id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1306.1286
|
Aditya Kanade
|
Shalini Kaleeswaran, Varun Tulsian, Aditya Kanade, Alessandro Orso
|
MintHint: Automated Synthesis of Repair Hints
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Being able to automatically repair programs is an extremely challenging task.
In this paper, we present MintHint, a novel technique for program repair that
is a departure from most of today's approaches. Instead of trying to fully
automate program repair, which is often an unachievable goal, MintHint performs
statistical correlation analysis to identify expressions that are likely to
occur in the repaired code and generates, using pattern-matching based
synthesis, repair hints from these expressions. Intuitively, these hints
suggest how to rectify a faulty statement and help developers find a complete,
actual repair. MintHint can address a variety of common faults, including
incorrect, spurious, and missing expressions.
We present a user study that shows that developers' productivity can improve
manyfold with the use of repair hints generated by MintHint -- compared to
having only traditional fault localization information. We also apply MintHint
to several faults of a widely used Unix utility program to further assess the
effectiveness of the approach. Our results show that MintHint performs well
even in situations where (1) the repair space searched does not contain the
exact repair, and (2) the operational specification obtained from the test
cases for repair is incomplete or even imprecise.
|
[
{
"version": "v1",
"created": "Thu, 6 Jun 2013 02:20:54 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Sep 2013 07:08:40 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Kaleeswaran",
"Shalini",
""
],
[
"Tulsian",
"Varun",
""
],
[
"Kanade",
"Aditya",
""
],
[
"Orso",
"Alessandro",
""
]
] |
new_dataset
| 0.98412 |
1308.2428
|
Stevan Harnad
|
Olivier Picard, M\'elanie Lord, Alexandre Blondin-Mass\'e, Odile
Marcotte, Marcos Lopes and Stevan Harnad
|
Hidden Structure and Function in the Lexicon
|
11 pages, 5 figures, 2 tables
|
NLPCS 2013: 10th International Workshop on Natural Language
Processing and Cognitive Science, Marseille, France 15-16 October 2013
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How many words are needed to define all the words in a dictionary?
Graph-theoretic analysis reveals that about 10% of a dictionary is a unique
Kernel of words that define one another and all the rest, but this is not the
smallest such subset. The Kernel consists of one huge strongly connected
component (SCC), about half its size, the Core, surrounded by many small SCCs,
the Satellites. Core words can define one another but not the rest of the
dictionary. The Kernel also contains many overlapping Minimal Grounding Sets
(MGSs), each about the same size as the Core, each part-Core, part-Satellite.
MGS words can define all the rest of the dictionary. They are learned earlier,
more concrete and more frequent than the rest of the dictionary. Satellite
words, not correlated with age or frequency, are less concrete (more abstract)
words that are also needed for full lexical power.
|
[
{
"version": "v1",
"created": "Sun, 11 Aug 2013 20:50:27 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Sep 2013 12:06:55 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Picard",
"Olivier",
""
],
[
"Lord",
"Mélanie",
""
],
[
"Blondin-Massé",
"Alexandre",
""
],
[
"Marcotte",
"Odile",
""
],
[
"Lopes",
"Marcos",
""
],
[
"Harnad",
"Stevan",
""
]
] |
new_dataset
| 0.992205 |
1309.1783
|
Markus Blatt
|
Makus Blatt
|
DUNE as an Example of Sustainable Open Source Scientific Software
Development
| null | null | null | null |
cs.MS cs.SE
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper we describe how DUNE, an open source scientific software
framework, is developed. Having a sustainable software framework for the
solution of partial differential equations is the main driver of DUNE's
development. We take a look how DUNE strives to stay sustainable software.
|
[
{
"version": "v1",
"created": "Fri, 6 Sep 2013 21:55:23 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Sep 2013 19:56:50 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Blatt",
"Makus",
""
]
] |
new_dataset
| 0.983666 |
1309.1812
|
Frank L\"offler
|
Frank L\"offler, Steven R. Brandt, Gabrielle Allen and Erik Schnetter
|
Cactus: Issues for Sustainable Simulation Software
|
submitted to the Workshop on Sustainable Software for Science:
Practice and Experiences 2013
| null | null | null |
cs.CE cs.MS cs.SE
|
http://creativecommons.org/licenses/by/3.0/
|
The Cactus Framework is an open-source, modular, portable programming
environment for the collaborative development and deployment of scientific
applications using high-performance computing. Its roots reach back to 1996 at
the National Center for Supercomputer Applications and the Albert Einstein
Institute in Germany, where its development jumpstarted. Since then, the Cactus
framework has witnessed major changes in hardware infrastructure as well as its
own community. This paper describes its endurance through these past changes
and, drawing upon lessons from its past, also discusses future
|
[
{
"version": "v1",
"created": "Sat, 7 Sep 2013 03:18:51 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Sep 2013 01:33:06 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Löffler",
"Frank",
""
],
[
"Brandt",
"Steven R.",
""
],
[
"Allen",
"Gabrielle",
""
],
[
"Schnetter",
"Erik",
""
]
] |
new_dataset
| 0.950339 |
1309.3917
|
Gaetan Marceau
|
Ga\'etan Marceau (INRIA Saclay - Ile de France, LRI), Pierre
Sav\'eant, Marc Schoenauer (INRIA Saclay - Ile de France, LRI)
|
Strategic Planning in Air Traffic Control as a Multi-objective
Stochastic Optimization Problem
|
ATM Seminar 2013 (2013)
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the objective of handling the airspace sector congestion subject to
continuously growing air traffic, we suggest to create a collaborative working
plan during the strategic phase of air traffic control. The plan obtained via a
new decision support tool presented in this article consists in a schedule for
controllers, which specifies time of overflight on the different waypoints of
the flight plans. In order to do it, we believe that the decision-support tool
shall model directly the uncertainty at a trajectory level in order to
propagate the uncertainty to the sector level. Then, the probability of
congestion for any sector in the airspace can be computed. Since air traffic
regulations and sector congestion are antagonist, we designed and implemented a
multi-objective optimization algorithm for determining the best trade-off
between these two criteria. The solution comes up as a set of alternatives for
the multi-sector planner where the severity of the congestion cost is
adjustable. In this paper, the Non-dominated Sorting Genetic Algorithm
(NSGA-II) was used to solve an artificial benchmark problem involving 24
aircraft and 11 sectors, and is able to provide a good approximation of the
Pareto front.
|
[
{
"version": "v1",
"created": "Mon, 16 Sep 2013 11:52:07 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Marceau",
"Gaétan",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Savéant",
"Pierre",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Schoenauer",
"Marc",
"",
"INRIA Saclay - Ile de France, LRI"
]
] |
new_dataset
| 0.988957 |
1309.4016
|
Yasmin AlNoamany
|
Yasmin AlNoamany, Ahmed AlSum, Michele C. Weigle, and Michael L.
Nelson
|
Who and What Links to the Internet Archive
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Internet Archive's (IA) Wayback Machine is the largest and oldest public
web archive and has become a significant repository of our recent history and
cultural heritage. Despite its importance, there has been little research about
how it is discovered and used. Based on web access logs, we analyze what users
are looking for, why they come to IA, where they come from, and how pages link
to IA. We find that users request English pages the most, followed by the
European languages. Most human users come to web archives because they do not
find the requested pages on the live web. About 65% of the requested archived
pages no longer exist on the live web. We find that more than 82% of human
sessions connect to the Wayback Machine via referrals from other web sites,
while only 15% of robots have referrers. Most of the links (86%) from websites
are to individual archived pages at specific points in time, and of those 83%
no longer exist on the live web.
|
[
{
"version": "v1",
"created": "Mon, 16 Sep 2013 16:01:37 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"AlNoamany",
"Yasmin",
""
],
[
"AlSum",
"Ahmed",
""
],
[
"Weigle",
"Michele C.",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
new_dataset
| 0.996388 |
1309.4067
|
Dima Kagan
|
Dima Kagan, Michael Fire, Aviad Elyashar, and Yuval Elovici
|
Facebook Applications' Installation and Removal: A Temporal Analysis
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Facebook applications are one of the reasons for Facebook attractiveness.
Unfortunately, numerous users are not aware of the fact that many malicious
Facebook applications exist. To educate users, to raise users' awareness and to
improve Facebook users' security and privacy, we developed a Firefox add-on
that alerts users to the number of installed applications on their Facebook
profiles. In this study, we present the temporal analysis of the Facebook
applications' installation and removal dataset collected by our add-on. This
dataset consists of information from 2,945 users, collected during a period of
over a year. We used linear regression to analyze our dataset and discovered
the linear connection between the average percentage change of newly installed
Facebook applications and the number of days passed since the user initially
installed our add-on. Additionally, we found out that users who used our
Firefox add-on become more aware of their security and privacy installing on
average fewer new applications. Finally, we discovered that on average 86.4% of
Facebook users install an additional application every 4.2 days.
|
[
{
"version": "v1",
"created": "Mon, 16 Sep 2013 18:56:45 GMT"
}
] | 2013-09-17T00:00:00 |
[
[
"Kagan",
"Dima",
""
],
[
"Fire",
"Michael",
""
],
[
"Elyashar",
"Aviad",
""
],
[
"Elovici",
"Yuval",
""
]
] |
new_dataset
| 0.999593 |
1309.3307
|
Fatemeh Hamidi-Sepehr
|
Fatemeh Hamidi-Sepehr, Henry D. Pfister, Jean-Francois Chamberland
|
Delay-Sensitive Communication over Fading Channel: Queueing Behavior and
Code Parameter Selection
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article examines the queueing performance of communication systems that
transmit encoded data over unreliable channels. A fading formulation suitable
for wireless environments is considered where errors are caused by a discrete
channel with correlated behavior over time. Random codes and BCH codes are
employed as means to study the relationship between code-rate selection and the
queueing performance of point-to-point data links. For carefully selected
channel models and arrival processes, a tractable Markov structure composed of
queue length and channel state is identified. This facilitates the analysis of
the stationary behavior of the system, leading to evaluation criteria such as
bounds on the probability of the queue exceeding a threshold. Specifically,
this article focuses on system models with scalable arrival profiles, which are
based on Poisson processes, and finite-state channels with memory. These
assumptions permit the rigorous comparison of system performance for codes with
arbitrary block lengths and code rates. Based on the resulting
characterizations, it is possible to select the best code parameters for
delay-sensitive applications over various channels. The methodology introduced
herein offers a new perspective on the joint queueing-coding analysis of
finitestate channels with memory, and it is supported by numerical simulations.
|
[
{
"version": "v1",
"created": "Thu, 12 Sep 2013 21:14:18 GMT"
}
] | 2013-09-16T00:00:00 |
[
[
"Hamidi-Sepehr",
"Fatemeh",
""
],
[
"Pfister",
"Henry D.",
""
],
[
"Chamberland",
"Jean-Francois",
""
]
] |
new_dataset
| 0.983474 |
1212.4968
|
Adrian Ispas
|
Adrian Ispas, Xitao Gong, Christian Schneider, Gerd Ascheid, Reiner
Thom\"a
|
Dual-Polarized Ricean MIMO Channels: Modeling and Performance Assessment
|
submitted to the IEEE Transactions on Communications
| null |
10.1109/TCOMM.2013.082813.120976
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In wireless communication systems, dual-polarized (DP) instead of
single-polarized (SP) multiple-input multiple-output (MIMO) transmission is
used to improve the spectral efficiency under certain conditions on the channel
and the signal-to-noise ratio (SNR). In order to identify these conditions, we
first propose a novel channel model for DP mobile Ricean MIMO channels for
which statistical channel parameters are readily obtained from a moment-based
channel decomposition. Second, we derive an approximation of the mutual
information (MI), which can be expressed as a function of those statistical
channel parameters. Based on this approximation, we characterize the required
SNR for a DP MIMO system to outperform an SP MIMO system in terms of the MI.
Finally, we apply our results to channel measurements at 2.53 GHz. We find
that, using the proposed channel decomposition and the approximation of the MI,
we are able to reproduce the (practically relevant) SNR values above which DP
MIMO systems outperform SP MIMO systems.
|
[
{
"version": "v1",
"created": "Thu, 20 Dec 2012 10:33:58 GMT"
}
] | 2013-09-13T00:00:00 |
[
[
"Ispas",
"Adrian",
""
],
[
"Gong",
"Xitao",
""
],
[
"Schneider",
"Christian",
""
],
[
"Ascheid",
"Gerd",
""
],
[
"Thomä",
"Reiner",
""
]
] |
new_dataset
| 0.981719 |
1309.3173
|
Congzhe Cao
|
Congzhe Cao, Zesong Fei, Jinhong Yuan, Jingming Kuang
|
Low Complexity List Successive Cancellation Decoding of Polar Codes
|
5 pages, 6 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a low complexity list successive cancellation (LCLSC) decoding
algorithm to reduce complexity of traditional list successive cancellation
(LSC) decoding of polar codes while trying to maintain the LSC decoding
performance at the same time. By defining two thresholds, namely "likelihood
ratio (LR) threshold" and "Bhattacharyya parameter threshold", we classify the
reliability of each received information bit and the quality of each bit
channel. Based on this classification, we implement successive cancellation
(SC) decoding instead of LSC decoding when the information bits from "bad"
subchannels are received reliably and further attempt to skip LSC decoding for
the rest information bits in order to achieve a lower complexity compared to
full LSC decoding. Simulation results show that the complexity of LCLSC
decoding is much lower than LSC decoding and can be close to that of SC
decoding, especially in low code rate regions.
|
[
{
"version": "v1",
"created": "Thu, 12 Sep 2013 14:38:40 GMT"
}
] | 2013-09-13T00:00:00 |
[
[
"Cao",
"Congzhe",
""
],
[
"Fei",
"Zesong",
""
],
[
"Yuan",
"Jinhong",
""
],
[
"Kuang",
"Jingming",
""
]
] |
new_dataset
| 0.967377 |
1309.3195
|
Congzhe Cao
|
Zesong Fei, Congzhe Cao, Ming Xiao, Iqbal Hussain and Jingming Kuang
|
Improved LT Codes in Low Overhead Regions for Binary Erasure Channels
|
8 pages, 8 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study improved degree distribution for Luby Transform (LT) codes which
exhibits improved bit error rate performance particularly in low overhead
regions. We construct the degree distribution by modifying Robust Soliton
distribution. The performance of our proposed LT codes is evaluated and
compared to the conventional LT codes via And-Or tree analysis. Then we propose
a transmission scheme based on the proposed degree distribution to improve its
frame error rate in full recovery regions. Furthermore, the improved degree
distribution is applied to distributed multi-source relay networks and unequal
error protection. It is shown that our schemes achieve better performance and
reduced complexity especially in low overhead regions, compared with
conventional schemes.
|
[
{
"version": "v1",
"created": "Thu, 12 Sep 2013 15:28:27 GMT"
}
] | 2013-09-13T00:00:00 |
[
[
"Fei",
"Zesong",
""
],
[
"Cao",
"Congzhe",
""
],
[
"Xiao",
"Ming",
""
],
[
"Hussain",
"Iqbal",
""
],
[
"Kuang",
"Jingming",
""
]
] |
new_dataset
| 0.984068 |
1309.1805
|
Lynn Zentner
|
Lynn Zentner, Michael Zentner, Victoria Farnsworth, Michael McLennan,
Krishna Madhavan, and Gerhard Klimeck
|
nanoHUB.org: Experiences and Challenges in Software Sustainability for a
Large Scientific Community
|
4 pages, 1 figure, this version contains minor revisions to correct
an acronym, update a quotation, improve grammar, and add a reference
| null | null | null |
cs.SE cs.CE cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
Managing and growing a successful cyberinfrastructure such as nanoHUB.org
presents a variety of opportunities and challenges, particularly in regard to
software. This position paper details a number of those issues and how we have
approached them.
|
[
{
"version": "v1",
"created": "Sat, 7 Sep 2013 02:17:57 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Sep 2013 17:18:17 GMT"
}
] | 2013-09-12T00:00:00 |
[
[
"Zentner",
"Lynn",
""
],
[
"Zentner",
"Michael",
""
],
[
"Farnsworth",
"Victoria",
""
],
[
"McLennan",
"Michael",
""
],
[
"Madhavan",
"Krishna",
""
],
[
"Klimeck",
"Gerhard",
""
]
] |
new_dataset
| 0.959291 |
1309.2679
|
Eduardo Graells-Garrido
|
Eduardo Graells-Garrido and Ricardo Baeza-Yates
|
Caracterizando la Web Chilena
|
In Spanish. Published in "Revista Bits de Ciencia" vol. 2, 2009.
Department of Computer Science, University of Chile. Available in
http://www.dcc.uchile.cl/revista
| null | null | null |
cs.SI
|
http://creativecommons.org/licenses/by/3.0/
|
This article presents a characterization of the web space from Chile in 2007.
The characterization shows distributions of sites and domains, analysis of
document content and server configuration. In addition, the network structure
of the chilean Web is analyzed, determining components based on hyperlink
structure at the document and site levels.
Original Abstract: En este art\'iculo se muestra una caracterizaci\'on del
espacio web de Chile para el a\~no 2007. Se muestran distribuciones de sitios y
dominios, caracterizaci\'on del contenido en base a tipos de documento, asi
como configuraci\'on de los servidores. Se estudia la estructura de la red
creada mediante hiperv\'inculos en los documentos y c\'omo las diferentes
componentes de esta estructura var\'ian cuando los hiperv\'inculos son
agregados a nivel de sitios.
|
[
{
"version": "v1",
"created": "Tue, 10 Sep 2013 21:47:56 GMT"
}
] | 2013-09-12T00:00:00 |
[
[
"Graells-Garrido",
"Eduardo",
""
],
[
"Baeza-Yates",
"Ricardo",
""
]
] |
new_dataset
| 0.99907 |
1309.2687
|
Han Su
|
Han Su
|
CrowdPlanner: A Crowd-Based Route Recommendation System
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CrowdPlanner -- a novel crowd-based route recommendation system has been
developed, which requests human workers to evaluate candidates routes
recommended by different sources and methods, and determine the best route
based on the feedbacks of these workers. Our system addresses two critical
issues in its core components: a) task generation component generates a series
of informative and concise questions with optimized ordering for a given
candidate route set so that workers feel comfortable and easy to answer; and b)
worker selection component utilizes a set of selection criteria and an
efficient algorithm to find the most eligible workers to answer the questions
with high accuracy.
|
[
{
"version": "v1",
"created": "Tue, 10 Sep 2013 23:06:57 GMT"
}
] | 2013-09-12T00:00:00 |
[
[
"Su",
"Han",
""
]
] |
new_dataset
| 0.990254 |
1309.2693
|
Victor Pillac
|
Victor Pillac and Pascal Van Henetenryck and Caroline Even
|
A Conflict-Based Path-Generation Heuristic for Evacuation Planning
|
Technical report
| null | null |
NICTA VRL-7393
|
cs.AI math.OC
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Evacuation planning and scheduling is a critical aspect of disaster
management and national security applications. This paper proposes a
conflict-based path-generation approach for evacuation planning. Its key idea
is to generate evacuation routes lazily for evacuated areas and to optimize the
evacuation over these routes in a master problem. Each new path is generated to
remedy conflicts in the evacuation and adds new columns and a new row in the
master problem. The algorithm is applied to massive flood scenarios in the
Hawkesbury-Nepean river (West Sydney, Australia) which require evacuating in
the order of 70,000 persons. The proposed approach reduces the number of
variables from 4,500,000 in a Mixed Integer Programming (MIP) formulation to
30,000 in the case study. With this approach, realistic evacuations scenarios
can be solved near-optimally in real time, supporting both evacuation planning
in strategic, tactical, and operational environments.
|
[
{
"version": "v1",
"created": "Tue, 10 Sep 2013 23:42:57 GMT"
}
] | 2013-09-12T00:00:00 |
[
[
"Pillac",
"Victor",
""
],
[
"Van Henetenryck",
"Pascal",
""
],
[
"Even",
"Caroline",
""
]
] |
new_dataset
| 0.998526 |
1309.2842
|
Amelie Stainer
|
Nathalie Bertrand, Patricia Bouyer, Thomas Brihaye, Amelie Stainer
|
Emptiness and Universality Problems in Timed Automata with Positive
Frequency
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The languages of infinite timed words accepted by timed automata are
traditionally defined using Buchi-like conditions. These acceptance conditions
focus on the set of locations visited infinitely often along a run, but
completely ignore quantitative timing aspects. In this paper we propose a
natural quantitative semantics for timed automata based on the so-called
frequency, which measures the proportion of time spent in the accepting
locations. We study various properties of timed languages accepted with
positive frequency, and in particular the emptiness and universality problems.
|
[
{
"version": "v1",
"created": "Wed, 11 Sep 2013 14:33:19 GMT"
}
] | 2013-09-12T00:00:00 |
[
[
"Bertrand",
"Nathalie",
""
],
[
"Bouyer",
"Patricia",
""
],
[
"Brihaye",
"Thomas",
""
],
[
"Stainer",
"Amelie",
""
]
] |
new_dataset
| 0.997901 |
1309.1049
|
F\'elix Cuadrado
|
Luis Vaquero, Felix Cuadrado, Dionysios Logothetis and Claudio
Martella
|
xDGP: A Dynamic Graph Processing System with Adaptive Partitioning
|
13 pages
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many real-world systems, such as social networks, rely on mining efficiently
large graphs, with hundreds of millions of vertices and edges. This volume of
information requires partitioning the graph across multiple nodes in a
distributed system. This has a deep effect on performance, as traversing edges
cut between partitions incurs a significant performance penalty due to the cost
of communication. Thus, several systems in the literature have attempted to
improve computational performance by enhancing graph partitioning, but they do
not support another characteristic of real-world graphs: graphs are inherently
dynamic, their topology evolves continuously, and subsequently the optimum
partitioning also changes over time.
In this work, we present the first system that dynamically repartitions
massive graphs to adapt to structural changes. The system optimises graph
partitioning to prevent performance degradation without using data replication.
The system adopts an iterative vertex migration algorithm that relies on local
information only, making complex coordination unnecessary. We show how the
improvement in graph partitioning reduces execution time by over 50%, while
adapting the partitioning to a large number of changes to the graph in three
real-world scenarios.
|
[
{
"version": "v1",
"created": "Wed, 4 Sep 2013 14:36:17 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Sep 2013 09:01:55 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Sep 2013 15:59:50 GMT"
}
] | 2013-09-11T00:00:00 |
[
[
"Vaquero",
"Luis",
""
],
[
"Cuadrado",
"Felix",
""
],
[
"Logothetis",
"Dionysios",
""
],
[
"Martella",
"Claudio",
""
]
] |
new_dataset
| 0.995978 |
1309.2458
|
Karthik Reddy g
|
Karthik Reddy. G (Department of Electronics and Communication
Engineering, G. Pulla Reddy Engineering college, Kurnool, A.P, India)
|
Low power-area designs of 1bit full adder in cadence virtuoso platform
|
10 pages
|
International Journal of VLSI design & Communication Systems
(VLSICS) Vol.4, No.4,page no. 55-64, August 2013
|
10.5121/vlsic.2013.4406
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Power consumption has emerged as a primary design constraint for integrated
circuits (ICs). In the Nano meter technology regime, leakage power has become a
major component of total power. Full adder is the basic functional unit of an
ALU. The power consumption of a processor is lowered by lowering the power
consumption of an ALU, and the power consumption of an ALU can be lowered by
lowering the power consumption of Full adder. So the full adder designs with
low power characteristics are becoming more popular these days. This proposed
work illustrates the design of the low-power less transistor full adder designs
using cadence tool and virtuoso platform, the entire simulations have been done
on 180nm single n-well CMOS bulk technology, in virtuoso platform of cadence
tool with the supply voltage 1.8V and frequency of 100MHz. These circuits
consume less power with maximum (6T design)of 93.1% power saving compare to
conventional 28T design and 80.2% power saving compare to SERF design without
much delay degradation. The proposed circuit exploits the advantage of GDI
technique and pass transistor logic
|
[
{
"version": "v1",
"created": "Tue, 10 Sep 2013 11:19:15 GMT"
}
] | 2013-09-11T00:00:00 |
[
[
"G",
"Karthik Reddy.",
"",
"Department of Electronics and Communication\n Engineering, G. Pulla Reddy Engineering college, Kurnool, A.P, India"
]
] |
new_dataset
| 0.988139 |
1309.2476
|
Rakesh Mohanty
|
Rakesh Mohanty, Sangita Patel, Shiba Prasad Dash, Burle Sharma
|
TRANS outperforms MTF for two special types of request sequences without
locality of reference
|
9 Pages, Proceedings of International Conference on Communication,
Computing and Security (ICCCS)-2012, India.
http://www.sciencedirect.com/science/article/pii/S2212017312006123
|
Procedia Technology, Elsevier, Vol 6, pages 556-563, 2012
| null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various list accessing algorithms have been proposed in the literature and
their performances have been analyzed theoretically and experimentally.
Move-To-Front (MTF) and Transpose (TRANS) are two well known primitive list
accessing algorithms. MTF has been proved to be the best performing online
algorithm till date in the literature for real life inputs and practical
applications with locality of reference. It has been shown that when storage
space is extremely limited and pointers for lists cannot be used, then array
implementation of TRANS gives efficient reorganization. Use of MTF is extensive
in the literature whereas, the use of TRANS is rare. As mentioned as an open
problem in literature, direct bounds on the behavior and performance of various
list accessing algorithms are needed to allow realistic comparisons. Since it
has been shown that no single optimal permutation algorithm exists, it becomes
necessary to characterize the circumstances that indicate the advantage in
using a particular list accessing algorithm. Motivated by above challenging
research issue, in this paper we have made an analytical study for evaluating
the performance of TRANS list accessing algorithm using two special types of
request sequences without locality of reference. We have compared the
performance of TRANS with MTF and observed that TRANS outperforms MTF for these
considered types of request sequences.
|
[
{
"version": "v1",
"created": "Tue, 10 Sep 2013 12:24:50 GMT"
}
] | 2013-09-11T00:00:00 |
[
[
"Mohanty",
"Rakesh",
""
],
[
"Patel",
"Sangita",
""
],
[
"Dash",
"Shiba Prasad",
""
],
[
"Sharma",
"Burle",
""
]
] |
new_dataset
| 0.98748 |
1302.0347
|
Roohallah Rastaghi
|
Roohallah Rastaghi
|
An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the
Standard Model
|
Submited. arXiv admin note: text overlap with arXiv:1205.5224 by
other authors
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, a few chosen-ciphertext secure (CCA2-secure) variants of the
McEliece public-key encryption (PKE) scheme in the standard model were
introduced. All the proposed schemes are based on encryption repetition
paradigm and use general transformation from CPA-secure scheme to a CCA2-secure
one. Therefore, the resulting encryption scheme needs \textit{separate}
encryption and has \textit{large} key size compared to the original scheme,
which complex public key size problem in the code-based PKE schemes. Thus, the
proposed schemes are not sufficiently efficient to be used in practice.
In this work, we propose an efficient CCA2-secure variant of the McEliece PKE
scheme in the standard model. The main novelty is that, unlike previous
approaches, our approach is a generic conversion and can be applied to
\textit{any} one-way trapdoor function (OW-TDF), the lowest-level security
notion in the context of public-key cryptography, resolving a big fundamental
and central problem that has remained unsolved in the past two decades.
|
[
{
"version": "v1",
"created": "Sat, 2 Feb 2013 05:52:09 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jul 2013 19:39:29 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Aug 2013 17:47:45 GMT"
},
{
"version": "v4",
"created": "Sat, 7 Sep 2013 14:17:58 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Rastaghi",
"Roohallah",
""
]
] |
new_dataset
| 0.994683 |
1305.3941
|
Tony Shaska
|
A. Elezi, T. Shaska
|
Quantum codes from superelliptic curves
|
The article has been posted without journal's permission and must be
withdrawn
|
Albanian J. Math. 5 (2011), no. 4, 175--191
| null | null |
cs.IT math.AG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\X$ be an algebraic curve of genus $g \geq 2$ defined over a field
$\F_q$ of characteristic $p > 0$. From $\X$, under certain conditions, we can
construct an algebraic geometry code $C$. If the code $C$ is self-orthogonal
under the symplectic product then we can construct a quantum code $Q$, called a
QAG-code. In this paper we study the construction of such codes from curves
with automorphisms and the relation between the automorphism group of the curve
$\X$ and the codes $C$ and $Q$.
|
[
{
"version": "v1",
"created": "Thu, 16 May 2013 21:53:40 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Aug 2013 17:30:19 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Sep 2013 12:22:17 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Elezi",
"A.",
""
],
[
"Shaska",
"T.",
""
]
] |
new_dataset
| 0.988531 |
1309.2057
|
Sapan Naik j
|
Sapan Naik and Nikunj Patel
|
Single image super resolution in spatial and wavelet domain
|
10 pages, 5 figures, 1 table, sample code given
|
The International Journal of Multimedia & Its Applications (IJMA)
Vol.5, No.4, August 2013
|
10.5121/ijma.2013.5402
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently single image super resolution is very important research area to
generate high resolution image from given low resolution image. Algorithms of
single image resolution are mainly based on wavelet domain and spatial domain.
Filters support to model the regularity of natural images is exploited in
wavelet domain while edges of images get sharp during up sampling in spatial
domain. Here single image super resolution algorithm is presented which based
on both spatial and wavelet domain and take the advantage of both. Algorithm is
iterative and use back projection to minimize reconstruction error. Wavelet
based denoising method is also introduced to remove noise.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 07:33:50 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Naik",
"Sapan",
""
],
[
"Patel",
"Nikunj",
""
]
] |
new_dataset
| 0.992387 |
1309.2086
|
Pedro Neto
|
Pedro Neto, Nuno Mendes, Ricardo Ara\'ujo, J. Norberto Pires, A. Paulo
Moreira
|
High-level robot programming based on CAD: dealing with unpredictable
environments
|
Industrial Robot: An International Journal
|
Industrial Robot: An International Journal, Vol. 39 Iss: 3, 2012,
pp.294 - 303
|
10.1108/01439911211217125
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose - The purpose of this paper is to present a CAD-based human-robot
interface that allows non-expert users to teach a robot in a manner similar to
that used by human beings to teach each other.
Design/methodology/approach - Intuitive robot programming is achieved by
using CAD drawings to generate robot programs off-line. Sensory feedback allows
minimization of the effects of uncertainty, providing information to adjust the
robot paths during robot operation.
Findings - It was found that it is possible to generate a robot program from
a common CAD drawing and run it without any major concerns about calibration or
CAD model accuracy.
Research limitations/implications - A limitation of the proposed system has
to do with the fact that it was designed to be used for particular
technological applications.
Practical implications - Since most manufacturing companies have CAD packages
in their facilities today, CAD-based robot programming may be a good option to
program robots without the need for skilled robot programmers.
Originality/value - The paper proposes a new CAD-based robot programming
system. Robot programs are directly generated from a CAD drawing running on a
commonly available 3D CAD package (Autodesk Inventor) and not from a
commercial, computer aided robotics (CAR) software, making it a simple CAD
integrated solution. This is a low-cost and low-setup time system where no
advanced robot programming skills are required to operate it. In summary, robot
programs are generated with a high-level of abstraction from the robot
language.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 09:46:38 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Neto",
"Pedro",
""
],
[
"Mendes",
"Nuno",
""
],
[
"Araújo",
"Ricardo",
""
],
[
"Pires",
"J. Norberto",
""
],
[
"Moreira",
"A. Paulo",
""
]
] |
new_dataset
| 0.986081 |
1309.2090
|
Pedro Neto
|
Pedro Neto, Norberto Pires, Paulo Moreira
|
Accelerometer-based control of an industrial robotic arm
|
The 18th IEEE International Symposium on Robot and Human Interactive
Communication, 2009. RO-MAN 2009. pp. 1192-1197, Toyama, Japan, 2009
| null |
10.1109/ROMAN.2009.5326285
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of industrial robots are still programmed using the typical teaching
process, through the use of the robot teach pendant. In this paper is proposed
an accelerometer-based system to control an industrial robot using two low-cost
and small 3-axis wireless accelerometers. These accelerometers are attached to
the human arms, capturing its behavior (gestures and postures). An Artificial
Neural Network (ANN) trained with a back-propagation algorithm was used to
recognize arm gestures and postures, which then will be used as input in the
control of the robot. The aim is that the robot starts the movement almost at
the same time as the user starts to perform a gesture or posture (low response
time). The results show that the system allows the control of an industrial
robot in an intuitive way. However, the achieved recognition rate of gestures
and postures (92%) should be improved in future, keeping the compromise with
the system response time (160 milliseconds). Finally, the results of some tests
performed with an industrial robot are presented and discussed.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 09:54:08 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Neto",
"Pedro",
""
],
[
"Pires",
"Norberto",
""
],
[
"Moreira",
"Paulo",
""
]
] |
new_dataset
| 0.998861 |
1309.2093
|
Pedro Neto
|
Pedro Neto, Norberto Pires, Paulo Moreira
|
High-level programming and control for industrial robotics: using a
hand-held accelerometer-based input device for gesture and posture
recognition
|
Industrial Robot: An International Journal
|
Industrial Robot: An International Journal, Vol. 37 Iss: 2, 2010,
pp.137 - 147
|
10.1108/01439911011018911
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Purpose - Most industrial robots are still programmed using the typical
teaching process, through the use of the robot teach pendant. This is a tedious
and time-consuming task that requires some technical expertise, and hence new
approaches to robot programming are required. The purpose of this paper is to
present a robotic system that allows users to instruct and program a robot with
a high-level of abstraction from the robot language.
Design/methodology/approach - The paper presents in detail a robotic system
that allows users, especially non-expert programmers, to instruct and program a
robot just showing it what it should do, in an intuitive way. This is done
using the two most natural human interfaces (gestures and speech), a force
control system and several code generation techniques. Special attention will
be given to the recognition of gestures, where the data extracted from a motion
sensor (three-axis accelerometer) embedded in the Wii remote controller was
used to capture human hand behaviours. Gestures (dynamic hand positions) as
well as manual postures (static hand positions) are recognized using a
statistical approach and artificial neural networks.
Practical implications - The key contribution of this paper is that it offers
a practical method to program robots by means of gestures and speech, improving
work efficiency and saving time.
Originality/value - This paper presents an alternative to the typical robot
teaching process, extending the concept of human-robot interaction and
co-worker scenario. Since most companies do not have engineering resources to
make changes or add new functionalities to their robotic manufacturing systems,
this system constitutes a major advantage for small- to medium-sized
enterprises.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 09:58:22 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Neto",
"Pedro",
""
],
[
"Pires",
"Norberto",
""
],
[
"Moreira",
"Paulo",
""
]
] |
new_dataset
| 0.995229 |
1309.2137
|
Mike M\"uller
|
Tero Harju and Mike M\"uller
|
Square-Free Shuffles of Words
| null | null | null | null |
cs.DM cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $u \shuffle v$ denote the set of all shuffles of the words $u$ and $v$.
It is shown that for each integer $n \geq 3$ there exists a square-free ternary
word $u$ of length $n$ such that $u\shuffle u$ contains a square-free word.
This property is then shown to also hold for infinite words, i.e., there exists
an infinite square-free word $u$ on three letters such that $u$ can be shuffled
with itself to produce an infinite square-free word $w \in u \shuffle u$.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 12:47:07 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Harju",
"Tero",
""
],
[
"Müller",
"Mike",
""
]
] |
new_dataset
| 0.998362 |
1309.2139
|
Yongxin Wang
|
Yongxin Wang, Kumbesan Sandrasegaran, Xinning Zhu, Jingjing Fei,
Xiaoying Kong and Cheng-Chung Lin
|
Frequency and time domain packet scheduling based on channel prediction
with imperfect CQI in LTE
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Channel-dependent scheduling of transmission of data packets in a wireless
system is based on measurement and feedback of the channel quality. To
alleviate the performance degradation due to simultaneous multiple imperfect
channel quality information (CQI), a simple and efficient packet scheduling
(PS) algorithm is developed in downlink LTE system for real time traffic. A
frequency domain channel predictor based on Kalman filter is first developed to
restore the true CQI from erroneous channel quality feedback. Then, a time
domain grouping technique employing the joint of Proportional Fair (PF) and
Modified Largest Weighted Delay First (M-LWDF) algorithms is used. It was
proved this proposal achieves better performance in terms of system throughput
and packet loss ratio by simulation results.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 12:50:27 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Wang",
"Yongxin",
""
],
[
"Sandrasegaran",
"Kumbesan",
""
],
[
"Zhu",
"Xinning",
""
],
[
"Fei",
"Jingjing",
""
],
[
"Kong",
"Xiaoying",
""
],
[
"Lin",
"Cheng-Chung",
""
]
] |
new_dataset
| 0.960563 |
1309.2250
|
Ram Chandra Chauhan
|
R. C. S. Chauhan, Y. N. Singh, R. Asthana
|
A Search Algorithm to Find Multiple Sets of One Dimensional Unipolar
(Optical) Orthogonal Codes with Same Code-length and Low Weight
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a search algorithm to find multiple sets of one
dimensional unipolar (optical) orthogonal codes characterized by parameters,
binary code sequence of length (n bits) and weight w (number of bit 1s in the
sequence) as well as auto-correlation and cross-correlation constraint
respectively for the codes within a set. For a given code length n and code
weight w all possible difference sets, with auto-correlation constraints lying
from 1 to w-1 can be designed with distinct code serial number. For given
cross-correlation constraint from 1 to w-1 Multiple sets can be searched out of
the codes with auto-correlation constraints less than or equal to given
auto-correlation constraint using proposed algorithm. The searched multiple
sets can be sorted as having number of codes not less than the upper bound of
the sets given by Johnson bound. These one dimensional unipolar orthogonal
codes have their application in incoherent optical code division multiple
access systems.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 18:33:36 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Chauhan",
"R. C. S.",
""
],
[
"Singh",
"Y. N.",
""
],
[
"Asthana",
"R.",
""
]
] |
new_dataset
| 0.99567 |
1309.2254
|
Ram Chandra Chauhan
|
Ram Chandra Singh Chauhan (MIEEE), Yatindra Nath Singh (SMIEEE),
Rachna Asthana (MIEEE)
|
Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through
One Dimensional Unipolar (Optical) Orthogonal Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, an algorithm for construction of multiple sets of two
dimensional (2D) or matrix unipolar (optical) orthogonal codes has been
proposed. Representations of these 2D codes in difference of positions
representation (DoPR) have also been discussed along-with conventional weighted
positions representation (WPR) of the code. This paper also proposes less
complex methods for calculation of auto-correlation as well as
cross-correlation constraints within set of matrix codes. The multiple sets of
matrix codes provide flexibility for selection of optical orthogonal codes set
in wavelength-hopping time-spreading (WHTS) optical code division multiple
access (CDMA) system.
|
[
{
"version": "v1",
"created": "Mon, 9 Sep 2013 18:42:45 GMT"
}
] | 2013-09-10T00:00:00 |
[
[
"Chauhan",
"Ram Chandra Singh",
"",
"MIEEE"
],
[
"Singh",
"Yatindra Nath",
"",
"SMIEEE"
],
[
"Asthana",
"Rachna",
"",
"MIEEE"
]
] |
new_dataset
| 0.991314 |
1304.6316
|
Maurice Margenstern
|
Maurice Margenstern
|
About Strongly Universal Cellular Automata
|
In Proceedings MCU 2013, arXiv:1309.1043
|
EPTCS 128, 2013, pp. 93-125
|
10.4204/EPTCS.128.17
| null |
cs.DM nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct a strongly universal cellular automaton on the
line with 11 states and the standard neighbourhood. We embed this construction
into several tilings of the hyperbolic plane and of the hyperbolic 3D space
giving rise to strongly universal cellular automata with 10 states.
|
[
{
"version": "v1",
"created": "Tue, 23 Apr 2013 15:20:11 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Sep 2013 01:33:16 GMT"
}
] | 2013-09-09T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
new_dataset
| 0.980942 |
1309.1543
|
Oluwagbenga Ogunduyile O
|
O.A. Randle, O. O. Ogunduyile, T. Zuva, N. A. Fashola
|
A Comparism of the Performance of Supervised and Unsupervised Machine
Learning Techniques in evolving Awale/Mancala/Ayo Game Player
|
10 pages, 2 figures
|
International Journal of Game Theory and Technology (IJGTT),
Vol.1, No.1, June 2013
| null | null |
cs.LG cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Awale games have become widely recognized across the world, for their
innovative strategies and techniques which were used in evolving the agents
(player) and have produced interesting results under various conditions. This
paper will compare the results of the two major machine learning techniques by
reviewing their performance when using minimax, endgame database, a combination
of both techniques or other techniques, and will determine which are the best
techniques.
|
[
{
"version": "v1",
"created": "Fri, 6 Sep 2013 06:06:15 GMT"
}
] | 2013-09-09T00:00:00 |
[
[
"Randle",
"O. A.",
""
],
[
"Ogunduyile",
"O. O.",
""
],
[
"Zuva",
"T.",
""
],
[
"Fashola",
"N. A.",
""
]
] |
new_dataset
| 0.976185 |
1309.1714
|
Jalil Boukhobza
|
Pierre Olivier (Lab-STICC), Jalil Boukhobza (Lab-STICC), Eric Senn
(Lab-STICC)
|
Flashmon V2: Monitoring Raw NAND Flash Memory I/O Requests on Embedded
Linux
|
EWiLi, the Embedded Operating Systems Workshop, Toulouse : France
(2013)
| null | null | null |
cs.OS cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents Flashmon version 2, a tool for monitoring embedded Linux
NAND flash memory I/O requests. It is designed for embedded boards based
devices containing raw flash chips. Flashmon is a kernel module and stands for
"flash monitor". It traces flash I/O by placing kernel probes at the NAND
driver level. It allows tracing at runtime the 3 main flash operations: page
reads / writes and block erasures. Flashmon is (1) generic as it was
successfully tested on the three most widely used flash file systems that are
JFFS2, UBIFS and YAFFS, and several NAND chip models. Moreover, it is (2) non
intrusive, (3) has a controllable memory footprint, and (4) exhibits a low
overhead (<6%) on the traced system. Finally, it is (5) simple to integrate and
used as a standalone module or as a built-in function / module in existing
kernel sources. Monitoring flash memory operations allows a better
understanding of existing flash management systems by studying and analyzing
their behavior. Moreover it is useful in development phase for prototyping and
validating new solutions.
|
[
{
"version": "v1",
"created": "Fri, 6 Sep 2013 18:14:04 GMT"
}
] | 2013-09-09T00:00:00 |
[
[
"Olivier",
"Pierre",
"",
"Lab-STICC"
],
[
"Boukhobza",
"Jalil",
"",
"Lab-STICC"
],
[
"Senn",
"Eric",
"",
"Lab-STICC"
]
] |
new_dataset
| 0.99948 |
1202.2907
|
Yun Song
|
Yun Song, Zhihui Li
|
The weight Enumerator of some irreducible cyclic codes
|
This paper has been withdrawn by the author due to the inaccurate
expression of Lemma 2.5(ii) and Theorem 3.12(i), and the first equation in
(4) is wrong
| null | null | null |
cs.CR cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
Irreducible cyclic codes are one of the largest known classes of block codes
which have been investigated for a long time. However, their weight
distributions are known only for a few cases. In this paper, a class of
irreducible cyclic codes are studied and their weight distributions are
determined. Moreover, all codewords of some irreducible cyclic codes are
obtained through programming in order to explain their distributions. The
number of distinct nonzero weights in these codes dealt with in this paper
varies among 1,2,3,6,8.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2012 01:42:20 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Jan 2013 09:26:31 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Sep 2013 03:35:13 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Song",
"Yun",
""
],
[
"Li",
"Zhihui",
""
]
] |
new_dataset
| 0.999412 |
1212.3282
|
EPTCS
|
Niall Murphy (Universidad Polit\'ecnica de Madrid), Damien Woods
(California Institute of Technology)
|
AND and/or OR: Uniform Polynomial-Size Circuits
|
In Proceedings MCU 2013, arXiv:1309.1043
|
EPTCS 128, 2013, pp. 150-166
|
10.4204/EPTCS.128.20
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the complexity of uniform OR circuits and AND circuits of
polynomial-size and depth. As their name suggests, OR circuits have OR gates as
their computation gates, as well as the usual input, output and constant (0/1)
gates. As is the norm for Boolean circuits, our circuits have multiple sink
gates, which implies that an OR circuit computes an OR function on some subset
of its input variables. Determining that subset amounts to solving a number of
reachability questions on a polynomial-size directed graph (which input gates
are connected to the output gate?), taken from a very sparse set of graphs.
However, it is not obvious whether or not this (restricted) reachability
problem can be solved, by say, uniform AC^0 circuits (constant depth,
polynomial-size, AND, OR, NOT gates). This is one reason why characterizing the
power of these simple-looking circuits in terms of uniform classes turns out to
be intriguing. Another is that the model itself seems particularly natural and
worthy of study.
Our goal is the systematic characterization of uniform polynomial-size OR
circuits, and AND circuits, in terms of known uniform machine-based complexity
classes. In particular, we consider the languages reducible to such uniform
families of OR circuits, and AND circuits, under a variety of reduction types.
We give upper and lower bounds on the computational power of these language
classes. We find that these complexity classes are closely related to tallyNL,
the set of unary languages within NL, and to sets reducible to tallyNL.
Specifically, for a variety of types of reductions (many-one, conjunctive truth
table, disjunctive truth table, truth table, Turing) we give characterizations
of languages reducible to OR circuit classes in terms of languages reducible to
tallyNL classes. Then, some of these OR classes are shown to coincide, and some
are proven to be distinct. We give analogous results for AND circuits. Finally,
for many of our OR circuit classes, and analogous AND circuit classes, we prove
whether or not the two classes coincide, although we leave one such inclusion
open.
|
[
{
"version": "v1",
"created": "Thu, 13 Dec 2012 19:35:12 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Sep 2013 08:08:19 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Murphy",
"Niall",
"",
"Universidad Politécnica de Madrid"
],
[
"Woods",
"Damien",
"",
"California Institute of Technology"
]
] |
new_dataset
| 0.998757 |
1309.1156
|
Suranjan Ganguly
|
Ayan Seal, Suranjan Ganguly, Debotosh Bhattacharjee, Mita Nasipuri,
Dipak kr. Basu
|
Thermal Human face recognition based on Haar wavelet transform and
series matching technique
|
12 pages. arXiv admin note: substantial text overlap with
arXiv:1309.1009
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/publicdomain/
|
Thermal infrared (IR) images represent the heat patterns emitted from hot
object and they do not consider the energies reflected from an object. Objects
living or non-living emit different amounts of IR energy according to their
body temperature and characteristics. Humans are homoeothermic and hence
capable of maintaining constant temperature under different surrounding
temperature. Face recognition from thermal (IR) images should focus on changes
of temperature on facial blood vessels. These temperature changes can be
regarded as texture features of images and wavelet transform is a very good
tool to analyze multi-scale and multi-directional texture. Wavelet transform is
also used for image dimensionality reduction, by removing redundancies and
preserving original features of the image. The sizes of the facial images are
normally large. So, the wavelet transform is used before image similarity is
measured. Therefore this paper describes an efficient approach of human face
recognition based on wavelet transform from thermal IR images. The system
consists of three steps. At the very first step, human thermal IR face image is
preprocessed and the face region is only cropped from the entire image.
Secondly, Haar wavelet is used to extract low frequency band from the cropped
face region. Lastly, the image classification between the training images and
the test images is done, which is based on low-frequency components. The
proposed approach is tested on a number of human thermal infrared face images
created at our own laboratory and Terravic Facial IR Database. Experimental
results indicated that the thermal infra red face images can be recognized by
the proposed system effectively. The maximum success of 95% recognition has
been achieved.
|
[
{
"version": "v1",
"created": "Wed, 4 Sep 2013 13:45:25 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Seal",
"Ayan",
""
],
[
"Ganguly",
"Suranjan",
""
],
[
"Bhattacharjee",
"Debotosh",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak kr.",
""
]
] |
new_dataset
| 0.989855 |
1309.1218
|
Nian Li
|
Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang
|
Optimal Ternary Cyclic Codes with Minimum Distance Four and Five
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyclic codes are an important subclass of linear codes and have wide
applications in data storage systems, communication systems and consumer
electronics. In this paper, two families of optimal ternary cyclic codes are
presented. The first family of cyclic codes has parameters $[3^m-1, 3^m-1-2m,
4]$ and contains a class of conjectured cyclic codes and several new classes of
optimal cyclic codes. The second family of cyclic codes has parameters $[3^m-1,
3^m-2-2m, 5]$ and contains a number of classes of cyclic codes that are
obtained from perfect nonlinear functions over $\fthreem$, where $m>1$ and is a
positive integer.
|
[
{
"version": "v1",
"created": "Thu, 5 Sep 2013 01:46:46 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Li",
"Nian",
""
],
[
"Li",
"Chunlei",
""
],
[
"Helleseth",
"Tor",
""
],
[
"Ding",
"Cunsheng",
""
],
[
"Tang",
"Xiaohu",
""
]
] |
new_dataset
| 0.999766 |
1309.1232
|
Devi Nagaraj Ms
|
A.S.Syed Fiaz, N.Devi and S.Aarthi
|
Bug Tracking and Reporting System
|
4 Pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is the world of information. The ever growing field Information
Technology has its many advanced notable features which made it what it was now
today. In this world, the information has to be processed, clearly distributed
and must be efficiently reachable to the end users intended for that. Otherwise
we know it lead to disastrous situations. The other coin of the same phase is
it is absolutely necessary to know any bugs that are hither to faced by the end
users. The project Bug Tracking and Reporting System aims to provide the
solution for that. The Bug Tracker can be made from any two types. The first
one being the system side, the other being the services side. Our project deals
with the second one. The paper is wholly dedicated to tracking the bugs that
are hither by arise. The administrator maintains the master details regarding
to the bugs id, bugs type, bugs description, bugs severity, bugs status, user
details. The administrator too has the authority to update the master details
of severity level, status level, etc, modules of the paper. The administrator
adds the users and assign them responsibility of completing the paper. Finally
on analyzing the paper assigned to the particular user, the administrator can
track the bugs, and it is automatically added to the tables containing the
bugs, by order of severity and status. The administrator can know the
information in tact the various paper s assigned to various users, their bug
tracking status, their description etc in the form of reports from time to
time.
|
[
{
"version": "v1",
"created": "Thu, 5 Sep 2013 04:37:16 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Fiaz",
"A. S. Syed",
""
],
[
"Devi",
"N.",
""
],
[
"Aarthi",
"S.",
""
]
] |
new_dataset
| 0.959354 |
1309.1274
|
EPTCS
|
Dmitry A. Zaitsev (International Humanitarian University, Professor)
|
A Small Universal Petri Net
|
In Proceedings MCU 2013, arXiv:1309.1043. the smallest known
universal Petri net
|
EPTCS 128, 2013, pp. 190-202
|
10.4204/EPTCS.128.22
| null |
cs.FL cs.CC cs.DC cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A universal deterministic inhibitor Petri net with 14 places, 29 transitions
and 138 arcs was constructed via simulation of Neary and Woods' weakly
universal Turing machine with 2 states and 4 symbols; the total time complexity
is exponential in the running time of their weak machine. To simulate the blank
words of the weakly universal Turing machine, a couple of dedicated transitions
insert their codes when reaching edges of the working zone. To complete a chain
of a given Petri net encoding to be executed by the universal Petri net, a
translation of a bi-tag system into a Turing machine was constructed. The
constructed Petri net is universal in the standard sense; a weaker form of
universality for Petri nets was not introduced in this work.
|
[
{
"version": "v1",
"created": "Thu, 5 Sep 2013 08:08:46 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Zaitsev",
"Dmitry A.",
"",
"International Humanitarian University, Professor"
]
] |
new_dataset
| 0.968354 |
1309.1300
|
Kyatsandra Nagananda
|
K. G. Nagananda
|
Electrical Structure-Based PMU Placement in Electric Power Systems
|
8 pages, 10 figures, submitted to IEEE Transactions on Smart Grid,
August 2013
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent work on complex networks compared the topological and electrical
structures of the power grid, taking into account the underlying physical laws
that govern the electrical connectivity between various components in the
network. A distance metric, namely, resistance distance was introduced to
provide a more comprehensive description of interconnections in power systems
compared with the topological structure, which is based only on geographic
connections between network components. Motivated by these studies, in this
paper we revisit the phasor measurement unit (PMU) placement problem by
deriving the connectivity matrix of the network using resistance distances
between buses in the grid, and use it in the integer program formulations for
several standard IEEE bus systems. The main result of this paper is rather
discouraging: more number of PMUs are required, compared with those obtained
using the topological structure, to meet the desired objective of complete
network observability without zero injection measurements. However, in light of
recent advances in the electrical structure of the grid, our study provides a
more realistic perspective of PMU placement in power systems. By further
exploring the connectivity matrix derived using the electrical structure, we
devise a procedure to solve the placement problem without resorting to linear
programming.
|
[
{
"version": "v1",
"created": "Thu, 5 Sep 2013 10:09:18 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Nagananda",
"K. G.",
""
]
] |
new_dataset
| 0.995258 |
1309.1432
|
Zhengjun Cao
|
Zhengjun Cao and Lihua Liu
|
Ordered Probability Mass Function
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose that in the four tests Alice's scores are 90, 95, 85, 90, and Bob's
scores are 85, 95, 90, 90. How to evaluate their scores? In this paper, we
introduce the concept of ordered probability mass function which can be used to
find a probability mass function with smaller variance. More interestingly, we
can use it to distinguish sequences of positive numbers statistically.
|
[
{
"version": "v1",
"created": "Sat, 31 Aug 2013 23:19:42 GMT"
}
] | 2013-09-06T00:00:00 |
[
[
"Cao",
"Zhengjun",
""
],
[
"Liu",
"Lihua",
""
]
] |
new_dataset
| 0.980226 |
1309.1026
|
Bin Li
|
Bin Li, Hui Shen, and David Tse
|
Parallel Decoders of Polar Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this letter, we propose parallel SC (Successive Cancellation) decoder and
parallel SC-List decoder for polar codes. The parallel decoder is composed of
M=2^m(m>=1) component decoders working in parallel and each component decoder
decodes a Polar code of a block size of 1/M of the original Polar code.
Therefore the parallel decoder has M times faster decoding speed. Our
simulation results show that the parallel decoder has almost the same
error-rate performance as the conventional non-parallel decoder.
|
[
{
"version": "v1",
"created": "Wed, 4 Sep 2013 13:42:04 GMT"
}
] | 2013-09-05T00:00:00 |
[
[
"Li",
"Bin",
""
],
[
"Shen",
"Hui",
""
],
[
"Tse",
"David",
""
]
] |
new_dataset
| 0.997973 |
1309.0534
|
Raphael kena Poss
|
Raphael 'kena' Poss
|
Machines are benchmarked by code, not algorithms
|
34 pages, 11 figures, 11 listings, 17 tables
| null | null | null |
cs.SE cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article highlights how small modifications to either the source code of
a benchmark program or the compilation options may impact its behavior on a
specific machine. It argues that for evaluating machines, benchmark providers
and users be careful to ensure reproducibility of results based on the machine
code actually running on the hardware and not just source code. The article
uses color to grayscale conversion of digital images as a running example.
|
[
{
"version": "v1",
"created": "Mon, 2 Sep 2013 20:34:09 GMT"
}
] | 2013-09-04T00:00:00 |
[
[
"Poss",
"Raphael 'kena'",
""
]
] |
new_dataset
| 0.985816 |
1201.0749
|
Gary McGuire
|
Gary McGuire, Bastian Tugemann, Gilles Civario
|
There is no 16-Clue Sudoku: Solving the Sudoku Minimum Number of Clues
Problem
|
43 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The sudoku minimum number of clues problem is the following question: what is
the smallest number of clues that a sudoku puzzle can have? For several years
it had been conjectured that the answer is 17. We have performed an exhaustive
computer search for 16-clue sudoku puzzles, and did not find any, thus proving
that the answer is indeed 17. In this article we describe our method and the
actual search. As a part of this project we developed a novel way for
enumerating hitting sets. The hitting set problem is computationally hard; it
is one of Karp's 21 classic NP-complete problems. A standard backtracking
algorithm for finding hitting sets would not be fast enough to search for a
16-clue sudoku puzzle exhaustively, even at today's supercomputer speeds. To
make an exhaustive search possible, we designed an algorithm that allowed us to
efficiently enumerate hitting sets of a suitable size.
|
[
{
"version": "v1",
"created": "Sun, 1 Jan 2012 19:04:10 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Sep 2013 16:43:56 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"McGuire",
"Gary",
""
],
[
"Tugemann",
"Bastian",
""
],
[
"Civario",
"Gilles",
""
]
] |
new_dataset
| 0.956702 |
1304.4383
|
Alireza Karbalay-Ghareh
|
Alireza Karbalay-Ghareh, Masoumeh Nasiri-Kenari, and Mohsen Hejazi
|
Convolutional Network-Coded Cooperation in Multi-Source Networks with a
Multi-Antenna Relay
|
23 pages, 9 figures, 1 table, submitted to IEEE Transactions on
Wireless Communications
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel cooperative transmission scheme called "Convolutional
Network-Coded Cooperation" (CNCC) for a network including N sources, one
M-antenna relay, and one common destination. The source-relay (S-R) channels
are assumed to be Nakagami-m fading, while the source-destination (S-D) and the
relay-destination (R-D) channels are considered Rayleigh fading. The CNCC
scheme exploits the generator matrix of a good (N+M', N, v) systematic
convolutional code, with the free distance of d_free designed over GF(2), as
the network coding matrix which is run by the network's nodes, such that the
systematic symbols are directly transmitted from the sources, and the parity
symbols are sent by the best antenna of the relay. An upper bound on the BER of
the sources, and consequently, the achieved diversity orders are obtained. The
numerical results indicate that the CNCC scheme outperforms the other
cooperative schemes considered, in terms of the diversity order and the network
throughput. The simulation results confirm the accuracy of the theoretical
analysis.
|
[
{
"version": "v1",
"created": "Tue, 16 Apr 2013 09:54:03 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Sep 2013 09:31:33 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Karbalay-Ghareh",
"Alireza",
""
],
[
"Nasiri-Kenari",
"Masoumeh",
""
],
[
"Hejazi",
"Mohsen",
""
]
] |
new_dataset
| 0.969893 |
1309.0073
|
Cheng Bo
|
Cheng Bo, Lan Zhang, Xiang-Yang Li
|
SilentSense: Silent User Identification via Dynamics of Touch and
Movement Behavioral Biometrics
| null | null | null | null |
cs.CR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increased popularity of smartphones, various security threats and
privacy leakages targeting them are discovered and investigated. In this work,
we present \ourprotocoltight, a framework to authenticate users silently and
transparently by exploiting dynamics mined from the user touch behavior
biometrics and the micro-movement of the device caused by user's screen-touch
actions. We build a "touch-based biometrics" model of the owner by extracting
some principle features, and then verify whether the current user is the owner
or guest/attacker. When using the smartphone, the unique operating dynamics of
the user is detected and learnt by collecting the sensor data and touch events
silently. When users are mobile, the micro-movement of mobile devices caused by
touch is suppressed by that due to the large scale user-movement which will
render the touch-based biometrics ineffective. To address this, we integrate a
movement-based biometrics for each user with previous touch-based biometrics.
We conduct extensive evaluations of our approaches on the Android smartphone,
we show that the user identification accuracy is over 99%.
|
[
{
"version": "v1",
"created": "Sat, 31 Aug 2013 08:16:53 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Bo",
"Cheng",
""
],
[
"Zhang",
"Lan",
""
],
[
"Li",
"Xiang-Yang",
""
]
] |
new_dataset
| 0.998017 |
1309.0088
|
Seyed Pooya Shariatpanahi Dr.
|
Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj
|
Caching Gain in Wireless Networks with Fading: A Multi-User Diversity
Perspective
|
6 pages, 4 figures, conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the effect of caching in wireless networks where fading is the
dominant channel effect. First, we propose a one-hop transmission strategy for
cache-enabled wireless networks, which is based on exploiting multi-user
diversity gain. Then, we derive a closed-form result for throughput scaling of
the proposed scheme in large networks, which reveals the inherent trade-off
between cache memory size and network throughput. Our results show that
substantial throughput improvements are achievable in networks with sources
equipped with large cache size. We also verify our analytical result through
simulations.
|
[
{
"version": "v1",
"created": "Sat, 31 Aug 2013 09:43:52 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Shariatpanahi",
"Seyed Pooya",
""
],
[
"Shah-Mansouri",
"Hamed",
""
],
[
"Khalaj",
"Babak Hossein",
""
]
] |
new_dataset
| 0.987086 |
1309.0185
|
Dr. R.V. Krishnaiah
|
S. Sri Gurudatta Yadav and R. V. Krishnaiah
|
Haptic Science and Technology
|
8 Pages
|
International Journal of Computer Engineering and Technology,
August, 2013
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Haptic technology, or haptics, is a tactile feedback technology which takes
advantage of a user's sense of touch by applying forces, vibrations, and/or
motions upon the user. This mechanical stimulation may be used to assist in the
creation of virtual objects (objects existing only in a computer simulation),
for control of such virtual objects, and for the enhancement of the remote
control of machines and devices. It has been described as for the sense of
touch what computer graphics does for vision. Although haptic devices are
capable of measuring bulk or reactive forces that are applied by the user, it
should not be confused with touch or tactile sensors that measure the pressure
or force exerted by the user to the interface.
|
[
{
"version": "v1",
"created": "Sun, 1 Sep 2013 06:02:11 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Yadav",
"S. Sri Gurudatta",
""
],
[
"Krishnaiah",
"R. V.",
""
]
] |
new_dataset
| 0.999452 |
1309.0193
|
Ram Chandra Chauhan
|
Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana
|
Design of Minimum Correlated, Maximal Clique Sets of One-Dimensional
Uni-polar (Optical) Orthogonal Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes an algorithm to search a family of multiple sets of
minimum correlated one dimensional uni-polar (optical) orthogonal codes
(1-DUOC) or optical orthogonal codes (OOC) with fixed as well as variable code
parameters. The cardinality of each set is equal to upper bound. The codes
within a set can be searched for general values of code length, code weight,
auto-correlation constraint and cross-correlation constraint. Each set forms a
maximal clique of the codes within given range of correlation properties .
These one-dimensional uni-polar orthogonal codes can find their application as
signature sequences for spectral spreading purpose in incoherent optical code
division multiple access (CDMA) systems.
|
[
{
"version": "v1",
"created": "Sun, 1 Sep 2013 08:51:57 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Chauhan",
"Ram Chandra Singh",
""
],
[
"Singh",
"Yatindra Nath",
""
],
[
"Asthana",
"Rachna",
""
]
] |
new_dataset
| 0.991575 |
1309.0199
|
Baofeng Wu
|
Baofeng Wu, Dongdai Lin
|
New constructions of quaternary bent functions
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new construction of quaternary bent functions from
quaternary quadratic forms over Galois rings of characteristic 4 is proposed.
Based on this construction, several new classes of quaternary bent functions
are obtained, and as a consequence, several new classes of quadratic binary
bent and semi-bent functions in polynomial forms are derived. This work
generalizes the recent work of N. Li, X. Tang and T. Helleseth.
|
[
{
"version": "v1",
"created": "Sun, 1 Sep 2013 10:17:40 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Wu",
"Baofeng",
""
],
[
"Lin",
"Dongdai",
""
]
] |
new_dataset
| 0.98379 |
1309.0456
|
Jean-Remy Falleri
|
Jean-R\'emy Falleri (LaBRI), C\'edric Teyton (LaBRI), Matthieu
Foucault (LaBRI), Marc Palyart (LaBRI), Flor\'eal Morandat (LaBRI), Xavier
Blanc (LaBRI)
|
The Harmony Platform
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
According to Wikipedia, The Mining Software Repositories (MSR) field analyzes
the rich data available in software repositories, such as version control
repositories, mailing list archives, bug tracking systems, issue tracking
systems, etc. to uncover interesting and actionable information about software
systems, projects and software engineering. The MSR field has received a great
deal of attention and has now its own research conference :
http://www.msrconf.org/. However performing MSR studies is still a technical
challenge. Indeed, data sources (such as version control system or bug tracking
systems) are highly heterogeneous. Moreover performing a study on a lot of data
sources is very expensive in terms of execution time. Surprisingly, there are
not so many tools able to help researchers in their MSR quests. This is why we
created the Harmony platform, as a mean to assist researchers in performing MSR
studies.
|
[
{
"version": "v1",
"created": "Mon, 2 Sep 2013 16:26:41 GMT"
}
] | 2013-09-03T00:00:00 |
[
[
"Falleri",
"Jean-Rémy",
"",
"LaBRI"
],
[
"Teyton",
"Cédric",
"",
"LaBRI"
],
[
"Foucault",
"Matthieu",
"",
"LaBRI"
],
[
"Palyart",
"Marc",
"",
"LaBRI"
],
[
"Morandat",
"Floréal",
"",
"LaBRI"
],
[
"Blanc",
"Xavier",
"",
"LaBRI"
]
] |
new_dataset
| 0.964399 |
1308.6663
|
Chenshu Wu
|
Chenshu Wu, Zheng Yang, Zimu Zhou, Yunhao Liu, Mingyan Liu
|
DorFin: WiFi Fingerprint-based Localization Revisited
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although WiFi fingerprint-based indoor localization is attractive, its
accuracy remains a primary challenge especially in mobile environments.
Existing approaches either appeal to physical layer information or rely on
extra wireless signals for high accuracy. In this paper, we revisit the RSS
fingerprint-based localization scheme and reveal crucial observations that act
as the root causes of localization errors, yet are surprisingly overlooked or
even unseen in previous works. Specifically, we recognize APs' diverse
discrimination for fingerprinting a specific location, observe the RSS
inconsistency caused by signal fluctuations and human body blockages, and
uncover the RSS outdated problem on commodity smartphones. Inspired by these
insights, we devise a discrimination factor to quantify different APs'
discrimination, incorporate robust regression to tolerate outlier measurements,
and reassemble different fingerprints to cope with outdated RSSs. Combining
these techniques in a unified solution, we propose DorFin, a novel scheme of
fingerprint generation, representation, and matching, which yields remarkable
accuracy without incurring extra cost. Extensive experiments demonstrate that
DorFin achieves mean error of 2 meters and more importantly, bounds the 95th
percentile error under 5.5 meters; these are about 56% and 69% lower,
respectively, compared with the state-of-the-art schemes such as Horus and
RADAR.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 07:14:35 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Wu",
"Chenshu",
""
],
[
"Yang",
"Zheng",
""
],
[
"Zhou",
"Zimu",
""
],
[
"Liu",
"Yunhao",
""
],
[
"Liu",
"Mingyan",
""
]
] |
new_dataset
| 0.999255 |
1308.6693
|
Therese Biedl
|
Therese Biedl
|
Transforming planar graph drawings while maintaining height
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There are numerous styles of planar graph drawings, notably straight-line
drawings, poly-line drawings, orthogonal graph drawings and visibility
representations. In this note, we show that many of these drawings can be
transformed from one style to another without changing the height of the
drawing. We then give some applications of these transformations.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 09:37:36 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Biedl",
"Therese",
""
]
] |
new_dataset
| 0.99953 |
1308.6697
|
Uwe Aickelin
|
Yihui Liu, Uwe Aickelin
|
Detect adverse drug reactions for drug Atorvastatin
|
Fifth International Symposium on Computational Intelligence and
Design (ISCID), 213-216, 2012. arXiv admin note: substantial text overlap
with arXiv:1308.5144
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Adverse drug reactions (ADRs) are big concern for public health. ADRs are one
of most common causes to withdraw some drugs from markets. Now two major
methods for detecting ADRs are spontaneous reporting system (SRS), and
prescription event monitoring (PEM). The World Health Organization (WHO)
defines a signal in pharmacovigilance as "any reported information on a
possible causal relationship between an adverse event and a drug, the
relationship being unknown or incompletely documented previously". For
spontaneous reporting systems, many machine learning methods are used to detect
ADRs, such as Bayesian confidence propagation neural network (BCPNN), decision
support methods, genetic algorithms, knowledge based approaches, etc. One
limitation is the reporting mechanism to submit ADR reports, which has serious
underreporting and is not able to accurately quantify the corresponding risk.
Another limitation is hard to detect ADRs with small number of occurrences of
each drug-event association in the database. In this paper we propose feature
selection approach to detect ADRs from The Health Improvement Network (THIN)
database. First a feature matrix, which represents the medical events for the
patients before and after taking drugs, is created by linking patients'
prescriptions and corresponding medical events together. Then significant
features are selected based on feature selection methods, comparing the feature
matrix before patients take drugs with one after patients take drugs. Finally
the significant ADRs can be detected from thousands of medical events based on
corresponding features. Experiments are carried out on the drug Atorvastatin.
Good performance is achieved.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 09:55:56 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Liu",
"Yihui",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
new_dataset
| 0.997575 |
1308.6705
|
Thomas Holleczek
|
Thomas Holleczek, Liang Yu, Joseph K. Lee, Oliver Senn, Kristian
Kloeckl, Carlo Ratti, Patrick Jaillet
|
Digital breadcrumbs: Detecting urban mobility patterns and transport
mode choices from cellphone networks
| null | null | null | null |
cs.SI physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many modern and growing cities are facing declines in public transport usage,
with few efficient methods to explain why. In this article, we show that urban
mobility patterns and transport mode choices can be derived from cellphone call
detail records coupled with public transport data recorded from smart cards.
Specifically, we present new data mining approaches to determine the spatial
and temporal variability of public and private transportation usage and
transport mode preferences across Singapore. Our results, which were validated
by Singapore's quadriennial Household Interview Travel Survey (HITS), revealed
that there are 3.5 (HITS: 3.5 million) million and 4.3 (HITS: 4.4 million)
million inter-district passengers by public and private transport,
respectively. Along with classifying which transportation connections are weak
or underserved, the analysis shows that the mode share of public transport use
increases from 38 percent in the morning to 44 percent around mid-day and 52
percent in the evening.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 10:47:57 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Holleczek",
"Thomas",
""
],
[
"Yu",
"Liang",
""
],
[
"Lee",
"Joseph K.",
""
],
[
"Senn",
"Oliver",
""
],
[
"Kloeckl",
"Kristian",
""
],
[
"Ratti",
"Carlo",
""
],
[
"Jaillet",
"Patrick",
""
]
] |
new_dataset
| 0.975069 |
1308.6730
|
Pawe{\l} Pszona
|
Michael T. Goodrich and Pawe{\l} Pszona
|
Achieving Good Angular Resolution in 3D Arc Diagrams
|
12 pages, 5 figures; to appear at the 21st International Symposium on
Graph Drawing (GD 2013)
| null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a three-dimensional analogue to the well-known graph visualization
approach known as arc diagrams. We provide several algorithms that achieve good
angular resolution for 3D arc diagrams, even for cases when the arcs must
project to a given 2D straight-line drawing of the input graph. Our methods
make use of various graph coloring algorithms, including an algorithm for a new
coloring problem, which we call localized edge coloring.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 12:56:55 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Goodrich",
"Michael T.",
""
],
[
"Pszona",
"Paweł",
""
]
] |
new_dataset
| 0.963767 |
1308.6805
|
Dan Ma
|
Jinsong Han, Chen Qian, Dan Ma, Xing Wang, Jizhong Zhao, Pengfeng
Zhang, Wei Xi, Zhiping Jiang
|
Twins:Device-free Object Tracking using Passive Tags
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Without requiring objects to carry any transceiver, device-free based object
tracking provides a promising solution for many localization and tracking
systems to monitor non-cooperative objects such as intruders. However, existing
device-free solutions mainly use sensors and active RFID tags, which are much
more expensive compared to passive tags. In this paper, we propose a novel
motion detection and tracking method using passive RFID tags, named Twins. The
method leverages a newly observed phenomenon called critical state caused by
interference among passive tags. We contribute to both theory and practice of
such phenomenon by presenting a new interference model that perfectly explains
this phenomenon and using extensive experiments to validate it. We design a
practical Twins based intrusion detection scheme and implement a real prototype
with commercial off-the-shelf reader and tags. The results show that Twins is
effective in detecting the moving object, with low location error of 0.75m in
average.
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 17:43:20 GMT"
}
] | 2013-09-02T00:00:00 |
[
[
"Han",
"Jinsong",
""
],
[
"Qian",
"Chen",
""
],
[
"Ma",
"Dan",
""
],
[
"Wang",
"Xing",
""
],
[
"Zhao",
"Jizhong",
""
],
[
"Zhang",
"Pengfeng",
""
],
[
"Xi",
"Wei",
""
],
[
"Jiang",
"Zhiping",
""
]
] |
new_dataset
| 0.980068 |
1308.6138
|
Mathieu Bouet
|
K\'evin Phemius, Mathieu Bouet, J\'er\'emie Leguay
|
DISCO: Distributed Multi-domain SDN Controllers
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern multi-domain networks now span over datacenter networks, enterprise
networks, customer sites and mobile entities. Such networks are critical and,
thus, must be resilient, scalable and easily extensible. The emergence of
Software-Defined Networking (SDN) protocols, which enables to decouple the data
plane from the control plane and dynamically program the network, opens up new
ways to architect such networks. In this paper, we propose DISCO, an open and
extensible DIstributed SDN COntrol plane able to cope with the distributed and
heterogeneous nature of modern overlay networks and wide area networks. DISCO
controllers manage their own network domain and communicate with each others to
provide end-to-end network services. This communication is based on a unique
lightweight and highly manageable control channel used by agents to
self-adaptively share aggregated network-wide information. We implemented DISCO
on top of the Floodlight OpenFlow controller and the AMQP protocol. We
demonstrated how DISCO's control plane dynamically adapts to heterogeneous
network topologies while being resilient enough to survive to disruptions and
attacks and providing classic functionalities such as end-point migration and
network-wide traffic engineering. The experimentation results we present are
organized around three use cases: inter-domain topology disruption, end-to-end
priority service request and virtual machine migration.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 12:04:41 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Aug 2013 13:56:15 GMT"
}
] | 2013-08-30T00:00:00 |
[
[
"Phemius",
"Kévin",
""
],
[
"Bouet",
"Mathieu",
""
],
[
"Leguay",
"Jérémie",
""
]
] |
new_dataset
| 0.999018 |
1308.6311
|
Nizar Zaghden
|
Nizar Zaghden, Remy Mullot, Mohamed Adel Alimi
|
Categorizing ancient documents
|
10 pages
|
IJCSI International Journal of Computer Science Issues, Vol. 10,
Issue 2, No 2, March 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784
www.IJCSI.org
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The analysis of historical documents is still a topical issue given the
importance of information that can be extracted and also the importance given
by the institutions to preserve their heritage. The main idea in order to
characterize the content of the images of ancient documents after attempting to
clean the image is segmented blocks texts from the same image and tries to find
similar blocks in either the same image or the entire image database. Most
approaches of offline handwriting recognition proceed by segmenting words into
smaller pieces (usually characters) which are recognized separately.
Recognition of a word then requires the recognition of all characters (OCR)
that compose it. Our work focuses mainly on the characterization of classes in
images of old documents. We use Som toolbox for finding classes in documents.
We applied also fractal dimensions and points of interest to categorize and
match ancient documents.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 21:09:35 GMT"
}
] | 2013-08-30T00:00:00 |
[
[
"Zaghden",
"Nizar",
""
],
[
"Mullot",
"Remy",
""
],
[
"Alimi",
"Mohamed Adel",
""
]
] |
new_dataset
| 0.998351 |
1308.6096
|
Clinton Goss Ph.D.
|
Robert B. K. Dewar, Martin Charles Golumbic, and Clinton F. Goss
|
Micro Spitbol
|
Initially published October 1979; Revised August 28, 2013. 8 pages, 3
figures
| null | null | null |
cs.PL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
A compact version of MACRO SPITBOL, a compiler/ interpreter for a variant of
SNOBOL4, has been developed for use on microcomputer systems. The techniques
for producing an implementation are largely automatic in order to preserve the
integrity and portability of the SPITBOL system. These techniques are discussed
along with a description of an initial implementation on a 65K byte
minicomputer. An interesting theoretical problem which arises when using
procedures which compact the interpretive object code is also analyzed.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 08:59:41 GMT"
}
] | 2013-08-29T00:00:00 |
[
[
"Dewar",
"Robert B. K.",
""
],
[
"Golumbic",
"Martin Charles",
""
],
[
"Goss",
"Clinton F.",
""
]
] |
new_dataset
| 0.987229 |
1308.6118
|
Sorin Alupoaie
|
Sorin Alupoaie, P\'adraig Cunningham
|
Using tf-idf as an edge weighting scheme in user-object bipartite
networks
| null | null | null | null |
cs.SI cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bipartite user-object networks are becoming increasingly popular in
representing user interaction data in a web or e-commerce environment. They
have certain characteristics and challenges that differentiates them from other
bipartite networks. This paper analyzes the properties of five real world
user-object networks. In all cases we found a heavy tail object degree
distribution with popular objects connecting together a large part of the users
causing significant edge inflation in the projected users network. We propose a
novel edge weighting strategy based on tf-idf and show that the new scheme
improves both the density and the quality of the community structure in the
projections. The improvement is also noticed when comparing to partially random
networks.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 10:25:02 GMT"
}
] | 2013-08-29T00:00:00 |
[
[
"Alupoaie",
"Sorin",
""
],
[
"Cunningham",
"Pádraig",
""
]
] |
new_dataset
| 0.991948 |
1308.6166
|
Dimitrios Thilikos
|
Alexander Grigoriev and Athanassios Koutsonas and Dimitrios M.
Thilikos
|
Bidimensionality of Geometric Intersection Graphs
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let B be a finite collection of geometric (not necessarily convex) bodies in
the plane. Clearly, this class of geometric objects naturally generalizes the
class of disks, lines, ellipsoids, and even convex polygons. We consider
geometric intersection graphs GB where each body of the collection B is
represented by a vertex, and two vertices of GB are adjacent if the
intersection of the corresponding bodies is non-empty. For such graph classes
and under natural restrictions on their maximum degree or subgraph exclusion,
we prove that the relation between their treewidth and the maximum size of a
grid minor is linear. These combinatorial results vastly extend the
applicability of all the meta-algorithmic results of the bidimensionality
theory to geometrically defined graph classes.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 14:29:53 GMT"
}
] | 2013-08-29T00:00:00 |
[
[
"Grigoriev",
"Alexander",
""
],
[
"Koutsonas",
"Athanassios",
""
],
[
"Thilikos",
"Dimitrios M.",
""
]
] |
new_dataset
| 0.983197 |
1308.6242
|
Saif Mohammad Dr.
|
Saif M. Mohammad, Svetlana Kiritchenko, and Xiaodan Zhu
|
NRC-Canada: Building the State-of-the-Art in Sentiment Analysis of
Tweets
| null |
In Proceedings of the seventh international workshop on Semantic
Evaluation Exercises (SemEval-2013), June 2013, Atlanta, USA
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe how we created two state-of-the-art SVM
classifiers, one to detect the sentiment of messages such as tweets and SMS
(message-level task) and one to detect the sentiment of a term within a
submissions stood first in both tasks on tweets, obtaining an F-score of 69.02
in the message-level task and 88.93 in the term-level task. We implemented a
variety of surface-form, semantic, and sentiment features. with sentiment-word
hashtags, and one from tweets with emoticons. In the message-level task, the
lexicon-based features provided a gain of 5 F-score points over all others.
Both of our systems can be replicated us available resources.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 18:23:03 GMT"
}
] | 2013-08-29T00:00:00 |
[
[
"Mohammad",
"Saif M.",
""
],
[
"Kiritchenko",
"Svetlana",
""
],
[
"Zhu",
"Xiaodan",
""
]
] |
new_dataset
| 0.972383 |
1308.6250
|
Yongcan Cao
|
Yongcan Cao and Jonathan Muse and David Casbeer and Derek Kingston
|
Circumnavigation of an Unknown Target Using UAVs with Range and Range
Rate Measurements
|
To appear in IEEE Conference on Decision and Control, 2013
| null | null | null |
cs.SY cs.RO math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents two control algorithms enabling a UAV to circumnavigate
an unknown target using range and range rate (i.e., the derivative of range)
measurements. Given a prescribed orbit radius, both control algorithms (i) tend
to drive the UAV toward the tangent of prescribed orbit when the UAV is outside
or on the orbit, and (ii) apply zero control input if the UAV is inside the
desired orbit. The algorithms differ in that, the first algorithm is smooth and
unsaturated while the second algorithm is non-smooth and saturated. By
analyzing properties associated with the bearing angle of the UAV relative to
the target and through proper design of Lyapunov functions, it is shown that
both algorithms produce the desired orbit for an arbitrary initial state. Three
examples are provided as a proof of concept.
|
[
{
"version": "v1",
"created": "Wed, 28 Aug 2013 18:59:04 GMT"
}
] | 2013-08-29T00:00:00 |
[
[
"Cao",
"Yongcan",
""
],
[
"Muse",
"Jonathan",
""
],
[
"Casbeer",
"David",
""
],
[
"Kingston",
"Derek",
""
]
] |
new_dataset
| 0.998562 |
1209.3594
|
Vincent Kusters
|
Jean Cardinal, Michael Hoffmann, Vincent Kusters
|
On Universal Point Sets for Planar Graphs
|
Fixed incorrect numbers of universal point sets in the last part
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A set P of points in R^2 is n-universal, if every planar graph on n vertices
admits a plane straight-line embedding on P. Answering a question by Kobourov,
we show that there is no n-universal point set of size n, for any n>=15.
Conversely, we use a computer program to show that there exist universal point
sets for all n<=10 and to enumerate all corresponding order types. Finally, we
describe a collection G of 7'393 planar graphs on 35 vertices that do not admit
a simultaneous geometric embedding without mapping, that is, no set of 35
points in the plane supports a plane straight-line embedding of all graphs in
G.
|
[
{
"version": "v1",
"created": "Mon, 17 Sep 2012 08:54:44 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Sep 2012 12:53:16 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Feb 2013 13:02:05 GMT"
},
{
"version": "v4",
"created": "Wed, 10 Apr 2013 15:57:35 GMT"
},
{
"version": "v5",
"created": "Tue, 27 Aug 2013 13:20:33 GMT"
}
] | 2013-08-28T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Hoffmann",
"Michael",
""
],
[
"Kusters",
"Vincent",
""
]
] |
new_dataset
| 0.995021 |
1305.5236
|
Bryan Ford
|
David Isaac Wolinsky, Ewa Syta, and Bryan Ford
|
Hang With Your Buddies to Resist Intersection Attacks
|
15 pages, 8 figures
|
ACM CCS'13, Nov 04-08 2013, Berlin, Germany
|
10.1145/2508859.2516740
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some anonymity schemes might in principle protect users from pervasive
network surveillance - but only if all messages are independent and unlinkable.
Users in practice often need pseudonymity - sending messages intentionally
linkable to each other but not to the sender - but pseudonymity in dynamic
networks exposes users to intersection attacks. We present Buddies, the first
systematic design for intersection attack resistance in practical anonymity
systems. Buddies groups users dynamically into buddy sets, controlling message
transmission to make buddies within a set behaviorally indistinguishable under
traffic analysis. To manage the inevitable tradeoffs between anonymity
guarantees and communication responsiveness, Buddies enables users to select
independent attack mitigation policies for each pseudonym. Using trace-based
simulations and a working prototype, we find that Buddies can guarantee
non-trivial anonymity set sizes in realistic chat/microblogging scenarios, for
both short-lived and long-lived pseudonyms.
|
[
{
"version": "v1",
"created": "Wed, 22 May 2013 19:12:45 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Aug 2013 14:22:33 GMT"
}
] | 2013-08-28T00:00:00 |
[
[
"Wolinsky",
"David Isaac",
""
],
[
"Syta",
"Ewa",
""
],
[
"Ford",
"Bryan",
""
]
] |
new_dataset
| 0.996445 |
1308.5239
|
Ali Makhdoumi
|
Ali Makhdoumi, Shao-Lun Huang, Muriel Medard, Yury Polyanskiy
|
On Locally Decodable Source Coding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Locally decodable channel codes form a special class of error-correcting
codes with the property that the decoder is able to reconstruct any bit of the
input message from querying only a few bits of a noisy codeword. It is well
known that such codes require significantly more redundancy (in particular have
vanishing rate) compared to their non-local counterparts. In this paper, we
define a dual problem, i.e. locally decodable source codes (LDSC). We consider
both almost lossless (block error) and lossy (bit error) cases. In almost
lossless case, we show that optimal compression (to entropy) is possible with
O(log n) queries to compressed string by the decompressor. We also show the
following converse bounds: 1) linear LDSC cannot achieve any rate below one,
with a bounded number of queries, 2) rate of any source coding with linear
decoder (not necessarily local) in one, 3) for 2 queries, any code construction
cannot have a rate below one. In lossy case, we show that any rate above rate
distortion is achievable with a bounded number of queries. We also show that,
rate distortion is achievable with any scaling number of queries. We provide an
achievability bound in the finite block-length regime and compare it with the
existing bounds in succinct data structures literature.
|
[
{
"version": "v1",
"created": "Fri, 23 Aug 2013 20:43:20 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Aug 2013 19:09:35 GMT"
}
] | 2013-08-28T00:00:00 |
[
[
"Makhdoumi",
"Ali",
""
],
[
"Huang",
"Shao-Lun",
""
],
[
"Medard",
"Muriel",
""
],
[
"Polyanskiy",
"Yury",
""
]
] |
new_dataset
| 0.988995 |
1308.5373
|
Cunsheng Ding
|
Cunsheng Ding, Ying Gao, and Zhengchun Zhou
|
Five Families of Three-Weight Ternary Cyclic Codes and Their Duals
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a subclass of linear codes, cyclic codes have applications in consumer
electronics, data storage systems, and communication systems as they have
efficient encoding and decoding algorithms. In this paper, five families of
three-weight ternary cyclic codes whose duals have two zeros are presented. The
weight distributions of the five families of cyclic codes are settled. The
duals of two families of the cyclic codes are optimal.
|
[
{
"version": "v1",
"created": "Sun, 25 Aug 2013 03:31:07 GMT"
}
] | 2013-08-27T00:00:00 |
[
[
"Ding",
"Cunsheng",
""
],
[
"Gao",
"Ying",
""
],
[
"Zhou",
"Zhengchun",
""
]
] |
new_dataset
| 0.998886 |
1308.5409
|
Ola Mahmoud
|
Marcelo Fiore and Ola Mahmoud
|
Second-Order Algebraic Theories
| null |
In Lecture Notes in Computer In Proceedings of the 35th
International Symposium on Mathematical Foundations of Computer Science (MFCS
2010), LNCS 6281, pp. 368-380, Springer Verlag, May 2010
| null | null |
cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fiore and Hur recently introduced a conservative extension of universal
algebra and equational logic from first to second order. Second-order universal
algebra and second-order equational logic respectively provide a model theory
and a formal deductive system for languages with variable binding and
parameterised metavariables. This work completes the foundations of the subject
from the viewpoint of categorical algebra. Specifically, the paper introduces
the notion of second-order algebraic theory and develops its basic theory. Two
categorical equivalences are established: at the syntactic level, that of
second-order equational presentations and second-order algebraic theories; at
the semantic level, that of second-order algebras and second-order functorial
models. Our development includes a mathematical definition of syntactic
translation between second-order equational presentations. This gives the first
formalisation of notions such as encodings and transforms in the context of
languages with variable binding.
|
[
{
"version": "v1",
"created": "Sun, 25 Aug 2013 14:23:54 GMT"
}
] | 2013-08-27T00:00:00 |
[
[
"Fiore",
"Marcelo",
""
],
[
"Mahmoud",
"Ola",
""
]
] |
new_dataset
| 0.989234 |
1111.3275
|
Beni Yoshida
|
Beni Yoshida
|
Information storage capacity of discrete spin systems
|
35 pages, 12 figures
|
Annals of Physics 338, 134 (2013)
|
10.1016/j.aop.2013.07.009
|
CTP-4326
|
cs.IT cond-mat.str-el math-ph math.IT math.MP nlin.CG quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding the limits imposed on information storage capacity of physical
systems is a problem of fundamental and practical importance which bridges
physics and information science. There is a well-known upper bound on the
amount of information that can be stored reliably in a given volume of discrete
spin systems which are supported by gapped local Hamiltonians. However, all the
previously known systems were far below this theoretical bound, and it remained
open whether there exists a gapped spin system that saturates this bound. Here,
we present a construction of spin systems which saturate this theoretical limit
asymptotically by borrowing an idea from fractal properties arising in the
Sierpinski triangle. Our construction provides not only the best classical
error-correcting code which is physically realizable as the energy ground space
of gapped frustration-free Hamiltonians, but also a new research avenue for
correlated spin phases with fractal spin configurations.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 16:37:26 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jan 2012 18:28:26 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Dec 2012 22:57:07 GMT"
}
] | 2013-08-26T00:00:00 |
[
[
"Yoshida",
"Beni",
""
]
] |
new_dataset
| 0.994211 |
1308.5079
|
Franz J. Brandenburg
|
Franz J. Brandenburg
|
1-Visibility Representations of 1-Planar Graphs
| null | null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A visibility representation is a classical drawing style of planar graphs. It
displays the vertices of a graph as horizontal vertex-segments, and each edge
is represented by a vertical edge-segment touching the segments of its end
vertices; beyond that segments do not intersect. We generalize visibility to
1-visibility, where each edge- (vertex-) segment crosses at most one vertex-
(edge-) segment. In other words, a vertex is crossed by at most one edge, and
vice-versa. We show that 1-visibility properly extends 1-planarity and develop
a linear time algorithm to compute a 1-visibility representation of an embedded
1-planar graph on O(n^2) area. A graph is 1-planar if it can be drawn in the
plane such that each edge is crossed at most once. Concerning density, both
1-visible and 1-planar graphs of size $n$ have at most 4n-8 edges. However, for
every n >= 7 there are 1-visible graphs with 4n-8 edge which are not 1-planar.
|
[
{
"version": "v1",
"created": "Fri, 23 Aug 2013 09:30:51 GMT"
}
] | 2013-08-26T00:00:00 |
[
[
"Brandenburg",
"Franz J.",
""
]
] |
new_dataset
| 0.994093 |
1308.5158
|
Yuan Zhou
|
Parikshit Gopalan, Salil Vadhan, Yuan Zhou
|
Locally Testable Codes and Cayley Graphs
|
22 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give two new characterizations of ($\F_2$-linear) locally testable
error-correcting codes in terms of Cayley graphs over $\F_2^h$:
\begin{enumerate} \item A locally testable code is equivalent to a Cayley
graph over $\F_2^h$ whose set of generators is significantly larger than $h$
and has no short linear dependencies, but yields a shortest-path metric that
embeds into $\ell_1$ with constant distortion. This extends and gives a
converse to a result of Khot and Naor (2006), which showed that codes with
large dual distance imply Cayley graphs that have no low-distortion embeddings
into $\ell_1$.
\item A locally testable code is equivalent to a Cayley graph over $\F_2^h$
that has significantly more than $h$ eigenvalues near 1, which have no short
linear dependencies among them and which "explain" all of the large
eigenvalues. This extends and gives a converse to a recent construction of
Barak et al. (2012), which showed that locally testable codes imply Cayley
graphs that are small-set expanders but have many large eigenvalues.
\end{enumerate}
|
[
{
"version": "v1",
"created": "Fri, 23 Aug 2013 15:31:57 GMT"
}
] | 2013-08-26T00:00:00 |
[
[
"Gopalan",
"Parikshit",
""
],
[
"Vadhan",
"Salil",
""
],
[
"Zhou",
"Yuan",
""
]
] |
new_dataset
| 0.999759 |
1308.4485
|
Manoj Kumar
|
Neeta Sharma and Manoj Kumar
|
The Wonderful Toy of 20th Century can be a Disaster in 21st
Century:Scenario and Policies Regarding Mobile Waste in India
|
6 pages, 1 figure, 2 tables
|
(IJCSIT) International Journal of Computer Science and Information
Technologies, Vol. 2 (5) , 2011, 2198-2203 ISSN:0975-9646
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The subscribers base of mobile phones is increasing globally with a rapid
rate.The sale of mobile phones has exceeded those of personal computers.India
is the second largest telecommunication network in the world in terms of number
of wireless connections after China.Telecom companies are ready to tap a large
unexplored market in India with lucrative offerings.Smart phones sale are at
its peak.3G technology is also ready to play a lead role in mobile
revolution.Due to the low average life of the mobile phones,lack of awareness
among users and in absence of government policies,mobile waste is accumulating
in vast amount in India.Without a proper system of recycling,the unsafe
disposal is causing a variety of environmental and health problems.This paper
discusses the various issues related to the worldwide growth of mobile
phones,the insecure methods of disposal and the regulations and policies in
India.We intend to put forward some challenges and advices.
|
[
{
"version": "v1",
"created": "Wed, 21 Aug 2013 05:05:42 GMT"
}
] | 2013-08-22T00:00:00 |
[
[
"Sharma",
"Neeta",
""
],
[
"Kumar",
"Manoj",
""
]
] |
new_dataset
| 0.999783 |
1308.4486
|
Manoj Kumar
|
Manoj Kumar and Sheshendra Rathi
|
Services in Android can Share Your Personal Information in Background
|
4 pages, 3 figures
|
(IJCSIT) International Journal of Computer Science and Information
Technologies, Vol. 2 (5) , 2011, 2356-2359 ISSN:0975-9646
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile phones have traveled a very long journey in a very short span of time
since its inception in 1973.This wonderful toy of 20th century has started
playing significant role in daily life.More than 5 billion mobile users are
there around the world and almost 90 percent of the entire earth is under the
mobile coverage now.These days smart phones are equipped with numerous
features,faster processors and high storage capacity.Android is a latest trend
in this series whose popularity is growing by leaps and bounds.Android has a
number of components which helps Application developers to embed distinguish
features in applications.This paper explains how the Service component of
Android can share your personal information to others without users
interaction.
|
[
{
"version": "v1",
"created": "Wed, 21 Aug 2013 05:05:58 GMT"
}
] | 2013-08-22T00:00:00 |
[
[
"Kumar",
"Manoj",
""
],
[
"Rathi",
"Sheshendra",
""
]
] |
new_dataset
| 0.998449 |
1308.4499
|
Maosheng Xiong
|
Jing Xia, Liuquan Wang, Maosheng Xiong
|
On a question of Babadi and Tarokh II
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we continue to study a question proposed by Babadi and Tarokh
\cite{ba2} on the mysterious randomness of Gold sequences. Upon improving their
result, we establish the randomness of product of pseudorandom matrices formed
from two linear block codes with respect to the empirical spectral
distribution, if the dual distance of both codes is at least 5, hence providing
an affirmative answer to the question.
|
[
{
"version": "v1",
"created": "Wed, 21 Aug 2013 07:18:17 GMT"
}
] | 2013-08-22T00:00:00 |
[
[
"Xia",
"Jing",
""
],
[
"Wang",
"Liuquan",
""
],
[
"Xiong",
"Maosheng",
""
]
] |
new_dataset
| 0.970442 |
1308.4672
|
Mrigank Sharad
|
Mrigank Sharad, Deliang Fan and Kaushik Roy
|
Ultra-low Energy, High-Performance Dynamic Resistive Threshold Logic
|
arXiv admin note: text overlap with arXiv:1308.4169
| null | null | null |
cs.ET cond-mat.dis-nn cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose dynamic resistive threshold-logic (DRTL) design based on
non-volatile resistive memory. A threshold logic gate (TLG) performs summation
of multiple inputs multiplied by a fixed set of weights and compares the sum
with a threshold. DRTL employs resistive memory elements to implement the
weights and the thresholds, while a compact dynamic CMOS latch is used for the
comparison operation. The resulting DRTL gate acts as a low-power, configurable
dynamic logic unit and can be used to build fully pipelined, high-performance
programmable computing blocks. Multiple stages in such a DRTL design can be
connected using energy-efficient low swing programmable interconnect networks
based on resistive switches. Owing to memory-based compact logic and
interconnect design and highspeed dynamic-pipelined operation, DRTL can achieve
more than two orders of magnitude improvement in energy-delay product as
compared to look-up table based CMOS FPGA.
|
[
{
"version": "v1",
"created": "Thu, 8 Aug 2013 15:29:45 GMT"
}
] | 2013-08-22T00:00:00 |
[
[
"Sharad",
"Mrigank",
""
],
[
"Fan",
"Deliang",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.998593 |
1308.4169
|
Mrigank Sharad
|
Mrigank Sharad, Deliang Fan and Kaushik Roy
|
Ultra-low Energy, High Performance and Programmable Magnetic Threshold
Logic
| null | null | null | null |
cs.ET cond-mat.dis-nn cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose magnetic threshold-logic (MTL) design based on non-volatile
spin-torque switches. A threshold logic gate (TLG) performs summation of
multiple inputs multiplied by a fixed set of weights and compares the sum with
a threshold. MTL employs resistive states of magnetic tunnel junctions as
programmable input weights, while, a low-voltage domain-wall shift based
spin-torque switch is used for thresholding operation. The resulting MTL gate
acts as a low-power, configurable logic unit and can be used to build fully
pipelined, high-performance programmable computing blocks. Multiple stages in
such a MTL design can be connected using energy-efficient ultralow swing
programmable interconnect networks based on resistive switches. Owing to
memory-based compact logic and interconnect design and low-voltage, high-speed
spintorque based threshold operation, MTL can achieve more than two orders of
magnitude improvement in energy-delay product as compared to look-up table
based CMOS FPGA.
|
[
{
"version": "v1",
"created": "Thu, 8 Aug 2013 14:29:58 GMT"
}
] | 2013-08-21T00:00:00 |
[
[
"Sharad",
"Mrigank",
""
],
[
"Fan",
"Deliang",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.999532 |
1308.3885
|
Abhijeet Bhorkar
|
Abhijeet Bhorkar, Gautam Bhanage
|
Reliable multicast in large enterprise networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we have presented a complete end-end architecture to employ the
rate-less codes. We have developed a new architecture Rate-less Codes Multicast
(RCNC). This architecture is shown to provide high throughput gains,
reliability and near optimal throughput performance.
|
[
{
"version": "v1",
"created": "Sun, 18 Aug 2013 18:46:21 GMT"
}
] | 2013-08-20T00:00:00 |
[
[
"Bhorkar",
"Abhijeet",
""
],
[
"Bhanage",
"Gautam",
""
]
] |
new_dataset
| 0.978422 |
1308.3924
|
Dmitri Nikonov
|
Yury A. Tyapchenko
|
Analysis and Synthesis of a Subsystem of the Manual Control Loop for
Manned Spacecraft
|
13 pages, 10 figures. Translation from Russian by Dmitri E. Nikonov
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A salient feature of the manned spacecraft is the predominance of discrete
information in the manual control loop of the onboard systems. Specifically,
command-signaling control panels (CSCP) as a subsystem of the manual control
loop are widely used in the Russian manned spacecraft. In this paper CSCP are
classified into four types: a) control panels based on multi-channel control;
b) control panels based on command-information compression; c) control panels
based on command and signaling information compression; d) integrated control
consoles (ICC) based on computer and information technology. It is shown that
ICC underlies modern information display systems (IDS). ICC first appeared in
the Russian manned space program in the IDS of the Soyuz-TMA spacecraft and the
Russian modules of the International Space Station. Results of engineering and
psychological studies of different types of panels are produced.
|
[
{
"version": "v1",
"created": "Mon, 19 Aug 2013 05:13:39 GMT"
}
] | 2013-08-20T00:00:00 |
[
[
"Tyapchenko",
"Yury A.",
""
]
] |
new_dataset
| 0.995539 |
1308.3575
|
Lingfei Jin
|
Lingfei Jin and Chaoping Xing
|
Euclidean and Hermitian Self-orthogonal Algebraic Geometry Codes and
Their Application to Quantum Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present paper, we show that if the dimension of an arbitrary algebraic
geometry code over a finite field of even characters is slightly less than half
of its length, then it is equivalent to an Euclidean self-orthogonal code.
However, in the literatures, a strong contrition about existence of certain
differential is required to obtain such a result. We also show a similar result
on Hermitian self-orthogonal algebraic geometry codes. As a consequence, we can
apply our result to quantum codes and obtain quantum codes with good asymptotic
bounds.
|
[
{
"version": "v1",
"created": "Fri, 16 Aug 2013 08:14:57 GMT"
}
] | 2013-08-19T00:00:00 |
[
[
"Jin",
"Lingfei",
""
],
[
"Xing",
"Chaoping",
""
]
] |
new_dataset
| 0.998426 |
1308.3578
|
Lingfei Jin
|
Lingfei Jin and Chaoping Xing
|
Quantum Gilbert-Varshamov Bound Through Symplectic Self-Orthogonal Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is well known that quantum codes can be constructed through classical
symplectic self-orthogonal codes. In this paper, we give a kind of
Gilbert-Varshamov bound for symplectic self-orthogonal codes first and then
obtain the Gilbert-Varshamov bound for quantum codes. The idea of obtaining the
Gilbert-Varshamov bound for symplectic self-orthogonal codes follows from
counting arguments.
|
[
{
"version": "v1",
"created": "Fri, 16 Aug 2013 08:21:20 GMT"
}
] | 2013-08-19T00:00:00 |
[
[
"Jin",
"Lingfei",
""
],
[
"Xing",
"Chaoping",
""
]
] |
new_dataset
| 0.993134 |
1308.3579
|
Arun Joseph
|
Mohit John and Arun JosephPalai
|
ZigBee Based Wireless Data Acquisition Using LabVIEW for Implementing
Smart Driving Skill Evaluation System
|
19 pages
| null |
10.5121/ijics.2013.3301
| null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Smart Driving Skill Evaluation (SDSE) System presented in this paper
expedite the testing of candidates aspiring for a driving license in a more
efficient and transparent manner, as compared to the present manual testing
procedure existing in most parts of Asia and Pacific region. The manual test
procedure is also subjected to multiple limitations like time consuming, costly
and heavily controlled by the experience of examiner in conducting the test.
This technological solution is developed by customizing 8051 controller based
embedded system and LabVIEW based virtual instrument. The controller module
senses the motion of the test vehicle on the test track referred to as zero rpm
measurement and the LabVIEW based virtual instrument provides a Graphical User
Interface for remote end monitoring of the sensors embedded on the test track.
The proposed technological solution for the automation of existing manual test
process enables the elimination of human intervention and improves the driving
test accuracy while going paperless with Driving Skill Evaluation System. As a
contribution to the society this technological solution can reduce the number
of road accidents because most accidents results from lack of planning,
anticipation and control which are highly dependent on driving skill.
|
[
{
"version": "v1",
"created": "Fri, 16 Aug 2013 08:34:44 GMT"
}
] | 2013-08-19T00:00:00 |
[
[
"John",
"Mohit",
""
],
[
"JosephPalai",
"Arun",
""
]
] |
new_dataset
| 0.999224 |
1308.3243
|
Mohamed Ben Halima
|
M. Ben Halima, H. Karray and A. M. Alimi
|
Arabic Text Recognition in Video Sequences
|
10 pages - International Journal of Computational Linguistics
Research. arXiv admin note: substantial text overlap with arXiv:1211.2150
| null | null | null |
cs.MM cs.CL cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a robust approach for text extraction and
recognition from Arabic news video sequence. The text included in video
sequences is an important needful for indexing and searching system. However,
this text is difficult to detect and recognize because of the variability of
its size, their low resolution characters and the complexity of the
backgrounds. To solve these problems, we propose a system performing in two
main tasks: extraction and recognition of text. Our system is tested on a
varied database composed of different Arabic news programs and the obtained
results are encouraging and show the merits of our approach.
|
[
{
"version": "v1",
"created": "Wed, 14 Aug 2013 20:15:44 GMT"
}
] | 2013-08-16T00:00:00 |
[
[
"Halima",
"M. Ben",
""
],
[
"Karray",
"H.",
""
],
[
"Alimi",
"A. M.",
""
]
] |
new_dataset
| 0.97057 |
1308.3370
|
Tamara Mchedlidze David
|
Tamara Mchedlidze, Martin N\"ollenburg, Ignaz Rutter
|
Drawing Planar Graphs with a Prescribed Inner Face
| null | null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a plane graph $G$ (i.e., a planar graph with a fixed planar embedding)
and a simple cycle $C$ in $G$ whose vertices are mapped to a convex polygon, we
consider the question whether this drawing can be extended to a planar
straight-line drawing of $G$. We characterize when this is possible in terms of
simple necessary conditions, which we prove to be sufficient. This also leads
to a linear-time testing algorithm. If a drawing extension exists, it can be
computed in the same running time.
|
[
{
"version": "v1",
"created": "Thu, 15 Aug 2013 12:07:03 GMT"
}
] | 2013-08-16T00:00:00 |
[
[
"Mchedlidze",
"Tamara",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Rutter",
"Ignaz",
""
]
] |
new_dataset
| 0.995541 |
1308.3482
|
Girish Sundaram
|
Pinaki Mitra, Rinku Das, Girish Sundaram
|
Privatizing user credential information of Web services in a shared user
environment
|
Selected for proceedings of NETs2012 International Conference on
Internet Studies held in Bangkok, Thailand from August 17-19, 2012
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
User credentials security is one of the most important tasks in Web World.
Most Web sites on the Internet that support user accounts store the users
credentials in a database. Now a days, most of the web browsers offer auto
login feature for the favorite web sites such as yahoo, google, gmail etc.
using these credential information. This facilitates the misuse of user
credentials. Privatizing user credential information of web services in a
shared user environment provides a feature enhancement where the root user will
be able to privatize his stored credentials by enforcing some masking
techniques such that even a user logs on to the system with root user
credentials, he will not be able to access privatized data. In case of web
browsers auto login feature, a root user can disable the feature manually by
deleting entries from web browsers' saved password list. But this involves
spending a considerable amount of time and the biggest problem is that he has
to insert those credentials once again when he next visits these websites. This
application resumes auto login feature whenever root user disable the masked
mode. The application includes two parts: Masked Application Mode and Disabling
the Masked Application Mode. When the system goes for masked application mode,
the other user will not be able to use the credentials of the root user.If the
other user tries to access any of the web pages which have been masked, the
other user will have to authenticate with his own credentials. Disabling the
masked mode requires authentication from the root user. As long as this
credential is not shared, masked mode can be disabled only by the root user.
|
[
{
"version": "v1",
"created": "Thu, 15 Aug 2013 19:28:00 GMT"
}
] | 2013-08-16T00:00:00 |
[
[
"Mitra",
"Pinaki",
""
],
[
"Das",
"Rinku",
""
],
[
"Sundaram",
"Girish",
""
]
] |
new_dataset
| 0.971647 |
1205.0792
|
Boris Leistedt
|
B. Leistedt and J. D. McEwen
|
Exact Wavelets on the Ball
|
13 pages, 10 figures, accepted for publication in IEEE Trans. Sig.
Proc. The code is publicly available from http://www.flaglets.org
|
IEEE Trans. Signal. Process., 60 (2012), 6257-6269
|
10.1109/TSP.2012.2215030
| null |
cs.IT astro-ph.IM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop an exact wavelet transform on the three-dimensional ball (i.e. on
the solid sphere), which we name the flaglet transform. For this purpose we
first construct an exact transform on the radial half-line using damped
Laguerre polynomials and develop a corresponding quadrature rule. Combined with
the spherical harmonic transform, this approach leads to a sampling theorem on
the ball and a novel three-dimensional decomposition which we call the
Fourier-Laguerre transform. We relate this new transform to the well-known
Fourier-Bessel decomposition and show that band-limitedness in the
Fourier-Laguerre basis is a sufficient condition to compute the Fourier-Bessel
decomposition exactly. We then construct the flaglet transform on the ball
through a harmonic tiling, which is exact thanks to the exactness of the
Fourier-Laguerre transform (from which the name flaglets is coined). The
corresponding wavelet kernels are well localised in real and Fourier-Laguerre
spaces and their angular aperture is invariant under radial translation. We
introduce a multiresolution algorithm to perform the flaglet transform rapidly,
while capturing all information at each wavelet scale in the minimal number of
samples on the ball. Our implementation of these new tools achieves
floating-point precision and is made publicly available. We perform numerical
experiments demonstrating the speed and accuracy of these libraries and
illustrate their capabilities on a simple denoising example.
|
[
{
"version": "v1",
"created": "Thu, 3 May 2012 18:58:28 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Nov 2012 21:00:08 GMT"
}
] | 2013-08-15T00:00:00 |
[
[
"Leistedt",
"B.",
""
],
[
"McEwen",
"J. D.",
""
]
] |
new_dataset
| 0.998645 |
1306.6047
|
Alex Rubinsteyn
|
Russell Power and Alex Rubinsteyn
|
How fast can we make interpreted Python?
|
Tech Report
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Python is a popular dynamic language with a large part of its appeal coming
from powerful libraries and extension modules. These augment the language and
make it a productive environment for a wide variety of tasks, ranging from web
development (Django) to numerical analysis (NumPy). Unfortunately, Python's
performance is quite poor when compared to modern implementations of languages
such as Lua and JavaScript.
Why does Python lag so far behind these other languages? As we show, the very
same API and extension libraries that make Python a powerful language also make
it very difficult to efficiently execute. Given that we want to retain access
to the great extension libraries that already exist for Python, how fast can we
make it?
To evaluate this, we designed and implemented Falcon, a high-performance
bytecode interpreter fully compatible with the standard CPython interpreter.
Falcon applies a number of well known optimizations and introduces several new
techniques to speed up execution of Python bytecode. In our evaluation, we
found Falcon an average of 25% faster than the standard Python interpreter on
most benchmarks and in some cases about 2.5X faster.
|
[
{
"version": "v1",
"created": "Tue, 25 Jun 2013 17:57:00 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Aug 2013 20:29:34 GMT"
}
] | 2013-08-15T00:00:00 |
[
[
"Power",
"Russell",
""
],
[
"Rubinsteyn",
"Alex",
""
]
] |
new_dataset
| 0.990404 |
1308.3217
|
Mohammad Noshad
|
Mohammad Noshad and Maite Brandt-Pearce
|
Can Visible Light Communications Provide Gb/s Service?
|
IEEE Communications Magazine
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visible light communications (VLC) that use the infrastructure of the indoor
illumination system have been envisioned as a compact, safe, and green
alternative to WiFi for the downlink of an indoor wireless mobile communication
system. Although the optical spectrum is typically well-suited to high
throughput applications, combining communications with indoor lighting in a
commercially viable system imposes severe limitations both in bandwidth and
received power. Clever techniques are needed to achieve Gb/s transmission, and
to do it in a cost effective manner so as to successfully compete with other
high-capacity alternatives for indoor access, such as millimeter-wave
radio-frequency (RF). This article presents modulation schemes that have the
potential to overcome the many challenges faced by VLC in providing multi Gb/s
indoor wireless connectivity.
|
[
{
"version": "v1",
"created": "Wed, 14 Aug 2013 19:31:41 GMT"
}
] | 2013-08-15T00:00:00 |
[
[
"Noshad",
"Mohammad",
""
],
[
"Brandt-Pearce",
"Maite",
""
]
] |
new_dataset
| 0.996799 |
1308.2762
|
Debajit Sensarma
|
Debajit Sensarma and Koushik Majumder
|
An efficient ant based qos aware intelligent temporally ordered routing
algorithm for manets
|
15 pages, 7 figures, International Journal of Computer Networks &
Communications (IJCNC) Vol.5, No.4, July 2013
| null |
10.5121/ijcnc.2013.5415
| null |
cs.NI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Mobile Ad hoc network (MANET) is a self configurable network connected by
wireless links. This type of network is only suitable for temporary
communication links as it is infrastructure-less and there is no centralised
control. Providing QoS aware routing is a challenging task in this type of
network due to dynamic topology and limited resources. The main purpose of QoS
aware routing is to find a feasible path from source to destination which will
satisfy two or more end to end QoS constrains. Therefore, the task of designing
an efficient routing algorithm which will satisfy all the quality of service
requirements and be robust and adaptive is considered as a highly challenging
problem. In this work we have designed a new efficient and energy aware
multipath routing algorithm based on ACO framework, inspired by the behaviours
of biological ants. Basically by considering QoS constraints and artificial
ants we have designed an intelligent version of classical Temporally Ordered
Routing Algorithm (TORA) which will increase network lifetime and decrease
packet loss and average end to end delay that makes this algorithm suitable for
real time and multimedia applications.
|
[
{
"version": "v1",
"created": "Tue, 13 Aug 2013 06:08:01 GMT"
}
] | 2013-08-14T00:00:00 |
[
[
"Sensarma",
"Debajit",
""
],
[
"Majumder",
"Koushik",
""
]
] |
new_dataset
| 0.989689 |
1308.2894
|
Kai Niu
|
Kai Niu, Kai Chen, Jiaru Lin
|
Low-Complexity Sphere Decoding of Polar Codes based on Optimum Path
Metric
|
4 pages, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sphere decoding (SD) of polar codes is an efficient method to achieve the
error performance of maximum likelihood (ML) decoding. But the complexity of
the conventional sphere decoder is still high, where the candidates in a target
sphere are enumerated and the radius is decreased gradually until no available
candidate is in the sphere. In order to reduce the complexity of SD, a stack SD
(SSD) algorithm with an efficient enumeration is proposed in this paper. Based
on a novel path metric, SSD can effectively narrow the search range when
enumerating the candidates within a sphere. The proposed metric follows an
exact ML rule and takes the full usage of the whole received sequence.
Furthermore, another very simple metric is provided as an approximation of the
ML metric in the high signal-to-noise ratio regime. For short polar codes,
simulation results over the additive white Gaussian noise channels show that
the complexity of SSD based on the proposed metrics is up to 100 times lower
than that of the conventional SD.
|
[
{
"version": "v1",
"created": "Tue, 13 Aug 2013 15:19:05 GMT"
}
] | 2013-08-14T00:00:00 |
[
[
"Niu",
"Kai",
""
],
[
"Chen",
"Kai",
""
],
[
"Lin",
"Jiaru",
""
]
] |
new_dataset
| 0.99593 |
1308.2920
|
Rahul Kumar
|
Rahul K Dixit, Rahul Johari
|
As-puma ; anycast semantics in parking using metaheuristic approach
| null |
Rahul K Dixit, Research Scholar, USICT, GGSIP University,
Delhi-110078., AMIETE from I.E.T.E,Lodhi Road, Delhi Gate Scholar in 2011 and
2012. Rahul Johari, is working as a Assistant Professor in USICT, GGSIPU
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of vehicle used in the world are increasing day by day resulting
in the obvious problem of parking of these vehicles in residential and
vocational areas. We perceive the problem of vehicles parking in vocational
establishments / malls. Today majority of parking systems are manual parking
systems where in, on the spot, parking of the vehicle is done and a parking
slip is generated and handed over to customer. This is cumbersome technique
wherein various parking attendants in the parking areas manually keeps on
informing the Parking inspector on how many free parking slots available so
that only that many number of parking slips/tickets are generated as the number
of free parking slots. We address the problem of parking in Delay Tolerant
Network (DTN) by proposing metaheuristic driven approach of Ant Colony
optimization (ACO) technique with anycast semantics models . Here we propose
the parking architecture to solve the problem of parking especially in
commercial areas with their design diagrams . In this architecture we apply the
delivery model to deliver the packet correctly to the intended receiver. Using
this we can book various parkings through remote areas so that the customer can
get the information about availability of various parkings inside an area and
the parking fare for each category of the automobile. Using this architecture
the customer can get the prior knowledge about various vacant parking slots
inside a parking area and he can book the corresponding parking from his
location.
|
[
{
"version": "v1",
"created": "Tue, 13 Aug 2013 17:15:19 GMT"
}
] | 2013-08-14T00:00:00 |
[
[
"Dixit",
"Rahul K",
""
],
[
"Johari",
"Rahul",
""
]
] |
new_dataset
| 0.980162 |
1211.4907
|
Luis Pedro Coelho
|
Luis Pedro Coelho
|
Mahotas: Open source software for scriptable computer vision
| null |
Journal of Open Research Software 1(1):e3 2013
|
10.5334/jors.ac
| null |
cs.CV cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mahotas is a computer vision library for Python. It contains traditional
image processing functionality such as filtering and morphological operations
as well as more modern computer vision functions for feature computation,
including interest point detection and local descriptors.
The interface is in Python, a dynamic programming language, which is very
appropriate for fast development, but the algorithms are implemented in C++ and
are tuned for speed. The library is designed to fit in with the scientific
software ecosystem in this language and can leverage the existing
infrastructure developed in that language.
Mahotas is released under a liberal open source license (MIT License) and is
available from (http://github.com/luispedro/mahotas) and from the Python
Package Index (http://pypi.python.org/pypi/mahotas).
|
[
{
"version": "v1",
"created": "Wed, 21 Nov 2012 00:51:10 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jan 2013 01:16:00 GMT"
}
] | 2013-08-13T00:00:00 |
[
[
"Coelho",
"Luis Pedro",
""
]
] |
new_dataset
| 0.999675 |
1212.4653
|
Giuliano La Guardia Gadioli
|
Giuliano G. La Guardia
|
Convolutional Codes Derived From Group Character Codes
|
Accepted for publication in Discrete Math
| null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New families of unit memory as well as multi-memory convolutional codes are
constructed algebraically in this paper. These convolutional codes are derived
from the class of group character codes. The proposed codes have basic
generator matrices, consequently, they are non catastrophic. Additionally, the
new code parameters are better than the ones available in the literature.
|
[
{
"version": "v1",
"created": "Wed, 19 Dec 2012 13:16:52 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Aug 2013 22:39:52 GMT"
}
] | 2013-08-13T00:00:00 |
[
[
"La Guardia",
"Giuliano G.",
""
]
] |
new_dataset
| 0.999076 |
1308.1166
|
Peter Gloor
|
Tobias Futterer, Peter A. Gloor, Tushar Malhotra, Harrison Mfula,
Karsten Packmohr, Stefan Schultheiss
|
WikiPulse - A News-Portal Based on Wikipedia
|
Presented at COINs13 Conference, Chile, 2013 (arxiv:1308.1028)
| null | null |
coins13/2013/11
|
cs.IR cs.DL cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
More and more user-generated content is complementing conventional
journalism. While we don't think that CNN or New York Times and its
professional journalists will disappear anytime soon, formidable competition is
emerging through humble Wikipedia editors. In earlier work (Becker 2012), we
found that entertainment and sports news appeared on average about two hours
earlier on Wikipedia than on CNN and Reuters online. In this project we build a
news-reader that automatically identifies late-breaking news among the most
recent Wikipedia articles and then displays it on a dedicated Web site.
|
[
{
"version": "v1",
"created": "Tue, 6 Aug 2013 03:07:02 GMT"
}
] | 2013-08-13T00:00:00 |
[
[
"Futterer",
"Tobias",
""
],
[
"Gloor",
"Peter A.",
""
],
[
"Malhotra",
"Tushar",
""
],
[
"Mfula",
"Harrison",
""
],
[
"Packmohr",
"Karsten",
""
],
[
"Schultheiss",
"Stefan",
""
]
] |
new_dataset
| 0.999265 |
1308.1214
|
Shariful Alam
|
Sk. Shariful Alam, Lucio Marcenaro and Carlo Regazzoni
|
Opportunistic Spectrum Sensing and Transmissions
| null |
Cognitive Radio and Interference Management: Technology and
Strategy. IGI Global, 2013. 1-28
|
10.4018/978-1-4666-2005-6.ch001
| null |
cs.NI cs.ET
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Nowadays, cognitive radio is one of the most promising paradigms in the arena
of wireless communications, as it aims at the proficient use of radio
resources. Proper utilization of the radio spectrum requires dynamic spectrum
accessing. To this end, spectrum sensing is undoubtedly necessary. In this
chapter, various approaches for dynamic spectrum access scheme are presented,
together with a survey of spectrum sensing methodologies for cognitive radio.
Moreover, the challenges are analyzed that are associated with spectrum sensing
and dynamic spectrum access techniques. Sensing beacon transmitted from
different cognitive terminals creates significant interference to the primary
users if proper precautions have not be not taken into consideration.
Consequently, cognitive radio transmitter power control will be finally
addressed to analyze energy efficiency aspects.
|
[
{
"version": "v1",
"created": "Tue, 6 Aug 2013 09:22:30 GMT"
}
] | 2013-08-13T00:00:00 |
[
[
"Alam",
"Sk. Shariful",
""
],
[
"Marcenaro",
"Lucio",
""
],
[
"Regazzoni",
"Carlo",
""
]
] |
new_dataset
| 0.996584 |
1308.2541
|
Rafayel Kamalian
|
R.R. Kamalian
|
Interval colorings of complete bipartite graphs and trees
|
R.R. Kamalian "Interval colorings of complete bipartite graphs and
trees", Preprint of the Computing Centre of the Academy of Sciences of
Armenia, Yerevan, 1989
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A translation from Russian of the work of R.R. Kamalian "Interval colorings
of complete bipartite graphs and trees", Preprint of the Computing Centre of
the Academy of Sciences of Armenia, Yerevan, 1989. (Was published by the
decision of the Academic Council of the Computing Centre of the Academy of
Sciences of Armenian SSR and Yerevan State University from 7.09.1989).
|
[
{
"version": "v1",
"created": "Mon, 12 Aug 2013 12:20:02 GMT"
}
] | 2013-08-13T00:00:00 |
[
[
"Kamalian",
"R. R.",
""
]
] |
new_dataset
| 0.97611 |
1308.1733
|
Muthiah Annamalai
|
Muthiah Annamalai
|
Invitation to Ezhil: A Tamil Programming Language for Early
Computer-Science Education
|
11 pages, 5 insets, 4 figures; accepted to Tamil Internet Conference,
2013, TI-2013, Malaysia
| null | null | null |
cs.CY cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ezhil is a Tamil programming language with support for imperative
programming, with mixed use of Tamil and English identifiers and
function-names. Ezhil programing system is targeted toward the K-12 (junior
high-school) level Tamil speaking students, as an early introduction to
thinking like a computer-scientist. We believe this 'numeracy' knowledge is
easily transferred over from a native language (Tamil) to the pervasive English
language programming systems, in Java, dot-Net, Ruby or Python. Ezhil is an
effort to improve access to computing in the 21st Century.
|
[
{
"version": "v1",
"created": "Thu, 8 Aug 2013 01:47:36 GMT"
}
] | 2013-08-12T00:00:00 |
[
[
"Annamalai",
"Muthiah",
""
]
] |
new_dataset
| 0.999483 |
1308.1986
|
Geoffrey Irving
|
Geoffrey Irving and Forrest Green
|
A deterministic pseudorandom perturbation scheme for arbitrary
polynomial predicates
|
15 pages, 2 figures
| null | null | null |
cs.CG
|
http://creativecommons.org/licenses/by/3.0/
|
We present a symbolic perturbation scheme for arbitrary polynomial geometric
predicates which combines the benefits of Emiris and Canny's simple randomized
linear perturbation scheme with Yap's multiple infinitesimal scheme for general
predicates. Like the randomized scheme, our method accepts black box polynomial
functions as input. For nonmaliciously chosen predicates, our method is as fast
as the linear scheme, scaling reasonably with the degree of the polynomial even
for fully degenerate input. Like Yap's scheme, the computed sign is
deterministic, never requiring an algorithmic restart (assuming a high quality
pseudorandom generator), and works for arbitrary predicates with no knowledge
of their structure. We also apply our technique to exactly or nearly exactly
rounded constructions that work correctly for degenerate input, using
l'Hopital's rule to compute the necessary singular limits. We provide an open
source prototype implementation including example algorithms for Delaunay
triangulation and Boolean operations on polygons and circular arcs in the
plane.
|
[
{
"version": "v1",
"created": "Thu, 8 Aug 2013 21:44:36 GMT"
}
] | 2013-08-12T00:00:00 |
[
[
"Irving",
"Geoffrey",
""
],
[
"Green",
"Forrest",
""
]
] |
new_dataset
| 0.992257 |
1308.2058
|
Blesson Varghese
|
Ishan Patel, Blesson Varghese, Adam Barker
|
RBioCloud: A Light-weight Framework for Bioconductor and R-based Jobs on
the Cloud
|
Webpage: http://www.rbiocloud.com
| null | null | null |
cs.DC cs.CE cs.PF cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-scale ad hoc analytics of genomic data is popular using the
R-programming language supported by 671 software packages provided by
Bioconductor. More recently, analytical jobs are benefitting from on-demand
computing and storage, their scalability and their low maintenance cost, all of
which are offered by the cloud. While Biologists and Bioinformaticists can take
an analytical job and execute it on their personal workstations, it remains
challenging to seamlessly execute the job on the cloud infrastructure without
extensive knowledge of the cloud dashboard. How analytical jobs can not only
with minimum effort be executed on the cloud, but also how both the resources
and data required by the job can be managed is explored in this paper. An
open-source light-weight framework for executing R-scripts using Bioconductor
packages, referred to as `RBioCloud', is designed and developed. RBioCloud
offers a set of simple command-line tools for managing the cloud resources, the
data and the execution of the job. Three biological test cases validate the
feasibility of RBioCloud. The framework is publicly available from
http://www.rbiocloud.com.
|
[
{
"version": "v1",
"created": "Fri, 9 Aug 2013 09:20:02 GMT"
}
] | 2013-08-12T00:00:00 |
[
[
"Patel",
"Ishan",
""
],
[
"Varghese",
"Blesson",
""
],
[
"Barker",
"Adam",
""
]
] |
new_dataset
| 0.999213 |
1308.2124
|
Alexander V Terekhov
|
Alexander V. Terekhov and J. Kevin O'Regan
|
Space as an invention of biological organisms
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The question of the nature of space around us has occupied thinkers since the
dawn of humanity, with scientists and philosophers today implicitly assuming
that space is something that exists objectively. Here we show that this does
not have to be the case: the notion of space could emerge when biological
organisms seek an economic representation of their sensorimotor flow. The
emergence of spatial notions does not necessitate the existence of real
physical space, but only requires the presence of sensorimotor invariants
called `compensable' sensory changes. We show mathematically and then in
simulations that na\"ive agents making no assumptions about the existence of
space are able to learn these invariants and to build the abstract notion that
physicists call rigid displacement, which is independent of what is being
displaced. Rigid displacements may underly perception of space as an unchanging
medium within which objects are described by their relative positions. Our
findings suggest that the question of the nature of space, currently exclusive
to philosophy and physics, should also be addressed from the standpoint of
neuroscience and artificial intelligence.
|
[
{
"version": "v1",
"created": "Fri, 9 Aug 2013 13:50:48 GMT"
}
] | 2013-08-12T00:00:00 |
[
[
"Terekhov",
"Alexander V.",
""
],
[
"O'Regan",
"J. Kevin",
""
]
] |
new_dataset
| 0.963781 |
1308.2166
|
Kanat Tangwongsan
|
Kanat Tangwongsan, A. Pavan, and Srikanta Tirthapura
|
Parallel Triangle Counting in Massive Streaming Graphs
| null | null | null | null |
cs.DB cs.DC cs.DS cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of triangles in a graph is a fundamental metric, used in social
network analysis, link classification and recommendation, and more. Driven by
these applications and the trend that modern graph datasets are both large and
dynamic, we present the design and implementation of a fast and cache-efficient
parallel algorithm for estimating the number of triangles in a massive
undirected graph whose edges arrive as a stream. It brings together the
benefits of streaming algorithms and parallel algorithms. By building on the
streaming algorithms framework, the algorithm has a small memory footprint. By
leveraging the paralell cache-oblivious framework, it makes efficient use of
the memory hierarchy of modern multicore machines without needing to know its
specific parameters. We prove theoretical bounds on accuracy, memory access
cost, and parallel runtime complexity, as well as showing empirically that the
algorithm yields accurate results and substantial speedups compared to an
optimized sequential implementation.
(This is an expanded version of a CIKM'13 paper of the same title.)
|
[
{
"version": "v1",
"created": "Fri, 9 Aug 2013 15:54:22 GMT"
}
] | 2013-08-12T00:00:00 |
[
[
"Tangwongsan",
"Kanat",
""
],
[
"Pavan",
"A.",
""
],
[
"Tirthapura",
"Srikanta",
""
]
] |
new_dataset
| 0.991279 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.