id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1312.5704
Ahmed Ben Achballah
Ahmed Ben Achballah, Slim Ben Othman and Slim Ben Saoud
Design of Field Programmable Gate Array (FPGA) Based Emulators for Motor Control Applications
null
Am J. Applied Sci., 9: 1166-1181
10.3844/ajassp.2012.1166.1181
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Problem Statement: Field Programmable Gate Array (FPGA) circuits play a significant role in major recent embedded process control designs. However, exploiting these platforms requires deep hardware conception skills and remains an important time consuming stage in a design flow. High Level Synthesis technique avoids this bottleneck and increases design productivity as witnessed by industry specialists. Approach: This study proposes to apply this technique for the conception and implementation of a Real Time Direct Current Machine (RTDCM) emulator for an embedded control application. Results: Several FPGA-based configuration scenarios are studied. A series of tests including design and timing-precision analysis were conducted to discuss and validate the obtained hardware architectures. Conclusion/Recommendations: The proposed methodology has accelerated the design time besides it has provided an extra time to refine the hardware core of the DCM emulator. The high level synthesis technique can be applied to the control field especially to test with low cost and short delays newest algorithms and motor models.
[ { "version": "v1", "created": "Thu, 19 Dec 2013 19:09:18 GMT" } ]
2013-12-20T00:00:00
[ [ "Achballah", "Ahmed Ben", "" ], [ "Othman", "Slim Ben", "" ], [ "Saoud", "Slim Ben", "" ] ]
new_dataset
0.998871
1312.5067
Anita Das
Anita Das, P. Suresh, S. V. Subrahmanya
Rainbow path and color degree in edge colored graphs
4 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G$ be an edge colored graph. A {\it}{rainbow path} in $G$ is a path in which all the edges are colored with distinct colors. Let $d^c(v)$ be the color degree of a vertex $v$ in $G$, i.e. the number of distinct colors present on the edges incident on the vertex $v$. Let $t$ be the maximum length of a rainbow path in $G$. Chen and Li showed that if $d^c \geq k$, for every vertex $v$ of $G$, then $t \geq \left \lceil \frac{3 k}{5}\right \rceil + 1$ (Long heterochromatic paths in edge-colored graphs, The Electronic Journal of Combinatorics 12 (2005), # R33, Pages:1-33.) Unfortunately, proof by Chen and Li is very long and comes to about 23 pages in the journal version. Chen and Li states in their paper that it was conjectured by Akira Saito, that $t \ge \left \lceil \frac {2k} {3} \right \rceil$. They also states in their paper that they believe $t \ge k - c$ for some constant $c$. In this note, we give a short proof to show that $t \ge \left \lceil \frac{3 k}{5}\right \rceil$, using an entirely different method. Our proof is only about 2 pages long. The draw-back is that our bound is less by 1, than the bound given by Chen and Li. We hope that the new approach adopted in this paper would eventually lead to the settlement of the conjectures by Saito and/or Chen and Li.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 09:17:36 GMT" } ]
2013-12-19T00:00:00
[ [ "Das", "Anita", "" ], [ "Suresh", "P.", "" ], [ "Subrahmanya", "S. V.", "" ] ]
new_dataset
0.975444
1312.5097
Alexander Darer
Alexander Darer and Peter Lewis
A Cellular Automaton Based Controller for a Ms. Pac-Man Agent
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video games can be used as an excellent test bed for Artificial Intelligence (AI) techniques. They are challenging and non-deterministic, this makes it very difficult to write strong AI players. An example of such a video game is Ms. Pac-Man. In this paper we will outline some of the previous techniques used to build AI controllers for Ms. Pac-Man as well as presenting a new and novel solution. My technique utilises a Cellular Automaton (CA) to build a representation of the environment at each time step of the game. The basis of the representation is a 2-D grid of cells. Each cell has a state and a set of rules which determine whether or not that cell will dominate (i.e. pass its state value onto) adjacent cells at each update. Once a certain number of update iterations have been completed, the CA represents the state of the environment in the game, the goals and the dangers. At this point, Ms. Pac-Man will decide her next move based only on her adjacent cells, that is to say, she has no knowledge of the state of the environment as a whole, she will simply follow the strongest path. This technique shows promise and allows the controller to achieve high scores in a live game, the behaviour it exhibits is interesting and complex. Moreover, this behaviour is produced by using very simple rules which are applied many times to each cell in the grid. Simple local interactions with complex global results are truly achieved.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 11:08:05 GMT" } ]
2013-12-19T00:00:00
[ [ "Darer", "Alexander", "" ], [ "Lewis", "Peter", "" ] ]
new_dataset
0.997776
1312.5138
Yongcai Wang
Lei Song, Yongcai Wang
Locating Multiple Ultrasound Targets in Chorus
9 pages
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Ranging by Time of Arrival (TOA) of Narrow-band ultrasound (NBU) has been widely used by many locating systems for its characteristics of low cost and high accuracy. However, because it is hard to support code division multiple access in narrowband signal, to track multiple targets, existing NBU-based locating systems generally need to assign exclusive time slot to each target to avoid the signal conflicts. Because the propagation speed of ultrasound is slow in air, dividing exclusive time slots on a single channel causes the location updating rate for each target rather low, leading to unsatisfied tracking performances as the number of targets increases. In this paper, we investigated a new multiple target locating method using NBU, called UltraChorus, which is to locate multiple targets while allowing them sending NBU signals simultaneously, i.e., in chorus mode. It can dramatically increase the location updating rate. In particular, we investigated by both experiments and theoretical analysis on the necessary and sufficient conditions for resolving the conflicts of multiple NBU signals on a single channel, which is referred as the conditions for chorus ranging and chorus locating. To tackle the difficulty caused by the anonymity of the measured distances, we further developed consistent position generation algorithm and probabilistic particle filter algorithm}to label the distances by sources, to generate reasonable location estimations, and to disambiguate the motion trajectories of the multiple concurrent targets based on the anonymous distance measurements. Extensive evaluations by both simulation and testbed were carried out, which verified the effectiveness of our proposed theories and algorithms.
[ { "version": "v1", "created": "Sat, 14 Dec 2013 07:47:51 GMT" } ]
2013-12-19T00:00:00
[ [ "Song", "Lei", "" ], [ "Wang", "Yongcai", "" ] ]
new_dataset
0.974897
1312.5257
Hemant Saggar
Hemant Saggar, D.K. Mehra
Cyclostationary Spectrum Sensing in Cognitive Radios Using FRESH Filters
Presented at Advances in Wireless Cellular Telecommunications: Technologies & Services, 1st ICEIT National Conference on, April 14-15, 2011, New Delhi
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with spectrum sensing in Cognitive Radios to enable unlicensed secondary users to opportunistically access a licensed band. The ability to detect the presence of a primary user at a low signal to noise ratio (SNR) is a challenging prerequisite to spectrum sensing and earlier proposed techniques like energy detection and cyclostationary detection have only been partially successful. This paper proposes the use of FRESH (FREquency SHift) filters [1] to enable spectrum sensing at low SNR by optimally estimating a cyclostationary signal using its spectral coherence properties. We establish the mean square error convergence of the adaptive FRESH filter through simulation. Subsequently, we formulate a cyclostationarity based binary hypothesis test on the filtered signal and observe the resultant detection performance. Simulation results show that the proposed approach performs better than energy detection and cyclostationary detection techniques for spectrum sensing.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 18:03:10 GMT" } ]
2013-12-19T00:00:00
[ [ "Saggar", "Hemant", "" ], [ "Mehra", "D. K.", "" ] ]
new_dataset
0.995337
1206.2656
Couvreur Alain
Alain Couvreur, Nicolas Delfosse, Gilles Z\'emor
A Construction of Quantum LDPC Codes from Cayley Graphs
The material in this paper was presented in part at ISIT 2011. This article is published in IEEE Transactions on Information Theory. We point out that the second step of the proof of Proposition VI.2 in the published version (Proposition 25 in the present version and Proposition 18 in the ISIT extended abstract) is not strictly correct. This issue is addressed in the present version
IEEE Trans. Inform. Theory. 59(9). 6087-6098. 2013
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a construction of Quantum LDPC codes proposed by MacKay, Mitchison and Shokrollahi. It is based on the Cayley graph of Fn together with a set of generators regarded as the columns of the parity-check matrix of a classical code. We give a general lower bound on the minimum distance of the Quantum code in $\mathcal{O}(dn^2)$ where d is the minimum distance of the classical code. When the classical code is the $[n, 1, n]$ repetition code, we are able to compute the exact parameters of the associated Quantum code which are $[[2^n, 2^{\frac{n+1}{2}}, 2^{\frac{n-1}{2}}]]$.
[ { "version": "v1", "created": "Tue, 12 Jun 2012 20:11:53 GMT" }, { "version": "v2", "created": "Fri, 22 Feb 2013 12:48:38 GMT" }, { "version": "v3", "created": "Tue, 17 Dec 2013 16:12:19 GMT" } ]
2013-12-18T00:00:00
[ [ "Couvreur", "Alain", "" ], [ "Delfosse", "Nicolas", "" ], [ "Zémor", "Gilles", "" ] ]
new_dataset
0.999362
1304.2263
Alexander Barg
Alexander Barg, Luciano V. Felix, Marcelo Firer, and Marcos V.P. Spreafico
Linear codes on posets with extension property
Final version; 18pp
Discrete Mathematics, vol. 317, 2014, pp. 1-13
10.1016/j.disc.2013.11.001
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate linear and additive codes in partially ordered Hamming-like spaces that satisfy the extension property, meaning that automorphisms of ideals extend to automorphisms of the poset. The codes are naturally described in terms of translation association schemes that originate from the groups of linear isometries of the space. We address questions of duality and invariants of codes, establishing a connection between the dual association scheme and the scheme defined on the dual poset (they are isomorphic if and only if the poset is self-dual). We further discuss invariants that play the role of weight enumerators of codes in the poset case. In the case of regular rooted trees such invariants are linked to the classical problem of tree isomorphism. We also study the question of whether these invariants are preserved under standard operations on posets such as the ordinal sum and the like.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 16:40:47 GMT" }, { "version": "v2", "created": "Wed, 29 May 2013 21:34:36 GMT" }, { "version": "v3", "created": "Tue, 17 Dec 2013 04:56:35 GMT" } ]
2013-12-18T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Felix", "Luciano V.", "" ], [ "Firer", "Marcelo", "" ], [ "Spreafico", "Marcos V. P.", "" ] ]
new_dataset
0.995367
1305.3248
Laszlo Kish
Laszlo B. Kish, Chiman Kwan
Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic
some clarifications/enhancements; in publication process
Fluct. Noise Lett. 12, 1350018 (2013)
10.1142/S0219477513500181
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
Weak physical uncloneable function (WPUF) encryption key means that the manufacturer of the hardware can clone the key but anybody else is unable to so that. Strong physical uncloneable function (SPUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce a "ultra"-strong PUF with intrinsic dynamical randomness, which is not only not cloneable but it also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and non-volatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.
[ { "version": "v1", "created": "Sun, 12 May 2013 02:51:16 GMT" }, { "version": "v2", "created": "Tue, 21 May 2013 11:35:14 GMT" }, { "version": "v3", "created": "Fri, 26 Jul 2013 23:27:39 GMT" } ]
2013-12-18T00:00:00
[ [ "Kish", "Laszlo B.", "" ], [ "Kwan", "Chiman", "" ] ]
new_dataset
0.998671
1312.4598
Yasutake Takahashi
Tohru Ishii, Yasutake Takahashi, Yoichiro Maeda, and Takayuki Nakamura
Tethered Flying Robot for Information Gathering System
6 pages, 16 figures, ROSIN2013
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information from the sky is important for rescue activity in large-scale disaster or dangerous areas. Observation system using a balloon or an airplane has been studied as an information gathering system from the sky. A balloon observation system needs helium gas and relatively long time to be ready. An airplane observation system can be prepared in a short time and its mobility is good. However, a long time flight is difficult because of limited amount of fuel. This paper proposes a kite-based observation system that complements activities of balloon and airplane observation systems by short preparation time and long time flight. This research aims at construction of the autonomous flight information gathering system using a tethered flying unit that consists of the kite and the ground tether line control unit with a winding machine. This paper reports development of the kite type tethered flying robot and an autonomous flying control system inspired by how to fly a kite by a human.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 00:25:42 GMT" } ]
2013-12-18T00:00:00
[ [ "Ishii", "Tohru", "" ], [ "Takahashi", "Yasutake", "" ], [ "Maeda", "Yoichiro", "" ], [ "Nakamura", "Takayuki", "" ] ]
new_dataset
0.988747
1312.4742
J\"urgen M\"unch
Alexis Ocampo, Fabio Bella, J\"urgen M\"unch
Software Process Commonality Analysis
26 pages. The final publication is available at http://onlinelibrary.wiley.com/doi/10.1002/spip.229/abstract
International Journal on Software Process: Improvement and Practice, 10(3):273-285, 2005
10.1002/spip.229
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To remain viable and thrive, software organizations must rapidly adapt to frequent, and often rather far-ranging, changes to their operational context. These changes typically concern many factors, including the nature of the organization's marketplace in general, its customers' demands, and its business needs. In today's most highly dynamic contexts, such as web services development, other changes create additional, severe challenges. Most critical are changes to the technology in which a software product is written or which the software product has to control or use to provide its functionality. These product-support technology changes are frequently relatively 'small' and incremental. They are, therefore, often handled by relatively 'small,' incremental changes to the organization's software processes. However, the frequency of these changes is high, and their impact is elevated by time-to-market and requirements change demands. The net result is an extremely challenging need to create and manage a large number of customized process variants, collectively having more commonalities than differences, and incorporating experience-based, proven 'best practices'. This paper describes a tool-based approach to coping with product-support technology changes. The approach utilizes established capabilities such as descriptive process modeling and the creation of reference models. It incorporates a new, innovative, tool-based capability to analyze commonalities and differences among processes. The paper includes an example-based evaluation of the approach in the domain of Wireless Internet Services as well as a discussion of its potentially broader application.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 12:19:21 GMT" } ]
2013-12-18T00:00:00
[ [ "Ocampo", "Alexis", "" ], [ "Bella", "Fabio", "" ], [ "Münch", "Jürgen", "" ] ]
new_dataset
0.961879
1312.4752
Ricardo Martins
Ricardo Martins
BW - Eye Ophthalmologic decision support system based on clinical workflow and data mining techniques-image registration algorithm
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blueworks - Medical Expert Diagnosis is developing an application, BWEye, to be used as an ophthalmology consultation decision support system. The implementation of this application involves several different tasks and one of them is the implementation of an ophthalmology images registration algorithm. The work reported in this document is related with the implementation of an algorithm to register images of angiography, colour retinography and redfree retinography. The implementations described were developed in the software MATLAB. The implemented algorithm is based in the detection of the bifurcation points (y-features) of the vascular structures of the retina that usually are visible in the referred type of images. There are proposed two approaches to establish an initial set of features correspondences. The first approach is based in the maximization of the mutual information of the bifurcation regions of the features of images. The second approach is based in the characterization of each bifurcation point and in the minimization of the Euclidean distance between the descriptions of the features of the images in the descriptors space. The final set of the matching features for a pair of images is defined through the application of the RANSAC algorithm. Although, it was not achieved the implementation of a full functional algorithm, there were made several analysis that can be important to future improvement of the current implementation.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 12:41:39 GMT" } ]
2013-12-18T00:00:00
[ [ "Martins", "Ricardo", "" ] ]
new_dataset
0.996309
1312.4853
Philip Healy
Philip Healy, Stefan Meyer, John Morrison, Theo Lynn, Ashkan Paya, Dan C. Marinescu
Bid-Centric Cloud Service Provisioning
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bid-centric service descriptions have the potential to offer a new cloud service provisioning model that promotes portability, diversity of choice and differentiation between providers. A bid matching model based on requirements and capabilities is presented that provides the basis for such an approach. In order to facilitate the bidding process, tenders should be specified as abstractly as possible so that the solution space is not needlessly restricted. To this end, we describe how partial TOSCA service descriptions allow for a range of diverse solutions to be proposed by multiple providers in response to tenders. Rather than adopting a lowest common denominator approach, true portability should allow for the relative strengths and differentiating features of cloud service providers to be applied to bids. With this in mind, we describe how TOSCA service descriptions could be augmented with additional information in order to facilitate heterogeneity in proposed solutions, such as the use of coprocessors and provider-specific services.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 16:33:14 GMT" } ]
2013-12-18T00:00:00
[ [ "Healy", "Philip", "" ], [ "Meyer", "Stefan", "" ], [ "Morrison", "John", "" ], [ "Lynn", "Theo", "" ], [ "Paya", "Ashkan", "" ], [ "Marinescu", "Dan C.", "" ] ]
new_dataset
0.987054
1208.6391
Jalil Boukhobza
Pierre Olivier (Lab-STICC), Jalil Boukhobza (Lab-STICC), Eric Senn (Lab-STICC)
On Benchmarking Embedded Linux Flash File Systems
Embed With Linux, Lorient : France (2012)
ACM SIGBED Review 9(2) 43-47 9, 2 (2012) 43-47
null
null
cs.OS cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to its attractive characteristics in terms of performance, weight and power consumption, NAND flash memory became the main non volatile memory (NVM) in embedded systems. Those NVMs also present some specific characteristics/constraints: good but asymmetric I/O performance, limited lifetime, write/erase granularity asymmetry, etc. Those peculiarities are either managed in hardware for flash disks (SSDs, SD cards, USB sticks, etc.) or in software for raw embedded flash chips. When managed in software, flash algorithms and structures are implemented in a specific flash file system (FFS). In this paper, we present a performance study of the most widely used FFSs in embedded Linux: JFFS2, UBIFS,and YAFFS. We show some very particular behaviors and large performance disparities for tested FFS operations such as mounting, copying, and searching file trees, compression, etc.
[ { "version": "v1", "created": "Fri, 31 Aug 2012 06:32:38 GMT" } ]
2013-12-17T00:00:00
[ [ "Olivier", "Pierre", "", "Lab-STICC" ], [ "Boukhobza", "Jalil", "", "Lab-STICC" ], [ "Senn", "Eric", "", "Lab-STICC" ] ]
new_dataset
0.988678
1308.0311
Armen Bagdasaryan
Armen Bagdasaryan
On the partition of R^n by hyperplanes
This paper has been withdrawn by the author because, as the author became aware, some results are not new
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The partitioning of space by hyperplanes in the context of discrete classification problem is considered. We obtain some relations for the number of partitions and establish a recurrence relation for the maximal number of partitions of R^n by m hyperplanes. We rederive an explicit formula for the number of components into which the space can be partitioned by m hyperplanes.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 17:20:04 GMT" }, { "version": "v2", "created": "Fri, 13 Dec 2013 22:42:41 GMT" } ]
2013-12-17T00:00:00
[ [ "Bagdasaryan", "Armen", "" ] ]
new_dataset
0.973049
1312.4042
Mina Mishra
Mina Mishra, Vijay H. Mankar
Chaotic Encryption Scheme Using 1-D Chaotic Map
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes three different chaotic encryption methods using 1-D chaotic map known as Logistic map named as Logistic, NLFSR and Modified NLFSR according to the name of chaotic map and non-linear function involved in the scheme. The designed schemes have been crypt analyzed for five different methods for testing its strength. Cryptanalysis has been performed for various texts using various keys selected from domain of key space. Logistic and NLFSR methods are found to resist known plaintext attack for available first two characters of plaintext. Plaintext sensitivity of both methods is within small range along with medium key sensitivity. Identifiability for keys of first two of the scheme has not been derived concluding that methods may prove to be weak against brute-force attack. In the last modified scheme avalanche effect found to be improved compared to the previous ones and method is found to resist brute-force attack as it derives the conclusion for identifiability.
[ { "version": "v1", "created": "Sat, 14 Dec 2013 13:12:55 GMT" } ]
2013-12-17T00:00:00
[ [ "Mishra", "Mina", "" ], [ "Mankar", "Vijay H.", "" ] ]
new_dataset
0.997514
1312.4044
Mohammed El-Dosuky
M. A. El-Dosuky
CACO : Competitive Ant Colony Optimization, A Nature-Inspired Metaheuristic For Large-Scale Global Optimization
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale problems are nonlinear problems that need metaheuristics, or global optimization algorithms. This paper reviews nature-inspired metaheuristics, then it introduces a framework named Competitive Ant Colony Optimization inspired by the chemical communications among insects. Then a case study is presented to investigate the proposed framework for large-scale global optimization.
[ { "version": "v1", "created": "Sat, 14 Dec 2013 13:33:48 GMT" } ]
2013-12-17T00:00:00
[ [ "El-Dosuky", "M. A.", "" ] ]
new_dataset
0.998354
1312.4071
Srinjoy Ganguly Mr.
Srinjoy Ganguly, Arpita Chakraborty and Mrinal Kanti Naskar
A Trust-based Framework for Congestion-aware Energy Efficient Routing in Wireless Multimedia Sensor Networks
5 pages, 3 figures and 0 tables. Poster Paper at the Student Research Symposium of the International Conference on High Performance Computing (HiPC), 2013
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new era in wireless sensor network technology has been ushered in through the introduction of multimedia sensor networks, which has a major bottleneck in the form of network congestion. Congestion occurs when resources are in high demand during the active period while the data processing and transmission speeds lag behind the speed of the incoming traffic. This may disrupt normal network operations by buffer overflow, packet loss, increased latency, excessive energy consumption and even worse, a collapse of the entire operation. In this paper we propose a novel Trust Integrated Congestion-aware Energy Efficient Routing algorithm (TCEER) in which the potential of a node is computed using its trust value, congestion status, residual energy, distance from the current packet-forwarding node and the distance from the base station using a Fuzzy Logic Controller. The source node selects the node of highest potential in its one hop radio range for data transmission. Hop by hop data routing from source to base station is obtained which is light-weight as well as energy-efficient. Finally, the merits of the proposed scheme are discussed by comparing it with the existing protocols and the study shows promising improvements in network performance.
[ { "version": "v1", "created": "Sat, 14 Dec 2013 17:49:43 GMT" } ]
2013-12-17T00:00:00
[ [ "Ganguly", "Srinjoy", "" ], [ "Chakraborty", "Arpita", "" ], [ "Naskar", "Mrinal Kanti", "" ] ]
new_dataset
0.961265
1312.4139
Andrew Adamatzky
Andrew Adamatzky
Towards slime mould colour sensor: Recognition of colours by Physarum polycephalum
null
Adamatzky A. Towards slime mould colour sensor: Recognition of colours by Physarum polycephalum. Organic Electronics 14 (2013) 12, 3355-3361
null
null
cs.ET physics.bio-ph q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Acellular slime mould Physarum polycephalum is a popular now user-friendly living substrate for designing of future and emergent sensing and computing devices. P. polycephalum exhibits regular patterns of oscillations of its surface electrical potential. The oscillation patterns are changed when the slime mould is subjected to mechanical, chemical, electrical or optical stimuli. We evaluate feasibility of slime-mould based colour sensors by illuminating Physarum with red, green, blue and white colours and analysing patterns of the slime mould's electrical potential oscillations. We define that the slime mould recognises a colour if it reacts to illumination with the colour by a unique changes in amplitude and periods of oscillatory activity. In laboratory experiments we found that the slime mould recognises red and blue colour. The slime mould does not differentiate between green and white colours. The slime mould also recognises when red colour is switched off. We also map colours to diversity of the oscillations: illumination with a white colour increases diversity of amplitudes and periods of oscillations, other colours studied increase diversity either of amplitude or period.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 12:02:44 GMT" } ]
2013-12-17T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.951127
1312.4189
Andrew Adamatzky
James G.H. Whiting, Ben P.J. de Lacy Costello, Andrew Adamatzky
Towards slime mould chemical sensor: Mapping chemical inputs onto electrical potential dynamics of Physarum Polycephalum
null
Sensors and Actuators B: Chemical 191 (2014) 844-853
null
null
cs.ET physics.bio-ph q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We experimentally derived a unique one-to-one mapping between a range of selected bioactive chemicals and patterns of oscillations of the slime mould's extacellular electrical potential.
[ { "version": "v1", "created": "Sun, 15 Dec 2013 20:48:34 GMT" } ]
2013-12-17T00:00:00
[ [ "Whiting", "James G. H.", "" ], [ "Costello", "Ben P. J. de Lacy", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.987028
1312.4322
Stephen Bryson
Steve Bryson
Virtual Reality: A Definition History - A Personal Essay
6 pages
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This essay, written in 1998 by an active participant in both virtual reality development and the virtual reality definition debate, discusses the definition of the phrase "Virtual Reality" (VR). I start with history from a personal perspective, concentrating on the debate between the "Virtual Reality" and "Virtual Environment" labels in the late 1980's and early 1990's. Definitions of VR based on specific technologies are shown to be unsatisfactory. I propose the following definition of VR, based on the striking effects of a good VR system: "Virtual Reality is the use of computer technology to create the effect of an interactive three-dimensional world in which the objects have a sense of spatial presence." The justification for this definition is discussed in detail, and is favorably compared with the dictionary definitions of "virtual" and "reality". The implications of this definition for virtual reality technology are briefly examined.
[ { "version": "v1", "created": "Mon, 16 Dec 2013 11:33:06 GMT" } ]
2013-12-17T00:00:00
[ [ "Bryson", "Steve", "" ] ]
new_dataset
0.987934
1312.4333
Marius Buliga
Marius Buliga and Louis H. Kauffman
GLC actors, artificial chemical connectomes, topological issues and knots
null
null
null
null
cs.DC math.GT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on graphic lambda calculus, we propose a program for a new model of asynchronous distributed computing, inspired from Hewitt Actor Model, as well as several investigation paths, concerning how one may graft lambda calculus and knot diagrammatics.
[ { "version": "v1", "created": "Mon, 16 Dec 2013 12:40:25 GMT" } ]
2013-12-17T00:00:00
[ [ "Buliga", "Marius", "" ], [ "Kauffman", "Louis H.", "" ] ]
new_dataset
0.987443
1312.4398
Shantanu Chhabra
Shantanu Chhabra
On the number of proper $k$-colorings in an $n$-gon
8 pages, 2 tables
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define an $n$-gon to be any convex polygon with $n$ vertices. Let $V$ represent the set of vertices of the polygon. A proper $k$-coloring refers to a function, $f$ : $V$ $\rightarrow$ $\{1, 2, 3, ... k\}$, such that for any two vertices $u$ and $v$, if $f(u) = f(v)$, $u$ is not adjacent to $v$. The purpose of this paper is to develop a recursive algorithm to compute the number of proper $k$-colorings in an $n$-gon. The proposed algorithm can easily be solved to obtain the explicit expression. This matches the explicit expression obtained from the popular conventional solutions, which confirms the correctness of the proposed algorithm. Often, for huge values of $n$ and $k$, it becomes impractical to display the output numbers, which would consist of thousands of digits. We report the answer modulo a certain number. In such situations, the proposed algorithm is observed to run slightly faster than the conventional recursive algorithm.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 18:08:28 GMT" } ]
2013-12-17T00:00:00
[ [ "Chhabra", "Shantanu", "" ] ]
new_dataset
0.956855
0902.2969
Giorgi Japaridze
Giorgi Japaridze
Ptarithmetic
Substantially better versions are on their way. Hence the present article probably will not be published
The Baltic International Yearbook on Cognition, Logic and Communication 8 (2013), Article 5, pp. 1-186
10.4148/1944-3676.1074
null
cs.LO cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present article introduces ptarithmetic (short for "polynomial time arithmetic") -- a formal number theory similar to the well known Peano arithmetic, but based on the recently born computability logic (see http://www.cis.upenn.edu/~giorgi/cl.html) instead of classical logic. The formulas of ptarithmetic represent interactive computational problems rather than just true/false statements, and their "truth" is understood as existence of a polynomial time solution. The system of ptarithmetic elaborated in this article is shown to be sound and complete. Sound in the sense that every theorem T of the system represents an interactive number-theoretic computational problem with a polynomial time solution and, furthermore, such a solution can be effectively extracted from a proof of T. And complete in the sense that every interactive number-theoretic problem with a polynomial time solution is represented by some theorem T of the system. The paper is self-contained, and can be read without any previous familiarity with computability logic.
[ { "version": "v1", "created": "Tue, 17 Feb 2009 19:14:09 GMT" }, { "version": "v2", "created": "Wed, 18 Feb 2009 12:48:43 GMT" }, { "version": "v3", "created": "Fri, 26 Feb 2010 10:17:31 GMT" } ]
2013-12-16T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
new_dataset
0.999455
1306.5005
Matthew Patitz
Tyler Fochtman, Jacob Hendricks, Jennifer E. Padilla, Matthew J. Patitz, and Trent A. Rogers
Signal Transmission Across Tile Assemblies: 3D Static Tiles Simulate Active Self-Assembly by 2D Signal-Passing Tiles
A condensed version of this paper will appear in a special issue of Natural Computing for papers from DNA 19. This full version contains proofs not seen in the published version
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 2-Handed Assembly Model (2HAM) is a tile-based self-assembly model in which, typically beginning from single tiles, arbitrarily large aggregations of static tiles combine in pairs to form structures. The Signal-passing Tile Assembly Model (STAM) is an extension of the 2HAM in which the tiles are dynamically changing components which are able to alter their binding domains as they bind together. For our first result, we demonstrate useful techniques and transformations for converting an arbitrarily complex STAM$^+$ tile set into an STAM$^+$ tile set where every tile has a constant, low amount of complexity, in terms of the number and types of ``signals'' they can send, with a trade off in scale factor. Using these simplifications, we prove that for each temperature $\tau>1$ there exists a 3D tile set in the 2HAM which is intrinsically universal for the class of all 2D STAM$^+$ systems at temperature $\tau$ (where the STAM$^+$ does not make use of the STAM's power of glue deactivation and assembly breaking, as the tile components of the 2HAM are static and unable to change or break bonds). This means that there is a single tile set $U$ in the 3D 2HAM which can, for an arbitrarily complex STAM$^+$ system $S$, be configured with a single input configuration which causes $U$ to exactly simulate $S$ at a scale factor dependent upon $S$. Furthermore, this simulation uses only two planes of the third dimension. This implies that there exists a 3D tile set at temperature $2$ in the 2HAM which is intrinsically universal for the class of all 2D STAM$^+$ systems at temperature $1$. Moreover, we show that for each temperature $\tau>1$ there exists an STAM$^+$ tile set which is intrinsically universal for the class of all 2D STAM$^+$ systems at temperature $\tau$, including the case where $\tau = 1$.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 21:42:50 GMT" }, { "version": "v2", "created": "Fri, 13 Dec 2013 05:01:02 GMT" } ]
2013-12-16T00:00:00
[ [ "Fochtman", "Tyler", "" ], [ "Hendricks", "Jacob", "" ], [ "Padilla", "Jennifer E.", "" ], [ "Patitz", "Matthew J.", "" ], [ "Rogers", "Trent A.", "" ] ]
new_dataset
0.990223
1307.7223
Seyed Hamed Hassani
S. Hamed Hassani and Rudiger Urbanke
Universal Polar Codes
Submitted to IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes, invented by Arikan in 2009, are known to achieve the capacity of any binary-input memoryless output-symmetric channel. One of the few drawbacks of the original polar code construction is that it is not universal. This means that the code has to be tailored to the channel if we want to transmit close to capacity. We present two "polar-like" schemes which are capable of achieving the compound capacity of the whole class of binary-input memoryless output-symmetric channels with low complexity. Roughly speaking, for the first scheme we stack up $N$ polar blocks of length $N$ on top of each other but shift them with respect to each other so that they form a "staircase." Coding then across the columns of this staircase with a standard Reed-Solomon code, we can achieve the compound capacity using a standard successive decoder to process the rows (the polar codes) and in addition a standard Reed-Solomon erasure decoder to process the columns. Compared to standard polar codes this scheme has essentially the same complexity per bit but a block length which is larger by a factor $O(N \log_2(N)/\epsilon)$, where $\epsilon$ is the gap to capacity. For the second scheme we first show how to construct a true polar code which achieves the compound capacity for a finite number of channels. We achieve this by introducing special "polarization" steps which "align" the good indices for the various channels. We then show how to exploit the compactness of the space of binary-input memoryless output-symmetric channels to reduce the compound capacity problem for this class to a compound capacity problem for a finite set of channels. This scheme is similar in spirit to standard polar codes, but the price for universality is a considerably larger blocklength. We close with what we consider to be some interesting open problems.
[ { "version": "v1", "created": "Sat, 27 Jul 2013 07:12:39 GMT" }, { "version": "v2", "created": "Fri, 13 Dec 2013 14:10:24 GMT" } ]
2013-12-16T00:00:00
[ [ "Hassani", "S. Hamed", "" ], [ "Urbanke", "Rudiger", "" ] ]
new_dataset
0.999798
1312.3724
Pierluigi Gallo
Pierluigi Gallo, Ilenia Tinnirello, Laura Giarr\'e, Domenico Garlisi, Daniele Croce and Adriano Fagiolini
ARIANNA: pAth Recognition for Indoor Assisted NavigatioN with Augmented perception
null
null
null
null
cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ARIANNA stands for pAth Recognition for Indoor Assisted Navigation with Augmented perception. It is a flexible and low cost navigation system for vi- sually impaired people. Arianna permits to navigate colored paths painted or sticked on the floor revealing their directions through vibrational feedback on commercial smartphones.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 07:54:22 GMT" } ]
2013-12-16T00:00:00
[ [ "Gallo", "Pierluigi", "" ], [ "Tinnirello", "Ilenia", "" ], [ "Giarré", "Laura", "" ], [ "Garlisi", "Domenico", "" ], [ "Croce", "Daniele", "" ], [ "Fagiolini", "Adriano", "" ] ]
new_dataset
0.999564
1312.3872
Stephen Bensman
Stephen J. Bensman
Eugene Garfield, Francis Narin, and PageRank: The Theoretical Bases of the Google Search Engine
null
null
null
null
cs.IR cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a test of the validity of using Google Scholar to evaluate the publications of researchers by comparing the premises on which its search engine, PageRank, is based, to those of Garfield's theory of citation indexing. It finds that the premises are identical and that PageRank and Garfield's theory of citation indexing validate each other.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 16:52:07 GMT" } ]
2013-12-16T00:00:00
[ [ "Bensman", "Stephen J.", "" ] ]
new_dataset
0.994011
1312.2841
Chanabasayya Vastrad M
Doreswamy and Chanabasayya .M. Vastrad
Predictive Comparative QSAR Analysis Of As 5-Nitofuran-2-YL Derivatives Myco bacterium tuberculosis H37RV Inhibitors Bacterium Tuberculosis H37RV Inhibitors
null
published Health Informatics- An International Journal (HIIJ) Vol.2, No.4, November 2013
10.5121/hiij.2013.2404
null
cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Antitubercular activity of 5-nitrofuran-2-yl Derivatives series were subjected to Quantitative Structure Activity Relationship (QSAR) Analysis with an effort to derive and understand a correlation between the biological activity as response variable and different molecular descriptors as independent variables. QSAR models are built using 40 molecular descriptor dataset. Different statistical regression expressions were got using Partial Least Squares (PLS),Multiple Linear Regression (MLR) and Principal Component Regression (PCR) techniques. The among these technique, Partial Least Square Regression (PLS) technique has shown very promising result as compared to MLR technique A QSAR model was build by a training set of 30 molecules with correlation coefficient ($r^2$) of 0.8484, significant cross validated correlation coefficient ($q^2$) is 0.0939, F test is 48.5187, ($r^2$) for external test set (pred$_r^2$) is -0.5604, coefficient of correlation of predicted data set (pred$_r^2se$) is 0.7252 and degree of freedom is 26 by Partial Least Squares Regression technique.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 15:50:39 GMT" } ]
2013-12-13T00:00:00
[ [ "Doreswamy", "", "" ], [ "Vastrad", "Chanabasayya . M.", "" ] ]
new_dataset
0.971747
1312.3389
Yun Fan
Yun Fan, San Ling, Hongwei Liu
Matrix Product Codes over Finite Commutative Frobenius Rings
Des. Codes Cryptogr. published online: 19 Jul 2012
null
10.1007/s10623-012-9726-y
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Properties of matrix product codes over finite commutative Frobenius rings are investigated. The minimum distance of matrix product codes constructed with several types of matrices is bounded in different ways. The duals of matrix product codes are also explicitly described in terms of matrix product codes.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 02:53:47 GMT" } ]
2013-12-13T00:00:00
[ [ "Fan", "Yun", "" ], [ "Ling", "San", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.99976
1312.3412
Olivier Finkel
Olivier Finkel (ELM, IMJ)
The Determinacy of Context-Free Games
This paper is an extended version of a STACS 2012 conference paper [arXiv:1112.1186]. It will appear in the Journal of Symbolic Logic
Journal of Symbolic Logic 78, 4 (2013) 1115-1134
null
EXT-JSL-STACS12
cs.LO cs.GT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the determinacy of Gale-Stewart games whose winning sets are accepted by real-time 1-counter B\"uchi automata is equivalent to the determinacy of (effective) analytic Gale-Stewart games which is known to be a large cardinal assumption. We show also that the determinacy of Wadge games between two players in charge of omega-languages accepted by 1-counter B\"uchi automata is equivalent to the (effective) analytic Wadge determinacy. Using some results of set theory we prove that one can effectively construct a 1-counter B\"uchi automaton A and a B\"uchi automaton B such that: (1) There exists a model of ZFC in which Player 2 has a winning strategy in the Wadge game W(L(A), L(B)); (2) There exists a model of ZFC in which the Wadge game W(L(A), L(B)) is not determined. Moreover these are the only two possibilities, i.e. there are no models of ZFC in which Player 1 has a winning strategy in the Wadge game W(L(A), L(B)).
[ { "version": "v1", "created": "Thu, 12 Dec 2013 07:33:31 GMT" } ]
2013-12-13T00:00:00
[ [ "Finkel", "Olivier", "", "ELM, IMJ" ] ]
new_dataset
0.992471
1312.3420
Xinyu Lei
Xinyu Lei, Xiaofeng Liao, Yonghong Xiong
Group Key Agreement Protocol for MANETs Based on HSK Scheme
9 pages, 7 figures
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first provide a spanning tree (ST)-based centralized group key agreement protocol for unbalanced mobile Ad Hoc networks (MANETs). Based on the centralized solution, a local spanning tree (LST)-based distributed protocol for general MANETs is subsequently presented. Both protocols follow the basic features of the HSK scheme: 1) H means that a hybrid approach, which is the combination of key agreement and key distribution via symmetric encryption, is exploited; 2) S indicates that a ST or LSTs are adopted to form a connected network topology; and 3) K implies that the extended Kruskal algorithm is employed to handle dynamic events. It is shown that the HSK scheme is a uniform approach to handle the initial key establishment process as well as all kinds of dynamic events in group key agreement protocol for MANETs. Additionally, the extended Kruskal algorithm enables to realize the reusability of the precomputed secure links to reduce the overhead. Moreover, some other aspects, such as the network topology connectivity and security, are well analyzed.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 08:52:03 GMT" } ]
2013-12-13T00:00:00
[ [ "Lei", "Xinyu", "" ], [ "Liao", "Xiaofeng", "" ], [ "Xiong", "Yonghong", "" ] ]
new_dataset
0.994812
1312.3538
Philipp Kindermann
Md. Jawaherul Alam, Michael A. Bekos, Michael Kaufmann, Philipp Kindermann, Stephen G. Kobourov, and Alexander Wolff
Smooth Orthogonal Drawings of Planar Graphs
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In \emph{smooth orthogonal layouts} of planar graphs, every edge is an alternating sequence of axis-aligned segments and circular arcs with common axis-aligned tangents. In this paper, we study the problem of finding smooth orthogonal layouts of low \emph{edge complexity}, that is, with few segments per edge. We say that a graph has \emph{smooth complexity} k---for short, an SC_k-layout---if it admits a smooth orthogonal drawing of edge complexity at most $k$. Our main result is that every 4-planar graph has an SC_2-layout. While our drawings may have super-polynomial area, we show that, for 3-planar graphs, cubic area suffices. Further, we show that every biconnected 4-outerplane graph admits an SC_1-layout. On the negative side, we demonstrate an infinite family of biconnected 4-planar graphs that requires exponential area for an SC_1-layout. Finally, we present an infinite family of biconnected 4-planar graphs that does not admit an SC_1-layout.
[ { "version": "v1", "created": "Thu, 12 Dec 2013 16:34:10 GMT" } ]
2013-12-13T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Bekos", "Michael A.", "" ], [ "Kaufmann", "Michael", "" ], [ "Kindermann", "Philipp", "" ], [ "Kobourov", "Stephen G.", "" ], [ "Wolff", "Alexander", "" ] ]
new_dataset
0.9978
1312.3077
Lutz Bornmann Dr.
Marcin Kozak, Lutz Bornmann, Loet Leydesdorff
How have the Eastern European countries of the former Warsaw Pact developed since 1990? A bibliometric study
null
null
null
null
cs.DL stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Did the demise of the Soviet Union in 1991 influence the scientific performance of the researchers in Eastern European countries? Did this historical event affect international collaboration by researchers from the Eastern European countries with those of Western countries? Did it also change international collaboration among researchers from the Eastern European countries? Trying to answer these questions, this study aims to shed light on international collaboration by researchers from the Eastern European countries (Russia, Ukraine, Belarus, Moldova, Bulgaria, the Czech Republic, Hungary, Poland, Romania and Slovakia). The number of publications and normalized citation impact values are compared for these countries based on InCites (Thomson Reuters), from 1981 up to 2011. The international collaboration by researchers affiliated to institutions in Eastern European countries at the time points of 1990, 2000 and 2011 was studied with the help of Pajek and VOSviewer software, based on data from the Science Citation Index (Thomson Reuters). Our results show that the breakdown of the communist regime did not lead, on average, to a huge improvement in the publication performance of the Eastern European countries and that the increase in international co-authorship relations by the researchers affiliated to institutions in these countries was smaller than expected. Most of the Eastern European countries are still subject to changes and are still awaiting their boost in scientific development.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 08:43:14 GMT" } ]
2013-12-12T00:00:00
[ [ "Kozak", "Marcin", "" ], [ "Bornmann", "Lutz", "" ], [ "Leydesdorff", "Loet", "" ] ]
new_dataset
0.999411
1312.3182
Prasanth G Narasimha-Shenoi
Ram Kumar. R, Kannan Balakrishnan, Manoj Changat, A.Sreekumar, Prasanth G. Narasimha-Shenoi
On The Center Sets and Center Numbers of Some Graph Classes
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a set $S$ of vertices and the vertex $v$ in a connected graph $G$, $\displaystyle\max_{x \in S}d(x,v)$ is called the $S$-eccentricity of $v$ in $G$. The set of vertices with minimum $S$-eccentricity is called the $S$-center of $G$. Any set $A$ of vertices of $G$ such that $A$ is an $S$-center for some set $S$ of vertices of $G$ is called a center set. We identify the center sets of certain classes of graphs namely, Block graphs, $K_{m,n}$, $K_n-e$, wheel graphs, odd cycles and symmetric even graphs and enumerate them for many of these graph classes. We also introduce the concept of center number which is defined as the number of distinct center sets of a graph and determine the center number of some graph classes.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 14:20:55 GMT" } ]
2013-12-12T00:00:00
[ [ "R", "Ram Kumar.", "" ], [ "Balakrishnan", "Kannan", "" ], [ "Changat", "Manoj", "" ], [ "Sreekumar", "A.", "" ], [ "Narasimha-Shenoi", "Prasanth G.", "" ] ]
new_dataset
0.96275
1312.3194
Natalia Silberstein
Natalia Silberstein, Ankit Singh Rawat and Sriram Vishwanath
Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes
This paper was presented in part at the 2012 50th Annual Allerton Conference on Communication, Control, and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents and analyzes a novel concatenated coding scheme for enabling error resilience in two distributed storage settings: one being storage using existing regenerating codes and the second being storage using locally repairable codes. The concatenated coding scheme brings together a maximum rank distance (MRD) code as an outer code and either a globally regenerating or a locally repairable code as an inner code. Also, error resilience for combination of locally repairable codes with regenerating codes is considered. This concatenated coding system is designed to handle two different types of adversarial errors: the first type includes an adversary that can replace the content of an affected node only once; while the second type studies an adversary that is capable of polluting data an unbounded number of times. The paper establishes an upper bound on the resilience capacity for a locally repairable code and proves that this concatenated coding coding scheme attains the upper bound on resilience capacity for the first type of adversary. Further, the paper presents mechanisms that combine the presented concatenated coding scheme with subspace signatures to achieve error resilience for the second type of errors.
[ { "version": "v1", "created": "Wed, 11 Dec 2013 14:50:08 GMT" } ]
2013-12-12T00:00:00
[ [ "Silberstein", "Natalia", "" ], [ "Rawat", "Ankit Singh", "" ], [ "Vishwanath", "Sriram", "" ] ]
new_dataset
0.974726
1308.6007
Cristopher Moore
Cristopher Moore and Leonard J. Schulman
Tree Codes and a Conjecture on Exponential Sums
Proc. ITCS 2014
null
null
null
cs.CC cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new conjecture on some exponential sums. These particular sums have not apparently been considered in the literature. Subject to the conjecture we obtain the first effective construction of asymptotically good tree codes. The available numerical evidence is consistent with the conjecture and is sufficient to certify codes for significant-length communications.
[ { "version": "v1", "created": "Tue, 27 Aug 2013 22:42:33 GMT" }, { "version": "v2", "created": "Mon, 9 Dec 2013 21:39:00 GMT" } ]
2013-12-11T00:00:00
[ [ "Moore", "Cristopher", "" ], [ "Schulman", "Leonard J.", "" ] ]
new_dataset
0.987833
1312.2175
Sugata Sanyal
Bibhas Roy, Suman Banik, Parthi Dey, Sugata Sanyal, Nabendu Chaki
Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services
This paper has been withdrawn by the author due to a crucial sign error in equation 1
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristics like dynamic topology, time varying QoS requirements, limited resources and energy etc. QoS routing plays an important role for providing QoS in wireless ad hoc networks. The most complex issue in this kind of networks is to find a path between the communication end points satisfying QoS requirement for the user. Nature-inspired algorithms (swarm intelligence) such as ant colony optimization ACO)algorithms have shown to be a good technique for developing routing algorithms for MANETs. In this paper, a new QoS algorithm for mobile ad hoc network has been proposed. The proposed algorithm combines the idea of Ant Colony Optimization (ACO) with Optimized Link State Routing (OLSR) protocol to identify multiple stable paths between source and destination nodes.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 04:55:06 GMT" }, { "version": "v2", "created": "Tue, 10 Dec 2013 16:04:13 GMT" } ]
2013-12-11T00:00:00
[ [ "Roy", "Bibhas", "" ], [ "Banik", "Suman", "" ], [ "Dey", "Parthi", "" ], [ "Sanyal", "Sugata", "" ], [ "Chaki", "Nabendu", "" ] ]
new_dataset
0.996642
1312.2581
Amor Lazzez Dr.
Amor Lazzez, Thabet Slimani
Deployment of VoIP Technology: QoS Concerns
8 pages, 3 figures
International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 2, Issue 9, September 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice over IP (VoIP) is an emerging communication service allowing voice transmission over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, phone and service portability, mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as interoperability issues, security issues, and QoS concerns. Among these disadvantages, QoS issues are considered the most serious due to the QoS problems that may arise on IP networks, and the stringent QoS requirements of voice traffic. The aim of this paper is carry out a deep analysis of the QoS concerns of the VoIP technology. Firstly, we present a brief overview about the VoIP technology. Then, we discuss the QoS issues related to the use of the IP networking technology for voice traffic transmission. After that, we present the QoS concerns related voice clarity. Finally, we present the QoS mechanisms proposed to make the IP technology able to support voice traffic QoS requirements in terms of voice clarity, voice packet delay, packet delay variation, and packet loss.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 15:47:35 GMT" } ]
2013-12-11T00:00:00
[ [ "Lazzez", "Amor", "" ], [ "Slimani", "Thabet", "" ] ]
new_dataset
0.991467
1312.2625
Carlton Thompson
Carlton A. Thompson, Haniph A. Latchman, Nathan Angelacos, Bharath Kumar Pareek
A Distributed IP-Based Telecommunication System using SIP
16 pages, 10 figures
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice over Internet Protocol (VoIP) technologies are integral to modern telecommunications because of their advanced features, flexibility, and economic benefits. Internet Service Providers initially promoted these technologies by providing low cost local and international calling. At present, there is also a great deal of interest in using IP-based technologies to replace traditional small and large office telephone systems that use traditional PBXs (Private Branch eXchange). Unfortunately, the large majority of the emerging VoIP based office telephone systems have followed the centralized design of traditional public and private telephone systems in which all the intelligence in the system is at the core, with quite expensive hardware and software components and appropriate redundancy for adequate levels of reliability. In this paper, it is argued that a centralized model for an IP-based telecommunications system fails to exploit the full capabilities of Internet-inspired communications and that, very simple, inexpensive, elegant and flexible solutions are possible by deliberately avoiding the centralized approach. This paper describes the design, philosophy and implementation of a prototype for a fully distributed IP-based Telecommunication System (IPTS) that provides the essential feature set for office and home telecommunications, including IP-based long-distance and local calling, and with the support for video as well as data and text. The prototype system was implemented with an Internet-inspired distributed design using open source software, with appropriate customizations and configurations.
[ { "version": "v1", "created": "Mon, 9 Dec 2013 22:51:57 GMT" } ]
2013-12-11T00:00:00
[ [ "Thompson", "Carlton A.", "" ], [ "Latchman", "Haniph A.", "" ], [ "Angelacos", "Nathan", "" ], [ "Pareek", "Bharath Kumar", "" ] ]
new_dataset
0.998563
1312.2628
Ibrahim Umar
Ibrahim Umar, Otto Anshus, Phuong Ha (University of Troms{\o})
DeltaTree: A Practical Locality-aware Concurrent Search Tree
null
null
null
IFI-UIT Technical Report 2013-74
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As other fundamental programming abstractions in energy-efficient computing, search trees are expected to support both high parallelism and data locality. However, existing highly-concurrent search trees such as red-black trees and AVL trees do not consider data locality while existing locality-aware search trees such as those based on the van Emde Boas layout (vEB-based trees), poorly support concurrent (update) operations. This paper presents DeltaTree, a practical locality-aware concurrent search tree that combines both locality-optimisation techniques from vEB-based trees and concurrency-optimisation techniques from non-blocking highly-concurrent search trees. DeltaTree is a $k$-ary leaf-oriented tree of DeltaNodes in which each DeltaNode is a size-fixed tree-container with the van Emde Boas layout. The expected memory transfer costs of DeltaTree's Search, Insert, and Delete operations are $O(\log_B N)$, where $N, B$ are the tree size and the unknown memory block size in the ideal cache model, respectively. DeltaTree's Search operation is wait-free, providing prioritised lanes for Search operations, the dominant operation in search trees. Its Insert and {\em Delete} operations are non-blocking to other Search, Insert, and Delete operations, but they may be occasionally blocked by maintenance operations that are sometimes triggered to keep DeltaTree in good shape. Our experimental evaluation using the latest implementation of AVL, red-black, and speculation friendly trees from the Synchrobench benchmark has shown that DeltaTree is up to 5 times faster than all of the three concurrent search trees for searching operations and up to 1.6 times faster for update operations when the update contention is not too high.
[ { "version": "v1", "created": "Mon, 9 Dec 2013 23:30:02 GMT" } ]
2013-12-11T00:00:00
[ [ "Umar", "Ibrahim", "", "University of Tromsø" ], [ "Anshus", "Otto", "", "University of Tromsø" ], [ "Ha", "Phuong", "", "University of Tromsø" ] ]
new_dataset
0.996468
1312.2629
Yongcai Wang
Yongcai Wang, Haoran Feng, Xiangyu Xi
Sense, Model and Identify the Load Signatures of HVAC Systems in Metro Stations
5 pages, 5 figures
null
null
null
cs.SY
http://creativecommons.org/licenses/by/3.0/
The HVAC systems in subway stations are energy consuming giants, each of which may consume over 10, 000 Kilowatts per day for cooling and ventilation. To save energy for the HVAC systems, it is critically important to firstly know the "load signatures" of the HVAC system, i.e., the quantity of heat imported from the outdoor environments and by the passengers respectively in different periods of a day, which will significantly benefit the design of control policies. In this paper, we present a novel sensing and learning approach to identify the load signature of the HVAC system in the subway stations. In particular, sensors and smart meters were deployed to monitor the indoor, outdoor temperatures, and the energy consumptions of the HVAC system in real-time. The number of passengers was counted by the ticket checking system. At the same time, the cooling supply provided by the HVAC system was inferred via the energy consumption logs of the HVAC system. Since the indoor temperature variations are driven by the difference of the loads and the cooling supply, linear regression model was proposed for the load signature, whose coefficients are derived via a proposed algorithm . We collected real sensing data and energy log data from HaiDianHuangZhuang Subway station, which is in line 4 of Beijing from the duration of July 2012 to Sept. 2012. The data was used to evaluate the coefficients of the regression model. The experiment results show typical variation signatures of the loads from the passengers and from the outdoor environments respectively, which provide important contexts for smart control policies.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 00:11:50 GMT" } ]
2013-12-11T00:00:00
[ [ "Wang", "Yongcai", "" ], [ "Feng", "Haoran", "" ], [ "Xi", "Xiangyu", "" ] ]
new_dataset
0.992184
1312.2632
Yongcai Wang
Yongcai Wang, Haoran Feng, Xiao Qi
SEED: Public Energy and Environment Dataset for Optimizing HVAC Operation in Subway Stations
5 pages, 14 figures
null
null
null
cs.SY
http://creativecommons.org/licenses/by/3.0/
For sustainability and energy saving, the problem to optimize the control of heating, ventilating, and air-conditioning (HVAC) systems has attracted great attentions, but analyzing the signatures of thermal environments and HVAC systems and the evaluation of the optimization policies has encountered inefficiency and inconvenient problems due to the lack of public dataset. In this paper, we present the Subway station Energy and Environment Dataset (SEED), which was collected from a line of Beijing subway stations, providing minute-resolution data regarding the environment dynamics (temperature, humidity, CO2, etc.) working states and energy consumptions of the HVAC systems (ventilators, refrigerators, pumps), and hour-resolution data of passenger flows. We describe the sensor deployments and the HVAC systems for data collection and for environment control, and also present initial investigation for the energy disaggregation of HVAC system, the signatures of the thermal load, cooling supply, and the passenger flow using the dataset.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 00:29:04 GMT" } ]
2013-12-11T00:00:00
[ [ "Wang", "Yongcai", "" ], [ "Feng", "Haoran", "" ], [ "Qi", "Xiao", "" ] ]
new_dataset
0.999761
1312.2700
EPTCS
Yoichi Hirai (National Institute of Advanced Industrial Science and Technology)
Session Types in Abelian Logic
In Proceedings PLACES 2013, arXiv:1312.2218
EPTCS 137, 2013, pp. 33-52
10.4204/EPTCS.137.4
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There was a PhD student who says "I found a pair of wooden shoes. I put a coin in the left and a key in the right. Next morning, I found those objects in the opposite shoes." We do not claim existence of such shoes, but propose a similar programming abstraction in the context of typed lambda calculi. The result, which we call the Amida calculus, extends Abramsky's linear lambda calculus LF and characterizes Abelian logic.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 08:03:46 GMT" } ]
2013-12-11T00:00:00
[ [ "Hirai", "Yoichi", "", "National Institute of Advanced Industrial Science and\n Technology" ] ]
new_dataset
0.997746
1312.2706
EPTCS
Romain Demeyer, Wim Vanhoof
Static Application-Level Race Detection in STM Haskell using Contracts
In Proceedings PLACES 2013, arXiv:1312.2218. [email protected]; [email protected]
EPTCS 137, 2013, pp. 115-134
10.4204/EPTCS.137.10
null
cs.LO cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Writing concurrent programs is a hard task, even when using high-level synchronization primitives such as transactional memories together with a functional language with well-controlled side-effects such as Haskell, because the interferences generated by the processes to each other can occur at different levels and in a very subtle way. The problem occurs when a thread leaves or exposes the shared data in an inconsistent state with respect to the application logic or the real meaning of the data. In this paper, we propose to associate contracts to transactions and we define a program transformation that makes it possible to extend static contract checking in the context of STM Haskell. As a result, we are able to check statically that each transaction of a STM Haskell program handles the shared data in a such way that a given consistency property, expressed in the form of a user-defined boolean function, is preserved. This ensures that bad interference will not occur during the execution of the concurrent program.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 08:04:37 GMT" } ]
2013-12-11T00:00:00
[ [ "Demeyer", "Romain", "" ], [ "Vanhoof", "Wim", "" ] ]
new_dataset
0.996295
1312.2807
Susumu Matsumae
Susumu Matsumae
Polylogarithmic Gap between Meshes with Reconfigurable Row/Column Buses and Meshes with Statically Partitioned Buses
6 pages, 5 figures
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 3 Issue 2, 2012
10.14569/IJACSA.2012.030216
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the difference in computational power between the mesh-connected parallel computers equipped with dynamically reconfigurable bus systems and those with static ones. The mesh with separable buses (MSB) is the mesh-connected parallel computer with dynamically reconfigurable row/column buses. The broadcast buses of the MSB can be dynamically sectioned into smaller bus segments by program control. We show that the MSB of size $n \times n$ can work with$O(\log^2 n)$ step even if its dynamic reconfigurable function is disabled. Here, we assume the word-model broadcast buses, and use the relation between the word-model bus and the bit-model bus.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 14:18:46 GMT" } ]
2013-12-11T00:00:00
[ [ "Matsumae", "Susumu", "" ] ]
new_dataset
0.995084
1312.2819
Jean Cardinal
Jean Cardinal, Stefan Felsner
Covering Partial Cubes with Zones
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A partial cube is a graph having an isometric embedding in a hypercube. Partial cubes are characterized by a natural equivalence relation on the edges, whose classes are called zones. The number of zones determines the minimal dimension of a hypercube in which the graph can be embedded. We consider the problem of covering the vertices of a partial cube with the minimum number of zones. The problem admits several special cases, among which are the problem of covering the cells of a line arrangement with a minimum number of lines, and the problem of finding a minimum-size fibre in a bipartite poset. For several such special cases, we give upper and lower bounds on the minimum size of a covering by zones. We also consider the computational complexity of those problems, and establish some hardness results.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 14:54:47 GMT" } ]
2013-12-11T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Felsner", "Stefan", "" ] ]
new_dataset
0.98323
1312.2822
Konstantinos Charalampous
Konstantinos Charalampous, Ioannis Kostavelis, Dimitrios Chrysostomou, Angelos Amanatiadis and Antonios Gasteratos
3D Maps Registration and Path Planning for Autonomous Robot Navigation
3 pages, 6 figures, IROS'13 Workshop on Robots and Sensors integration in future rescue INformation system (ROSIN'13)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile robots dedicated in security tasks should be capable of clearly perceiving their environment to competently navigate within cluttered areas, so as to accomplish their assigned mission. The paper in hand describes such an autonomous agent designed to deploy competently in hazardous environments equipped with a laser scanner sensor. During the robot's motion, consecutive scans are obtained to produce dense 3D maps of the area. A 3D point cloud registration technique is exploited to merge the successively created maps during the robot's motion followed by an ICP refinement step. The reconstructed 3D area is then top-down projected with great resolution, to be fed in a path planning algorithm suitable to trace obstacle-free trajectories in the explored area. The main characteristic of the path planner is that the robot's embodiment is considered for producing detailed and safe trajectories of $1$ $cm$ resolution. The proposed method has been evaluated with our mobile robot in several outdoor scenarios revealing remarkable performance.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 14:57:18 GMT" } ]
2013-12-11T00:00:00
[ [ "Charalampous", "Konstantinos", "" ], [ "Kostavelis", "Ioannis", "" ], [ "Chrysostomou", "Dimitrios", "" ], [ "Amanatiadis", "Angelos", "" ], [ "Gasteratos", "Antonios", "" ] ]
new_dataset
0.988011
1312.2828
Pardis Pourghomi mr
Pardis Pourghomi, Muhammad Qasim saeed and Gheorghita Ghinea
A Proposed NFC Payment Application
9 pages, 4 figures
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No. 8, 2013
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Near Field Communication (NFC) technology is based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they have raised several issues which have concerned the researches and prevented the adoption of this technology within societies. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. In this paper, we introduce a new NFC payment application, which is based on our previous NFC Cloud Wallet model to demonstrate a reliable structure of NFC ecosystem. We also describe the step by step execution of the proposed protocol in order to carefully analyse the payment application and our main focus will be on the Mobile Network Operator (MNO) as the main player within the ecosystem.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 15:13:46 GMT" } ]
2013-12-11T00:00:00
[ [ "Pourghomi", "Pardis", "" ], [ "saeed", "Muhammad Qasim", "" ], [ "Ghinea", "Gheorghita", "" ] ]
new_dataset
0.999594
1312.2865
Vitali Volovoi
Vitali Volovoi
Abridged Petri Nets
17 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new graphical framework, Abridged Petri Nets (APNs) is introduced for bottom-up modeling of complex stochastic systems. APNs are similar to Stochastic Petri Nets (SPNs) in as much as they both rely on component-based representation of system state space, in contrast to Markov chains that explicitly model the states of an entire system. In both frameworks, so-called tokens (denoted as small circles) represent individual entities comprising the system; however, SPN graphs contain two distinct types of nodes (called places and transitions) with transitions serving the purpose of routing tokens among places. As a result, a pair of place nodes in SPNs can be linked to each other only via a transient stop, a transition node. In contrast, APN graphs link place nodes directly by arcs (transitions), similar to state space diagrams for Markov chains, and separate transition nodes are not needed. Tokens in APN are distinct and have labels that can assume both discrete values ("colors") and continuous values ("ages"), both of which can change during simulation. Component interactions are modeled in APNs using triggers, which are either inhibitors or enablers (the inhibitors' opposites). Hierarchical construction of APNs rely on using stacks (layers) of submodels with automatically matching color policies. As a result, APNs provide at least the same modeling power as SPNs, but, as demonstrated by means of several examples, the resulting models are often more compact and transparent, therefore facilitating more efficient performance evaluation of complex systems.
[ { "version": "v1", "created": "Tue, 10 Dec 2013 16:38:27 GMT" } ]
2013-12-11T00:00:00
[ [ "Volovoi", "Vitali", "" ] ]
new_dataset
0.996574
1007.3476
Mohammad Firooz
Mohammad H. Firooz, Dustin Maas, Junxing Zhang, Neal Patwari, and Sneha K. Kasera
Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation
null
null
10.1109/TWC.2011.111611.091774
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New techniques in cross-layer wireless networks are building demand for ubiquitous channel sounding, that is, the capability to measure channel impulse response (CIR) with any standard wireless network and node. Towards that goal, we present a software-defined IEEE 802.11b receiver and CIR estimation system with little additional computational complexity compared to 802.11b reception alone. The system implementation, using the universal software radio peripheral (USRP) and GNU Radio, is described and compared to previous work. By overcoming computational limitations and performing direct-sequence spread-spectrum (DS-SS) matched filtering on the USRP, we enable high-quality yet inexpensive CIR estimation. We validate the channel sounder and present a drive test campaign which measures hundreds of channels between WiFi access points and an in-vehicle receiver in urban and suburban areas.
[ { "version": "v1", "created": "Tue, 20 Jul 2010 18:42:40 GMT" } ]
2013-12-10T00:00:00
[ [ "Firooz", "Mohammad H.", "" ], [ "Maas", "Dustin", "" ], [ "Zhang", "Junxing", "" ], [ "Patwari", "Neal", "" ], [ "Kasera", "Sneha K.", "" ] ]
new_dataset
0.999271
1205.5324
Kenneth Shum
Chi Wan Sung, Linyu Huang, Ho Yuet Kwan, Kenneth W. Shum
Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms
18 pages, 11 figures, submitted to IEEE Trans. Information Theory
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the construction of linear network codes for broadcasting a set of data packets to a number of users. The links from the source to the users are modeled as independent erasure channels. Users are allowed to inform the source node whether a packet is received correctly via feedback channels. In order to minimize the number of packet transmissions until all users have received all packets successfully, it is necessary that a data packet, if successfully received by a user, can increase the dimension of the vector space spanned by the encoding vectors he or she has received by one. Such an encoding vector is called innovative. We prove that innovative linear network code is uniformly optimal in minimizing user download delay. When the finite field size is strictly smaller than the number of users, the problem of determining the existence of innovative vectors is proven to be NP-complete. When the field size is larger than or equal to the number of users, innovative vectors always exist and random linear network code (RLNC) is able to find an innovative vector with high probability. While RLNC is optimal in terms of completion time, it has high decoding complexity due to the need of solving a system of linear equations. To reduce decoding time, we propose the use of sparse linear network code, since the sparsity property of encoding vectors can be exploited when solving systems of linear equations. Generating a sparsest encoding vector with large finite field size, however, is shown to be NP-hard. An approximation algorithm that guarantee the Hamming weight of a generated encoding vector to be smaller than a certain factor of the optimal value is constructed. Our simulation results show that our proposed methods have excellent performance in completion time and outperforms RLNC in terms of decoding time.
[ { "version": "v1", "created": "Thu, 24 May 2012 03:39:23 GMT" }, { "version": "v2", "created": "Mon, 9 Dec 2013 03:21:27 GMT" } ]
2013-12-10T00:00:00
[ [ "Sung", "Chi Wan", "" ], [ "Huang", "Linyu", "" ], [ "Kwan", "Ho Yuet", "" ], [ "Shum", "Kenneth W.", "" ] ]
new_dataset
0.998677
1301.7245
Brett Kaufman
Brett Kaufman and Jorma Lilleberg and Behnaam Aazhang
Femtocell Architectures with Spectrum Sharing for Cellular Radio Networks
9 pages, 8 figures, Accepted to the International Journal of Advances in Engineering Sciences and Applied Mathematics special issue on Multi-Terminal Information Theory
International Journal of Advances in Engineering Sciences and Applied Mathematics, vol. 5, no. 1, pp. 66-75, Mar. 2013
10.1007/s12572-013-0083-5
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Femtocells are an emerging technology aimed at providing gains to both network operators and end-users. These gains come at a cost of increased interference, specifically the cross network interference between the macrocell and femtocell networks. This interference is one of the main performance limiting factors in allowing an underlaid femtocell network to share the spectrum with the cellular network. To manage this interference, we first propose a femtocell architecture that orthog- onally partitions the network bandwidth between the macrocell and femtocell networks. This scheme eliminates the cross network interference thus giving the femtocells more freedom over their use of the spectrum. Specifically, no interference constraint is imposed by the cellular network allowing femto users to transmit at a constant power on randomly selected channels. Although simple, this scheme is enough to give gains up to 200% in sum rate. We then propose a second architecture where both networks share the bandwidth simultaneously. A femtocell power control scheme that relies on minimal coordination with the macrocell base station is used in conjunction with an interference sensing channel assignment mechanism. These two schemes together yield sum rate gains up to 200%. We then develop a technique for macro users to join a nearby femtocell and share a common chan- nel with a femtocell user through the use of successive interfer- ence cancellation. By adding this mechanism to the power control and channel assignment schemes, we show sum rate gains over 300% and up to 90% power savings for macrocell users.
[ { "version": "v1", "created": "Wed, 30 Jan 2013 14:36:37 GMT" } ]
2013-12-10T00:00:00
[ [ "Kaufman", "Brett", "" ], [ "Lilleberg", "Jorma", "" ], [ "Aazhang", "Behnaam", "" ] ]
new_dataset
0.993381
1311.2549
Vladimir D. Tonchev Prof
Vladimir D. Tonchev
A doubling construction for self-orthogonal codes
7 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple construction of quaternary hermitian self-orthogonal codes with parameters $[2n+1,k+1]$ and $[2n+2,k+2]$ from a given pair of self-orthogonal $[n,k]$ codes, and its link to quantum codes is considered. As an application, an optimal quaternary linear $[28,20,6]$ dual containing code is found that yields a new optimal $[[28,12,6]]$ quantum code.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 19:52:56 GMT" }, { "version": "v2", "created": "Sun, 8 Dec 2013 22:01:03 GMT" } ]
2013-12-10T00:00:00
[ [ "Tonchev", "Vladimir D.", "" ] ]
new_dataset
0.998488
1312.1299
Pierre-Etienne Meunier
Pierre-\'Etienne Meunier
The self-assembly of paths and squares at temperature 1
arXiv admin note: text overlap with arXiv:1306.6710 by other authors
null
null
null
cs.CC cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the number of tile types required to build squares of size n x n, in Winfree's abstract Tile Assembly Model, when restricted to using only non-cooperative tile bindings, is at least 2n-1, which is also the best known upper bound. Non-cooperative self-assembly, also known as temperature 1, is where tiles bind to each other if they match on one or more sides, whereas in cooperative binding, some tiles can bind only if they match on multiple sides. Our proof introduces a new programming technique for temperature 1, that disproves the very intuitive and commonly held belief that, in the same model, assembling paths between two points A and B cannot be done with less tile types than the Manhattan distance between them. Then, we prove a necessary condition for these "efficient paths" to be assembled, and show that this necessary condition cannot hold in completely filled squares. This result proves the oldest conjecture in algorithmic self-assembly, published by Rothemund and Winfree in STOC 2000, in the case where growth starts from a corner of the square. As a corollary, we establish n as a lower bound on the tile complexity of the general case. The problem of determining the minimal number of tile types to self-assemble a shape is known to be Sigma^p_2-complete.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 21:04:12 GMT" }, { "version": "v2", "created": "Mon, 9 Dec 2013 18:10:28 GMT" } ]
2013-12-10T00:00:00
[ [ "Meunier", "Pierre-Étienne", "" ] ]
new_dataset
0.971946
1312.2163
Farzad Farnoud (Hassanzadeh)
Farzad Farnoud (Hassanzadeh) and Olgica Milenkovic
Multipermutation Codes in the Ulam Metric for Nonvolatile Memories
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of multipermutation code design in the Ulam metric for novel storage applications. Multipermutation codes are suitable for flash memory where cell charges may share the same rank. Changes in the charges of cells manifest themselves as errors whose effects on the retrieved signal may be measured via the Ulam distance. As part of our analysis, we study multipermutation codes in the Hamming metric, known as constant composition codes. We then present bounds on the size of multipermutation codes and their capacity, for both the Ulam and the Hamming metrics. Finally, we present constructions and accompanying decoders for multipermutation codes in the Ulam metric.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 01:51:09 GMT" } ]
2013-12-10T00:00:00
[ [ "Farnoud", "Farzad", "", "Hassanzadeh" ], [ "Milenkovic", "Olgica", "" ] ]
new_dataset
0.999565
1312.2185
Abhijeet Khopkar
Abhijeet Khopkar, Sathish Govindrajan
Geometric graphs on convex point sets
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we introduce a family of bipartite graphs called path restricted ordered bipartite graphs and present it as an abstract generalization of some well known geometric graphs like unit distance graphs on convex point sets. In the framework of convex point sets, we also focus on a generalized version of Gabriel graphs known as locally Gabriel graphs or $LGGs$. $LGGs$ can also be seen as the generalization of unit distance graphs. The path restricted ordered bipartite graph is also a generalization of $LGGs$. We study some structural properties of the path restricted ordered bipartite graphs and also show that such graphs have the maximum edge complexity of $\theta(n \log n)$. It gives an alternate proof to the well known result that $UDGs$ and $LGGs$ on convex points have $O(n \log n)$ edges.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 09:31:24 GMT" } ]
2013-12-10T00:00:00
[ [ "Khopkar", "Abhijeet", "" ], [ "Govindrajan", "Sathish", "" ] ]
new_dataset
0.99279
1312.2225
Amor Lazzez Dr.
Amor Lazzez
VoIP Technology: Security Issues Analysis
9 pages
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 4, July-August 2013
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice over IP (VoIP) is the technology allowing voice and multimedia transmissions as data packets over a private or a public IP network. Thanks to the benefits that it may provide, the VoIP technology is increasingly attracting attention and interest in the industry. Actually, VoIP allows significant benefits for customers and communication services providers such as cost savings, rich media service, phone and service portability, mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as architecture complexity, interoperability issues, QoS issues, and security concerns. Among these disadvantages, VoIP security issues are becoming more serious because traditional security devices, protocols, and architectures cannot adequately protect VoIP systems from recent intelligent attacks. The aim of this paper is carry out a deep analysis of the security concerns of the VoIP technology. Firstly, we present a brief overview about the VoIP technology. Then, we discuss security attacks and vulnerabilities related to VoIP protocols and devices. After that, we talk about the security profiles of the VoIP protocols, and we present the main security components designed to help the deployment of a reliable and secured VoIP systems.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 15:07:24 GMT" } ]
2013-12-10T00:00:00
[ [ "Lazzez", "Amor", "" ] ]
new_dataset
0.998969
1312.2242
Nikolaos Mavridis
N. Mavridis, S. Konstantopoulos, I. Vetsikas, I. Heldal, P. Karampiperis, G. Mathiason, S. Thill, K. Stathis, V. Karkaletsis
CLIC: A Framework for Distributed, On-Demand, Human-Machine Cognitive Systems
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional Artificial Cognitive Systems (for example, intelligent robots) share a number of limitations. First, they are usually made up only of machine components; humans are only playing the role of user or supervisor. And yet, there are tasks in which the current state of the art of AI has much worse performance or is more expensive than humans: thus, it would be highly beneficial to have a systematic way of creating systems with both human and machine components, possibly with remote non-expert humans providing short-duration real-time services. Second, their components are often dedicated to only one system, and underutilized for a big part of their lifetime. Third, there is no inherent support for robust operation, and if a new better component becomes available, one cannot easily replace the old component. Fourth, they are viewed as a resource to be developed and owned, not as a utility. Thus, we are presenting CLIC: a framework for constructing cognitive systems that overcome the above limitations. The architecture of CLIC provides specific mechanisms for creating and operating cognitive systems that fulfill a set of desiderata: First, that are distributed yet situated, interacting with the physical world though sensing and actuation services, and that are also combining human as well as machine services. Second, that are made up of components that are time-shared and re-usable. Third, that provide increased robustness through self-repair. Fourth, that are constructed and reconstructed on the fly, with components that dynamically enter and exit the system during operation, on the basis of availability, pricing, and need. Importantly, fifth, the cognitive systems created and operated by CLIC do not need to be owned and can be provided on demand, as a utility; thus transforming human-machine situated intelligence to a service, and opening up many interesting opportunities.
[ { "version": "v1", "created": "Sun, 8 Dec 2013 18:53:58 GMT" } ]
2013-12-10T00:00:00
[ [ "Mavridis", "N.", "" ], [ "Konstantopoulos", "S.", "" ], [ "Vetsikas", "I.", "" ], [ "Heldal", "I.", "" ], [ "Karampiperis", "P.", "" ], [ "Mathiason", "G.", "" ], [ "Thill", "S.", "" ], [ "Stathis", "K.", "" ], [ "Karkaletsis", "V.", "" ] ]
new_dataset
0.980672
1312.2451
Sarwat Nizamani
Sarwat Nizamani, Nasrullah Memon
CEAI: CCM based Email Authorship Identification Model
null
Egyptian Informatics Journal,Volume 14, Issue 3, November 2013
null
null
cs.LG
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors' constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1, 2].
[ { "version": "v1", "created": "Fri, 6 Dec 2013 18:25:15 GMT" } ]
2013-12-10T00:00:00
[ [ "Nizamani", "Sarwat", "" ], [ "Memon", "Nasrullah", "" ] ]
new_dataset
0.998401
1312.2530
Trevor Owens
Trevor Owens
Mr. Moo's First RPG: Rules, Discussion and the Instructional Implications of Collective Intelligence on the Open Web
Published as a chapter in Rhetoric/Composition/Play: How Electronic Games Mediate Composition Theory and Practice (and Vice Versa). (2013) New York, NY: Palgrave Macmillan
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a moment, imagine an active online learning community of writers, artists, and designers, many spending more than eight hours a week composing projects. In this community, young people, primarily between the ages of 18-26, regularly critique, facilitate, and support each other in their composition activities. They are motivated to participate by their shared interest and affinity for their creative work. In the age of Wikipedia, this might not seem particularly novel, but what I am actually describing is an online discussion board, RPGmakerVX.net. Elsewhere, I have presented a general outline of the kinds of individuals involved in this community and the way that the site as a whole functions as an open learning environment (Owens, 2010). In this essay, I present a case study of one participant in this community. His user name is Mr. Moo, and at the time I interviewed him, he was a 19 year old college student from Calgary, Canada. When he created his first role-playing game, Prelude of Identity, he was eighteen. After providing a conceptual context for this case study in work on collective intelligence, I draw out the relationship between the technical system of the discussion boards and the creative process of engaging with peers in the production of a video game. I suggest that the discussion board rules and interaction enable a dialogue around composition that ultimately leaves Mr. Moo with a valuable learning experience while also producing a role-playing game. Thinking about this system from the perspective of collective intelligence enables us to use these kinds of interest-driven, online affinity communities as tools in an open education tool kit for educators in more formal learning environments. Ultimately, discussion boards in gaming communities, both the technical and social systems they represent, could be thought of as instructional tools.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 09:30:27 GMT" } ]
2013-12-10T00:00:00
[ [ "Owens", "Trevor", "" ] ]
new_dataset
0.975823
1312.1920
Rui Meireles
Carlos Ameixieira, Andr\'e Cardote, Filipe Neves, Rui Meireles, Susana Sargento, Lu\'is Coelho, Jo\~ao Afonso, Bruno Areias, Eduardo Mota, Rui Costa, Ricardo Matos, Jo\~ao Barros
HarborNet: A Real-World Testbed for Vehicular Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a real-world testbed for research and development in vehicular networking that has been deployed successfully in the sea port of Leix\~oes in Portugal. The testbed allows for cloud-based code deployment, remote network control and distributed data collection from moving container trucks, cranes, tow boats, patrol vessels and roadside units, thereby enabling a wide range of experiments and performance analyses. After describing the testbed architecture and its various modes of operation, we give concrete examples of its use and offer insights on how to build effective testbeds for wireless networking with moving vehicles.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 16:53:26 GMT" } ]
2013-12-09T00:00:00
[ [ "Ameixieira", "Carlos", "" ], [ "Cardote", "André", "" ], [ "Neves", "Filipe", "" ], [ "Meireles", "Rui", "" ], [ "Sargento", "Susana", "" ], [ "Coelho", "Luís", "" ], [ "Afonso", "João", "" ], [ "Areias", "Bruno", "" ], [ "Mota", "Eduardo", "" ], [ "Costa", "Rui", "" ], [ "Matos", "Ricardo", "" ], [ "Barros", "João", "" ] ]
new_dataset
0.999805
1312.1969
Sarwat Nizamani
Jordi M. Cortes, Sarwat Nizamani and Nasrullah Memon
PSN: Portfolio Social Network
null
IJCEE 2014 Vol.6 (1): 12-15 ISSN: 1793-8163
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we present a web-based information system which is a portfolio social network (PSN) that provides solutions to recruiters and job seekers. The proposed system enables users to create portfolios so that he/she can add his specializations with piece of code, if any, specifically for software engineers, which is accessible online. The unique feature of the system is to enable the recruiters to quickly view the prominent skills of the users. A comparative analysis of the proposed system with the state of the art systems is presented. The comparative study reveals that the proposed system has advanced functionalities.
[ { "version": "v1", "created": "Fri, 6 Dec 2013 19:19:20 GMT" } ]
2013-12-09T00:00:00
[ [ "Cortes", "Jordi M.", "" ], [ "Nizamani", "Sarwat", "" ], [ "Memon", "Nasrullah", "" ] ]
new_dataset
0.988777
1312.1037
Hari Ram Balakrishnan
B Hari Ram, G Kanchana Vaishnavi, and K Giridhar
Blind Fractional Interference Alignment
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractional Interference Alignment (FIA) is a transmission scheme which achieves any value between [0,1] for the Symbols transmitted per Antenna per Channel use (SpAC). FIA was designed in [1] specifically for Finite Alphabet (FA) signals, under the constraint that the Minimum Distance (MD) detector is used at all the receivers. Similar to classical interference alignment, the FIA precoder also needs perfect channel state information at all the transmitters (CSIT). In this work, a novel Blind Fractional Interference Alignment (B-FIA) scheme is introduced, where the basic assumption is that CSIT is not available. We consider two popular channel models, namely: Broadcast channel, and Interference channel. For these two channel models, the maximum achievable value of SpAC satisfying the constraints of the MD detector is obtained, but with no CSIT, and also a precoder design is provided to obtain any value of SpAC in the achievable range. Further, the precoder structure provided has one distinct advantage: interference channel state information at the receiver (I-CSIR) is not needed, when all the transmitters and receivers are equipped with one antenna each. When two or more antennas are used at both ends, I-CSIR must be available to obtain the maximum achievable value of SpAC. The receiver designs for both the Minimum Distance and the Maximum Likelihood (ML) decoders are discussed, where the interference statistics is estimated from the received signal samples. Simulation results of the B-FIA show that the ML decoder with estimated statistics achieves a significantly better error rate performance when compared to the MD decoder with known statistics, since the MD decoder assumes the interference plus noise term as colored Gaussian noise.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 06:22:38 GMT" }, { "version": "v2", "created": "Thu, 5 Dec 2013 06:57:53 GMT" } ]
2013-12-06T00:00:00
[ [ "Ram", "B Hari", "" ], [ "Vaishnavi", "G Kanchana", "" ], [ "Giridhar", "K", "" ] ]
new_dataset
0.993126
1312.1385
Sandra Payette
Sandra Payette and Thornton Staples
The Mellon Fedora Project: Digital Library Architecture Meets XML and Web Services
null
Sixth European Conference on Research and Advanced Technology for Digital Libraries, Lecture Notes in Computer Science, Springer, September 2003
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The University of Virginia received a grant of $1,000,000 from the Andrew W. Mellon Foundation to enable the Library, in collaboration with Cornell University, to build a digital object repository system based on the Flexible Extensible Digital Object and Repository Architecture (Fedora). The new system demonstrates how distributed digital library architecture can be deployed using web-based technologies, including XML and Web services. The new system is designed to be a foundation upon which interoperable web-based digital libraries can be built. Virginia and collaborating partners in the US and UK will evaluate the system using a diverse set of digital collections. The software will be made available to the public as an open-source release.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 23:40:13 GMT" } ]
2013-12-06T00:00:00
[ [ "Payette", "Sandra", "" ], [ "Staples", "Thornton", "" ] ]
new_dataset
0.999343
1312.1423
Muhammad Marwan Muhammad Fuad
Muhammad Marwan Muhammad Fuad
ABC-SG: A New Artificial Bee Colony Algorithm-Based Distance of Sequential Data Using Sigma Grams
The Tenth Australasian Data Mining Conference - AusDM 2012, Sydney, Australia, 5-7 December, 2012
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of similarity search is one of the main problems in computer science. This problem has many applications in text-retrieval, web search, computational biology, bioinformatics and others. Similarity between two data objects can be depicted using a similarity measure or a distance metric. There are numerous distance metrics in the literature, some are used for a particular data type, and others are more general. In this paper we present a new distance metric for sequential data which is based on the sum of n-grams. The novelty of our distance is that these n-grams are weighted using artificial bee colony; a recent optimization algorithm based on the collective intelligence of a swarm of bees on their search for nectar. This algorithm has been used in optimizing a large number of numerical problems. We validate the new distance experimentally.
[ { "version": "v1", "created": "Thu, 5 Dec 2013 03:19:51 GMT" } ]
2013-12-06T00:00:00
[ [ "Fuad", "Muhammad Marwan Muhammad", "" ] ]
new_dataset
0.992962
1309.0157
Matthew Parker Prof
Gaofei Wu and Matthew G. Parker
A complementary construction using mutually unbiased bases
25 pages, 1 figure
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a construction for complementary pairs of arrays that exploits a set of mutually-unbiased bases, and enumerate these arrays as well as the corresponding set of complementary sequences obtained from the arrays by projection. We also sketch an algorithm to uniquely generate these sequences. The pairwise squared inner-product of members of the sequence set is shown to be $\frac{1}{2}$. Moreover, a subset of the set can be viewed as a codebook that asymptotically achieves $\sqrt{\frac{3}{2}}$ times the Welch bound.
[ { "version": "v1", "created": "Sat, 31 Aug 2013 21:07:16 GMT" }, { "version": "v2", "created": "Wed, 4 Dec 2013 15:30:52 GMT" } ]
2013-12-05T00:00:00
[ [ "Wu", "Gaofei", "" ], [ "Parker", "Matthew G.", "" ] ]
new_dataset
0.995306
1312.0940
Suranjan Ganguly
Pramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri and Dipak Kumar Basu
Medical Aid for Automatic Detection of Malaria
8 pages, International Conference on Computer Information Systems and Industrial Management Applications 2011. arXiv admin note: text overlap with arXiv:1312.0809
null
null
null
cs.CY cs.CV
http://creativecommons.org/licenses/publicdomain/
The analysis and counting of blood cells in a microscope image can provide useful information concerning to the health of a person. In particular, morphological analysis of red blood cells deformations can effectively detect important disease like malaria. Blood images, obtained by the microscope, which is coupled with a digital camera, are analyzed by the computer for diagnosis or can be transmitted easily to clinical centers than liquid blood samples. Automatic analysis system for the presence of Plasmodium in microscopic image of blood can greatly help pathologists and doctors that typically inspect blood films manually. Unfortunately, the analysis made by human experts is not rapid and not yet standardized due to the operators capabilities and tiredness. The paper shows how effectively and accurately it is possible to identify the Plasmodium in the blood film. In particular, the paper presents how to enhance the microscopic image and filter out the unnecessary segments followed by the threshold based segmentation and recognize the presence of Plasmodium. The proposed system can be deployed in the remote area as a supporting aid for telemedicine technology and only basic training is sufficient to operate it. This system achieved more than 98 percentage accuracy for the samples collected to test this system.
[ { "version": "v1", "created": "Tue, 3 Dec 2013 13:15:57 GMT" } ]
2013-12-05T00:00:00
[ [ "Ghosh", "Pramit", "" ], [ "Bhattacharjee", "Debotosh", "" ], [ "Nasipuri", "Mita", "" ], [ "Basu", "Dipak Kumar", "" ] ]
new_dataset
0.973757
1312.1172
Oleg Verbitsky
Johannes K\"obler, Sebastian Kuhnert, Oleg Verbitsky
Circular-arc hypergraphs: Rigidity via Connectedness
21 pages, 8 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A circular-arc hypergraph $H$ is a hypergraph admitting an arc ordering, that is, a circular ordering of the vertex set $V(H)$ such that every hyperedge is an arc of consecutive vertices. An arc ordering is tight if, for any two hyperedges $A$ and $B$ such that $A$ is a nonempty subset of $B$ and $B$ is not equal to $V(H)$, the corresponding arcs share a common endpoint. We give sufficient conditions for $H$ to have, up to reversing, a unique arc ordering and a unique tight arc ordering. These conditions are stated in terms of connectedness properties of $H$. It is known that $G$ is a proper circular-arc graph exactly when its closed neighborhood hypergraph $N[G]$ admits a tight arc ordering. We explore connectedness properties of $N[G]$ and prove that, if $G$ is a connected, twin-free, proper circular-arc graph with non-bipartite complement, then $N[G]$ has, up to reversing, a unique arc ordering. If the complement of $G$ is bipartite and connected, then $N[G]$ has, up to reversing, two tight arc orderings. As a corollary, we notice that in both of the two cases $G$ has an essentially unique intersection representation. The last result also follows from the work by Deng, Hell, and Huang based on a theory of local tournaments.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 14:19:07 GMT" } ]
2013-12-05T00:00:00
[ [ "Köbler", "Johannes", "" ], [ "Kuhnert", "Sebastian", "" ], [ "Verbitsky", "Oleg", "" ] ]
new_dataset
0.99596
1312.1178
Ben de Lacy Costello Dr
Ben de Lacy Costello and Andrew Adamatzky
Routing of Physarum polycephalum signals using simple chemicals
19 pages, 5 figures
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work the chemotaxis towards simple organic chemicals was assessed. We utilise the knowledge gained from these chemotactic assays to route Physarum polycephalum at a series of junctions. By applying chemical inputs at a simple T-junction we were able to reproducibly control the path taken by the plasmodium of P. Polycephalum. Where the chemoattractant farnesene was used at one input a routed signal could be reproducibly generated i.e. P. Polycephalum moves towards the source of chemoattractant. Where the chemoattractant was applied at both inputs the signal was reproducibly split. If a chemorepellent was used then the signal was reproducibly suppressed. If no chemical input was used in the simple circuit then a random signal was generated, whereby P. Polycephalum would move towards one output at the junction, but the direction was randomly selected. We extended this study to a more complex series of T-junctions to explore further the potential of routing P. Polycephalum. Although many of the circuits were completed effectively, any errors from the implementation of the simple T-junction were magnified. There were also issues with cascading effects through multiple junctions. For example signal splitting could be reproducibly initiated at the first junction but not at subsequent junctions. This work highlights the potential for exploiting chemotaxis to achieve complex and reliable routing of P. Polycephalum signals. This may be useful in implementing computing algorithms, design of autonomous robots and directed material synthesis. In additional experiments we showed that the application of chemoattractant compounds at specific locations on a homogeneous substrate could be used to reliably control the spatial configuration of P. Polycephalum. This may have applications in implementing geometric calculations and in robot navigation tasks such as mapping chemical plumes.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 14:30:24 GMT" } ]
2013-12-05T00:00:00
[ [ "Costello", "Ben de Lacy", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.998017
1312.1260
Sandra Payette
Sandra Payette and Carl Lagoze
Policy-Carrying, Policy-Enforcing Digital Objects
European Conference on Research and Advanced Technology for Digital Libraries, Lisbon, Portugal, published in Lecture Notes in Computer Science, Springer, 2000, http://www.springerlink.com/content/lw0bjhnyvluj0433/
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the motivation for moving policy enforcement for access control down to the digital object level. The reasons for this include handling of item-specific behaviors, adapting to evolution of digital objects, and permitting objects to move among repositories and portable devices. We then describe our experiments that integrate the Fedora architecture for digital objects and repositories and the PoET implementation of security automata to effect such objectcentric policy enforcement.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 17:54:41 GMT" } ]
2013-12-05T00:00:00
[ [ "Payette", "Sandra", "" ], [ "Lagoze", "Carl", "" ] ]
new_dataset
0.968636
1312.1309
Kaniska Mohanty
Kaniska Mohanty and Mahesh K. Varanasi
On the DoF Region of the K-user MISO Broadcast Channel with Hybrid CSIT
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An outer bound for the degrees of freedom (DoF) region of the K-user multiple-input single-output (MISO) broadcast channel (BC) is developed under the hybrid channel state information at transmitter (CSIT) model, in which the transmitter has instantaneous CSIT of channels to a subset of the receivers and delayed CSIT of channels to the rest of the receivers. For the 3-user MISO BC, when the transmitter has instantaneous CSIT of the channel to one receiver and delayed CSIT of channels to the other two, two new communication schemes are designed, which are able to achieve the DoF tuple of $\left(1,\frac{1}{3},\frac{1}{3}\right)$, with a sum DoF of $\frac{5}{3}$, that is greater than the sum DoF achievable only with delayed CSIT. Another communication scheme showing the benefit of the alternating CSIT model is also developed, to obtain the DoF tuple of $\left(1,\frac{4}{9},\frac{4}{9}\right)$ for the 3-user MISO BC.
[ { "version": "v1", "created": "Wed, 4 Dec 2013 20:12:37 GMT" } ]
2013-12-05T00:00:00
[ [ "Mohanty", "Kaniska", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
new_dataset
0.991848
1209.0047
Kaniska Mohanty
Kaniska Mohanty, Chinmay S. Vaze, Mahesh K. Varanasi
The Degrees of Freedom Region of the MIMO Interference Channel with Hybrid CSIT
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The degrees of freedom (DoF) region of the two-user MIMO (multiple-input multiple-output) interference channel is established under a new model termed as hybrid CSIT. In this model, one transmitter has delayed channel state information (CSI) and the other transmitter has instantaneous CSIT, of incoming channel matrices at the respective unpaired receivers, and neither transmitter has any knowledge of the incoming channel matrices of its respective paired receiver. The DoF region for hybrid CSIT, and consequently that of $2\times2\times3^{5}$ CSIT models, is completely characterized, and a new achievable scheme based on a combination of transmit beamforming and retrospective interference alignment is developed. Conditions are obtained on the numbers of antennas at each of the four terminals such that the DoF region under hybrid CSIT is equal to that under (a) global and instantaneous CSIT and (b) global and delayed CSIT, with the remaining cases resulting in a DoF region with hybrid CSIT that lies somewhere in between the DoF regions under the instantaneous and delayed CSIT settings. Further synergistic benefits accruing from switching between the two hybrid CSIT models are also explored.
[ { "version": "v1", "created": "Sat, 1 Sep 2012 02:34:05 GMT" }, { "version": "v2", "created": "Mon, 2 Dec 2013 21:33:32 GMT" } ]
2013-12-04T00:00:00
[ [ "Mohanty", "Kaniska", "" ], [ "Vaze", "Chinmay S.", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
new_dataset
0.97527
1309.6204
Lei Jin
Lei Jin, Xuelian Long, James Joshi
A Friendship Privacy Attack on Friends and 2-Distant Neighbors in Social Networks
This paper has been withdrawn by the authors
null
null
null
cs.SI cs.CR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an undirected social graph, a friendship link involves two users and the friendship is visible in both the users' friend lists. Such a dual visibility of the friendship may raise privacy threats. This is because both users can separately control the visibility of a friendship link to other users and their privacy policies for the link may not be consistent. Even if one of them conceals the link from a third user, the third user may find such a friendship link from another user's friend list. In addition, as most users allow their friends to see their friend lists in most social network systems, an adversary can exploit the inconsistent policies to launch privacy attacks to identify and infer many of a targeted user's friends. In this paper, we propose, analyze and evaluate such an attack which is called Friendship Identification and Inference (FII) attack. In a FII attack scenario, we assume that an adversary can only see his friend list and the friend lists of his friends who do not hide the friend lists from him. Then, a FII attack contains two attack steps: 1) friend identification and 2) friend inference. In the friend identification step, the adversary tries to identify a target's friends based on his friend list and those of his friends. In the friend inference step, the adversary attempts to infer the target's friends by using the proposed random walk with restart approach. We present experimental results using three real social network datasets and show that FII attacks are generally efficient and effective when adversaries and targets are friends or 2-distant neighbors. We also comprehensively analyze the attack results in order to find what values of parameters and network features could promote FII attacks. Currently, most popular social network systems with an undirected friendship graph, such as Facebook, LinkedIn and Foursquare, are susceptible to FII attacks.
[ { "version": "v1", "created": "Tue, 24 Sep 2013 15:13:13 GMT" }, { "version": "v2", "created": "Sun, 1 Dec 2013 14:00:52 GMT" } ]
2013-12-03T00:00:00
[ [ "Jin", "Lei", "" ], [ "Long", "Xuelian", "" ], [ "Joshi", "James", "" ] ]
new_dataset
0.991139
1312.0078
Manuel Serrano
G\'erard Berry (INRIA Sophia Antipolis), Manuel Serrano
Hop and HipHop : Multitier Web Orchestration
International Conference on Distributed Computing and Internet Technology (2014)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rich applications merge classical computing, client-server concurrency, web-based interfaces, and the complex time- and event-based reactive programming found in embedded systems. To handle them, we extend the Hop web programming platform by HipHop, a domain-specific language dedicated to event-based process orchestration. Borrowing the synchronous reactive model of Esterel, HipHop is based on synchronous concurrency and preemption primitives that are known to be key components for the modular design of complex reactive behaviors. HipHop departs from Esterel by its ability to handle the dynamicity of Web applications, thanks to the reflexivity of Hop. Using a music player example, we show how to modularly build a non-trivial Hop application using HipHop orchestration code.
[ { "version": "v1", "created": "Sat, 30 Nov 2013 08:48:02 GMT" } ]
2013-12-03T00:00:00
[ [ "Berry", "Gérard", "", "INRIA Sophia Antipolis" ], [ "Serrano", "Manuel", "" ] ]
new_dataset
0.998722
1312.0148
Muhammad Aamir
Muhammad Aamir
On Replacing PID Controller with ANN Controller for DC Motor Position Control
9 pages, 9 figures, 2 tables
International Journal of Research Studies in Computing, Consortia Academia Publishing, vol. 2 no. 1, pp. 21-29, April 2013
10.5861/ijrsc.2013.236
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The process industry implements many techniques with certain parameters in its operations to control the working of several actuators on field. Amongst these actuators, DC motor is a very common machine. The angular position of DC motor can be controlled to drive many processes such as the arm of a robot. The most famous and well known controller for such applications is PID controller. It uses proportional, integral and derivative functions to control the input signal before sending it to the plant unit. In this paper, another controller based on Artificial Neural Network (ANN) control is examined to replace the PID controller for controlling the angular position of a DC motor to drive a robot arm. Simulation is performed in MATLAB after training the neural network (supervised learning) and it is shown that results are acceptable and applicable in process industry for reference control applications. The paper also indicates that the ANN controller can be less complicated and less costly to implement in industrial control applications as compared to some other proposed schemes.
[ { "version": "v1", "created": "Sat, 30 Nov 2013 20:01:39 GMT" } ]
2013-12-03T00:00:00
[ [ "Aamir", "Muhammad", "" ] ]
new_dataset
0.99776
1312.0372
Marc Fossorier
Marc Fossorier
Polar Codes: Graph Representation and Duality
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an iterative construction of a polar code and develop properties of the dual of a polar code. Based on this approach, belief propagation of a polar code can be presented in the context of low-density parity check codes.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 08:35:51 GMT" } ]
2013-12-03T00:00:00
[ [ "Fossorier", "Marc", "" ] ]
new_dataset
0.999716
1312.0489
Antoine Desmet
Antoine Desmet and Erol Gelenbe
Capacity Based Evacuation with Dynamic Exit Signs
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exit paths in buildings are designed to minimise evacuation time when the building is at full capacity. We present an evacuation support system which does this regardless of the number of evacuees. The core concept is to even-out congestion in the building by diverting evacuees to less-congested paths in order to make maximal usage of all accessible routes throughout the entire evacuation process. The system issues a set of flow-optimal routes using a capacity-constrained routing algorithm which anticipates evolutions in path metrics using the concept of "future capacity reservation". In order to direct evacuees in an intuitive manner whilst implementing the routing algorithm's scheme, we use dynamic exit signs, i.e. whose pointing direction can be controlled. To make this system practical and minimise reliance on sensors during the evacuation, we use an evacuee mobility model and make several assumptions on the characteristics of the evacuee flow. We validate this concept using simulations, and show how the underpinning assumptions may limit the system's performance, especially in low-headcount evacuations.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 15:26:41 GMT" } ]
2013-12-03T00:00:00
[ [ "Desmet", "Antoine", "" ], [ "Gelenbe", "Erol", "" ] ]
new_dataset
0.996804
1312.0522
Brett Kaufman
Brett Kaufman and Jorma Lilleberg and Behnaam Aazhang
Analog Baseband Cancellation for Full-Duplex: An Experiment Driven Analysis
22 pages, 12 figures, submitted to IEEE JSAC special issue on Full-Duplex
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent wireless testbed implementations have proven that full-duplex communication is in fact possible and can outperform half-duplex systems. Many of these implementations modify existing half-duplex systems to operate in full-duplex. To realize the full potential of full-duplex, radios need to be designed with self-interference in mind. In our work, we use a novel patch antenna prototype in an experimental setup to characterize the self-interference channel between transmit and receive radios. We derive an equivalent analytical baseband model and propose analog baseband cancellation techniques to complement the RF cancellation provided by the patch antenna prototype. Our results show that a wide bandwidth, moderate isolation scheme achieves up to 2.4 bps/Hz higher achievable rate than a narrow bandwidth, high isolation scheme. Furthermore, the analog baseband cancellation yields a 10-10,000 improvement in BER over RF only cancellation.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 17:25:03 GMT" } ]
2013-12-03T00:00:00
[ [ "Kaufman", "Brett", "" ], [ "Lilleberg", "Jorma", "" ], [ "Aazhang", "Behnaam", "" ] ]
new_dataset
0.981705
1306.0957
Andrea Luigi Tironi
Luis Felipe Tapia Cuiti\~no and Andrea Luigi Tironi
Dual codes of product semi-linear codes
v1: 37 pages; v2: 31 pages, the presentation of the main topics is improved by some minor changes and additional results, and some mistakes and typos have been corrected
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\mathbb{F}_q$ be a finite field with $q$ elements and denote by $\theta : \mathbb{F}_q\to\mathbb{F}_q$ an automorphism of $\mathbb{F}_q$. In this paper, we deal with linear codes of $\mathbb{F}_q^n$ invariant under a semi-linear map $T:\mathbb{F}_q^n\to\mathbb{F}_q^n$ for some $n\geq 2$. In particular, we study three kind of their dual codes, some relations between them and we focus on codes which are products of module skew codes in the non-commutative polynomial ring $\mathbb{F}_q[X,\theta]$ as a subcase of linear codes invariant by a semi-linear map $T$. In this setting we give also an algorithm for encoding, decoding and detecting errors and we show a method to construct codes invariant under a fixed $T$.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 01:30:05 GMT" }, { "version": "v2", "created": "Thu, 28 Nov 2013 01:44:43 GMT" } ]
2013-12-02T00:00:00
[ [ "Cuitiño", "Luis Felipe Tapia", "" ], [ "Tironi", "Andrea Luigi", "" ] ]
new_dataset
0.999468
1311.7215
Alireza Rezvanian
Aylin Mousavian, Alireza Rezvanian, Mohammad Reza Meybodi
Solving Minimum Vertex Cover Problem Using Learning Automata
5 pages, 5 figures, conference
null
null
null
cs.AI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimum vertex cover problem is an NP-Hard problem with the aim of finding minimum number of vertices to cover graph. In this paper, a learning automaton based algorithm is proposed to find minimum vertex cover in graph. In the proposed algorithm, each vertex of graph is equipped with a learning automaton that has two actions in the candidate or non-candidate of the corresponding vertex cover set. Due to characteristics of learning automata, this algorithm significantly reduces the number of covering vertices of graph. The proposed algorithm based on learning automata iteratively minimize the candidate vertex cover through the update its action probability. As the proposed algorithm proceeds, a candidate solution nears to optimal solution of the minimum vertex cover problem. In order to evaluate the proposed algorithm, several experiments conducted on DIMACS dataset which compared to conventional methods. Experimental results show the major superiority of the proposed algorithm over the other methods.
[ { "version": "v1", "created": "Thu, 28 Nov 2013 05:49:34 GMT" } ]
2013-12-02T00:00:00
[ [ "Mousavian", "Aylin", "" ], [ "Rezvanian", "Alireza", "" ], [ "Meybodi", "Mohammad Reza", "" ] ]
new_dataset
0.996722
1311.7242
Jonathan Protzenko
Jonathan Protzenko and Fran\c{c}ois Pottier
Programming with Permissions in Mezzo
null
ICFP 2013, Proceedings of the 18th ACM SIGPLAN international conference on Functional programming
10.1145/2500365.2500598
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Mezzo, a typed programming language of ML lineage. Mezzo is equipped with a novel static discipline of duplicable and affine permissions, which controls aliasing and ownership. This rules out certain mistakes, including representation exposure and data races, and enables new idioms, such as gradual initialization, memory re-use, and (type)state changes. Although the core static discipline disallows sharing a mutable data structure, Mezzo offers several ways of working around this restriction, including a novel dynamic ownership control mechanism which we dub "adoption and abandon".
[ { "version": "v1", "created": "Thu, 28 Nov 2013 09:15:55 GMT" } ]
2013-12-02T00:00:00
[ [ "Protzenko", "Jonathan", "" ], [ "Pottier", "François", "" ] ]
new_dataset
0.99716
1311.7295
Gerardo Aragon Camarasa
Gerardo Aragon-Camarasa, Susanne B. Oehler, Yuan Liu, Sun Li, Paul Cockshott and J. Paul Siebert
Glasgow's Stereo Image Database of Garments
7 pages, 6 figure, image database
null
null
null
cs.RO cs.CV
http://creativecommons.org/licenses/by/3.0/
To provide insight into cloth perception and manipulation with an active binocular robotic vision system, we compiled a database of 80 stereo-pair colour images with corresponding horizontal and vertical disparity maps and mask annotations, for 3D garment point cloud rendering has been created and released. The stereo-image garment database is part of research conducted under the EU-FP7 Clothes Perception and Manipulation (CloPeMa) project and belongs to a wider database collection released through CloPeMa (www.clopema.eu). This database is based on 16 different off-the-shelve garments. Each garment has been imaged in five different pose configurations on the project's binocular robot head. A full copy of the database is made available for scientific research only at https://sites.google.com/site/ugstereodatabase/.
[ { "version": "v1", "created": "Thu, 28 Nov 2013 12:09:28 GMT" } ]
2013-12-02T00:00:00
[ [ "Aragon-Camarasa", "Gerardo", "" ], [ "Oehler", "Susanne B.", "" ], [ "Liu", "Yuan", "" ], [ "Li", "Sun", "" ], [ "Cockshott", "Paul", "" ], [ "Siebert", "J. Paul", "" ] ]
new_dataset
0.998015
1311.7400
Hafez Moawad seliem
Hafez Moawad, Eman Shaaban, Zaki Taha Fayed
Stop_times based Routing Protocol for VANET
6 pages, 4 figure, Published with International Journal of Computer Applications (IJCA)
International Journal of Computer Applications 81(18):4-9, November 2013. Published by Foundation of Computer Science, New York, USA
10.5120/14221-2029
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Existing routing protocols of MANET are not suitable for VANET. AOMDV is the most important on demand multipath routing protocol. This paper proposes SSD-AOMDV as VANET routing protocol. SSD-AOMDV improves AOMDV to suit VANET characteristics. SSD-AOMDV adds the mobility parameters: Stop_times, Speed and Direction to hop count as new AOMDV routing metric to select next hop during the route discovery phase. Stop_times metric is added to simulate buses mobility pattern and traffic lights at intersections. Simulation results show that SSD-AOMDV achieves better performance compared to AOMDV.
[ { "version": "v1", "created": "Thu, 28 Nov 2013 19:17:25 GMT" } ]
2013-12-02T00:00:00
[ [ "Moawad", "Hafez", "" ], [ "Shaaban", "Eman", "" ], [ "Fayed", "Zaki Taha", "" ] ]
new_dataset
0.986016
1311.7462
Yi-King Choi
Yi-King Choi, Wenping Wang, Bernard Mourrain, Changhe Tu, Xiaohong Jia, Feng Sun
Continuous Collision Detection for Composite Quadric Models
23 pages, 13 figures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A composite quadric model (CQM) is an object modeled by piecewise linear or quadric patches. We study the continuous detection problem of a special type of CQM objects which are commonly used in CAD/CAM, that is, the boundary surfaces of such a CQM intersect only in straight line segments or conic curve segments. We present a framework for continuous collision detection (CCD) of this special type of CQM (which we also call CQM for brevity) in motion. We derive algebraic formulations and compute numerically the first contact time instants and the contact points of two moving CQMs in $\mathbb R^3$. Since it is difficult to process CCD of two CQMs in a direct manner because they are composed of semi-algebraic varieties, we break down the problem into subproblems of solving CCD of pairs of boundary elements of the CQMs. We present procedures to solve CCD of different types of boundary element pairs in different dimensions. Some CCD problems are reduced to their equivalents in a lower dimensional setting, where they can be solved more efficiently.
[ { "version": "v1", "created": "Fri, 29 Nov 2013 03:08:37 GMT" } ]
2013-12-02T00:00:00
[ [ "Choi", "Yi-King", "" ], [ "Wang", "Wenping", "" ], [ "Mourrain", "Bernard", "" ], [ "Tu", "Changhe", "" ], [ "Jia", "Xiaohong", "" ], [ "Sun", "Feng", "" ] ]
new_dataset
0.999038
1311.7590
Mine Alsan Ms
Mine Alsan
Universal Polar Decoding with Channel Knowledge at the Encoder
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar coding over a class of binary discrete memoryless channels with channel knowledge at the encoder is studied. It is shown that polar codes achieve the capacity of convex and one-sided classes of symmetric channels.
[ { "version": "v1", "created": "Fri, 29 Nov 2013 15:02:33 GMT" } ]
2013-12-02T00:00:00
[ [ "Alsan", "Mine", "" ] ]
new_dataset
0.989613
1311.6914
Nikolaos Freris
Nikolaos Freris, Vivek Borkar and P. R. Kumar
Model-based clock synchronization protocol for wireless sensor networks
Technical report - this work was submitted to IEEE/ACM Transactions on Networking, Nov. 2013
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a wireless sensor network, nodes communicate time-stamped packets in order to synchronize their clocks, i.e., estimate each other's time display. We introduce and analyze a parametrized stochastic model for clocks and use it to calculate, at any given time, the Maximum-Likelihood (ML) estimate of the relative skew/offset between two communicating nodes. For network synchronization, event-based Kalman-Bucy filtering gives rise to a centralized scheme, and we propose an efficient distributed suboptimal algorithm. We study the performance both analytically and experimentally and provide provable guarantees. We summarize our findings into defining a new distributed model-based clock synchronization protocol (MBCSP), and present a comparative simulation study of its accuracy versus prior art to showcase improvements.
[ { "version": "v1", "created": "Wed, 27 Nov 2013 09:50:13 GMT" } ]
2013-11-28T00:00:00
[ [ "Freris", "Nikolaos", "" ], [ "Borkar", "Vivek", "" ], [ "Kumar", "P. R.", "" ] ]
new_dataset
0.968553
1311.6929
Jonathan Protzenko
Jonathan Protzenko
Illustrating the Mezzo programming language
null
1st French Singaporean Workshop on Formal Methods and Applications (FSFMA 2013)
10.4230/OASIcs.FSFMA.2013.68
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When programmers want to prove strong program invariants, they are usually faced with a choice between using theorem provers and using traditional programming languages. The former requires them to provide program proofs, which, for many applications, is considered a heavy burden. The latter provides less guarantees and the programmer usually has to write run-time assertions to compensate for the lack of suitable invariants expressible in the type system. We introduce Mezzo, a programming language in the tradition of ML, in which the usual concept of a type is replaced by a more precise notion of a permission. Programs written in Mezzo usually enjoy stronger guarantees than programs written in pure ML. However, because Mezzo is based on a type system, the reasoning requires no user input. In this paper, we illustrate the key concepts of Mezzo, highlighting the static guarantees our language provides.
[ { "version": "v1", "created": "Wed, 27 Nov 2013 10:57:10 GMT" } ]
2013-11-28T00:00:00
[ [ "Protzenko", "Jonathan", "" ] ]
new_dataset
0.994676
1311.6981
Gaurav Ojha
Anupam Shukla, Gaurav Ojha, Sachin Acharya, Shubham Jain
A customized flocking algorithm for swarms of sensors tracking a swarm of targets
13 Pages, 11 Figures, SAI 2013
null
null
null
cs.OH cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless mobile sensor networks (WMSNs) are groups of mobile sensing agents with multi-modal sensing capabilities that communicate over wireless networks. WMSNs have more flexibility in terms of deployment and exploration abilities over static sensor networks. Sensor networks have a wide range of applications in security and surveillance systems, environmental monitoring, data gathering for network-centric healthcare systems, monitoring seismic activities and atmospheric events, tracking traffic congestion and air pollution levels, localization of autonomous vehicles in intelligent transportation systems, and detecting failures of sensing, storage, and switching components of smart grids. The above applications require target tracking for processes and events of interest occurring in an environment. Various methods and approaches have been proposed in order to track one or more targets in a pre-defined area. Usually, this turns out to be a complicated job involving higher order mathematics coupled with artificial intelligence due to the dynamic nature of the targets. To optimize the resources we need to have an approach that works in a more straightforward manner while resulting in fairly satisfactory data. In this paper we have discussed the various cases that might arise while flocking a group of sensors to track targets in a given environment. The approach has been developed from scratch although some basic assumptions have been made keeping in mind some previous theories. This paper outlines a customized approach for feasibly tracking swarms of targets in a specific area so as to minimize the resources and optimize tracking efficiency.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 04:46:57 GMT" } ]
2013-11-28T00:00:00
[ [ "Shukla", "Anupam", "" ], [ "Ojha", "Gaurav", "" ], [ "Acharya", "Sachin", "" ], [ "Jain", "Shubham", "" ] ]
new_dataset
0.990448
1311.6670
Nehla Ghouaiel
Nehla Ghouaiel (IRIT), Jean-Marc Cieutat, Jean-Pierre Jessel (IRIT)
Mobile Augmented Reality Applications to Discover New Environments
Science and Information Conference 2013, France (2013)
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although man has become sedentary over time, his wish to travel the world remains as strong as ever. The aim of this paper is to show how techniques based on imagery and Augmented Reality (AR) can prove to be of great help when discovering a new urban environment and observing the evolution of the natural environment. The study's support is naturally the Smartphone which in just a few years has become our most familiar device, which we take with us practically everywhere we go in our daily lives.
[ { "version": "v1", "created": "Tue, 26 Nov 2013 14:00:24 GMT" } ]
2013-11-27T00:00:00
[ [ "Ghouaiel", "Nehla", "", "IRIT" ], [ "Cieutat", "Jean-Marc", "", "IRIT" ], [ "Jessel", "Jean-Pierre", "", "IRIT" ] ]
new_dataset
0.976079
1308.2950
Xinfeng Li
Xinfeng Li, Chenshu Wu, Xiaoyuan Wang, Ming Gu, Xiang-Yang Li and Dong Xuan
BlueSky: Realizing Buried Potential of Bluetooth to Sustain a Large-scale Multi-hop Network
We need to improve this paper further
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditionally, Bluetooth has been deemed unsuitable for sustaining a large-scale multi-hop network. There are two main reasons: severe frequency channel collisions under a large-scale network and high complexity of designing an efficient formation protocol. In this work, we reconsider this viewpoint from a practical usability perspective and aim to realize the buried potential of Bluetooth. Firstly, we find that the collision probability under a low-overhead network is fairly small, which is acceptable for practical applications. Secondly, we propose BlueSky, a complete system solution to provide necessary networking functionalities for Bluetooth. In BlueSky, we develop a connection maintenance mechanism for mitigating the influence of collisions and a network formation protocol for reliable packet transmissions. We implement BlueSky on Windows Mobile using 100 commercial smartphones. Comprehensive usability evaluations demonstrate the negligible overheads of BlueSky and its good network performance. In particular, 90%-95% of the whole 100 nodes can participate in the communication smoothly.
[ { "version": "v1", "created": "Tue, 13 Aug 2013 19:22:24 GMT" }, { "version": "v2", "created": "Fri, 22 Nov 2013 21:25:09 GMT" } ]
2013-11-26T00:00:00
[ [ "Li", "Xinfeng", "" ], [ "Wu", "Chenshu", "" ], [ "Wang", "Xiaoyuan", "" ], [ "Gu", "Ming", "" ], [ "Li", "Xiang-Yang", "" ], [ "Xuan", "Dong", "" ] ]
new_dataset
0.988094
1311.5978
Pei Li
Pei Lee and Laks V.S. Lakshmanan and Evangelos E. Milios
Event Evolution Tracking from Streaming Social Posts
null
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/by-nc-sa/3.0/
Online social post streams such as Twitter timelines and forum discussions have emerged as important channels for information dissemination. They are noisy, informal, and surge quickly. Real life events, which may happen and evolve every minute, are perceived and circulated in post streams by social users. Intuitively, an event can be viewed as a dense cluster of posts with a life cycle sharing the same descriptive words. There are many previous works on event detection from social streams. However, there has been surprisingly little work on tracking the evolution patterns of events, e.g., birth/death, growth/decay, merge/split, which we address in this paper. To define a tracking scope, we use a sliding time window, where old posts disappear and new posts appear at each moment. Following that, we model a social post stream as an evolving network, where each social post is a node, and edges between posts are constructed when the post similarity is above a threshold. We propose a framework which summarizes the information in the stream within the current time window as a ``sketch graph'' composed of ``core'' posts. We develop incremental update algorithms to handle highly dynamic social streams and track event evolution patterns in real time. Moreover, we visualize events as word clouds to aid human perception. Our evaluation on a real data set consisting of 5.2 million posts demonstrates that our method can effectively track event dynamics in the whole life cycle from very large volumes of social streams on the fly.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 09:07:11 GMT" } ]
2013-11-26T00:00:00
[ [ "Lee", "Pei", "" ], [ "Lakshmanan", "Laks V. S.", "" ], [ "Milios", "Evangelos E.", "" ] ]
new_dataset
0.967324
1311.6009
Mohammad Mozumdar
Ching-Yen Chung, Joshua Chynoweth, Charlie Qiu, Chi-Cheng Chu, Rajit Gadh
Design of Fast Response Smart Electric Vehicle Charging Infrastructure
Proceedings of Green Energy and Systems Conference 2013, November 25, Long Beach, CA, USA
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/3.0/
The response time of the smart electrical vehicle (EV) charging infrastructure is the key index of the system performance. The traffic between the smart EV charging station and the control center dominates the response time of the smart charging stations. To accelerate the response of the smart EV charging station, there is a need for a technology that collects the information locally and relays it to the control center periodically. To reduce the traffic between the smart EV charger and the control center, a Power Information Collector (PIC), capable of collecting all the meters power information in the charging station, is proposed and implemented in this paper. The response time is further reduced by pushing the power information to the control center. Thus, a fast response smart EV charging infrastructure is achieved to handle the shortage of energy in the local grid.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 15:45:41 GMT" } ]
2013-11-26T00:00:00
[ [ "Chung", "Ching-Yen", "" ], [ "Chynoweth", "Joshua", "" ], [ "Qiu", "Charlie", "" ], [ "Chu", "Chi-Cheng", "" ], [ "Gadh", "Rajit", "" ] ]
new_dataset
0.996491
1311.6012
Mohammad Mozumdar
Tai-Ran Hsu
On a Flywheel-Based Regenerative Braking System for Regenerative Energy Recovery
Proceedings of Green Energy and Systems Conference 2013, November 25, Long Beach, CA, USA
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents a unique flywheel-based regenerative energy recovery, storage and release system developed at the author's laboratory. It can recover and store regenerative energy produced by braking a motion generator with intermittent rotary velocity such as the rotor of a wind turbogenerator subject to intermittent intake wind and the axels of electric and hybrid gas-electric vehicles during frequent coasting and braking. Releasing of the stored regenerative energy in the flywheel is converted to electricity by the attached alternator. A proof-of-concept prototype called the SJSU-RBS was designed, built and tested by author's students with able assistance of a technical staff in his school.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 15:57:24 GMT" } ]
2013-11-26T00:00:00
[ [ "Hsu", "Tai-Ran", "" ] ]
new_dataset
0.998929
1311.6015
Mohammad Mozumdar
Tai-Ran Hsu
On the Sustainability of Electrical Vehicles
Proceedings of Green Energy and Systems Conference 2013, November 25, Long Beach, CA, USA
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/3.0/
Many perceive electric vehicles (EVs) to be eco-environmentally sustainable because they are free of emissions of toxic and greenhouse gases to the environment. However, few have questioned the sustainability of the electric power required to drive these vehicles. This paper presents an in-depth study that indicates that massive infusion of EVs to our society in a short time span will likely create a colossal demand for additional electric power generation much beyond what the US electric power generating industry can provide with its current generating capacity. Additionally, such demand would result in much adverse environmental consequences if the current technology of electric power generation by predominant fossil fuels continues. Other rarely accounted facts on environmental impacts by EVs are the substantial electric energy required to produce batteries that drive EVs, and the negative consequences relating to the recycling of spent batteries.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 16:00:20 GMT" } ]
2013-11-26T00:00:00
[ [ "Hsu", "Tai-Ran", "" ] ]
new_dataset
0.979532
1311.6033
Ivo Vigan
Ivo Vigan
Packing and Covering a Polygon with Geodesic Disks
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a polygon $P$, for two points $s$ and $t$ contained in the polygon, their \emph{geodesic distance} is the length of the shortest $st$-path within $P$. A \emph{geodesic disk} of radius $r$ centered at a point $v \in P$ is the set of points in $P$ whose geodesic distance to $v$ is at most $r$. We present a polynomial time $2$-approximation algorithm for finding a densest geodesic unit disk packing in $P$. Allowing arbitrary radii but constraining the number of disks to be $k$, we present a $4$-approximation algorithm for finding a packing in $P$ with $k$ geodesic disks whose minimum radius is maximized. We then turn our focus on \emph{coverings} of $P$ and present a $2$-approximation algorithm for covering $P$ with $k$ geodesic disks whose maximal radius is minimized. Furthermore, we show that all these problems are $\mathsf{NP}$-hard in polygons with holes. Lastly, we present a polynomial time exact algorithm which covers a polygon with two geodesic disks of minimum maximal radius.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 18:21:01 GMT" } ]
2013-11-26T00:00:00
[ [ "Vigan", "Ivo", "" ] ]
new_dataset
0.9954
1311.6045
Nidhal El-Abbadi
Nidhal El-Abbadi, Ahmed Nidhal Khdhair, Adel Al-Nasrawi
Build Electronic Arabic Lexicon
4 pages
The International Arab Journal of Information Technology, Vol. 8, No. 2, April 2011
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many known Arabic lexicons organized on different ways, each of them has a different number of Arabic words according to its organization way. This paper has used mathematical relations to count a number of Arabic words, which proofs the number of Arabic words presented by Al Farahidy. The paper also presents new way to build an electronic Arabic lexicon by using a hash function that converts each word (as input) to correspond a unique integer number (as output), these integer numbers will be used as an index to a lexicon entry.
[ { "version": "v1", "created": "Sat, 23 Nov 2013 20:10:24 GMT" } ]
2013-11-26T00:00:00
[ [ "El-Abbadi", "Nidhal", "" ], [ "Khdhair", "Ahmed Nidhal", "" ], [ "Al-Nasrawi", "Adel", "" ] ]
new_dataset
0.997748
1311.6178
Alireza Poostindouz
Alireza Poostindouz and Adel Aghajan
Minimum Delay Huffman Code in Backward Decoding Procedure
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For some applications where the speed of decoding and the fault tolerance are important, like in video storing, one of the successful answers is Fix-Free Codes. These codes have been applied in some standards like H.263+ and MPEG-4. The cost of using fix-free codes is to increase the redundancy of the code which means the increase in the amount of bits we need to represent any peace of information. Thus we investigated the use of Huffman Codes with low and negligible backward decoding delay. We showed that for almost all cases there is always a Minimum Delay Huffman Code for a given length vector. The average delay of this code for anti-uniform sources is calculated, that is in agreement with the simulations, and it is shown that this delay is one bit for large alphabet sources. Also an algorithm is proposed which will find the minimum delay code with a good performance.
[ { "version": "v1", "created": "Sun, 24 Nov 2013 22:20:15 GMT" } ]
2013-11-26T00:00:00
[ [ "Poostindouz", "Alireza", "" ], [ "Aghajan", "Adel", "" ] ]
new_dataset
0.969366
1311.6199
Mohammad Mozumdar
Hen-Geul Yeh and Son H. Doan
Battery Placement on Performance of VAR Controls
Proceedings of Green Energy and Systems Conference 2013, November 25, Long Beach, CA, USA
null
null
null
cs.SY
http://creativecommons.org/licenses/by-nc-sa/3.0/
Battery's role in the development of smart grid is gaining greater attention as an energy storage device that can be integrated with a Photovoltaic (PV) cell in the distribution circuit. As more PVs are connected to the system, real power injection to the distribution can cause fluctuation in the voltage. Due to the rapid fluctuation of the voltage, a more advanced volt-ampere reactive (VAR) power control scheme on a fast time scale is used to minimize the voltage deviation on the distribution. Employing both global and local dynamic VAR control schemes in our previous work, we show the effects of battery placement on the performance of VAR controls in the example of a single branch radial distribution circuit. Simulations verify that having battery placement at the rear in the distribution circuit can provide smaller voltage variations and higher energy savings than front battery placement when used with dynamic VAR control algorithms.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 02:45:08 GMT" } ]
2013-11-26T00:00:00
[ [ "Yeh", "Hen-Geul", "" ], [ "Doan", "Son H.", "" ] ]
new_dataset
0.950698
1311.6236
Claudio Soriente
Claudio Soriente and Ghassan Karame and Hubert Ritzdorf and Srdjan Marinovic and Srdjan Capkun
Commune: Shared Ownership in an Agnostic Cloud
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although cloud storage platforms promise a convenient way for users to share files and engage in collaborations, they require all files to have a single owner who unilaterally makes access control decisions. Existing clouds are, thus, agnostic to shared ownership. This can be a significant limitation in many collaborations because one owner can, for example, delete files and revoke access without consulting the other collaborators. In this paper, we first formally define a notion of shared ownership within a file access control model. We then propose a solution, called Commune, to the problem of distributively enforcing shared ownership in agnostic clouds, so that access grants require the support of a pre-arranged threshold of owners. Commune can be used in existing clouds without requiring any modifications to the platforms. We analyze the security of our solution and evaluate its scalability and performance by means of an implementation integrated with Amazon S3.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 08:50:12 GMT" } ]
2013-11-26T00:00:00
[ [ "Soriente", "Claudio", "" ], [ "Karame", "Ghassan", "" ], [ "Ritzdorf", "Hubert", "" ], [ "Marinovic", "Srdjan", "" ], [ "Capkun", "Srdjan", "" ] ]
new_dataset
0.953273
1311.6247
Songnam Hong Mr.
Song-Nam Hong and Giuseppe Caire
Full-Duplex Relaying with Half-Duplex Relays
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider "virtual" full-duplex relaying by means of half-duplex relays. In this configuration, each relay stage in a multi-hop relaying network is formed by at least two relays, used alternatively in transmit and receive modes, such that while one relay transmits its signal to the next stage, the other relay receives a signal from the previous stage. With such a pipelined scheme, the source is active and sends a new information message in each time slot. We consider the achievable rates for different coding schemes and compare them with a cut-set upper bound, which is tight in certain conditions. In particular, we show that both lattice-based Compute and Forward (CoF) and Quantize reMap and Forward (QMF) yield attractive performance and can be easily implemented. In particular, QMF in this context does not require "long" messages and joint (non-unique) decoding, if the quantization mean-square distortion at the relays is chosen appropriately. Also, in the multi-hop case the gap of QMF from the cut-set upper bound grows logarithmically with the number of stages, and not linearly as in the case of "noise level" quantization. Furthermore, we show that CoF is particularly attractive in the case of multi-hop relaying, when the channel gains have fluctuations not larger than 3dB, yielding a rate that does not depend on the number of relaying stages. In particular, we argue that such architecture may be useful for a wireless backhaul with line-of-sight propagation between the relays.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 09:54:00 GMT" } ]
2013-11-26T00:00:00
[ [ "Hong", "Song-Nam", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.987054