage and distributes the bandwidth among its apps and devices according to their relative priorities. To this end, we design a credit allocation and redistribution mechanism for the first level, and implement our gateways on commodity wireless routers for the second level. We demonstrate our system's effectiveness and practicality with theoretical analysis, simulations and experiments on real traffic. Compared to a baseline equal sharing algorithm, our solution significantly improves users' overall satisfaction and yields a fair allocation of bandwidth across users.
[ { "version": "v1", "created": "Mon, 30 Dec 2013 20:06:57 GMT" } ]
2013-12-31T00:00:00
[ [ "Wong", "Felix Ming Fai", "" ], [ "Joe-Wong", "Carlee", "" ], [ "Ha", "Sangtae", "" ], [ "Liu", "Zhenming", "" ], [ "Chiang", "Mung", "" ] ]
new_dataset
0.997234
1305.5956
Jan Bergstra
Jan A. Bergstra and Karl de Leeuw
Questions related to Bitcoin and other Informational Money
31 pages. In v2 the section on patterns for use and misuse has been improved and expanded with so-called contaminations. Other small improvements were made and 13 additional references have been included
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various contexts, and issues about forms of use and misuse. Some questions are formulated in the more general setting of informational monies and near-monies. We also formulate questions about legal, psychological, and ethical aspects of informational money. Finally we formulate a number of questions concerning the economical merits of and outlooks for Bitcoin.
[ { "version": "v1", "created": "Sat, 25 May 2013 18:58:24 GMT" }, { "version": "v2", "created": "Thu, 26 Dec 2013 20:42:45 GMT" } ]
2013-12-30T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "de Leeuw", "Karl", "" ] ]
new_dataset
0.991393
1306.0783
Julianna Zsid\'o
Julianna Zsid\'o
Theorem of three circles in Coq
27 pages, 5 figures
null
10.1007/s10817-013-9299-0
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theorem of three circles in real algebraic geometry guarantees the termination and correctness of an algorithm of isolating real roots of a univariate polynomial. The main idea of its proof is to consider polynomials whose roots belong to a certain area of the complex plane delimited by straight lines. After applying a transformation involving inversion this area is mapped to an area delimited by circles. We provide a formalisation of this rather geometric proof in Ssreflect, an extension of the proof assistant Coq, providing versatile algebraic tools. They allow us to formalise the proof from an algebraic point of view.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 13:34:51 GMT" }, { "version": "v2", "created": "Tue, 5 Nov 2013 22:27:03 GMT" } ]
2013-12-30T00:00:00
[ [ "Zsidó", "Julianna", "" ] ]
new_dataset
0.983415
1312.7013
Lear Bahack
Lear Bahack
Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A widespread security claim of the Bitcoin system, presented in the original Bitcoin white-paper, states that the security of the system is guaranteed as long as there is no attacker in possession of half or more of the total computational power used to maintain the system. This claim, however, is proved based on theoretically flawed assumptions. In the paper we analyze two kinds of attacks based on two theoretical flaws: the Block Discarding Attack and the Difficulty Raising Attack. We argue that the current theoretical limit of attacker's fraction of total computational power essential for the security of the system is in a sense not $\frac{1}{2}$ but a bit less than $\frac{1}{4}$, and outline proposals for protocol change that can raise this limit to be as close to $\frac{1}{2}$ as we want. The basic idea of the Block Discarding Attack has been noted as early as 2010, and lately was independently though-of and analyzed by both author of this paper and authors of a most recently pre-print published paper. We thus focus on the major differences of our analysis, and try to explain the unfortunate surprising coincidence. To the best of our knowledge, the second attack is presented here for the first time.
[ { "version": "v1", "created": "Wed, 25 Dec 2013 20:04:36 GMT" } ]
2013-12-30T00:00:00
[ [ "Bahack", "Lear", "" ] ]
new_dataset
0.996548
1312.6834
Kiran Sree Pokkuluri Prof
P. Kiran Sree, I. Ramesh Babu
Face Detection from still and Video Images using Unsupervised Cellular Automata with K means clustering algorithm
ICGST-GVIP Journal, ISSN: 1687-398X, Volume 8, Issue 2, July 2008
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pattern recognition problem rely upon the features inherent in the pattern of images. Face detection and recognition is one of the challenging research areas in the field of computer vision. In this paper, we present a method to identify skin pixels from still and video images using skin color. Face regions are identified from this skin pixel region. Facial features such as eyes, nose and mouth are then located. Faces are recognized from color images using an RBF based neural network. Unsupervised Cellular Automata with K means clustering algorithm is used to locate different facial elements. Orientation is corrected by using eyes. Parameters like inter eye distance, nose length, mouth position, Discrete Cosine Transform (DCT) coefficients etc. are computed and used for a Radial Basis Function (RBF) based neural network. This approach reliably works for face sequence with orientation in head, expressions etc.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 15:43:52 GMT" } ]
2013-12-25T00:00:00
[ [ "Sree", "P. Kiran", "" ], [ "Babu", "I. Ramesh", "" ] ]
new_dataset
0.975106
1310.6635
Jason Cloud
Jason Cloud, Douglas Leith, and Muriel Medard
Network Coded TCP (CTCP) Performance over Satellite Networks
4 pages, 4 figures, Accepted at SPACOMM 2014
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show preliminary results for the performance of Network Coded TCP (CTCP) over large latency networks. While CTCP performs very well in networks with relatively short RTT, the slow-start mechanism currently employed does not adequately fill the available bandwidth when the RTT is large. Regardless, we show that CTCP still outperforms current TCP variants (i.e., Cubic TCP and Hybla TCP) for high packet loss rates (e.g., >2.5%). We then explore the possibility of a modified congestion control mechanism based off of H-TCP that opens the congestion window quickly to overcome the challenges of large latency networks. Preliminary results are provided that show the combination of network coding with an appropriate congestion control algorithm can provide gains on the order of 20 times that of existing TCP variants. Finally, we provide a discussion of the future work needed to increase CTCP's performance in these networks.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 14:43:15 GMT" }, { "version": "v2", "created": "Sun, 22 Dec 2013 16:24:47 GMT" } ]
2013-12-24T00:00:00
[ [ "Cloud", "Jason", "" ], [ "Leith", "Douglas", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.993644
1312.4552
Dr. Nadeem Javaid
Muhammad Zohaib, Syed Mustafa Pasha, Nadeem Javaid, Jamshed Iqbal
Intelligent Bug Algorithm (IBA): A Novel Strategy to Navigate Mobile Robots Autonomously
Springer's International Multi Topic Conference 2013 (IMTIC '13)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research proposed an intelligent obstacle avoidance algorithm to navigate an autonomous mobile robot. The presented Intelligent Bug Algorithm (IBA) over performs and reaches the goal in relatively less time as compared to existing Bug algorithms. The improved algorithm offers a goal oriented strategy by following smooth and short trajectory. This has been achieved by continuously considering the goal position during obstacle avoidance. The proposed algorithm is computationally inexpensive and easy to tune. The paper also presents the performance comparison of IBA and reported Bug algorithms. Simulation results of robot navigation in an environment with obstacles demonstrate the performance of the improved algorithm.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 10:54:22 GMT" }, { "version": "v2", "created": "Sun, 22 Dec 2013 13:36:57 GMT" } ]
2013-12-24T00:00:00
[ [ "Zohaib", "Muhammad", "" ], [ "Pasha", "Syed Mustafa", "" ], [ "Javaid", "Nadeem", "" ], [ "Iqbal", "Jamshed", "" ] ]
new_dataset
0.987981
1312.6119
Theodor Borsche
Theodor Borsche and Andreas Ulbig and G\"oran Andersson
A New Frequency Control Reserve Framework based on Energy-Constrained Units
working paper, submitted to PSCC 2014
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frequency control reserves are an essential ancillary service in any electric power system, guaranteeing that generation and demand of active power are balanced at all times. Traditionally, conventional power plants are used for frequency reserves. There are economical and technical benefits of instead using energy constrained units such as storage systems and demand response, but so far they have not been widely adopted as their energy constraints prevent them from following traditional regulation signals, which sometimes are biased over long time-spans. This paper proposes a frequency control framework that splits the control signals according to the frequency spectrum. This guarantees that all control signals are zero-mean over well-defined time-periods, which is a crucial requirement for the usage of energy-constraint units such as batteries. A case-study presents a possible implementation, and shows how different technologies with widely varying characteristics can all participate in frequency control reserve provision, while guaranteeing that their respective energy constraints are always fulfilled.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 14:06:45 GMT" } ]
2013-12-24T00:00:00
[ [ "Borsche", "Theodor", "" ], [ "Ulbig", "Andreas", "" ], [ "Andersson", "Göran", "" ] ]
new_dataset
0.996811
1312.6156
Michael Fink
Joost Vennekens
Negation in the Head of CP-logic Rules
Proceedings of Answer Set Programming and Other Computing Paradigms (ASPOCP 2013), 6th International Workshop, August 25, 2013, Istanbul, Turkey
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CP-logic is a probabilistic extension of the logic FO(ID). Unlike ASP, both of these logics adhere to a Tarskian informal semantics, in which interpretations represent objective states-of-affairs. In other words, these logics lack the epistemic component of ASP, in which interpretations represent the beliefs or knowledge of a rational agent. Consequently, neither CP-logic nor FO(ID) have the need for two kinds of negations: there is only one negation, and its meaning is that of objective falsehood. Nevertheless, the formal semantics of this objective negation is mathematically more similar to ASP's negation-as-failure than to its classical negation. The reason is that both CP-logic and FO(ID) have a constructive semantics in which all atoms start out as false, and may only become true as the result of a rule application. This paper investigates the possibility of adding the well-known ASP feature of allowing negation in the head of rules to CP-logic. Because CP-logic only has one kind of negation, it is of necessity this ''negation-as-failure like'' negation that will be allowed in the head. We investigate the intuitive meaning of such a construct and the benefits that arise from it.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 21:41:20 GMT" } ]
2013-12-24T00:00:00
[ [ "Vennekens", "Joost", "" ] ]
new_dataset
0.99941
1312.6293
Jerome Darmont
Jaume Ferrarons (ERIC), Mulu Adhana (ERIC), Carlos Colmenares (ERIC), Sandra Pietrowska (ERIC), Fadila Bentayeb (ERIC), J\'er\^ome Darmont (ERIC)
PRIMEBALL: a Parallel Processing Framework Benchmark for Big Data Applications in the Cloud
5th TPC Technology Conference on Performance Evaluation and Benchmarking (VLDB/TPCTC 13), Riva del Garda : Italy (2013)
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we draw the specifications of a novel benchmark for comparing parallel processing frameworks in the context of big data applications hosted in the cloud. We aim at filling several gaps in already existing cloud data processing benchmarks, which lack a real-life context for their processes, thus losing relevance when trying to assess performance for real applications. Hence, we propose a fictitious news site hosted in the cloud that is to be managed by the framework under analysis, together with several objective use case scenarios and measures for evaluating system performance. The main strengths of our benchmark are parallelization capabilities supporting cloud features and big data properties.
[ { "version": "v1", "created": "Sat, 21 Dec 2013 19:15:22 GMT" } ]
2013-12-24T00:00:00
[ [ "Ferrarons", "Jaume", "", "ERIC" ], [ "Adhana", "Mulu", "", "ERIC" ], [ "Colmenares", "Carlos", "", "ERIC" ], [ "Pietrowska", "Sandra", "", "ERIC" ], [ "Bentayeb", "Fadila", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
new_dataset
0.999739
1312.6501
Thomas Sandholm
Thomas Sandholm, Boris Magnusson, Bjorn A. Johnsson
On-Demand WebRTC Tunneling in Restricted Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the implementation of a WebRTC gateway service that can forward ad-hoc RTP data plane traffic from a browser on one local network to a browser on another local network. The advantage compared to the existing IETF STUN (RFC 5389), TURN (RFC 5766) and ICE (RFC 5245) protocols is that it does not require a public host and port mapping for each participating local host, and it works with more restrictive firewall policies. WebRTC implements ICE which combines STUN and TURN probes to automatically find the best connection between two peers who want to communicate. In corporate networks, simple hole punching and NAT traversal techniques typically do not work, e.g. because of symmetric NATs. Dynamic allocation of ports on an external 3rd party relay service is also typically blocked on restricted hosts. In our use case, doctors at hospitals can only access port 80 through the hospital firewall on external machines, and they need to communicate with patients who are typically behind a NAT in a local WiFi network. VPN solutions only work for staff but not between patients and staff. Our solution solves this problem by redirecting all WebRTC traffic through a gateway service on the local network that has a secure tunnel established with a public gateway. The public gateway redirects traffic from multiple concurrent streams securely between local gateway services that connect to it. The local gateways also communicate with browsers on their local network to mimic a direct browser-to-browser connection without having to change the browser runtime. We have demonstrated that this technique works well within the hospital network and arbitrary patient networks, without the need for any individual host configuration. In our evaluation we show that the latency overhead is 18-20 ms for each concurrent stream added to the same gateway service.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 10:02:27 GMT" } ]
2013-12-24T00:00:00
[ [ "Sandholm", "Thomas", "" ], [ "Magnusson", "Boris", "" ], [ "Johnsson", "Bjorn A.", "" ] ]
new_dataset
0.979297
1312.6532
Fran\c{c}ois Dupressoir
Fran\c{c}ois Dupressoir and Andrew D. Gordon and Jan J\"urjens and David A. Naumann
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols
To appear in Journal of Computer Security
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe how to verify security properties of C code for cryptographic protocols by using a general-purpose verifier. We prove security theorems in the symbolic model of cryptography. Our techniques include: use of ghost state to attach formal algebraic terms to concrete byte arrays and to detect collisions when two distinct terms map to the same byte array; decoration of a crypto API with contracts based on symbolic terms; and expression of the attacker model in terms of C programs. We rely on the general-purpose verifier VCC; we guide VCC to prove security simply by writing suitable header files and annotations in implementation files, rather than by changing VCC itself. We formalize the symbolic model in Coq in order to justify the addition of axioms to VCC.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 12:05:34 GMT" } ]
2013-12-24T00:00:00
[ [ "Dupressoir", "François", "" ], [ "Gordon", "Andrew D.", "" ], [ "Jürjens", "Jan", "" ], [ "Naumann", "David A.", "" ] ]
new_dataset
0.994941
1312.6615
Shatrughan Modi
Shatrughan Modi and Dr. Seema Bawa
Automated Coin Recognition System using ANN
6 pages, 11 figures, 1 table, Published with International Journal of Computer Applications (IJCA)
International Journal of Computer Applications 26(4):13-18, July 2011
10.5120/3093-4244
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coins are integral part of our day to day life. We use coins everywhere like grocery store, banks, buses, trains etc. So it becomes a basic need that coins can be sorted and counted automatically. For this it is necessary that coins can be recognized automatically. In this paper we have developed an ANN (Artificial Neural Network) based Automated Coin Recognition System for the recognition of Indian Coins of denomination Rs. 1, 2, 5 and 10 with rotation invariance. We have taken images from both sides of coin. So this system is capable of recognizing coins from both sides. Features are extracted from images using techniques of Hough Transformation, Pattern Averaging etc. Then, the extracted features are passed as input to a trained Neural Network. 97.74% recognition rate has been achieved during the experiments i.e. only 2.26% miss recognition, which is quite encouraging.
[ { "version": "v1", "created": "Mon, 23 Dec 2013 17:40:08 GMT" } ]
2013-12-24T00:00:00
[ [ "Modi", "Shatrughan", "" ], [ "Bawa", "Dr. Seema", "" ] ]
new_dataset
0.999054
1312.5763
Ahmed Rashid
Rashid Ahmed, John N. Avaritsiotis
Identification of Employees Using RFID in IE-NTUA
5 pages, 6 figures, 1 table, IJACSA journal 2013
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During the last decade with the rapid increase in indoor wireless communications, location-aware services have received a great deal of attention for commercial, public-safety, and a military application, the greatest challenge associated with indoor positioning methods is moving object data and identification. Mobility tracking and localization are multifaceted problems, which have been studied for a long time in different contexts. Many potential applications in the domain of WSNs require such capabilities. The mobility tracking needs inherent in many surveillance, security and logistic applications. This paper presents the identification of employees in National Technical University in Athens (IE-NTUA), when the employees access to a certain area of the building (enters and leaves to/from the college), Radio Frequency Identification (RFID) applied for identification by offering special badges containing RFID-tags.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 21:55:00 GMT" } ]
2013-12-23T00:00:00
[ [ "Ahmed", "Rashid", "" ], [ "Avaritsiotis", "John N.", "" ] ]
new_dataset
0.993718
1312.5941
Julie Dugdale
Hong Van Truong, Elise Beck, Julie Dugdale, and Carole Adam
Developing a model of evacuation after an earthquake in Lebanon
8 pages, 11 figures, ISCRAM Vietnam Conference, November 2013
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes the development of an agent-based model (AMEL, Agent-based Model for Earthquake evacuation in Lebanon) that aims at simulating the movement of pedestrians shortly after an earthquake. The GAMA platform was chosen to implement the model. AMEL is applied to a real case study, a district of the city of Beirut, Lebanon, which potentially could be stricken by a M7 earthquake. The objective of the model is to reproduce real life mobility behaviours that have been gathered through a survey in Beirut and to test different future scenarios, which may help the local authorities to target information campaigns.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 13:51:11 GMT" } ]
2013-12-23T00:00:00
[ [ "Van Truong", "Hong", "" ], [ "Beck", "Elise", "" ], [ "Dugdale", "Julie", "" ], [ "Adam", "Carole", "" ] ]
new_dataset
0.99863
1312.6036
Lutz Frommberger
Lutz Frommberger and Falko Schmid
Crowdsourced bi-directional disaster reporting and alerting on smartphones in Lao PDR
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural disasters are a large threat for people especially in developing countries such as Laos. ICT-based disaster management systems aim at supporting disaster warning and response efforts. However, the ability to directly communicate in both directions between local and administrative level is often not supported, and a tight integration into administrative workflows is missing. In this paper, we present the smartphone-based disaster and reporting system Mobile4D. It allows for bi-directional communication while being fully involved in administrative processes. We present the system setup and discuss integration into administrative structures in Lao PDR.
[ { "version": "v1", "created": "Fri, 20 Dec 2013 16:47:37 GMT" } ]
2013-12-23T00:00:00
[ [ "Frommberger", "Lutz", "" ], [ "Schmid", "Falko", "" ] ]
new_dataset
0.954795
1312.5480
Maurizio Bocca Ph.D.
Maurizio Bocca, Anh Luong, Neal Patwari, Thomas Schmid
Dial It In: Rotating RF Sensors to Enhance Radio Tomography
9 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A radio tomographic imaging (RTI) system uses the received signal strength (RSS) measured by RF sensors in a static wireless network to localize people in the deployment area, without having them to carry or wear an electronic device. This paper addresses the fact that small-scale changes in the position and orientation of the antenna of each RF sensor can dramatically affect imaging and localization performance of an RTI system. However, the best placement for a sensor is unknown at the time of deployment. Improving performance in a deployed RTI system requires the deployer to iteratively "guess-and-retest", i.e., pick a sensor to move and then re-run a calibration experiment to determine if the localization performance had improved or degraded. We present an RTI system of servo-nodes, RF sensors equipped with servo motors which autonomously "dial it in", i.e., change position and orientation to optimize the RSS on links of the network. By doing so, the localization accuracy of the RTI system is quickly improved, without requiring any calibration experiment from the deployer. Experiments conducted in three indoor environments demonstrate that the servo-nodes system reduces localization error on average by 32% compared to a standard RTI system composed of static RF sensors.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 11:05:58 GMT" } ]
2013-12-20T00:00:00
[ [ "Bocca", "Maurizio", "" ], [ "Luong", "Anh", "" ], [ "Patwari", "Neal", "" ], [ "Schmid", "Thomas", "" ] ]
new_dataset
0.998746
1312.5520
Tamara Mchedlidze David
William Evans and Michael Kaufmann and William Lenhart and Giuseppe Liotta and Tamara Mchedlidze and Stephen Wismath
Bar 1-Visibility Graphs and their relation to other Nearly Planar Graphs
null
null
null
null
cs.DS cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is called a strong (resp. weak) bar 1-visibility graph if its vertices can be represented as horizontal segments (bars) in the plane so that its edges are all (resp. a subset of) the pairs of vertices whose bars have a $\epsilon$-thick vertical line connecting them that intersects at most one other bar. We explore the relation among weak (resp. strong) bar 1-visibility graphs and other nearly planar graph classes. In particular, we study their relation to 1-planar graphs, which have a drawing with at most one crossing per edge; quasi-planar graphs, which have a drawing with no three mutually crossing edges; the squares of planar 1-flow networks, which are upward digraphs with in- or out-degree at most one. Our main results are that 1-planar graphs and the (undirected) squares of planar 1-flow networks are weak bar 1-visibility graphs and that these are quasi-planar graphs.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 12:52:02 GMT" } ]
2013-12-20T00:00:00
[ [ "Evans", "William", "" ], [ "Kaufmann", "Michael", "" ], [ "Lenhart", "William", "" ], [ "Liotta", "Giuseppe", "" ], [ "Mchedlidze", "Tamara", "" ], [ "Wismath", "Stephen", "" ] ]
new_dataset
0.985005
1312.5691
Wei Zhang
Wei Zhang, Olivier Tardieu, David Grove, Benjamin Herta, Tomio Kamada, Vijay Saraswat, Mikio Takeuchi
GLB: Lifeline-based Global Load Balancing library in X10
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present GLB, a programming model and an associated implementation that can handle a wide range of irregular paral- lel programming problems running over large-scale distributed systems. GLB is applicable both to problems that are easily load-balanced via static scheduling and to problems that are hard to statically load balance. GLB hides the intricate syn- chronizations (e.g., inter-node communication, initialization and startup, load balancing, termination and result collection) from the users. GLB internally uses a version of the lifeline graph based work-stealing algorithm proposed by Saraswat et al. Users of GLB are simply required to write several pieces of sequential code that comply with the GLB interface. GLB then schedules and orchestrates the parallel execution of the code correctly and efficiently at scale. We have applied GLB to two representative benchmarks: Betweenness Centrality (BC) and Unbalanced Tree Search (UTS). Among them, BC can be statically load-balanced whereas UTS cannot. In either case, GLB scales well-- achieving nearly linear speedup on different computer architectures (Power, Blue Gene/Q, and K) -- up to 16K cores.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 18:46:00 GMT" } ]
2013-12-20T00:00:00
[ [ "Zhang", "Wei", "" ], [ "Tardieu", "Olivier", "" ], [ "Grove", "David", "" ], [ "Herta", "Benjamin", "" ], [ "Kamada", "Tomio", "" ], [ "Saraswat", "Vijay", "" ], [ "Takeuchi", "Mikio", "" ] ]
new_dataset
0.995693