id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1307.2043
Ana Mafalda Martins
Santiago Canales, Gregorio Hern\'andez, Mafalda Martins, In\^es Matos
Distance domination, guarding and vertex cover for maximal outerplanar graph
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a distance guarding concept on triangulation graphs, which can be associated with distance domination and distance vertex cover. We show how these subjects are interconnected and provide tight bounds for any n-vertex maximal outerplanar graph: the 2d-guarding number, g_{2d}(n) = n/5; the 2d-distance domination number, gamma_{2d}(n) = n/5; and the 2d-distance vertex cover number, beta_{2d}(n) = n/4.
[ { "version": "v1", "created": "Mon, 8 Jul 2013 11:33:35 GMT" } ]
2013-07-09T00:00:00
[ [ "Canales", "Santiago", "" ], [ "Hernández", "Gregorio", "" ], [ "Martins", "Mafalda", "" ], [ "Matos", "Inês", "" ] ]
new_dataset
0.998909
1307.2202
Waldemar Gerok
Waldemar Gerok (1), J\"urgen Peissig (1), Thomas Kaiser (2) ((1) Leibniz Universit\"at Hannover, (2) Universit\"at Duisburg-Essen)
TDOA assisted RSSD based localization using UWB and directional antennas
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the use of directional antennas for received signal strength difference (RSSD) based localization using ultra-wideband and demonstrates the achievable accuracy with this localization method applied to UWB. As introduced in our previous work the RSSD localization is assisted with one Time Difference of Arrival (TDOA) estimation. The use of directional receiving antennas and an omni-directional transmitting antenna is assumed. Localization is performed in 2D. Two localization approaches are considered: RSSD using statistical channel model and fingerprinting approach. In the case of statistical channel model simulations are performed using Matlab. In the case of fingerprinting approach localization is done based on real indoor-measurements.
[ { "version": "v1", "created": "Mon, 8 Jul 2013 18:57:56 GMT" } ]
2013-07-09T00:00:00
[ [ "Gerok", "Waldemar", "" ], [ "Peissig", "Jürgen", "" ], [ "Kaiser", "Thomas", "" ] ]
new_dataset
0.95141
1304.3390
Alexander Green
Alexander S. Green, Peter LeFanu Lumsdaine, Neil J. Ross, Peter Selinger and Beno\^it Valiron
Quipper: A Scalable Quantum Programming Language
10 pages, PLDI 2013
ACM SIGPLAN Notices 48(6):333-342, 2013
10.1145/2499370.2462177
null
cs.PL cs.ET quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The field of quantum algorithms is vibrant. Still, there is currently a lack of programming languages for describing quantum computation on a practical scale, i.e., not just at the level of toy problems. We address this issue by introducing Quipper, a scalable, expressive, functional, higher-order quantum programming language. Quipper has been used to program a diverse set of non-trivial quantum algorithms, and can generate quantum gate representations using trillions of gates. It is geared towards a model of computation that uses a classical computer to control a quantum device, but is not dependent on any particular model of quantum hardware. Quipper has proven effective and easy to use, and opens the door towards using formal methods to analyze quantum algorithms.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 18:28:16 GMT" } ]
2013-07-08T00:00:00
[ [ "Green", "Alexander S.", "" ], [ "Lumsdaine", "Peter LeFanu", "" ], [ "Ross", "Neil J.", "" ], [ "Selinger", "Peter", "" ], [ "Valiron", "Benoît", "" ] ]
new_dataset
0.998696
1304.6241
Myongchol Ri
Chol-Un Kim, Dok-Jun An and Song Han
A Security Protocol for the Identification and Data Encrypt Key Management of Secure Mobile Devices
7 pages, 1 figure, in version 2 added a secure cryptographic key management protocol based on the secure user authentication scheme in version 1 and references, changed the title; version 3 developed abstract and conclusions, accepted in JTPC
Journal of Theoretical Physics and Cryptography, Vol.3, July 2013, pp21-24
null
KISU-MATH-2012-E-R-016
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we proposed an identification and data encrypt key manage protocol that can be used in some security system based on such secure devices as secure USB memories or RFIDs, which are widely used for identifying persons or other objects recently. In general, the default functions of the security system using a mobile device are the authentication for the owner of the device and secure storage of data stored on the device. We proposed a security model that consists of the server and mobile devices in order to realize these security features. In this model we defined the secure communication protocol for the authentication and management of data encryption keys using a private key encryption algorithm with the public key between the server and mobile devices. In addition, we was performed the analysis for the attack to the communication protocol between the mobile device and server. Using the communication protocol, the system will attempt to authenticate the mobile device. The data decrypt key is transmitted only if the authentication process is successful. The data in the mobile device can be decrypted using the key. Our analysis proved that this Protocol ensures anonymity, prevents replay attacks and realizes the interactive identification between the security devices and the authentication server.
[ { "version": "v1", "created": "Tue, 23 Apr 2013 11:27:22 GMT" }, { "version": "v2", "created": "Tue, 18 Jun 2013 02:54:34 GMT" }, { "version": "v3", "created": "Tue, 2 Jul 2013 10:06:30 GMT" } ]
2013-07-08T00:00:00
[ [ "Kim", "Chol-Un", "" ], [ "An", "Dok-Jun", "" ], [ "Han", "Song", "" ] ]
new_dataset
0.980734
1307.1517
Nandan Mirajkar Mr
Nandan Mirajkar, Sandeep Bhujbal, Aaradhana Deshmukh
Perform wordcount Map-Reduce Job in Single Node Apache Hadoop cluster and compress data using Lempel-Ziv-Oberhumer (LZO) algorithm
10 pages, 17 figures, Journal
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2, January 2013 ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814 www.IJCSI.org
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications like Yahoo, Facebook, Twitter have huge data which has to be stored and retrieved as per client access. This huge data storage requires huge database leading to increase in physical storage and becomes complex for analysis required in business growth. This storage capacity can be reduced and distributed processing of huge data can be done using Apache Hadoop which uses Map-reduce algorithm and combines the repeating data so that entire data is stored in reduced format. The paper describes performing a wordcount Map-Reduce Job in Single Node Apache Hadoop cluster and compress data using Lempel-Ziv-Oberhumer (LZO) algorithm.
[ { "version": "v1", "created": "Fri, 5 Jul 2013 04:10:34 GMT" } ]
2013-07-08T00:00:00
[ [ "Mirajkar", "Nandan", "" ], [ "Bhujbal", "Sandeep", "" ], [ "Deshmukh", "Aaradhana", "" ] ]
new_dataset
0.960408
1307.1684
Diya Vadhwani naresh
Diya Naresh Vadhwani, Megha Singh, Deepak Kulhare
Simulation of wireless dynamic source routing protocol with IP traffic flow analysis, memory efficiency and increased throughput
5 pages, 11 figures, 8 tables
ACEEE International Journal on Communication (IJCom), Issue. 3, Vol. 4, Nov 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today in fast technology development in wireless mobile adhoc network there is vast scope for research. As it is known that wireless communication for mobile network has many application areas like routing services, security services etc. The mobile adhoc network is the wireless network for communication in which the mobile nodes are organized without any centralized administrator. There are many Manet routing protocols like reactive, proactive, hybrid etc. In this paper the reactive Manet routing protocol like DSR is simulated for traffic analysis for 50 mobile nodes for IP traffic flows. Also throughput is analyzed for DSR and ER-DSR protocol. And finally the memory utilized during simulation of DSR and ER-DSR is evaluated in order to compare both.
[ { "version": "v1", "created": "Fri, 5 Jul 2013 18:26:14 GMT" } ]
2013-07-08T00:00:00
[ [ "Vadhwani", "Diya Naresh", "" ], [ "Singh", "Megha", "" ], [ "Kulhare", "Deepak", "" ] ]
new_dataset
0.997298
1307.1204
Fan Li
Qin Xu, Fan Li, Jinsheng Sun, Moshe Zukerman
A New TCP/AQM System Analysis
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MGT fluid model has been used extensively to guide designs of AQM schemes aiming to alleviate adverse effects of Internet congestion. In this paper, we provide a new analysis of a TCP/AQM system that aims to improve the accuracy of the MGT fluid model especially in heavy traffic conditions. The analysis is based on the consideration of two extreme congestion scenarios that leads to the derivation of upper and lower bounds for the queue length and marking probability dynamics and showing that they approach each other in steady state. Both discrete and continuous time models are provided. Simulation results demonstrate that the new model achieves a significantly higher level of accuracy than a simplified version of the MGT fluid model.
[ { "version": "v1", "created": "Thu, 4 Jul 2013 05:44:56 GMT" } ]
2013-07-05T00:00:00
[ [ "Xu", "Qin", "" ], [ "Li", "Fan", "" ], [ "Sun", "Jinsheng", "" ], [ "Zukerman", "Moshe", "" ] ]
new_dataset
0.999364
1002.4088
Martianus Frederic Ezerman
Martianus Frederic Ezerman, San Ling, Patrick Sole
Additive Asymmetric Quantum Codes
Accepted for publication March 2, 2011, IEEE Transactions on Information Theory, to appear
IEEE Trans. IT vol. 57 no. 8 pp. 5536--5550, Aug. 2011
10.1109/TIT.2011.2159040
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general construction of asymmetric quantum codes based on additive codes under the trace Hermitian inner product. Various families of additive codes over $\F_{4}$ are used in the construction of many asymmetric quantum codes over $\F_{4}$.
[ { "version": "v1", "created": "Mon, 22 Feb 2010 09:51:32 GMT" }, { "version": "v2", "created": "Tue, 29 Mar 2011 20:32:37 GMT" } ]
2013-07-04T00:00:00
[ [ "Ezerman", "Martianus Frederic", "" ], [ "Ling", "San", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.989798
1307.0885
Honggang Hu
Honggang Hu, Shuai Shao, Guang Gong, and Tor Helleseth
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1998, Lin presented a conjecture on a class of ternary sequences with ideal 2-level autocorrelation in his Ph.D thesis. Those sequences have a very simple structure, i.e., their trace representation has two trace monomial terms. In this paper, we present a proof for the conjecture. The mathematical tools employed are the second-order multiplexing decimation-Hadamard transform, Stickelberger's theorem, the Teichm\"{u}ller character, and combinatorial techniques for enumerating the Hamming weights of ternary numbers. As a by-product, we also prove that the Lin conjectured ternary sequences are Hadamard equivalent to ternary $m$-sequences.
[ { "version": "v1", "created": "Wed, 3 Jul 2013 00:12:43 GMT" } ]
2013-07-04T00:00:00
[ [ "Hu", "Honggang", "" ], [ "Shao", "Shuai", "" ], [ "Gong", "Guang", "" ], [ "Helleseth", "Tor", "" ] ]
new_dataset
0.969767
1307.0952
Ivan Arakistain
Ivan Arakistain, Jose Miguel Abascal, Oriol Munne
Wireless sensor network technology for moisture monitoring of wood
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Leaks represent a very important hazard for the buildings and they can affect all sorts of building materials and specially wood due to its hygroscopic properties. Excessive moisture content can affect in a negative way building processes such as the installation of wooden floors or the use of wood as a structural material. Moisture meters can provide prompt and non-destructive determination of wood moisture, and as such are among the most useful tools available to wood products manufacturers and scientists. However, a continuous monitoring system is needed in order to avoid excessive moisture content which can damage wooden floors as well as structural wood. Data and procedures are presented in order to develop a suitable monitoring tool based on wireless sensor networks to provide an electronic tool of active security both for the installation of wooden floors and for the proper maintenance of existent buildings which have a timber structure.
[ { "version": "v1", "created": "Wed, 3 Jul 2013 09:48:08 GMT" } ]
2013-07-04T00:00:00
[ [ "Arakistain", "Ivan", "" ], [ "Abascal", "Jose Miguel", "" ], [ "Munne", "Oriol", "" ] ]
new_dataset
0.99726
1307.0589
Steven Ness
Steven Ness, Helena Symonds, Paul Spong, George Tzanetakis
The Orchive : Data mining a massive bioacoustic archive
ICML 2013 Workshop on Machine Learning for Bioacoustics
null
null
null
cs.LG cs.DB cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Orchive is a large collection of over 20,000 hours of audio recordings from the OrcaLab research facility located off the northern tip of Vancouver Island. It contains recorded orca vocalizations from the 1980 to the present time and is one of the largest resources of bioacoustic data in the world. We have developed a web-based interface that allows researchers to listen to these recordings, view waveform and spectral representations of the audio, label clips with annotations, and view the results of machine learning classifiers based on automatic audio features extraction. In this paper we describe such classifiers that discriminate between background noise, orca calls, and the voice notes that are present in most of the tapes. Furthermore we show classification results for individual calls based on a previously existing orca call catalog. We have also experimentally investigated the scalability of classifiers over the entire Orchive.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 04:59:19 GMT" } ]
2013-07-03T00:00:00
[ [ "Ness", "Steven", "" ], [ "Symonds", "Helena", "" ], [ "Spong", "Paul", "" ], [ "Tzanetakis", "George", "" ] ]
new_dataset
0.992295
1307.0616
Jyoti Tewari
Jyoti Tewari, Swati Arya
Evolution of Gi Fi Technology Over Other Technologies
4 pages, 3 Figures, 1 Table, Volume 2, Issue 3, IJCSN - International Journal of Computer Science and Network, June 2013
null
null
IJCSN-2013-2-3-17
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gi-Fi stands for Gigabit Wireless. Gi-Fi is a wireless transmission system which is ten times faster than other technology and its chip delivers short-range multigigabit data transfer in a local environment. Gi-Fi is a wireless technology which promises high speed short range data transfers with speeds of up to 5 Gbps within a range of 10 meters. The Gi-Fi operates on the 60GHz frequency band. This frequency band is currently mostly unused. It is manufactured using (CMOS) technology. This wireless technology named as Gi-Fi. The benefits and features of this new technology can be helpful for use in development of the next generation of devices and places. In this paper, the comparison is perform between Gi-Fi and some of existing technologies with very high speed large files transfers within seconds it is expected that Gi-Fi to be the preferred wireless technology used in home and office of future.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 08:16:36 GMT" } ]
2013-07-03T00:00:00
[ [ "Tewari", "Jyoti", "" ], [ "Arya", "Swati", "" ] ]
new_dataset
0.993872
1307.0635
Uli Fahrenberg
Zolt\'an \'Esik, Uli Fahrenberg, Axel Legay, Karin Quaas
Kleene Algebras and Semimodules for Energy Problems
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the purpose of unifying a number of approaches to energy problems found in the literature, we introduce generalized energy automata. These are finite automata whose edges are labeled with energy functions that define how energy levels evolve during transitions. Uncovering a close connection between energy problems and reachability and B\"uchi acceptance for semiring-weighted automata, we show that these generalized energy problems are decidable. We also provide complexity results for important special cases.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 09:15:00 GMT" } ]
2013-07-03T00:00:00
[ [ "Ésik", "Zoltán", "" ], [ "Fahrenberg", "Uli", "" ], [ "Legay", "Axel", "" ], [ "Quaas", "Karin", "" ] ]
new_dataset
0.985346
1307.0642
Firas Ajil Jassim
Firas A. Jassim
A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method
null
International Journal of Computer Applications, Vol.72, No.17, pp. 39-44, June 2013
null
null
cs.MM cs.CR
http://creativecommons.org/licenses/by/3.0/
The needs for steganographic techniques for hiding secret message inside images have been arise. This paper is to create a practical steganographic implementation to hide text inside grey scale images. The secret message is hidden inside the cover image using Five Modulus Method. The novel algorithm is called (ST-FMM. FMM which consists of transforming all the pixels within the 5X5 window size into its corresponding multiples of 5. After that, the secret message is hidden inside the 5X5 window as a non-multiples of 5. Since the modulus of non-multiples of 5 are 1,2,3 and 4, therefore; if the reminder is one of these, then this pixel represents a secret character. The secret key that has to be sent is the window size. The main advantage of this novel algorithm is to keep the size of the cover image constant while the secret message increased in size. Peak signal-to-noise ratio is captured for each of the images tested. Based on the PSNR value of each images, the stego image has high PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 09:33:43 GMT" } ]
2013-07-03T00:00:00
[ [ "Jassim", "Firas A.", "" ] ]
new_dataset
0.980981
1307.0687
Gokce Gorbil
Erol Gelenbe, Gokce Gorbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu and George Lyberopoulos
Security for Smart Mobile Networks: The NEMESYS Approach
Accepted for publication in PRISMS'13; 8 pages. arXiv admin note: text overlap with arXiv:1305.5483
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growing popularity of smart mobile devices such as smartphones and tablets has made them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving mobile threat as attackers experiment with new business models by targeting mobile users. With the emergence of the first large-scale mobile botnets, the core network has also become vulnerable to distributed denial-of-service attacks such as the signaling attack. Furthermore, complementary access methods such as Wi-Fi and femtocells introduce additional vulnerabilities for the mobile users as well as the core network. In this paper, we present the NEMESYS approach to smart mobile network security. The goal of the NEMESYS project is to develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and to improve mobile network security through a better understanding of the threat landscape. To this purpose, NEMESYS will collect and analyze information about the nature of cyber-attacks targeting smart mobile devices and the core network so that appropriate counter-measures can be taken. We are developing a data collection infrastructure that incorporates virtualized mobile honeypots and honeyclients in order to gather, detect and provide early warning of mobile attacks and understand the modus operandi of cyber-criminals that target mobile devices. By correlating the extracted information with known attack patterns from wireline networks, we plan to reveal and identify the possible shift in the way that cyber-criminals launch attacks against smart mobile devices.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 11:27:39 GMT" } ]
2013-07-03T00:00:00
[ [ "Gelenbe", "Erol", "" ], [ "Gorbil", "Gokce", "" ], [ "Tzovaras", "Dimitrios", "" ], [ "Liebergeld", "Steffen", "" ], [ "Garcia", "David", "" ], [ "Baltatu", "Madalina", "" ], [ "Lyberopoulos", "George", "" ] ]
new_dataset
0.997242
1307.0772
Umakant Mishra
Umakant Mishra
How to Build an RSS Feed using ASP
11 pages, 1 figure
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RSS is a XML based format. The Current popular version of RSS is RSS version 2.0. The purpose of adding an RSS feed to your site is to show if anything new is added to the site. For example, if a new article or blog or news item is added to your site that should automatically appear in the RSS feed so that the visitors/ RSS readers will automatically get updated about this new addition. The RSS feed is also called RSS channel. There are two main elements of the RSS XML file, one is the header or channel element that describes the details about the site/feeder and other is the body or item element that describes the consists of individual articles/entries updated in the site. As the format of the RSS feed file is pretty simple, it can be coded in any language, ASP, PHP or anything of that sort. We will build an RSS feeder using classical ASP (Active Server Pages) code in this article.
[ { "version": "v1", "created": "Tue, 2 Jul 2013 17:33:37 GMT" } ]
2013-07-03T00:00:00
[ [ "Mishra", "Umakant", "" ] ]
new_dataset
0.994052
1304.7038
Andrew Winslow
Andrew Winslow
Staged Self-Assembly and Polyomino Context-Free Grammars
34 pages, 23 figures. An abstract version has been accepted to DNA 19
null
null
null
cs.CC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous work by Demaine et al. (2012) developed a strong connection between smallest context-free grammars and staged self-assembly systems for one-dimensional strings and assemblies. We extend this work to two-dimensional polyominoes and assemblies, comparing staged self-assembly systems to a natural generalization of context-free grammars we call polyomino context-free grammars (PCFGs). We achieve nearly optimal bounds on the largest ratios of the smallest PCFG and staged self-assembly system for a given polyomino with n cells. For the ratio of PCFGs over assembly systems, we show the smallest PCFG can be an Omega(n/(log(n))^3)-factor larger than the smallest staged assembly system, even when restricted to square polyominoes. For the ratio of assembly systems over PCFGs, we show that the smallest staged assembly system is never more than a O(log(n))-factor larger than the smallest PCFG and is sometimes an Omega(log(n)/loglog(n))-factor larger.
[ { "version": "v1", "created": "Thu, 25 Apr 2013 22:29:58 GMT" }, { "version": "v2", "created": "Wed, 1 May 2013 16:58:18 GMT" }, { "version": "v3", "created": "Sat, 29 Jun 2013 16:54:56 GMT" } ]
2013-07-02T00:00:00
[ [ "Winslow", "Andrew", "" ] ]
new_dataset
0.991773
1306.6943
Rishi Saket
Rishi Saket
A PTAS for the Classical Ising Spin Glass Problem on the Chimera Graph Structure
6 pages, corrected PTAS running time
null
null
null
cs.DS quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a polynomial time approximation scheme (PTAS) for the minimum value of the classical Ising Hamiltonian with linear terms on the Chimera graph structure as defined in the recent work of McGeoch and Wang. The result follows from a direct application of the techniques used by Bansal, Bravyi and Terhal who gave a PTAS for the same problem on planar and, in particular, grid graphs. We also show that on Chimera graphs, the trivial lower bound is within a constant factor of the optimum.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 20:00:25 GMT" }, { "version": "v2", "created": "Mon, 1 Jul 2013 14:12:45 GMT" } ]
2013-07-02T00:00:00
[ [ "Saket", "Rishi", "" ] ]
new_dataset
0.999247
1307.0049
Minko Dudev
Minko Dudev, Sebastian Gerling, Philip Peter
SAHER: Secure and Efficient Routing in Sensor Networks
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As an increasing amount of research is being done on various applications of sensor networks in adversarial environments, ensuring secure routing becomes of critical importance for the success of such deployments. The problem of designing a secure routing protocol for ad hoc networks has been already addressed, yet, there exists no complete solution that meets the specific requirements of sensor networks, where nodes are extremely constrained in terms of both power and computational resources. Thus, we propose a new protocol that is not built solely around security but also has efficiency and simplicity among its main goals. We propose the Secure Ad Hoc Efficient Routing protocol (SAHER) which employs a two-tier architecture based on node clustering. Also, we combine mechanisms like localscale geographic routing, per-node reputation tables, credit based alternate route enforcement and cumulative authentication. Using these techniques we examine ways to efficiently defend against the two most common network layer attacks: selective packet dropping and message flooding. Further, we consider join/leave operations which have not yet been studied in sufficient depth for sensor networks from a security standpoint. We provide a description of the protocol along with comprehensive experimental evaluation under different node distributions, different proportions of non-malicious vs. malicious nodes and different types of activity that malicious nodes could exhibit.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 23:37:31 GMT" } ]
2013-07-02T00:00:00
[ [ "Dudev", "Minko", "" ], [ "Gerling", "Sebastian", "" ], [ "Peter", "Philip", "" ] ]
new_dataset
0.994405
1307.0082
Talb M
M.Khlaif and M.Talb
Digital Data Security and Copyright Protection Using Cellular Automata
04 pages, 2 figures, IJCSN Journal
International Journal of Computer Science and Network-IJCSN , Volume 2, Issue 3, June 2013
null
IJCSN-2013-2-3-13
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emergence of many challenges and the rapid development of the means of communications and computer networks and the Internet. Digital information revolution has affected a lot on human societies. Data today has become available in digital format (text, image, audio, and video), which led to the emergence of many opportunities for creativity for innovation as well as the emergence of a new kind of challenges
[ { "version": "v1", "created": "Sat, 29 Jun 2013 09:22:05 GMT" } ]
2013-07-02T00:00:00
[ [ "Khlaif", "M.", "" ], [ "Talb", "M.", "" ] ]
new_dataset
0.992076
1307.0099
Emanuele Giaquinta
Kimmo Fredriksson, Emanuele Giaquinta
On a compact encoding of the swap automaton
null
null
null
null
cs.FL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a string $P$ of length $m$ over an alphabet $\Sigma$ of size $\sigma$, a swapped version of $P$ is a string derived from $P$ by a series of local swaps, i.e., swaps of adjacent symbols, such that each symbol can participate in at most one swap. We present a theoretical analysis of the nondeterministic finite automaton for the language $\bigcup_{P'\in\Pi_P}\Sigma^*P'$ (swap automaton for short), where $\Pi_P$ is the set of swapped versions of $P$. Our study is based on the bit-parallel simulation of the same automaton due to Fredriksson, and reveals an interesting combinatorial property that links the automaton to the one for the language $\Sigma^*P$. By exploiting this property and the method presented by Cantone et al. (2010), we obtain a bit-parallel encoding of the swap automaton which takes $O(\sigma^2\ceil{k/w})$ space and allows one to simulate the automaton on a string of length $n$ in time $O(n\ceil{k/w})$, where $\ceil{m/\sigma}\le k\le m$.
[ { "version": "v1", "created": "Sat, 29 Jun 2013 12:53:49 GMT" } ]
2013-07-02T00:00:00
[ [ "Fredriksson", "Kimmo", "" ], [ "Giaquinta", "Emanuele", "" ] ]
new_dataset
0.994305
1307.0247
Claudius J\"ahn
Claudius J\"ahn
Progressive Blue Surfels
Please note that this paper represents an early working draft, which will be subsequently replaced by refined versions! 3 pages, 3 figures
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a new technique to generate and use surfels for rendering of highly complex, polygonal 3D scenes in real time. The basic idea is to approximate complex parts of the scene by rendering a set of points (surfels). The points are computed in a preprocessing step and offer two important properties: They are placed only on the visible surface of the scene's geometry and they are distributed and sorted in such a way, that every prefix of points is a good visual representation of the approximated part of the scene. An early evaluation of the method shows that it is capable of rendering scenes consisting of several billions of triangles with high image quality.
[ { "version": "v1", "created": "Sun, 30 Jun 2013 21:54:33 GMT" } ]
2013-07-02T00:00:00
[ [ "Jähn", "Claudius", "" ] ]
new_dataset
0.997375
1307.0320
Wanling Gao
Wanling Gao, Yuqing Zhu, Zhen Jia, Chunjie Luo, Lei Wang, Zhiguo Li, Jianfeng Zhan, Yong Qi, Yongqiang He, Shiming Gong, Xiaona Li, Shujie Zhang, and Bizhu Qiu
BigDataBench: a Big Data Benchmark Suite from Web Search Engines
7 pages, 5 figures, The Third Workshop on Architectures and Systems for Big Data(ASBD 2013) in conjunction with The 40th International Symposium on Computer Architecture, May 2013
null
null
null
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents our joint research efforts on big data benchmarking with several industrial partners. Considering the complexity, diversity, workload churns, and rapid evolution of big data systems, we take an incremental approach in big data benchmarking. For the first step, we pay attention to search engines, which are the most important domain in Internet services in terms of the number of page views and daily visitors. However, search engine service providers treat data, applications, and web access logs as business confidentiality, which prevents us from building benchmarks. To overcome those difficulties, with several industry partners, we widely investigated the open source solutions in search engines, and obtained the permission of using anonymous Web access logs. Moreover, with two years' great efforts, we created a sematic search engine named ProfSearch (available from http://prof.ict.ac.cn). These efforts pave the path for our big data benchmark suite from search engines---BigDataBench, which is released on the web page (http://prof.ict.ac.cn/BigDataBench). We report our detailed analysis of search engine workloads, and present our benchmarking methodology. An innovative data generation methodology and tool are proposed to generate scalable volumes of big data from a small seed of real data, preserving semantics and locality of data. Also, we preliminarily report two case studies using BigDataBench for both system and architecture researches.
[ { "version": "v1", "created": "Mon, 1 Jul 2013 10:27:48 GMT" } ]
2013-07-02T00:00:00
[ [ "Gao", "Wanling", "" ], [ "Zhu", "Yuqing", "" ], [ "Jia", "Zhen", "" ], [ "Luo", "Chunjie", "" ], [ "Wang", "Lei", "" ], [ "Li", "Zhiguo", "" ], [ "Zhan", "Jianfeng", "" ], [ "Qi", "Yong", "" ], [ "He", "Yongqiang", "" ], [ "Gong", "Shiming", "" ], [ "Li", "Xiaona", "" ], [ "Zhang", "Shujie", "" ], [ "Qiu", "Bizhu", "" ] ]
new_dataset
0.997895
1305.3250
Cristian Popescu
Marian Popescu, Peter J. Dugan, Mohammad Pourhomayoun, Denise Risch, Harold W. Lewis III, Christopher W. Clark
Bioacoustical Periodic Pulse Train Signal Detection and Classification using Spectrogram Intensity Binarization and Energy Projection
ICML 2013 Workshop on Machine Learning for Bioacoustics, 2013, 6 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The following work outlines an approach for automatic detection and recognition of periodic pulse train signals using a multi-stage process based on spectrogram edge detection, energy projection and classification. The method has been implemented to automatically detect and recognize pulse train songs of minke whales. While the long term goal of this work is to properly identify and detect minke songs from large multi-year datasets, this effort was developed using sounds off the coast of Massachusetts, in the Stellwagen Bank National Marine Sanctuary. The detection methodology is presented and evaluated on 232 continuous hours of acoustic recordings and a qualitative analysis of machine learning classifiers and their performance is described. The trained automatic detection and classification system is applied to 120 continuous hours, comprised of various challenges such as broadband and narrowband noises, low SNR, and other pulse train signatures. This automatic system achieves a TPR of 63% for FPR of 0.6% (or 0.87 FP/h), at a Precision (PPV) of 84% and an F1 score of 71%.
[ { "version": "v1", "created": "Tue, 14 May 2013 18:49:52 GMT" }, { "version": "v2", "created": "Mon, 17 Jun 2013 20:09:07 GMT" }, { "version": "v3", "created": "Fri, 28 Jun 2013 17:33:59 GMT" } ]
2013-07-01T00:00:00
[ [ "Popescu", "Marian", "" ], [ "Dugan", "Peter J.", "" ], [ "Pourhomayoun", "Mohammad", "" ], [ "Risch", "Denise", "" ], [ "Lewis", "Harold W.", "III" ], [ "Clark", "Christopher W.", "" ] ]
new_dataset
0.999718
1306.6729
Sebastiano Gottardo
Mauro Conti, Nicola Dragoni and Sebastiano Gottardo
MITHYS: Mind The Hand You Shake - Protecting mobile devices from SSL usage vulnerabilities
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent studies have shown that a significant number of mobile applications, often handling sensitive data such as bank accounts and login credentials, suffers from SSL vulnerabilities. Most of the time, these vulnerabilities are due to improper use of the SSL protocol (in particular, in its \emph{handshake} phase), resulting in applications exposed to man-in-the-middle attacks. In this paper, we present MITHYS, a system able to: (i) detect applications vulnerable to man-in-the-middle attacks, and (ii) protect them against these attacks. We demonstrate the feasibility of our proposal by means of a prototype implementation in Android, named MITHYSApp. A thorough set of experiments assesses the validity of our solution in detecting and protecting mobile applications from man-in-the-middle attacks, without introducing significant overheads. Finally, MITHYSApp does not require any special permissions nor OS modifications, as it operates at the application level. These features make MITHYSApp immediately deployable on a large user base.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 06:45:01 GMT" } ]
2013-07-01T00:00:00
[ [ "Conti", "Mauro", "" ], [ "Dragoni", "Nicola", "" ], [ "Gottardo", "Sebastiano", "" ] ]
new_dataset
0.961381
1306.6755
Kareem Darwish
Kareem Darwish
Arabizi Detection and Conversion to Arabic
null
null
null
null
cs.CL cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Arabizi is Arabic text that is written using Latin characters. Arabizi is used to present both Modern Standard Arabic (MSA) or Arabic dialects. It is commonly used in informal settings such as social networking sites and is often with mixed with English. In this paper we address the problems of: identifying Arabizi in text and converting it to Arabic characters. We used word and sequence-level features to identify Arabizi that is mixed with English. We achieved an identification accuracy of 98.5%. As for conversion, we used transliteration mining with language modeling to generate equivalent Arabic text. We achieved 88.7% conversion accuracy, with roughly a third of errors being spelling and morphological variants of the forms in ground truth.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 08:46:11 GMT" } ]
2013-07-01T00:00:00
[ [ "Darwish", "Kareem", "" ] ]
new_dataset
0.999756
1306.6834
Paulo Shakarian
Damon Paulo, Bradley Fischl, Tanya Markow, Michael Martin, Paulo Shakarian
Social Network Intelligence Analysis to Combat Street Gang Violence
null
null
null
null
cs.SI physics.soc-ph
http://creativecommons.org/licenses/publicdomain/
In this paper we introduce the Organization, Relationship, and Contact Analyzer (ORCA) that is designed to aide intelligence analysis for law enforcement operations against violent street gangs. ORCA is designed to address several police analytical needs concerning street gangs using new techniques in social network analysis. Specifically, it can determine "degree of membership" for individuals who do not admit to membership in a street gang, quickly identify sets of influential individuals (under the tipping model), and identify criminal ecosystems by decomposing gangs into sub-groups. We describe this software and the design decisions considered in building an intelligence analysis tool created specifically for countering violent street gangs as well as provide results based on conducting analysis on real-world police data provided by a major American metropolitan police department who is partnering with us and currently deploying this system for real-world use.
[ { "version": "v1", "created": "Fri, 28 Jun 2013 13:36:04 GMT" } ]
2013-07-01T00:00:00
[ [ "Paulo", "Damon", "" ], [ "Fischl", "Bradley", "" ], [ "Markow", "Tanya", "" ], [ "Martin", "Michael", "" ], [ "Shakarian", "Paulo", "" ] ]
new_dataset
0.981624
1306.6839
Sowmya Kamath S
Karthik R, Raghavendra Karthik, Pramod S and Sowmya Kamath
W3-Scrape - A Windows based Reconnaissance Tool for Web Application Fingerprinting
International Conference on Emerging Trends in Electrical, Communication and Information Technologies (ICECIT 2012), 6 pages; Organised by SRIT, Ananthpur, India during Dec 21 - 23, 2012. (Publisher - Elsevier Science & Technology; ISBN 8131234118, 9788131234112)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize its payload or exploitation techniques based on the identification so to increase the chances of successful intrusion. This paper presents a new tool "W3-Scrape" for the relatively nascent field of Web Application finger printing that helps automate web application fingerprinting when performed in the current scenarios.
[ { "version": "v1", "created": "Mon, 24 Jun 2013 18:14:03 GMT" } ]
2013-07-01T00:00:00
[ [ "R", "Karthik", "" ], [ "Karthik", "Raghavendra", "" ], [ "S", "Pramod", "" ], [ "Kamath", "Sowmya", "" ] ]
new_dataset
0.998887
1306.6428
Meenakshi S P
S.P. Meenakshi and S.V. Raghavan
Internet Control Plane Event Identification using Model Based Change Point Detection Techniques
19 pages, 8 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the raise of many global organizations deploying their data centers and content services in India, the prefix reachability performance study from global destinations garners our attention. The events such as failures and attacks occurring in the Internet topology have impact on Autonomous System (AS) paths announced in the control plane and reachability of prefixes from spatially distributed ASes. As a consequence the customer reachability to the services in terms of increased latency and outages for a short or long time are experienced. The challenge in control plane event detection is when the data plane traffic is able to reach the intended destinations correctly. However detection of such events are crucial for the operations of content and data center industries. By monitoring the spatially distributed routing table features like AS path length distributions, spatial prefix reachability distribution and covering to overlap route ratio, we can detect the control plane events. In our work, we study prefix AS paths from the publicly available route-view data and analyze the global reachability as well as reachability to Indian AS topology. To capture the spatial events in a single temporal pattern, we propose a counting based measure using prefixes announced by x % of spatial peers. Employing statistical characteristics change point detection and temporal aberration algorithm on the time series of the proposed measure, we identify the occurrence of long and stochastic control plane events. The impact and duration of the events are also quantified. We validate the mechanisms over the proposed measure using the SEA-Me-We4 cable cut event manifestations in the control plane of Indian AS topology. The cable cut events occurred on 6th June 2012 (long term event) and 17th April 2012 (stochastic event) are considered for validation.
[ { "version": "v1", "created": "Thu, 27 Jun 2013 07:58:17 GMT" } ]
2013-06-28T00:00:00
[ [ "Meenakshi", "S. P.", "" ], [ "Raghavan", "S. V.", "" ] ]
new_dataset
0.979543
1306.6542
Shuai Yuan
Shuai Yuan, Jun Wang, Xiaoxue Zhao
Real-time Bidding for Online Advertising: Measurement and Analysis
Accepted by ADKDD '13 workshop
null
null
null
cs.GT cs.CE cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The real-time bidding (RTB), aka programmatic buying, has recently become the fastest growing area in online advertising. Instead of bulking buying and inventory-centric buying, RTB mimics stock exchanges and utilises computer algorithms to automatically buy and sell ads in real-time; It uses per impression context and targets the ads to specific people based on data about them, and hence dramatically increases the effectiveness of display advertising. In this paper, we provide an empirical analysis and measurement of a production ad exchange. Using the data sampled from both demand and supply side, we aim to provide first-hand insights into the emerging new impression selling infrastructure and its bidding behaviours, and help identifying research and design issues in such systems. From our study, we observed that periodic patterns occur in various statistics including impressions, clicks, bids, and conversion rates (both post-view and post-click), which suggest time-dependent models would be appropriate for capturing the repeated patterns in RTB. We also found that despite the claimed second price auction, the first price payment in fact is accounted for 55.4% of total cost due to the arrangement of the soft floor price. As such, we argue that the setting of soft floor price in the current RTB systems puts advertisers in a less favourable position. Furthermore, our analysis on the conversation rates shows that the current bidding strategy is far less optimal, indicating the significant needs for optimisation algorithms incorporating the facts such as the temporal behaviours, the frequency and recency of the ad displays, which have not been well considered in the past.
[ { "version": "v1", "created": "Thu, 27 Jun 2013 15:15:16 GMT" } ]
2013-06-28T00:00:00
[ [ "Yuan", "Shuai", "" ], [ "Wang", "Jun", "" ], [ "Zhao", "Xiaoxue", "" ] ]
new_dataset
0.987923
1111.3281
Reza Farrahi Moghaddam
Reza Farrahi Moghaddam and Mohamed Cheriet and Thomas Milo and Robert Wisnovsky
A prototype system for handwritten sub-word recognition: Toward Arabic-manuscript transliteration
8 pages, 7 figures, 6 tables
null
10.1109/ISSPA.2012.6310473
null
cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A prototype system for the transliteration of diacritics-less Arabic manuscripts at the sub-word or part of Arabic word (PAW) level is developed. The system is able to read sub-words of the input manuscript using a set of skeleton-based features. A variation of the system is also developed which reads archigraphemic Arabic manuscripts, which are dot-less, into archigraphemes transliteration. In order to reduce the complexity of the original highly multiclass problem of sub-word recognition, it is redefined into a set of binary descriptor classifiers. The outputs of trained binary classifiers are combined to generate the sequence of sub-word letters. SVMs are used to learn the binary classifiers. Two specific Arabic databases have been developed to train and test the system. One of them is a database of the Naskh style. The initial results are promising. The systems could be trained on other scripts found in Arabic manuscripts.
[ { "version": "v1", "created": "Mon, 14 Nov 2011 17:03:42 GMT" } ]
2013-06-27T00:00:00
[ [ "Moghaddam", "Reza Farrahi", "" ], [ "Cheriet", "Mohamed", "" ], [ "Milo", "Thomas", "" ], [ "Wisnovsky", "Robert", "" ] ]
new_dataset
0.998605
1306.6115
Jan Blech
Jan Olaf Blech, Harald Rue{\ss}, Bernhard Sch\"atz
On Behavioral Types for OSGi: From Theory to Implementation
arXiv admin note: text overlap with arXiv:1302.5175
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report presents our work on behavioral types for OSGi component systems. It extends previously published work and presents features and details that have not yet been published. In particular, we cover a discussion on behavioral types in general, and Eclipse based implementation work on behavioral types . The implementation work covers: editors, means for comparing types at development and runtime, a tool connection to resolve incompatibilities, and an AspectJ based infrastructure to ensure behavioral type correctness at runtime of a system. Furthermore, the implementation comprises various auxiliary operations. We present some evaluation work based on examples.
[ { "version": "v1", "created": "Wed, 26 Jun 2013 01:51:31 GMT" } ]
2013-06-27T00:00:00
[ [ "Blech", "Jan Olaf", "" ], [ "Rueß", "Harald", "" ], [ "Schätz", "Bernhard", "" ] ]
new_dataset
0.973296
1306.6192
Lukasz Swierczewski
Lukasz Swierczewski
Akceleracja obliczen algebry liniowej z wykorzystaniem masywnie rownoleglych, wielordzeniowych procesorow GPU
10 pages in polish
Prace Naukowe Studentow 2; Wyzwania XXI Wieku, Przyroda, Technika, Czlowiek; Materialy z III Ogolnopolskiej Sesji Kol Naukowych, 2012
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents the aspect of use of modern graphics accelerators supporting CUDA technology for high-performance computing in the field of linear algebra. Fully programmable graphic cards have been available for several years for both ordinary users and research units. They provide the capability of performing virtually any computing with high performance, which is often beyond the reach of conventional CPUs. GPU architecture, also in case of classical problems of linear algebra which is the basis for many calculations, can bring many benefits to the developer. Performance increase, observed during matrix multiplication on nVidia Tesla C2050, was more than thousandfold compared to ordinary CPU, resulting in drastic reduction of latency for some of the results, thus the cost of obtaining them.
[ { "version": "v1", "created": "Wed, 26 Jun 2013 10:14:37 GMT" } ]
2013-06-27T00:00:00
[ [ "Swierczewski", "Lukasz", "" ] ]
new_dataset
0.996779
1306.6056
Aria Nosratinia
Thuy Van Nguyen, Aria Nosratinia, and Dariush Divsalar
Rate-Compatible Protograph-based LDPC Codes for Inter-Symbol Interference Channels
4 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter produces a family of rate-compatible protograph-based LDPC codes approaching the independent and uniformly distributed (i.u.d.) capacity of inter-symbol interference (ISI) channels. This problem is highly nontrivial due to the joint design of structured (protograph-based) LDPC codes and the state structure of ISI channels. We describe a method to design nested high-rate protograph codes by adding variable nodes to the protograph of a lower rate code. We then design a family of rate-compatible protograph codes using the extension method. The resulting protograph codes have iterative decoding thresholds close to the i.u.d. capacity. Our results are supported by numerical simulations.
[ { "version": "v1", "created": "Tue, 25 Jun 2013 18:36:32 GMT" } ]
2013-06-26T00:00:00
[ [ "Van Nguyen", "Thuy", "" ], [ "Nosratinia", "Aria", "" ], [ "Divsalar", "Dariush", "" ] ]
new_dataset
0.987332
1212.3746
Greg Steinbrecher
Greg Steinbrecher
Cross-Layer Design to Maintain Earthquake Sensor Network Connectivity After Loss of Infrastructure
To be published in MILCOM 2012 - Track 2: Networking Protocols and Performance
null
10.1109/MILCOM.2012.6415858
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the design of a cross-layer protocol to maintain connectivity in an earthquake monitoring and early warning sensor network in the absence of communications infrastructure. Such systems, by design, warn of events that severely damage or destroy communications infrastructure. However, the data they provide is of critical importance to emergency and rescue decision making in the immediate aftermath of such events, as is continued early warning of aftershocks, tsunamis, or other subsequent dangers. Utilizing a beyond line-of-sight (BLOS) HF physical layer, we propose an adaptable cross-layer network design that meets these specialized requirements. We are able to provide ultra high connectivity (UHC) early warning on strict time deadlines under worst-case channel conditions along with providing sufficient capacity for continued seismic data collection from a 1000 sensor network.
[ { "version": "v1", "created": "Sun, 16 Dec 2012 03:11:59 GMT" } ]
2013-06-25T00:00:00
[ [ "Steinbrecher", "Greg", "" ] ]
new_dataset
0.99492
1302.0320
Xingqin Lin
Xingqin Lin and Harish Viswanathan
Dynamic Spectrum Refarming with Overlay for Legacy Devices
12 pages, 14 figures, submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The explosive growth in data traffic is resulting in a spectrum crunch forcing many wireless network operators to look towards refarming their 2G spectrum and deploy more spectrally efficient Long Term Evolution (LTE) technology. However, mobile network operators face a challenge when it comes to spectrum refarming because 2G technologies such as Global System for Mobile (GSM) is still widely used for low bandwidth machine-to-machine (M2M) devices. M2M devices typically have long life cycles, e.g. smart meters, and it is expensive to migrate these devices to newer technology since a truck roll will typically be required to the site where a device is deployed. Furthermore, with cost of 2G modules several times less than that of LTE, even newly deployed M2M devices tend to adopt 2G technology. Nevertheless, operators are keen to either force their 2G M2M customers to migrate so that they can refarm the spectrum or set aside a portion of the 2G spectrum for continuing operating 2G and only refarm the rest for LTE. In this paper we propose a novel solution to provide GSM connectivity within an LTE carrier through an efficient overlay by reserving a few physical resource blocks for GSM. With this approach, operators can refarm their 2G spectrum to LTE efficiently while still providing some GSM connectivity to their low data rate M2M customers. Furthermore, spectrum can be dynamically shared between LTE and GSM. An approach similar to that proposed in this paper can also be applied for other narrow band technology overlays over LTE.
[ { "version": "v1", "created": "Sat, 2 Feb 2013 00:16:17 GMT" }, { "version": "v2", "created": "Sat, 22 Jun 2013 04:14:01 GMT" } ]
2013-06-25T00:00:00
[ [ "Lin", "Xingqin", "" ], [ "Viswanathan", "Harish", "" ] ]
new_dataset
0.996152
1305.0069
Martin Fink
Martin Fink and Sergey Pupyrev
Ordering Metro Lines by Block Crossings
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A problem that arises in drawings of transportation networks is to minimize the number of crossings between different transportation lines. While this can be done efficiently under specific constraints, not all solutions are visually equivalent. We suggest merging crossings into block crossings, that is, crossings of two neighboring groups of consecutive lines. Unfortunately, minimizing the total number of block crossings is NP-hard even for very simple graphs. We give approximation algorithms for special classes of graphs and an asymptotically worst-case optimal algorithm for block crossings on general graphs. That is, we bound the number of block crossings that our algorithm needs and construct worst-case instances on which the number of block crossings that is necessary in any solution is asymptotically the same as our bound.
[ { "version": "v1", "created": "Wed, 1 May 2013 02:14:19 GMT" }, { "version": "v2", "created": "Sat, 22 Jun 2013 13:22:52 GMT" } ]
2013-06-25T00:00:00
[ [ "Fink", "Martin", "" ], [ "Pupyrev", "Sergey", "" ] ]
new_dataset
0.997623
1306.5229
Shuang Tian
Shuang Tian, Yonghui Li, Mahyar Shirvanimoghaddam and Branka Vucetic
A Physical-layer Rateless Code for Wireless Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a physical-layer rateless code for wireless channels. A novel rateless encoding scheme is developed to overcome the high error floor problem caused by the low-density generator matrix (LDGM)-like encoding scheme in conventional rateless codes. This is achieved by providing each symbol with approximately equal protection in the encoding process. An extrinsic information transfer (EXIT) chart based optimization approach is proposed to obtain a robust check node degree distribution, which can achieve near-capacity performances for a wide range of signal to noise ratios (SNR). Simulation results show that, under the same channel conditions and transmission overheads, the bit-error-rate (BER) performance of the proposed scheme considerably outperforms the existing rateless codes in additive white Gaussian noise (AWGN) channels, particularly at low BER regions.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 01:18:08 GMT" } ]
2013-06-25T00:00:00
[ [ "Tian", "Shuang", "" ], [ "Li", "Yonghui", "" ], [ "Shirvanimoghaddam", "Mahyar", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.987957
1306.5263
Haonan Yu
Haonan Yu, Jeffrey Mark Siskind
Discriminative Training: Learning to Describe Video with Sentences, from Video Described with Sentences
null
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method for learning word meanings from complex and realistic video clips by discriminatively training (DT) positive sentential labels against negative ones, and then use the trained word models to generate sentential descriptions for new video. This new work is inspired by recent work which adopts a maximum likelihood (ML) framework to address the same problem using only positive sentential labels. The new method, like the ML-based one, is able to automatically determine which words in the sentence correspond to which concepts in the video (i.e., ground words to meanings) in a weakly supervised fashion. While both DT and ML yield comparable results with sufficient training data, DT outperforms ML significantly with smaller training sets because it can exploit negative training labels to better constrain the learning problem.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 22:09:36 GMT" } ]
2013-06-25T00:00:00
[ [ "Yu", "Haonan", "" ], [ "Siskind", "Jeffrey Mark", "" ] ]
new_dataset
0.957127
1306.5277
Chengju Li
Chengju Li and Qin Yue
Weight distribution of two classes of cyclic codes with respect to two distinct order elements
null
null
null
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Cyclic codes have been studied for many years, but their weight distribution are known only for a few cases. In this paper, let $\Bbb F_r$ be an extension of a finite field $\Bbb F_q$ and $r=q^m$, we determine the weight distribution of the cyclic codes $\mathcal C=\{c(a, b): a, b \in \Bbb F_r\},$ $$c(a, b)=(\mbox {Tr}_{r/q}(ag_1^0+bg_2^0), \ldots, \mbox {Tr}_{r/q}(ag_1^{n-1}+bg_2^{n-1})), g_1, g_2\in \Bbb F_r,$$ in the following two cases: (1) $\ord(g_1)=n, n|r-1$ and $g_2=1$; (2) $\ord(g_1)=n$, $g_2=g_1^2$, $\ord(g_2)=\frac n 2$, $m=2$ and $\frac{2(r-1)}n|(q+1)$.
[ { "version": "v1", "created": "Sat, 22 Jun 2013 00:23:36 GMT" } ]
2013-06-25T00:00:00
[ [ "Li", "Chengju", "" ], [ "Yue", "Qin", "" ] ]
new_dataset
0.96507
1306.5305
Gabor Fodor
Gabor Fodor, Marco Belleschi, Demia D. Penda, Aidilla Pradini, Mikael Johansson, Andrea Abrardo
Benchmarking Practical RRM Algorithms for D2D Communications in LTE Advanced
30 pages, submitted for review April-2013. See also: G. Fodor, M. Johansson, D. P. Demia, B. Marco, and A. Abrardo, A joint power control and resource allocation algorithm for D2D communications, KTH, Automatic Control, Tech. Rep., 2012, qC 20120910, http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102057
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Device-to-device (D2D) communication integrated into cellular networks is a means to take advantage of the proximity of devices and allow for reusing cellular resources and thereby to increase the user bitrates and the system capacity. However, when D2D (in the 3rd Generation Partnership Project also called Long Term Evolution (LTE) Direct) communication in cellular spectrum is supported, there is a need to revisit and modify the existing radio resource management (RRM) and power control (PC) techniques to realize the potential of the proximity and reuse gains and to limit the interference at the cellular layer. In this paper, we examine the performance of the flexible LTE PC tool box and benchmark it against a utility optimal iterative scheme. We find that the open loop PC scheme of LTE performs well for cellular users both in terms of the used transmit power levels and the achieved signal-to-interference-and-noise-ratio (SINR) distribution. However, the performance of the D2D users as well as the overall system throughput can be boosted by the utility optimal scheme, because the utility maximizing scheme takes better advantage of both the proximity and the reuse gains. Therefore, in this paper we propose a hybrid PC scheme, in which cellular users employ the open loop path compensation method of LTE, while D2D users use the utility optimizing distributed PC scheme. In order to protect the cellular layer, the hybrid scheme allows for limiting the interference caused by the D2D layer at the cost of having a small impact on the performance of the D2D layer. To ensure feasibility, we limit the number of iterations to a practically feasible level. We make the point that the hybrid scheme is not only near optimal, but it also allows for a distributed implementation for the D2D users, while preserving the LTE PC scheme for the cellular users.
[ { "version": "v1", "created": "Sat, 22 Jun 2013 10:20:45 GMT" } ]
2013-06-25T00:00:00
[ [ "Fodor", "Gabor", "" ], [ "Belleschi", "Marco", "" ], [ "Penda", "Demia D.", "" ], [ "Pradini", "Aidilla", "" ], [ "Johansson", "Mikael", "" ], [ "Abrardo", "Andrea", "" ] ]
new_dataset
0.965255
1306.5381
Romin Parekh
Sumita Nainan, Romin Parekh and Tanvi Shah
RFID Technology Based Attendance Management System
6 pages, 8 figures, 2 tables
International Journal of Computer Science Issues bearing paper ID 'IJCSI-2013-10-1-4801' was published in IJCSI Volume 10, Issue 1, January 2013
null
null
cs.ET
http://creativecommons.org/licenses/by-nc-sa/3.0/
RFID is a nascent technology, deeply rooted by its early developments in using radar1 as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas. Industry specific key applications of this technology include vehicle tracking, automated inventory management, animal monitoring, secure store checkouts, supply chain management, automatic payment, sport timing technologies, etc. This paper introduces the distinctive components of RFID technology and focuses on its core competencies: scalability and security. It will be then supplemented by a detailed synopsis of an investigation conducted to test the feasibility and practicality of RFID technology.
[ { "version": "v1", "created": "Sun, 23 Jun 2013 07:14:33 GMT" } ]
2013-06-25T00:00:00
[ [ "Nainan", "Sumita", "" ], [ "Parekh", "Romin", "" ], [ "Shah", "Tanvi", "" ] ]
new_dataset
0.955265
1306.5391
Anna Harutyunyan
Glencora Borradaile and Anna Harutyunyan
Boundary-to-boundary flows in planar graphs
In Proc. IWOCA, 2013
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an iterative algorithm for finding the maximum flow between a set of sources and sinks that lie on the boundary of a planar graph. Our algorithm uses only O(n) queries to simple data structures, achieving an O(n log n) running time that we expect to be practical given the use of simple primitives. The only existing algorithm for this problem uses divide and conquer and, in order to achieve an O(n log n) running time, requires the use of the (complicated) linear-time shortest-paths algorithm for planar graphs.
[ { "version": "v1", "created": "Sun, 23 Jun 2013 09:45:51 GMT" } ]
2013-06-25T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Harutyunyan", "Anna", "" ] ]
new_dataset
0.993494
1306.5412
Rahul Chhabra Mr
Sajai Vir Singh, Gungan Gupta, Rahul Chhabra, Kanika Nagpal, Devansh
Electronically Tunable Voltage-Mode Biquad Filter/Oscillator Based On CCCCTAs
5 pages, 7 figures, 1 table, Authors profile
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a circuit employing current controlled current conveyor trans-conductance amplifiers (CCCCTAs) as active element is proposed which can function both as biquad filter and oscillator. It uses two CCCCTAs and two capacitors. As a biquad filter it can realizes all the standard filtering functions (low pass, band pass, high pass, band reject and all pass) in voltage-mode and provides the feature of electronically and orthogonal control of pole frequency and quality factor through biasing current(s) of CCCCTAs. The proposed circuit can also be worked as oscillator without changing the circuit topology. Without any resistors and using capacitors, the proposed circuit is suitable for IC fabrication. The validity of proposed filter is verified through PSPICE simulations.
[ { "version": "v1", "created": "Sun, 23 Jun 2013 14:11:45 GMT" } ]
2013-06-25T00:00:00
[ [ "Singh", "Sajai Vir", "" ], [ "Gupta", "Gungan", "" ], [ "Chhabra", "Rahul", "" ], [ "Nagpal", "Kanika", "" ], [ "Devansh", "", "" ] ]
new_dataset
0.996077
1306.5473
Emilio Ferrara
Michael D. Conover, Clayton Davis, Emilio Ferrara, Karissa McKelvey, Filippo Menczer, Alessandro Flammini
The Geospatial Characteristics of a Social Movement Communication Network
Open access available at: http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0064679
PLoS ONE 8(3):e55957 2013
10.1371/journal.pone.0055957
null
cs.CY cs.SI physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social movements rely in large measure on networked communication technologies to organize and disseminate information relating to the movements' objectives. In this work we seek to understand how the goals and needs of a protest movement are reflected in the geographic patterns of its communication network, and how these patterns differ from those of stable political communication. To this end, we examine an online communication network reconstructed from over 600,000 tweets from a thirty-six week period covering the birth and maturation of the American anticapitalist movement, Occupy Wall Street. We find that, compared to a network of stable domestic political communication, the Occupy Wall Street network exhibits higher levels of locality and a hub and spoke structure, in which the majority of non-local attention is allocated to high-profile locations such as New York, California, and Washington D.C. Moreover, we observe that information flows across state boundaries are more likely to contain framing language and references to the media, while communication among individuals in the same state is more likely to reference protest action and specific places and and times. Tying these results to social movement theory, we propose that these features reflect the movement's efforts to mobilize resources at the local level and to develop narrative frames that reinforce collective purpose at the national level.
[ { "version": "v1", "created": "Sun, 23 Jun 2013 21:31:16 GMT" } ]
2013-06-25T00:00:00
[ [ "Conover", "Michael D.", "" ], [ "Davis", "Clayton", "" ], [ "Ferrara", "Emilio", "" ], [ "McKelvey", "Karissa", "" ], [ "Menczer", "Filippo", "" ], [ "Flammini", "Alessandro", "" ] ]
new_dataset
0.970668
1306.5507
Pallab Dutta Mr
Pallab Dutta
Java Card for PayTv Application
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart cards are widely used along with PayTV receivers to store secret user keys and to perform security functions to prevent any unauthorized viewing of PayTV channels. Java Card technology enables programs written in the Java programming language to run on smart cards. Smart cards represent one of the smallest computing platforms in use today. The memory configuration of a smart card are of the order of 4K of RAM, 72K of EEPROM, and 24K of ROM. Using Java card provides advantages to the industry in terms of ease of coding, faster time to market and faster upgrades as compared to plain smart cards . Also different applications like payTV, e-commerce, health-card can easily be implemented in a single java card as multiple applets corresponding to each application can coexists in a single java card. But there are security concerns in java cards and also the performance issues. In this paper, we analyse the suitability of using Java card for PayTV applications as part of conditional access system in place of plain smart cards.
[ { "version": "v1", "created": "Mon, 24 Jun 2013 04:01:52 GMT" } ]
2013-06-25T00:00:00
[ [ "Dutta", "Pallab", "" ] ]
new_dataset
0.995196
1305.6817
Ashish Jain
Ashish Jain and Narendra S. Chaudhari
Two Trivial Attacks on A5/1:A GSM Stream Cipher
This paper has been withdrawn by the author due to final version is submitted in journal
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stream ciphers play an important role in those applications where high throughput remains critical and resources are very restricted e.g. in Europe and North America, A5/1 is widely used stream cipher that ensure confidentiality of conversations in GSM mobile phones. However careful security analysis of such cipher is very important due to widespread practical applicability. The basic building blocks used in the design of A5/1 are linear feedback shift registers (LFSRs). Algebraic attacks are new and very powerful tool to cryptanalyse LFSRs based stream ciphers even non-linear combiner are concerned. In this paper we compared previous attacks on A5/1 as well as an algebraic attack and a new improved guess and determine attack is proposed.
[ { "version": "v1", "created": "Thu, 25 Apr 2013 10:18:17 GMT" }, { "version": "v2", "created": "Thu, 20 Jun 2013 12:20:51 GMT" }, { "version": "v3", "created": "Fri, 21 Jun 2013 06:33:41 GMT" } ]
2013-06-24T00:00:00
[ [ "Jain", "Ashish", "" ], [ "Chaudhari", "Narendra S.", "" ] ]
new_dataset
0.998766
1306.5081
Birgit Vogtenhuber
Oswin Aichholzer, Thomas Hackl, Alexander Pilz, Pedro A. Ramos, Vera Sacrist\'an, Birgit Vogtenhuber
Empty triangles in good drawings of the complete graph
null
null
null
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A good drawing of a simple graph is a drawing on the sphere or, equivalently, in the plane in which vertices are drawn as distinct points, edges are drawn as Jordan arcs connecting their end vertices, and any pair of edges intersects at most once. In any good drawing, the edges of three pairwise connected vertices form a Jordan curve which we call a triangle. We say that a triangle is empty if one of the two connected components it induces does not contain any of the remaining vertices of the drawing of the graph. We show that the number of empty triangles in any good drawing of the complete graph $K_n$ with $n$ vertices is at least $n$.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 09:28:16 GMT" } ]
2013-06-24T00:00:00
[ [ "Aichholzer", "Oswin", "" ], [ "Hackl", "Thomas", "" ], [ "Pilz", "Alexander", "" ], [ "Ramos", "Pedro A.", "" ], [ "Sacristán", "Vera", "" ], [ "Vogtenhuber", "Birgit", "" ] ]
new_dataset
0.999625
1306.5151
Andrea Vedaldi
Subhransu Maji and Esa Rahtu and Juho Kannala and Matthew Blaschko and Andrea Vedaldi
Fine-Grained Visual Classification of Aircraft
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces FGVC-Aircraft, a new dataset containing 10,000 images of aircraft spanning 100 aircraft models, organised in a three-level hierarchy. At the finer level, differences between models are often subtle but always visually measurable, making visual recognition challenging but possible. A benchmark is obtained by defining corresponding classification tasks and evaluation protocols, and baseline results are presented. The construction of this dataset was made possible by the work of aircraft enthusiasts, a strategy that can extend to the study of number of other object classes. Compared to the domains usually considered in fine-grained visual classification (FGVC), for example animals, aircraft are rigid and hence less deformable. They, however, present other interesting modes of variation, including purpose, size, designation, structure, historical style, and branding.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 14:31:57 GMT" } ]
2013-06-24T00:00:00
[ [ "Maji", "Subhransu", "" ], [ "Rahtu", "Esa", "" ], [ "Kannala", "Juho", "" ], [ "Blaschko", "Matthew", "" ], [ "Vedaldi", "Andrea", "" ] ]
new_dataset
0.999767
1306.5156
Nadim Kobeissi
Nadim Kobeissi and Arlo Breault
Cryptocat: Adopting Accessibility and Ease of Use as Security Properties
Working Draft
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cryptocat is a Free and Open Source Software (FL/OSS) browser extension that makes use of web technologies in order to provide easy to use, accessible, encrypted instant messaging to the general public. We aim to investigate how to best leverage the accessibility and portability offered by web technologies in order to allow encrypted instant messaging an opportunity to better permeate on a social level. We have found that encrypted communications, while in many cases technically well-implemented, suffer from a lack of usage due to their being unappealing and inaccessible to the "average end-user". Our position is that accessibility and ease of use must be treated as security properties. Even if a cryptographic system is technically highly qualified, securing user privacy is not achieved without addressing the problem of accessibility. Our goal is to investigate the feasibility of implementing cryptographic systems in highly accessible mediums, and to address the technical and social challenges of making encrypted instant messaging accessible and portable.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 14:42:55 GMT" } ]
2013-06-24T00:00:00
[ [ "Kobeissi", "Nadim", "" ], [ "Breault", "Arlo", "" ] ]
new_dataset
0.998566
1301.5412
Teruyoshi Washizawa
Yuichiro Miki, Teruyoshi Washizawa
A2ILU: Auto-accelerated ILU Preconditioner for Sparse Linear Systems
21 pages, 14 figures
SIAM Journal on Scientific Computing, Vol.35, No.2, pp.1212-1232, 2013
10.1137/110842685
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ILU-based preconditioning methods in previous work have their own parameters to improve their performances. Although the parameters may degrade the performance, their determination is left to users. Thus, these previous methods are not reliable in practical computer-aided engineering use. This paper proposes a novel ILU-based preconditioner called the auto-accelerated ILU, or A2ILU. In order to improve the convergence, A2ILU introduces acceleration parameters which modify the ILU factorized preconditioning matrix. A$^2$ILU needs no more operations than the original ILU because the acceleration parameters are optimized automatically by A2ILU itself. Numerical tests reveal the performance of A2ILU is superior to previous ILU-based methods with manually optimized parameters. The numerical tests also demonstrate the ability to apply auto-acceleration to ILU-based methods to improve their performances and robustness of parameter sensitivities.
[ { "version": "v1", "created": "Wed, 23 Jan 2013 06:34:44 GMT" }, { "version": "v2", "created": "Wed, 19 Jun 2013 22:43:39 GMT" } ]
2013-06-21T00:00:00
[ [ "Miki", "Yuichiro", "" ], [ "Washizawa", "Teruyoshi", "" ] ]
new_dataset
0.997091
1306.4353
Ashok Rajaraman
Cedric Chauve, Murray Patterson, Ashok Rajaraman
Hypergraph covering problems motivated by genome assembly questions
13 pages+3 page appendix
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Consecutive-Ones Property (C1P) is a classical concept in discrete mathematics that has been used in several genomics applications, from physical mapping of contemporary genomes to the assembly of ancient genomes. A common issue in genome assembly concerns repeats, genomic sequences that appear in several locations of a genome. Handling repeats leads to a variant of the C1P, the C1P with multiplicity (mC1P), that can also be seen as the problem of covering edges of hypergraphs by linear and circular walks. In the present work, we describe variants of the mC1P that address specific issues of genome assembly, and polynomial time or fixed-parameter algorithms to solve them.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 21:01:08 GMT" }, { "version": "v2", "created": "Thu, 20 Jun 2013 19:23:01 GMT" } ]
2013-06-21T00:00:00
[ [ "Chauve", "Cedric", "" ], [ "Patterson", "Murray", "" ], [ "Rajaraman", "Ashok", "" ] ]
new_dataset
0.97186
1306.4746
Daniel Barrett
Daniel Paul Barrett and Jeffrey Mark Siskind
Felzenszwalb-Baum-Welch: Event Detection by Changing Appearance
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method which can detect events in videos by modeling the change in appearance of the event participants over time. This method makes it possible to detect events which are characterized not by motion, but by the changing state of the people or objects involved. This is accomplished by using object detectors as output models for the states of a hidden Markov model (HMM). The method allows an HMM to model the sequence of poses of the event participants over time, and is effective for poses of humans and inanimate objects. The ability to use existing object-detection methods as part of an event model makes it possible to leverage ongoing work in the object-detection community. A novel training method uses an EM loop to simultaneously learn the temporal structure and object models automatically, without the need to specify either the individual poses to be modeled or the frames in which they occur. The E-step estimates the latent assignment of video frames to HMM states, while the M-step estimates both the HMM transition probabilities and state output models, including the object detectors, which are trained on the weighted subset of frames assigned to their state. A new dataset was gathered because little work has been done on events characterized by changing object pose, and suitable datasets are not available. Our method produced results superior to that of comparison systems on this dataset.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 03:22:19 GMT" } ]
2013-06-21T00:00:00
[ [ "Barrett", "Daniel Paul", "" ], [ "Siskind", "Jeffrey Mark", "" ] ]
new_dataset
0.998314
1306.4883
Abderrahmen Bouguerra .
Abderrahmen Bouguerra, Djamel Saigaa, Kamel Kara, Samir Zeghlache, Keltoum Loukal
Fault-Tolerant Control of a 2 DOF Helicopter (TRMS System) Based on H_infinity
6 pages, 11 figures, conference. In CEIT 2013
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a Fault-Tolerant control of 2 DOF Helicopter (TRMS System) Based on H-infinity is presented. In particular, the introductory part of the paper presents a Fault-Tolerant Control (FTC), the first part of this paper presents a description of the mathematical model of TRMS, and the last part of the paper presented and a polytypic Unknown Input Observer (UIO) is synthesized using equalities and LMIs. This UIO is used to observe the faults and then compensate them, in this part the shown how to design a fault-tolerant control strategy for this particular class of non-linear systems.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 14:10:47 GMT" } ]
2013-06-21T00:00:00
[ [ "Bouguerra", "Abderrahmen", "" ], [ "Saigaa", "Djamel", "" ], [ "Kara", "Kamel", "" ], [ "Zeghlache", "Samir", "" ], [ "Loukal", "Keltoum", "" ] ]
new_dataset
0.997805
1306.4884
Matias Korman
Jean Cardinal, S\'ebastien Collette, Hiro Ito, Matias Korman, Stefan Langerman, Hikaru Sakaidani, Perouz Taslakian
Cannibal Animal Games: a new variant of Tic-Tac-Toe
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new partial two-player game, called the \emph{cannibal animal game}, which is a variant of Tic-Tac-Toe. The game is played on the infinite grid, where in each round a player chooses and occupies free cells. The first player Alice can occupy a cell in each turn and wins if she occupies a set of cells, the union of a subset of which is a translated, reflected and/or rotated copy of a previously agreed upon polyomino $P$ (called an \emph{animal}). The objective of the second player Bob is to prevent Alice from creating her animal by occupying in each round a translated, reflected and/or rotated copy of $P$. An animal is a \emph{cannibal} if Bob has a winning strategy, and a \emph{non-cannibal} otherwise. This paper presents some new tools, such as the \emph{bounding strategy} and the \emph{punching lemma}, to classify animals into cannibals or non-cannibals. We also show that the \emph{pairing strategy} works for this problem.
[ { "version": "v1", "created": "Thu, 20 Jun 2013 14:14:04 GMT" } ]
2013-06-21T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Collette", "Sébastien", "" ], [ "Ito", "Hiro", "" ], [ "Korman", "Matias", "" ], [ "Langerman", "Stefan", "" ], [ "Sakaidani", "Hikaru", "" ], [ "Taslakian", "Perouz", "" ] ]
new_dataset
0.999743
0906.2888
Bruno Salvy
Alexandre Benoit (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt)
Chebyshev Expansions for Solutions of Linear Differential Equations
null
ISSAC'09 (2009)
10.1145/1576702.1576709
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Chebyshev expansion is a series in the basis of Chebyshev polynomials of the first kind. When such a series solves a linear differential equation, its coefficients satisfy a linear recurrence equation. We interpret this equation as the numerator of a fraction of linear recurrence operators. This interpretation lets us give a simple view of previous algorithms, analyze their complexity, and design a faster one for large orders.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 10:21:01 GMT" } ]
2013-06-19T00:00:00
[ [ "Benoit", "Alexandre", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.957684
0907.0291
Bruno Salvy
Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Khang Tran
Generating functions of Chebyshev-like polynomials
null
null
10.1142/S1793042110003691
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short note, we give simple proofs of several results and conjectures formulated by Stolarsky and Tran concerning generating functions of some families of Chebyshev-like polynomials.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 06:29:52 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2009 08:08:48 GMT" }, { "version": "v3", "created": "Wed, 25 Nov 2009 20:02:00 GMT" } ]
2013-06-19T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Tran", "Khang", "" ] ]
new_dataset
0.999018
1306.3260
Georg Zetzsche
P. Buckheister and Georg Zetzsche
Semilinearity and Context-Freeness of Languages Accepted by Valence Automata
Long version of a paper accepted for MFCS 2013. Corrected typos and improved readability, results unchanged
null
null
null
cs.FL math.GR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Valence automata are a generalization of various models of automata with storage. Here, each edge carries, in addition to an input word, an element of a monoid. A computation is considered valid if multiplying the monoid elements on the visited edges yields the identity element. By choosing suitable monoids, a variety of automata models can be obtained as special valence automata. This work is concerned with the accepting power of valence automata. Specifically, we ask for which monoids valence automata can accept only context-free languages or only languages with semilinear Parikh image, respectively. First, we present a characterization of those graph products (of monoids) for which valence automata accept only context-free languages. Second, we provide a necessary and sufficient condition for a graph product of copies of the bicyclic monoid and the integers to yield only languages with semilinear Parikh image when used as a storage mechanism in valence automata. Third, we show that all languages accepted by valence automata over torsion groups have a semilinear Parikh image.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 21:29:06 GMT" }, { "version": "v2", "created": "Tue, 18 Jun 2013 13:56:56 GMT" } ]
2013-06-19T00:00:00
[ [ "Buckheister", "P.", "" ], [ "Zetzsche", "Georg", "" ] ]
new_dataset
0.980683
1306.4071
Nitin Jagadish Mr
Nitin Jagadish, Manoj H., Nishanth K. Prasad and Sunil Kumar K. M
A Microcontroller Based Device to Reduce Phanthom Power
3 pages, 3 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we concern ourselves with the problem of minimizing the standby power consumption in some of the house hold appliances. Here we propose a remote controlled device through which we could reduce the amount of standby power consumed by the electrical appliances connected to it. This device provides an option of controlling each of the appliances connected to it individually or as a whole when required. The device has got number of plug points each of which could be controlled through the remote and also has a provision of switching off all the points at once.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 05:47:47 GMT" } ]
2013-06-19T00:00:00
[ [ "Jagadish", "Nitin", "" ], [ "H.", "Manoj", "" ], [ "Prasad", "Nishanth K.", "" ], [ "M", "Sunil Kumar K.", "" ] ]
new_dataset
0.990327
1306.4079
Zeng Jie
Zeng Jie
A Novel Block-DCT and PCA Based Image Perceptual Hashing Algorithm
7 pages, 5 figrues
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image perceptual hashing finds applications in content indexing, large-scale image database management, certification and authentication and digital watermarking. We propose a Block-DCT and PCA based image perceptual hash in this article and explore the algorithm in the application of tamper detection. The main idea of the algorithm is to integrate color histogram and DCT coefficients of image blocks as perceptual feature, then to compress perceptual features as inter-feature with PCA, and to threshold to create a robust hash. The robustness and discrimination properties of the proposed algorithm are evaluated in detail. Our algorithms first construct a secondary image, derived from input image by pseudo-randomly extracting features that approximately capture semi-global geometric characteristics. From the secondary image (which does not perceptually resemble the input), we further extract the final features which can be used as a hash value (and can be further suitably quantized). In this paper, we use spectral matrix invariants as embodied by Singular Value Decomposition. Surprisingly, formation of the secondary image turns out be quite important since it not only introduces further robustness, but also enhances the security properties. Indeed, our experiments reveal that our hashing algorithms extract most of the geometric information from the images and hence are robust to severe perturbations (e.g. up to %50 cropping by area with 20 degree rotations) on images while avoiding misclassification. Experimental results show that the proposed image perceptual hash algorithm can effectively address the tamper detection problem with advantageous robustness and discrimination.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 06:58:58 GMT" } ]
2013-06-19T00:00:00
[ [ "Jie", "Zeng", "" ] ]
new_dataset
0.994053
1306.4082
Sohail Abid Sohail Abid
Sohail Abid, Imran Shafi and Shahid Abid
Energy efficient routing in mobile ad-hoc networks for Healthcare Environments
9 pages, 12 figures, 3 tables, IJCSI Journal
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The modern and innovative medical applications based on wireless network are being developed in the commercial sectors as well as in research. The emerging wireless networks are rapidly becoming a fundamental part of medical solutions due to increasing accessibility for healthcare professionals/patients reducing healthcare costs. Discovering the routes among hosts that are energy efficient without compromise on smooth communication is desirable. This work investigates energy efficiency of some selected proactive and reactive routing protocols in wireless network for healthcare environments. After simulation and analysis we found that DSR is best energy efficient routing protocol among DSR, DSDV and AODV, because DSR has maximum remaining energy.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 07:10:11 GMT" } ]
2013-06-19T00:00:00
[ [ "Abid", "Sohail", "" ], [ "Shafi", "Imran", "" ], [ "Abid", "Shahid", "" ] ]
new_dataset
0.970064
1306.4263
Manuel Kauers
Manuel Kauers, Maximilian Jaroschek, Fredrik Johansson
Ore Polynomials in Sage
null
null
null
null
cs.SC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a Sage implementation of Ore algebras. The main features for the most common instances include basic arithmetic and actions; gcrd and lclm; D-finite closure properties; natural transformations between related algebras; guessing; desingularization; solvers for polynomials, rational functions and (generalized) power series. This paper is a tutorial on how to use the package.
[ { "version": "v1", "created": "Tue, 18 Jun 2013 16:34:18 GMT" } ]
2013-06-19T00:00:00
[ [ "Kauers", "Manuel", "" ], [ "Jaroschek", "Maximilian", "" ], [ "Johansson", "Fredrik", "" ] ]
new_dataset
0.973598
1306.3546
Jason Spencer
Jason Spencer
Cellular Automata in Cryptographic Random Generators
113 pgs, 67 pgs of Content, 6 figures, 9 algorithms
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cryptographic schemes using one-dimensional, three-neighbor cellular automata as a primitive have been put forth since at least 1985. Early results showed good statistical pseudorandomness, and the simplicity of their construction made them a natural candidate for use in cryptographic applications. Since those early days of cellular automata, research in the field of cryptography has developed a set of tools which allow designers to prove a particular scheme to be as hard as solving an instance of a well- studied problem, suggesting a level of security for the scheme. However, little or no literature is available on whether these cellular automata can be proved secure under even generous assumptions. In fact, much of the literature falls short of providing complete, testable schemes to allow such an analysis. In this thesis, we first examine the suitability of cellular automata as a primitive for building cryptographic primitives. In this effort, we focus on pseudorandom bit generation and noninvertibility, the behavioral heart of cryptography. In particular, we focus on cyclic linear and non-linear au- tomata in some of the common configurations to be found in the literature. We examine known attacks against these constructions and, in some cases, improve the results. Finding little evidence of provable security, we then examine whether the desirable properties of cellular automata (i.e. highly parallel, simple construction) can be maintained as the automata are enhanced to provide a foundation for such proofs. This investigation leads us to a new construction of a finite state cellular automaton (FSCA) which is NP-Hard to invert. Finally, we introduce the Chasm pseudorandom generator family built on this construction and provide some initial experimental results using the NIST test suite.
[ { "version": "v1", "created": "Sat, 15 Jun 2013 03:33:13 GMT" } ]
2013-06-18T00:00:00
[ [ "Spencer", "Jason", "" ] ]
new_dataset
0.994966
1306.3560
Carlo Ciliberto
Sean Ryan Fanello, Carlo Ciliberto, Matteo Santoro, Lorenzo Natale, Giorgio Metta, Lorenzo Rosasco, Francesca Odone
iCub World: Friendly Robots Help Building Good Vision Data-Sets
CVPR2013 Workshop: Ground Truth - What is a good dataset?. Portland, USA (June 28, 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present and start analyzing the iCub World data-set, an object recognition data-set, we acquired using a Human-Robot Interaction (HRI) scheme and the iCub humanoid robot platform. Our set up allows for rapid acquisition and annotation of data with corresponding ground truth. While more constrained in its scopes -- the iCub world is essentially a robotics research lab -- we demonstrate how the proposed data-set poses challenges to current recognition systems. The iCubWorld data-set is publicly available. The data-set can be downloaded from: http://www.iit.it/en/projects/data-sets.html.
[ { "version": "v1", "created": "Sat, 15 Jun 2013 09:27:17 GMT" } ]
2013-06-18T00:00:00
[ [ "Fanello", "Sean Ryan", "" ], [ "Ciliberto", "Carlo", "" ], [ "Santoro", "Matteo", "" ], [ "Natale", "Lorenzo", "" ], [ "Metta", "Giorgio", "" ], [ "Rosasco", "Lorenzo", "" ], [ "Odone", "Francesca", "" ] ]
new_dataset
0.987575
1306.3584
Nal Kalchbrenner
Nal Kalchbrenner, Phil Blunsom
Recurrent Convolutional Neural Networks for Discourse Compositionality
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The compositionality of meaning extends beyond the single sentence. Just as words combine to form the meaning of sentences, so do sentences combine to form the meaning of paragraphs, dialogues and general discourse. We introduce both a sentence model and a discourse model corresponding to the two levels of compositionality. The sentence model adopts convolution as the central operation for composing semantic vectors and is based on a novel hierarchical convolutional neural network. The discourse model extends the sentence model and is based on a recurrent neural network that is conditioned in a novel way both on the current sentence and on the current speaker. The discourse model is able to capture both the sequentiality of sentences and the interaction between different speakers. Without feature engineering or pretraining and with simple greedy decoding, the discourse model coupled to the sentence model obtains state of the art performance on a dialogue act classification experiment.
[ { "version": "v1", "created": "Sat, 15 Jun 2013 14:52:17 GMT" } ]
2013-06-18T00:00:00
[ [ "Kalchbrenner", "Nal", "" ], [ "Blunsom", "Phil", "" ] ]
new_dataset
0.973171
1306.3710
Jinyuan Chen
Jinyuan Chen and Petros Elia
Symmetric Two-User MIMO BC and IC with Evolving Feedback
This paper will be presented in part at SPAWC13
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extending recent findings on the two-user MISO broadcast channel (BC) with imperfect and delayed channel state information at the transmitter (CSIT), the work here explores the performance of the two user MIMO BC and the two user MIMO interference channel (MIMO IC), in the presence of feedback with evolving quality and timeliness. Under standard assumptions, and in the presence of M antennas per transmitter and N antennas per receiver, the work derives the DoF region, which is optimal for a large regime of sufficiently good (but potentially imperfect) delayed CSIT. This region concisely captures the effect of having predicted, current and delayed-CSIT, as well as concisely captures the effect of the quality of CSIT offered at any time, about any channel. In addition to the progress towards describing the limits of using such imperfect and delayed feedback in MIMO settings, the work offers different insights that include the fact that, an increasing number of receive antennas can allow for reduced quality feedback, as well as that no CSIT is needed for the direct links in the IC.
[ { "version": "v1", "created": "Sun, 16 Jun 2013 22:47:17 GMT" } ]
2013-06-18T00:00:00
[ [ "Chen", "Jinyuan", "" ], [ "Elia", "Petros", "" ] ]
new_dataset
0.996731
1306.3783
Andrea Scharnhorst
Richard Smiraglia, Andrea Scharnhorst, Almila Akdag Salah and Cheng Gao
UDC in Action
Accepted for the UDCC seminar 2013
null
null
null
cs.DL physics.soc-ph
http://creativecommons.org/licenses/by/3.0/
The UDC (Universal Decimal Classification) is not only a classification language with a long history; it also presents a complex cognitive system worthy of the attention of complexity theory. The elements of the UDC: classes, auxiliaries, and operations are combined into symbolic strings, which in essence represent a complex networks of concepts. This network forms a backbone of ordering of knowledge and at the same time allows expression of different perspectives on various products of human knowledge production. In this paper we look at UDC strings derived from the holdings of libraries. In particular we analyse the subject headings of holdings of the university library in Leuven, and an extraction of UDC numbers from the OCLC WorldCat. Comparing those sets with the Master Reference File, we look into the length of strings, the occurrence of different auxiliary signs, and the resulting connections between UDC classes. We apply methods and representations from complexity theory. Mapping out basic statistics on UDC classes as used in libraries from a point of view of complexity theory bears different benefits. Deploying its structure could serve as an overview and basic information for users among the nature and focus of specific collections. A closer view into combined UDC numbers reveals the complex nature of the UDC as an example for a knowledge ordering system, which deserves future exploration from a complexity theoretical perspective.
[ { "version": "v1", "created": "Mon, 17 Jun 2013 09:18:27 GMT" } ]
2013-06-18T00:00:00
[ [ "Smiraglia", "Richard", "" ], [ "Scharnhorst", "Andrea", "" ], [ "Salah", "Almila Akdag", "" ], [ "Gao", "Cheng", "" ] ]
new_dataset
0.999092
1111.3597
Thijs Laarhoven
Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger
Dynamic Tardos Traitor Tracing Schemes
13 pages, 5 figures
IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4230-4242, 2013
10.1109/TIT.2013.2251756
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance, a simple accusation method, and flexibility when the feedback from the pirate network is delayed.
[ { "version": "v1", "created": "Tue, 15 Nov 2011 17:55:33 GMT" }, { "version": "v2", "created": "Fri, 25 Jan 2013 23:10:36 GMT" } ]
2013-06-17T00:00:00
[ [ "Laarhoven", "Thijs", "" ], [ "Doumen", "Jeroen", "" ], [ "Roelse", "Peter", "" ], [ "Skoric", "Boris", "" ], [ "de Weger", "Benne", "" ] ]
new_dataset
0.953248
1204.4679
Pat Morin
Prosenjit Bose, Vida Dujmovic, Pat Morin, and Michiel Smid
Robust Geometric Spanners
18 pages, 8 figures
null
null
null
cs.CG cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Highly connected and yet sparse graphs (such as expanders or graphs of high treewidth) are fundamental, widely applicable and extensively studied combinatorial objects. We initiate the study of such highly connected graphs that are, in addition, geometric spanners. We define a property of spanners called robustness. Informally, when one removes a few vertices from a robust spanner, this harms only a small number of other vertices. We show that robust spanners must have a superlinear number of edges, even in one dimension. On the positive side, we give constructions, for any dimension, of robust spanners with a near-linear number of edges.
[ { "version": "v1", "created": "Fri, 20 Apr 2012 17:19:13 GMT" }, { "version": "v2", "created": "Fri, 14 Jun 2013 14:44:51 GMT" } ]
2013-06-17T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Dujmovic", "Vida", "" ], [ "Morin", "Pat", "" ], [ "Smid", "Michiel", "" ] ]
new_dataset
0.968739
1206.6541
Daniel Kane
Daniel M. Kane
A Low-Depth Monotone Function that is not an Approximate Junta
null
null
null
null
cs.DM
http://creativecommons.org/licenses/by/3.0/
We provide an example of a monotone Boolean function on the hypercube given by a low depth decision tree that is not well approximated by any k-junta for small k.
[ { "version": "v1", "created": "Wed, 27 Jun 2012 23:56:31 GMT" }, { "version": "v2", "created": "Fri, 14 Jun 2013 19:54:18 GMT" } ]
2013-06-17T00:00:00
[ [ "Kane", "Daniel M.", "" ] ]
new_dataset
0.971171
1306.3323
Zhong Fan
Zhong Fan, Russell J. Haines, and Parag Kulkarni
M2M Communications for E-Health and Smart Grid: An Industry and Standard Perspective
null
null
null
null
cs.CY cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An overview of several standardization activities for machine-to-machine (M2M) communications is presented, analyzing some of the enabling technologies and applications of M2M in industry sectors such as Smart Grid and e-Health. This summary and overview of the ongoing work in M2M from the industrial and standardization perspective complements the prevalent academic perspective of such publications to date in this field.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 08:07:30 GMT" } ]
2013-06-17T00:00:00
[ [ "Fan", "Zhong", "" ], [ "Haines", "Russell J.", "" ], [ "Kulkarni", "Parag", "" ] ]
new_dataset
0.997448
1306.3375
Raphael kena Poss
Raphael 'kena' Poss
The essence of component-based design and coordination
8 pages, 2 figures, 3 tables
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Is there a characteristic of coordination languages that makes them qualitatively different from general programming languages and deserves special academic attention? This report proposes a nuanced answer in three parts. The first part highlights that coordination languages are the means by which composite software applications can be specified using components that are only available separately, or later in time, via standard interfacing mechanisms. The second part highlights that most currently used languages provide mechanisms to use externally provided components, and thus exhibit some elements of coordination. However not all do, and the availability of an external interface thus forms an objective and qualitative criterion that distinguishes coordination. The third part argues that despite the qualitative difference, the segregation of academic attention away from general language design and implementation has non-obvious cost trade-offs.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 12:15:31 GMT" } ]
2013-06-17T00:00:00
[ [ "Poss", "Raphael 'kena'", "" ] ]
new_dataset
0.95629
1306.3456
Chih-Hong Cheng
Chih-Hong Cheng, Natarajan Shankar, Harald Ruess and Saddek Bensalem
EFSMT: A Logical Framework for Cyber-Physical Systems
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of cyber-physical systems is challenging in that it includes the analysis and synthesis of distributed and embedded real-time systems for controlling, often in a nonlinear way, the environment. We address this challenge with EFSMT, the exists-forall quantified first-order fragment of propositional combinations over constraints (including nonlinear arithmetic), as the logical framework and foundation for analyzing and synthesizing cyber-physical systems. We demonstrate the expressiveness of EFSMT by reducing a number of pivotal verification and synthesis problems to EFSMT. Exemplary problems in this paper include synthesis for robust control via BIBO stability, Lyapunov coefficient finding for nonlinear control systems, distributed priority synthesis for orchestrating system components, and synthesis for hybrid control systems. We are also proposing an algorithm for solving EFSMT problems based on the interplay between two SMT solvers for respectively solving universally and existentially quantified problems. This algorithms builds on commonly used techniques in modern SMT solvers, and generalizes them to quantifier reasoning by counterexample-guided constraint strengthening. The EFSMT solver uses Bernstein polynomials for solving nonlinear arithmetic constraints.
[ { "version": "v1", "created": "Fri, 14 Jun 2013 17:05:19 GMT" } ]
2013-06-17T00:00:00
[ [ "Cheng", "Chih-Hong", "" ], [ "Shankar", "Natarajan", "" ], [ "Ruess", "Harald", "" ], [ "Bensalem", "Saddek", "" ] ]
new_dataset
0.986272
1305.5228
Richard Mayr
Parosh Aziz Abdulla, Lorenzo Clemente, Richard Mayr, Sven Sandberg
Stochastic Parity Games on Lossy Channel Systems
19 pages
null
null
EDI-INF-RR-1416
cs.GT cs.LO
http://creativecommons.org/licenses/by/3.0/
We give an algorithm for solving stochastic parity games with almost-sure winning conditions on lossy channel systems, for the case where the players are restricted to finite-memory strategies. First, we describe a general framework, where we consider the class of 2.5-player games with almost-sure parity winning conditions on possibly infinite game graphs, assuming that the game contains a finite attractor. An attractor is a set of states (not necessarily absorbing) that is almost surely re-visited regardless of the players' decisions. We present a scheme that characterizes the set of winning states for each player. Then, we instantiate this scheme to obtain an algorithm for stochastic game lossy channel systems.
[ { "version": "v1", "created": "Wed, 22 May 2013 18:43:54 GMT" }, { "version": "v2", "created": "Thu, 13 Jun 2013 10:17:22 GMT" } ]
2013-06-14T00:00:00
[ [ "Abdulla", "Parosh Aziz", "" ], [ "Clemente", "Lorenzo", "" ], [ "Mayr", "Richard", "" ], [ "Sandberg", "Sven", "" ] ]
new_dataset
0.990523
1306.2978
Ignaz Rutter
Alexander Koch and Marcus Krug and Ignaz Rutter
Graphs with Plane Outside-Obstacle Representations
12 pages, 7 figures
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An \emph{obstacle representation} of a graph consists of a set of polygonal obstacles and a distinct point for each vertex such that two points see each other if and only if the corresponding vertices are adjacent. Obstacle representations are a recent generalization of classical polygon--vertex visibility graphs, for which the characterization and recognition problems are long-standing open questions. In this paper, we study \emph{plane outside-obstacle representations}, where all obstacles lie in the unbounded face of the representation and no two visibility segments cross. We give a combinatorial characterization of the biconnected graphs that admit such a representation. Based on this characterization, we present a simple linear-time recognition algorithm for these graphs. As a side result, we show that the plane vertex--polygon visibility graphs are exactly the maximal outerplanar graphs and that every chordal outerplanar graph has an outside-obstacle representation.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 21:10:53 GMT" } ]
2013-06-14T00:00:00
[ [ "Koch", "Alexander", "" ], [ "Krug", "Marcus", "" ], [ "Rutter", "Ignaz", "" ] ]
new_dataset
0.999315
1306.3036
Tara Hamilton
Saeed Afshar, Gregory Cohen, Runchun Wang, Andre van Schaik, Jonathan Tapson, Torsten Lehmann, Tara Julia Hamilton
The Ripple Pond: Enabling Spiking Networks to See
Submitted to Frontiers in Neuromorphic Engineering (June 12, 2013)
null
null
null
cs.NE q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the biologically inspired Ripple Pond Network (RPN), a simply connected spiking neural network that, operating together with recently proposed PolyChronous Networks (PCN), enables rapid, unsupervised, scale and rotation invariant object recognition using efficient spatio-temporal spike coding. The RPN has been developed as a hardware solution linking previously implemented neuromorphic vision and memory structures capable of delivering end-to-end high-speed, low-power and low-resolution recognition for mobile and autonomous applications where slow, highly sophisticated and power hungry signal processing solutions are ineffective. Key aspects in the proposed approach include utilising the spatial properties of physically embedded neural networks and propagating waves of activity therein for information processing, using dimensional collapse of imagery information into amenable temporal patterns and the use of asynchronous frames for information binding.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 06:49:35 GMT" } ]
2013-06-14T00:00:00
[ [ "Afshar", "Saeed", "" ], [ "Cohen", "Gregory", "" ], [ "Wang", "Runchun", "" ], [ "van Schaik", "Andre", "" ], [ "Tapson", "Jonathan", "" ], [ "Lehmann", "Torsten", "" ], [ "Hamilton", "Tara Julia", "" ] ]
new_dataset
0.990846
1306.3111
Matthew Fickus
John Jasper, Dustin G. Mixon, Matthew Fickus
Kirkman Equiangular Tight Frames and Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An equiangular tight frame (ETF) is a set of unit vectors in a Euclidean space whose coherence is as small as possible, equaling the Welch bound. Also known as Welch-bound-equality sequences, such frames arise in various applications, such as waveform design and compressed sensing. At the moment, there are only two known flexible methods for constructing ETFs: harmonic ETFs are formed by carefully extracting rows from a discrete Fourier transform; Steiner ETFs arise from a tensor-like combination of a combinatorial design and a regular simplex. These two classes seem very different: the vectors in harmonic ETFs have constant amplitude, whereas Steiner ETFs are extremely sparse. We show that they are actually intimately connected: a large class of Steiner ETFs can be unitarily transformed into constant-amplitude frames, dubbed Kirkman ETFs. Moreover, we show that an important class of harmonic ETFs is a subset of an important class of Kirkman ETFs. This connection informs the discussion of both types of frames: some Steiner ETFs can be transformed into constant-amplitude waveforms making them more useful in waveform design; some harmonic ETFs have low spark, making them less desirable for compressed sensing. We conclude by showing that real-valued constant-amplitude ETFs are equivalent to binary codes that achieve the Grey-Rankin bound, and then construct such codes using Kirkman ETFs.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 14:06:19 GMT" } ]
2013-06-14T00:00:00
[ [ "Jasper", "John", "" ], [ "Mixon", "Dustin G.", "" ], [ "Fickus", "Matthew", "" ] ]
new_dataset
0.998854
1306.3199
Florian Rabe
Florian Rabe
The MMT API: A Generic MKM System
Conferences on Intelligent Computer Mathematics (CICM) 2013 The final publication is available at http://link.springer.com/
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MMT language has been developed as a scalable representation and interchange language for formal mathematical knowledge. It permits natural representations of the syntax and semantics of virtually all declarative languages while making MMT-based MKM services easy to implement. It is foundationally unconstrained and can be instantiated with specific formal languages. The MMT API implements the MMT language along with multiple backends for persistent storage and frontends for machine and user access. Moreover, it implements a wide variety of MMT-based knowledge management services. The API and all services are generic and can be applied to any language represented in MMT. A plugin interface permits injecting syntactic and semantic idiosyncrasies of individual formal languages.
[ { "version": "v1", "created": "Thu, 13 Jun 2013 19:10:24 GMT" } ]
2013-06-14T00:00:00
[ [ "Rabe", "Florian", "" ] ]
new_dataset
0.999078
1306.2863
Jun Sun
Jun Sun, Xiaojun Wu, Vasile Palade, Wei Fang, Yuhui Shi
Random Drift Particle Swarm Optimization
The paper is the work in progress on particle swarm optimization. It has 41 pages and 7 figures
null
null
null
cs.AI cs.NE math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The random drift particle swarm optimization (RDPSO) algorithm, inspired by the free electron model in metal conductors placed in an external electric field, is presented, systematically analyzed and empirically studied in this paper. The free electron model considers that electrons have both a thermal and a drift motion in a conductor that is placed in an external electric field. The motivation of the RDPSO algorithm is described first, and the velocity equation of the particle is designed by simulating the thermal motion as well as the drift motion of the electrons, both of which lead the electrons to a location with minimum potential energy in the external electric field. Then, a comprehensive analysis of the algorithm is made, in order to provide a deep insight into how the RDPSO algorithm works. It involves a theoretical analysis and the simulation of the stochastic dynamical behavior of a single particle in the RDPSO algorithm. The search behavior of the algorithm itself is also investigated in detail, by analyzing the interaction between the particles. Some variants of the RDPSO algorithm are proposed by incorporating different random velocity components with different neighborhood topologies. Finally, empirical studies on the RDPSO algorithm are performed by using a set of benchmark functions from the CEC2005 benchmark suite. Based on the theoretical analysis of the particle's behavior, two methods of controlling the algorithmic parameters are employed, followed by an experimental analysis on how to select the parameter values, in order to obtain a good overall performance of the RDPSO algorithm and its variants in real-world applications. A further performance comparison between the RDPSO algorithms and other variants of PSO is made to prove the efficiency of the RDPSO algorithms.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 15:34:51 GMT" } ]
2013-06-13T00:00:00
[ [ "Sun", "Jun", "" ], [ "Wu", "Xiaojun", "" ], [ "Palade", "Vasile", "" ], [ "Fang", "Wei", "" ], [ "Shi", "Yuhui", "" ] ]
new_dataset
0.998575
1306.2882
Uwe Aickelin
Haichang Gao, Zhongjie Ren, Xiuling Chang, Xiyang Liu, Uwe Aickelin
A New Graphical Password Scheme Resistant to Shoulder-Surfing
Proceedings of the International Conference on CyberWorlds, 20-22 October 2010, Singapore, 194-199, 2010. arXiv admin note: text overlap with arXiv:1305.7482
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Due to the visual interface, this problem has become exacerbated in graphical passwords. There have been some graphical schemes resistant or immune to shoulder-surfing, but they have significant usability drawbacks, usually in the time and effort to log in. In this paper, we propose and evaluate a new shoulder-surfing resistant scheme which has a desirable usability for PDAs. Our inspiration comes from the drawing input method in DAS and the association mnemonics in Story for sequence retrieval. The new scheme requires users to draw a curve across their password images orderly rather than click directly on them. The drawing input trick along with the complementary measures, such as erasing the drawing trace, displaying degraded images, and starting and ending with randomly designated images provide a good resistance to shouldersurfing. A preliminary user study showed that users were able to enter their passwords accurately and to remember them over time.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 16:29:44 GMT" } ]
2013-06-13T00:00:00
[ [ "Gao", "Haichang", "" ], [ "Ren", "Zhongjie", "" ], [ "Chang", "Xiuling", "" ], [ "Liu", "Xiyang", "" ], [ "Aickelin", "Uwe", "" ] ]
new_dataset
0.999403
1306.2935
Andrew Adamatzky
Andrew Adamatzky
Slimy hairs: Hair sensors made with slime mould
null
null
null
null
cs.ET physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Slime mould Physarum polycephalum is a large single cell visible by unaided eye. We design a slime mould implementation of a tactile hair, where the slime mould responds to repeated deflection of hair by an immediate high-amplitude spike and a prolonged increase in amplitude and width of its oscillation impulses. We demonstrate that signal-to-noise ratio of the Physarum tactile hair sensor averages near six for the immediate response and two for the prolonged response.
[ { "version": "v1", "created": "Wed, 12 Jun 2013 19:52:01 GMT" } ]
2013-06-13T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999432
1112.4256
K. V. Krishna
Shubh Narayan Singh and K. V. Krishna
A Sufficient Condition for Hanna Neumann Property of Submonoids of a Free Monoid
null
Semigroup Forum, 86(3): 537-554, 2013
10.1007/s00233-012-9449-4
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using automata-theoretic approach, Giambruno and Restivo have investigated on the intersection of two finitely generated submonoids of the free monoid over a finite alphabet. In particular, they have obtained Hanna Neumann property for a special class of submonoids generated by finite prefix sets. This work continues their work and provides a sufficient condition for Hanna Neumann property for the entire class of submonoids generated by finite prefix sets. In this connection, a general rank formula for the submonoids which are accepted by semi-flower automata is also obtained.
[ { "version": "v1", "created": "Mon, 19 Dec 2011 07:23:58 GMT" }, { "version": "v2", "created": "Mon, 21 May 2012 14:10:36 GMT" }, { "version": "v3", "created": "Tue, 7 Aug 2012 11:49:36 GMT" } ]
2013-06-12T00:00:00
[ [ "Singh", "Shubh Narayan", "" ], [ "Krishna", "K. V.", "" ] ]
new_dataset
0.994901
1306.2453
Dibakar Saha
Dibakar Saha, Nabanita Das
A Fast Fault Tolerant Partitioning Algorithm for Wireless Sensor Networks
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, given a random uniform distribution of sensor nodes on a 2-D plane, a fast self-organized distributed algorithm is proposed to find the maximum number of partitions of the nodes such that each partition is connected and covers the area to be monitored. Each connected partition remains active in a round robin fashion to cover the query region individually. In case of a node failure, the proposed distributed fault recovery algorithm reconstructs the affected partition locally utilizing the available free nodes. Simulation studies show significant improvement in performance compared to the earlier works in terms of computation time, the diameter of each partition, message overhead and network lifetime.
[ { "version": "v1", "created": "Tue, 11 Jun 2013 08:41:27 GMT" } ]
2013-06-12T00:00:00
[ [ "Saha", "Dibakar", "" ], [ "Das", "Nabanita", "" ] ]
new_dataset
0.969938
1306.2597
Tao Qin Dr.
Tao Qin and Tie-Yan Liu
Introducing LETOR 4.0 Datasets
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LETOR is a package of benchmark data sets for research on LEarning TO Rank, which contains standard features, relevance judgments, data partitioning, evaluation tools, and several baselines. Version 1.0 was released in April 2007. Version 2.0 was released in Dec. 2007. Version 3.0 was released in Dec. 2008. This version, 4.0, was released in July 2009. Very different from previous versions (V3.0 is an update based on V2.0 and V2.0 is an update based on V1.0), LETOR4.0 is a totally new release. It uses the Gov2 web page collection (~25M pages) and two query sets from Million Query track of TREC 2007 and TREC 2008. We call the two query sets MQ2007 and MQ2008 for short. There are about 1700 queries in MQ2007 with labeled documents and about 800 queries in MQ2008 with labeled documents. If you have any questions or suggestions about the datasets, please kindly email us ([email protected]). Our goal is to make the dataset reliable and useful for the community.
[ { "version": "v1", "created": "Sun, 9 Jun 2013 09:58:00 GMT" } ]
2013-06-12T00:00:00
[ [ "Qin", "Tao", "" ], [ "Liu", "Tie-Yan", "" ] ]
new_dataset
0.9997
1302.6288
Deanna Needell
Laurent Demanet and Deanna Needell and Nam Nguyen
Super-resolution via superset selection and pruning
null
null
null
null
cs.IT math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a pursuit-like algorithm that we call the "superset method" for recovery of sparse vectors from consecutive Fourier measurements in the super-resolution regime. The algorithm has a subspace identification step that hinges on the translation invariance of the Fourier transform, followed by a removal step to estimate the solution's support. The superset method is always successful in the noiseless regime (unlike L1-minimization) and generalizes to higher dimensions (unlike the matrix pencil method). Relative robustness to noise is demonstrated numerically.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 01:23:50 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2013 17:54:58 GMT" } ]
2013-06-11T00:00:00
[ [ "Demanet", "Laurent", "" ], [ "Needell", "Deanna", "" ], [ "Nguyen", "Nam", "" ] ]
new_dataset
0.978926
1304.0299
Lukas Mach
Lukas Mach, Tomas Toufar
Amalgam width of matroids
arXiv admin note: text overlap with arXiv:0904.2785 by other authors
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new matroid width parameter based on the operation of matroid amalgamation, which we call amalgam-width. The parameter is linearly related to branch-width on finitely representable matroids (which is not possible for branch-width). In particular, any property expressible in the monadic second order logic can be decided in linear time for matroids with bounded amalgam-width. We also prove that the Tutte polynomial can be computed in polynomial time for matroids with bounded amalgam width.
[ { "version": "v1", "created": "Mon, 1 Apr 2013 06:10:05 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2013 15:36:01 GMT" } ]
2013-06-11T00:00:00
[ [ "Mach", "Lukas", "" ], [ "Toufar", "Tomas", "" ] ]
new_dataset
0.999698
1306.1870
Jos\'e Guimar\~aes
Jos\'e de Oliveira Guimar\~aes
The Cyan Language
248 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the manual of Cyan, a prototype-based object-oriented language. Cyan supports static typing, single inheritance, mixin objects (similar to mixin classes with mixin inheritance), generic prototypes, and Java-like interfaces. The language has several innovations: a completely object-oriented exception system, statically-typed closures, a kind of graphical metaobjects called codegs, optional dynamic typing, user-defined literal objects (an innovative way of creating objects), context objects (a generalization of closures), and grammar methods and message sends (which makes it easy to define Domain Specific Languages).
[ { "version": "v1", "created": "Sat, 8 Jun 2013 02:22:42 GMT" } ]
2013-06-11T00:00:00
[ [ "Guimarães", "José de Oliveira", "" ] ]
new_dataset
0.999602
1306.1956
Giovanni Viglietta
Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Masafumi Yamashita
Rendezvous of Two Robots with Constant Memory
18 pages, 3 figures
null
null
null
cs.MA cs.CG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the impact that persistent memory has on the classical rendezvous problem of two mobile computational entities, called robots, in the plane. It is well known that, without additional assumptions, rendezvous is impossible if the entities are oblivious (i.e., have no persistent memory) even if the system is semi-synchronous (SSynch). It has been recently shown that rendezvous is possible even if the system is asynchronous (ASynch) if each robot is endowed with O(1) bits of persistent memory, can transmit O(1) bits in each cycle, and can remember (i.e., can persistently store) the last received transmission. This setting is overly powerful. In this paper we weaken that setting in two different ways: (1) by maintaining the O(1) bits of persistent memory but removing the communication capabilities; and (2) by maintaining the O(1) transmission capability and the ability to remember the last received transmission, but removing the ability of an agent to remember its previous activities. We call the former setting finite-state (FState) and the latter finite-communication (FComm). Note that, even though its use is very different, in both settings, the amount of persistent memory of a robot is constant. We investigate the rendezvous problem in these two weaker settings. We model both settings as a system of robots endowed with visible lights: in FState, a robot can only see its own light, while in FComm a robot can only see the other robot's light. We prove, among other things, that finite-state robots can rendezvous in SSynch, and that finite-communication robots are able to rendezvous even in ASynch. All proofs are constructive: in each setting, we present a protocol that allows the two robots to rendezvous in finite time.
[ { "version": "v1", "created": "Sat, 8 Jun 2013 20:34:43 GMT" } ]
2013-06-11T00:00:00
[ [ "Flocchini", "Paola", "" ], [ "Santoro", "Nicola", "" ], [ "Viglietta", "Giovanni", "" ], [ "Yamashita", "Masafumi", "" ] ]
new_dataset
0.982668
1306.2187
Stefan Hoffmann
Stefan Hoffmann, Egon Wanke
Metric Dimension for Gabriel Unit Disk Graphs is NP-Complete
A brief announcement of this result has been published in the proceedings of ALGOSENSORS 2012
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that finding a minimal number of landmark nodes for a unique virtual addressing by hop-distances in wireless ad-hoc sensor networks is NP-complete even if the networks are unit disk graphs that contain only Gabriel edges. This problem is equivalent to Metric Dimension for Gabriel unit disk graphs. The Gabriel edges of a unit disc graph induce a planar O(\sqrt{n}) distance and an optimal energy spanner. This is one of the most interesting restrictions of Metric Dimension in the context of wireless multi-hop networks.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 12:55:16 GMT" } ]
2013-06-11T00:00:00
[ [ "Hoffmann", "Stefan", "" ], [ "Wanke", "Egon", "" ] ]
new_dataset
0.995411
1306.2249
Jason Cloud
Jason Cloud, Flavio du Pin Calmon, Weifei Zeng, Giovanni Pau, Linda Zeger, Muriel Medard
Multi-Path TCP with Network Coding for Mobile Devices in Heterogeneous Networks
Accepted to VTC2013-Fall, 5 Pages, 6 Figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing mobile devices have the capability to use multiple network technologies simultaneously to help increase performance; but they rarely, if at all, effectively use these technologies in parallel. We first present empirical data to help understand the mobile environment when three heterogeneous networks are available to the mobile device (i.e., a WiFi network, WiMax network, and an Iridium satellite network). We then propose a reliable, multi-path protocol called Multi-Path TCP with Network Coding (MPTCP/NC) that utilizes each of these networks in parallel. An analytical model is developed and a mean-field approximation is derived that gives an estimate of the protocol's achievable throughput. Finally, a comparison between MPTCP and MPTCP/NC is presented using both the empirical data and mean-field approximation. Our results show that network coding can provide users in mobile environments a higher quality of service by enabling the use of multiple network technologies and the capability to overcome packet losses due to lossy, wireless network connections.
[ { "version": "v1", "created": "Mon, 10 Jun 2013 17:04:11 GMT" } ]
2013-06-11T00:00:00
[ [ "Cloud", "Jason", "" ], [ "Calmon", "Flavio du Pin", "" ], [ "Zeng", "Weifei", "" ], [ "Pau", "Giovanni", "" ], [ "Zeger", "Linda", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.99704
1204.4563
Alexander Zeh
Alexander Zeh (INRIA Saclay - Ile de France, INT - University of Ulm.), Sergey Bezzateev (SUAI)
Describing A Cyclic Code by Another Cyclic Code
null
IEEE International Symposium on Information Theory (ISIT) (2012) 2896-2900
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new approach to bound the minimum distance of $q$-ary cyclic codes is presented. The connection to the BCH and the Hartmann--Tzeng bound is formulated and it is shown that for several cases an improvement is achieved. We associate a second cyclic code to the original one and bound its minimum distance in terms of parameters of the associated code.
[ { "version": "v1", "created": "Fri, 20 Apr 2012 08:58:31 GMT" }, { "version": "v2", "created": "Tue, 24 Apr 2012 06:57:47 GMT" }, { "version": "v3", "created": "Thu, 26 Apr 2012 12:02:50 GMT" }, { "version": "v4", "created": "Wed, 18 Jul 2012 06:53:12 GMT" } ]
2013-06-10T00:00:00
[ [ "Zeh", "Alexander", "", "INRIA Saclay - Ile de France, INT - University of\n Ulm." ], [ "Bezzateev", "Sergey", "", "SUAI" ] ]
new_dataset
0.993226
1304.7851
Guangzhi Qu
Rami Abousleiman, Guangzhi Qu, Osamah Rawashdeh
North Atlantic Right Whale Contact Call Detection
6 pages, ICML 2013 Workshop on Machine Learning for Bioacoustics
null
null
null
cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The North Atlantic right whale (Eubalaena glacialis) is an endangered species. These whales continuously suffer from deadly vessel impacts alongside the eastern coast of North America. There have been countless efforts to save the remaining 350 - 400 of them. One of the most prominent works is done by Marinexplore and Cornell University. A system of hydrophones linked to satellite connected-buoys has been deployed in the whales habitat. These hydrophones record and transmit live sounds to a base station. These recording might contain the right whale contact call as well as many other noises. The noise rate increases rapidly in vessel-busy areas such as by the Boston harbor. This paper presents and studies the problem of detecting the North Atlantic right whale contact call with the presence of noise and other marine life sounds. A novel algorithm was developed to preprocess the sound waves before a tree based hierarchical classifier is used to classify the data and provide a score. The developed model was trained with 30,000 data points made available through the Cornell University Whale Detection Challenge program. Results showed that the developed algorithm had close to 85% success rate in detecting the presence of the North Atlantic right whale.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 03:41:14 GMT" }, { "version": "v2", "created": "Fri, 7 Jun 2013 02:01:07 GMT" } ]
2013-06-10T00:00:00
[ [ "Abousleiman", "Rami", "" ], [ "Qu", "Guangzhi", "" ], [ "Rawashdeh", "Osamah", "" ] ]
new_dataset
0.999724
1306.1630
Arunasalam Sambhanthan
Arunasalam Sambhanthan, Alice Good
Enhancing Tourism Destination Accessibility in Developing Countries through Virtual Worlds
Journal article corresponding to arXiv:1302.5199
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of destination accessibility is a vital concern in the sustainable tourism development in the emerging regions due to the increasing numbers of tourism business growth in the recent times. Tourism is one of the potential foreign exchange earning sectors, which place sustainability as one of the main success metrics for benchmarking the overall development of the industry. On the other hand, there are several destinations, which are inaccessible to tourists due to several reasons. Underutilization of potential destinations in both pre purchase and consumption stages is a strategic disadvantage for emerging countries on leading their tourism industry towards sustainability. This research embarks on a content analysis of second life based tourism groups and places. Requirement of a virtual world model to increase the destination accessibility of tourism products has been outlined. The model has to be designed with visual and auditory experience to tourists. The model is expected to enhance the accessibility of destinations for users of different categories.
[ { "version": "v1", "created": "Fri, 7 Jun 2013 06:39:58 GMT" } ]
2013-06-10T00:00:00
[ [ "Sambhanthan", "Arunasalam", "" ], [ "Good", "Alice", "" ] ]
new_dataset
0.99789
1301.7641
Anh Cat Le Ngo
Anh Cat Le Ngo, Kenneth Li-Minn Ang, Guoping Qiu, Jasmine Kah-Phooi Seng
Multi-scale Discriminant Saliency with Wavelet-based Hidden Markov Tree Modelling
arXiv admin note: substantial text overlap with arXiv:1301.3964
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bottom-up saliency, an early stage of humans' visual attention, can be considered as a binary classification problem between centre and surround classes. Discriminant power of features for the classification is measured as mutual information between distributions of image features and corresponding classes . As the estimated discrepancy very much depends on considered scale level, multi-scale structure and discriminant power are integrated by employing discrete wavelet features and Hidden Markov Tree (HMT). With wavelet coefficients and Hidden Markov Tree parameters, quad-tree like label structures are constructed and utilized in maximum a posterior probability (MAP) of hidden class variables at corresponding dyadic sub-squares. Then, a saliency value for each square block at each scale level is computed with discriminant power principle. Finally, across multiple scales is integrated the final saliency map by an information maximization rule. Both standard quantitative tools such as NSS, LCC, AUC and qualitative assessments are used for evaluating the proposed multi-scale discriminant saliency (MDIS) method against the well-know information based approach AIM on its released image collection with eye-tracking data. Simulation results are presented and analysed to verify the validity of MDIS as well as point out its limitation for further research direction.
[ { "version": "v1", "created": "Thu, 31 Jan 2013 15:20:17 GMT" }, { "version": "v2", "created": "Thu, 6 Jun 2013 05:33:16 GMT" } ]
2013-06-07T00:00:00
[ [ "Ngo", "Anh Cat Le", "" ], [ "Ang", "Kenneth Li-Minn", "" ], [ "Qiu", "Guoping", "" ], [ "Seng", "Jasmine Kah-Phooi", "" ] ]
new_dataset
0.981751
1306.1301
Joyeeta Singha
Joyeeta Singha and Karen Das
Recognition of Indian Sign Language in Live Video
6 pages, 5 figures
International Journal of Computer Applications 70(19):17-22, May 2013
10.5120/12174-7306
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sign Language Recognition has emerged as one of the important area of research in Computer Vision. The difficulty faced by the researchers is that the instances of signs vary with both motion and appearance. Thus, in this paper a novel approach for recognizing various alphabets of Indian Sign Language is proposed where continuous video sequences of the signs have been considered. The proposed system comprises of three stages: Preprocessing stage, Feature Extraction and Classification. Preprocessing stage includes skin filtering, histogram matching. Eigen values and Eigen Vectors were considered for feature extraction stage and finally Eigen value weighted Euclidean distance is used to recognize the sign. It deals with bare hands, thus allowing the user to interact with the system in natural way. We have considered 24 different alphabets in the video sequences and attained a success rate of 96.25%.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 05:40:06 GMT" } ]
2013-06-07T00:00:00
[ [ "Singha", "Joyeeta", "" ], [ "Das", "Karen", "" ] ]
new_dataset
0.978141
1306.1310
Yong Zeng
Yong Zeng, Rui Zhang and Zhi Ning Chen
Electromagnetic Lens-focusing Antenna Enabled Massive MIMO
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive multiple-input multiple-output (MIMO) techniques have been recently advanced to tremendously improve the performance of wireless networks. However, the use of very large antenna arrays brings new issues, such as the significantly increased hardware cost and signal processing cost and complexity. In order to reap the enormous gain of massive MIMO and yet reduce its cost to an affordable level, this paper proposes a novel system design by integrating an electromagnetic (EM) lens with the large antenna array, termed \emph{electromagnetic lens antenna} (ELA). An ELA has the capability of focusing the power of any incident plane wave passing through the EM lens to a small subset of the antenna array, while the location of focal area is dependent on the angle of arrival (AoA) of the wave. As compared to conventional antenna arrays without the EM lens, the proposed system can substantially reduce the number of required radio frequency (RF) chains at the receiver and hence, the implementation costs. In this paper, we investigate the proposed system under a simplified single-user uplink transmission setup, by characterizing the power distribution of the ELA as well as the resulting channel model. Furthermore, by assuming antenna selection used at the receiver, we show the throughput gains of the proposed system over conventional antenna arrays given the same number of selected antennas.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 06:51:05 GMT" } ]
2013-06-07T00:00:00
[ [ "Zeng", "Yong", "" ], [ "Zhang", "Rui", "" ], [ "Chen", "Zhi Ning", "" ] ]
new_dataset
0.986667
1306.1335
Hedi Raggad
H. Raggad, M. Latrach, A. Gharsallah and T. Razban
A Compact Dual Band Dielectric Resonator Antenna For Wireless Applications
IJCNC 2013
null
null
null
cs.OH
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents the design of a dual band rectangular Dielectric Resonator Antenna (DRA) coupled to narrow slot aperture that is fed by microstrip line. The fundamental TE111 mode and higher-order TE113 mode are excited with their resonant frequencies respectively. These frequencies can be controlled by changing the DRA dimensions. A dielectric resonator with high permittivity is used to miniaturize the global structure. The proposed antenna is designed to have dual band operation suitable for both DCS (1710 - 1880 MHz) and WLAN (2400 - 2484 MHz) applications. The return loss, radiation pattern and gain of the proposed antenna are evaluated. Reasonable agreement between simulation and experimental results is obtained.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 08:21:18 GMT" } ]
2013-06-07T00:00:00
[ [ "Raggad", "H.", "" ], [ "Latrach", "M.", "" ], [ "Gharsallah", "A.", "" ], [ "Razban", "T.", "" ] ]
new_dataset
0.999754
1306.1468
Benjamin Steinberg
Benjamin Steinberg
Topological dynamics and recognition of languages
This draft was written in March 2010 and was intended to be the beginning of a foundational paper on varieties of not necessarily rational languages and varieties of left compact semitopological semigroups, including an Eilenberg variety theorem and a Reiterman's theorem. Lacking sufficient applications to develop the full theory, I put here what has been worked out
null
null
null
cs.FL math.CO math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define compact automata and show that every language has a unique minimal compact automaton. We also define recognition of languages by compact left semitopological monoids and construct the analogue of the syntactic monoid in this context. For rational languages this reduces to the usual theory of finite automata and finite monoids.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 16:45:48 GMT" } ]
2013-06-07T00:00:00
[ [ "Steinberg", "Benjamin", "" ] ]
new_dataset
0.999531
1306.1511
Tin Nguyen
Tin Chi Nguyen, Zhiyu Zhao and Dongxiao Zhu
SPATA: A Seeding and Patching Algorithm for Hybrid Transcriptome Assembly
The GUI software suite is freely available from http://sammate.sourceforge.net; Contact: [email protected], [email protected]
null
null
null
cs.CE q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transcriptome assembly from RNA-Seq reads is an active area of bioinformatics research. The ever-declining cost and the increasing depth of RNA-Seq have provided unprecedented opportunities to better identify expressed transcripts. However, the nonlinear transcript structures and the ultra-high throughput of RNA-Seq reads pose significant algorithmic and computational challenges to the existing transcriptome assembly approaches, either reference-guided or de novo. While reference-guided approaches offer good sensitivity, they rely on alignment results of the splice-aware aligners and are thus unsuitable for species with incomplete reference genomes. In contrast, de novo approaches do not depend on the reference genome but face a computational daunting task derived from the complexity of the graph built for the whole transcriptome. In response to these challenges, we present a hybrid approach to exploit an incomplete reference genome without relying on splice-aware aligners. We have designed a split-and-align procedure to efficiently localize the reads to individual genomic loci, which is followed by an accurate de novo assembly to assemble reads falling into each locus. Using extensive simulation data, we demonstrate a high accuracy and precision in transcriptome reconstruction by comparing to selected transcriptome assembly tools. Our method is implemented in assemblySAM, a GUI software freely available at http://sammate.sourceforge.net.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 19:09:18 GMT" } ]
2013-06-07T00:00:00
[ [ "Nguyen", "Tin Chi", "" ], [ "Zhao", "Zhiyu", "" ], [ "Zhu", "Dongxiao", "" ] ]
new_dataset
0.993793
1306.1519
Laurent Signac
Laurent Signac (LAII)
Lattice Gas Symmetric Cryptography
null
null
null
null
cs.CR nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lattice gas cellular automata (Lgca) are particular cellular automata that imitate the behavior of par- ticles moving on a lattice. We used a particular set of Lgca rules, called hpp, to mix bits in data blocks and obtain a symmetric cryptographic algorithm. The encryption and decryption keys are the positions of perturbation sites on the lattice (walls). Basically, this paper presents an original way to perform cryp- tographic operations, based on cellular automata. In this paper, we show several characteristics about our algorithm: typical block size (2^(2n-1) ), key-length (2^n ), number of rounds (2^(n+1) ). We also evaluate avalanche and strict avalanche properties with respect to key and plain text. Finally, we highlight the underbellies of our method and give clues to solve them.
[ { "version": "v1", "created": "Thu, 6 Jun 2013 19:26:04 GMT" } ]
2013-06-07T00:00:00
[ [ "Signac", "Laurent", "", "LAII" ] ]
new_dataset
0.997811