id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1311.6272
Chuang Zhang
Chuang Zhang, Pingyi Fan, Yunquan Dong and Ke Xiong
Service based hight-speed railway base station arrangement
This paper has been accepted by the Journal of Wireless Communications and Mobile Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To provide stable and high data rate wireless access for passengers in the train, it is necessary to properly deploy base stations along the railway. We consider this issue from the perspective of service, which is defined as the integral of the time-varying instantaneous channel capacity. With large-scale fading assumption, it will be shown that the total service of each base station is inversely proportional to the velocity of the train. Besides, we find that if the ratio of the service provided by a base station in its service region to its total service is given, the base station interval (i.e. the distance between two adjacent base stations) is a constant regardless of the velocity of the train. On the other hand, if a certain amount of service is required, the interval will increase with the velocity of the train. The above results apply not only to simple curve rails, like line rail and arc rail, but also to any irregular curve rail, provided that the train is travelling at a constant velocity. Furthermore, the new developed results are applied to analyze the on-off transmission strategy of base stations.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 12:07:38 GMT" } ]
2013-11-26T00:00:00
[ [ "Zhang", "Chuang", "" ], [ "Fan", "Pingyi", "" ], [ "Dong", "Yunquan", "" ], [ "Xiong", "Ke", "" ] ]
new_dataset
0.998431
1311.6275
Chuang Zhang
Chuang Zhang, Pingyi Fan, Yunquan Dong and Ke Xiong
Channel Service Based High Speed Railway Base Station Arrangement
Accepted by Int. Workshop on High Mobile Wireless Comms
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid development of high-speed railways, demands on high mobility wireless communication increase greatly. To provide stable and high data rate wireless access for users in the train, it is necessary to properly deploy base stations along the railway. In this paper, we consider this issue from the perspective of channel service which is defined as the integral of the time-varying instantaneous channel capacity. It will show that the total service quantity of each base station is a constant. In order to keep high service efficiency of the railway communication system with multiple base stations along the railway, we need to use the time division to schedule the multiple stations and allow one base station to work when the train is running close to it. In this way, we find a fact that if the ratio of the service quantity provided by each station to its total service quantity is given, the base station interval(i.e. the distance between two adjacent base stations) is a constant, regardless of the speed of the train. On the other hand, interval between two neighboring base stations will increase with the speed of the train. Furthermore, using the concept of channel service, we also analyze the transmission strategy of base stations.
[ { "version": "v1", "created": "Mon, 25 Nov 2013 12:24:33 GMT" } ]
2013-11-26T00:00:00
[ [ "Zhang", "Chuang", "" ], [ "Fan", "Pingyi", "" ], [ "Dong", "Yunquan", "" ], [ "Xiong", "Ke", "" ] ]
new_dataset
0.999405
1208.2076
Ryul Kim
Ryul Kim, Myong-Son Sin, Ok-Hyon Song
Upper Bounds on the Number of Codewords of Some Separating Codes
7 pages, in version 2 corrected typos
Journal of Theoretical Physics and Cryptography, 2013, Vol.2, pp17-20
null
KISU-MATH-2012-E-R-001
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Separating codes have their applications in collusion-secure fingerprinting for generic digital data, while they are also related to the other structures including hash family, intersection code and group testing. In this paper we study upper bounds for separating codes. First, some new upper bound for restricted separating codes is proposed. Then we illustrate that the Upper Bound Conjecture for separating Reed-Solomon codes inherited from Silverberg's question holds true for almost all Reed-Solomon codes.
[ { "version": "v1", "created": "Fri, 10 Aug 2012 02:05:44 GMT" }, { "version": "v2", "created": "Fri, 22 Nov 2013 02:45:10 GMT" } ]
2013-11-25T00:00:00
[ [ "Kim", "Ryul", "" ], [ "Sin", "Myong-Son", "" ], [ "Song", "Ok-Hyon", "" ] ]
new_dataset
0.951968
1311.5550
Fabien Campagne
Manuele Simi and Fabien Campagne
Composable Languages for Bioinformatics: The NYoSh experiment
10 pages, 9 figures. Supplementary material: 4 generated source listings. Comment on this manuscript on Twitter or Google+ with this handle: #NYoSh
null
null
null
cs.SE cs.CE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language workbenches are software engineering tools that help domain experts develop solutions to various classes of problems. Some of these tools focus on non-technical users and provide languages to help organize knowledge while other workbenches provide means to create new programming languages. A key advantage of language workbenches is that they support the composition of independently developed languages. This capability is useful when developing programs that can benefit from different levels of abstraction. We reasoned that language workbenches could be useful to develop bioinformatics software solutions. In order to evaluate the potential of language workbenches in bioinformatics, we tested a prominent workbench by developing an alternative to shell scripting. While shell scripts are widely used in bioinformatics to automate computational analysis, existing scripting languages do not provide many of the features present in modern programming languages. We report on our design of NYoSh (Not Your ordinary Shell). NYoSh was implemented as a collection of languages that can be composed to write programs as expressive and concise as shell scripts. NYoSh offers a concrete illustration of the advantages that language workbench technologies can bring to bioinformatics. For instance, NYoSh scripts can be edited with an environment-aware editor that provides semantic error detection and can be compiled interactively with an automatic build and deployment system. In contrast to shell scripts, NYoSh scripts can be written in a modern development environment, supporting context dependent intentions and can be extended seamlessly with new abstractions and language constructs. We demonstrate language extension and composition by presenting a tight integration of NYoSh scripts with the GobyWeb system. The NYoSh Workbench prototype is distributed at http://nyosh.campagnelab.org
[ { "version": "v1", "created": "Thu, 21 Nov 2013 20:42:37 GMT" }, { "version": "v2", "created": "Fri, 22 Nov 2013 19:53:01 GMT" } ]
2013-11-25T00:00:00
[ [ "Simi", "Manuele", "" ], [ "Campagne", "Fabien", "" ] ]
new_dataset
0.952775
1311.5740
Joris Borgdorff
Joris Borgdorff, Mariusz Mamonski, Bartosz Bosak, Krzysztof Kurowski, Mohamed Ben Belgacem, Bastien Chopard, Derek Groen, Peter V. Coveney, Alfons G. Hoekstra
Distributed Multiscale Computing with MUSCLE 2, the Multiscale Coupling Library and Environment
18 pages, 22 figures, submitted to journal
null
null
null
cs.DC cs.CE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Multiscale Coupling Library and Environment: MUSCLE 2. This multiscale component-based execution environment has a simple to use Java, C++, C, Python and Fortran API, compatible with MPI, OpenMP and threading codes. We demonstrate its local and distributed computing capabilities and compare its performance to MUSCLE 1, file copy, MPI, MPWide, and GridFTP. The local throughput of MPI is about two times higher, so very tightly coupled code should use MPI as a single submodel of MUSCLE 2; the distributed performance of GridFTP is lower, especially for small messages. We test the performance of a canal system model with MUSCLE 2, where it introduces an overhead as small as 5% compared to MPI.
[ { "version": "v1", "created": "Fri, 22 Nov 2013 13:02:15 GMT" } ]
2013-11-25T00:00:00
[ [ "Borgdorff", "Joris", "" ], [ "Mamonski", "Mariusz", "" ], [ "Bosak", "Bartosz", "" ], [ "Kurowski", "Krzysztof", "" ], [ "Belgacem", "Mohamed Ben", "" ], [ "Chopard", "Bastien", "" ], [ "Groen", "Derek", "" ], [ "Coveney", "Peter V.", "" ], [ "Hoekstra", "Alfons G.", "" ] ]
new_dataset
0.991593
1011.3023
Joan Bruna
Joan Bruna, St\'ephane Mallat
Classification with Scattering Operators
6 pages. CVPR 2011
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A scattering vector is a local descriptor including multiscale and multi-direction co-occurrence information. It is computed with a cascade of wavelet decompositions and complex modulus. This scattering representation is locally translation invariant and linearizes deformations. A supervised classification algorithm is computed with a PCA model selection on scattering vectors. State of the art results are obtained for handwritten digit recognition and texture classification.
[ { "version": "v1", "created": "Fri, 12 Nov 2010 20:15:25 GMT" }, { "version": "v2", "created": "Tue, 16 Nov 2010 08:42:30 GMT" }, { "version": "v3", "created": "Wed, 17 Nov 2010 18:48:50 GMT" }, { "version": "v4", "created": "Wed, 20 Nov 2013 16:42:37 GMT" } ]
2013-11-21T00:00:00
[ [ "Bruna", "Joan", "" ], [ "Mallat", "Stéphane", "" ] ]
new_dataset
0.981851
1310.3404
Gabriel Kerneis
Gabriel Kerneis and Charlie Shepherd and Stefan Hajnoczi
QEMU/CPC: Static Analysis and CPS Conversion for Safe, Portable, and Efficient Coroutines
12 pages
Proceedings of the ACM SIGPLAN 2014 Workshop on Partial Evaluation and Program Manipulation, PEPM 2014, San Diego, CA, USA, January 20-21, 2014. ACM 2014
10.1145/2543728.2543733
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coroutines and events are two common abstractions for writing concurrent programs. Because coroutines are often more convenient, but events more portable and efficient, it is natural to want to translate the former into the latter. CPC is such a source-to-source translator for C programs, based on a partial conversion into continuation-passing style (CPS conversion) of functions annotated as cooperative. In this article, we study the application of the CPC translator to QEMU, an open-source machine emulator which also uses annotated coroutine functions for concurrency. We first propose a new type of annotations to identify functions which never cooperate, and we introduce CoroCheck, a tool for the static analysis and inference of cooperation annotations. Then, we improve the CPC translator, defining CPS conversion as a calling convention for the C language, with support for indirect calls to CPS-converted function through function pointers. Finally, we apply CoroCheck and CPC to QEMU (750 000 lines of C code), fixing hundreds of missing annotations and comparing performance of the translated code with existing implementations of coroutines in QEMU. Our work shows the importance of static annotation checking to prevent actual concurrency bugs, and demonstrates that CPS conversion is a flexible, portable, and efficient compilation technique, even for very large programs written in an imperative language.
[ { "version": "v1", "created": "Sat, 12 Oct 2013 16:46:28 GMT" }, { "version": "v2", "created": "Wed, 20 Nov 2013 10:35:31 GMT" } ]
2013-11-21T00:00:00
[ [ "Kerneis", "Gabriel", "" ], [ "Shepherd", "Charlie", "" ], [ "Hajnoczi", "Stefan", "" ] ]
new_dataset
0.953278
1311.4915
Matthew Hague
Matthew Hague
Senescent Ground Tree Rewrite Systems
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ground Tree Rewrite Systems with State are known to have an undecidable control state reachability problem. Taking inspiration from the recent introduction of scope-bounded multi-stack pushdown systems, we define Senescent Ground Tree Rewrite Systems. These are a restriction of ground tree rewrite systems with state such that nodes of the tree may no longer be rewritten after having witnessed an a priori fixed number of control state changes. As well as generalising scope-bounded multi-stack pushdown systems, we show --- via reductions to and from reset Petri-nets --- that these systems have an Ackermann-complete control state reachability problem. However, reachability of a regular set of trees remains undecidable.
[ { "version": "v1", "created": "Tue, 19 Nov 2013 23:03:10 GMT" } ]
2013-11-21T00:00:00
[ [ "Hague", "Matthew", "" ] ]
new_dataset
0.989185
1311.5133
Rupam Sharma
Rupam Kumar Sharma and Dhrubajyoti gogoi
Android Based Emergency Alert Button
3 pages, ISSN: 2278-3075, Volume-2, Issue-4, March 2013
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Android is a java based operating system which runs on the Linux kernel. It is lightweight and full featured. Android applications are developed using Java and can be ported to new platform easily thereby fostering huge number of useful mobile applications. This paper describes about a SOS application being developed and its successful implementation with tested results. The application has target users those sections of the people who surprisingly falls into a situation where instant communication of their whereabouts becomes indispensable to be informed to certain authorized persons at remote end
[ { "version": "v1", "created": "Wed, 20 Nov 2013 16:52:07 GMT" } ]
2013-11-21T00:00:00
[ [ "Sharma", "Rupam Kumar", "" ], [ "gogoi", "Dhrubajyoti", "" ] ]
new_dataset
0.996495
1306.3032
Kazutaka Kurihara
Kazutaka Kurihara, Masakazu Takasu, Kazuhiro Sasao, Hal Seki, Takayuki Narabu, Mitsuo Yamamoto, Satoshi Iida, Hiroyuki Yamamoto
A Face-like Structure Detection on Planet and Satellite Surfaces using Image Processing
4 pages
ACE 2013, LNCS 8253, Springer, pp. 564-567, 2013
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper demonstrates that face-like structures are everywhere, and can be de-tected automatically even with computers. Huge amount of satellite images of the Earth, the Moon, the Mars are explored and many interesting face-like structure are detected. Throughout this fact, we believe that science and technologies can alert people not to easily become an occultist.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 06:28:07 GMT" } ]
2013-11-20T00:00:00
[ [ "Kurihara", "Kazutaka", "" ], [ "Takasu", "Masakazu", "" ], [ "Sasao", "Kazuhiro", "" ], [ "Seki", "Hal", "" ], [ "Narabu", "Takayuki", "" ], [ "Yamamoto", "Mitsuo", "" ], [ "Iida", "Satoshi", "" ], [ "Yamamoto", "Hiroyuki", "" ] ]
new_dataset
0.976079
1309.7340
Jiwei Li
Jiwei Li and Claire Cardie
Early Stage Influenza Detection from Twitter
null
null
null
null
cs.SI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Influenza is an acute respiratory illness that occurs virtually every year and results in substantial disease, death and expense. Detection of Influenza in its earliest stage would facilitate timely action that could reduce the spread of the illness. Existing systems such as CDC and EISS which try to collect diagnosis data, are almost entirely manual, resulting in about two-week delays for clinical data acquisition. Twitter, a popular microblogging service, provides us with a perfect source for early-stage flu detection due to its real- time nature. For example, when a flu breaks out, people that get the flu may post related tweets which enables the detection of the flu breakout promptly. In this paper, we investigate the real-time flu detection problem on Twitter data by proposing Flu Markov Network (Flu-MN): a spatio-temporal unsupervised Bayesian algorithm based on a 4 phase Markov Network, trying to identify the flu breakout at the earliest stage. We test our model on real Twitter datasets from the United States along with baselines in multiple applications, such as real-time flu breakout detection, future epidemic phase prediction, or Influenza-like illness (ILI) physician visits. Experimental results show the robustness and effectiveness of our approach. We build up a real time flu reporting system based on the proposed approach, and we are hopeful that it would help government or health organizations in identifying flu outbreaks and facilitating timely actions to decrease unnecessary mortality.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 19:47:11 GMT" }, { "version": "v2", "created": "Wed, 9 Oct 2013 18:01:47 GMT" }, { "version": "v3", "created": "Mon, 18 Nov 2013 21:09:39 GMT" } ]
2013-11-20T00:00:00
[ [ "Li", "Jiwei", "" ], [ "Cardie", "Claire", "" ] ]
new_dataset
0.997881
1311.4573
Pedro Neto
Pedro Neto
Off-line Programming and Simulation from CAD Drawings: Robot-Assisted Sheet Metal Bending
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increasingly, industrial robots are being used in production systems. This is because they are highly flexible machines and economically competitive with human labor. The problem is that they are difficult to program. Thus, manufacturing system designers are looking for more intuitive ways to program robots, especially using the CAD drawings of the production system they developed. This paper presents an industrial application of a novel CAD-based off-line robot programming (OLP) and simulation system in which the CAD package used for cell design is also used for OLP and robot simulation. Thus, OLP becomes more accessible to anyone with basic knowledge of CAD and robotics. The system was tested in a robot-assisted sheet metal bending cell. Experiments allowed identifying the pros and cons of the proposed solution.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 22:18:49 GMT" } ]
2013-11-20T00:00:00
[ [ "Neto", "Pedro", "" ] ]
new_dataset
0.987152
1304.4321
Venkatesan Guruswami
Venkatesan Guruswami, Patrick Xia
Polar Codes: Speed of polarization and polynomial gap to capacity
26 pages; Submitted to IEEE Transactions on Information Theory (Full version of conference paper appearing in FOCS'13)
null
null
null
cs.IT cs.DS math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that, for all binary-input symmetric memoryless channels, polar codes enable reliable communication at rates within $\epsilon > 0$ of the Shannon capacity with a block length, construction complexity, and decoding complexity all bounded by a {\em polynomial} in $1/\epsilon$. Polar coding gives the {\em first known explicit construction} with rigorous proofs of all these properties; previous constructions were not known to achieve capacity with less than $\exp(1/\epsilon)$ decoding complexity except for erasure channels. We establish the capacity-achieving property of polar codes via a direct analysis of the underlying martingale of conditional entropies, without relying on the martingale convergence theorem. This step gives rough polarization (noise levels $\approx \epsilon$ for the "good" channels), which can then be adequately amplified by tracking the decay of the channel Bhattacharyya parameters. Our effective bounds imply that polar codes can have block length (and encoding/decoding complexity) bounded by a polynomial in $1/\epsilon$. The generator matrix of such polar codes can be constructed in polynomial time by algorithmically computing an adequate approximation of the polarization process.
[ { "version": "v1", "created": "Tue, 16 Apr 2013 03:33:21 GMT" }, { "version": "v2", "created": "Mon, 18 Nov 2013 18:30:48 GMT" } ]
2013-11-19T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Xia", "Patrick", "" ] ]
new_dataset
0.999197
1307.0219
Eduardo Graells-Garrido
Eduardo Graells-Garrido
Ornitolog\'ia Virtual: Caracterizando a #Chile en Twitter
24 pages, technical report. In spanish
null
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Este art\'iculo presenta un an\'alisis de los tweets recolectados el 28 de Octubre de 2012, en el contexto de las elecciones municipales de 2012 en Chile. Dicho an\'alisis se realiza mediante una metodolog\'ia basada en literatura previa, en particular en t\'ecnicas de recuperaci\'on de la informaci\'on y de an\'alisis de espacios de informaci\'on. Como resultado, se determinan: 1) caracter\'isticas demogr\'aficas b\'asicas de la poblaci\'on virtual chilena, incluyendo su distribuci\'on geogr\'afica, 2) el contenido que caracteriza a cada regi\'on, y c\'omo fluye informaci\'on entre regiones, y 3) el grado de representatividad de la poblaci\'on virtual participante en el evento con respecto a la poblaci\'on f\'isica. Se determina que la muestra obtenida es representativa de la poblaci\'on en t\'erminos de distribuci\'on geogr\'afica, que el centralismo que afecta al pa\'is se ve reflejado en Twitter, y que, a pesar de los sesgos poblacionales, es posible identificar el contenido que caracteriza a cada regi\'on. Se finaliza con una discusi\'on de las implicaciones y conclusiones pr\'acticas de este trabajo, as\'i como futuras aplicaciones.
[ { "version": "v1", "created": "Sun, 30 Jun 2013 16:49:11 GMT" }, { "version": "v2", "created": "Sat, 16 Nov 2013 13:51:21 GMT" } ]
2013-11-19T00:00:00
[ [ "Graells-Garrido", "Eduardo", "" ] ]
new_dataset
0.997043
1307.2672
Karthikeyan Shanmugam
Karthikeyan Shanmugam, Alexandros G.Dimakis and Giuseppe Caire
Index Coding Problem with Side Information Repositories
17 pages, 7 Figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To tackle the expected enormous increase in mobile video traffic in cellular networks, an architecture involving a base station along with caching femto stations (referred to as helpers), storing popular files near users, has been proposed [1]. The primary benefit of caching is the enormous increase in downloading rate when a popular file is available at helpers near a user requesting that file. In this work, we explore a secondary benefit of caching in this architecture through the lens of index coding. We assume a system with n users and constant number of caching helpers. Only helpers store files, i.e. have side information. We investigate the following scenario: Each user requests a distinct file that is not found in the set of helpers nearby. Users are served coded packets (through an index code) by an omniscient base station. Every user decodes its desired packet from the coded packets and the side information packets from helpers nearby. We assume that users can obtain any file stored in their neighboring helpers without incurring transmission costs. With respect to the index code employed, we investigate two achievable schemes: 1) XOR coloring based on coloring of the side information graph associated with the problem and 2)Vector XOR coloring based on fractional coloring of the side information graph. We show that the general problem reduces to a canonical problem where every user is connected to exactly one helper under some topological constraints. For the canonical problem, with constant number of helpers (k), we show that the complexity of computing the best XOR/vector XOR coloring schemes are polynomial in the number of users n. The result exploits a special complete bi-partite structure that the side information graphs exhibit for any finite k.
[ { "version": "v1", "created": "Wed, 10 Jul 2013 05:05:18 GMT" }, { "version": "v2", "created": "Sat, 16 Nov 2013 01:45:25 GMT" } ]
2013-11-19T00:00:00
[ [ "Shanmugam", "Karthikeyan", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.988491
1311.3987
Seyed-Mehdi-Reza Beheshti
Seyed-Mehdi-Reza Beheshti and Srikumar Venugopal and Seung Hwan Ryu and Boualem Benatallah and Wei Wang
Big Data and Cross-Document Coreference Resolution: Current State and Future Opportunities
null
null
null
null
cs.CL cs.DC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information Extraction (IE) is the task of automatically extracting structured information from unstructured/semi-structured machine-readable documents. Among various IE tasks, extracting actionable intelligence from ever-increasing amount of data depends critically upon Cross-Document Coreference Resolution (CDCR) - the task of identifying entity mentions across multiple documents that refer to the same underlying entity. Recently, document datasets of the order of peta-/tera-bytes has raised many challenges for performing effective CDCR such as scaling to large numbers of mentions and limited representational power. The problem of analysing such datasets is called "big data". The aim of this paper is to provide readers with an understanding of the central concepts, subtasks, and the current state-of-the-art in CDCR process. We provide assessment of existing tools/techniques for CDCR subtasks and highlight big data challenges in each of them to help readers identify important and outstanding issues for further investigation. Finally, we provide concluding remarks and discuss possible directions for future work.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 06:10:15 GMT" } ]
2013-11-19T00:00:00
[ [ "Beheshti", "Seyed-Mehdi-Reza", "" ], [ "Venugopal", "Srikumar", "" ], [ "Ryu", "Seung Hwan", "" ], [ "Benatallah", "Boualem", "" ], [ "Wang", "Wei", "" ] ]
new_dataset
0.995688
1311.4198
David Van Horn
Shuying Liang, Matthew Might, David Van Horn
AnaDroid: Malware Analysis of Android with User-supplied Predicates
Appears in the Workshop on Tools for Automatic Program Analysis, Seattle, Washington, June 2013
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's mobile platforms provide only coarse-grained permissions to users with regard to how third- party applications use sensitive private data. Unfortunately, it is easy to disguise malware within the boundaries of legitimately-granted permissions. For instance, granting access to "contacts" and "internet" may be necessary for a text-messaging application to function, even though the user does not want contacts transmitted over the internet. To understand fine-grained application use of permissions, we need to statically analyze their behavior. Even then, malware detection faces three hurdles: (1) analyses may be prohibitively expensive, (2) automated analyses can only find behaviors that they are designed to find, and (3) the maliciousness of any given behavior is application-dependent and subject to human judgment. To remedy these issues, we propose semantic-based program analysis, with a human in the loop as an alternative approach to malware detection. In particular, our analysis allows analyst-crafted semantic predicates to search and filter analysis results. Human-oriented semantic-based program analysis can systematically, quickly and concisely characterize the behaviors of mobile applications. We describe a tool that provides analysts with a library of the semantic predicates and the ability to dynamically trade speed and precision. It also provides analysts the ability to statically inspect details of every suspicious state of (abstract) execution in order to make a ruling as to whether or not the behavior is truly malicious with respect to the intent of the application. In addition, permission and profiling reports are generated to aid analysts in identifying common malicious behaviors.
[ { "version": "v1", "created": "Sun, 17 Nov 2013 18:47:15 GMT" } ]
2013-11-19T00:00:00
[ [ "Liang", "Shuying", "" ], [ "Might", "Matthew", "" ], [ "Van Horn", "David", "" ] ]
new_dataset
0.999631
1311.4419
Zhaodan Kong
Zhaodan Kong, Kayhan Ozcimder, Nathan W. Fuller, John Baillieul
Perception and Steering Control in Paired Bat Flight
Submitted to the 19th World Congress of the International Federation of Automatic Control (IFAC)
null
null
null
cs.SY cs.RO physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Animals within groups need to coordinate their reactions to perceived environmental features and to each other in order to safely move from one point to another. This paper extends our previously published work on the flight patterns of Myotis velifer that have been observed in a habitat near Johnson City, Texas. Each evening, these bats emerge from a cave in sequences of small groups that typically contain no more than three or four individuals, and they thus provide ideal subjects for studying leader-follower behaviors. By analyzing the flight paths of a group of M. velifer, the data show that the flight behavior of a follower bat is influenced by the flight behavior of a leader bat in a way that is not well explained by existing pursuit laws, such as classical pursuit, constant bearing and motion camouflage. Thus we propose an alternative steering law based on virtual loom, a concept we introduce to capture the geometrical configuration of the leader-follower pair. It is shown that this law may be integrated with our previously proposed vision-enabled steering laws to synthesize trajectories, the statistics of which fit with those of the bats in our data set. The results suggest that bats use perceived information of both the environment and their neighbors for navigation.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 19:18:16 GMT" } ]
2013-11-19T00:00:00
[ [ "Kong", "Zhaodan", "" ], [ "Ozcimder", "Kayhan", "" ], [ "Fuller", "Nathan W.", "" ], [ "Baillieul", "John", "" ] ]
new_dataset
0.992802
1311.4420
Kiran Sree Pokkuluri Prof
P. Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N
CAVDM: Cellular Automata Based Video Cloud Mining Framework for Information Retrieval
null
Parallel Computing and Cloud Computing Research (PCCR) Volume 1 Issue 1, April 2013
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud Mining technique can be applied to various documents. Acquisition and storage of video data is an easy task but retrieval of information from video data is a challenging task. So video Cloud Mining plays an important role in efficient video data management for information retrieval. This paper proposes a Cellular Automata based framework for video Cloud Mining to extract the information from video data. This includes developing the technique for shot detection then key frame analysis is considered to compare the frames of each shot to each others to define the relationship between shots. Cellular automata based hierarchical clustering technique is adopted to make a group of similar shots to detect the particular event on some requirement as per user demand.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 15:12:42 GMT" } ]
2013-11-19T00:00:00
[ [ "Sree", "P. Kiran", "" ], [ "Babu", "Inampudi Ramesh", "" ], [ "N", "SSSN Usha Devi", "" ] ]
new_dataset
0.961525
1311.4439
Seyran Khademi Mrs
Seyran Khademi, Sundeep Prabhakar Chepuri, Zoubir Irahhauten, Gerard J. M. Janssen and Alle-Jan van der Veen
60 GHz Wireless Link Within Metal Enclosures: Channel Measurements and System Analysis
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless channel measurement results for 60 GHz within a closed metal cabinet are provided. A metal cabinet is chosen to emulate the environment within a mechatronic system, which have metal enclosures in general. A frequency domain sounding technique is used to measure the wireless channel for different volumes of the metal enclosure, considering both line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios. Large-scale and small-scale characteristics of the wireless channel are extracted in order to build a comprehensive channel model. In contrast to conventional indoor channels at 60 GHz, the channel in the metal enclosure is highly reflective resulting in a rich scattering environment with a significantly large root-mean-square (RMS) delay spread. Based on the obtained measurement results, the bit error rate (BER) performance is evaluated for a wideband orthogonal frequency division multiplexing (OFDM) system.
[ { "version": "v1", "created": "Mon, 18 Nov 2013 16:27:49 GMT" } ]
2013-11-19T00:00:00
[ [ "Khademi", "Seyran", "" ], [ "Chepuri", "Sundeep Prabhakar", "" ], [ "Irahhauten", "Zoubir", "" ], [ "Janssen", "Gerard J. M.", "" ], [ "van der Veen", "Alle-Jan", "" ] ]
new_dataset
0.99923
1311.3533
Manoj Gopalkrishnan
Manoj Gopalkrishnan
The Hot Bit I: The Szilard-Landauer Correspondence
v2: 11 pages, no figures. Introduction section added. v1: 9 pages, no figures
null
null
null
cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a precise formulation of a correspondence between information and thermodynamics that was first observed by Szilard, and later studied by Landauer. The correspondence identifies available free energy with relative entropy, and provides a dictionary between information and thermodynamics. We precisely state and prove this correspondence. The paper should be broadly accessible since we assume no prior knowledge of information theory, developing it axiomatically, and we assume almost no thermodynamic background.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 15:22:16 GMT" }, { "version": "v2", "created": "Fri, 15 Nov 2013 11:49:01 GMT" } ]
2013-11-18T00:00:00
[ [ "Gopalkrishnan", "Manoj", "" ] ]
new_dataset
0.982314
1311.3618
Mircea Cimpoi
Mircea Cimpoi, Subhransu Maji, Iasonas Kokkinos, Sammy Mohamed, and Andrea Vedaldi
Describing Textures in the Wild
13 pages; 12 figures Fixed misplaced affiliation
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Patterns and textures are defining characteristics of many natural objects: a shirt can be striped, the wings of a butterfly can be veined, and the skin of an animal can be scaly. Aiming at supporting this analytical dimension in image understanding, we address the challenging problem of describing textures with semantic attributes. We identify a rich vocabulary of forty-seven texture terms and use them to describe a large dataset of patterns collected in the wild.The resulting Describable Textures Dataset (DTD) is the basis to seek for the best texture representation for recognizing describable texture attributes in images. We port from object recognition to texture recognition the Improved Fisher Vector (IFV) and show that, surprisingly, it outperforms specialized texture descriptors not only on our problem, but also in established material recognition datasets. We also show that the describable attributes are excellent texture descriptors, transferring between datasets and tasks; in particular, combined with IFV, they significantly outperform the state-of-the-art by more than 8 percent on both FMD and KTHTIPS-2b benchmarks. We also demonstrate that they produce intuitive descriptions of materials and Internet images.
[ { "version": "v1", "created": "Thu, 14 Nov 2013 19:28:35 GMT" }, { "version": "v2", "created": "Fri, 15 Nov 2013 16:14:12 GMT" } ]
2013-11-18T00:00:00
[ [ "Cimpoi", "Mircea", "" ], [ "Maji", "Subhransu", "" ], [ "Kokkinos", "Iasonas", "" ], [ "Mohamed", "Sammy", "" ], [ "Vedaldi", "Andrea", "" ] ]
new_dataset
0.999659
1311.3731
Victor Pan
Ioannis Z. Emiris, Victor Y. Pan and Elias P. Tsigaridas
Chapter 10: Algebraic Algorithms
41.1 pages
null
null
null
cs.DS cs.NA cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our Chapter in the upcoming Volume I: Computer Science and Software Engineering of Computing Handbook (Third edition), Allen Tucker, Teo Gonzales and Jorge L. Diaz-Herrera, editors, covers Algebraic Algorithms, both symbolic and numerical, for matrix computations and root-finding for polynomials and systems of polynomials equations. We cover part of these large subjects and include basic bibliography for further study. To meet space limitation we cite books, surveys, and comprehensive articles with pointers to further references, rather than including all the original technical papers.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 05:50:38 GMT" } ]
2013-11-18T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Pan", "Victor Y.", "" ], [ "Tsigaridas", "Elias P.", "" ] ]
new_dataset
0.989006
1311.3821
Mohammed Fadhil
Dr. Mohammed Abbas Fadhil Al-Husainy
MAC Address as a Key for Data Encryption
5 pages, 2 figure
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In computer networking, the Media Access Control (MAC) address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. TCP/IP and other mainstream networking architectures generally adopt the OSI model. MAC addresses function at the data link layer (layer 2 in the OSI model). They allow computers to uniquely identify themselves on a network at this relatively low level. In this paper, suggested data encryption technique is presented by using the MAC address as a key that is used to authenticate the receiver device like PC, mobile phone, laptop or any other devices that is connected to the network. This technique was tested on some data, visual and numerical measurements were used to check the strength and performance of the technique. The experiments showed that the suggested technique can be used easily to encrypt data that is transmitted through networks.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 12:10:36 GMT" } ]
2013-11-18T00:00:00
[ [ "Al-Husainy", "Dr. Mohammed Abbas Fadhil", "" ] ]
new_dataset
0.997583
1311.3879
Jerome Euzenat
Faisal Alkhateeb, J\'er\^ome Euzenat (INRIA Grenoble Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
Answering SPARQL queries modulo RDF Schema with paths
RR-8394; alkhateeb2003a
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SPARQL is the standard query language for RDF graphs. In its strict instantiation, it only offers querying according to the RDF semantics and would thus ignore the semantics of data expressed with respect to (RDF) schemas or (OWL) ontologies. Several extensions to SPARQL have been proposed to query RDF data modulo RDFS, i.e., interpreting the query with RDFS semantics and/or considering external ontologies. We introduce a general framework which allows for expressing query answering modulo a particular semantics in an homogeneous way. In this paper, we discuss extensions of SPARQL that use regular expressions to navigate RDF graphs and may be used to answer queries considering RDFS semantics. We also consider their embedding as extensions of SPARQL. These SPARQL extensions are interpreted within the proposed framework and their drawbacks are presented. In particular, we show that the PSPARQL query language, a strict extension of SPARQL offering transitive closure, allows for answering SPARQL queries modulo RDFS graphs with the same complexity as SPARQL through a simple transformation of the queries. We also consider languages which, in addition to paths, provide constraints. In particular, we present and compare nSPARQL and our proposal CPSPARQL. We show that CPSPARQL is expressive enough to answer full SPARQL queries modulo RDFS. Finally, we compare the expressiveness and complexity of both nSPARQL and the corresponding fragment of CPSPARQL, that we call cpSPARQL. We show that both languages have the same complexity through cpSPARQL, being a proper extension of SPARQL graph patterns, is more expressive than nSPARQL.
[ { "version": "v1", "created": "Fri, 15 Nov 2013 15:34:26 GMT" } ]
2013-11-18T00:00:00
[ [ "Alkhateeb", "Faisal", "", "INRIA Grenoble Rhône-Alpes /\n LIG Laboratoire d'Informatique de Grenoble" ], [ "Euzenat", "Jérôme", "", "INRIA Grenoble Rhône-Alpes /\n LIG Laboratoire d'Informatique de Grenoble" ] ]
new_dataset
0.998914
1112.6140
Tom\'a\v{s} Valla
R. Samal and T. Valla
The guarding game is E-complete
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The guarding game is a game in which several cops try to guard a region in a (directed or undirected) graph against Robber. Robber and the cops are placed on the vertices of the graph; they take turns in moving to adjacent vertices (or staying), cops inside the guarded region, Robber on the remaining vertices (the robber-region). The goal of Robber is to enter the guarded region at a vertex with no cop on it. The problem is to determine whether for a given graph and given number of cops the cops are able to prevent Robber from entering the guarded region. Fomin et al. [Fomin, Golovach, Hall, Mihalak, Vicari, Widmayer: How to Guard a Graph? Algorithmica 61(4), 839--856 (2011)] proved that the problem is NP-complete when the robber-region is restricted to a tree. Further they prove that is it PSPACE-complete when the robber-region is restricted to a directed acyclic graph, and they ask about the problem complexity for arbitrary graphs. In this paper we prove that the problem is E-complete for arbitrary directed graphs.
[ { "version": "v1", "created": "Wed, 28 Dec 2011 16:03:30 GMT" }, { "version": "v2", "created": "Thu, 14 Nov 2013 12:23:49 GMT" } ]
2013-11-15T00:00:00
[ [ "Samal", "R.", "" ], [ "Valla", "T.", "" ] ]
new_dataset
0.999772
1311.3322
Thanh Do
Thanh Do and Haryadi S. Gunawi
Impact of Limpware on HDFS: A Probabilistic Estimation
9 pages, 6 figures, detailed probability calculation for SOCC 13 limplock paper
null
null
null
cs.OS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of cloud computing, thousands of machines are connected and managed collectively. This era is confronted with a new challenge: performance variability, primarily caused by large-scale management issues such as hardware failures, software bugs, and configuration mistakes. In our previous work we highlighted one overlooked cause: limpware - hardware whose performance degrades significantly compared to its specification. We showed that limpware can cause severe impact in current scale-out systems. In this report, we quantify how often these scenarios happen in Hadoop Distributed File System.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 22:05:58 GMT" } ]
2013-11-15T00:00:00
[ [ "Do", "Thanh", "" ], [ "Gunawi", "Haryadi S.", "" ] ]
new_dataset
0.995554
1307.0550
Ugo Dal Lago
Ugo Dal Lago, Margherita Zorzi
Wave-Style Token Machines and Quantum Lambda Calculi (Long Version)
29 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Particle-style token machines are a way to interpret proofs and programs, when the latter are defined according to the principles of linear logic. In this paper, we show that token machines also make sense when the programs at hand are those of a simple linear quantum $\lambda$-calculus. This, however, requires generalizing the concept of a token machine to one in which more than one particle can possibly travel around the term at the same time. This is intimately related to entanglement and allows to give a simple operational semantics to the calculus coherently with the principles of quantum computation.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 22:28:37 GMT" }, { "version": "v2", "created": "Mon, 28 Oct 2013 12:16:38 GMT" }, { "version": "v3", "created": "Wed, 13 Nov 2013 15:58:50 GMT" } ]
2013-11-14T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Zorzi", "Margherita", "" ] ]
new_dataset
0.999256
1311.3078
Rima Kilany
Rima Kilany Maroun Chamoun
Smart: Semantically mashup rest web services
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mashup is a combination of information from more than one source, mixed up in a way to create something new, or at least useful. Anyone can find mashups on the internet, but these are always specifically designed for a predefined purpose. To change that fact, we implemented a new platform we called the SMART platform. SMART enables the user to make his own choices as for the REST web services he needs to call in order to build an intelligent personalized mashup, from a Google-like simple search interface, without needing any programming skills. In order to achieve this goal, we defined an ontology that can hold REST web services descriptions. These descriptions encapsulate mainly, the input type needed for a service, its output type, and the kind of relation that ties the input to the output. Then, by matching the user input query keywords, with the REST web services definitions in our ontology, we can find registered services individuals in this ontology, and construct the raw REST query for each service found. The wrap up from the keywords, into semantic definitions, in order to find the matching service individual, then the wrap down from the semantic service description of the found individual, to the raw REST call, and finally the wrap up of the result again into semantic individuals, is done for two main purposes: the first to let the user use simple keywords in order to build complex mashups, and the second to benefit from the ontology inference engine in a way, where services instances can be tied together into an intelligent mashup, simply by making each service output individuals, stand as the next service input.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 10:55:15 GMT" } ]
2013-11-14T00:00:00
[ [ "Chamoun", "Rima Kilany Maroun", "" ] ]
new_dataset
0.961062
1311.3220
Gaurav Pande
Gaurav Pande
Chaotic Arithmetic Coding for Secure Video Multicast
Submitted to SPIN 2014
null
null
null
cs.MM cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arithmetic Coding (AC) is widely used for the entropy coding of text and video data. It involves recursive partitioning of the range [0,1) in accordance with the relative probabilities of occurrence of the input symbols. A data (image or video) encryption scheme based on arithmetic coding called as Chaotic Arithmetic Coding (CAC) has been presented in previous works. In CAC, a large number of chaotic maps can be used to perform coding, each achieving Shannon optimal compression performance. The exact choice of map is governed by a key. CAC has the effect of scrambling the intervals without making any changes to the width of interval in which the codeword must lie, thereby allowing encryption without sacrificing any coding efficiency. In this paper, we use a redundancy in CAC procedure for secure multicast of videos where multiple users are distributed with different keys to decode same encrypted file. By encrypting once, we can generate multiple keys, either of which can be used to decrypt the encoded file. This is very suitable for video distribution over Internet where a single video can be distributed to multiple clients in a privacy preserving manner.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 17:21:42 GMT" } ]
2013-11-14T00:00:00
[ [ "Pande", "Gaurav", "" ] ]
new_dataset
0.995595
1311.3238
Emmanuel Filiot
Krishnendu Chatterjee and Laurent Doyen and Emmanuel Filiot and Jean-Fran\c{c}ois Raskin
Doomsday Equilibria for Omega-Regular Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two-player games on graphs provide the theoretical frame- work for many important problems such as reactive synthesis. While the traditional study of two-player zero-sum games has been extended to multi-player games with several notions of equilibria, they are decidable only for perfect-information games, whereas several applications require imperfect-information games. In this paper we propose a new notion of equilibria, called doomsday equilibria, which is a strategy profile such that all players satisfy their own objective, and if any coalition of players deviates and violates even one of the players objective, then the objective of every player is violated. We present algorithms and complexity results for deciding the existence of doomsday equilibria for various classes of omega-regular objectives, both for imperfect-information games, and for perfect-information games. We provide optimal complexity bounds for imperfect-information games, and in most cases for perfect-information games.
[ { "version": "v1", "created": "Wed, 13 Nov 2013 18:18:51 GMT" } ]
2013-11-14T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Doyen", "Laurent", "" ], [ "Filiot", "Emmanuel", "" ], [ "Raskin", "Jean-François", "" ] ]
new_dataset
0.97712
1203.1940
Danupon Nanongkai
Parinya Chalermsook, Shiva Kintali, Richard Lipton and Danupon Nanongkai
Graph Pricing Problem on Bounded Treewidth, Bounded Genus and k-partite graphs
Preprint of the paper to appear in Chicago Journal of Theoretical Computer Science
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the following problem. A seller has infinite copies of $n$ products represented by nodes in a graph. There are $m$ consumers, each has a budget and wants to buy two products. Consumers are represented by weighted edges. Given the prices of products, each consumer will buy both products she wants, at the given price, if she can afford to. Our objective is to help the seller price the products to maximize her profit. This problem is called {\em graph vertex pricing} ({\sf GVP}) problem and has resisted several recent attempts despite its current simple solution. This motivates the study of this problem on special classes of graphs. In this paper, we study this problem on a large class of graphs such as graphs with bounded treewidth, bounded genus and $k$-partite graphs. We show that there exists an {\sf FPTAS} for {\sf GVP} on graphs with bounded treewidth. This result is also extended to an {\sf FPTAS} for the more general {\em single-minded pricing} problem. On bounded genus graphs we present a {\sf PTAS} and show that {\sf GVP} is {\sf NP}-hard even on planar graphs. We study the Sherali-Adams hierarchy applied to a natural Integer Program formulation that $(1+\epsilon)$-approximates the optimal solution of {\sf GVP}. Sherali-Adams hierarchy has gained much interest recently as a possible approach to develop new approximation algorithms. We show that, when the input graph has bounded treewidth or bounded genus, applying a constant number of rounds of Sherali-Adams hierarchy makes the integrality gap of this natural {\sf LP} arbitrarily small, thus giving a $(1+\epsilon)$-approximate solution to the original {\sf GVP} instance. On $k$-partite graphs, we present a constant-factor approximation algorithm. We further improve the approximation factors for paths, cycles and graphs with degree at most three.
[ { "version": "v1", "created": "Thu, 8 Mar 2012 21:42:51 GMT" }, { "version": "v2", "created": "Tue, 12 Nov 2013 07:17:50 GMT" } ]
2013-11-13T00:00:00
[ [ "Chalermsook", "Parinya", "" ], [ "Kintali", "Shiva", "" ], [ "Lipton", "Richard", "" ], [ "Nanongkai", "Danupon", "" ] ]
new_dataset
0.968457
1307.5410
Michael Rodler
Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger
ANANAS - A Framework For Analyzing Android Applications
Paper accepted at First Int. Workshop on Emerging Cyberthreats and Countermeasures ECTCM 2013
null
10.1109/ARES.2013.93
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Android is an open software platform for mobile devices with a large market share in the smartphone sector. The openness of the system as well as its wide adoption lead to an increasing amount of malware developed for this platform. ANANAS is an expandable and modular framework for analyzing Android applications. It takes care of common needs for dynamic malware analysis and provides an interface for the development of plugins. Adaptability and expandability have been main design goals during the development process. An abstraction layer for simple user interaction and phone event simulation is also part of the framework. It allows an analyst to script the required user simulation or phone events on demand or adjust the simulation to his needs. Six plugins have been developed for ANANAS. They represent well known techniques for malware analysis, such as system call hooking and network traffic analysis. The focus clearly lies on dynamic analysis, as five of the six plugins are dynamic analysis methods.
[ { "version": "v1", "created": "Sat, 20 Jul 2013 11:44:40 GMT" } ]
2013-11-13T00:00:00
[ [ "Eder", "Thomas", "" ], [ "Rodler", "Michael", "" ], [ "Vymazal", "Dieter", "" ], [ "Zeilinger", "Markus", "" ] ]
new_dataset
0.999304
1307.8037
L\'aszl\'o V\'egh
Nikhil R. Devanur and Jugal Garg and L\'aszl\'o A. V\'egh
A Rational Convex Program for Linear Arrow-Debreu Markets
null
null
null
null
cs.DS cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a new, flow-type convex program describing equilibrium solutions to linear Arrow-Debreu markets. Whereas convex formulations were previously known [Nenakov, Primak 83; Jain 07; Cornet '89], our program exhibits several new features. It gives a simple necessary and sufficient condition and a concise proof of the existence and rationality of equilibria, settling an open question raised by Vazirani. As a consequence we also obtain a simple new proof of Mertens's result that the equilibrium prices form a convex polyhedral set.
[ { "version": "v1", "created": "Tue, 30 Jul 2013 16:42:45 GMT" }, { "version": "v2", "created": "Tue, 12 Nov 2013 16:44:29 GMT" } ]
2013-11-13T00:00:00
[ [ "Devanur", "Nikhil R.", "" ], [ "Garg", "Jugal", "" ], [ "Végh", "László A.", "" ] ]
new_dataset
0.978594
1311.2637
Jos\'e Andr\'es Armario
Jos\'e Andr\'es Armario and Mar\'ia Dolores Frau
Self-Dual codes from $(-1,1)$-matrices of skew symmetric type
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previously, self-dual codes have been constructed from weighing matrices, and in particular from conference matrices (skew and symmetric). In this paper, codes constructed from matrices of skew symmetric type whose determinants reach the Ehlich-Wojtas' bound are presented. A necessary and sufficient condition for these codes to be self-dual is given, and examples are provided for lengths up to 52.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 22:38:10 GMT" } ]
2013-11-13T00:00:00
[ [ "Armario", "José Andrés", "" ], [ "Frau", "María Dolores", "" ] ]
new_dataset
0.998979
1311.2702
Tobias Kuhn
Tobias Kuhn, Alexandre Bergel
Verifiable Source Code Documentation in Controlled Natural Language
null
null
null
null
cs.SE cs.AI cs.CL cs.HC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Writing documentation about software internals is rarely considered a rewarding activity. It is highly time-consuming and the resulting documentation is fragile when the software is continuously evolving in a multi-developer setting. Unfortunately, traditional programming environments poorly support the writing and maintenance of documentation. Consequences are severe as the lack of documentation on software structure negatively impacts the overall quality of the software product. We show that using a controlled natural language with a reasoner and a query engine is a viable technique for verifying the consistency and accuracy of documentation and source code. Using ACE, a state-of-the-art controlled natural language, we present positive results on the comprehensibility and the general feasibility of creating and verifying documentation. As a case study, we used automatic documentation verification to identify and fix severe flaws in the architecture of a non-trivial piece of software. Moreover, a user experiment shows that our language is faster and easier to learn and understand than other formal languages for software documentation.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 07:44:10 GMT" } ]
2013-11-13T00:00:00
[ [ "Kuhn", "Tobias", "" ], [ "Bergel", "Alexandre", "" ] ]
new_dataset
0.974389
1311.2705
Lingfei Jin
Lingfei Jin
Quantum Stabilizer Codes from Maximal Curves
null
null
10.1109/TIT.2013.2287694
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A curve attaining the Hasse-Weil bound is called a maximal curve. Usually classical error-correcting codes obtained from a maximal curve have good parameters. However, the quantum stabilizer codes obtained from such classical error-correcting codes via Euclidean or Hermitian self-orthogonality do not always possess good parameters. In this paper, the Hermitian self-orthogonality of algebraic geometry codes obtained from two maximal curves is investigated. It turns out that the stabilizer quantum codes produced from such Hermitian self-orthogonal classical codes have good parameters.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 07:52:53 GMT" } ]
2013-11-13T00:00:00
[ [ "Jin", "Lingfei", "" ] ]
new_dataset
0.999686
1205.4778
Matthias W\"ahlisch
Matthias W\"ahlisch, Thomas C. Schmidt, Markus Vahlenkamp
Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking
15 pages
Computer Networks, Vol. 57, No. 16, pp. 3192-3206, Elsevier, Nov. 2013
10.1016/j.comnet.2013.07.009
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information-centric networking proposals attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating threats from unwanted traffic at an end host as are common in today's Internet. However, current approaches to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, threats to the stability and security of the content distribution system are analyzed in theory and practical experiments. We derive relations between state resources and the performance of routers and demonstrate how this coupling can be misused in practice. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.
[ { "version": "v1", "created": "Tue, 22 May 2012 00:24:13 GMT" }, { "version": "v2", "created": "Sun, 2 Sep 2012 22:22:41 GMT" } ]
2013-11-12T00:00:00
[ [ "Wählisch", "Matthias", "" ], [ "Schmidt", "Thomas C.", "" ], [ "Vahlenkamp", "Markus", "" ] ]
new_dataset
0.999433
1310.1042
Jan Mazak
Edita M\'a\v{c}ajov\'a and J\'an Maz\'ak
Cubic graphs with large circumference deficit
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The circumference $c(G)$ of a graph $G$ is the length of a longest cycle. By exploiting our recent results on resistance of snarks, we construct infinite classes of cyclically $4$-, $5$- and $6$-edge-connected cubic graphs with circumference ratio $c(G)/|V(G)|$ bounded from above by $0.876$, $0.960$ and $0.990$, respectively. In contrast, the dominating cycle conjecture implies that the circumference ratio of a cyclically $4$-edge-connected cubic graph is at least $0.75$. In addition, we construct snarks with large girth and large circumference deficit, solving Problem 1 proposed in [J. H\"agglund and K. Markstr\"om, On stable cycles and cycle double covers of graphs with large circumference, Disc. Math. 312 (2012), 2540--2544].
[ { "version": "v1", "created": "Thu, 3 Oct 2013 17:56:39 GMT" }, { "version": "v2", "created": "Sat, 9 Nov 2013 22:58:44 GMT" } ]
2013-11-12T00:00:00
[ [ "Máčajová", "Edita", "" ], [ "Mazák", "Ján", "" ] ]
new_dataset
0.990434
1311.1895
Jaechang Nam
Jaechang Nam and Ning Chen
Mining Crash Fix Patterns
7 pages, 9 figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During the life cycle of software development, developers have to fix different kinds of bugs reported by testers or end users. The efficiency and effectiveness of fixing bugs have a huge impact on the reliability of the software as well as the productivity of the development team. Software companies usually spend a large amount of money and human resources on the testing and bug fixing departments. As a result, a better and more reliable way to fix bugs is highly desired by them. In order to achieve such goal, in depth studies on the characteristics of bug fixes from well maintained, highly popular software projects are necessary. In this paper, we study the bug fixing histories extracted from the Eclipse project, a well maintained, highly popular open source project. After analyzing more than 36,000 bugs that belongs to three major kinds of exception types, we are able to reveal some common fix types that are frequently used to fix certain kinds of program exceptions. Our analysis shows that almost all of the exceptions that belong to a certain exception can be fixed by less than ten fix types. Our result implies that most of the bugs in software projects can be and should be fixed by only a few common fix patterns.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 08:18:23 GMT" }, { "version": "v2", "created": "Mon, 11 Nov 2013 02:19:03 GMT" } ]
2013-11-12T00:00:00
[ [ "Nam", "Jaechang", "" ], [ "Chen", "Ning", "" ] ]
new_dataset
0.98368
1311.2364
Ghassan Samara
Ghassan Samara, Amer O Abu Salem, Tareq Alhmiedat
Power Control Protocols in VANET
6 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 06:44:16 GMT" } ]
2013-11-12T00:00:00
[ [ "Samara", "Ghassan", "" ], [ "Salem", "Amer O Abu", "" ], [ "Alhmiedat", "Tareq", "" ] ]
new_dataset
0.973862
1311.2412
Greg Wilson
Marian Petre, Greg Wilson
PLOS/Mozilla Scientific Code Review Pilot: Summary of Findings
5 pages
null
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
PLOS and Mozilla conducted a month-long pilot study in which professional developers performed code reviews on software associated with papers published in PLOS Computational Biology. While the developers felt the reviews were limited by (a) lack of familiarity with the domain and (b) lack of two-way contact with authors, the scientists appreciated the reviews, and both sides were enthusiastic about repeating the experiment.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 10:42:35 GMT" } ]
2013-11-12T00:00:00
[ [ "Petre", "Marian", "" ], [ "Wilson", "Greg", "" ] ]
new_dataset
0.999556
1311.2442
Marco Bonola
Giuseppe Bianchi, Marco Bonola, Giulio Picierro, Salvatore Pontarelli, Marco Monaci
StreaMon: a data-plane programming abstraction for Software-defined Stream Monitoring
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fast evolving nature of modern cyber threats and network monitoring needs calls for new, "software-defined", approaches to simplify and quicken programming and deployment of online (stream-based) traffic analysis functions. StreaMon is a carefully designed data-plane abstraction devised to scalably decouple the "programming logic" of a traffic analysis application (tracked states, features, anomaly conditions, etc.) from elementary primitives (counting and metering, matching, events generation, etc), efficiently pre-implemented in the probes, and used as common instruction set for supporting the desired logic. Multi-stage multi-step real-time tracking and detection algorithms are supported via the ability to deploy custom states, relevant state transitions, and associated monitoring actions and triggering conditions. Such a separation entails platform-independent, portable, online traffic analysis tasks written in a high level language, without requiring developers to access the monitoring device internals and program their custom monitoring logic via low level compiled languages (e.g., C, assembly, VHDL). We validate our design by developing a prototype and a set of simple (but functionally demanding) use-case applications and by testing them over real traffic traces.
[ { "version": "v1", "created": "Mon, 11 Nov 2013 13:55:15 GMT" } ]
2013-11-12T00:00:00
[ [ "Bianchi", "Giuseppe", "" ], [ "Bonola", "Marco", "" ], [ "Picierro", "Giulio", "" ], [ "Pontarelli", "Salvatore", "" ], [ "Monaci", "Marco", "" ] ]
new_dataset
0.996228
1302.6557
Richard M Jiang
Richard M Jiang
Geodesic-based Salient Object Detection
The manuscript was submitted to a conference. Due to anonymous review policy by the conference, I'd like to withdraw it temporarily
This is a revised version of our submissions to CVPR 2012, SIGRAPH Asia 2012, and CVPR 2013;
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency detection has been an intuitive way to provide useful cues for object detection and segmentation, as desired for many vision and graphics applications. In this paper, we provided a robust method for salient object detection and segmentation. Other than using various pixel-level contrast definitions, we exploited global image structures and proposed a new geodesic method dedicated for salient object detection. In the proposed approach, a new geodesic scheme, namely geodesic tunneling is proposed to tackle with textures and local chaotic structures. With our new geodesic approach, a geodesic saliency map is estimated in correspondence to spatial structures in an image. Experimental evaluation on a salient object benchmark dataset validated that our algorithm consistently outperformed a number of the state-of-art saliency methods, yielding higher precision and better recall rates. With the robust saliency estimation, we also present an unsupervised hierarchical salient object cut scheme simply using adaptive saliency thresholding, which attained the highest score in our F-measure test. We also applied our geodesic cut scheme to a number of image editing tasks as demonstrated in additional experiments.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 19:52:02 GMT" }, { "version": "v2", "created": "Fri, 23 Aug 2013 18:41:55 GMT" } ]
2013-11-11T00:00:00
[ [ "Jiang", "Richard M", "" ] ]
new_dataset
0.999592
1310.7159
Abdulla Eid
Abdulla Eid and Iwan Duursma
Using concatenated algebraic geometry codes in channel polarization
8 pages, 6 figures
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes were introduced by Arikan in 2008 and are the first family of error-correcting codes achieving the symmetric capacity of an arbitrary binary-input discrete memoryless channel under low complexity encoding and using an efficient successive cancellation decoding strategy. Recently, non-binary polar codes have been studied, in which one can use different algebraic geometry codes to achieve better error decoding probability. In this paper, we study the performance of binary polar codes that are obtained from non-binary algebraic geometry codes using concatenation. For binary polar codes (i.e. binary kernels) of a given length $n$, we compare numerically the use of short algebraic geometry codes over large fields versus long algebraic geometry codes over small fields. We find that for each $n$ there is an optimal choice. For binary kernels of size up to $n \leq 1,800$ a concatenated Reed-Solomon code outperforms other choices. For larger kernel sizes concatenated Hermitian codes or Suzuki codes will do better.
[ { "version": "v1", "created": "Sun, 27 Oct 2013 04:39:09 GMT" } ]
2013-11-11T00:00:00
[ [ "Eid", "Abdulla", "" ], [ "Duursma", "Iwan", "" ] ]
new_dataset
0.998579
1311.1859
Nathan Lindzey
Benson Joeris, Nathan Lindzey, Ross M. McConnell, Nissa Osheim
Simple DFS on the Complement of a Graph and on Partially Complemented Digraphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complementation operation on a vertex of a digraph changes all outgoing arcs into non-arcs, and outgoing non-arcs into arcs. A partially complemented digraph $\widetilde{G}$ is a digraph obtained from a sequence of vertex complement operations on $G$. Dahlhaus et al. showed that, given an adjacency-list representation of $\widetilde{G}$, depth-first search (DFS) on $G$ can be performed in $O(n + \widetilde{m})$ time, where $n$ is the number of vertices and $\widetilde{m}$ is the number of edges in $\widetilde{G}$. To achieve this bound, their algorithm makes use of a somewhat complicated stack-like data structure to simulate the recursion stack, instead of implementing it directly as a recursive algorithm. We give a recursive $O(n+\widetilde{m})$ algorithm that uses no complicated data-structures.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 01:08:10 GMT" } ]
2013-11-11T00:00:00
[ [ "Joeris", "Benson", "" ], [ "Lindzey", "Nathan", "" ], [ "McConnell", "Ross M.", "" ], [ "Osheim", "Nissa", "" ] ]
new_dataset
0.976181
1311.1935
Serge Smidtas
Serge Smidtas, Magalie Peyrot
Unsupervised learning human's activities by overexpressed recognized non-speech sounds
null
null
null
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human activity and environment produces sounds such as, at home, the noise produced by water, cough, or television. These sounds can be used to determine the activity in the environment. The objective is to monitor a person's activity or determine his environment using a single low cost microphone by sound analysis. The purpose is to adapt programs to the activity or environment or detect abnormal situations. Some patterns of over expressed repeatedly in the sequences of recognized sounds inter and intra environment allow to characterize activities such as the entrance of a person in the house, or a tv program watched. We first manually annotated 1500 sounds of daily life activity of old persons living at home recognized sounds. Then we inferred an ontology and enriched the database of annotation with a crowed sourced manual annotation of 7500 sounds to help with the annotation of the most frequent sounds. Using learning sound algorithms, we defined 50 types of the most frequent sounds. We used this set of recognizable sounds as a base to tag sounds and put tags on them. By using over expressed number of motifs of sequences of the tags, we were able to categorize using only a single low-cost microphone, complex activities of daily life of a persona at home as watching TV, entrance in the apartment of a person, or phone conversation including detecting unknown activities as repeated tasks performed by users.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 11:18:42 GMT" } ]
2013-11-11T00:00:00
[ [ "Smidtas", "Serge", "" ], [ "Peyrot", "Magalie", "" ] ]
new_dataset
0.970602
1311.1976
Otfried Cheong
Otfried Cheong, Sariel Har-Peled, Heuna Kim, Hyo-Sil Kim
On the Number of Edges of Fan-Crossing Free Graphs
null
null
null
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph drawn in the plane with n vertices is k-fan-crossing free for k > 1 if there are no k+1 edges $g,e_1,...e_k$, such that $e_1,e_2,...e_k$ have a common endpoint and $g$ crosses all $e_i$. We prove a tight bound of 4n-8 on the maximum number of edges of a 2-fan-crossing free graph, and a tight 4n-9 bound for a straight-edge drawing. For k > 2, we prove an upper bound of 3(k-1)(n-2) edges. We also discuss generalizations to monotone graph properties.
[ { "version": "v1", "created": "Fri, 8 Nov 2013 14:16:56 GMT" } ]
2013-11-11T00:00:00
[ [ "Cheong", "Otfried", "" ], [ "Har-Peled", "Sariel", "" ], [ "Kim", "Heuna", "" ], [ "Kim", "Hyo-Sil", "" ] ]
new_dataset
0.991765
1311.1700
Ankit Chadha Mr.
Ankit Chadha, Neha Satam, Rakshak Sood and Dattatray Bade
Image Steganography using Karhunen-Loeve Transform and Least Bit Substitution
null
International Journal of Computer Applications 79(9):31-37, October 2013
10.5120/13771-1628 10.5120/13771-1628 10.5120/13771-1628
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As communication channels are increasing in number, reliability of faithful communication is reducing. Hacking and tempering of data are two major issues for which security should be provided by channel. This raises the importance of steganography. In this paper, a novel method to encode the message information inside a carrier image has been described. It uses Karhunen-Lo\`eve Transform for compression of data and Least Bit Substitution for data encryption. Compression removes redundancy and thus also provides encoding to a level. It is taken further by means of Least Bit Substitution. The algorithm used for this purpose uses pixel matrix which serves as a best tool to work on. Three different sets of images were used with three different numbers of bits to be substituted by message information. The experimental results show that algorithm is time efficient and provides high data capacity. Further, it can decrypt the original data effectively. Parameters such as carrier error and message error were calculated for each set and were compared for performance analysis.
[ { "version": "v1", "created": "Thu, 7 Nov 2013 14:45:30 GMT" } ]
2013-11-08T00:00:00
[ [ "Chadha", "Ankit", "" ], [ "Satam", "Neha", "" ], [ "Sood", "Rakshak", "" ], [ "Bade", "Dattatray", "" ] ]
new_dataset
0.990943
1301.7693
Itzhak Tamo
Itzhak Tamo, Dimitris S. Papailiopoulos, Alexandros G. Dimakis
Optimal Locally Repairable Codes and Connections to Matroid Theory
Submitted for publication, a shorter version was presented at ISIT 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Petabyte-scale distributed storage systems are currently transitioning to erasure codes to achieve higher storage efficiency. Classical codes like Reed-Solomon are highly sub-optimal for distributed environments due to their high overhead in single-failure events. Locally Repairable Codes (LRCs) form a new family of codes that are repair efficient. In particular, LRCs minimize the number of nodes participating in single node repairs during which they generate small network traffic. Two large-scale distributed storage systems have already implemented different types of LRCs: Windows Azure Storage and the Hadoop Distributed File System RAID used by Facebook. The fundamental bounds for LRCs, namely the best possible distance for a given code locality, were recently discovered, but few explicit constructions exist. In this work, we present an explicit and optimal LRCs that are simple to construct. Our construction is based on grouping Reed-Solomon (RS) coded symbols to obtain RS coded symbols over a larger finite field. We then partition these RS symbols in small groups, and re-encode them using a simple local code that offers low repair locality. For the analysis of the optimality of the code, we derive a new result on the matroid represented by the code generator matrix.
[ { "version": "v1", "created": "Thu, 31 Jan 2013 17:23:10 GMT" }, { "version": "v2", "created": "Fri, 1 Feb 2013 07:27:31 GMT" }, { "version": "v3", "created": "Wed, 6 Nov 2013 16:04:30 GMT" } ]
2013-11-07T00:00:00
[ [ "Tamo", "Itzhak", "" ], [ "Papailiopoulos", "Dimitris S.", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
new_dataset
0.999148
1306.4552
Magnus Sandell
Magnus Sandell, Filippo Tosato
A Novel Lowest Density MDS Array Code
Withdrawn by the author due to a major revision
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a novel MDS array code with lowest density. In contrast to existing codes, this one has no restrictions on the size or the number of erasures it can correct. It is based on a simple matrix construction involving totally nonsingular matrices. We also introduce a simple decoding algorithm based on the structure of the code.
[ { "version": "v1", "created": "Wed, 19 Jun 2013 13:58:11 GMT" }, { "version": "v2", "created": "Tue, 17 Sep 2013 09:00:06 GMT" }, { "version": "v3", "created": "Wed, 6 Nov 2013 13:44:44 GMT" } ]
2013-11-07T00:00:00
[ [ "Sandell", "Magnus", "" ], [ "Tosato", "Filippo", "" ] ]
new_dataset
0.998077
1310.3695
Magnus Sandell
Magnus Sandell, Filippo Tosato
Lowest Density MDS Array Codes for Reliable Smart Meter Networks
30 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a lowest density MDS array code which is applied to a Smart Meter network to introduce reliability. By treating the network as distributed storage with multiple sources, information can be exchanged between the nodes in the network allowing each node to store parity symbols relating to data from other nodes. A lowest density MDS array code is then applied to make the network robust against outages, ensuring low overhead and data transfers. We show the minimum amount of overhead required to be able to recover from r node erasures in an n node network and explicitly design an optimal array code with lowest density. In contrast to existing codes, this one has no restrictions on the number of nodes or erasures it can correct. Furthermore we consider incomplete networks where all nodes are not connected to each other. This limits the exchange of data for purposes of redundancy and we derive conditions on the minimum node degree that allow lowest density MDS codes to exist. We also present an explicit code design for incomplete networks that is capable of correcting two node failures.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 14:33:17 GMT" }, { "version": "v2", "created": "Wed, 6 Nov 2013 13:43:56 GMT" } ]
2013-11-07T00:00:00
[ [ "Sandell", "Magnus", "" ], [ "Tosato", "Filippo", "" ] ]
new_dataset
0.998912
1310.3770
William Devanny
Michael J. Bannister, William E. Devanny, David Eppstein
Small Superpatterns for Dominance Drawing
ANALCO 2014, This version fixes an error in the leading constant of the 321-superpattern size
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We exploit the connection between dominance drawings of directed acyclic graphs and permutations, in both directions, to provide improved bounds on the size of universal point sets for certain types of dominance drawing and on superpatterns for certain natural classes of permutations. In particular we show that there exist universal point sets for dominance drawings of the Hasse diagrams of width-two partial orders of size O(n^{3/2}), universal point sets for dominance drawings of st-outerplanar graphs of size O(n\log n), and universal point sets for dominance drawings of directed trees of size O(n^2). We show that 321-avoiding permutations have superpatterns of size O(n^{3/2}), riffle permutations (321-, 2143-, and 2413-avoiding permutations) have superpatterns of size O(n), and the concatenations of sequences of riffles and their inverses have superpatterns of size O(n\log n). Our analysis includes a calculation of the leading constants in these bounds.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 18:30:22 GMT" }, { "version": "v2", "created": "Tue, 5 Nov 2013 21:21:51 GMT" } ]
2013-11-07T00:00:00
[ [ "Bannister", "Michael J.", "" ], [ "Devanny", "William E.", "" ], [ "Eppstein", "David", "" ] ]
new_dataset
0.998605
1311.0841
L\'aszl\'o Dobos
L\'aszl\'o Dobos, J\'anos Sz\"ule, Tam\'as Bodn\'ar, Tam\'as Hanyecz, Tam\'as Seb\H{o}k, D\'aniel Kondor, Zs\'ofia Kallus, J\'ozsef St\'eger, Istv\'an Csabai and G\'abor Vattay
A multi-terabyte relational database for geo-tagged social network data
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite their relatively low sampling factor, the freely available, randomly sampled status streams of Twitter are very useful sources of geographically embedded social network data. To statistically analyze the information Twitter provides via these streams, we have collected a year's worth of data and built a multi-terabyte relational database from it. The database is designed for fast data loading and to support a wide range of studies focusing on the statistics and geographic features of social networks, as well as on the linguistic analysis of tweets. In this paper we present the method of data collection, the database design, the data loading procedure and special treatment of geo-tagged and multi-lingual data. We also provide some SQL recipes for computing network statistics.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 20:39:16 GMT" }, { "version": "v2", "created": "Tue, 5 Nov 2013 19:26:29 GMT" } ]
2013-11-06T00:00:00
[ [ "Dobos", "László", "" ], [ "Szüle", "János", "" ], [ "Bodnár", "Tamás", "" ], [ "Hanyecz", "Tamás", "" ], [ "Sebők", "Tamás", "" ], [ "Kondor", "Dániel", "" ], [ "Kallus", "Zsófia", "" ], [ "Stéger", "József", "" ], [ "Csabai", "István", "" ], [ "Vattay", "Gábor", "" ] ]
new_dataset
0.981265
1311.1090
Daniel Crespin Mr
Daniel Crespin
Polyhedrons and Perceptrons Are Functionally Equivalent
17 pages, 0 figures
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mathematical definitions of polyhedrons and perceptron networks are discussed. The formalization of polyhedrons is done in a rather traditional way. For networks, previously proposed systems are developed. Perceptron networks in disjunctive normal form (DNF) and conjunctive normal forms (CNF) are introduced. The main theme is that single output perceptron neural networks and characteristic functions of polyhedrons are one and the same class of functions. A rigorous formulation and proof that three layers suffice is obtained. The various constructions and results are among several steps required for algorithms that replace incremental and statistical learning with more efficient, direct and exact geometric methods for calculation of perceptron architecture and weights.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 15:33:30 GMT" } ]
2013-11-06T00:00:00
[ [ "Crespin", "Daniel", "" ] ]
new_dataset
0.995202
1311.1132
Jalaluddin Qureshi
Hamed Ketabdar, Jalaluddin Qureshi, Pan Hui
Motion and audio analysis in mobile devices for remote monitoring of physical activities and user authentication
null
Journal of Location Based Services, Volume 5, Issue 3-4, 2011, pp. 180-200, Special Issue: The social and behavioural implications of location-based services
10.1080/17489725.2011.644331
null
cs.HC cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this article we propose the use of accelerometer embedded by default in smartphone as a cost-effective, reliable and efficient way to provide remote physical activity monitoring for the elderly and people requiring healthcare service. Mobile phones are regularly carried by users during their day-to-day work routine, physical movement information can be captured by the mobile phone accelerometer, processed and sent to a remote server for monitoring. The acceleration pattern can deliver information related to the pattern of physical activities the user is engaged in. We further show how this technique can be extended to provide implicit real-time security by analysing unexpected movements captured by the phone accelerometer, and automatically locking the phone in such situation to prevent unauthorised access. This technique is also shown to provide implicit continuous user authentication, by capturing regular user movements such as walking, and requesting for re-authentication whenever it detects a non-regular movement.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 17:30:17 GMT" } ]
2013-11-06T00:00:00
[ [ "Ketabdar", "Hamed", "" ], [ "Qureshi", "Jalaluddin", "" ], [ "Hui", "Pan", "" ] ]
new_dataset
0.997291
1205.6406
Christine Bachoc
Christine Bachoc (IMB), Alberto Passuello (IMB), Frank Vallentin (TWA)
Bounds for projective codes from semidefinite programming
null
Advances in mathematics of communications 7, 2 (2013) 127-145
10.3934/amc.2013.7.127
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply the semidefinite programming method to derive bounds for projective codes over a finite field.
[ { "version": "v1", "created": "Tue, 29 May 2012 16:03:50 GMT" }, { "version": "v2", "created": "Wed, 24 Apr 2013 06:49:35 GMT" } ]
2013-11-05T00:00:00
[ [ "Bachoc", "Christine", "", "IMB" ], [ "Passuello", "Alberto", "", "IMB" ], [ "Vallentin", "Frank", "", "TWA" ] ]
new_dataset
0.981379
1212.0616
Mate Boban
Mate Boban, Rui Meireles, Joao Barros, Peter Steenkiste, Ozan K. Tonguz
TVR - Tall Vehicle Relaying in Vehicular Networks
null
null
10.1109/TMC.2013.70
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicle-to-Vehicle (V2V) communication is a core technology for enabling safety and non-safety applications in next generation Intelligent Transportation Systems. Due to relatively low heights of the antennas, V2V communication is often influenced by topographic features, man-made structures, and other vehicles located between the communicating vehicles. On highways, it was shown experimentally that vehicles can obstruct the line of sight (LOS) communication up to 50 percent of the time; furthermore, a single obstructing vehicle can reduce the power at the receiver by more than 20 dB. Based on both experimental measurements and simulations performed using a validated channel model, we show that the elevated position of antennas on tall vehicles improves communication performance. Tall vehicles can significantly increase the effective communication range, with an improvement of up to 50 percent in certain scenarios. Using these findings, we propose a new V2V relaying scheme called Tall Vehicle Relaying (TVR) that takes advantage of better channel characteristics provided by tall vehicles. TVR distinguishes between tall and short vehicles and, where appropriate, chooses tall vehicles as next hop relays. We investigate TVR's system-level performance through a combination of link-level experiments and system-level simulations and show that it outperforms existing techniques.
[ { "version": "v1", "created": "Tue, 4 Dec 2012 05:12:59 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 17:18:23 GMT" } ]
2013-11-05T00:00:00
[ [ "Boban", "Mate", "" ], [ "Meireles", "Rui", "" ], [ "Barros", "Joao", "" ], [ "Steenkiste", "Peter", "" ], [ "Tonguz", "Ozan K.", "" ] ]
new_dataset
0.998957
1306.0811
Giovanni Zappella
Nicol\`o Cesa-Bianchi, Claudio Gentile and Giovanni Zappella
A Gang of Bandits
NIPS 2013
null
null
null
cs.LG cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-armed bandit problems are receiving a great deal of attention because they adequately formalize the exploration-exploitation trade-offs arising in several industrially relevant applications, such as online advertisement and, more generally, recommendation systems. In many cases, however, these applications have a strong social component, whose integration in the bandit algorithm could lead to a dramatic performance increase. For instance, we may want to serve content to a group of users by taking advantage of an underlying network of social relationships among them. In this paper, we introduce novel algorithmic approaches to the solution of such networked bandit problems. More specifically, we design and analyze a global strategy which allocates a bandit algorithm to each network node (user) and allows it to "share" signals (contexts and payoffs) with the neghboring nodes. We then derive two more scalable variants of this strategy based on different ways of clustering the graph nodes. We experimentally compare the algorithm and its variants to state-of-the-art methods for contextual bandits that do not use the relational information. Our experiments, carried out on synthetic and real-world datasets, show a marked increase in prediction performance obtained by exploiting the network structure.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 14:24:31 GMT" }, { "version": "v2", "created": "Fri, 25 Oct 2013 16:32:25 GMT" }, { "version": "v3", "created": "Mon, 4 Nov 2013 10:07:42 GMT" } ]
2013-11-05T00:00:00
[ [ "Cesa-Bianchi", "Nicolò", "" ], [ "Gentile", "Claudio", "" ], [ "Zappella", "Giovanni", "" ] ]
new_dataset
0.995996
1307.1739
Xin Zhao
Xin Zhao and Arie Kaufman
Anatomical Feature-guided Volumeric Registration of Multimodal Prostate MRI
This paper has been withdrawn by the author due to publication
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radiological imaging of prostate is becoming more popular among researchers and clinicians in searching for diseases, primarily cancer. Scans might be acquired at different times, with patient movement between scans, or with different equipment, resulting in multiple datasets that need to be registered. For this issue, we introduce a registration method using anatomical feature-guided mutual information. Prostate scans of the same patient taken in three different orientations are first aligned for the accurate detection of anatomical features in 3D. Then, our pipeline allows for multiple modalities registration through the use of anatomical features, such as the interior urethra of prostate and gland utricle, in a bijective way. The novelty of this approach is the application of anatomical features as the pre-specified corresponding landmarks for prostate registration. We evaluate the registration results through both artificial and clinical datasets. Registration accuracy is evaluated by performing statistical analysis of local intensity differences or spatial differences of anatomical landmarks between various MR datasets. Evaluation results demonstrate that our method statistics-significantly improves the quality of registration. Although this strategy is tested for MRI-guided brachytherapy, the preliminary results from these experiments suggest that it can be also applied to other settings such as transrectal ultrasound-guided or CT-guided therapy, where the integration of preoperative MRI may have a significant impact upon treatment planning and guidance.
[ { "version": "v1", "created": "Sat, 6 Jul 2013 00:30:40 GMT" }, { "version": "v2", "created": "Sun, 3 Nov 2013 21:38:08 GMT" } ]
2013-11-05T00:00:00
[ [ "Zhao", "Xin", "" ], [ "Kaufman", "Arie", "" ] ]
new_dataset
0.979986
1311.0461
Krishna Kaipa
Krishna Kaipa
An asymptotic formula in q for the number of [n,k] q-ary MDS codes
null
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We obtain an asymptotic formula in q for the number of MDS codes of length n and dimension k over a finite field with q elements.
[ { "version": "v1", "created": "Sun, 3 Nov 2013 12:50:03 GMT" } ]
2013-11-05T00:00:00
[ [ "Kaipa", "Krishna", "" ] ]
new_dataset
0.999524
1311.0787
Jaume Barcelo
Jaume Barcelo, Azadeh Faridi, Boris Bellalta, Gabriel Martorell, and David Malone
On the Distributed Construction of a Collision-Free Schedule in WLANs
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless local area networks (WLANs), a media access protocol arbitrates access to the channel. In current IEEE 802.11 WLANs, carrier sense multiple access with collision avoidance (CSMA/CA) is used. Carrier sense multiple access with enhanced collision avoidance (CSMA/ECA) is a subtle variant of the well-known CSMA/CA algorithm that offers substantial performance benefits. CSMA/ECA significantly reduces the collision probability and, under certain conditions, leads to a completely collision-free schedule. The only difference between CSMA/CA and CSMA/ECA is that the latter uses a deterministic backoff after successful transmissions. This deterministic backoff is a constant and is the same for all the stations. The first part of the paper is of tutorial nature, offering an introduction to the basic operation of CSMA/ECA and describing the benefits of this approach in a qualitative manner. The second part of the paper surveys related contributions, briefly summarizing the main challenges and potential solutions, and also introducing variants and derivatives of CSMA/ECA.
[ { "version": "v1", "created": "Mon, 4 Nov 2013 17:42:09 GMT" } ]
2013-11-05T00:00:00
[ [ "Barcelo", "Jaume", "" ], [ "Faridi", "Azadeh", "" ], [ "Bellalta", "Boris", "" ], [ "Martorell", "Gabriel", "" ], [ "Malone", "David", "" ] ]
new_dataset
0.992207
0804.3215
Martin Reisslein
Matthias an der Heiden, Michel Sortais, Michael Scheutzow, Martin Reisslein, and Martin Maier
Multicast Capacity of Optical WDM Packet Ring for Hotspot Traffic
null
null
10.1016/j.osn.2011.05.002
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Packet-switching WDM ring networks with a hotspot transporting unicast, multicast, and broadcast traffic are important components of high-speed metropolitan area networks. For an arbitrary multicast fanout traffic model with uniform, hotspot destination, and hotspot source packet traffic, we analyze the maximum achievable long-run average packet throughput, which we refer to as \textit{multicast capacity}, of bi-directional shortest-path routed WDM rings. We identify three segments that can experience the maximum utilization, and thus, limit the multicast capacity. We characterize the segment utilization probabilities through bounds and approximations, which we verify through simulations. We discover that shortest-path routing can lead to utilization probabilities above one half for moderate to large portions of hotspot source multi- and broadcast traffic, and consequently multicast capacities of less than two simultaneous packet transmissions. We outline a one-copy routing strategy that guarantees a multicast capacity of at least two simultaneous packet transmissions for arbitrary hotspot source traffic.
[ { "version": "v1", "created": "Sun, 20 Apr 2008 20:52:11 GMT" } ]
2013-11-04T00:00:00
[ [ "der Heiden", "Matthias an", "" ], [ "Sortais", "Michel", "" ], [ "Scheutzow", "Michael", "" ], [ "Reisslein", "Martin", "" ], [ "Maier", "Martin", "" ] ]
new_dataset
0.999226
1209.0654
Laurent Jacques
Adriana Gonzalez, Laurent Jacques, Christophe De Vleeschouwer, Philippe Antoine
Compressive Optical Deflectometric Tomography: A Constrained Total-Variation Minimization Approach
37 pages, 51 figures
null
null
null
cs.CV math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optical Deflectometric Tomography (ODT) provides an accurate characterization of transparent materials whose complex surfaces present a real challenge for manufacture and control. In ODT, the refractive index map (RIM) of a transparent object is reconstructed by measuring light deflection under multiple orientations. We show that this imaging modality can be made "compressive", i.e., a correct RIM reconstruction is achievable with far less observations than required by traditional Filtered Back Projection (FBP) methods. Assuming a cartoon-shape RIM model, this reconstruction is driven by minimizing the map Total-Variation under a fidelity constraint with the available observations. Moreover, two other realistic assumptions are added to improve the stability of our approach: the map positivity and a frontier condition. Numerically, our method relies on an accurate ODT sensing model and on a primal-dual minimization scheme, including easily the sensing operator and the proposed RIM constraints. We conclude this paper by demonstrating the power of our method on synthetic and experimental data under various compressive scenarios. In particular, the compressiveness of the stabilized ODT problem is demonstrated by observing a typical gain of 20 dB compared to FBP at only 5% of 360 incident light angles for moderately noisy sensing.
[ { "version": "v1", "created": "Tue, 4 Sep 2012 14:13:40 GMT" }, { "version": "v2", "created": "Wed, 30 Oct 2013 15:39:01 GMT" } ]
2013-10-31T00:00:00
[ [ "Gonzalez", "Adriana", "" ], [ "Jacques", "Laurent", "" ], [ "De Vleeschouwer", "Christophe", "" ], [ "Antoine", "Philippe", "" ] ]
new_dataset
0.984771
1310.8187
Cheng Bo
Cheng Bo, Xiang-Yang Li, Taeho Jung, Xufei Mao
SmartLoc: Sensing Landmarks Silently for Smartphone Based Metropolitan Localization
null
null
null
null
cs.NI cs.CY cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present \emph{SmartLoc}, a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. To minimize the negative impact of sensor noises, \emph{SmartLoc} exploits the intermittent strong GPS signals and uses the linear regression to build a prediction model which is based on the trace estimated from inertial sensors and the one computed from the GPS. Furthermore, we utilize landmarks (e.g., bridge, traffic lights) detected automatically and special driving patterns (e.g., turning, uphill, and downhill) from inertial sensory data to improve the localization accuracy when the GPS signal is weak. Our evaluations of \emph{SmartLoc} in the city demonstrates its technique viability and significant localization accuracy improvement compared with GPS and other approaches: the error is approximately 20m for 90% of time while the known mean error of GPS is 42.22m.
[ { "version": "v1", "created": "Sat, 31 Aug 2013 04:56:05 GMT" } ]
2013-10-31T00:00:00
[ [ "Bo", "Cheng", "" ], [ "Li", "Xiang-Yang", "" ], [ "Jung", "Taeho", "" ], [ "Mao", "Xufei", "" ] ]
new_dataset
0.99706
1310.8245
Akaki Mamageishvili
Akaki Mamageishvili, Matus Mihalak, and Dominik Muller
Tree Nash Equilibria in the Network Creation Game
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the network creation game with n vertices, every vertex (a player) buys a set of adjacent edges, each at a fixed amount {\alpha} > 0. It has been conjectured that for {\alpha} >= n, every Nash equilibrium is a tree, and has been confirmed for every {\alpha} >= 273n. We improve upon this bound and show that this is true for every {\alpha} >= 65n. To show this, we provide new and improved results on the local structure of Nash equilibria. Technically, we show that if there is a cycle in a Nash equilibrium, then {\alpha} < 65n. Proving this, we only consider relatively simple strategy changes of the players involved in the cycle. We further show that this simple approach cannot be used to show the desired upper bound {\alpha} < n (for which a cycle may exist), but conjecture that a slightly worse bound {\alpha} < 1.3n can be achieved with this approach. Towards this conjecture, we show that if a Nash equilibrium has a cycle of length at most 10, then indeed {\alpha} < 1.3n. We further provide experimental evidence suggesting that when the girth of a Nash equilibrium is increasing, the upper bound on {\alpha} obtained by the simple strategy changes is not increasing. To the end, we investigate the approach for a coalitional variant of Nash equilibrium, where coalitions of two players cannot collectively improve, and show that if {\alpha} >= 41n, then every such Nash equilibrium is a tree.
[ { "version": "v1", "created": "Wed, 30 Oct 2013 17:53:46 GMT" } ]
2013-10-31T00:00:00
[ [ "Mamageishvili", "Akaki", "" ], [ "Mihalak", "Matus", "" ], [ "Muller", "Dominik", "" ] ]
new_dataset
0.995155
1305.6862
Loet Leydesdorff
Loet Leydesdorff and Ping Zhou
Measuring the Knowledge-Based Economy of China in terms of Synergy among Technological, Organizational, and Geographic Attributes of Firms
accepted for publication in Scientometrics (October, 2013)
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using the possible synergy among geographic, size, and technological distributions of firms in the Orbis database, we find the greatest reduction of uncertainty at the level of the 31 provinces of China, and an additional 18.0% at the national level. Some of the coastal provinces stand out as expected, but the metropolitan areas of Beijing and Shanghai are (with Tianjan and Chonqing) most pronounced at the next-lower administrative level of (339) prefectures, since these four metropoles are administratively defined at both levels. Focusing on high- and medium-tech manufacturing, a shift toward Beijing and Shanghai is indicated, and the synergy is on average enhanced (as expected; but not for all provinces). Unfortunately, the Orbis data is incomplete since it was collected for commercial and not for administrative or governmental purposes. However, we show a methodology that can be used by others who may have access to higher-quality statistical data for the measurement.
[ { "version": "v1", "created": "Mon, 27 May 2013 13:48:14 GMT" }, { "version": "v2", "created": "Sat, 21 Sep 2013 09:48:55 GMT" }, { "version": "v3", "created": "Tue, 29 Oct 2013 14:11:57 GMT" } ]
2013-10-30T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Zhou", "Ping", "" ] ]
new_dataset
0.993197
1201.4995
Giovanni Viglietta
Giovanni Viglietta
Gaming is a hard job, but someone has to do it!
37 pages, 22 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish some general schemes relating the computational complexity of a video game to the presence of certain common elements or mechanics, such as destroyable paths, collectible items, doors opened by keys or activated by buttons or pressure plates, etc. Then we apply such "metatheorems" to several video games published between 1980 and 1998, including Pac-Man, Tron, Lode Runner, Boulder Dash, Deflektor, Mindbender, Pipe Mania, Skweek, Prince of Persia, Lemmings, Doom, Puzzle Bobble~3, and Starcraft. We obtain both new results, and improvements or alternative proofs of previously known results.
[ { "version": "v1", "created": "Tue, 24 Jan 2012 14:56:45 GMT" }, { "version": "v2", "created": "Fri, 27 Jan 2012 00:53:26 GMT" }, { "version": "v3", "created": "Wed, 14 Mar 2012 10:05:07 GMT" }, { "version": "v4", "created": "Thu, 20 Sep 2012 14:49:08 GMT" }, { "version": "v5", "created": "Mon, 28 Oct 2013 16:54:01 GMT" } ]
2013-10-29T00:00:00
[ [ "Viglietta", "Giovanni", "" ] ]
new_dataset
0.999478
1211.1680
Boris Leistedt
B. Leistedt, J. D. McEwen, P. Vandergheynst, Y. Wiaux
S2LET: A code to perform fast wavelet analysis on the sphere
8 pages, 6 figures, version accepted for publication in A&A. Code is publicly available from http://www.s2let.org
A&A 558, A128 (2013)
10.1051/0004-6361/201220729
null
cs.IT astro-ph.IM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe S2LET, a fast and robust implementation of the scale-discretised wavelet transform on the sphere. Wavelets are constructed through a tiling of the harmonic line and can be used to probe spatially localised, scale-depended features of signals on the sphere. The scale-discretised wavelet transform was developed previously and reduces to the needlet transform in the axisymmetric case. The reconstruction of a signal from its wavelets coefficients is made exact here through the use of a sampling theorem on the sphere. Moreover, a multiresolution algorithm is presented to capture all information of each wavelet scale in the minimal number of samples on the sphere. In addition S2LET supports the HEALPix pixelisation scheme, in which case the transform is not exact but nevertheless achieves good numerical accuracy. The core routines of S2LET are written in C and have interfaces in Matlab, IDL and Java. Real signals can be written to and read from FITS files and plotted as Mollweide projections. The S2LET code is made publicly available, is extensively documented, and ships with several examples in the four languages supported. At present the code is restricted to axisymmetric wavelets but will be extended to directional, steerable wavelets in a future release.
[ { "version": "v1", "created": "Wed, 7 Nov 2012 21:04:59 GMT" }, { "version": "v2", "created": "Mon, 23 Sep 2013 11:33:41 GMT" } ]
2013-10-29T00:00:00
[ [ "Leistedt", "B.", "" ], [ "McEwen", "J. D.", "" ], [ "Vandergheynst", "P.", "" ], [ "Wiaux", "Y.", "" ] ]
new_dataset
0.997755
1310.6440
Burkhard C. Schipper
Jeremy Seligman, Fenrong Liu, Patrick Girard
Facebook and the Epistemic Logic of Friendship
10 pages, Poster presentation at TARK 2013 (arXiv:1310.6382) http://www.tark.org
null
null
TARK/2013/p229
cs.LO cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a two-dimensional modal logic for reasoning about the changing patterns of knowledge and social relationships in networks organised on the basis of a symmetric 'friendship' relation, providing a precise language for exploring 'logic in the community' [11]. Agents are placed in the model, allowing us to express such indexical facts as 'I am your friend' and 'You, my friends, are in danger'. The technical framework for this work is general dynamic dynamic logic (GDDL) [4], which provides a general method for extending modal logics with dynamic operators for reasoning about a wide range of model-transformations, starting with those definable in propositional dynamic logic (PDL) and extended to allow for the more subtle operators involved in, for example, private communication, as represented in dynamic epistemic logic (DEL) and related systems. We provide a hands-on introduction to GDDL, introducing elements of the formalism as we go, but leave the reader to consult [4] for technical details. Instead, the purpose of this paper is to investigate a number of conceptual issues that arise when considering communication between agents in such networks, both from one agent to another, and broadcasts to socially-defined groups of agents, such as the group of my friends.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 00:02:15 GMT" } ]
2013-10-29T00:00:00
[ [ "Seligman", "Jeremy", "" ], [ "Liu", "Fenrong", "" ], [ "Girard", "Patrick", "" ] ]
new_dataset
0.999268
1310.7376
Rajib Das
Rajib K Das
Eccentricity of the nodes of OTIS-cube and Enhanced OTIS-cube
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have classified the nodes of OTIS-cube based on their eccentricities. OTIS (optical transpose interconnection system) is a large scale optoelectronic computer architecture, proposed in \cite{KMKE92}, that benefit from both optical and electronic technologies. We show that radius and diameter of OTIS-$Q_n$ is $n+1$ and $2n+1$ respectively. We also show that average eccentricity of OTIS-cube is $(3n/2+1)$. In \cite{D05}, a variant of OTIS-cube, called Enhanced OTIS-cube (E-OTIS-$Q_n$) was proposed. E-OTIS-$Q_n$ is regular of degree $n+1$ and maximally fault-tolerant. In this paper we have given a classification of the nodes of E-OTIS cube and derived expressions for the eccentricities of the nodes in each class. Based on these results we show that radius and diameter of E-OTIS-$Q_n$ is $n+1$ and $\lfloor {4n+4/3} \rfloor$ respectively. We have also computed the average eccentricity of E-OTIS-$Q_n$ for values of $n$ upto 20.
[ { "version": "v1", "created": "Mon, 28 Oct 2013 11:06:25 GMT" } ]
2013-10-29T00:00:00
[ [ "Das", "Rajib K", "" ] ]
new_dataset
0.954017
1310.7444
Gao Juntao
Juntao Gao and Yulong Shen and Xiaohong Jiang and Jie Li
Source Delay in Mobile Ad Hoc Networks
11pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Source delay, the time a packet experiences in its source node, serves as a fundamental quantity for delay performance analysis in networks. However, the source delay performance in highly dynamic mobile ad hoc networks (MANETs) is still largely unknown by now. This paper studies the source delay in MANETs based on a general packet dispatching scheme with dispatch limit $f$ (PD-$f$ for short), where a same packet will be dispatched out up to $f$ times by its source node such that packet dispatching process can be flexibly controlled through a proper setting of $f$. We first apply the Quasi-Birth-and-Death (QBD) theory to develop a theoretical framework to capture the complex packet dispatching process in PD-$f$ MANETs. With the help of the theoretical framework, we then derive the cumulative distribution function as well as mean and variance of the source delay in such networks. Finally, extensive simulation and theoretical results are provided to validate our source delay analysis and illustrate how source delay in MANETs are related to network parameters.
[ { "version": "v1", "created": "Mon, 28 Oct 2013 15:03:41 GMT" } ]
2013-10-29T00:00:00
[ [ "Gao", "Juntao", "" ], [ "Shen", "Yulong", "" ], [ "Jiang", "Xiaohong", "" ], [ "Li", "Jie", "" ] ]
new_dataset
0.996366
1310.6416
Burkhard C. Schipper
Davide Grossi, Emiliano Lorini, Francois Schwarzentruber
Ceteris Paribus Structure in Logics of Game Forms
11 pages, Contributed talk at TARK 2013 (arXiv:1310.6382) http://www.tark.org
null
null
TARK/2013/p94
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article introduces a ceteris paribus modal logic interpreted on the equivalence classes induced by sets of propositional atoms. This logic is used to embed two logics of agency and games, namely atemporal STIT and the coalition logic of propositional control (CL-PC). The embeddings highlight a common ceteris paribus structure underpinning the key modal operators of both logics, they clarify the relationship between STIT and CL-PC, and enable the transfer of complexity results to the ceteris paribus logic.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 22:24:12 GMT" } ]
2013-10-28T00:00:00
[ [ "Grossi", "Davide", "" ], [ "Lorini", "Emiliano", "" ], [ "Schwarzentruber", "Francois", "" ] ]
new_dataset
0.996937
1310.6437
Burkhard C. Schipper
Jan van Eijck
PDL as a Multi-Agent Strategy Logic
10 pages, Poster presentation at TARK 2013 (arXiv:1310.6382) http://www.tark.org
null
null
TARK/2013/p206
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Propositional Dynamic Logic or PDL was invented as a logic for reasoning about regular programming constructs. We propose a new perspective on PDL as a multi-agent strategic logic (MASL). This logic for strategic reasoning has group strategies as first class citizens, and brings game logic closer to standard modal logic. We demonstrate that MASL can express key notions of game theory, social choice theory and voting theory in a natural way, we give a sound and complete proof system for MASL, and we show that MASL encodes coalition logic. Next, we extend the language to epistemic multi-agent strategic logic (EMASL), we give examples of what it can express, we propose to use it for posing new questions in epistemic social choice theory, and we give a calculus for reasoning about a natural class of epistemic game models. We end by listing avenues for future research and by tracing connections to a number of other logics for reasoning about strategies.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 23:47:30 GMT" } ]
2013-10-28T00:00:00
[ [ "van Eijck", "Jan", "" ] ]
new_dataset
0.999755
1310.6736
Amit Kale
Rahul Thota, Sharan Vaswani, Amit Kale and Nagavijayalakshmi Vydyanathan
Fast 3D Salient Region Detection in Medical Images using GPUs
9 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated detection of visually salient regions is an active area of research in computer vision. Salient regions can serve as inputs for object detectors as well as inputs for region based registration algorithms. In this paper we consider the problem of speeding up computationally intensive bottom-up salient region detection in 3D medical volumes.The method uses the Kadir Brady formulation of saliency. We show that in the vicinity of a salient region, entropy is a monotonically increasing function of the degree of overlap of a candidate window with the salient region. This allows us to initialize a sparse seed-point grid as the set of tentative salient region centers and iteratively converge to the local entropy maxima, thereby reducing the computation complexity compared to the Kadir Brady approach of performing this computation at every point in the image. We propose two different approaches for achieving this. The first approach involves evaluating entropy in the four quadrants around the seed point and iteratively moving in the direction that increases entropy. The second approach we propose makes use of mean shift tracking framework to affect entropy maximizing moves. Specifically, we propose the use of uniform pmf as the target distribution to seek high entropy regions. We demonstrate the use of our algorithm on medical volumes for left ventricle detection in PET images and tumor localization in brain MR sequences.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 01:50:24 GMT" } ]
2013-10-28T00:00:00
[ [ "Thota", "Rahul", "" ], [ "Vaswani", "Sharan", "" ], [ "Kale", "Amit", "" ], [ "Vydyanathan", "Nagavijayalakshmi", "" ] ]
new_dataset
0.982694
1310.6772
Ragib Hasan
Thamar Solorio and Ragib Hasan and Mainul Mizan
Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities
4 pages, under submission at LREC 2014
null
null
null
cs.CL cs.CR cs.CY
http://creativecommons.org/licenses/by/3.0/
This paper describes the corpus of sockpuppet cases we gathered from Wikipedia. A sockpuppet is an online user account created with a fake identity for the purpose of covering abusive behavior and/or subverting the editing regulation process. We used a semi-automated method for crawling and curating a dataset of real sockpuppet investigation cases. To the best of our knowledge, this is the first corpus available on real-world deceptive writing. We describe the process for crawling the data and some preliminary results that can be used as baseline for benchmarking research. The dataset will be released under a Creative Commons license from our project website: http://docsig.cis.uab.edu.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 20:59:27 GMT" } ]
2013-10-28T00:00:00
[ [ "Solorio", "Thamar", "" ], [ "Hasan", "Ragib", "" ], [ "Mizan", "Mainul", "" ] ]
new_dataset
0.999338
1209.4620
Lewis Tseng
Lewis Tseng and Nitin Vaidya and Vartika Bhandari
Broadcast Using Certified Propagation Algorithm in Presence of Byzantine Faults
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the correctness of the Certified Propagation Algorithm (CPA) [6, 1, 8, 5] in solving broadcast with locally bounded Byzantine faults. CPA allows the nodes to use only local information regarding the network topology. We provide a tight necessary and sufficient condition on the network topology for the correctness of CPA. To the best of our knowledge, this work is the first to solve the open problem in [8]. We also present some simple extensions of this result
[ { "version": "v1", "created": "Thu, 20 Sep 2012 19:15:50 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2013 22:07:06 GMT" } ]
2013-10-25T00:00:00
[ [ "Tseng", "Lewis", "" ], [ "Vaidya", "Nitin", "" ], [ "Bhandari", "Vartika", "" ] ]
new_dataset
0.954812
1310.1845
Therese Biedl
Therese Biedl
On triangulating k-outerplanar graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A k-outerplanar graph is a graph that can be drawn in the plane without crossing such that after k-fold removal of the vertices on the outer-face there are no vertices left. In this paper, we study how to triangulate a k-outerplanar graph while keeping its outerplanarity small. Specifically, we show that not all k-outerplanar graphs can be triangulated so that the result is k-outerplanar, but they can be triangulated so that the result is (k+1)-outerplanar.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 16:12:49 GMT" }, { "version": "v2", "created": "Thu, 24 Oct 2013 18:22:14 GMT" } ]
2013-10-25T00:00:00
[ [ "Biedl", "Therese", "" ] ]
new_dataset
0.999052
1310.2830
Shaileen Pokress
Shaileen Crawford Pokress, Jos\'e Juan Dominguez Veiga
MIT App Inventor: Enabling Personal Mobile Computing
3 pages, 2 figures, PRoMoTo 2013 proceedings (arXiv:1309.5509)
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MIT App Inventor is a drag-and-drop visual programming tool for designing and building fully functional mobile apps for Android. App Inventor promotes a new era of personal mobile computing in which people are empowered to design, create, and use personally meaningful mobile technology solutions for their daily lives, in endlessly unique situations. App Inventor's intuitive programming metaphor and incremental development capabilities allow the developer to focus on the logic for programming an app rather than the syntax of the coding language, fostering digital literacy for all. Since it was moved from Google to MIT, a number of improvements have been added, and research projects are underway.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 23:16:12 GMT" }, { "version": "v2", "created": "Thu, 24 Oct 2013 19:07:23 GMT" } ]
2013-10-25T00:00:00
[ [ "Pokress", "Shaileen Crawford", "" ], [ "Veiga", "José Juan Dominguez", "" ] ]
new_dataset
0.999688
1310.5850
Josep Jorba
Angel Gonzalez Villan and Josep Jorba
Remote Control of Mobile Devices in Android Platform
null
null
null
null
cs.HC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Remote control systems are a very useful element to control and monitor devices quickly and easily. This paper proposes a new architecture for remote control of Android mobile devices, analyzing the different alternatives and seeking the optimal solution in each case. Although the area of remote control, in case of mobile devices, is little explored, it may provide important advantages for testing software and hardware developments in several real devices. It can also allow an efficient management of various devices of different types for performing different tasks, related for example to security or forensic tasks. The main idea behind the proposed architecture was the design of a system to use it as a platform which provides the services needed to perform remote control of mobile devices. As a result of this research, a proof of concept was implemented. An Android application running a group of server programs on the device, connected to the network or USB interface, depending on availability. This servers can be controlled through a small client written in Java and runnable both on desktop and web systems.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 09:22:04 GMT" } ]
2013-10-25T00:00:00
[ [ "Villan", "Angel Gonzalez", "" ], [ "Jorba", "Josep", "" ] ]
new_dataset
0.995651
1310.6349
Ye Li
Richard West, Ye Li, Eric Missimer
Quest-V: A Virtualized Multikernel for Safety-Critical Real-Time Systems
12 pages. arXiv admin note: text overlap with arXiv:1112.5136, arXiv:1310.6301
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern processors are increasingly featuring multiple cores, as well as support for hardware virtualization. While these processors are common in desktop and server-class computing, they are less prevalent in embedded and real-time systems. However, smartphones and tablet PCs are starting to feature multicore processors with hardware virtualization. If the trend continues, it is possible that future real-time systems will feature more sophisticated processor architectures. Future automotive or avionics systems, for example, could replace complex networks of uniprocessors with consolidated services on a smaller number of multicore processors. Likewise, virtualization could be used to isolate services and increase the availability of a system even when failures occur. This paper investigates whether advances in modern processor technologies offer new opportunities to rethink the design of real-time operating systems. We describe some of the design principles behind Quest-V, which is being used as an exploratory vehicle for real-time system design on multicore processors with hardware virtualization capabilities. While not all embedded systems should assume such features, a case can be made that more robust, safety-critical systems can be built to use hardware virtualization without incurring significant overheads.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 17:35:03 GMT" } ]
2013-10-25T00:00:00
[ [ "West", "Richard", "" ], [ "Li", "Ye", "" ], [ "Missimer", "Eric", "" ] ]
new_dataset
0.986758
1310.6382
Burkhard C. Schipper
Burkhard C. Schipper
TARK 2013 - Proceedings of the 14. Conference on Theoretical Aspects of Rationality and Knowledge
Chennai, India, January 7 - 9, 2013, 27 articles, ISBN: 978-0-615-74716-3, http://www.tark.org/
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The biannual TARK conferences bring together researchers from a wide variety of fields sharing a common interest in reasoning about rationality and knowledge. The impact of this tradition, going back to 1986, is apparent in many of today's research trends and in the growth of an intellectual community beyond traditional disciplinary boundaries. This volume documents the 14th TARK conference, held at the Institute of Mathematical Sciences, Chennai, India on January 7 to 9, 2013. It includes 18 contributed talks, 8 poster presentations, and 3 invited talks given at the conference. Like earlier volumes in this series, it gives a sense of the state of the art in studies of knowledge and rationality in areas such as game theory, decision theory, belief revision, language analysis, and computation. It should be of value to researchers, teachers, and students.
[ { "version": "v1", "created": "Wed, 23 Oct 2013 20:30:22 GMT" } ]
2013-10-25T00:00:00
[ [ "Schipper", "Burkhard C.", "" ] ]
new_dataset
0.988947
1310.6686
Carlos Alberto Fernandez-y-Fernandez
Reyes Ju\'arez-Ram\'irez, Karen Cort\'es Verd\'in, Beatriz Ang\'elica Toscano de la Torre, Hanna Oktaba, Carlos Alberto Fern\'andez-y-Fern\'andez, Brenda Leticia Flores R\'ios, Fabiola Angulo Molina
Estado Actual de la Pr\'actica de la Ingenier\'ia de Software en M\'exico
null
Congreso Internacional de Investigaci\'on e Innovaci\'on en Ingenier\'ia de Software (Conisoft 2013), pp. 3-14, Xalapa, Veracruz, M\'exico, 2013. ISBN: 978-0-615-89523-9
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The software engineering is a relatively new discipline compared to other sciences, since the origins of the term itself dates back to the years 1968 and 1969. At present, the market and the software industry have a significant relevance in several countries of the world; however, although Mexico is immersed in this race, has not even reached the level of success achieved in other countries in this sector. This paper presents an overview of the situation that keeps the practice of software engineering in Mexico, with emphasis on the academic realm. It shows a compilation of scientific research activity carried out in universities, as well as a brief analysis of undergraduate educational programs including the software engineering discipline . At the end, future work to be done is proposed in order to find a point of convergence between academia and industry, and also to support the flourishing of this business which somehow will have a positive impact on the economy of our country.
[ { "version": "v1", "created": "Thu, 24 Oct 2013 17:58:50 GMT" } ]
2013-10-25T00:00:00
[ [ "Juárez-Ramírez", "Reyes", "" ], [ "Verdín", "Karen Cortés", "" ], [ "de la Torre", "Beatriz Angélica Toscano", "" ], [ "Oktaba", "Hanna", "" ], [ "Fernández-y-Fernández", "Carlos Alberto", "" ], [ "Ríos", "Brenda Leticia Flores", "" ], [ "Molina", "Fabiola Angulo", "" ] ]
new_dataset
0.997983
1310.6078
Andrew Adamatzky
Richard Mayne, David Patton, Ben de Lacy Costello, Andrew Adamatzky, Rosemary Camilla Patton
On the internalisation, intraplasmodial carriage and excretion of metallic nanoparticles in the slime mould Physarum polycephalum
null
null
null
null
cs.ET physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The plasmodium of Physarum polycephalum is a large single cell visible with the naked eye. When inoculated on a substrate with attractants and repellents the plasmodium develops optimal networks of protoplasmic tubes which span sites of attractants (i.e. nutrients) yet avoid domains with a high nutrient concentration. It should therefore be possible to program the plasmodium towards deterministic adaptive transformation of internalised nano- and micro-scale materials. In laboratory experiments with magnetite nanoparticles and glass micro-spheres coated with silver metal we demonstrate that the plasmodium of P. polycephalum can propagate the nano-scale objects using a number of distinct mechanisms including endocytosis, transcytosis and dragging. The results of our experiments could be used in the development of novel techniques targeted towards the growth of metallised biological wires and hybrid nano- and micro-circuits.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 23:35:08 GMT" } ]
2013-10-24T00:00:00
[ [ "Mayne", "Richard", "" ], [ "Patton", "David", "" ], [ "Costello", "Ben de Lacy", "" ], [ "Adamatzky", "Andrew", "" ], [ "Patton", "Rosemary Camilla", "" ] ]
new_dataset
0.983968
1310.6311
Elian Carsenat
Elian Carsenat
Onomastics and Big Data Mining
ParisTech Review, October 2013
null
null
null
cs.CY
http://creativecommons.org/licenses/by/3.0/
As of today, the main business application of onomastics is naming, or branding: finding the proper name for your company or your product to stand out in the world. Meaningfully, Onoma, the Greek root for name, is also a registered trademark of Nomen, the naming agency founded by Marcel Botton in 1981. Nomen initially licensed one of Roland Moreno's inventions, the Radoteur name generator, and created many distinctive and global brand names such as: Vinci, Clio or Amundi. But once your business has a name, should you forget about onomastics? Not anymore. Globalization, digitalization and the Big Data open new fields to experiment disruptive applications in Sales and Marketing, Communication, HR and Risk Management. Though discriminating names carries a high risk of abuse, it can also drive new, unexpected ways for developing poor areas.
[ { "version": "v1", "created": "Sun, 20 Oct 2013 10:53:39 GMT" } ]
2013-10-24T00:00:00
[ [ "Carsenat", "Elian", "" ] ]
new_dataset
0.999693
1310.5697
Hitesh Gupta
Hitesh Gupta, Dr. S.C. Jain
Multivalued Logic Circuit Design for Binary Logic Interface
72 pages,Dissertation Report
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary logic and devices have been in used since inception with advancement and technology and millennium gate design era. The development in binary logic has become tedious and cumbersome. Multivalued logic enables significant more information to be packed within a single digit. The design and development of logic circuit becomes very compact and easier. Attempts are being made to fabricate multivalued logic based devices. Since present devices can be implemented only in binary system,it is necessary to evolve a system that can built the circuit in multivalued logic system and convert in binary logic system. In multivalued logic system logic gates differ in different logic system, a quaternary has become mature in terms of logic algebra and gates. Hence logic design based on above system can be done using standard procedure. In this dissertation a logic circuit design entry based on multivalued logic system has been taken up that can provide the ease of circuit design in multivalued system and output as binary valued circuit. The named "MVL-DEV" offers editing, storage and conversion into binary facility.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 12:33:42 GMT" } ]
2013-10-23T00:00:00
[ [ "Gupta", "Hitesh", "" ], [ "Jain", "Dr. S. C.", "" ] ]
new_dataset
0.999338
1310.5714
Massimo Lauria
Massimo Lauria
Short $\mathsf{Res}^*(\mathsf{polylog})$ refutations if and only if narrow $\mathsf{Res}$ refutations
null
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we show that any $k$-CNF which can be refuted by a quasi-polynomial $\mathsf{Res}^*(\mathsf{polylog})$ refutation has a "narrow" refutation in $\mathsf{Res}$ (i.e., of poly-logarithmic width). We also show the converse implication: a narrow Resolution refutation can be simulated by a short $\mathsf{Res}^*(\mathsf{polylog})$ refutation. The author does not claim priority on this result. The technical part of this note bears similarity with the relation between $d$-depth Frege refutations and tree-like $d+1$-depth Frege refutations outlined in (Kraj\'i\v{c}ek 1994, Journal of Symbolic Logic 59, 73). Part of it had already been specialized to $\mathsf{Res}$ and $\mathsf{Res}(k)$ in (Esteban et al. 2004, Theor. Comput. Sci. 321, 347).
[ { "version": "v1", "created": "Mon, 21 Oct 2013 20:03:40 GMT" } ]
2013-10-23T00:00:00
[ [ "Lauria", "Massimo", "" ] ]
new_dataset
0.995941
1310.5781
David Budden
Madison Flannery, Shannon Fenn and David Budden
RANSAC: Identification of Higher-Order Geometric Features and Applications in Humanoid Robot Soccer
8 pages, 6 figures
null
null
null
cs.RO cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability for an autonomous agent to self-localise is directly proportional to the accuracy and precision with which it can perceive salient features within its local environment. The identification of such features by recognising geometric profile allows robustness against lighting variations, which is necessary in most industrial robotics applications. This paper details a framework by which the random sample consensus (RANSAC) algorithm, often applied to parameter fitting in linear models, can be extended to identify higher-order geometric features. Goalpost identification within humanoid robot soccer is investigated as an application, with the developed system yielding an order-of-magnitude improvement in classification performance relative to a traditional histogramming methodology.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 02:38:30 GMT" } ]
2013-10-23T00:00:00
[ [ "Flannery", "Madison", "" ], [ "Fenn", "Shannon", "" ], [ "Budden", "David", "" ] ]
new_dataset
0.998377
1310.5793
Chinmay Dhekne Mr
Snehal Mulay, Chinmay Dhekne, Rucha Bapat, Tanmay Budukh, Soham Gadgil
Intelligent City Traffic Management and Public Transportation System
null
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 1, May 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 Reference: IJCSI-10-3-1-46-50
null
null
cs.AI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent Transportation System in case of cities is controlling traffic congestion and regulating the traffic flow. This paper presents three modules that will help in managing city traffic issues and ultimately gives advanced development in transportation system. First module, Congestion Detection and Management will provide user real time information about congestion on the road towards his destination, Second module, Intelligent Public Transport System will provide user real time public transport information,i.e, local buses, and the third module, Signal Synchronization will help in controlling congestion at signals, with real time adjustments of signal timers according to the congestion. All the information that user is getting about the traffic or public transportation will be provided on users day to day device that is mobile through Android application or SMS. Moreover, communication can also be done via Website for Clients having internet access. And all these modules will be fully automated without any human intervention at server side.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 03:47:47 GMT" } ]
2013-10-23T00:00:00
[ [ "Mulay", "Snehal", "" ], [ "Dhekne", "Chinmay", "" ], [ "Bapat", "Rucha", "" ], [ "Budukh", "Tanmay", "" ], [ "Gadgil", "Soham", "" ] ]
new_dataset
0.998618
1310.5805
Ouissem Ben Fredj
Amor Lazzez, Ouissem Ben Fredj, Thabet Slimani
IAX-Based Peer-to-Peer VoIP Architecture
11 pages, 2 figures
Published in IJCSI Journal, Volume 10, Issue 3, No 2, May 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, Voice over IP (VoIP) constitutes a privileged field of service innovation. One benefit of the VoIP technology is that it may be deployed using a centralized or a distributed architecture. One of the most efficient approaches used in the deployment of centralized VoIP systems is based on the use of IAX (Inter-Asterisk Exchange), an open-source signaling/data exchange protocol. Even though they are currently widely used, client-server VoIP systems suffer from many weaknesses such as the presence of single points of failure, an inefficient resources management, and system non-scalability. In order to help the development of scalable and reliable VoIP systems, the development community starts tending towards the deployment of the VoIP service using a peer-to-peer distributed architecture. The aim of this paper is to develop an IAX-based peer-to-peer VoIP architecture, an optimized VoIP architecture that takes advantage of the benefits of the IAX protocol and those of the peer-to-peer distribution model.
[ { "version": "v1", "created": "Tue, 22 Oct 2013 06:10:26 GMT" } ]
2013-10-23T00:00:00
[ [ "Lazzez", "Amor", "" ], [ "Fredj", "Ouissem Ben", "" ], [ "Slimani", "Thabet", "" ] ]
new_dataset
0.957582
1301.0387
Shengyao Chen
ShengYao Chen, Feng Xi, Zhong Liu
Chaotic Analog-to-Information Conversion with Chaotic State Modulation
24 pages, 10 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chaotic compressive sensing is a nonlinear framework for compressive sensing. Along the framework, this paper proposes a chaotic analog-to-information converter, chaotic modulation, to acquire and reconstruct band-limited sparse analog signals at sub-Nyquist rate. In the chaotic modulation, the sparse signal is randomized through state modulation of continuous-time chaotic system and one state output is sampled as compressive measurements. The reconstruction is achieved through the estimation of the sparse coefficients with principle of chaotic impulsive synchronization and Lp-norm regularized nonlinear least squares. The concept of supreme local Lyapunov exponents (SLLE) is introduced to study the reconstructablity. It is found that the sparse signals are reconstructable, if the largest SLLE of the error dynamical system is negative. As examples, the Lorenz system and Liu system excited by the sparse multi-tone signals are taken to illustrate the principle and the performance.
[ { "version": "v1", "created": "Thu, 3 Jan 2013 07:56:03 GMT" }, { "version": "v2", "created": "Mon, 21 Oct 2013 03:40:06 GMT" } ]
2013-10-22T00:00:00
[ [ "Chen", "ShengYao", "" ], [ "Xi", "Feng", "" ], [ "Liu", "Zhong", "" ] ]
new_dataset
0.988027
1306.6168
Bruno Courcelle
Bruno Courcelle (LaBRI, IUF)
Clique-width and edge contraction
Information Processinhgs Letters 2013, In press
null
null
null
cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that edge contractions do not preserve the property that a set of graphs has bounded clique-width. This property is preserved by contractions of edges, one end of which is a vertex of degree 2.
[ { "version": "v1", "created": "Wed, 26 Jun 2013 08:54:30 GMT" }, { "version": "v2", "created": "Mon, 21 Oct 2013 10:42:34 GMT" } ]
2013-10-22T00:00:00
[ [ "Courcelle", "Bruno", "", "LaBRI, IUF" ] ]
new_dataset
0.999675
1310.5187
Wael Halbawi
Wael Halbawi, Tracey Ho, Hongyi Yao, Iwan Duursma
Distributed Reed-Solomon Codes for Simple Multiple Access Networks
12 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a simple multiple access network in which a destination node receives information from multiple sources via a set of relay nodes. Each relay node has access to a subset of the sources, and is connected to the destination by a unit capacity link. We also assume that $z$ of the relay nodes are adversarial. We propose a computationally efficient distributed coding scheme and show that it achieves the full capacity region for up to three sources. Specifically, the relay nodes encode in a distributed fashion such that the overall codewords received at the destination are codewords from a single Reed-Solomon code.
[ { "version": "v1", "created": "Sat, 19 Oct 2013 00:12:19 GMT" } ]
2013-10-22T00:00:00
[ [ "Halbawi", "Wael", "" ], [ "Ho", "Tracey", "" ], [ "Yao", "Hongyi", "" ], [ "Duursma", "Iwan", "" ] ]
new_dataset
0.993555
1310.5254
Ijaz Bukhari ijaz bukhari
Syed Ijaz Ahmad Bukhari
Real Time Data Warehouse
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data Warehouse (DW) is an essential part of Business Intelligence. DW emerged as a fast growing reporting and analysis technique in early 1980s. Today, it has almost replaced relational databases. However, with passage of time, static and historic data of DWs could not produce Real Time reporting and analysis, thus giving a way to emerge the Idea of Real Time Data Warehouse (RTDW). Although, there are problems with RTDWs, but with advancement in technology and researchers focus, RTDWs will be able to generate real time reports, analysis and forecasting.
[ { "version": "v1", "created": "Sat, 19 Oct 2013 17:30:48 GMT" } ]
2013-10-22T00:00:00
[ [ "Bukhari", "Syed Ijaz Ahmad", "" ] ]
new_dataset
0.986698
1310.5376
Martin Leslie
Martin Leslie
Hypermap-Homology Quantum Codes (Ph.D. thesis)
Author's Ph.D. thesis (University of Arizona, May 2013). Adviser: Marek Rychlik
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new type of sparse CSS quantum error correcting code based on the homology of hypermaps. Sparse quantum error correcting codes are of interest in the building of quantum computers due to their ease of implementation and the possibility of developing fast decoders for them. Codes based on the homology of embeddings of graphs, such as Kitaev's toric code, have been discussed widely in the literature and our class of codes generalize these. We use embedded hypergraphs, which are a generalization of graphs that can have edges connected to more than two vertices. We develop theorems and examples of our hypermap-homology codes, especially in the case that we choose a special type of basis in our homology chain complex. In particular the most straightforward generalization of the $m \times m$ toric code to hypermap-homology codes gives us a $[(3/2)m^2,2,m]$ code as compared to the toric code which is a $[2m^2,2,m]$ code. Thus we can protect the same amount of quantum information, with the same error-correcting capability, using less physical qubits.
[ { "version": "v1", "created": "Sun, 20 Oct 2013 21:40:49 GMT" } ]
2013-10-22T00:00:00
[ [ "Leslie", "Martin", "" ] ]
new_dataset
0.999145
1310.5538
Vijay Saraswat
Vijay Saraswat, Radha Jagadeesan and Vineet Gupta
TCC, with History
17 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern computer systems are awash in a sea of asynchronous events. There is an increasing need for a declarative language that can permit business users to specify complex event-processing rules. Such rules should be able to correlate different event streams, detect absence of events (negative information), permit aggregations over sliding windows, specify dependent sliding windows etc. For instance it should be possible to precisely state a rule such as "Every seventh trading session that DowJones has risen consecutively, and IBM's stock is off 3% over its average in this period, evaluate IBM position", "Declare the sensor as faulty if no reading has been received for 500 ms", etc. Further, the language should be implementable efficiently in an event-driven fashion. We propose the Timed (Default) Concurrent Constraint, TCC, programming framework as a foundation for such complex event processing. While very rich, the TCC framework "forgets" information from one instant to the next. We make two extensions. First, we extend the TCC model to carry the store from previous time instants as "past" information in the current time instant. This permits rules to to be written with rich queries over the past. Second, we show that many of the powerful properties of the agent language can be folded into the query language by permitting agents and queries to be defined mutually recursively, building on the testing interpretation of intuitionistic logic described in RCC \cite{radha-fsttcs05}. We show that this permits queries to move "back and forth" in the past, e.g.{} "Order a review if the last time that IBM stock price dropped by 10% in a day, there was more than 20% increase in trading volume for Oracle the following day." We provide a formal semantics for TCC + Histories and establish some basic properties.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 13:33:21 GMT" } ]
2013-10-22T00:00:00
[ [ "Saraswat", "Vijay", "" ], [ "Jagadeesan", "Radha", "" ], [ "Gupta", "Vineet", "" ] ]
new_dataset
0.997364
1310.5551
Albert Heinle
Albert Heinle, Viktor Levandovskyy, Andreas Nareike
SymbolicData:SDEval - Benchmarking for Everyone
null
null
null
null
cs.SC cs.MS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we will present SDeval, a software project that contains tools for creating and running benchmarks with a focus on problems in computer algebra. It is built on top of the Symbolic Data project, able to translate problems in the database into executable code for various computer algebra systems. The included tools are designed to be very flexible to use and to extend, such that they can be utilized even in contexts of other communities. With the presentation of SDEval, we will also address particularities of benchmarking in the field of computer algebra. Furthermore, with SDEval, we provide a feasible and automatizable way of reproducing benchmarks published in current research works, which appears to be a difficult task in general due to the customizability of the available programs. We will simultaneously present the current developments in the Symbolic Data project.
[ { "version": "v1", "created": "Fri, 18 Oct 2013 19:58:03 GMT" } ]
2013-10-22T00:00:00
[ [ "Heinle", "Albert", "" ], [ "Levandovskyy", "Viktor", "" ], [ "Nareike", "Andreas", "" ] ]
new_dataset
0.999087
1310.5603
Jie Yan
Jie Yan, Guangming Tan, Ninghui Sun
GRE: A Graph Runtime Engine for Large-Scale Distributed Graph-Parallel Applications
12 pages, also submitted to PVLDB
null
null
null
cs.DC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Large-scale distributed graph-parallel computing is challenging. On one hand, due to the irregular computation pattern and lack of locality, it is hard to express parallelism efficiently. On the other hand, due to the scale-free nature, real-world graphs are hard to partition in balance with low cut. To address these challenges, several graph-parallel frameworks including Pregel and GraphLab (PowerGraph) have been developed recently. In this paper, we present an alternative framework, Graph Runtime Engine (GRE). While retaining the vertex-centric programming model, GRE proposes two new abstractions: 1) a Scatter-Combine computation model based on active message to exploit massive fined-grained edge-level parallelism, and 2) a Agent-Graph data model based on vertex factorization to partition and represent directed graphs. GRE is implemented on commercial off-the-shelf multi-core cluster. We experimentally evaluate GRE with three benchmark programs (PageRank, Single Source Shortest Path and Connected Components) on real-world and synthetic graphs of millions billion of vertices. Compared to PowerGraph, GRE shows 2.5~17 times better performance on 8~16 machines (192 cores). Specifically, the PageRank in GRE is the fastest when comparing to counterparts of other frameworks (PowerGraph, Spark,Twister) reported in public literatures. Besides, GRE significantly optimizes memory usage so that it can process a large graph of 1 billion vertices and 17 billion edges on our cluster with totally 768GB memory, while PowerGraph can only process less than half of this graph scale.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 15:32:16 GMT" } ]
2013-10-22T00:00:00
[ [ "Yan", "Jie", "" ], [ "Tan", "Guangming", "" ], [ "Sun", "Ninghui", "" ] ]
new_dataset
0.980326
1310.4874
Chenlan Wang
Chenlan Wang, Xuan Vinh Doan, Bo Chen
Price of Anarchy for Non-atomic Congestion Games with Stochastic Demands
31 pages
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We generalize the notions of user equilibrium and system optimum to non-atomic congestion games with stochastic demands. We establish upper bounds on the price of anarchy for three different settings of link cost functions and demand distributions, namely, (a) affine cost functions and general distributions, (b) polynomial cost functions and general positive-valued distributions, and (c) polynomial cost functions and the normal distributions. All the upper bounds are tight in some special cases, including the case of deterministic demands.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 23:54:29 GMT" } ]
2013-10-21T00:00:00
[ [ "Wang", "Chenlan", "" ], [ "Doan", "Xuan Vinh", "" ], [ "Chen", "Bo", "" ] ]
new_dataset
0.999069
1306.0026
Massimo Bartoletti
Massimo Bartoletti, Tiziana Cimoli, Paolo Di Giamberardino, Roberto Zunino
Contract agreements via logic
In Proceedings ICE 2013, arXiv:1310.4019
EPTCS 131, 2013, pp. 5-19
10.4204/EPTCS.131.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We relate two contract models: one based on event structures and game theory, and the other one based on logic. In particular, we show that the notions of agreement and winning strategies in the game-theoretic model are related to that of provability in the logical model.
[ { "version": "v1", "created": "Fri, 31 May 2013 20:56:07 GMT" }, { "version": "v2", "created": "Thu, 17 Oct 2013 06:56:51 GMT" } ]
2013-10-18T00:00:00
[ [ "Bartoletti", "Massimo", "" ], [ "Cimoli", "Tiziana", "" ], [ "Di Giamberardino", "Paolo", "" ], [ "Zunino", "Roberto", "" ] ]
new_dataset
0.954017