id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1310.4573
EPTCS
Julien Lange (University of Leicester, UK), Alceste Scalas (University of Cagliari, Italy)
Choreography Synthesis as Contract Agreement
In Proceedings ICE 2013, arXiv:1310.4019
EPTCS 131, 2013, pp. 52-67
10.4204/EPTCS.131.6
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a formal model for distributed systems, where each participant advertises its requirements and obligations as behavioural contracts, and where multiparty sessions are started when a set of contracts allows to synthesise a choreography. Our framework is based on the CO2 calculus for contract-oriented computing, and borrows concepts and results from the session type literature. It supports sessions where the number of participants is not determined beforehand, and keeps CO2's ability to rule out participants that are culpable if contracts are not fulfilled at runtime. We show that we have progress and session fidelity in CO2, as a result of the honesty of participants - i.e., their ability to always adhere to their contracts.
[ { "version": "v1", "created": "Thu, 17 Oct 2013 03:48:09 GMT" } ]
2013-10-18T00:00:00
[ [ "Lange", "Julien", "", "University of Leicester, UK" ], [ "Scalas", "Alceste", "", "University\n of Cagliari, Italy" ] ]
new_dataset
0.999334
1309.3467
Vijayvaradharaj Muralidharan
Vijayvaradharaj T. Muralidharan and B. Sundar Rajan
Wireless Bidirectional Relaying, Latin Squares and Graph Vertex Coloring
18 pages, 19 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of obtaining network coding maps for the physical layer network coded two-way relay channel is considered, using the denoise-and-forward forward protocol. It is known that network coding maps used at the relay node which ensure unique decodability at the end nodes form a Latin Square. Also, it is known that minimum distance of the effective constellation at the relay node becomes zero, when the ratio of the fade coefficients from the end node to the relay node, belongs to a finite set of complex numbers determined by the signal set used, called the singular fade states. Furthermore, it has been shown recently that the problem of obtaining network coding maps which remove the harmful effects of singular fade states, reduces to the one of obtaining Latin Squares, which satisfy certain constraints called \textit{singularity removal constraints}. In this paper, it is shown that the singularity removal constraints along with the row and column exclusion conditions of a Latin Square, can be compactly represented by a graph called the \textit{singularity removal graph} determined by the singular fade state and the signal set used. It is shown that a Latin Square which removes a singular fade state can be obtained from a proper vertex coloring of the corresponding singularity removal graph. The minimum number of symbols used to fill in a Latin Square which removes a singular fade state is equal to the chromatic number of the singularity removal graph. It is shown that for any square $M$-QAM signal set, there exists singularity removal graphs whose chromatic numbers exceed $M$ and hence require more than $M$ colors for vertex coloring. Also, it is shown that for any $2^{\lambda}$-PSK signal set, $\lambda \geq 3,$ all the singularity removal graphs can be colored using $2^{\lambda}$ colors.
[ { "version": "v1", "created": "Fri, 13 Sep 2013 14:36:46 GMT" }, { "version": "v2", "created": "Wed, 16 Oct 2013 16:08:39 GMT" } ]
2013-10-17T00:00:00
[ [ "Muralidharan", "Vijayvaradharaj T.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.999401
1310.4231
Sparsh Mittal
Sparsh Mittal
Dynamic cache reconfiguration based techniques for improving cache energy efficiency
PhD thesis, dynamic cache reconfiguration
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern multicore processors are employing large last-level caches, for example Intel's E7-8800 processor uses 24MB L3 cache. Further, with each CMOS technology generation, leakage energy has been dramatically increasing and hence, leakage energy is expected to become a major source of energy dissipation, especially in last-level caches (LLCs). The conventional schemes of cache energy saving either aim at saving dynamic energy or are based on properties specific to first-level caches, and thus these schemes have limited utility for last-level caches. Further, several other techniques require offline profiling or per-application tuning and hence are not suitable for product systems. In this research, we propose novel cache leakage energy saving schemes for single-core and multicore systems; desktop, QoS, real-time and server systems. We propose software-controlled, hardware-assisted techniques which use dynamic cache reconfiguration to configure the cache to the most energy efficient configuration while keeping the performance loss bounded. To profile and test a large number of potential configurations, we utilize low-overhead, micro-architecture components, which can be easily integrated into modern processor chips. We adopt a system-wide approach to save energy to ensure that cache reconfiguration does not increase energy consumption of other components of the processor. We have compared our techniques with the state-of-art techniques and have found that our techniques outperform them in their energy efficiency. This research has important applications in improving energy-efficiency of higher-end embedded, desktop, server processors and multitasking systems. We have also proposed performance estimation approach for efficient design space exploration and have implemented time-sampling based simulation acceleration approach for full-system architectural simulators.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 00:41:12 GMT" } ]
2013-10-17T00:00:00
[ [ "Mittal", "Sparsh", "" ] ]
new_dataset
0.987167
1310.4270
Rajib Rana
Rajib Rana, Chun Tung Chou, Nirupama Bulusu, Salil Kanhere, Wen Hu
Ear-Phone: A Context-Aware Noise Mapping using Smart Phones
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A noise map facilitates the monitoring of environmental noise pollution in urban areas. However, state-of-the-art techniques for rendering noise maps in urban areas are expensive and rarely updated, as they rely on population and traffic models rather than on real data. Smart phone based urban sensing can be leveraged to create an open and inexpensive platform for rendering up-to- date noise maps. In this paper, we present the design, implementation and performance evaluation of an end-to-end, context-aware, noise mapping system called Ear-Phone. Ear-Phone investigates the use of different interpolation and regularization methods to address the fundamental problem of recovering the noise map from incomplete and random samples obtained by crowdsourcing data collection. Ear-Phone, implemented on Nokia N95, N97 and HP iPAQ, HTC One mobile devices, also addresses the challenge of collecting accurate noise pollution readings at a mobile device. A major challenge of using smart phones as sensors is that even at the same location, the sensor reading may vary depending on the phone orientation and user context (for example, whether the user is carrying the phone in a bag or holding it in her palm). To address this problem, Ear-Phone leverages context-aware sensing. We develop classifiers to accurately determine the phone sensing context. Upon context discovery, Ear-Phone automatically decides whether to sense or not. Ear-phone also implements in-situ calibration which performs simple calibration that can be carried out without any technical skills whatsoever required on the user's part. Extensive simulations and outdoor experiments demonstrate that Ear-Phone is a feasible platform to assess noise pollution, incurring reasonable system resource consumption at mobile devices and providing high reconstruction accuracy of the noise map.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 05:04:28 GMT" } ]
2013-10-17T00:00:00
[ [ "Rana", "Rajib", "" ], [ "Chou", "Chun Tung", "" ], [ "Bulusu", "Nirupama", "" ], [ "Kanhere", "Salil", "" ], [ "Hu", "Wen", "" ] ]
new_dataset
0.999244
1310.4282
Wenyuan Tang
Wenyuan Tang and Rahul Jain
A Nash Equilibrium Need Not Exist in the Locational Marginal Pricing Mechanism
null
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Locational marginal pricing (LMP) is a widely employed method for pricing electricity in the wholesale electricity market. Although it is well known that the LMP mechanism is vulnerable to market manipulation, there is little literature providing a systematic analysis of this phenomenon. In the first part of this paper, we investigate the economic dispatch outcomes of the LMP mechanism with strategic agents. We show via counterexamples, that contrary to popular belief, a Nash equilibrium may not exist. And when it exists, the price of anarchy may be arbitrarily large. We then provide two sufficient conditions under either of which an efficient Nash equilibria exists. Last, we propose a new market mechanism for electricity markets, the Power Network Second Price (PNSP) mechanism that always induces an efficient Nash equilibrium. We briefly address the extensions on the demand side.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 06:51:14 GMT" } ]
2013-10-17T00:00:00
[ [ "Tang", "Wenyuan", "" ], [ "Jain", "Rahul", "" ] ]
new_dataset
0.983862
1310.4306
Tom Hirschowitz
Clovis Eberhart (LAMA), Tom Hirschowitz (LAMA), Thomas Seiller (LAMA, IRISA / INRIA Rennes)
Fully-abstract concurrent games for pi
20 pages, submitted
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a semantics for Milner's pi-calculus, with three main novelties. First, it provides a fully-abstract model for fair testing equivalence, whereas previous semantics covered variants of bisimilarity and the may and must testing equivalences. Second, it is based on reduction semantics, whereas previous semantics were based on labelled transition systems. Finally, it has a strong game semantical flavor in the sense of Hyland-Ong and Nickau. Indeed, our model may both be viewed as an innocent presheaf semantics and as a concurrent game semantics.
[ { "version": "v1", "created": "Wed, 16 Oct 2013 09:49:12 GMT" } ]
2013-10-17T00:00:00
[ [ "Eberhart", "Clovis", "", "LAMA" ], [ "Hirschowitz", "Tom", "", "LAMA" ], [ "Seiller", "Thomas", "", "LAMA,\n IRISA / INRIA Rennes" ] ]
new_dataset
0.974292
1310.4485
Baochang Zhang
Juan Liu, Baochang Zhang, Linlin Shen, Jianzhuang Liu, Jason Zhao
The BeiHang Keystroke Dynamics Authentication System
25 pages,17 figures,5 tables
null
null
null
cs.CR cs.LG
http://creativecommons.org/licenses/by/3.0/
Keystroke Dynamics is an important biometric solution for person authentication. Based upon keystroke dynamics, this paper designs an embedded password protection device, develops an online system, collects two public databases for promoting the research on keystroke authentication, exploits the Gabor filter bank to characterize keystroke dynamics, and provides benchmark results of three popular classification algorithms, one-class support vector machine, Gaussian classifier, and nearest neighbour classifier.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 12:12:44 GMT" } ]
2013-10-17T00:00:00
[ [ "Liu", "Juan", "" ], [ "Zhang", "Baochang", "" ], [ "Shen", "Linlin", "" ], [ "Liu", "Jianzhuang", "" ], [ "Zhao", "Jason", "" ] ]
new_dataset
0.969319
1310.3849
Umakant Mishra
Umakant Mishra
10 Inventions on laptop keyboards -A study based on US patents
Published in TRIZsite Journal, May 2005, also available at http://papers.ssrn.com/abstract=932274. arXiv admin note: substantial text overlap with arXiv:1307.5426, arXiv:1310.3268, arXiv:1310.3070
null
10.2139/ssrn.932274
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A desktop keyboard has several sections like character key section, navigation key section, numeric key section, and function key section etc. each consisting of several number of keys. However, a laptop computer does not have so much of space to accommodate all these keys into the keyboard. There are several considerations while designing a laptop keyboard. This article illustrates 10 inventions on keyboards for laptop and portable computers. The inventions are selected from US patent database. The inventions try to improve various aspects of a laptop keyboard, such as reducing size, folding and concealing, ergonomic features, improving quality and reducing cost.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 14:49:38 GMT" } ]
2013-10-16T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999123
1310.3850
Umakant Mishra
Umakant Mishra
10 Inventions on modular keyboards: A TRIZ based analysis
Published in TRIZsite Journal, March 2005, also available in http://papers.ssrn.com/abstract=932269. arXiv admin note: substantial text overlap with arXiv:1310.3070, arXiv:1310.3268, arXiv:1310.3849
null
10.2139/ssrn.932269
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a standard keyboard is quite spacious many inventions try to use the space of keyboard to use for various activities. A modular keyboard is designed in such a way that the components of the keyboard can be attached and detached as per the need. This article illustrates 10 inventions on modular keyboard from US patent database. The objective of these inventions is to make a keyboard modular, so that the same keyboard can be made smaller by detaching some of its components and larger by attaching additional attachments. Some modular keyboards provide slots for external attachments like mouse, telephone, speakers, joystick and storage devices etc.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 12:00:16 GMT" } ]
2013-10-16T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.996463
1310.4038
Charith Perera
Charith Perera, Prem Prakash Jayaraman, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos
MOSDEN: An Internet of Things Middleware for Resource Constrained Mobile Devices
null
Proceedings of the 47th Hawaii International Conference on System Sciences (HICSS), Kona, Hawaii, USA, January, 2014
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet of Things (IoT) is part of Future Internet and will comprise many billions of Internet Connected Objects (ICO) or `things' where things can sense, communicate, compute and potentially actuate as well as have intelligence, multi-modal interfaces, physical/ virtual identities and attributes. Collecting data from these objects is an important task as it allows software systems to understand the environment better. Many different hardware devices may involve in the process of collecting and uploading sensor data to the cloud where complex processing can occur. Further, we cannot expect all these objects to be connected to the computers due to technical and economical reasons. Therefore, we should be able to utilize resource constrained devices to collect data from these ICOs. On the other hand, it is critical to process the collected sensor data before sending them to the cloud to make sure the sustainability of the infrastructure due to energy constraints. This requires to move the sensor data processing tasks towards the resource constrained computational devices (e.g. mobile phones). In this paper, we propose Mobile Sensor Data Processing Engine (MOSDEN), an plug-in-based IoT middleware for mobile devices, that allows to collect and process sensor data without programming efforts. Our architecture also supports sensing as a service model. We present the results of the evaluations that demonstrate its suitability towards real world deployments. Our proposed middleware is built on Android platform.
[ { "version": "v1", "created": "Tue, 15 Oct 2013 12:50:44 GMT" } ]
2013-10-16T00:00:00
[ [ "Perera", "Charith", "" ], [ "Jayaraman", "Prem Prakash", "" ], [ "Zaslavsky", "Arkady", "" ], [ "Christen", "Peter", "" ], [ "Georgakopoulos", "Dimitrios", "" ] ]
new_dataset
0.999699
1310.4168
Vidya Nariyambut Murali
Vidya N. Murali, Anthony L. Threatt, Joe Manganelli, Paul M. Yanik, Sumod K. Mohan, Akshay A. Apte, Raghavendran Ramachandran, Linnea Smolentzov, Johnell Brooks, Ian D. Walker, Keith E. Green
A Mobile Robotic Personal Nightstand with Integrated Perceptual Processes
Submitted to AAAI 2010, IROS 2011
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an intelligent interactive nightstand mounted on a mobile robot, to aid the elderly in their homes using physical, tactile and visual percepts. We show the integration of three different sensing modalities for controlling the navigation of a robot mounted nightstand within the constrained environment of a general purpose living room housing a single aging individual in need of assistance and monitoring. A camera mounted on the ceiling of the room, gives a top-down view of the obstacles, the person and the nightstand. Pressure sensors mounted beneath the bed-stand of the individual provide physical perception of the person's state. A proximity IR sensor on the nightstand acts as a tactile interface along with a Wii Nunchuck (Nintendo) to control mundane operations on the nightstand. Intelligence from these three modalities are combined to enable path planning for the nightstand to approach the individual. With growing emphasis on assistive technology for the aging individuals who are increasingly electing to stay in their homes, we show how ubiquitous intelligence can be brought inside homes to help monitor and provide care to an individual. Our approach goes one step towards achieving pervasive intelligence by seamlessly integrating different sensors embedded in the fabric of the environment.
[ { "version": "v1", "created": "Sun, 13 Oct 2013 03:10:54 GMT" } ]
2013-10-16T00:00:00
[ [ "Murali", "Vidya N.", "" ], [ "Threatt", "Anthony L.", "" ], [ "Manganelli", "Joe", "" ], [ "Yanik", "Paul M.", "" ], [ "Mohan", "Sumod K.", "" ], [ "Apte", "Akshay A.", "" ], [ "Ramachandran", "Raghavendran", "" ], [ "Smolentzov", "Linnea", "" ], [ "Brooks", "Johnell", "" ], [ "Walker", "Ian D.", "" ], [ "Green", "Keith E.", "" ] ]
new_dataset
0.999503
1307.2964
Xin Li
Xin Li, Hua Vy Le Thanh
Generating Stack-based Access Control Policies
18 pages
null
null
null
cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stack-based access control mechanism plays a fundamental role in the security architecture of Java and Microsoft CLR (common language runtime). It is enforced at runtime by inspecting methods in the current call stack for granted permissions before the program performs safety-critical operations. Although stack inspection is well studied, there is relatively little work on automated generation of access control policies, and most existing work on inferring security policies assume the permissions to be checked at stack inspection points are known beforehand. Practiced approaches to generating access control policies are still manually done by developers based on domain-specific knowledges and trial-and-error testing. In this paper, we present a systematic approach to automated generation of access control policies for Java programs that necessarily ensure the program to pass stack inspection. The techniques are abstract interpretation based context-sensitive static program analyses. Our analysis models the program by combining a context-sensitive call graph with a dependency graph. We are hereby able to precisely identify permission requirements at stack inspection points, which are usually ignored in previous study.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 03:21:25 GMT" }, { "version": "v2", "created": "Sun, 13 Oct 2013 03:47:41 GMT" } ]
2013-10-15T00:00:00
[ [ "Li", "Xin", "" ], [ "Thanh", "Hua Vy Le", "" ] ]
new_dataset
0.998203
1310.3268
Umakant Mishra
Umakant Mishra
10 Inventions on collapsible keyboards: A TRIZ based analysis
Published in TRIZsite Journal, March 2005, also available in http://papers.ssrn.com/abstract=932268. arXiv admin note: text overlap with arXiv:1310.3070
null
10.2139/ssrn.932268
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although a bigger keyboard is often comfortable to work with, they cannot be fit into laptop and small size computer boxes. The portable and handheld computers need small size keyboards. So there is a need to reduce the size of the keyboard to fit into the laptop box. There are various mechanisms to reduce the size of the keyboard; collapsible keyboard is one of them. Although different inventions intend to achieve the same objective of reducing the keyboard size, they all differ in their mechanism. For example, some invention uses a compression mechanism, some invention uses a folding mechanism, and some invention uses a collapsing mechanism and so on. This article illustrates 10 inventions on collapsible keyboards from US patent database. Each case is analyzed from a TRIZ perspective.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 10:05:17 GMT" } ]
2013-10-15T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.998604
1310.3356
Feitian Li
Feitian Li, Fei Qiao, Qi Wei, Huazhong Yang
A Novel Reconfigurable Computing Architecture for Image Signal Processing Using Circuit-Switched NoC and Synchronous Dataflow Model
ISQED 2014,6 pages,7 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel reconfigurable architecture is proposed for multifunctional image signal processing systems. A circuit-switched NoC is used to provide interconnection because the non-TMD links ensure fixed throughput, which is a desirable behavior for computational intensive image processing algorithms compared with packet-switched NoC. Image processing algorithms are modeled as synchronous dataflow graphs which provide a unified model for general computing procedure. An image processing system is considered as several temporally mutually exclusive algorithms. Thus, their dataflow graph representations could be considered as a group and a merging algorithm could be applied to generate a union graph while eliminating spatial redundancy for area consumption optimization. After the union graph have been mapped and routed on the NoC, the reconfigurable system could be configured to any of its target image processing algorithms by properly setting the NoC topology. Experiments show the demo reconfigurable system with two image processing applications cost 26.4% less hardware resource, compared with the non-reconfigurable implementations.
[ { "version": "v1", "created": "Sat, 12 Oct 2013 10:05:07 GMT" } ]
2013-10-15T00:00:00
[ [ "Li", "Feitian", "" ], [ "Qiao", "Fei", "" ], [ "Wei", "Qi", "" ], [ "Yang", "Huazhong", "" ] ]
new_dataset
0.998241
1310.3473
Rohit Jha
Rohit Jha, Alfy Samuel, Ashmee Pawar, M. Kiruthika
A Domain-Specific Language for Discrete Mathematics
null
International Journal of Computer Applications 70(15):6-19, May 2013
10.5120/12036-7257
null
cs.PL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a Domain Specific Language (DSL) that has been developed to enable implementation of concepts of discrete mathematics. A library of data types and functions provides functionality which is frequently required by users. Covering the areas of Mathematical Logic, Set Theory, Functions, Graph Theory, Number Theory, Linear Algebra and Combinatorics, the language's syntax is close to the actual notation used in the specific fields.
[ { "version": "v1", "created": "Sun, 13 Oct 2013 12:28:54 GMT" } ]
2013-10-15T00:00:00
[ [ "Jha", "Rohit", "" ], [ "Samuel", "Alfy", "" ], [ "Pawar", "Ashmee", "" ], [ "Kiruthika", "M.", "" ] ]
new_dataset
0.999592
1310.3723
Jean Quilbeuf
Jean Quilbeuf, Georgeta Igna, Denis Bytschkow, Harald Ruess
Security policies for distributed systems
Submitted to POST14
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A security policy specifies a security property as the maximal information flow. A distributed system composed of interacting processes implicitly defines an intransitive security policy by repudiating direct information flow between processes that do not exchange messages directly. We show that implicitly defined security policies in distributed systems are enforced, provided that processes run in separation, and possible process communication on a technical platform is restricted to specified message paths of the system. Furthermore, we propose to further restrict the allowable information flow by adding filter functions for controlling which messages may be transmitted between processes, and we prove that locally checking filter functions is sufficient for ensuring global security policies. Altogether, global intransitive security policies are established by means of local verification conditions for the (trusted) processes of the distributed system. Moreover, security policies may be implemented securely on distributed integration platforms which ensure partitioning. We illustrate our results with a smart grid case study, where we use CTL model checking for discharging local verification conditions for each process under consideration.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 15:35:42 GMT" } ]
2013-10-15T00:00:00
[ [ "Quilbeuf", "Jean", "" ], [ "Igna", "Georgeta", "" ], [ "Bytschkow", "Denis", "" ], [ "Ruess", "Harald", "" ] ]
new_dataset
0.995687
1310.3808
Philipp Mayr
Howard D. White, Philipp Mayr
Pennants for Descriptors
3 pages, 1 figure, paper presented at the NKOS workshop at TPDL 2013
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new technique (called pennants) for displaying the descriptors related to a descriptor across literatures, rather in a thesaurus. It has definite implications for online searching and browsing. Pennants, named for the flag they resemble, are a form of algorithmic prediction. Their cognitive base is in relevance theory (RT) from linguistic pragmatics (Sperber & Wilson 1995).
[ { "version": "v1", "created": "Mon, 14 Oct 2013 19:49:34 GMT" } ]
2013-10-15T00:00:00
[ [ "White", "Howard D.", "" ], [ "Mayr", "Philipp", "" ] ]
new_dataset
0.971106
1304.6707
Rastislav \v{S}r\'amek
Mat\'u\v{s} Mihal\'ak and Rastislav \v{S}r\'amek and Peter Widmayer
Counting approximately-shortest paths in directed acyclic graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a directed acyclic graph with positive edge-weights, two vertices s and t, and a threshold-weight L, we present a fully-polynomial time approximation-scheme for the problem of counting the s-t paths of length at most L. We extend the algorithm for the case of two (or more) instances of the same problem. That is, given two graphs that have the same vertices and edges and differ only in edge-weights, and given two threshold-weights L_1 and L_2, we show how to approximately count the s-t paths that have length at most L_1 in the first graph and length at most L_2 in the second graph. We believe that our algorithms should find application in counting approximate solutions of related optimization problems, where finding an (optimum) solution can be reduced to the computation of a shortest path in a purpose-built auxiliary graph.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 19:46:23 GMT" }, { "version": "v2", "created": "Fri, 11 Oct 2013 13:41:42 GMT" } ]
2013-10-14T00:00:00
[ [ "Mihalák", "Matúš", "" ], [ "Šrámek", "Rastislav", "" ], [ "Widmayer", "Peter", "" ] ]
new_dataset
0.99784
1310.2960
Wei Liu Dr
Wei Zhang, Wei Liu, Siliang Wu, Ju Wang
Joint DOA and Array Manifold Estimation for a MIMO Array Using Two Calibrated Antennas
5 pages, 4 figures
null
null
null
cs.IT math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple scheme for joint direction of arrival (DOA) and array manifold estimation for a MIMO array system is proposed, where only two transmit antennas are calibrated initially. It first obtains a set of initial DOA results by employing a rotational invariance property between two sets of received data, and then more accurate DOA and array manifold estimation is obtained through a local searching algorithm with several iterations. No strict half wavelength spacing is required for the uncalibrated antennas to avoid the spatial aliasing problem.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 20:35:30 GMT" } ]
2013-10-14T00:00:00
[ [ "Zhang", "Wei", "" ], [ "Liu", "Wei", "" ], [ "Wu", "Siliang", "" ], [ "Wang", "Ju", "" ] ]
new_dataset
0.994958
1310.3070
Umakant Mishra
Umakant Mishra
Inventions on reducing keyboard size: A TRIZ based analysis
Published in TRIZsite Journal, March 2005, also available in http://papers.ssrn.com/abstract=931683
null
10.2139/ssrn.931683
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conventional computer keyboard consists of as many as 101 keys. The keyboard has several sections, such as text entry section, navigation section, and numeric keypad etc. and each having several keys on the keyboard. The size of the keyboard is a major inconvenience for portable computers, as they cannot be carried easily. Thus there are certain circumstances which compels to reduce the size of a keyboard. Reducing the size of a keyboard leads to several problems. A reduced size keyboard may not contain all the keys available on a full size keyboard; a reduced size keyboard may not be convenient to operate, a reduced size keyboard may have a different key layout which is difficult to learn etc. This article illustrates 10 inventions on reducing the size of the keyboard. Various inventions have attempted to solve the contradictions so that the user achieves the benefits of both "reduced size" and "typing comfort".
[ { "version": "v1", "created": "Fri, 11 Oct 2013 09:54:57 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999217
1310.3107
Marek Zawirski
Marek Zawirski (INRIA Rocquencourt, LIP6), Annette Bieniusa, Valter Balegas (CITI), S\'ergio Duarte (CITI), Carlos Baquero (Universidade do Minho Departamento de Inform\'atica), Marc Shapiro (INRIA Rocquencourt, LIP6), Nuno Pregui\c{c}a (CITI)
SwiftCloud: Fault-Tolerant Geo-Replication Integrated all the Way to the Client Machine
null
N° RR-8347 (2013)
null
RR-8347
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Client-side logic and storage are increasingly used in web and mobile applications to improve response time and availability. Current approaches tend to be ad-hoc and poorly integrated with the server-side logic. We present a principled approach to integrate client- and server-side storage. We support mergeable and strongly consistent transactions that target either client or server replicas and provide access to causally-consistent snapshots efficiently. In the presence of infrastructure faults, a client-assisted failover solution allows client execution to resume immediately and seamlessly access consistent snapshots without waiting. We implement this approach in SwiftCloud, the first transactional system to bring geo-replication all the way to the client machine. Example applications show that our programming model is useful across a range of application areas. Our experimental evaluation shows that SwiftCloud provides better fault tolerance and at the same time can improve both latency and throughput by up to an order of magnitude, compared to classical geo-replication techniques.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 12:38:58 GMT" } ]
2013-10-14T00:00:00
[ [ "Zawirski", "Marek", "", "INRIA Rocquencourt, LIP6" ], [ "Bieniusa", "Annette", "", "CITI" ], [ "Balegas", "Valter", "", "CITI" ], [ "Duarte", "Sérgio", "", "CITI" ], [ "Baquero", "Carlos", "", "Universidade do Minho\n Departamento de Informática" ], [ "Shapiro", "Marc", "", "INRIA Rocquencourt, LIP6" ], [ "Preguiça", "Nuno", "", "CITI" ] ]
new_dataset
0.999673
1310.3111
Umakant Mishra
Umakant Mishra
Keyboard for inputting Chinese language
Published in TRIZsite Journal, Apr 2005, also available in http://papers.ssrn.com/abstract=932271
null
10.2139/ssrn.932271
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the structure of Chinese characters are very different, it is very difficult to input Chinese characters into computer quickly and conveniently. The conventional keyboard does not support the pictorial characters in Chinese language. There are 3000 to 6000 commonly used pictorial Chinese characters (Hanzi). There are a few existing systems which include "PinYin" (phonetic) system, a combination of the PinYin system and character form techniques, whole character encoding, stroke input encoding, and stoke form encoding. Each of the methods have their own advantages and disadvantages. This article describes two inventions on inputting Chinese language through a standard keyboard.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 12:56:08 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999343
1310.3115
Umakant Mishra
Umakant Mishra
Keyboards for inputting Japanese language -A study based on US patents
Published in TRIZsite Journal, April 2005, also available at http://papers.ssrn.com/abstract=932272
null
10.2139/ssrn.932272
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most commonly used Japanese alphabets are Kanji, Hiragana and Katakana. The Kanji alphabet includes pictographs or ideographic characters that were adopted from the Chinese alphabet. Hiragana is used to spell words of Japanese origin, while Katakana is used to spell words of western or other foreign origin. Two methods are commonly used to input Japanese to the computer. One, the 'kana input method' that uses a keyboard having 46 Japanese iroha (or kana) letter keys. The other method is 'Roma-ji input method', where the Japanese letters are composed of English input from a standard QWERTY keyboard. Both the methods have their advantages and disadvantages. This article analyses two inventions on inputting Japanese language through a computer keyboard. One invention uses a standard English keyboard to input Japanese characters, the other invention uses a standard mobile phone key board to input the Japanese characters.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 13:15:30 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.992791
1310.3140
Umakant Mishra
Umakant Mishra
10 Inventions on Keyboard Key Switch Mechanism
Published in TRIZsite Journal, May 2005, also available in http://papers.ssrn.com/abstract=932273
null
10.2139/ssrn.932273
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key switches of the keyboard of a computer system are generally comprised of a key cap having a plunger, conductive rubber disposed above a membrane circuit and compressed by the plunger to trigger the membrane circuit causing it to produce an electric signal to the computer. Some key switches use springs. Some other keyboards use rubber domes or a dome sheet, which do the function of springs. When the user depresses the key button the spring or domes collapse. The key switch depresses the key stem, which actuates the button on the membrane circuit. When the user releases the button the springs or rubber domes push the button up to the rest position. This article illustrates 10 inventions on different key switch mechanism. The inventions are selected from US patent database. The inventions try to simplify the mechanism, reduce manufacturing cost, increase accuracy and reliability, and increase strength and robustness of the keys.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 14:23:27 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.999616
1310.3145
Umakant Mishra
Umakant Mishra
10 Inventions on special type of keyboards -A study based on US patents
Published in TRIZsite Journal, May 2005, also available in http://papers.ssrn.com/abstract=932275
null
10.2139/ssrn.932275
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A keyboard is the most important input device for a computer. It is used with various types and sizes of computer. But the same standard keyboard will not work efficiently with different types of computers at different environments. There is a need to develop special keyboards to meet special requirements. This article illustrates 10 inventions on special types of keyboards. The special keyboard are used in special computers or computers used for special purposes. A special keyboard is to be understood as a keyboard having features beyond a normal keyboard. The example of special keyboards are, a children's keyboard which may be colorful and attractive, a keyboard in public place need to be more robust, the keyboard in a palmtop may have less number of keys, the keyboard for a game station may have special attachments, a multimedia keyboard may have CD ROM and speakers, a wireless keyboard may have remote control features, a touch sensitive keyboard may have sensors on the keys and so on.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 14:40:49 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.997658
1310.3165
Umakant Mishra
Umakant Mishra
10 Inventions on Key Guides and Keyboard Templates
Published in TRIZsite Journal, June 2005, also available at http://papers.ssrn.com/abstract=932276
null
10.2139/ssrn.932276
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A keyboard has many function keys and each function key can have multiple functions when used with control, shift and alt keys, it is difficult for a user to remember the functionality of the function keys. We need a mechanism to indicate the operations assigned to each function key for different software programs. A keyboard guide or template is used for this purpose. This article illustrates 10 inventions on keyboard key guide and function key templates selected from US patent database. Various mechanisms of keyboard templates have been proposed, including static, dynamic, manual, mechanical, onscreen display and others.
[ { "version": "v1", "created": "Fri, 11 Oct 2013 15:21:05 GMT" } ]
2013-10-14T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.99201
1310.2814
Suyash Gupta
Suyash Gupta, V. Krishna Nandivada
IMSuite: A Benchmark Suite for Simulating Distributed Algorithms
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Considering the diverse nature of real-world distributed applications that makes it hard to identify a representative subset of distributed benchmarks, we focus on their underlying distributed algorithms. We present and characterize a new kernel benchmark suite (named IMSuite) that simulates some of the classical distributed algorithms in task parallel languages. We present multiple variations of our kernels, broadly categorized under two heads: (a) varying synchronization primitives (with and without fine grain synchronization primitives); and (b) varying forms of parallelization (data parallel and recursive task parallel). Our characterization covers interesting aspects of distributed applications such as distribution of remote communication requests, number of synchronization, task creation, task termination and atomic operations. We study the behavior (execution time) of our kernels by varying the problem size, the number of compute threads, and the input configurations. We also present an involved set of input generators and output validators.
[ { "version": "v1", "created": "Thu, 10 Oct 2013 13:40:51 GMT" } ]
2013-10-11T00:00:00
[ [ "Gupta", "Suyash", "" ], [ "Nandivada", "V. Krishna", "" ] ]
new_dataset
0.997856
1310.2342
Heba Aly
Heba Aly, Moustafa Youssef
Dejavu: An Accurate Energy-Efficient Outdoor Localization System
null
21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2013)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Dejavu, a system that uses standard cell-phone sensors to provide accurate and energy-efficient outdoor localization suitable for car navigation. Our analysis shows that different road landmarks have a unique signature on cell-phone sensors; For example, going inside tunnels, moving over bumps, going up a bridge, and even potholes all affect the inertial sensors on the phone in a unique pattern. Dejavu employs a dead-reckoning localization approach and leverages these road landmarks, among other automatically discovered abundant virtual landmarks, to reset the accumulated error and achieve accurate localization. To maintain a low energy profile, Dejavu uses only energy-efficient sensors or sensors that are already running for other purposes. We present the design of Dejavu and how it leverages crowd-sourcing to automatically learn virtual landmarks and their locations. Our evaluation results from implementation on different android devices in both city and highway driving show that Dejavu can localize cell phones to within 8.4m median error in city roads and 16.6m on highways. Moreover, compared to GPS and other state-of-the-art systems, Dejavu can extend the battery lifetime by 347%, achieving even better localization results than GPS in the more challenging in-city driving conditions.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 04:38:58 GMT" } ]
2013-10-10T00:00:00
[ [ "Aly", "Heba", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.999294
1310.2452
Iti Sharma
Iti Sharma
Fully Homomorphic Encryption Scheme with Symmetric Keys
64 pages, dissertation report
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
Homomorphic encryption has largely been studied in context of public key cryptosystems. But there are applications which inherently would require symmetric keys. We propose a symmetric key encryption scheme with fully homomorphic evaluation capabilities. The operations are matrix based, that is the scheme consists of mapping the operations on integers to operations on matrix. We also include a protocol which uses the proposed scheme for private data processing in clouds.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 12:21:03 GMT" } ]
2013-10-10T00:00:00
[ [ "Sharma", "Iti", "" ] ]
new_dataset
0.990679
1310.2464
Elvinia Riccobene
Elvinia Riccobene
Eclipse-IT 2013: Proceedings of VIII Workshop of the Italian Eclipse Community
conference eclipse it 2013 - Crema 19-20 September 2013 - ISBN: 978-88-904388-4-4
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the extended abstracts of the contributions presented at EclipseIT 2013, the 8th workshop of the Italian Eclipse Community, hosted by the Computer Science Department of the University of Milan (Crema Campus) on September 19-20, 2013. Although Eclipse was initially designed as an integrated development environment (IDE) for object-oriented application development, today it represents an open development platform comprised of extensible frameworks, tools and runtimes for building, deploying and managing software. Around Eclipse, an international live community continuously works on improving the framework and on promoting the use of Eclipse. That happens also in Italy. This workshop is, indeed, the eighth yearly meeting of the Italian Eclipse Community which includes universities, public institutions and industries, researchers and practitioners, students and professionals, all joined by the interest in experimenting, extending, and supporting the Eclipse platform. The special topic of this edition is the Software cooperative development for mobile applications. Two tutorials are offered on this theme: (1) Sviluppo di applicazioni enterprise per il mobile con IBM Jazz, Eclipse e Worklight by Ferdinando Gorga from IBM, and (2) Uso di Eclipse per lo sviluppo cooperativo del software, by Paolo Maresca of the University of Naples, Federico II.
[ { "version": "v1", "created": "Wed, 9 Oct 2013 13:13:28 GMT" } ]
2013-10-10T00:00:00
[ [ "Riccobene", "Elvinia", "" ] ]
new_dataset
0.999179
0805.2855
Ed Summers
Ed Summers, Antoine Isaac, Clay Redding, Dan Krech
LCSH, SKOS and Linked Data
Submission for the Dublin Core 2008 conference in Berlin
Web Semantics: Science, Services and Agents on the World Wide Web, Volume 20, May 2013, Pages 35-49, ISSN 1570-8268
10.1016/j.websem.2013.05.001
null
cs.DL cs.IR
http://creativecommons.org/licenses/publicdomain/
A technique for converting Library of Congress Subject Headings MARCXML to Simple Knowledge Organization System (SKOS) RDF is described. Strengths of the SKOS vocabulary are highlighted, as well as possible points for extension, and the integration of other semantic web vocabularies such as Dublin Core. An application for making the vocabulary available as linked-data on the Web is also described.
[ { "version": "v1", "created": "Mon, 19 May 2008 13:11:41 GMT" }, { "version": "v2", "created": "Tue, 24 Jun 2008 18:25:51 GMT" }, { "version": "v3", "created": "Thu, 3 Jul 2008 12:57:39 GMT" } ]
2013-10-09T00:00:00
[ [ "Summers", "Ed", "" ], [ "Isaac", "Antoine", "" ], [ "Redding", "Clay", "" ], [ "Krech", "Dan", "" ] ]
new_dataset
0.961724
1310.1975
Brendan O'Connor
Brendan O'Connor and Michael Heilman
ARKref: a rule-based coreference resolution system
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ARKref is a tool for noun phrase coreference. It is a deterministic, rule-based system that uses syntactic information from a constituent parser, and semantic information from an entity recognition component. Its architecture is based on the work of Haghighi and Klein (2009). ARKref was originally written in 2009. At the time of writing, the last released version was in March 2011. This document describes that version, which is open-source and publicly available at: http://www.ark.cs.cmu.edu/ARKref
[ { "version": "v1", "created": "Tue, 8 Oct 2013 00:30:51 GMT" } ]
2013-10-09T00:00:00
[ [ "O'Connor", "Brendan", "" ], [ "Heilman", "Michael", "" ] ]
new_dataset
0.998472
1310.2045
Oliver Johnson
Oliver Johnson
A de Bruijn identity for symmetric stable laws
null
null
null
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how some attractive information--theoretic properties of Gaussians pass over to more general families of stable densities. We define a new score function for symmetric stable laws, and use it to give a stable version of the heat equation. Using this, we derive a version of the de Bruijn identity, allowing us to write the derivative of relative entropy as an inner product of score functions. We discuss maximum entropy properties of symmetric stable densities.
[ { "version": "v1", "created": "Tue, 8 Oct 2013 08:52:22 GMT" } ]
2013-10-09T00:00:00
[ [ "Johnson", "Oliver", "" ] ]
new_dataset
0.992219
1310.2051
Liu Yi
Yi Liu, Xiang-Gen Xia, and Hailin Zhang
Distributed Space-Time Coding for Full-Duplex Asynchronous Cooperative Communications
9 pages, 7 figures
IEEE transactions on wireless communications, Vol. 11, No. 7, July 2012
10.1109/TWC.2012.060212.112214
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose two distributed linear convolutional space-time coding (DLC-STC) schemes for full-duplex (FD) asynchronous cooperative communications. The DLC-STC Scheme 1 is for the case of the complete loop channel cancellation, which achieves the full asynchronous cooperative diversity. The DLC-STC Scheme 2 is for the case of the partial loop channel cancellation and amplifying, where some loop signals are used as the self-coding instead of treated as interference to be directly cancelled. We show this scheme can achieve full asynchronous cooperative diversity. We then evaluate the performance of the two schemes when loop channel information is not accurate and present an amplifying factor control method for the DLC-STC Scheme 2 to improve its performance with inaccurate loop channel information. Simulation results show that the DLC-STC Scheme 1 outperforms the DLC-STC Scheme 2 and the delay diversity scheme if perfect or high quality loop channel information is available at the relay, while the DLC-STC Scheme 2 achieves better performance if the loop channel information is imperfect.
[ { "version": "v1", "created": "Tue, 8 Oct 2013 09:10:09 GMT" } ]
2013-10-09T00:00:00
[ [ "Liu", "Yi", "" ], [ "Xia", "Xiang-Gen", "" ], [ "Zhang", "Hailin", "" ] ]
new_dataset
0.993757
1304.2333
Felix Effenberger
Felix Effenberger
A primer on information theory, with applications to neuroscience
60 pages, 19 figures
null
null
null
cs.IT math.IT q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the constant rise in quantity and quality of data obtained from neural systems on many scales ranging from molecular to systems', information-theoretic analyses became increasingly necessary during the past few decades in the neurosciences. Such analyses can provide deep insights into the functionality of such systems, as well as a rigid mathematical theory and quantitative measures of information processing in both healthy and diseased states of neural systems. This chapter will present a short introduction to the fundamentals of information theory, especially suited for people having a less firm background in mathematics and probability theory. To begin, the fundamentals of probability theory such as the notion of probability, probability distributions, and random variables will be reviewed. Then, the concepts of information and entropy (in the sense of Shannon), mutual information, and transfer entropy (sometimes also referred to as conditional mutual information) will be outlined. As these quantities cannot be computed exactly from measured data in practice, estimation techniques for information-theoretic quantities will be presented. The chapter will conclude with the applications of information theory in the field of neuroscience, including questions of possible medical applications and a short review of software packages that can be used for information-theoretic analyses of neural data.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 19:51:38 GMT" }, { "version": "v2", "created": "Mon, 7 Oct 2013 16:24:00 GMT" } ]
2013-10-08T00:00:00
[ [ "Effenberger", "Felix", "" ] ]
new_dataset
0.988731
1310.1390
Philipp Neidh\"ofer
Annemarie Harzl, Philipp Neidhoefer, Valentin Rock, Maximilian Schafzahl, Wolfgang Slany
A Scratch-like visual programming system for Microsoft Windows Phone 8
2 pages, 5 figures, Published in PRoMoTo'13 [arXiv:1309.5500]
null
null
PrMoTo/2013/07
cs.CY cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pocket Code is a free and open source mobile visual programming system for the Catrobat language. It allows users, starting from the age of eight, to develop games and animations with their smartphones. Children can create programs with their Android phone, iPhone, Windows Phone, or other smartphone with an HTML5 browser. No notebook or desktop computer is needed. Pocket Code is inspired by, but distinct from, the Scratch programming system developed by the Lifelong Kindergarten Group at the MIT Media Lab. This tool demo describes an in-practice experience with Pocket Code, the Windows Phone IDE for the Catrobat language.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 06:57:55 GMT" } ]
2013-10-08T00:00:00
[ [ "Harzl", "Annemarie", "" ], [ "Neidhoefer", "Philipp", "" ], [ "Rock", "Valentin", "" ], [ "Schafzahl", "Maximilian", "" ], [ "Slany", "Wolfgang", "" ] ]
new_dataset
0.999714
1310.1442
Cunsheng Ding
Cunsheng Ding and Zhengchun Zhou
Binary Cyclic Codes from Explicit Polynomials over $\gf(2^m)$
arXiv admin note: substantial text overlap with arXiv:1206.4687, arXiv:1206.4370
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. In this paper, monomials and trinomials over finite fields with even characteristic are employed to construct a number of families of binary cyclic codes. Lower bounds on the minimum weight of some families of the cyclic codes are developed. The minimum weights of other families of the codes constructed in this paper are determined. The dimensions of the codes are flexible. Some of the codes presented in this paper are optimal or almost optimal in the sense that they meet some bounds on linear codes. Open problems regarding binary cyclic codes from monomials and trinomials are also presented.
[ { "version": "v1", "created": "Sat, 5 Oct 2013 05:14:07 GMT" } ]
2013-10-08T00:00:00
[ [ "Ding", "Cunsheng", "" ], [ "Zhou", "Zhengchun", "" ] ]
new_dataset
0.999133
1310.1551
Dr. R.V. Krishnaiah
T. Ravi Kumar and R. V. Krishnaiah
Optical Disk with Blu-Ray Technology
10 pages International Journal of Computer Engineering and Applications; 2013
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blu-ray is the name of a next-generation optical disc format jointly developed by the Blu-ray Disc Association a group of the world's leading consumer electronics, personal computer and media manufacturers. The format was developed to enable recording, rewriting and playback of high-definition video, as well as storing large amounts of data. This extra capacity combined with the use of advanced video and audio codec will offer consumers an unprecedented HD experience. While current optical disc technologies such as DVD and DVDRAM rely on a red laser to read and write data, the new format uses a blue-violet laser instead, hence the name Blu-ray. Blu ray also promises some added security, making ways for copyright protections. Blu-ray discs can have a unique ID written on them to have copyright protection inside the recorded streams. Blu .ray disc takes the DVD technology one step further, just by using a laser with a nice color.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 07:13:19 GMT" } ]
2013-10-08T00:00:00
[ [ "Kumar", "T. Ravi", "" ], [ "Krishnaiah", "R. V.", "" ] ]
new_dataset
0.999716
1310.1590
Arnab Bhattacharya
Paheli Bhattacharya and Arnab Bhattacharya
Evolution of the Modern Phase of Written Bangla: A Statistical Study
LCC 2013
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Active languages such as Bangla (or Bengali) evolve over time due to a variety of social, cultural, economic, and political issues. In this paper, we analyze the change in the written form of the modern phase of Bangla quantitatively in terms of character-level, syllable-level, morpheme-level and word-level features. We collect three different types of corpora---classical, newspapers and blogs---and test whether the differences in their features are statistically significant. Results suggest that there are significant changes in the length of a word when measured in terms of characters, but there is not much difference in usage of different characters, syllables and morphemes in a word or of different words in a sentence. To the best of our knowledge, this is the first work on Bangla of this kind.
[ { "version": "v1", "created": "Sun, 6 Oct 2013 14:37:05 GMT" } ]
2013-10-08T00:00:00
[ [ "Bhattacharya", "Paheli", "" ], [ "Bhattacharya", "Arnab", "" ] ]
new_dataset
0.998545
1310.1732
Anas Chaaban
Anas Chaaban and Aydin Sezgin
The Approximate Capacity Region of the Gaussian Y-Channel
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A full-duplex wireless network with three users that want to establish full message-exchange via a relay is considered. Thus, the network known as the Y-channel has a total of 6 messages, 2 outgoing and 2 incoming at each user. The users are not physically connected, and thus the relay is essential for their communication. The linear-shift deterministic Y-channel is considered first, its capacity region is characterized and shown not to be given by the cut-set bounds. The capacity achieving scheme has three different components (strategies): a bi-directional, a cyclic, and a uni-directional strategy. Network coding is used to realize the bi-directional and the cyclic strategies, and thus to prove the achievability of the capacity region. The result is then extended to the Gaussian Y-channel where the capacity region is characterized within a constant gap independent of the channel parameters.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 11:06:54 GMT" } ]
2013-10-08T00:00:00
[ [ "Chaaban", "Anas", "" ], [ "Sezgin", "Aydin", "" ] ]
new_dataset
0.998668
1310.1891
Mary Wootters
Atri Rudra and Mary Wootters
Every list-decodable code for high noise has abundant near-optimal rate puncturings
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that any q-ary code with sufficiently good distance can be randomly punctured to obtain, with high probability, a code that is list decodable up to radius $1 - 1/q - \epsilon$ with near-optimal rate and list sizes. Our results imply that "most" Reed-Solomon codes are list decodable beyond the Johnson bound, settling the long-standing open question of whether any Reed Solomon codes meet this criterion. More precisely, we show that a Reed-Solomon code with random evaluation points is, with high probability, list decodable up to radius $1 - \epsilon$ with list sizes $O(1/\epsilon)$ and rate $\Omega(\epsilon)$. As a second corollary of our argument, we obtain improved bounds on the list decodability of random linear codes over large fields. Our approach exploits techniques from high dimensional probability. Previous work used similar tools to obtain bounds on the list decodability of random linear codes, but the bounds did not scale with the size of the alphabet. In this paper, we use a chaining argument to deal with large alphabet sizes.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 19:18:51 GMT" } ]
2013-10-08T00:00:00
[ [ "Rudra", "Atri", "" ], [ "Wootters", "Mary", "" ] ]
new_dataset
0.973964
1310.1896
Jos\'e A. Soto
Jos\'e R. Correa, Omar Larr\'e, and Jos\'e A. Soto
TSP Tours in Cubic Graphs: Beyond 4/3
23 pages. A preliminary version appeared in ESA 2012
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After a sequence of improvements Boyd, Sitters, van der Ster, and Stougie proved that any 2-connected graph whose n vertices have degree 3, i.e., a cubic 2-connected graph, has a Hamiltonian tour of length at most (4/3)n, establishing in particular that the integrality gap of the subtour LP is at most 4/3 for cubic 2-connected graphs and matching the conjectured value of the famous 4/3 conjecture. In this paper we improve upon this result by designing an algorithm that finds a tour of length (4/3 - 1/61236)n, implying that cubic 2-connected graphs are among the few interesting classes of graphs for which the integrality gap of the subtour LP is strictly less than 4/3. With the previous result, and by considering an even smaller epsilon, we show that the integrality gap of the TSP relaxation is at most 4/3 - epsilon, even if the graph is not 2-connected (i.e. for cubic connected graphs), implying that the approximability threshold of the TSP in cubic graphs is strictly below 4/3. Finally, using similar techniques we show, as an additional result, that every Barnette graph admits a tour of length at most (4/3 - 1/18)n.
[ { "version": "v1", "created": "Mon, 7 Oct 2013 19:35:53 GMT" } ]
2013-10-08T00:00:00
[ [ "Correa", "José R.", "" ], [ "Larré", "Omar", "" ], [ "Soto", "José A.", "" ] ]
new_dataset
0.995754
1212.3251
Tony Tan
Tony Tan
Automata for two-variable logic over trees with ordered data values
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data trees are trees in which each node, besides carrying a label from a finite alphabet, also carries a data value from an infinite domain. They have been used as an abstraction model for reasoning tasks on {XML} and verification. However, most existing approaches consider the case where only equality test can be performed on the data values. In this paper we study data trees in which the data values come from a linearly ordered domain, and in addition to equality test, we can test whether the data value in a node is greater than the one in another node. We introduce an automata model for them which we call ordered-data tree automata (ODTA), provide its logical characterisation, and prove that its non-emptiness problem is decidable in 3-NEXPTIME. We also show that the two-variable logic on unranked trees, studied by Bojanczyk, Muscholl, Schwentick and Segoufin in 2009, corresponds precisely to a special subclass of this automata model. Then we define a slightly weaker version of ODTA, which we call weak ODTA, and provide its logical characterisation. The complexity of the non-emptiness problem drops to NP. However, a number of existing formalisms and models studied in the literature can be captured already by weak ODTA. We also show that the definition of ODTA can be easily modified, to the case where the data values come from a tree-like partially ordered domain, such as strings.
[ { "version": "v1", "created": "Thu, 13 Dec 2012 18:18:54 GMT" }, { "version": "v2", "created": "Fri, 4 Oct 2013 15:54:59 GMT" } ]
2013-10-07T00:00:00
[ [ "Tan", "Tony", "" ] ]
new_dataset
0.994692
1310.1137
Jeremiah Blocki
Jeremiah Blocki and Manuel Blum and Anupam Datta
GOTCHA Password Hackers!
2013 ACM Workshop on Artificial Intelligence and Security (AISec)
null
10.1145/2517312.2517319
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are easy for the human to solve. (2) The puzzles are hard for a computer to solve even if it has the random bits used by the computer to generate the final puzzle --- unlike a CAPTCHA. Our main theorem demonstrates that GOTCHAs can be used to mitigate the threat of offline dictionary attacks against passwords by ensuring that a password cracker must receive constant feedback from a human being while mounting an attack. Finally, we provide a candidate construction of GOTCHAs based on Inkblot images. Our construction relies on the usability assumption that users can recognize the phrases that they originally used to describe each Inkblot image --- a much weaker usability assumption than previous password systems based on Inkblots which required users to recall their phrase exactly. We conduct a user study to evaluate the usability of our GOTCHA construction. We also generate a GOTCHA challenge where we encourage artificial intelligence and security researchers to try to crack several passwords protected with our scheme.
[ { "version": "v1", "created": "Fri, 4 Oct 2013 00:29:48 GMT" } ]
2013-10-07T00:00:00
[ [ "Blocki", "Jeremiah", "" ], [ "Blum", "Manuel", "" ], [ "Datta", "Anupam", "" ] ]
new_dataset
0.986859
1310.1249
Andrzej Jarynowski
Andrzej Jarynowski, Amir Rostami
Reading Stockholm Riots 2013 in social media by text-mining
5p
null
null
null
cs.SI cs.CL physics.soc-ph stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The riots in Stockholm in May 2013 were an event that reverberated in the world media for its dimension of violence that had spread through the Swedish capital. In this study we have investigated the role of social media in creating media phenomena via text mining and natural language processing. We have focused on two channels of communication for our analysis: Twitter and Poloniainfo.se (Forum of Polish community in Sweden). Our preliminary results show some hot topics driving discussion related mostly to Swedish Police and Swedish Politics by counting word usage. Typical features for media intervention are presented. We have built networks of most popular phrases, clustered by categories (geography, media institution, etc.). Sentiment analysis shows negative connotation with Police. The aim of this preliminary exploratory quantitative study was to generate questions and hypotheses, which we could carefully follow by deeper more qualitative methods.
[ { "version": "v1", "created": "Fri, 4 Oct 2013 13:04:45 GMT" } ]
2013-10-07T00:00:00
[ [ "Jarynowski", "Andrzej", "" ], [ "Rostami", "Amir", "" ] ]
new_dataset
0.994776
1310.1257
Fabian Pedregosa
Michael Eickenberg (INRIA Saclay - Ile de France, LNAO), Fabian Pedregosa (INRIA Saclay - Ile de France, INRIA Paris - Rocquencourt), Senoussi Mehdi (INRIA Saclay - Ile de France), Alexandre Gramfort (LTCI), Bertrand Thirion (INRIA Saclay - Ile de France)
Second order scattering descriptors predict fMRI activity due to visual textures
3nd International Workshop on Pattern Recognition in NeuroImaging (2013)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Second layer scattering descriptors are known to provide good classification performance on natural quasi-stationary processes such as visual textures due to their sensitivity to higher order moments and continuity with respect to small deformations. In a functional Magnetic Resonance Imaging (fMRI) experiment we present visual textures to subjects and evaluate the predictive power of these descriptors with respect to the predictive power of simple contour energy - the first scattering layer. We are able to conclude not only that invariant second layer scattering coefficients better encode voxel activity, but also that well predicted voxels need not necessarily lie in known retinotopic regions.
[ { "version": "v1", "created": "Sat, 10 Aug 2013 13:00:39 GMT" } ]
2013-10-07T00:00:00
[ [ "Eickenberg", "Michael", "", "INRIA Saclay - Ile de France, LNAO" ], [ "Pedregosa", "Fabian", "", "INRIA Saclay - Ile de France, INRIA Paris - Rocquencourt" ], [ "Mehdi", "Senoussi", "", "INRIA Saclay - Ile de France" ], [ "Gramfort", "Alexandre", "", "LTCI" ], [ "Thirion", "Bertrand", "", "INRIA Saclay - Ile de France" ] ]
new_dataset
0.995788
1208.5412
Victor Marsault
Victor Marsault, Jacques Sakarovitch
On sets of numbers rationally represented in a rational base number system
null
5th International Conference, CAI 2013, Porquerolles, France, September 3-6, 2013. Proceedings
10.1007/978-3-642-40663-8_10
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, it is proved that a set of numbers closed under addition and whose representations in a rational base numeration system is a rational language is not a finitely generated additive monoid. A key to the proof is the definition of a strong combinatorial property on languages : the bounded left iteration property. It is both an unnatural property in usual formal language theory (as it contradicts any kind of pumping lemma) and an ideal fit to the languages defined through rational base number systems.
[ { "version": "v1", "created": "Mon, 27 Aug 2012 14:49:45 GMT" }, { "version": "v2", "created": "Thu, 3 Oct 2013 08:20:57 GMT" } ]
2013-10-04T00:00:00
[ [ "Marsault", "Victor", "" ], [ "Sakarovitch", "Jacques", "" ] ]
new_dataset
0.989836
1310.0867
Zheng Dong
Zheng Dong and Arjmand Samuel
Touch-enabled Programming for the Lab of Things
3 pages, 3 figures, PROMOTO 2013, 1309.5500
null
null
PrMoTo/2013/06
cs.PL cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lab of Things (LoT, lab-of-things.com) is a research platform for interconnection, programming, and large scale deployment of devices and sensors. These devices and sensors can then be used for deployment of field studies in a variety of research areas including elderly care, energy management, and the like. LoT is built on top of HomeOS, a middle-ware component, making interconnection of a wide range of devices possible. LoT also provides cloud storage and remote monitoring capabilities. Traditionally programming on the LoT platform has been done using C# in Microsoft Visual Studio. While LoT programs developed on the .NET framework offer a rich set of functionality, writing programs on LoT can be challenging for developers who are not experienced with the technology involved. In this demonstration, we introduce an innovative programming approach on the LoT platform by building a Generic Application and creating corresponding libraries on the user-friendly TouchDevelop (touchdevelop.com) programming environment. As an example, we implemented the same functionality of the Lab of Things Alerts application using the new Generic App. In addition to a touch-enabled programming environment, the new approach also significantly saves time and effort developers have to devote when creating a customized Lab of Things application.
[ { "version": "v1", "created": "Thu, 3 Oct 2013 00:21:53 GMT" } ]
2013-10-04T00:00:00
[ [ "Dong", "Zheng", "" ], [ "Samuel", "Arjmand", "" ] ]
new_dataset
0.999214
1309.5275
Dan Stowell
Dan Stowell and Mark D. Plumbley
An open dataset for research on audio field recording archives: freefield1010
null
null
null
null
cs.SD cs.DL
http://creativecommons.org/licenses/by/3.0/
We introduce a free and open dataset of 7690 audio clips sampled from the field-recording tag in the Freesound audio archive. The dataset is designed for use in research related to data mining in audio archives of field recordings / soundscapes. Audio is standardised, and audio and metadata are Creative Commons licensed. We describe the data preparation process, characterise the dataset descriptively, and illustrate its use through an auto-tagging experiment.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 14:12:04 GMT" }, { "version": "v2", "created": "Tue, 1 Oct 2013 21:29:13 GMT" } ]
2013-10-03T00:00:00
[ [ "Stowell", "Dan", "" ], [ "Plumbley", "Mark D.", "" ] ]
new_dataset
0.999716
1310.0524
Reshad Patuck
Reshad Patuck and Julio Hernandez-Castro
Steganography using the Extensible Messaging and Presence Protocol (XMPP)
13 pages, 3 figures, 2 tables
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here the first work to propose different mechanisms for hiding data in the Extensible Messaging and Presence Protocol (XMPP). This is a very popular instant messaging protocol used by many messaging platforms such as Google Talk, Cisco, LiveJournal and many others. Our paper describes how to send a secret message from one XMPP client to another, without raising the suspicion of any intermediaries. The methods described primarily focus on using the underlying protocol as a means for steganography, unlike other related works that try to hide data in the content of instant messages. In doing so, we provide a more robust means of data hiding and additionally offer some preliminary analysis of its general security, in particular against entropic-based steganalysis.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 12:00:29 GMT" } ]
2013-10-03T00:00:00
[ [ "Patuck", "Reshad", "" ], [ "Hernandez-Castro", "Julio", "" ] ]
new_dataset
0.960029
1206.2038
Tien Tuan Anh Dinh
Dinh Tien Tuan Anh, Quach Vinh Thanh, Anwitaman Datta
CloudMine: Multi-Party Privacy-Preserving Data Analytics Service
null
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An increasing number of businesses are replacing their data storage and computation infrastructure with cloud services. Likewise, there is an increased emphasis on performing analytics based on multiple datasets obtained from different data sources. While ensuring security of data and computation outsourced to a third party cloud is in itself challenging, supporting analytics using data distributed across multiple, independent clouds is even further from trivial. In this paper we present CloudMine, a cloud-based service which allows multiple data owners to perform privacy-preserved computation over the joint data using their clouds as delegates. CloudMine protects data privacy with respect to semi-honest data owners and semi-honest clouds. It furthermore ensures the privacy of the computation outputs from the curious clouds. It allows data owners to reliably detect if their cloud delegates have been lazy when carrying out the delegated computation. CloudMine can run as a centralized service on a single cloud, or as a distributed service over multiple, independent clouds. CloudMine supports a set of basic computations that can be used to construct a variety of highly complex, distributed privacy-preserving data analytics. We demonstrate how a simple instance of CloudMine (secure sum service) is used to implement three classical data mining tasks (classification, association rule mining and clustering) in a cloud environment. We experiment with a prototype of the service, the results of which suggest its practicality for supporting privacy-preserving data analytics as a (multi) cloud-based service.
[ { "version": "v1", "created": "Sun, 10 Jun 2012 16:27:48 GMT" }, { "version": "v2", "created": "Tue, 1 Oct 2013 05:14:19 GMT" } ]
2013-10-02T00:00:00
[ [ "Anh", "Dinh Tien Tuan", "" ], [ "Thanh", "Quach Vinh", "" ], [ "Datta", "Anwitaman", "" ] ]
new_dataset
0.997807
1306.1957
Christopher Thraves Caro
Mauricio Soto and Christopher Thraves
(c-)AND: A new graph model
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this document, we study the scope of the following graph model: each vertex is assigned to a box in a metric space and to a representative element that belongs to that box. Two vertices are connected by an edge if and only if its respective boxes contain the opposite representative element. We focus our study on the case where boxes (and therefore representative elements) associated to vertices are spread in the Euclidean line. We give both, a combinatorial and an intersection characterization of the model. Based on these characterizations, we determine graph families that contain the model (e. g., boxicity 2 graphs) and others that the new model contains (e. g., rooted directed path). We also study the particular case where each representative element is the center of its respective box. In this particular case, we provide constructive representations for interval, block and outerplanar graphs. Finally, we show that the general and the particular model are not equivalent by constructing a graph family that separates the two cases.
[ { "version": "v1", "created": "Sat, 8 Jun 2013 20:38:54 GMT" }, { "version": "v2", "created": "Thu, 20 Jun 2013 18:17:33 GMT" }, { "version": "v3", "created": "Tue, 1 Oct 2013 19:45:41 GMT" } ]
2013-10-02T00:00:00
[ [ "Soto", "Mauricio", "" ], [ "Thraves", "Christopher", "" ] ]
new_dataset
0.998307
1310.0185
Mary Cryan
Prasad Chebolu, Mary Cryan, Russell Martin
Exact counting of Euler Tours for Graphs of Bounded Treewidth
16 pages, draft
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we give a simple polynomial-time algorithm to exactly count the number of Euler Tours (ETs) of any Eulerian graph of bounded treewidth. The problems of counting ETs are known to be #P-complete for general graphs (Brightwell and Winkler, (Brightwell and Winkler, 2005). To date, no polynomial-time algorithm for counting Euler tours of any class of graphs is known except for the very special case of series-parallel graphs (which have treewidth 2).
[ { "version": "v1", "created": "Tue, 1 Oct 2013 08:35:14 GMT" } ]
2013-10-02T00:00:00
[ [ "Chebolu", "Prasad", "" ], [ "Cryan", "Mary", "" ], [ "Martin", "Russell", "" ] ]
new_dataset
0.991903
1310.0250
Patrick O. Glauner
Patrick O. Glauner, Jan Iwaszkiewicz, Jean-Yves Le Meur and Tibor Simko
Use of Solr and Xapian in the Invenio document repository software
null
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Invenio is a free comprehensive web-based document repository and digital library software suite originally developed at CERN. It can serve a variety of use cases from an institutional repository or digital library to a web journal. In order to fully use full-text documents for efficient search and ranking, Solr was integrated into Invenio through a generic bridge. Solr indexes extracted full-texts and most relevant metadata. Consequently, Invenio takes advantage of Solr's efficient search and word similarity ranking capabilities. In this paper, we first give an overview of Invenio, its capabilities and features. We then present our open source Solr integration as well as scalability challenges that arose for an Invenio-based multi-million record repository: the CERN Document Server. We also compare our Solr adapter to an alternative Xapian adapter using the same generic bridge. Both integrations are distributed with the Invenio package and ready to be used by the institutions using or adopting Invenio.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 11:37:06 GMT" } ]
2013-10-02T00:00:00
[ [ "Glauner", "Patrick O.", "" ], [ "Iwaszkiewicz", "Jan", "" ], [ "Meur", "Jean-Yves Le", "" ], [ "Simko", "Tibor", "" ] ]
new_dataset
0.997372
1310.0296
Hiroyuki Kawai
Hiroyuki Kawai, Matthew J. Bellman, Ryan J. Downey, Warren E. Dixon
Tracking Control for FES-Cycling based on Force Direction Efficiency with Antagonistic Bi-Articular Muscles
8 pages, 4 figures, submitted to ACC2014
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A functional electrical stimulation (FES)-based tracking controller is developed to enable cycling based on a strategy to yield force direction efficiency by exploiting antagonistic bi-articular muscles. Given the input redundancy naturally occurring among multiple muscle groups, the force direction at the pedal is explicitly determined as a means to improve the efficiency of cycling. A model of a stationary cycle and rider is developed as a closed-chain mechanism. A strategy is then developed to switch between muscle groups for improved efficiency based on the force direction of each muscle group. Stability of the developed controller is analyzed through Lyapunov-based methods.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 13:54:20 GMT" } ]
2013-10-02T00:00:00
[ [ "Kawai", "Hiroyuki", "" ], [ "Bellman", "Matthew J.", "" ], [ "Downey", "Ryan J.", "" ], [ "Dixon", "Warren E.", "" ] ]
new_dataset
0.986999
1310.0310
Tomislav Petkovi\'c
Ivan Kre\v{s}o, Marko \v{S}evrovi\'c and Sini\v{s}a \v{S}egvi\'c
A Novel Georeferenced Dataset for Stereo Visual Odometry
Part of the Proceedings of the Croatian Computer Vision Workshop, CCVW 2013, Year 1
null
null
UniZg-CRV-CCVW/2013/0017
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this work, we present a novel dataset for assessing the accuracy of stereo visual odometry. The dataset has been acquired by a small-baseline stereo rig mounted on the top of a moving car. The groundtruth is supplied by a consumer grade GPS device without IMU. Synchronization and alignment between GPS readings and stereo frames are recovered after the acquisition. We show that the attained groundtruth accuracy allows to draw useful conclusions in practice. The presented experiments address influence of camera calibration, baseline distance and zero-disparity features to the achieved reconstruction performance.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 14:15:48 GMT" } ]
2013-10-02T00:00:00
[ [ "Krešo", "Ivan", "" ], [ "Ševrović", "Marko", "" ], [ "Šegvić", "Siniša", "" ] ]
new_dataset
0.9997
1310.0316
Tomislav Petkovi\'c
Ivan Sikiri\'c, Karla Brki\'c and Sini\v{s}a \v{S}egvi\'c
Classifying Traffic Scenes Using The GIST Image Descriptor
Part of the Proceedings of the Croatian Computer Vision Workshop, CCVW 2013, Year 1
null
null
UniZg-CRV-CCVW/2013/0013
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper investigates classification of traffic scenes in a very low bandwidth scenario, where an image should be coded by a small number of features. We introduce a novel dataset, called the FM1 dataset, consisting of 5615 images of eight different traffic scenes: open highway, open road, settlement, tunnel, tunnel exit, toll booth, heavy traffic and the overpass. We evaluate the suitability of the GIST descriptor as a representation of these images, first by exploring the descriptor space using PCA and k-means clustering, and then by using an SVM classifier and recording its 10-fold cross-validation performance on the introduced FM1 dataset. The obtained recognition rates are very encouraging, indicating that the use of the GIST descriptor alone could be sufficiently descriptive even when very high performance is required.
[ { "version": "v1", "created": "Tue, 1 Oct 2013 14:19:26 GMT" } ]
2013-10-02T00:00:00
[ [ "Sikirić", "Ivan", "" ], [ "Brkić", "Karla", "" ], [ "Šegvić", "Siniša", "" ] ]
new_dataset
0.994429
1308.5174
James Pallister
James Pallister, Simon Hollis, Jeremy Bennett
BEEBS: Open Benchmarks for Energy Measurements on Embedded Platforms
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents and justifies an open benchmark suite named BEEBS, targeted at evaluating the energy consumption of embedded processors. We explore the possible sources of energy consumption, then select individual benchmarks from contemporary suites to cover these areas. Version one of BEEBS is presented here and contains 10 benchmarks that cover a wide range of typical embedded applications. The benchmark suite is portable across diverse architectures and is freely available. The benchmark suite is extensively evaluated, and the properties of its constituent programs are analysed. Using real hardware platforms we show case examples which illustrate the difference in power dissipation between three processor architectures and their related ISAs. We observe significant differences in the average instruction dissipation between the architectures of 4.4x, specifically 170uW/MHz (ARM Cortex-M0), 65uW/MHz (Adapteva Epiphany) and 88uW/MHz (XMOS XS1-L1).
[ { "version": "v1", "created": "Fri, 23 Aug 2013 16:29:27 GMT" }, { "version": "v2", "created": "Sat, 28 Sep 2013 16:16:03 GMT" } ]
2013-10-01T00:00:00
[ [ "Pallister", "James", "" ], [ "Hollis", "Simon", "" ], [ "Bennett", "Jeremy", "" ] ]
new_dataset
0.999733
1309.7391
Chris Johnson
Chris Johnson
Madeup: A Mobile Development Environment for Programming 3-D Models
2 pages, 3 figures, PROMOTO 2013, 1309.5500
null
null
PrMoTo/2013/05
cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
Constructionism is a learning theory that states that we learn more when we construct tangible objects. In the process of building and presenting our work, we make concrete the abstract mental models we've formed, see where they breakdown through the feedback we receive, and revise the models accordingly. Computer programming has long been taught under a constructionist approach using sensory-rich contexts like robots, media, and Logo-style environments. Now, with affordable 3-D printers in the hands of consumers, we have a new medium in which learners may realize their computational ideas. In this demonstration, we share a mobile development environment named Madeup, which empowers its users to navigate 3-D space using a Logo-like imperative and functional language. Every stop in space becomes a vertex in a 3-D model. The generated models may be exported or uploaded to a 3-D printing service.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 23:50:57 GMT" } ]
2013-10-01T00:00:00
[ [ "Johnson", "Chris", "" ] ]
new_dataset
0.999145
1309.7429
Manish Gupta
Mit Sheth, Krishna Gopal Benerjee and Manish K. Gupta
Quorum Sensing for Regenerating Codes in Distributed Storage
8 pages, 5 figures, submitted to conference
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems with replication are well known for storing large amount of data. A large number of replication is done in order to provide reliability. This makes the system expensive. Various methods have been proposed over time to reduce the degree of replication and yet provide same level of reliability. One recently suggested scheme is of Regenerating codes, where a file is divided in to parts which are then processed by a coding mechanism and network coding to provide large number of parts. These are stored at various nodes with more than one part at each node. These codes can generate whole file and can repair a failed node by contacting some out of total existing nodes. This property ensures reliability in case of node failure and uses clever replication. This also optimizes bandwidth usage. In a practical scenario, the original file will be read and updated many times. With every update, we will have to update the data stored at many nodes. Handling multiple requests at the same time will bring a lot of complexity. Reading and writing or multiple writing on the same data at the same time should also be prevented. In this paper, we propose an algorithm that manages and executes all the requests from the users which reduces the update complexity. We also try to keep an adequate amount of availability at the same time. We use a voting based mechanism and form read, write and repair quorums. We have also done probabilistic analysis of regenerating codes.
[ { "version": "v1", "created": "Sat, 28 Sep 2013 05:30:49 GMT" } ]
2013-10-01T00:00:00
[ [ "Sheth", "Mit", "" ], [ "Benerjee", "Krishna Gopal", "" ], [ "Gupta", "Manish K.", "" ] ]
new_dataset
0.999621
1309.7691
EPTCS
Roberto Serra (University of Modena and Reggio Emilia), Alessandro Filisetti (European Centre for Living Technology), Alex Graudenzi (Department of Informatics, Systems and Communication University of Milan Bicocca), Chiara Damiani (Department of Informatics, Systems and Communication University of Milan Bicocca), Marco Villani (University of Modena and Reggio Emilia)
A model of protocell based on the introduction of a semi-permeable membrane in a stochastic model of catalytic reaction networks
In Proceedings Wivace 2013, arXiv:1309.7122
EPTCS 130, 2013, pp. 70-73
10.4204/EPTCS.130.10
null
cs.CE q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we introduce some preliminary analyses on the role of a semi-permeable membrane in the dynamics of a stochastic model of catalytic reaction sets (CRSs) of molecules. The results of the simulations performed on ensembles of randomly generated reaction schemes highlight remarkable differences between this very simple protocell description model and the classical case of the continuous stirred-tank reactor (CSTR). In particular, in the CSTR case, distinct simulations with the same reaction scheme reach the same dynamical equilibrium, whereas, in the protocell case, simulations with identical reaction schemes can reach very different dynamical states, despite starting from the same initial conditions.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 01:05:59 GMT" } ]
2013-10-01T00:00:00
[ [ "Serra", "Roberto", "", "University of Modena and Reggio Emilia" ], [ "Filisetti", "Alessandro", "", "European Centre for Living Technology" ], [ "Graudenzi", "Alex", "", "Department\n of Informatics, Systems and Communication University of Milan Bicocca" ], [ "Damiani", "Chiara", "", "Department of Informatics, Systems and Communication\n University of Milan Bicocca" ], [ "Villani", "Marco", "", "University of Modena and Reggio\n Emilia" ] ]
new_dataset
0.988356
1309.7912
Ricardo Fabbri
Mauro de Amorim, Ricardo Fabbri, Lucia Maria dos Santos Pinto and Francisco Duarte Moura Neto
An Image-Based Fluid Surface Pattern Model
a reduced version in Portuguese appears in proceedings of the XVI EMC - Computational Modeling Meeting (Encontro de Modelagem Computacional), 2013
null
null
null
cs.CV
http://creativecommons.org/licenses/by/3.0/
This work aims at generating a model of the ocean surface and its dynamics from one or more video cameras. The idea is to model wave patterns from video as a first step towards a larger system of photogrammetric monitoring of marine conditions for use in offshore oil drilling platforms. The first part of the proposed approach consists in reducing the dimensionality of sensor data made up of the many pixels of each frame of the input video streams. This enables finding a concise number of most relevant parameters to model the temporal dataset, yielding an efficient data-driven model of the evolution of the observed surface. The second part proposes stochastic modeling to better capture the patterns embedded in the data. One can then draw samples from the final model, which are expected to simulate the behavior of previously observed flow, in order to determine conditions that match new observations. In this paper we focus on proposing and discussing the overall approach and on comparing two different techniques for dimensionality reduction in the first stage: principal component analysis and diffusion maps. Work is underway on the second stage of constructing better stochastic models of fluid surface dynamics as proposed here.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 16:39:21 GMT" } ]
2013-10-01T00:00:00
[ [ "de Amorim", "Mauro", "" ], [ "Fabbri", "Ricardo", "" ], [ "Pinto", "Lucia Maria dos Santos", "" ], [ "Neto", "Francisco Duarte Moura", "" ] ]
new_dataset
0.993926
1309.6820
Eliot Brenner
Eliot Brenner, David Sontag
SparsityBoost: A New Scoring Function for Learning Bayesian Network Structure
Appears in Proceedings of the Twenty-Ninth Conference on Uncertainty in Artificial Intelligence (UAI2013)
null
null
UAI-P-2013-PG-112-121
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a new consistent scoring function for structure learning of Bayesian networks. In contrast to traditional approaches to scorebased structure learning, such as BDeu or MDL, the complexity penalty that we propose is data-dependent and is given by the probability that a conditional independence test correctly shows that an edge cannot exist. What really distinguishes this new scoring function from earlier work is that it has the property of becoming computationally easier to maximize as the amount of data increases. We prove a polynomial sample complexity result, showing that maximizing this score is guaranteed to correctly learn a structure with no false edges and a distribution close to the generating distribution, whenever there exists a Bayesian network which is a perfect map for the data generating distribution. Although the new score can be used with any search algorithm, we give empirical results showing that it is particularly effective when used together with a linear programming relaxation approach to Bayesian network structure learning.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 12:35:41 GMT" } ]
2013-09-27T00:00:00
[ [ "Brenner", "Eliot", "" ], [ "Sontag", "David", "" ] ]
new_dataset
0.954711
1309.6914
Marius Buliga
Marius Buliga
Chemical concrete machine
null
null
null
null
cs.FL math.LO q-bio.MN
http://creativecommons.org/licenses/by/3.0/
The chemical concrete machine is a graph rewriting system which uses only local moves (rewrites), seen as chemical reactions involving molecules which are graphs made up by 4 trivalent nodes. It is Turing complete, therefore it might be used as a model of computation in algorithmic chemistry.
[ { "version": "v1", "created": "Thu, 26 Sep 2013 14:24:23 GMT" } ]
2013-09-27T00:00:00
[ [ "Buliga", "Marius", "" ] ]
new_dataset
0.999163
1307.0029
Pabitra Pal Choudhury
Ranjeet Kumar Rout, Pabitra Pal Choudhury, B. S. Daya Sagar, Sk. Sarif Hassan
Fractal and Mathematical Morphology in Intricate Comparison between Tertiary Protein Structures
null
null
null
null
cs.CG cs.CE
http://creativecommons.org/licenses/publicdomain/
Intricate comparison between two given tertiary structures of proteins is as important as the comparison of their functions. Several algorithms have been devised to compute the similarity and dissimilarity among protein structures. But, these algorithms compare protein structures by structural alignment of the protein backbones which are usually unable to determine precise differences. In this paper, an attempt has been made to compute the similarities and dissimilarities among 3D protein structures using the fundamental mathematical morphology operations and fractal geometry which can resolve the problem of real differences. In doing so, two techniques are being used here in determining the superficial structural (global similarity) and local similarity in atomic level of the protein molecules. This intricate structural difference would provide insight to Biologists to understand the protein structures and their functions more precisely.
[ { "version": "v1", "created": "Tue, 11 Jun 2013 15:20:03 GMT" }, { "version": "v2", "created": "Wed, 25 Sep 2013 11:54:04 GMT" } ]
2013-09-26T00:00:00
[ [ "Rout", "Ranjeet Kumar", "" ], [ "Choudhury", "Pabitra Pal", "" ], [ "Sagar", "B. S. Daya", "" ], [ "Hassan", "Sk. Sarif", "" ] ]
new_dataset
0.998005
1309.6422
Hong Xu
Hong Xu and Baochun Li
Spot Transit: Cheaper Internet Transit for Elastic Traffic
14 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We advocate to create a \emph{spot} Internet transit market, where transit is sold using the under-utilized backbone capacity at a lower price. The providers can improve profit by capitalizing the perishable capacity, and customers can buy transit on-demand without a minimum commitment level for elastic traffic, and as a result improve its surplus (i.e. utility gains). We conduct a systematic study of the economical benefits of spot transit both theoretically and empirically. We propose a simple analytical framework with a general demand function, and solve the pricing problem of maximizing the expected profit, taking into account the revenue loss of regular transit when spot transit traffic hikes. We rigorously prove the price advantage of spot transit, as well as profit and surplus improvements for tier-1 ISPs and customers, respectively. Using real-world price data and traffic statistics of 6 IXPs with more than 1000 ISPs, we quantitatively evaluate spot transit and show that significant financial benefits can be achieved in both absolute and relative terms, robust to parameter values.
[ { "version": "v1", "created": "Wed, 25 Sep 2013 08:28:52 GMT" } ]
2013-09-26T00:00:00
[ [ "Xu", "Hong", "" ], [ "Li", "Baochun", "" ] ]
new_dataset
0.998795
1309.4767
Abuzer Yakaryilmaz
Abuzer Yakaryilmaz
Log-space counter is useful for unary languages by help of a constant-size quantum register
The text is updated by adding a new reference. Technical report. 10 pages. arXiv admin note: text overlap with arXiv:1207.3880
null
null
null
cs.CC cs.FL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum amount of resources to recognize a nonregular language is a fundamental research topic in theoretical computer science which has been examined for different kinds of resources and many different models. In this note, we focus on unary languages and space complexity on counters. Our model is two-way one-counter automaton with quantum and classical states (2QCCA), which is a two-way finite automaton with one-counter (2DCA) augmented with a fixed size quantum register or a two-way finite automaton with quantum and classical states (2QCFA) augmented with a classical counter. It is known that any 2DCA using a sublinear space on its counter can recognize only regular languages \cite{DG82B}. In this note, we show that bounded-error 2QCCAs can recognize a non-regular unary language by using logarithmic space on its counters for the members. Note that it is still an open problem whether bounded-error 2QCFA can recognize a non-regular unary language.
[ { "version": "v1", "created": "Wed, 18 Sep 2013 19:58:17 GMT" }, { "version": "v2", "created": "Mon, 23 Sep 2013 22:30:57 GMT" } ]
2013-09-25T00:00:00
[ [ "Yakaryilmaz", "Abuzer", "" ] ]
new_dataset
0.999549
1309.6078
Dmitry Gusev
V. F. Romanov
Discordant Compact Logic-Arithmetic Structures in Discrete Optimization Problems
17 pages; typeset in LaTeX. arXiv admin note: substantial text overlap with arXiv:1011.3944
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In sphere of research of discrete optimization algorithms efficiency the important place occupies a method of polynomial reducibility of some problems to others with use of special purpose components. In this paper a novel method of compact representation for sets of binary sequences in the form of "compact triplets structures" (CTS) and "compact couples structures" (CCS) is stated, supposing both logic and arithmetic interpretation of data. It is shown that any non-empty CTS in dual interpretation represents some unique Boolean formula in 3-CNF and the tabular CTS contains all satisfyig sets of the formula as concatenations of the triplets chosen from the neighbouring tiers. In general, any 3-CNF formula is transformed by decomposition to a system of discordant CTS's, each being associated with an individual permutation of variables constructed by a polynomial algorithm. As a result the problem of the formula satisfiability is reduced to the following one: ascertain the fact of existence (or absence) of a "joint satisfying set" (JSS) for all discordant structures, based on the different permutations. Further transformation of each CTS to CCS is used; correctness of preservation of the allowed sets is reached by simple algorithmic restrictions on triplets concatenation. Then the procedure of "inverting of the same name columns" in the various structures is entered for the purpose of reducing the problem of JSS revealing to elementary detection of n-tuples of zeros in the CCS system. The formula is synthesized, being on the structure a variation of 2-CNF, associated with the calculation procedure realizing adaptation of the polynomial algorithm of constraints distribution (well-known in the optimization theory) to the efficient resolving Boolean formula coded by means of discordant compact structures.
[ { "version": "v1", "created": "Tue, 24 Sep 2013 08:24:57 GMT" } ]
2013-09-25T00:00:00
[ [ "Romanov", "V. F.", "" ] ]
new_dataset
0.998994
1309.6162
Ralf Steinberger
Ralf Steinberger, Bruno Pouliquen, Mijail Kabadjov, Erik van der Goot
JRC-Names: A freely available, highly multilingual named entity resource
null
Proceedings of the 8th International Conference Recent Advances in Natural Language Processing (RANLP'2011), pp. 104-110. Hissar, Bulgaria, 12-14 September 2011
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a new, freely available, highly multilingual named entity resource for person and organisation names that has been compiled over seven years of large-scale multilingual news analysis combined with Wikipedia mining, resulting in 205,000 per-son and organisation names plus about the same number of spelling variants written in over 20 different scripts and in many more languages. This resource, produced as part of the Europe Media Monitor activity (EMM, http://emm.newsbrief.eu/overview.html), can be used for a number of purposes. These include improving name search in databases or on the internet, seeding machine learning systems to learn named entity recognition rules, improve machine translation results, and more. We describe here how this resource was created; we give statistics on its current size; we address the issue of morphological inflection; and we give details regarding its functionality. Updates to this resource will be made available daily.
[ { "version": "v1", "created": "Tue, 24 Sep 2013 14:09:53 GMT" } ]
2013-09-25T00:00:00
[ [ "Steinberger", "Ralf", "" ], [ "Pouliquen", "Bruno", "" ], [ "Kabadjov", "Mijail", "" ], [ "van der Goot", "Erik", "" ] ]
new_dataset
0.99926
1309.6185
Ralf Steinberger
Maud Ehrmann, Leonida della Rocca, Ralf Steinberger, Hristo Tanev
Acronym recognition and processing in 22 languages
null
Proceedings of the 9th Conference 'Recent Advances in Natural Language Processing' (RANLP), pp. 237-244. Hissar, Bulgaria, 7-13 September 2013
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are presenting work on recognising acronyms of the form Long-Form (Short-Form) such as "International Monetary Fund (IMF)" in millions of news articles in twenty-two languages, as part of our more general effort to recognise entities and their variants in news text and to use them for the automatic analysis of the news, including the linking of related news across languages. We show how the acronym recognition patterns, initially developed for medical terms, needed to be adapted to the more general news domain and we present evaluation results. We describe our effort to automatically merge the numerous long-form variants referring to the same short-form, while keeping non-related long-forms separate. Finally, we provide extensive statistics on the frequency and the distribution of short-form/long-form pairs across languages.
[ { "version": "v1", "created": "Tue, 24 Sep 2013 14:41:33 GMT" } ]
2013-09-25T00:00:00
[ [ "Ehrmann", "Maud", "" ], [ "della Rocca", "Leonida", "" ], [ "Steinberger", "Ralf", "" ], [ "Tanev", "Hristo", "" ] ]
new_dataset
0.955476
1211.0722
Omer Bar-Ilan
Omer Bar-Ilan and Yonina C. Eldar
Sub-Nyquist Radar via Doppler Focusing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of a monostatic pulse-Doppler radar transceiver trying to detect targets, sparsely populated in the radar's unambiguous time-frequency region. Several past works employ compressed sensing (CS) algorithms to this type of problem, but either do not address sample rate reduction, impose constraints on the radar transmitter, propose CS recovery methods with prohibitive dictionary size, or perform poorly in noisy conditions. Here we describe a sub-Nyquist sampling and recovery approach called Doppler focusing which addresses all of these problems: it performs low rate sampling and digital processing, imposes no restrictions on the transmitter, and uses a CS dictionary with size which does not increase with increasing number of pulses P. Furthermore, in the presence of noise, Doppler focusing enjoys an SNR increase which scales linearly with P, obtaining good detection performance even at SNRs as low as -25dB. The recovery is based on the Xampling framework, which allows reducing the number of samples needed to accurately represent the signal, directly in the analog-to-digital conversion process. After sampling, the entire digital recovery process is performed on the low rate samples without having to return to the Nyquist rate. Finally, our approach can be implemented in hardware using a previously suggested Xampling prototype.
[ { "version": "v1", "created": "Sun, 4 Nov 2012 21:21:11 GMT" }, { "version": "v2", "created": "Wed, 1 May 2013 21:54:51 GMT" }, { "version": "v3", "created": "Sun, 22 Sep 2013 20:55:04 GMT" } ]
2013-09-24T00:00:00
[ [ "Bar-Ilan", "Omer", "" ], [ "Eldar", "Yonina C.", "" ] ]
new_dataset
0.961081
1305.0911
Amir Ben-Amram
Amir M. Ben-Amram
A Comment on Budach's Mouse-in-an-Octant Problem
3 pages, 2 bibliographic references
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Budach's Mouse-in-an-Octant Problem (attributed to Lothar Budach in a 1980 article by van Emde Boas and Karpinski) concerns the behaviour of a very simple finite-state machine ("the mouse") moving on the integer two-dimensional grid. Its decidability is apparently still open. This note sketches a proof that an extended version of the problem (a super-mouse) is undecidable.
[ { "version": "v1", "created": "Sat, 4 May 2013 11:02:03 GMT" }, { "version": "v2", "created": "Fri, 20 Sep 2013 20:35:59 GMT" } ]
2013-09-24T00:00:00
[ [ "Ben-Amram", "Amir M.", "" ] ]
new_dataset
0.996537
1308.0267
Ryoma Sin'ya
Ryoma Sin'ya
Text Compression using Abstract Numeration System on a Regular Language
An extended abstract of the accepted paper for JSSST Journal "Computer Software" (Japanese, available at http://www.shudo.is.titech.ac.jp/members/sinya)
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An abstract numeration system (ANS) is a numeration system that provides a one-to-one correspondence between the natural numbers and a regular language. In this paper, we define an ANS-based compression as an extension of this correspondence. In addition, we show the following results: 1) an average compression ratio is computable from a language, 2) an ANS-based compression runs in sublinear time with respect to the length of the input string, and 3) an ANS-based compression can be extended to block-based compression using a factorial language.
[ { "version": "v1", "created": "Thu, 1 Aug 2013 17:13:45 GMT" }, { "version": "v2", "created": "Sun, 22 Sep 2013 18:37:00 GMT" } ]
2013-09-24T00:00:00
[ [ "Sin'ya", "Ryoma", "" ] ]
new_dataset
0.990553
1309.3655
Mohammed Karmoose
Mohammed Karmoose and Karim Habak and Mustafa El-Nainay and Moustafa Youssef
Dead Zone Penetration Protocol for Cognitive Radio Networks
The paper has been withdrawn for copyright issues
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current routing protocols for cognitive radio networks are severely affected by the frequent activity of primary users. Nodes that are in the interference range of an appearing primary user are not allowed to transmit, and therefore existing routes which utilize such nodes are obliged to undergo a route maintenance phase. This naturally provides other routes to the destination that may incur extra delay or increase packet queuing overhead. In this work, a novel route maintenance protocol is proposed that allows existing routes to endure the event of primary user presence by forming cooperative links between neighboring nodes and nulling out transmission at the primary receiver using cooperative beamforming. Our proposed protocol can be used in conjunction with any of the existing routing protocols, thus achieving modularity. Extensive simulations are done which prove that our proposed protocol outperforms existing route maintenance techniques in terms of end-to-end delay and loss ratio, with minimal incurred overhead.
[ { "version": "v1", "created": "Sat, 14 Sep 2013 12:28:36 GMT" }, { "version": "v2", "created": "Sun, 22 Sep 2013 11:16:24 GMT" } ]
2013-09-24T00:00:00
[ [ "Karmoose", "Mohammed", "" ], [ "Habak", "Karim", "" ], [ "El-Nainay", "Mustafa", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.996099
1309.5500
Vinayak Naik
Judith Bishop, Nikolai Tillmann, Arno Puder, Vinayak Naik
PRoMoTo 2013 proceedings
Published in PRoMoTo'13
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Programming for Mobile and Touch (PRoMoTo'13) was held at the 2013 ACM SIGPLAN conference on Systems, Programming, Languages and Applications (SPLASH 2013), October 2013 in Indianapolis, USA. Submissions for this event were invited in the general area of mobile and touch-oriented programming languages and programming environments, and teaching of programming for mobile devices. These are proceedings of the PRoMoTo'13.
[ { "version": "v1", "created": "Sat, 21 Sep 2013 16:48:22 GMT" } ]
2013-09-24T00:00:00
[ [ "Bishop", "Judith", "" ], [ "Tillmann", "Nikolai", "" ], [ "Puder", "Arno", "" ], [ "Naik", "Vinayak", "" ] ]
new_dataset
0.999553
1309.5601
Lata Bt
Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, and L M Patnaik
Multiple Domain Secure Routing for Wireless Sensor Networks
10 pages
International Journal of Information Processing, 7(2), 59-68, 2013
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain Routing with Overlap of Nodes (MDRON) and Multiple Domain Routing Without Overlap of Nodes (MDRWON) algorithms, in which packets follow multiple optimized paths simultaneously. The Special node algorithm searches the node which has maximum power and these nodes are used for transferring the packet from one domain to another domain. Simulation results using MATLAB shows that performance is better than Purely Random Propagation (PRP) and Non Repetitive Random Propagation(NRRP) Algorithms.
[ { "version": "v1", "created": "Sun, 22 Sep 2013 14:06:59 GMT" } ]
2013-09-24T00:00:00
[ [ "T", "Lata B", "" ], [ "R", "Jansi P K", "" ], [ "K", "Shaila", "" ], [ "Sujatha", "D N", "" ], [ "R", "Venugopal K", "" ], [ "Patnaik", "L M", "" ] ]
new_dataset
0.990862
1309.5652
Nizar Habash
Mona Diab, Nizar Habash, Owen Rambow and Ryan Roth
LDC Arabic Treebanks and Associated Corpora: Data Divisions Manual
14 pages; one cover
null
null
CLCSL-0S7--1031-02
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
The Linguistic Data Consortium (LDC) has developed hundreds of data corpora for natural language processing (NLP) research. Among these are a number of annotated treebank corpora for Arabic. Typically, these corpora consist of a single collection of annotated documents. NLP research, however, usually requires multiple data sets for the purposes of training models, developing techniques, and final evaluation. Therefore it becomes necessary to divide the corpora used into the required data sets (divisions). This document details a set of rules that have been defined to enable consistent divisions for old and new Arabic treebanks (ATB) and related corpora.
[ { "version": "v1", "created": "Sun, 22 Sep 2013 21:09:07 GMT" } ]
2013-09-24T00:00:00
[ [ "Diab", "Mona", "" ], [ "Habash", "Nizar", "" ], [ "Rambow", "Owen", "" ], [ "Roth", "Ryan", "" ] ]
new_dataset
0.99713
1309.5735
Pekka Abrahamsson
Petteri Alahuhta, Pekka Abrahamsson, Antti Nummiaho
On Exploring Consumers' Technology Foresight Capabilities - An Analysis of 4000 Mobile Service Ideas
Published in ICE-B 2008 - Proceedings of the International Conference on e-Business, Porto, Portugal, July 26-29, 2008. INSTICC Press 2008 ISBN 978-989-8111-58-6
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lead user driven innovation and open innovation paradigms seek to involve consumers and common people to innovative product development projects. In order to help developers choose ideas that meet the end users' needs, we undertook a massive collaborative research effort and collected 40000 ideas from 2150 common people about future mobile services that they would like to use. We inspired each people to produce tens of mobile service ideas. In this paper we carry out an analysis for 4000 ideas from the idea database. We had a particular interest in whether peoples' ideas can be used in foreseeing the technology development needs. The results show that end users produce ideas that are conservative more than novel. Therefore, we claim that consumers' technology foresight horizon is limited by the existing technological base. The second finding, linked to the previous one, is that the great majority of the ideas that consumers expressed could be realised utilizing existing technologies. The implication of this finding is that the idea database should be an interesting source of ideas for service developers. The third finding of the study, related to the methodology, is that a vast number of ideas can be collected fairly easily but analyzing them cost effectively is a challenge.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 09:13:52 GMT" } ]
2013-09-24T00:00:00
[ [ "Alahuhta", "Petteri", "" ], [ "Abrahamsson", "Pekka", "" ], [ "Nummiaho", "Antti", "" ] ]
new_dataset
0.990016
1309.5787
Andreas Brandstadt
Anne Berry, Andreas Brandst\"adt, Konrad Engel
The Dilworth Number of Auto-Chordal-Bipartite Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mirror (or bipartite complement) mir(B) of a bipartite graph B=(X,Y,E) has the same color classes X and Y as B, and two vertices x in X and y in Y are adjacent in mir(B) if and only if xy is not in E. A bipartite graph is chordal bipartite if none of its induced subgraphs is a chordless cycle with at least six vertices. In this paper, we deal with chordal bipartite graphs whose mirror is chordal bipartite as well; we call these graphs auto-chordal bipartite graphs (ACB graphs for short). We describe the relationship to some known graph classes such as interval and strongly chordal graphs and we present several characterizations of ACB graphs. We show that ACB graphs have unbounded Dilworth number, and we characterize ACB graphs with Dilworth number k.
[ { "version": "v1", "created": "Mon, 23 Sep 2013 12:40:52 GMT" } ]
2013-09-24T00:00:00
[ [ "Berry", "Anne", "" ], [ "Brandstädt", "Andreas", "" ], [ "Engel", "Konrad", "" ] ]
new_dataset
0.999694
1309.5129
EPTCS
Colin Stirling
A Proof System with Names for Modal Mu-calculus
In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557
EPTCS 129, 2013, pp. 18-29
10.4204/EPTCS.129.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fixpoints are an important ingredient in semantics, abstract interpretation and program logics. Their addition to a logic can add considerable expressive power. One general issue is how to define proof systems for such logics. Here we examine proof systems for modal logic with fixpoints. We present a tableau proof system for checking validity of formulas which uses names to keep track of unfoldings of fixpoint variables as devised by Jungteerapanich.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 01:43:08 GMT" } ]
2013-09-23T00:00:00
[ [ "Stirling", "Colin", "" ] ]
new_dataset
0.993181
1309.5133
EPTCS
Mads Rosendahl (Roskilde University)
Abstract Interpretation as a Programming Language
In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557
EPTCS 129, 2013, pp. 84-104
10.4204/EPTCS.129.7
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In David Schmidt's PhD work he explored the use of denotational semantics as a programming language. It was part of an effort to not only treat formal semantics as specifications but also as interpreters and input to compiler generators. The semantics itself can be seen as a program and one may examine different programming styles and ways to represent states. Abstract interpretation is primarily a technique for derivation and specification of program analysis. As with denotational semantics we may also view abstract interpretations as programs and examine the implementation. The main focus in this paper is to show that results from higher-order strictness analysis may be used more generally as fixpoint operators for higher-order functions over lattices and thus provide a technique for immediate implementation of a large class of abstract interpretations. Furthermore, it may be seen as a programming paradigm and be used to write programs in a circular style.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 01:43:40 GMT" } ]
2013-09-23T00:00:00
[ [ "Rosendahl", "Mads", "", "Roskilde University" ] ]
new_dataset
0.954759
1309.5134
EPTCS
Jeffrey T. Denniston, Austin Melton, Stephen E. Rodabaugh
Formal Contexts, Formal Concept Analysis, and Galois Connections
In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557
EPTCS 129, 2013, pp. 105-120
10.4204/EPTCS.129.8
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Formal concept analysis (FCA) is built on a special type of Galois connections called polarities. We present new results in formal concept analysis and in Galois connections by presenting new Galois connection results and then applying these to formal concept analysis. We also approach FCA from the perspective of collections of formal contexts. Usually, when doing FCA, a formal context is fixed. We are interested in comparing formal contexts and asking what criteria should be used when determining when one formal context is better than another formal context. Interestingly, we address this issue by studying sets of polarities.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 01:43:48 GMT" } ]
2013-09-23T00:00:00
[ [ "Denniston", "Jeffrey T.", "" ], [ "Melton", "Austin", "" ], [ "Rodabaugh", "Stephen E.", "" ] ]
new_dataset
0.994249
1309.5144
EPTCS
Anindya Banerjee, David A. Naumann
A Simple Semantics and Static Analysis for Stack Inspection
In Proceedings Festschrift for Dave Schmidt, arXiv:1309.4557
EPTCS 129, 2013, pp. 284-308
10.4204/EPTCS.129.17
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Java virtual machine and the .NET common language runtime feature an access control mechanism specified operationally in terms of run-time stack inspection. We give a denotational semantics in "eager" form, and show that it is equivalent to the "lazy" semantics using stack inspection. We give a static analysis of safety, i.e., the absence of security errors, that is simpler than previous proposals. We identify several program transformations that can be used to remove run-time checks. We give complete, detailed proofs for safety of the analysis and for the transformations, exploiting compositionality of the eager semantics.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 01:45:17 GMT" } ]
2013-09-23T00:00:00
[ [ "Banerjee", "Anindya", "" ], [ "Naumann", "David A.", "" ] ]
new_dataset
0.994316
1309.5223
Ralf Steinberger
Ralf Steinberger, Mohamed Ebrahim, Marco Turchi
JRC EuroVoc Indexer JEX - A freely available multi-label categorisation tool
null
Proceedings of the 8th international conference on Language Resources and Evaluation (LREC'2012), pp. 798-805, Istanbul, 21-27 May 2012
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EuroVoc (2012) is a highly multilingual thesaurus consisting of over 6,700 hierarchically organised subject domains used by European Institutions and many authorities in Member States of the European Union (EU) for the classification and retrieval of official documents. JEX is JRC-developed multi-label classification software that learns from manually labelled data to automatically assign EuroVoc descriptors to new documents in a profile-based category-ranking task. The JEX release consists of trained classifiers for 22 official EU languages, of parallel training data in the same languages, of an interface that allows viewing and amending the assignment results, and of a module that allows users to re-train the tool on their own document collections. JEX allows advanced users to change the document representation so as to possibly improve the categorisation result through linguistic pre-processing. JEX can be used as a tool for interactive EuroVoc descriptor assignment to increase speed and consistency of the human categorisation process, or it can be used fully automatically. The output of JEX is a language-independent EuroVoc feature vector lending itself also as input to various other Language Technology tasks, including cross-lingual clustering and classification, cross-lingual plagiarism detection, sentence selection and ranking, and more.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 09:51:59 GMT" } ]
2013-09-23T00:00:00
[ [ "Steinberger", "Ralf", "" ], [ "Ebrahim", "Mohamed", "" ], [ "Turchi", "Marco", "" ] ]
new_dataset
0.999649
1309.5226
Ralf Steinberger
Ralf Steinberger, Andreas Eisele, Szymon Klocek, Spyridon Pilos, Patrick Schl\"uter
DGT-TM: A freely Available Translation Memory in 22 Languages
null
Proceedings of the 8th international conference on Language Resources and Evaluation (LREC'2012), pp. 454-459, Istanbul, 21-27 May 2012
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The European Commission's (EC) Directorate General for Translation, together with the EC's Joint Research Centre, is making available a large translation memory (TM; i.e. sentences and their professionally produced translations) covering twenty-two official European Union (EU) languages and their 231 language pairs. Such a resource is typically used by translation professionals in combination with TM software to improve speed and consistency of their translations. However, this resource has also many uses for translation studies and for language technology applications, including Statistical Machine Translation (SMT), terminology extraction, Named Entity Recognition (NER), multilingual classification and clustering, and many more. In this reference paper for DGT-TM, we introduce this new resource, provide statistics regarding its size, and explain how it was produced and how to use it.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 10:02:58 GMT" } ]
2013-09-23T00:00:00
[ [ "Steinberger", "Ralf", "" ], [ "Eisele", "Andreas", "" ], [ "Klocek", "Szymon", "" ], [ "Pilos", "Spyridon", "" ], [ "Schlüter", "Patrick", "" ] ]
new_dataset
0.999721
1309.5255
Dheerendra Mishra Mr.
Dheerendra Mishra and Sourav Mukhopadhyay
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Remote user authentication is desirable for a Telecare medicine information system (TMIS) to verify the correctness of remote users. In 2013, Jiang et al. proposed privacy preserving authentication scheme for TMIS. Recently, Wu and Xu analyzed Jiang's scheme and identify serious security flaws in their scheme, namely, user impersonation attack, DoS attack and off-line password guessing attack. In this article, we analyze Wu and Xu's scheme and show that their scheme is also vulnerable to off-line password guessing attack and does not protect user anonymity. Moreover, we identify the inefficiency of incorrect input detection of the login phase in Wu and Xu's scheme, where the smart card executes the login session in-spite of wrong input.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 12:47:44 GMT" } ]
2013-09-23T00:00:00
[ [ "Mishra", "Dheerendra", "" ], [ "Mukhopadhyay", "Sourav", "" ] ]
new_dataset
0.990433
1309.5319
Clement Moulin-Frier
Cl\'ement Moulin-Frier (INRIA Bordeaux - Sud-Ouest, GIPSA-lab), M. A. Arbib (USC)
Recognizing Speech in a Novel Accent: The Motor Theory of Speech Perception Reframed
null
Biological Cybernetics 107, 4 (2013) 421-447
10.1007/s00422-013-0557-3
null
cs.CL cs.LG q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The motor theory of speech perception holds that we perceive the speech of another in terms of a motor representation of that speech. However, when we have learned to recognize a foreign accent, it seems plausible that recognition of a word rarely involves reconstruction of the speech gestures of the speaker rather than the listener. To better assess the motor theory and this observation, we proceed in three stages. Part 1 places the motor theory of speech perception in a larger framework based on our earlier models of the adaptive formation of mirror neurons for grasping, and for viewing extensions of that mirror system as part of a larger system for neuro-linguistic processing, augmented by the present consideration of recognizing speech in a novel accent. Part 2 then offers a novel computational model of how a listener comes to understand the speech of someone speaking the listener's native language with a foreign accent. The core tenet of the model is that the listener uses hypotheses about the word the speaker is currently uttering to update probabilities linking the sound produced by the speaker to phonemes in the native language repertoire of the listener. This, on average, improves the recognition of later words. This model is neutral regarding the nature of the representations it uses (motor vs. auditory). It serve as a reference point for the discussion in Part 3, which proposes a dual-stream neuro-linguistic architecture to revisits claims for and against the motor theory of speech perception and the relevance of mirror neurons, and extracts some implications for the reframing of the motor theory.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 16:47:48 GMT" } ]
2013-09-23T00:00:00
[ [ "Moulin-Frier", "Clément", "", "INRIA Bordeaux - Sud-Ouest, GIPSA-lab" ], [ "Arbib", "M. A.", "", "USC" ] ]
new_dataset
0.995036
1309.4887
Tilo Wettig
Nils Meyer, Manfred Ries, Stefan Solbrig, Tilo Wettig
iDataCool: HPC with Hot-Water Cooling and Energy Reuse
12 pages, 7 figures, proceedings of ISC 2013
Lecture Notes in Computer Science 7905 (2013) 383
10.1007/978-3-642-38750-0_29
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
iDataCool is an HPC architecture jointly developed by the University of Regensburg and the IBM Research and Development Lab B\"oblingen. It is based on IBM's iDataPlex platform, whose air-cooling solution was replaced by a custom water-cooling solution that allows for cooling water temperatures of 70C/158F. The system is coupled to an adsorption chiller by InvenSor that operates efficiently at these temperatures. Thus a significant portion of the energy spent on HPC can be recovered in the form of chilled water, which can then be used to cool other parts of the computing center. We describe the architecture of iDataCool and present benchmarks of the cooling performance and the energy (reuse) efficiency.
[ { "version": "v1", "created": "Thu, 19 Sep 2013 07:53:10 GMT" } ]
2013-09-20T00:00:00
[ [ "Meyer", "Nils", "" ], [ "Ries", "Manfred", "" ], [ "Solbrig", "Stefan", "" ], [ "Wettig", "Tilo", "" ] ]
new_dataset
0.998388
1309.4962
Josef Urban
Cezary Kaliszyk and Josef Urban
HOL(y)Hammer: Online ATP Service for HOL Light
null
null
null
null
cs.AI cs.DL cs.LG cs.LO cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HOL(y)Hammer is an online AI/ATP service for formal (computer-understandable) mathematics encoded in the HOL Light system. The service allows its users to upload and automatically process an arbitrary formal development (project) based on HOL Light, and to attack arbitrary conjectures that use the concepts defined in some of the uploaded projects. For that, the service uses several automated reasoning systems combined with several premise selection methods trained on all the project proofs. The projects that are readily available on the server for such query answering include the recent versions of the Flyspeck, Multivariate Analysis and Complex Analysis libraries. The service runs on a 48-CPU server, currently employing in parallel for each task 7 AI/ATP combinations and 4 decision procedures that contribute to its overall performance. The system is also available for local installation by interested users, who can customize it for their own proof development. An Emacs interface allowing parallel asynchronous queries to the service is also provided. The overall structure of the service is outlined, problems that arise and their solutions are discussed, and an initial account of using the system is given.
[ { "version": "v1", "created": "Thu, 19 Sep 2013 13:22:31 GMT" } ]
2013-09-20T00:00:00
[ [ "Kaliszyk", "Cezary", "" ], [ "Urban", "Josef", "" ] ]
new_dataset
0.999672
1309.4557
EPTCS
Anindya Banerjee (IMDEA Software Institute), Olivier Danvy (Aarhus University), Kyung-Goo Doh (Hanyang University), John Hatcliff (Kansas State University)
Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt on the Occasion of his Sixtieth Birthday
null
EPTCS 129, 2013
10.4204/EPTCS.129
null
cs.PL cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This Liber Amicorum is a collection of essays ranging from personal memories to technical contributions. It is a tribute to Dave Schmidt and his career, and was composed at the occasion of his sixtieth birthday.
[ { "version": "v1", "created": "Wed, 18 Sep 2013 07:26:07 GMT" } ]
2013-09-19T00:00:00
[ [ "Banerjee", "Anindya", "", "IMDEA Software Institute" ], [ "Danvy", "Olivier", "", "Aarhus\n University" ], [ "Doh", "Kyung-Goo", "", "Hanyang University" ], [ "Hatcliff", "John", "", "Kansas State\n University" ] ]
new_dataset
0.997036
1309.4713
Patrizio Angelini
Patrizio Angelini, William Evans, Fabrizio Frati, Joachim Gudmundsson
SEFE with No Mapping via Large Induced Outerplane Graphs in Plane Graphs
21 pages, 10 figures, 14 references
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that every $n$-vertex planar graph admits a simultaneous embedding with no mapping and with fixed edges with any $(n/2)$-vertex planar graph. In order to achieve this result, we prove that every $n$-vertex plane graph has an induced outerplane subgraph containing at least $n/2$ vertices. Also, we show that every $n$-vertex planar graph and every $n$-vertex planar partial 3-tree admit a simultaneous embedding with no mapping and with fixed edges.
[ { "version": "v1", "created": "Wed, 18 Sep 2013 17:22:52 GMT" } ]
2013-09-19T00:00:00
[ [ "Angelini", "Patrizio", "" ], [ "Evans", "William", "" ], [ "Frati", "Fabrizio", "" ], [ "Gudmundsson", "Joachim", "" ] ]
new_dataset
0.999399
1103.1917
Francisco Soulignac
Martiniano Egu\'ia and Francisco J. Soulignac
Hereditary biclique-Helly graphs: recognition and maximal biclique enumeration
23 pages, 4 figures
Discrete Math. Theor. Comput. Sci. 15 (2013), 55--74
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A biclique is a set of vertices that induce a bipartite complete graph. A graph G is biclique-Helly when its family of maximal bicliques satisfies the Helly property. If every induced subgraph of G is also biclique-Helly, then G is hereditary biclique-Helly. A graph is C_4-dominated when every cycle of length 4 contains a vertex that is dominated by the vertex of the cycle that is not adjacent to it. In this paper we show that the class of hereditary biclique-Helly graphs is formed precisely by those C_4-dominated graphs that contain no triangles and no induced cycles of length either 5, or 6. Using this characterization, we develop an algorithm for recognizing hereditary biclique-Helly graphs in O(n^2+\alpha m) time and O(m) space. (Here n, m, and \alpha = O(m^{1/2}) are the number of vertices and edges, and the arboricity of the graph, respectively.) As a subprocedure, we show how to recognize those C_4-dominated graphs that contain no triangles in O(\alpha m) time and O(m) space. Finally, we show how to enumerate all the maximal bicliques of a C_4-dominated graph with no triangles in O(n^2 + \alpha m) time and O(\alpha m) space, and we discuss how some biclique problems can be solved in O(\alpha m) time and O(n+m) space.
[ { "version": "v1", "created": "Wed, 9 Mar 2011 23:28:47 GMT" } ]
2013-09-18T00:00:00
[ [ "Eguía", "Martiniano", "" ], [ "Soulignac", "Francisco J.", "" ] ]
new_dataset
0.999266
1201.1684
Lawrence Ong
Lawrence Ong, Gottfried Lechner, Sarah J. Johnson, Christopher M. Kellett
The Three-User Finite-Field Multi-Way Relay Channel with Correlated Sources
Author's final version (accepted and to appear in IEEE Transactions on Communications)
IEEE Transactions on Communications, Vol. 61, No. 8, pp. 3125-3135, Aug. 2013
10.1109/TCOMM.2013.13.120987
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the three-user finite-field multi-way relay channel, where the users exchange messages via a relay. The messages are arbitrarily correlated, and the finite-field channel is linear and is subject to additive noise of arbitrary distribution. The problem is to determine the minimum achievable source-channel rate, defined as channel uses per source symbol needed for reliable communication. We combine Slepian-Wolf source coding and functional-decode-forward channel coding to obtain the solution for two classes of source and channel combinations. Furthermore, for correlated sources that have their common information equal their mutual information, we propose a new coding scheme to achieve the minimum source-channel rate.
[ { "version": "v1", "created": "Mon, 9 Jan 2012 03:26:47 GMT" }, { "version": "v2", "created": "Mon, 17 Jun 2013 00:53:01 GMT" } ]
2013-09-18T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Lechner", "Gottfried", "" ], [ "Johnson", "Sarah J.", "" ], [ "Kellett", "Christopher M.", "" ] ]
new_dataset
0.990034
1201.4715
Marek Trt\'ik
Ji\v{r}\'i Slab\'y, Jan Strej\v{c}ek, Marek Trt\'ik
Compact Symbolic Execution
This is a full version of the paper accepted to ATVA 2013
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It proceeds in two steps. First, we analyse cyclic paths in the control flow graph of a given program, independently from the rest of the program. Our goal is to compute a so called template for each such a cyclic path. A template is a declarative parametric description of all possible program states, which may leave the analysed cyclic path after any number of iterations along it. In the second step, we execute the program symbolically with the templates in hand. The result is a compact symbolic execution tree. A compact tree always carry the same information in all its leaves as the corresponding classic symbolic execution tree. Nevertheless, a compact tree is typically substantially smaller than the corresponding classic tree. There are even programs for which compact symbolic execution trees are finite while classic symbolic execution trees are infinite.
[ { "version": "v1", "created": "Mon, 23 Jan 2012 13:50:55 GMT" }, { "version": "v2", "created": "Tue, 17 Sep 2013 15:19:48 GMT" } ]
2013-09-18T00:00:00
[ [ "Slabý", "Jiří", "" ], [ "Strejček", "Jan", "" ], [ "Trtík", "Marek", "" ] ]
new_dataset
0.994269
1309.4157
Rui Li
Rui Li and Kevin Chen-Chuan Chang
EgoNet-UIUC: A Dataset For Ego Network Research
DataSet Description
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report, we introduce the version one of EgoNet-UIUC, which is a dataset for ego network research. The dataset contains about 230 ego networks in Linkedin, which have about 33K users (with their attributes) and 283K relationships (with their relationship types) in total. We name this dataset as EgoNet-UIUC, which stands for Ego Network Dataset from University of Illinois at Urbana-Champaign.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 02:28:25 GMT" } ]
2013-09-18T00:00:00
[ [ "Li", "Rui", "" ], [ "Chang", "Kevin Chen-Chuan", "" ] ]
new_dataset
0.999852
1309.4334
Lse Lse
Martin Dias (INRIA Lille - Nord Europe), Damien Cassou (INRIA Lille - Nord Europe), St\'ephane Ducasse (INRIA Lille - Nord Europe)
Representing Code History with Development Environment Events
null
IWST-2013 - 5th International Workshop on Smalltalk Technologies (2013)
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern development environments handle information about the intent of the programmer: for example, they use abstract syntax trees for providing high-level code manipulation such as refactorings; nevertheless, they do not keep track of this information in a way that would simplify code sharing and change understanding. In most Smalltalk systems, source code modifications are immediately registered in a transaction log often called a ChangeSet. Such mechanism has proven reliability, but it has several limitations. In this paper we analyse such limitations and describe scenarios and requirements for tracking fine-grained code history with a semantic representation. We present Epicea, an early prototype implementation. We want to enrich code sharing with extra information from the IDE, which will help understanding the intention of the changes and let a new generation of tools act in consequence.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 14:50:22 GMT" } ]
2013-09-18T00:00:00
[ [ "Dias", "Martin", "", "INRIA Lille - Nord Europe" ], [ "Cassou", "Damien", "", "INRIA Lille -\n Nord Europe" ], [ "Ducasse", "Stéphane", "", "INRIA Lille - Nord Europe" ] ]
new_dataset
0.96098
1309.4396
Panagiotis Bouros Panagiotis Bouros
Dimitris Sacharidis, Panagiotis Bouros
Routing Directions: Keeping it Fast and Simple
Full version of the SIGSPATIAL'13 paper
21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2013), Orlando, Florida, USA, November 5-8, 2013
10.1145/2525314.2525362
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of providing meaningful routing directions over road networks is of great importance. In many real-life cases, the fastest route may not be the ideal choice for providing directions in written, spoken text, or for an unfamiliar neighborhood, or in cases of emergency. Rather, it is often more preferable to offer "simple" directions that are easy to memorize, explain, understand or follow. However, there exist cases where the simplest route is considerably longer than the fastest. This paper tries to address this issue, by finding near-simplest routes which are as short as possible and near-fastest routes which are as simple as possible. Particularly, we focus on efficiency, and propose novel algorithms, which are theoretically and experimentally shown to be significantly faster than existing approaches.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 17:14:49 GMT" } ]
2013-09-18T00:00:00
[ [ "Sacharidis", "Dimitris", "" ], [ "Bouros", "Panagiotis", "" ] ]
new_dataset
0.999082
1309.4426
Christian Widmer
Christian Widmer, Philipp Drewe, Xinghua Lou, Shefali Umrania, Stephanie Heinrich, Gunnar R\"atsch
GRED: Graph-Regularized 3D Shape Reconstruction from Highly Anisotropic and Noisy Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analysis of microscopy images can provide insight into many biological processes. One particularly challenging problem is cell nuclear segmentation in highly anisotropic and noisy 3D image data. Manually localizing and segmenting each and every cell nuclei is very time consuming, which remains a bottleneck in large scale biological experiments. In this work we present a tool for automated segmentation of cell nuclei from 3D fluorescent microscopic data. Our tool is based on state-of-the-art image processing and machine learning techniques and supports a friendly graphical user interface (GUI). We show that our tool is as accurate as manual annotation but greatly reduces the time for the registration.
[ { "version": "v1", "created": "Tue, 17 Sep 2013 18:55:37 GMT" } ]
2013-09-18T00:00:00
[ [ "Widmer", "Christian", "" ], [ "Drewe", "Philipp", "" ], [ "Lou", "Xinghua", "" ], [ "Umrania", "Shefali", "" ], [ "Heinrich", "Stephanie", "" ], [ "Rätsch", "Gunnar", "" ] ]
new_dataset
0.982304
1206.1422
Gabriel Nivasch
Gabriel Nivasch, J\'anos Pach and G\'abor Tardos
The visible perimeter of an arrangement of disks
12 pages, 5 figures
Computational Geometry: Theory and Applications, 47:42-51, 2014
10.1016/j.comgeo.2013.08.006
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a collection of n opaque unit disks in the plane, we want to find a stacking order for them that maximizes their visible perimeter---the total length of all pieces of their boundaries visible from above. We prove that if the centers of the disks form a dense point set, i.e., the ratio of their maximum to their minimum distance is O(n^1/2), then there is a stacking order for which the visible perimeter is Omega(n^2/3). We also show that this bound cannot be improved in the case of a sufficiently small n^1/2 by n^1/2 uniform grid. On the other hand, if the set of centers is dense and the maximum distance between them is small, then the visible perimeter is O(n^3/4) with respect to any stacking order. This latter bound cannot be improved either. Finally, we address the case where no more than c disks can have a point in common. These results partially answer some questions of Cabello, Haverkort, van Kreveld, and Speckmann.
[ { "version": "v1", "created": "Thu, 7 Jun 2012 08:28:04 GMT" }, { "version": "v2", "created": "Sat, 14 Sep 2013 19:05:36 GMT" } ]
2013-09-17T00:00:00
[ [ "Nivasch", "Gabriel", "" ], [ "Pach", "János", "" ], [ "Tardos", "Gábor", "" ] ]
new_dataset
0.994912
1210.8375
Roohallah Rastaghi
Roohallah Rastaghi
Cryptanalysis of a New Knapsack Type Public-Key Cryptosystem
International Conference on Applied Mathematics and Computer Sciences, Rio de Janeiro, Brazil, March 2010
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Hwang et al. introduced a knapsack type public-key cryptosystem. They proposed a new algorithm called permutation combination algorithm. By exploiting this algorithm, they attempt to increase the density of knapsack to avoid the low-density attack. We show that this cryptosystem is not secure, as it based on basic Merkel-Hellman knapsack cryptosystem and because of the superincreasing structure, we can use shamir's attack on the basic Merkel-Hellman knapsack to break this cryptosystem.
[ { "version": "v1", "created": "Wed, 31 Oct 2012 16:05:30 GMT" }, { "version": "v2", "created": "Sat, 14 Sep 2013 18:50:12 GMT" } ]
2013-09-17T00:00:00
[ [ "Rastaghi", "Roohallah", "" ] ]
new_dataset
0.991656