id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1210.5879
Bruno Grenet
Bruno Grenet, Thierry Monteil, St\'ephan Thomass\'e
Symmetric Determinantal Representations in Characteristic 2
24 pages, 3 figures
Linear Algebra and Its Applications 439(5), pp. 1364-1381, 2013
10.1016/j.laa.2013.04.022
null
cs.CC math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies Symmetric Determinantal Representations (SDR) in characteristic 2, that is the representation of a multivariate polynomial P by a symmetric matrix M such that P=det(M), and where each entry of M is either a constant or a variable. We first give some sufficient conditions for a polynomial to have an SDR. We then give a non-trivial necessary condition, which implies that some polynomials have no SDR, answering a question of Grenet et al. A large part of the paper is then devoted to the case of multilinear polynomials. We prove that the existence of an SDR for a multilinear polynomial is equivalent to the existence of a factorization of the polynomial in certain quotient rings. We develop some algorithms to test the factorizability in these rings and use them to find SDRs when they exist. Altogether, this gives us polynomial-time algorithms to factorize the polynomials in the quotient rings and to build SDRs. We conclude by describing the case of Alternating Determinantal Representations in any characteristic.
[ { "version": "v1", "created": "Mon, 22 Oct 2012 12:04:05 GMT" }, { "version": "v2", "created": "Wed, 15 May 2013 16:47:32 GMT" } ]
2013-06-06T00:00:00
[ [ "Grenet", "Bruno", "" ], [ "Monteil", "Thierry", "" ], [ "Thomassé", "Stéphan", "" ] ]
new_dataset
0.998592
1306.0947
Ismael Rafols
Ismael Rafols, Michael M. Hopkins, Jarno Hoekman, Josh Siepel, Alice O'Hare, Antonio Perianes-Rodriguez and Paul Nightingale
Big Pharma, little science? A bibliometric perspective on big pharma's R&D decline
null
null
10.1016/j.techfore.2012.06.007
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a widespread perception that pharmaceutical R&D is facing a productivity crisis characterised by stagnation in the numbers of new drug approvals in the face of increasing R&D costs. This study explores pharmaceutical R&D dynamics by examining the publication activities of all R&D laboratories of the major European and US pharmaceutical firms during the period 1995-2009. The empirical findings present an industry in transformation.In the first place, we observe a decline of the total number of publications by large firms. Second, we show a relative increase of their external collaborations suggesting a tendency to outsource, and a diversification of the disciplinary base, in particular towards computation, health services and more clinical approaches. Also evident is a more pronounced decline in publications by both R&D laboratories located in Europe and by firms with European headquarters. Finally, while publications by Big Pharma in emerging economies sharply increase, they remain extremely low compared with those in developed countries. In summary, the trend in this transformation is one of a gradual decrease in internal research efforts and increasing reliance on external research. These empirical insights support the view that large pharmaceutical firms are increasingly becoming networks integrators rather than the prime locus of drug discovery.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 00:02:40 GMT" } ]
2013-06-06T00:00:00
[ [ "Rafols", "Ismael", "" ], [ "Hopkins", "Michael M.", "" ], [ "Hoekman", "Jarno", "" ], [ "Siepel", "Josh", "" ], [ "O'Hare", "Alice", "" ], [ "Perianes-Rodriguez", "Antonio", "" ], [ "Nightingale", "Paul", "" ] ]
new_dataset
0.990776
1306.1034
Mehul Bhatt
Mehul Bhatt and Jakob Suchan and Christian Freksa
ROTUNDE - A Smart Meeting Cinematography Initiative: Tools, Datasets, and Benchmarks for Cognitive Interpretation and Control
Appears in AAAI-2013 Workshop on: Space, Time, and Ambient Intelligence (STAMI 2013)
null
null
null
cs.AI cs.CV cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construe smart meeting cinematography with a focus on professional situations such as meetings and seminars, possibly conducted in a distributed manner across socio-spatially separated groups. The basic objective in smart meeting cinematography is to interpret professional interactions involving people, and automatically produce dynamic recordings of discussions, debates, presentations etc in the presence of multiple communication modalities. Typical modalities include gestures (e.g., raising one's hand for a question, applause), voice and interruption, electronic apparatus (e.g., pressing a button), movement (e.g., standing-up, moving around) etc. ROTUNDE, an instance of smart meeting cinematography concept, aims to: (a) develop functionality-driven benchmarks with respect to the interpretation and control capabilities of human-cinematographers, real-time video editors, surveillance personnel, and typical human performance in everyday situations; (b) Develop general tools for the commonsense cognitive interpretation of dynamic scenes from the viewpoint of visuo-spatial cognition centred perceptual narrativisation. Particular emphasis is placed on declarative representations and interfacing mechanisms that seamlessly integrate within large-scale cognitive (interaction) systems and companion technologies consisting of diverse AI sub-components. For instance, the envisaged tools would provide general capabilities for high-level commonsense reasoning about space, events, actions, change, and interaction.
[ { "version": "v1", "created": "Wed, 5 Jun 2013 09:40:24 GMT" } ]
2013-06-06T00:00:00
[ [ "Bhatt", "Mehul", "" ], [ "Suchan", "Jakob", "" ], [ "Freksa", "Christian", "" ] ]
new_dataset
0.990474
1305.4731
Danilo De Donno
D. De Donno, L. Catarinucci, and L. Tarricone
An UHF RFID Energy-Harvesting System Enhanced by a DC-DC Charge Pump in Silicon-on-Insulator Technology
null
IEEE Microwave and Wireless Components Letters, vol. 23, no. 6, pp. 315-317, June 2013
10.1109/LMWC.2013.2258002
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An RF-DC converter enhanced by a DC-DC voltage booster in silicon-on-insulator technology for UHF radio frequency identification (RFID) energy harvesting is presented in this letter. When the received RF power level is -14 dBm or higher, the system, fabricated on an FR4 substrate using off-the-shelf low-cost discrete components and connected to a flexible dipole antenna, is able to produce 2.4-V DC voltage to power general-purpose electronic devices. As a simple proof of concept,a device comprising microcontroller, temperature sensor, and EEPROM is considered in this work. The experimental results demonstrate the capability of the system to autonomously perform temperature data logging up to a distance of 5 m from a conventional UHF RFID reader used as an RF energy source.
[ { "version": "v1", "created": "Tue, 21 May 2013 06:41:31 GMT" }, { "version": "v2", "created": "Tue, 4 Jun 2013 07:15:01 GMT" } ]
2013-06-05T00:00:00
[ [ "De Donno", "D.", "" ], [ "Catarinucci", "L.", "" ], [ "Tarricone", "L.", "" ] ]
new_dataset
0.999314
1306.0587
Tiffany Jing Li
Jing Li, Kai Xie
Analog Turbo Codes: Turning Chaos to Reliability
46th Annual Conference on Computer Sciences and Information Systems (CISS 2012), 2012, 5 pages, 5 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analog error correction codes, by relaxing the source space and the codeword space from discrete fields to continuous fields, present a generalization of digital codes. While linear codes are sufficient for digital codes, they are not for analog codes, and hence nonlinear mappings must be employed to fully harness the power of analog codes. This paper demonstrates new ways of building effective (nonlinear) analog codes from a special class of nonlinear, fast-diverging functions known as the chaotic functions. It is shown that the "butterfly effect" of the chaotic functions matches elegantly with the distance expansion condition required for error correction, and that the useful idea in digital turbo codes can be exploited to construct efficient turbo-like chaotic analog codes. Simulations show that the new analog codes can perform on par with, or better than, their digital counter-parts when transmitting analog sources.
[ { "version": "v1", "created": "Mon, 3 Jun 2013 20:42:23 GMT" } ]
2013-06-05T00:00:00
[ [ "Li", "Jing", "" ], [ "Xie", "Kai", "" ] ]
new_dataset
0.999671
1306.0741
Jan K\v{r}et\'insk\'y
Nikola Bene\v{s}, Beno\^it Delahaye, Uli Fahrenberg, Jan K\v{r}et\'insk\'y, Axel Legay
Hennessy-Milner Logic with Greatest Fixed Points as a Complete Behavioural Specification Theory
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are two fundamentally different approaches to specifying and verifying properties of systems. The logical approach makes use of specifications given as formulae of temporal or modal logics and relies on efficient model checking algorithms; the behavioural approach exploits various equivalence or refinement checking methods, provided the specifications are given in the same formalism as implementations. In this paper we provide translations between the logical formalism of Hennessy-Milner logic with greatest fixed points and the behavioural formalism of disjunctive modal transition systems. We also introduce a new operation of quotient for the above equivalent formalisms, which is adjoint to structural composition and allows synthesis of missing specifications from partial implementations. This is a substantial generalisation of the quotient for deterministic modal transition systems defined in earlier papers.
[ { "version": "v1", "created": "Tue, 4 Jun 2013 12:22:34 GMT" } ]
2013-06-05T00:00:00
[ [ "Beneš", "Nikola", "" ], [ "Delahaye", "Benoît", "" ], [ "Fahrenberg", "Uli", "" ], [ "Křetínský", "Jan", "" ], [ "Legay", "Axel", "" ] ]
new_dataset
0.998625
1201.4089
Markus Kr\"otzsch
Markus Kr\"otzsch, Frantisek Simancik, Ian Horrocks
A Description Logic Primer
null
null
null
null
cs.AI cs.LO
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper provides a self-contained first introduction to description logics (DLs). The main concepts and features are explained with examples before syntax and semantics of the DL SROIQ are defined in detail. Additional sections review light-weight DL languages, discuss the relationship to the Web Ontology Language OWL and give pointers to further reading.
[ { "version": "v1", "created": "Thu, 19 Jan 2012 15:51:01 GMT" }, { "version": "v2", "created": "Wed, 27 Mar 2013 07:17:05 GMT" }, { "version": "v3", "created": "Mon, 3 Jun 2013 13:09:48 GMT" } ]
2013-06-04T00:00:00
[ [ "Krötzsch", "Markus", "" ], [ "Simancik", "Frantisek", "" ], [ "Horrocks", "Ian", "" ] ]
new_dataset
0.99984
1212.6036
Gang Mei
Gang Mei, John C.Tipper and Nengxiong Xu
T-Base: A Triangle-Based Iterative Algorithm for Smoothing Quadrilateral Meshes
Proceedings of the 2012 International Conference on Information Technology and Software Engineering Lecture Notes in Electrical Engineering Volume 212, 2013, pp 305-315
Lecture Notes in Electrical EngineeringVolume 212, 2013, pp 305-315
10.1007/978-3-642-34531-9_32
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel approach named TBase for smoothing planar and surface quadrilateral meshes. Our motivation is that the best shape of quadrilateral element (square) can be virtually divided into a pair of equilateral right triangles by any of its diagonals. When move a node to smooth a quadrilateral, it is optimal to make a pair of triangles divided by a diagonal be equilateral right triangles separately. The finally smoothed position is obtained by weighting all individual optimal positions. Three variants are produced according to the determination of weights. Tests by the TBase are given and compared with Laplacian smoothing: The Vari.1 of TBase is effectively identical to Laplacian smoothing for planar quad meshes, while Vari.2 is the best. For the quad mesh on underlying parametric surface and interpolation surface, Vari.2 and Vari.1 are best, respectively.
[ { "version": "v1", "created": "Tue, 25 Dec 2012 12:34:34 GMT" } ]
2013-06-04T00:00:00
[ [ "Mei", "Gang", "" ], [ "Tipper", "John C.", "" ], [ "Xu", "Nengxiong", "" ] ]
new_dataset
0.982211
1305.3251
Suranjan Chakraborty
Amitabha Sinha, Soumojit Acharyya, Suranjan Chakraborty and Mitrava Sarkar
Field Programmable DSP Arrays - A Novel Reconfigurable Architecture for Efficient Realization of Digital Signal Processing Functions
18 pages, 17 figures. This paper has been published into Signal & Image Processing : An International Journal (SIPIJ - AIRCC) Vol.4, No.2, April 2013. http://airccse.org/journal/sipij/current2013.html
Signal & Image Processing : An International Journal (SIPIJ - AIRCC) Vol.4, No.2, April 2013
10.5121/sipij.2013.4204
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital Signal Processing functions are widely used in real time high speed applications. Those functions are generally implemented either on ASICs with inflexibility, or on FPGAs with bottlenecks of relatively smaller utilization factor or lower speed compared to ASIC. The proposed reconfigurable DSP processor is redolent to FPGA, but with basic fixed Common Modules (CMs) (like adders, subtractors, multipliers, scaling units, shifters) instead of CLBs. This paper introduces the development of a reconfigurable DSP processor that integrates different filter and transform functions. The switching between DSP functions is occurred by reconfiguring the interconnection between CMs. Validation of the proposed reconfigurable architecture has been achieved on Virtex5 FPGA. The architecture provides sufficient amount of flexibility, parallelism and scalability.
[ { "version": "v1", "created": "Mon, 13 May 2013 16:37:14 GMT" } ]
2013-06-04T00:00:00
[ [ "Sinha", "Amitabha", "" ], [ "Acharyya", "Soumojit", "" ], [ "Chakraborty", "Suranjan", "" ], [ "Sarkar", "Mitrava", "" ] ]
new_dataset
0.975711
1306.0089
Suranjan Chakraborty
Amitabha Sinha, Mitrava Sarkar, Soumojit Acharyya, Suranjan Chakraborty
A Novel Reconfigurable Architecture of a DSP Processor for Efficient Mapping of DSP Functions using Field Programmable DSP Arrays
8 Pages, 12 Figures, ACM SIGARCH Computer Architecture News. arXiv admin note: substantial text overlap with arXiv:1305.3251
ACM SIGARCH Computer Architecture News, Volume 41 Issue 2, May 2013, Pages 1-8
10.1145/2490302.2490304
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Development of modern integrated circuit technologies makes it feasible to develop cheaper, faster and smaller special purpose signal processing function circuits. Digital Signal processing functions are generally implemented either on ASICs with inflexibility, or on FPGAs with bottlenecks of relatively smaller utilization factor or lower speed compared to ASIC. Field Programmable DSP Array (FPDA) is the proposed DSP dedicated device, redolent to FPGA, but with basic fixed common modules (CMs) (like adders, subtractors, multipliers, scaling units, shifters) instead of CLBs. This paper introduces the development of reconfigurable system architecture with a focus on FPDA that integrates different DSP functions like DFT, FFT, DCT, FIR, IIR, and DWT etc. The switching between DSP functions is occurred by reconfiguring the interconnection between CMs. Validation of the proposed architecture has been achieved on Virtex5 FPGA. The architecture provides sufficient amount of flexibility, parallelism and scalability.
[ { "version": "v1", "created": "Sat, 1 Jun 2013 09:04:40 GMT" } ]
2013-06-04T00:00:00
[ [ "Sinha", "Amitabha", "" ], [ "Sarkar", "Mitrava", "" ], [ "Acharyya", "Soumojit", "" ], [ "Chakraborty", "Suranjan", "" ] ]
new_dataset
0.999137
1306.0125
Jacob Whitehill
Jacob Whitehill
Understanding ACT-R - an Outsider's Perspective
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ACT-R theory of cognition developed by John Anderson and colleagues endeavors to explain how humans recall chunks of information and how they solve problems. ACT-R also serves as a theoretical basis for "cognitive tutors", i.e., automatic tutoring systems that help students learn mathematics, computer programming, and other subjects. The official ACT-R definition is distributed across a large body of literature spanning many articles and monographs, and hence it is difficult for an "outsider" to learn the most important aspects of the theory. This paper aims to provide a tutorial to the core components of the ACT-R theory.
[ { "version": "v1", "created": "Sat, 1 Jun 2013 15:48:58 GMT" } ]
2013-06-04T00:00:00
[ [ "Whitehill", "Jacob", "" ] ]
new_dataset
0.988507
1306.0258
Andrew Adamatzky
Andrew Adamatzky
Slime mould tactile sensor
null
null
null
null
cs.ET nlin.AO physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Slime mould P. polycephalum is a single cells visible by unaided eye. The cells shows a wide spectrum of intelligent behaviour. By interpreting the behaviour in terms of computation one can make a slime mould based computing device. The Physarum computers are capable to solve a range of tasks of computational geometry, optimisation and logic. Physarum computers designed so far lack of localised inputs. Commonly used inputs --- illumination and chemo-attractants and -repellents --- usually act on extended domains of the slime mould's body. Aiming to design massive-parallel tactile inputs for slime mould computers we analyse a temporal dynamic of P. polycephalum's electrical response to tactile stimulation. In experimental laboratory studies we discover how the Physarum responds to application and removal of a local mechanical pressure with electrical potential impulses and changes in its electrical potential oscillation patterns.
[ { "version": "v1", "created": "Sun, 2 Jun 2013 22:38:48 GMT" } ]
2013-06-04T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999573
1306.0369
Manish Gupta
Arnav Goyal and Dixita Limbachiya and Shikhar Kumar Gupta and Foram Joshi and Sushant Pritmani and Akshita Sahai and Manish K Gupta
DNA Pen: A Tool for Drawing on a Molecular Canvas
Submitted to DNA19. The software is available at http://www.guptalab.org/dnapen
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DNA origami is an interdisciplinary area where DNA can be used as a building block for making useful stuff at nanoscale. This work presents an open source software DNA pen (based on the recent work of Peng Yin and his group) which can be used (using free hand and digital molecular canvas) to draw an object at nanoscale. Software generates error free DNA sequences which can be used in the wet lab to create the object at the nanoscale. Using DNA pen we have drawn several objects including the map of India and sanskrit letter "Om" from free hand molecular canvas and digital letter DNA using digitized molecular canvas.
[ { "version": "v1", "created": "Mon, 3 Jun 2013 11:51:40 GMT" } ]
2013-06-04T00:00:00
[ [ "Goyal", "Arnav", "" ], [ "Limbachiya", "Dixita", "" ], [ "Gupta", "Shikhar Kumar", "" ], [ "Joshi", "Foram", "" ], [ "Pritmani", "Sushant", "" ], [ "Sahai", "Akshita", "" ], [ "Gupta", "Manish K", "" ] ]
new_dataset
0.9997
1305.7294
Chunming Tang
Chunming Tang, Yanfeng Qi, Maozhi Xu
A Note on Cyclic Codes from APN Functions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes, as linear block error-correcting codes in coding theory, play a vital role and have wide applications. Ding in \cite{D} constructed a number of classes of cyclic codes from almost perfect nonlinear (APN) functions and planar functions over finite fields and presented ten open problems on cyclic codes from highly nonlinear functions. In this paper, we consider two open problems involving the inverse APN functions $f(x)=x^{q^m-2}$ and the Dobbertin APN function $f(x)=x^{2^{4i}+2^{3i}+2^{2i}+2^{i}-1}$. From the calculation of linear spans and the minimal polynomials of two sequences generated by these two classes of APN functions, the dimensions of the corresponding cyclic codes are determined and lower bounds on the minimum weight of these cyclic codes are presented. Actually, we present a framework for the minimal polynomial and linear span of the sequence $s^{\infty}$ defined by $s_t=Tr((1+\alpha^t)^e)$, where $\alpha$ is a primitive element in $GF(q)$. These techniques can also be applied into other open problems in \cite{D}.
[ { "version": "v1", "created": "Fri, 31 May 2013 03:15:32 GMT" } ]
2013-06-03T00:00:00
[ [ "Tang", "Chunming", "" ], [ "Qi", "Yanfeng", "" ], [ "Xu", "Maozhi", "" ] ]
new_dataset
0.991056
1305.7416
Uwe Aickelin
Feng Gu, Julie Greensmith, Uwe Aickelin
The Dendritic Cell Algorithm for Intrusion Detection
Bio-Inspired Communications and Networking, IGI Global, 84-102, 2011
null
null
null
cs.CR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As one of the solutions to intrusion detection problems, Artificial Immune Systems (AIS) have shown their advantages. Unlike genetic algorithms, there is no one archetypal AIS, instead there are four major paradigms. Among them, the Dendritic Cell Algorithm (DCA) has produced promising results in various applications. The aim of this chapter is to demonstrate the potential for the DCA as a suitable candidate for intrusion detection problems. We review some of the commonly used AIS paradigms for intrusion detection problems and demonstrate the advantages of one particular algorithm, the DCA. In order to clearly describe the algorithm, the background to its development and a formal definition are given. In addition, improvements to the original DCA are presented and their implications are discussed, including previous work done on an online analysis component with segmentation and ongoing work on automated data preprocessing. Based on preliminary results, both improvements appear to be promising for online anomaly-based intrusion detection.
[ { "version": "v1", "created": "Fri, 31 May 2013 14:33:12 GMT" } ]
2013-06-03T00:00:00
[ [ "Gu", "Feng", "" ], [ "Greensmith", "Julie", "" ], [ "Aickelin", "Uwe", "" ] ]
new_dataset
0.984143
1305.7434
Uwe Aickelin
William Wilson, Phil Birkin, Uwe Aickelin
Motif Detection Inspired by Immune Memory (JORS)
Journal of the Operational Research Society 62 (2), 253-265, 2011. arXiv admin note: text overlap with arXiv:1004.3887, arXiv:1002.0432, arXiv:1006.1526
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify variable length unknown motifs which repeat within time series data. The algorithm searches from a neutral perspective that is independent of the data being analysed and the underlying motifs. In this paper we test the flexibility of the motif tracking algorithm by applying it to the search for patterns in two industrial data sets. The algorithm is able to identify a population of meaningful motifs in both cases, and the value of these motifs is discussed.
[ { "version": "v1", "created": "Fri, 31 May 2013 14:55:45 GMT" } ]
2013-06-03T00:00:00
[ [ "Wilson", "William", "" ], [ "Birkin", "Phil", "" ], [ "Aickelin", "Uwe", "" ] ]
new_dataset
0.965863
1305.7466
Daqiang Zhang
Feng Xia, Linqiang Wang, Daqiang Zhang, Xue Zhang, Ruixia Gao
Ada-MAC: An Adaptive MAC Protocol for Real-time and Reliable Health Monitoring,
IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems (IEEE CYBER 2012), Bangkok, Thailand, May 27-31, pp. 203 - 208, 2012
null
10.1109/CYBER.2012.6392554
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IEEE 802.15.4 is regarded as one of the most suitable communication protocols for cyber-physical applications of wireless sensor and actuator networks. This is because this protocol is able to achieve low-power and low-cost transmission in wireless personal area networks. But most cyber-physical systems (CPSs) require a degree of real-time and reliability from the underlying communication protocol. Some of them are stricter than the others. However, IEEE 802.15.4 protocol cannot provide reliability and real-time transmission for time-critical and delay-sensitive data in cyber-physical applications. To solve this problem, we propose a new MAC protocol, i.e. the Ada-MAC protocol, which is based on IEEE 802.15.4 beacon-enabled mode. It can support cyber-physical applications such as health monitoring, which require stringent real- time and reliability guarantees. We implement the proposed protocol on the OMNET++ platform and conduct a performance evaluation of the proposed protocol with comparison against the traditional IEEE 802.15.4 protocol. The results are presented and analyzed.
[ { "version": "v1", "created": "Fri, 31 May 2013 15:59:02 GMT" } ]
2013-06-03T00:00:00
[ [ "Xia", "Feng", "" ], [ "Wang", "Linqiang", "" ], [ "Zhang", "Daqiang", "" ], [ "Zhang", "Xue", "" ], [ "Gao", "Ruixia", "" ] ]
new_dataset
0.99765
1305.7482
Uwe Aickelin
Xiyang Liu, Zhongjie Ren, Xiuling Chang, Haichang Gao, Uwe Aickelin
Draw a line on your PDA to authenticate
The sixth Symposium on Usable Privacy and Security, SOUPS2010, July 14-16, Redmond, WA, 7, 2010
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The trend toward a highly mobile workforce and the ubiquity of graphical interfaces (such as the stylus and touch-screen) has enabled the emergence of graphical authentications in Personal Digital Assistants (PDAs) [1]. However, most of the current graphical password schemes are vulnerable to shoulder-surfing [2,3], a known risk where an attacker can capture a password by direct observation or by recording the authentication session. Several approaches have been developed to deal with this problem, but they have significant usability drawbacks, usually in the time and effort to log in, making them less suitable for authentication [4, 8]. For example, it is time-consuming for users to log in CHC [4] and there are complex text memory requirements in scheme proposed by Hong [5]. With respect to the scheme proposed by Weinshall [6], not only is it intricate to log in, but also the main claim of resisting shoulder-surfing is proven false [7]. In this paper, we introduce a new graphical password scheme which provides a good resistance to shouldersurfing and preserves a desirable usability.
[ { "version": "v1", "created": "Fri, 31 May 2013 16:41:47 GMT" } ]
2013-06-03T00:00:00
[ [ "Liu", "Xiyang", "" ], [ "Ren", "Zhongjie", "" ], [ "Chang", "Xiuling", "" ], [ "Gao", "Haichang", "" ], [ "Aickelin", "Uwe", "" ] ]
new_dataset
0.998343
1009.3006
Jean-Lou De Carufel
Prosenjit Bose and Jean-Lou De Carufel
Minimum-Area Enclosing Triangle with a Fixed Angle
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set S of n points in the plane and a fixed angle 0 < omega < pi, we show how to find in O(n log n) time all triangles of minimum area with one angle omega that enclose S. We prove that in general, the solution cannot be written without cubic roots. We also prove an Omega(n log n) lower bound for this problem in the algebraic computation tree model. If the input is a convex n-gon, our algorithm takes Theta(n) time.
[ { "version": "v1", "created": "Wed, 15 Sep 2010 19:45:35 GMT" }, { "version": "v2", "created": "Thu, 30 May 2013 15:41:10 GMT" } ]
2013-05-31T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "De Carufel", "Jean-Lou", "" ] ]
new_dataset
0.988785
1305.7014
Bohdan Pavlyshenko
Bohdan Pavlyshenko
Tweets Miner for Stock Market Analysis
null
null
null
null
cs.IR cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a software package for the data mining of Twitter microblogs for the purpose of using them for the stock market analysis. The package is written in R langauge using apropriate R packages. The model of tweets has been considered. We have also compared stock market charts with frequent sets of keywords in Twitter microblogs messages.
[ { "version": "v1", "created": "Thu, 30 May 2013 06:35:52 GMT" } ]
2013-05-31T00:00:00
[ [ "Pavlyshenko", "Bohdan", "" ] ]
new_dataset
0.982256
1305.7103
Prasenjit Chanak
Prasenjit Chanak, Tuhina Samanta, Indrajit Banerjee
Fault-tolerant multipath routing scheme for energy efficient wireless sensor networks
null
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 2, April 2013
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
The main challenge in wireless sensor network is to improve the fault tolerance of each node and also provide an energy efficient fast data routing service. In this paper we propose an energy efficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant multipath routing scheme for energy efficient wireless sensor network (FTMRS).The FTMRS is based on multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and other two backup paths are used as alternative path for faulty network and to handle the overloaded traffic on main channel. Shortest path data routing ensures energy efficient data routing. The performance analysis of FTMRS shows better results compared to other popular fault tolerant techniques in wireless sensor networks.
[ { "version": "v1", "created": "Thu, 30 May 2013 13:34:53 GMT" } ]
2013-05-31T00:00:00
[ [ "Chanak", "Prasenjit", "" ], [ "Samanta", "Tuhina", "" ], [ "Banerjee", "Indrajit", "" ] ]
new_dataset
0.999602
1305.6669
Alejandro Erickson
Alejandro Erickson and Frank Ruskey
Domino Tatami Covering is NP-complete
10 pages, accepted at The International Workshop on Combinatorial Algorithms (IWOCA) 2013
null
null
null
cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A covering with dominoes of a rectilinear region is called \emph{tatami} if no four dominoes meet at any point. We describe a reduction from planar 3SAT to Domino Tatami Covering. As a consequence it is NP-complete to decide whether there is a perfect matching of a graph that meets every 4-cycle, even if the graph is restricted to be an induced subgraph of the grid-graph. The gadgets used in the reduction were discovered with the help of a SAT-solver.
[ { "version": "v1", "created": "Wed, 29 May 2013 01:00:33 GMT" } ]
2013-05-30T00:00:00
[ [ "Erickson", "Alejandro", "" ], [ "Ruskey", "Frank", "" ] ]
new_dataset
0.999436
1305.6693
Pablo P\'erez-Lantero
Sergey Bereg, Ruy Fabila-Monroy, David Flores-Pe\~naloza, Mario Lopez, Pablo P\'erez-Lantero
Drawing the double circle on a grid of minimum size
null
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1926, Jarn\'ik introduced the problem of drawing a convex $n$-gon with vertices having integer coordinates. He constructed such a drawing in the grid $[1,c\cdot n^{3/2}]^2$ for some constant $c>0$, and showed that this grid size is optimal up to a constant factor. We consider the analogous problem for drawing the double circle, and prove that it can be done within the same grid size. Moreover, we give an O(n)-time algorithm to construct such a point set.
[ { "version": "v1", "created": "Wed, 29 May 2013 04:56:57 GMT" } ]
2013-05-30T00:00:00
[ [ "Bereg", "Sergey", "" ], [ "Fabila-Monroy", "Ruy", "" ], [ "Flores-Peñaloza", "David", "" ], [ "Lopez", "Mario", "" ], [ "Pérez-Lantero", "Pablo", "" ] ]
new_dataset
0.981454
1305.6827
Frederic Le Mouel
Marie-Ange L\`ebre (CITI), Fr\'ed\'eric Le Mou\"el (CITI), Eric M\'enard
Mod\`ele multi-\'echelles pour les services dans les VANET
in French
Journ\'ees Nationales des Communications dans les Transports (JNCT) (2013)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service deployment, integration and interactions in VANET are fast expanding. They are now focusing only on driver security. In the future, with in-car application deployments, the car will be considered as a user extension - in the same way as smartphones actually. We propose a multi-level graph model to challenge this VANET / Application / User integration.
[ { "version": "v1", "created": "Wed, 29 May 2013 15:06:40 GMT" } ]
2013-05-30T00:00:00
[ [ "Lèbre", "Marie-Ange", "", "CITI" ], [ "Mouël", "Frédéric Le", "", "CITI" ], [ "Ménard", "Eric", "" ] ]
new_dataset
0.993062
1302.5153
Arash Ghayoori
Arash Ghayoori and T. Aaron Gulliver
Constructing Polar Codes Using Iterative Bit-Channel Upgrading
arXiv admin note: text overlap with arXiv:1105.6164 by other authors
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The definition of polar codes given by Arikan is explicit, but the construction complexity is an issue. This is due to the exponential growth in the size of the output alphabet of the bit-channels as the codeword length increases. Tal and Vardy recently presented a method for constructing polar codes which controls this growth. They approximated each bit-channel with a better channel and a worse channel while reducing the alphabet size. They constructed a polar code based on the worse channel and used the better channel to measure the distance from the optimal channel. This paper considers the knowledge gained from the perspective of the better channel. A method is presented using iterative upgrading of the bit-channels which successively results in a channel closer to the original one. It is shown that this approach can be used to obtain a channel arbitrarily close to the original channel, and therefore to the optimal construction of a polar code.
[ { "version": "v1", "created": "Thu, 21 Feb 2013 00:53:25 GMT" }, { "version": "v2", "created": "Tue, 28 May 2013 03:27:01 GMT" } ]
2013-05-29T00:00:00
[ [ "Ghayoori", "Arash", "" ], [ "Gulliver", "T. Aaron", "" ] ]
new_dataset
0.99815
1305.6376
Frank Vanderzwet
Frank Vanderzwet
Fractional Pebbling Game Lower Bounds
Graduate Research Paper for University of Toronto. Completion of paper assisted by Professor Stephen Cook and Professor Toniann Pitassi
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractional pebbling is a generalization of black-white pebbling introduced recently. In this reasearch paper we solve an open problem by proving a tight lower bound on the pebble weight required to fractionally pebble a balanced d-ary tree of height h. This bound has close ties with branching programs and the separation of P from NL.
[ { "version": "v1", "created": "Tue, 28 May 2013 06:06:53 GMT" } ]
2013-05-29T00:00:00
[ [ "Vanderzwet", "Frank", "" ] ]
new_dataset
0.963625
1305.6543
Gregory Malecha
Gregory Malecha, Adam Chlipala, Thomas Braibant, Patrick Hulin, Edward Z. Yang
MirrorShard: Proof by Computational Reflection with Verified Hints
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a method for building composable and extensible verification procedures within the Coq proof assistant. Unlike traditional methods that rely on run-time generation and checking of proofs, we use verified-correct procedures with Coq soundness proofs. Though they are internalized in Coq's logic, our provers support sound extension by users with hints over new domains, enabling automated reasoning about user-defined abstract predicates. We maintain soundness by developing an architecture for modular packaging, construction, and composition of hint databases, which had previously only been implemented in Coq at the level of its dynamically typed, proof-generating tactic language. Our provers also include rich handling of unification variables, enabling integration with other tactic-based deduction steps within Coq. We have implemented our techniques in MirrorShard, an open-source framework for reflective verification. We demonstrate its applicability by instantiating it to separation logic in order to reason about imperative program verification.
[ { "version": "v1", "created": "Tue, 28 May 2013 15:50:10 GMT" } ]
2013-05-29T00:00:00
[ [ "Malecha", "Gregory", "" ], [ "Chlipala", "Adam", "" ], [ "Braibant", "Thomas", "" ], [ "Hulin", "Patrick", "" ], [ "Yang", "Edward Z.", "" ] ]
new_dataset
0.971548
1305.6555
Sandor P. Fekete
Michael A. Bender and Martin Farach-Colton and S\'andor P. Fekete and Jeremy T. Fineman and Seth Gilbert
Reallocation Problems in Scheduling
9 oages, 1 table; extended abstract version to appear in SPAA 2013
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In traditional on-line problems, such as scheduling, requests arrive over time, demanding available resources. As each request arrives, some resources may have to be irrevocably committed to servicing that request. In many situations, however, it may be possible or even necessary to reallocate previously allocated resources in order to satisfy a new request. This reallocation has a cost. This paper shows how to service the requests while minimizing the reallocation cost. We focus on the classic problem of scheduling jobs on a multiprocessor system. Each unit-size job has a time window in which it can be executed. Jobs are dynamically added and removed from the system. We provide an algorithm that maintains a valid schedule, as long as a sufficiently feasible schedule exists. The algorithm reschedules only a total number of O(min{log^* n, log^* Delta}) jobs for each job that is inserted or deleted from the system, where n is the number of active jobs and Delta is the size of the largest window.
[ { "version": "v1", "created": "Tue, 28 May 2013 16:34:44 GMT" } ]
2013-05-29T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Farach-Colton", "Martin", "" ], [ "Fekete", "Sándor P.", "" ], [ "Fineman", "Jeremy T.", "" ], [ "Gilbert", "Seth", "" ] ]
new_dataset
0.984586
1301.4786
Yeow-Khiang Chia
Yeow-Khiang Chia and Sumei Sun and Rui Zhang
Energy Cooperation in Cellular Networks with Renewable Powered Base Stations
V1: Presented at IEEE WCNC 2013. V2: Extended version. Submitted to IEEE Trans. Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a model for energy cooperation between cellular base stations (BSs) with individual hybrid power supplies (including both the conventional grid and renewable energy sources), limited energy storages, and connected by resistive power lines for energy sharing. When the renewable energy profile and energy demand profile at all BSs are deterministic or known ahead of time, we show that the optimal energy cooperation policy for the BSs can be found by solving a linear program. We show the benefits of energy cooperation in this regime. When the renewable energy and demand profiles are stochastic and only causally known at the BSs, we propose an online energy cooperation algorithm and show the optimality properties of this algorithm under certain conditions. Furthermore, the energy-saving performances of the developed offline and online algorithms are compared by simulations, and the effect of the availability of energy state information (ESI) on the performance gains of the BSs' energy cooperation is investigated. Finally, we propose a hybrid algorithm that can incorporate offline information about the energy profiles, but operates in an online manner.
[ { "version": "v1", "created": "Mon, 21 Jan 2013 08:21:24 GMT" }, { "version": "v2", "created": "Mon, 27 May 2013 14:12:26 GMT" } ]
2013-05-28T00:00:00
[ [ "Chia", "Yeow-Khiang", "" ], [ "Sun", "Sumei", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.997254
1302.0744
V Lalitha
Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath
Explicit MBR All-Symbol Locality Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding based on Gabidulin codes, and presents constructions that utilize minimum bandwidth regenerating (MBR) local codes. The constructions achieve maximum resilience (i.e., optimal minimum distance) and have maximum capacity (i.e., maximum rate). Finally, the same pre-coding mechanism can be combined with a subclass of fractional-repetition codes to enable maximum resilience and repair-by-transfer simultaneously.
[ { "version": "v1", "created": "Mon, 4 Feb 2013 16:15:15 GMT" }, { "version": "v2", "created": "Mon, 27 May 2013 10:19:43 GMT" } ]
2013-05-28T00:00:00
[ [ "Kamath", "Govinda M.", "" ], [ "Silberstein", "Natalia", "" ], [ "Prakash", "N.", "" ], [ "Rawat", "Ankit S.", "" ], [ "Lalitha", "V.", "" ], [ "Koyluoglu", "O. Ozan", "" ], [ "Kumar", "P. Vijay", "" ], [ "Vishwanath", "Sriram", "" ] ]
new_dataset
0.999113
1305.5913
Fahd Ahmed Khan
Fahd Ahmed Khan, Kamel Tourki, Mohamed-Slim Alouini, and Khalid A. Qaraqe
Performance of Opportunistic Fixed Gain Bidirectional Relaying With Outdated CSI
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the impact of using outdated channel state information for relay selection on the performance of a network where two sources communicate with each other via fixed-gain amplifyand- forward relays. For a Rayleigh faded channel, closed-form expressions for the outage probability, moment generating function and symbol error rate are derived. Simulations results are also presented to corroborate the derived analytical results. It is shown that adding relays does not improve the performance if the channel is substantially outdated. Furthermore, relay location is also taken into consideration and it is shown that the performance can be improved by placing the relay closer to the source whose channel is more outdated.
[ { "version": "v1", "created": "Sat, 25 May 2013 12:14:19 GMT" } ]
2013-05-28T00:00:00
[ [ "Khan", "Fahd Ahmed", "" ], [ "Tourki", "Kamel", "" ], [ "Alouini", "Mohamed-Slim", "" ], [ "Qaraqe", "Khalid A.", "" ] ]
new_dataset
0.986124
1305.6074
Andreas Holzer
Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith
On the Structure and Complexity of Rational Sets of Regular Languages
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent thread of papers, we have introduced FQL, a precise specification language for test coverage, and developed the test case generation engine FShell for ANSI C. In essence, an FQL test specification amounts to a set of regular languages, each of which has to be matched by at least one test execution. To describe such sets of regular languages, the FQL semantics uses an automata-theoretic concept known as rational sets of regular languages (RSRLs). RSRLs are automata whose alphabet consists of regular expressions. Thus, the language accepted by the automaton is a set of regular expressions. In this paper, we study RSRLs from a theoretic point of view. More specifically, we analyze RSRL closure properties under common set theoretic operations, and the complexity of membership checking, i.e., whether a regular language is an element of a RSRL. For all questions we investigate both the general case and the case of finite sets of regular languages. Although a few properties are left as open problems, the paper provides a systematic semantic foundation for the test specification language FQL.
[ { "version": "v1", "created": "Sun, 26 May 2013 22:05:23 GMT" } ]
2013-05-28T00:00:00
[ [ "Holzer", "Andreas", "" ], [ "Schallhart", "Christian", "" ], [ "Tautschnig", "Michael", "" ], [ "Veith", "Helmut", "" ] ]
new_dataset
0.995809
1305.6238
Richard Moot
Richard Moot (LaBRI)
Extended Lambek calculi and first-order linear logic
Logic and Language, Allemagne (2013)
null
null
null
cs.CL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First-order multiplicative intuitionistic linear logic (MILL1) can be seen as an extension of the Lambek calculus. In addition to the fragment of MILL1 which corresponds to the Lambek calculus (of Moot & Piazza 2001), I will show fragments of MILL1 which generate the multiple context-free languages and which correspond to the Displacement calculus of Morrilll e.a.
[ { "version": "v1", "created": "Mon, 27 May 2013 14:36:53 GMT" } ]
2013-05-28T00:00:00
[ [ "Moot", "Richard", "", "LaBRI" ] ]
new_dataset
0.997024
1006.1587
Rani Hod
Rani Hod, Marcin Krzywkowski
A construction for the hat problem on a directed graph
9 pages. v2: updated title and abstract to match journal version
Electronic J. Combinatorics 19 (2012) P30
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A team of players plays the following game. After a strategy session, each player is randomly fitted with a blue or red hat. Then, without further communication, everybody can try to guess simultaneously his or her own hat color by looking at the hat colors of other players. Visibility is defined by a directed graph; that is, vertices correspond to players, and a player can see each player to whom she or he is connected by an arc. The team wins if at least one player guesses his hat color correctly, and no one guesses his hat color wrong; otherwise the team loses. The team aims to maximize the probability of a win, and this maximum is called the hat number of the graph. Previous works focused on the problem on complete graphs and on undirected graphs. Some cases were solved, e.g., complete graphs of certain orders, trees, cycles, bipartite graphs. These led Uriel Feige to conjecture that the hat number of any graph is equal to the hat number of its maximum clique. We show that the conjecture does not hold for directed graphs.Moreover, for every value of the maximum clique size, we provide a tight characterization of the range of possible values of the hat number. We construct families of directed graphs with a fixed clique number the hat number of which is asymptotically optimal. We also determine the hat number of tournaments to be one half.
[ { "version": "v1", "created": "Tue, 8 Jun 2010 15:28:22 GMT" }, { "version": "v2", "created": "Fri, 24 May 2013 19:03:35 GMT" } ]
2013-05-27T00:00:00
[ [ "Hod", "Rani", "" ], [ "Krzywkowski", "Marcin", "" ] ]
new_dataset
0.985343
1302.6421
Jonathan Heras
J\'onathan Heras and Ekaterina Komendantskaya
ML4PG in Computer Algebra verification
null
null
null
null
cs.LO cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ML4PG is a machine-learning extension that provides statistical proof hints during the process of Coq/SSReflect proof development. In this paper, we use ML4PG to find proof patterns in the CoqEAL library -- a library that was devised to verify the correctness of Computer Algebra algorithms. In particular, we use ML4PG to help us in the formalisation of an efficient algorithm to compute the inverse of triangular matrices.
[ { "version": "v1", "created": "Tue, 26 Feb 2013 13:02:36 GMT" }, { "version": "v2", "created": "Fri, 26 Apr 2013 15:25:05 GMT" }, { "version": "v3", "created": "Fri, 24 May 2013 08:01:20 GMT" } ]
2013-05-27T00:00:00
[ [ "Heras", "Jónathan", "" ], [ "Komendantskaya", "Ekaterina", "" ] ]
new_dataset
0.997212
1305.5653
George Garbis
George Garbis, Kostis Kyzirakos, and Manolis Koubarakis
Geographica: A Benchmark for Geospatial RDF Stores
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geospatial extensions of SPARQL like GeoSPARQL and stSPARQL have recently been defined and corresponding geospatial RDF stores have been implemented. However, there is no widely used benchmark for evaluating geospatial RDF stores which takes into account recent advances to the state of the art in this area. In this paper, we develop a benchmark, called Geographica, which uses both real-world and synthetic data to test the offered functionality and the performance of some prominent geospatial RDF stores.
[ { "version": "v1", "created": "Fri, 24 May 2013 08:54:46 GMT" } ]
2013-05-27T00:00:00
[ [ "Garbis", "George", "" ], [ "Kyzirakos", "Kostis", "" ], [ "Koubarakis", "Manolis", "" ] ]
new_dataset
0.999419
1305.5703
Pedro Quaresma
Pedro Quaresma and Vanda Santos and Seifeddine Bouallegue
The Web Geometry Laboratory Project
5 pages; 2 figures; Conferences on Intelligent Computer Mathematics (CICM2013), July 8-12, 2013, University of Bath, Bath, England
CICM 2013, LNAI (7961), 364-368, Springer, 2013
null
null
cs.CY cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The "Web Geometry Laboratory" (WGL) project's goal is to build an adaptive and collaborative blended-learning Web-environment for geometry. In its current version (1.0) the WGL is already a collaborative blended-learning Web-environment integrating a dynamic geometry system (DGS) and having some adaptive features. All the base features needed to implement the adaptive module and to allow the integration of a geometry automated theorem prover (GATP) are also already implemented. The actual testing of the WGL platform by high-school teachers is underway and a field-test with high-school students is being prepared. The adaptive module and the GATP integration will be the next steps of this project.
[ { "version": "v1", "created": "Fri, 24 May 2013 12:01:21 GMT" } ]
2013-05-27T00:00:00
[ [ "Quaresma", "Pedro", "" ], [ "Santos", "Vanda", "" ], [ "Bouallegue", "Seifeddine", "" ] ]
new_dataset
0.985488
1305.5710
Carst Tankink
Carst Tankink, Cezary Kaliszyk, Josef Urban, Herman Geuvers
Formal Mathematics on Display: A Wiki for Flyspeck
16 pages, published as part of the CICM 2013 conference proceedings
null
null
null
cs.MS cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Agora system is a prototype "Wiki for Formal Mathematics", with an aim to support developing and documenting large formalizations of mathematics in a proof assistant. The functions implemented in Agora include in-browser editing, strong AI/ATP proof advice, verification, and HTML rendering. The HTML rendering contains hyperlinks and provides on-demand explanation of the proof state for each proof step. In the present paper we show the prototype Flyspeck Wiki as an instance of Agora for HOL Light formalizations. The wiki can be used for formalizations of mathematics and for writing informal wiki pages about mathematics. Such informal pages may contain islands of formal text, which is used here for providing an initial cross-linking between Hales's informal Flyspeck book, and the formal Flyspeck development. The Agora platform intends to address distributed wiki-style collaboration on large formalization projects, in particular both the aspect of immediate editing, verification and rendering of formal code, and the aspect of gradual and mutual refactoring and correspondence of the initial informal text and its formalization. Here, we highlight these features within the Flyspeck Wiki.
[ { "version": "v1", "created": "Fri, 24 May 2013 12:26:45 GMT" } ]
2013-05-27T00:00:00
[ [ "Tankink", "Carst", "" ], [ "Kaliszyk", "Cezary", "" ], [ "Urban", "Josef", "" ], [ "Geuvers", "Herman", "" ] ]
new_dataset
0.999469
1305.5728
Wafaa Al-jibory
Ali El-Zaart and Wafaa Kamel Al-Jibory
Edge Detection in Radar Images Using Weibull Distribution
9 pages,6 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radar images can reveal information about the shape of the surface terrain as well as its physical and biophysical properties. Radar images have long been used in geological studies to map structural features that are revealed by the shape of the landscape. Radar imagery also has applications in vegetation and crop type mapping, landscape ecology, hydrology, and volcanology. Image processing is using for detecting for objects in radar images. Edge detection; which is a method of determining the discontinuities in gray level images; is a very important initial step in Image processing. Many classical edge detectors have been developed over time. Some of the well-known edge detection operators based on the first derivative of the image are Roberts, Prewitt, Sobel which is traditionally implemented by convolving the image with masks. Also Gaussian distribution has been used to build masks for the first and second derivative. However, this distribution has limit to only symmetric shape. This paper will use to construct the masks, the Weibull distribution which was more general than Gaussian because it has symmetric and asymmetric shape. The constructed masks are applied to images and we obtained good results.
[ { "version": "v1", "created": "Fri, 24 May 2013 13:39:18 GMT" } ]
2013-05-27T00:00:00
[ [ "El-Zaart", "Ali", "" ], [ "Al-Jibory", "Wafaa Kamel", "" ] ]
new_dataset
0.99842
0909.3221
Gwena\"el Joret
Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret, Ilan Newman, Oren Weimann
The Stackelberg Minimum Spanning Tree Game on Planar and Bounded-Treewidth Graphs
v2: Referees' comments incorporated, section on bounded-treewidth graphs expanded
Journal of Combinatorial Optimization, 25/1:19--46, 2013
10.1007/s10878-011-9414-2
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Stackelberg Minimum Spanning Tree Game is a two-level combinatorial pricing problem played on a graph representing a network. Its edges are colored either red or blue, and the red edges have a given fixed cost, representing the competitor's prices. The first player chooses an assignment of prices to the blue edges, and the second player then buys the cheapest spanning tree, using any combination of red and blue edges. The goal of the first player is to maximize the total price of purchased blue edges. We study this problem in the cases of planar and bounded-treewidth graphs. We show that the problem is NP-hard on planar graphs but can be solved in polynomial time on graphs of bounded treewidth.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 13:52:46 GMT" }, { "version": "v2", "created": "Tue, 13 Sep 2011 04:25:08 GMT" } ]
2013-05-24T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Demaine", "Erik D.", "" ], [ "Fiorini", "Samuel", "" ], [ "Joret", "Gwenaël", "" ], [ "Newman", "Ilan", "" ], [ "Weimann", "Oren", "" ] ]
new_dataset
0.998919
1305.4993
Yin Sun
Shengbo Chen, Tarun Bansal, Yin Sun, Prasun Sinha and Ness B. Shroff
Life-Add: Lifetime Adjustable Design for WiFi Networks with Heterogeneous Energy Supplies
This is the technical report of our WiOpt paper. The paper received the best student paper award at IEEE WiOpt 2013. The first three authors are co-primary authors
null
null
null
cs.IT cs.NI cs.SY math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WiFi usage significantly reduces the battery lifetime of handheld devices such as smartphones and tablets, due to its high energy consumption. In this paper, we propose "Life-Add": a Lifetime Adjustable design for WiFi networks, where the devices are powered by battery, electric power, and/or renewable energy. In Life-Add, a device turns off its radio to save energy when the channel is sensed to be busy, and sleeps for a random time period before sensing the channel again. Life-Add carefully controls the devices' average sleep periods to improve their throughput while satisfying their operation time requirement. It is proven that Life-Add achieves near-optimal proportional-fair utility performance for single access point (AP) scenarios. Moreover, Life-Add alleviates the near-far effect and hidden terminal problem in general multiple AP scenarios. Our ns-3 simulations show that Life-Add simultaneously improves the lifetime, throughput, and fairness performance of WiFi networks, and coexists harmoniously with IEEE 802.11.
[ { "version": "v1", "created": "Wed, 22 May 2013 00:33:43 GMT" } ]
2013-05-24T00:00:00
[ [ "Chen", "Shengbo", "" ], [ "Bansal", "Tarun", "" ], [ "Sun", "Yin", "" ], [ "Sinha", "Prasun", "" ], [ "Shroff", "Ness B.", "" ] ]
new_dataset
0.993216
1305.5267
Bluma Gelley
Bluma S. Gelley
Investigating Deletion in Wikipedia
null
null
null
null
cs.CY cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several hundred Wikipedia articles are deleted every day because they lack sufficient significance to be included in the encyclopedia. We collect a dataset of deleted articles and analyze them to determine whether or not the deletions were justified. We find evidence to support the hypothesis that many deletions are carried out correctly, but also find that a large number were done very quickly. Based on our conclusions, we make some recommendations to reduce the number of non-significant pages and simultaneously improve retention of new editors.
[ { "version": "v1", "created": "Wed, 22 May 2013 20:54:18 GMT" } ]
2013-05-24T00:00:00
[ [ "Gelley", "Bluma S.", "" ] ]
new_dataset
0.960073
1305.5404
Tao Qin Dr.
Wenkui Ding, Tao Wu, Tao Qin, Tie-Yan Liu
Pure Price of Anarchy for Generalized Second Price Auction
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Generalized Second Price auction (GSP) has been widely used by search engines to sell ad slots. Previous studies have shown that the pure Price Of Anarchy (POA) of GSP is 1.25 when there are two ad slots and 1.259 when three ad slots. For the cases with more than three ad slots, however, only some untight upper bounds of the pure POA were obtained. In this work, we improve previous results in two aspects: (1) We prove that the pure POA for GSP is 1.259 when there are four ad slots, and (2) We show that the pure POA for GSP with more than four ad slots is also 1.259 given the bidders are ranked according to a particular permutation.
[ { "version": "v1", "created": "Thu, 23 May 2013 12:57:26 GMT" } ]
2013-05-24T00:00:00
[ [ "Ding", "Wenkui", "" ], [ "Wu", "Tao", "" ], [ "Qin", "Tao", "" ], [ "Liu", "Tie-Yan", "" ] ]
new_dataset
0.956367
1305.5506
Robert R. Tucci
Robert R. Tucci
Introduction to Judea Pearl's Do-Calculus
16 pages (11 files: 1 .tex, 1 .sty, 9 .jpg)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a purely pedagogical paper with no new results. The goal of the paper is to give a fairly self-contained introduction to Judea Pearl's do-calculus, including proofs of his 3 rules.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 02:36:43 GMT" } ]
2013-05-24T00:00:00
[ [ "Tucci", "Robert R.", "" ] ]
new_dataset
0.989449
1207.2083
Johan P. Hansen
Johan P. Hansen
Equidistant Linear Network Codes with maximal Error-protection from Veronese Varieties
Certain conditions are not explicitely stated
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possible altered vectorspace. Ralf Koetter and Frank R. Kschischang in Coding for errors and erasures in random network coding (IEEE Transactions on Information Theory, vol.54, no.8, pp. 3579-3591,2008) introduced a metric on the set af vector-spaces and showed that a minimal distance decoder for this metric achieves correct decoding if the dimension of the intersection of the transmitted and received vector-space is sufficiently large. From the Veronese varieties we construct explicit families of vector-spaces of constant dimension where any pair of distinct vector-spaces are equidistant in the above metric. The parameters of the resulting linear network codes which have maximal error-protection are determined.
[ { "version": "v1", "created": "Mon, 9 Jul 2012 15:48:34 GMT" }, { "version": "v2", "created": "Wed, 22 May 2013 14:08:20 GMT" } ]
2013-05-23T00:00:00
[ [ "Hansen", "Johan P.", "" ] ]
new_dataset
0.999074
1305.5240
Robert Kent
Robert E. Kent
FOLE: The First-order Logical Environment
Conceptual Structures for STEM Research and Education, 20th International Conference on Conceptual Structures, ICCS 2013, Mumbai, India, January 10-12, 2013. Proceedings. Can be found online at: http://link.springer.com/chapter/10.1007%2F978-3-642-35786-2_15
Lecture Notes in Computer Science, Volume 7735, 2013, pp 210-230. Springer Berlin Heidelberg
10.1007/978-3-642-35786-2_15
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the first-order logical environment FOLE. Institutions in general, and logical environments in particular, give equivalent heterogeneous and homogeneous representations for logical systems. As such, they offer a rigorous and principled approach to distributed interoperable information systems via system consequence. Since FOLE is a particular logical environment, this provides a rigorous and principled approach to distributed interoperable first-order information systems. The FOLE represents the formalism and semantics of first-order logic in a classification form. By using an interpretation form, a companion approach defines the formalism and semantics of first-order logical/relational database systems. In a strict sense, the two forms have transformational passages (generalized inverses) between one another. The classification form of first-order logic in the FOLE corresponds to ideas discussed in the Information Flow Framework (IFF). The FOLE representation follows a conceptual structures approach, that is completely compatible with formal concept analysis and information flow.
[ { "version": "v1", "created": "Wed, 22 May 2013 19:29:37 GMT" } ]
2013-05-23T00:00:00
[ [ "Kent", "Robert E.", "" ] ]
new_dataset
0.995978
1305.2432
Yakov Babichenko
Yakov Babichenko
Small Support Equilibria in Large Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we provide a new proof for the results of Lipton et al. on the existence of an approximate Nash equilibrium with logarithmic support size. Besides its simplicity, the new proof leads to the following contributions: 1. For n-player games, we improve the bound on the size of the support of an approximate Nash equilibrium. 2. We generalize the result of Daskalakis and Papadimitriou on small probability games from the two-player case to the general n-player case. 3. We provide a logarithmic bound on the size of the support of an approximate Nash equilibrium in the case of graphical games.
[ { "version": "v1", "created": "Fri, 10 May 2013 20:31:55 GMT" }, { "version": "v2", "created": "Tue, 21 May 2013 18:49:43 GMT" } ]
2013-05-22T00:00:00
[ [ "Babichenko", "Yakov", "" ] ]
new_dataset
0.972083
1305.4786
Rasmus Jacobsen
Rasmus Melchior Jacobsen and Petar Popovski
Reliable Reception of Wireless Metering Data with Protocol Coding
Conference submission
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stationary collectors reading wireless, battery powered smart meters, often operate in harsh channel conditions to cut network installation cost to a minimum, challenging the individual link to each meter. The desired performance measure is reliable reception of at least some data from as many as possible meters, rather than increasing the fraction of received packets from one meter. As a first step for improving reliable reception, and motivated by the recent revision of Wireless M-Bus, we propose the use of a deterministic packet transmission interval to group packets from the same meter. We derive the probability of falsely pairing packets from different senders in the simple case of no channel errors, and show through simulation and data from an experimental deployment the probability of false pairing with channel errors. The pairing is an essential step towards recovery of metering data from as many as possible meters under harsh channel conditions. From the experiment we find that more than 15% of all conducted pairings are between two erroneous packets, which sets an upper bound on the number of additional meters that can be reliably recovered.
[ { "version": "v1", "created": "Tue, 21 May 2013 11:22:40 GMT" } ]
2013-05-22T00:00:00
[ [ "Jacobsen", "Rasmus Melchior", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.985661
1305.4820
Nader Jelassi
Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo
Nouvelle approche de recommandation personnalisee dans les folksonomies basee sur le profil des utilisateurs
7 pages
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In folksonomies, users use to share objects (movies, books, bookmarks, etc.) by annotating them with a set of tags of their own choice. With the rise of the Web 2.0 age, users become the core of the system since they are both the contributors and the creators of the information. Yet, each user has its own profile and its own ideas making thereby the strength as well as the weakness of folksonomies. Indeed, it would be helpful to take account of users' profile when suggesting a list of tags and resources or even a list of friends, in order to make a personal recommandation, instead of suggesting the more used tags and resources in the folksonomy. In this paper, we consider users' profile as a new dimension of a folksonomy classically composed of three dimensions <users, tags, ressources> and we propose an approach to group users with equivalent profiles and equivalent interests as quadratic concepts. Then, we use such structures to propose our personalized recommendation system of users, tags and resources according to each user's profile. Carried out experiments on two real-world datasets, i.e., MovieLens and BookCrossing highlight encouraging results in terms of precision as well as a good social evaluation.
[ { "version": "v1", "created": "Tue, 21 May 2013 13:59:51 GMT" } ]
2013-05-22T00:00:00
[ [ "Jelassi", "Mohamed Nader", "" ], [ "Yahia", "Sadok Ben", "" ], [ "Nguifo", "Engelbert Mephu", "" ] ]
new_dataset
0.999683
1204.1086
Seth Pettie
Seth Pettie
Sharp Bounds on Davenport-Schinzel Sequences of Every Order
A 10-page extended abstract will appear in the Proceedings of the Symposium on Computational Geometry, 2013
null
null
null
cs.DM cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the longest-standing open problems in computational geometry is to bound the lower envelope of $n$ univariate functions, each pair of which crosses at most $s$ times, for some fixed $s$. This problem is known to be equivalent to bounding the length of an order-$s$ Davenport-Schinzel sequence, namely a sequence over an $n$-letter alphabet that avoids alternating subsequences of the form $a \cdots b \cdots a \cdots b \cdots$ with length $s+2$. These sequences were introduced by Davenport and Schinzel in 1965 to model a certain problem in differential equations and have since been applied to bounding the running times of geometric algorithms, data structures, and the combinatorial complexity of geometric arrangements. Let $\lambda_s(n)$ be the maximum length of an order-$s$ DS sequence over $n$ letters. What is $\lambda_s$ asymptotically? This question has been answered satisfactorily (by Hart and Sharir, Agarwal, Sharir, and Shor, Klazar, and Nivasch) when $s$ is even or $s\le 3$. However, since the work of Agarwal, Sharir, and Shor in the mid-1980s there has been a persistent gap in our understanding of the odd orders. In this work we effectively close the problem by establishing sharp bounds on Davenport-Schinzel sequences of every order $s$. Our results reveal that, contrary to one's intuition, $\lambda_s(n)$ behaves essentially like $\lambda_{s-1}(n)$ when $s$ is odd. This refutes conjectures due to Alon et al. (2008) and Nivasch (2010).
[ { "version": "v1", "created": "Wed, 4 Apr 2012 22:24:14 GMT" }, { "version": "v2", "created": "Sat, 18 May 2013 18:05:53 GMT" } ]
2013-05-21T00:00:00
[ [ "Pettie", "Seth", "" ] ]
new_dataset
0.991493
1303.4194
Christoph Lange
Christoph Lange and Colin Rowat and Manfred Kerber
The ForMaRE Project - Formal Mathematical Reasoning in Economics
Conference on Intelligent Computer Mathematics, 8--12 July, Bath, UK. Published as number 7961 in Lecture Notes in Artificial Intelligence, Springer
null
null
null
cs.CE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ForMaRE project applies formal mathematical reasoning to economics. We seek to increase confidence in economics' theoretical results, to aid in discovering new results, and to foster interest in formal methods, i.e. computer-aided reasoning, within economics. To formal methods, we seek to contribute user experience feedback from new audiences, as well as new challenge problems. In the first project year, we continued earlier game theory studies but then focused on auctions, where we are building a toolbox of formalisations, and have started to study matching and financial risk. In parallel to conducting research that connects economics and formal methods, we organise events and provide infrastructure to connect both communities, from fostering mutual awareness to targeted matchmaking. These efforts extend beyond economics, towards generally enabling domain experts to use mechanised reasoning.
[ { "version": "v1", "created": "Mon, 18 Mar 2013 09:34:10 GMT" }, { "version": "v2", "created": "Thu, 25 Apr 2013 23:56:57 GMT" }, { "version": "v3", "created": "Sat, 18 May 2013 23:07:37 GMT" } ]
2013-05-21T00:00:00
[ [ "Lange", "Christoph", "" ], [ "Rowat", "Colin", "" ], [ "Kerber", "Manfred", "" ] ]
new_dataset
0.999203
1305.4199
Di Li
Di Li, Lifeng Lai, and Shuguang Cui
Quickest Change Point Detection and Identification Across a Generic Sensor Array
Quickest change detection, identification, sensor network, decentralized detection
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of quickest change point detection and identification over a linear array of $N$ sensors, where the change pattern could first reach any of these sensors, and then propagate to the other sensors. Our goal is not only to detect the presence of such a change as quickly as possible, but also to identify which sensor that the change pattern first reaches. We jointly design two decision rules: a stopping rule, which determines when we should stop sampling and claim a change occurred, and a terminal decision rule, which decides which sensor that the change pattern reaches first, with the objective to strike a balance among the detection delay, the false alarm probability, and the false identification probability. We show that this problem can be converted to a Markov optimal stopping time problem, from which some technical tools could be borrowed. Furthermore, to avoid the high implementation complexity issue of the optimal rules, we develop a scheme with a much simpler structure and certain performance guarantee.
[ { "version": "v1", "created": "Fri, 17 May 2013 22:15:55 GMT" } ]
2013-05-21T00:00:00
[ [ "Li", "Di", "" ], [ "Lai", "Lifeng", "" ], [ "Cui", "Shuguang", "" ] ]
new_dataset
0.968317
1305.4237
Ton Kloks
W. Hon, T. Kloks, S. Liu, S. Poon and Y. Wang
Independent set in categorical products of cographs and splitgraphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there are polynomial-time algorithms to compute maximum independent sets in the categorical products of two cographs and two splitgraphs. We show that the ultimate categorical independence ratio is computable in polynomial time for cographs.
[ { "version": "v1", "created": "Sat, 18 May 2013 07:07:08 GMT" } ]
2013-05-21T00:00:00
[ [ "Hon", "W.", "" ], [ "Kloks", "T.", "" ], [ "Liu", "S.", "" ], [ "Poon", "S.", "" ], [ "Wang", "Y.", "" ] ]
new_dataset
0.98133
1305.4314
Sanket Satpathy
Sanket Satpathy and Paul Cuff
Secure Cascade Channel Synthesis
ISIT 2013, 5 pages, uses IEEEtran.cls
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate channel synthesis in a cascade setting where nature provides an iid sequence $X^n$ at node 1. Node 1 can send a message at rate $R_1$ to node 2 and node 2 can send a message at rate $R_2$ to node 3. Additionally, all 3 nodes share bits of common randomness at rate $R_0$. We want to generate sequences $Y^n$ and $Z^n$ along nodes in the cascade such that $(X^n,Y^n,Z^n)$ appears to be appropriately correlated and iid even to an eavesdropper who is cognizant of the messages being sent. We characterize the optimal tradeoff between the amount of common randomness used and the required rates of communication. We also solve the problem for arbitrarily long cascades and provide an inner bound for cascade channel synthesis without an eavesdropper.
[ { "version": "v1", "created": "Sun, 19 May 2013 01:27:39 GMT" } ]
2013-05-21T00:00:00
[ [ "Satpathy", "Sanket", "" ], [ "Cuff", "Paul", "" ] ]
new_dataset
0.999003
1305.4359
Michael Adrir Scott
Michael James Scott and Gheorghita Ghinea
Promoting Game Accessibility: Experiencing an Induction on Inclusive Design Practice at the Global Games Jam
Presented at the Conference on the Foundations of Digital Games (Inaugural Workshop on the Global Games Jam), May 14-17, 2013, Chania, Greece
Proceedings of the Inaugural Workshop on the Global Games Jam (2013) SASDG: Santa Cruz, California. 17--20
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Global Games Jam (GGJ) attracts many people who are passionate about games development, coming from a range of educational backgrounds. Therefore, the event can be experienced by novices and student developers as an opportunity for learning. This provides an opening to promote themes and ideas that could help form future thinking about games design, emerging as a form of induction on key design issues for new practitioners. Such an approach aims to raise awareness about issues which learners could help develop and take with them into industry. However, the experience itself affords a deep experiential rhetoric and dialogue with experts that could be an effective pedagogical tool for issues seldom addressed deeply in formal educational settings. This paper describes an account by one such individual, being introduced to game accessibility through participation in the GGJ. As such, it is not intended as a rigorous empirical analysis, but rather a perspective on one way a game jam can be experienced, inviting further research on the topic.
[ { "version": "v1", "created": "Sun, 19 May 2013 13:02:17 GMT" } ]
2013-05-21T00:00:00
[ [ "Scott", "Michael James", "" ], [ "Ghinea", "Gheorghita", "" ] ]
new_dataset
0.999008
1305.4584
Ludovic Courtes
Ludovic Court\`es
Functional Package Management with Guix
European Lisp Symposium (2013)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the design and implementation of GNU Guix, a purely functional package manager designed to support a complete GNU/Linux distribution. Guix supports transactional upgrades and roll-backs, unprivileged package management, per-user profiles, and garbage collection. It builds upon the low-level build and deployment layer of the Nix package manager. Guix uses Scheme as its programming interface. In particular, we devise an embedded domain-specific language (EDSL) to describe and compose packages. We demonstrate how it allows us to benefit from the host general-purpose programming language while not compromising on expressiveness. Second, we show the use of Scheme to write build programs, leading to "two-tier" programming system.
[ { "version": "v1", "created": "Mon, 20 May 2013 17:38:19 GMT" } ]
2013-05-21T00:00:00
[ [ "Courtès", "Ludovic", "" ] ]
new_dataset
0.999375
1305.3931
Emrah Akyol
Emrah Akyol, Kenneth Rose, Tamer Basar
Gaussian Sensor Networks with Adversarial Nodes
5 pages, will be presented at ISIT 2013, Istanbul, Turkey
null
null
null
cs.IT cs.SY math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a particular sensor network model which involves one single Gaussian source observed by many sensors, subject to additive independent Gaussian observation noise. Sensors communicate with the receiver over an additive Gaussian multiple access channel. The aim of the receiver is to reconstruct the underlying source with minimum mean squared error. The scenario of interest here is one where some of the sensors act as adversary (jammer): they strive to maximize distortion. We show that the ability of transmitter sensors to secretly agree on a random event, that is "coordination", plays a key role in the analysis. Depending on the coordination capability of sensors and the receiver, we consider two problem settings. The first setting involves transmitters with coordination capabilities in the sense that all transmitters can use identical realization of randomized encoding for each transmission. In this case, the optimal strategy for the adversary sensors also requires coordination, where they all generate the same realization of independent and identically distributed Gaussian noise. In the second setting, the transmitter sensors are restricted to use fixed, deterministic encoders and this setting, which corresponds to a Stackelberg game, does not admit a saddle-point solution. We show that the the optimal strategy for all sensors is uncoded communications where encoding functions of adversaries and transmitters are in opposite directions. For both settings, digital compression and communication is strictly suboptimal.
[ { "version": "v1", "created": "Thu, 16 May 2013 20:30:08 GMT" } ]
2013-05-20T00:00:00
[ [ "Akyol", "Emrah", "" ], [ "Rose", "Kenneth", "" ], [ "Basar", "Tamer", "" ] ]
new_dataset
0.966031
1301.5142
Mohsen Bahrami
Mohsen Bahrami, Ali Bereyhi, Sadaf Salehkalaibar and Mohammad Reza Aref
Key agreement over a 3-receiver broadcast channel
Accepted in IWCIT 2013
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate receivers while keeping it concealed from the eavesdropper. Simultaneously, the transmitter agrees on a private key with each of the legitimate receivers that needs to be kept secret from the other legitimate receiver and the eavesdropper. For this setup, we derive inner and outer bounds on the secret key capacity region. In the second setup, we assume that a backward public channel is available among the receivers and the transmitter. Each legitimate receiver wishes to share a private key with the transmitter. For this setup, an inner bound on the private key capacity region is found. Furthermore, the capacity region of the secret key in the state-dependent wiretap channel can be deduced from our inner and outer bounds.
[ { "version": "v1", "created": "Tue, 22 Jan 2013 11:07:03 GMT" }, { "version": "v2", "created": "Thu, 16 May 2013 12:37:42 GMT" } ]
2013-05-17T00:00:00
[ [ "Bahrami", "Mohsen", "" ], [ "Bereyhi", "Ali", "" ], [ "Salehkalaibar", "Sadaf", "" ], [ "Aref", "Mohammad Reza", "" ] ]
new_dataset
0.96385
1305.2777
S{\o}ren Vind
Philip Bille, Patrick Hagge Cording, Inge Li G{\o}rtz, Benjamin Sach, Hjalte Wedel Vildh{\o}j, S{\o}ren Vind
Fingerprints in Compressed Strings
An extended abstract of this paper will appear at WADS 2013
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Karp-Rabin fingerprint of a string is a type of hash value that due to its strong properties has been used in many string algorithms. In this paper we show how to construct a data structure for a string $S$ of size $N$ compressed by a context-free grammar of size $n$ that answers fingerprint queries. That is, given indices $i$ and $j$, the answer to a query is the fingerprint of the substring $S[i,j]$. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get $O(\log N)$ query time, and for Linear SLPs (an SLP derivative that captures LZ78 compression and its variations) we get $O(\log \log N)$ query time. Hence, our data structures has the same time and space complexity as for random access in SLPs. We utilize the fingerprint data structures to solve the longest common extension problem in query time $O(\log N \log \lce)$ and $O(\log \lce \log\log \lce + \log\log N)$ for SLPs and Linear SLPs, respectively. Here, $\lce$ denotes the length of the LCE.
[ { "version": "v1", "created": "Mon, 13 May 2013 13:50:11 GMT" }, { "version": "v2", "created": "Thu, 16 May 2013 12:32:19 GMT" } ]
2013-05-17T00:00:00
[ [ "Bille", "Philip", "" ], [ "Cording", "Patrick Hagge", "" ], [ "Gørtz", "Inge Li", "" ], [ "Sach", "Benjamin", "" ], [ "Vildhøj", "Hjalte Wedel", "" ], [ "Vind", "Søren", "" ] ]
new_dataset
0.99836
1305.3827
Zahra Jafargholi
Zahra Jafargholi and Emanuele Viola
3SUM, 3XOR, Triangles
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that if one can solve 3SUM on a set of size n in time n^{1+\e} then one can list t triangles in a graph with m edges in time O(m^{1+\e}t^{1/3-\e/3}). This is a reversal of Patrascu's reduction from 3SUM to listing triangles (STOC '10). Our result builds on and extends works by the Paghs (PODS '06) and by Vassilevska and Williams (FOCS '10). We make our reductions deterministic using tools from pseudorandomness. We then re-execute both Patrascu's reduction and our reversal for the variant 3XOR of 3SUM where integer summation is replaced by bit-wise xor. As a corollary we obtain that if 3XOR is solvable in linear time but 3SUM requires quadratic randomized time, or vice versa, then the randomized time complexity of listing m triangles in a graph with $m$ edges is m^{4/3} up to a factor m^\alpha for any \alpha > 0.
[ { "version": "v1", "created": "Thu, 16 May 2013 14:50:07 GMT" } ]
2013-05-17T00:00:00
[ [ "Jafargholi", "Zahra", "" ], [ "Viola", "Emanuele", "" ] ]
new_dataset
0.994573
1305.3314
Shiri Chechik
Shiri Chechik
Approximate Distance Oracle with Constant Query Time
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An approximate distance oracle is a succinct data structure that provides fast answers to distance queries between any two nodes. In this paper we consider approximate distance oracles for general undirected graphs with non-negative edge weights with constant query time. We present a distance oracle of size O(k n^{1+1/k}), with 2k-1 stretch and O(1) query time. This improves the O(log{k}) query time of Wulff-Nilsen's distance oracle [SODA '13], which in turn improved the O(k) query time of Thorup and Zwick's distance oracle [J. ACM '05].
[ { "version": "v1", "created": "Tue, 14 May 2013 22:09:01 GMT" } ]
2013-05-16T00:00:00
[ [ "Chechik", "Shiri", "" ] ]
new_dataset
0.994006
1305.3358
Satyajit Thakor
Satyajit Thakor, Terence Chan, Kenneth W. Shum
Symmetry in Distributed Storage Systems
Accepted, ISIT 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The max-flow outer bound is achievable by regenerating codes for functional repair distributed storage system. However, the capacity of exact repair distributed storage system is an open problem. In this paper, the linear programming bound for exact repair distributed storage systems is formulated. A notion of symmetrical sets for a set of random variables is given and equalities of joint entropies for certain subsets of random variables in a symmetrical set is established. Concatenation coding scheme for exact repair distributed storage systems is proposed and it is shown that concatenation coding scheme is sufficient to achieve any admissible rate for any exact repair distributed storage system. Equalities of certain joint entropies of random variables induced by concatenation scheme is shown. These equalities of joint entropies are new tools to simplify the linear programming bound and to obtain stronger converse results for exact repair distributed storage systems.
[ { "version": "v1", "created": "Wed, 15 May 2013 05:41:02 GMT" } ]
2013-05-16T00:00:00
[ [ "Thakor", "Satyajit", "" ], [ "Chan", "Terence", "" ], [ "Shum", "Kenneth W.", "" ] ]
new_dataset
0.97266
1305.3568
Xin Jin
Xin Jin, Li Erran Li, Laurent Vanbever, Jennifer Rexford
SoftCell: Taking Control of Cellular Core Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing cellular networks suffer from inflexible and expensive equipment, and complex control-plane protocols. To address these challenges, we present SoftCell, a scalable architecture for supporting fine-grained policies for mobile devices in cellular core networks. The SoftCell controller realizes high-level service polices by directing traffic over paths that traverse a sequence of middleboxes, optimized to the network conditions and user locations. To ensure scalability, the core switches forward traffic on hierarchical addresses (grouped by base station) and policy tags (identifying paths through middleboxes). This minimizes data-plane state in the core switches, and pushes all fine-grained state to software switches at the base stations. These access switches apply fine-grained rules, specified by the controller, to map all traffic to the appropriate addresses and tags. SoftCell guarantees that packets in the same connection traverse the same sequence of middleboxes in both directions, even in the presence of mobility. Our characterization of real LTE workloads, micro-benchmarks on our prototype controller, and large-scale simulations demonstrate that SoftCell improves the flexibility of cellular core networks, while enabling the use of inexpensive commodity switches and middleboxes.
[ { "version": "v1", "created": "Wed, 15 May 2013 18:00:02 GMT" } ]
2013-05-16T00:00:00
[ [ "Jin", "Xin", "" ], [ "Li", "Li Erran", "" ], [ "Vanbever", "Laurent", "" ], [ "Rexford", "Jennifer", "" ] ]
new_dataset
0.999669
1108.6132
Shiqiang Wang Mr.
Shiqiang Wang, Qingyang Song, Xingwei Wang, and Abbas Jamalipour
Distributed MAC Protocol Supporting Physical-Layer Network Coding
Final version
IEEE Transactions on Mobile Computing, vol. 12, no. 5, pp. 1023-1036, May 2013
10.1109/TMC.2012.69
null
cs.NI cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physical-layer network coding (PNC) is a promising approach for wireless networks. It allows nodes to transmit simultaneously. Due to the difficulties of scheduling simultaneous transmissions, existing works on PNC are based on simplified medium access control (MAC) protocols, which are not applicable to general multi-hop wireless networks, to the best of our knowledge. In this paper, we propose a distributed MAC protocol that supports PNC in multi-hop wireless networks. The proposed MAC protocol is based on the carrier sense multiple access (CSMA) strategy and can be regarded as an extension to the IEEE 802.11 MAC protocol. In the proposed protocol, each node collects information on the queue status of its neighboring nodes. When a node finds that there is an opportunity for some of its neighbors to perform PNC, it notifies its corresponding neighboring nodes and initiates the process of packet exchange using PNC, with the node itself as a relay. During the packet exchange process, the relay also works as a coordinator which coordinates the transmission of source nodes. Meanwhile, the proposed protocol is compatible with conventional network coding and conventional transmission schemes. Simulation results show that the proposed protocol is advantageous in various scenarios of wireless applications.
[ { "version": "v1", "created": "Wed, 31 Aug 2011 06:32:57 GMT" }, { "version": "v2", "created": "Fri, 25 Nov 2011 18:04:44 GMT" }, { "version": "v3", "created": "Sat, 11 May 2013 19:13:39 GMT" } ]
2013-05-15T00:00:00
[ [ "Wang", "Shiqiang", "" ], [ "Song", "Qingyang", "" ], [ "Wang", "Xingwei", "" ], [ "Jamalipour", "Abbas", "" ] ]
new_dataset
0.998514
1305.2999
Xingqin Lin
Xingqin Lin, Harish Viswanathan
Dynamic Spectrum Refarming of GSM Spectrum for LTE Small Cells
8 pages, 7 figures, submitted to IEEE Globecom 2013 Intl. Workshop on Heterogeneous and Small Cell Networks
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a novel solution called dynamic spectrum refarming (DSR) for deploying LTE small cells using the same spectrum as existing GSM networks. The basic idea of DSR is that LTE small cells are deployed in the GSM spectrum but suppress transmission of all signals including the reference signals in some specific physical resource blocks corresponding to a portion of the GSM carriers to ensure full GSM coverage. Our study shows that the proposed solution can provide LTE mobile terminals with high speed data services when they are in the coverage of the LTE small cells while minimally affecting the service provided to GSM terminals located within the LTE small cell coverage area. Thus, the proposal allows the normal operation of the existing GSM networks even with LTE small cells deployed in that spectrum. Though the focus of this paper is about GSM spectrum refarming, an analogous approach can be applied to reuse code division multiple access (CDMA) spectrum for LTE small cells.
[ { "version": "v1", "created": "Tue, 14 May 2013 02:08:16 GMT" } ]
2013-05-15T00:00:00
[ [ "Lin", "Xingqin", "" ], [ "Viswanathan", "Harish", "" ] ]
new_dataset
0.962394
1305.3011
Ali Jalali
Kuang-Chih Lee, Ali Jalali and Ali Dasdan
Real Time Bid Optimization with Smooth Budget Delivery in Online Advertising
null
null
null
null
cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, billions of display ad impressions are purchased on a daily basis through a public auction hosted by real time bidding (RTB) exchanges. A decision has to be made for advertisers to submit a bid for each selected RTB ad request in milliseconds. Restricted by the budget, the goal is to buy a set of ad impressions to reach as many targeted users as possible. A desired action (conversion), advertiser specific, includes purchasing a product, filling out a form, signing up for emails, etc. In addition, advertisers typically prefer to spend their budget smoothly over the time in order to reach a wider range of audience accessible throughout a day and have a sustainable impact. However, since the conversions occur rarely and the occurrence feedback is normally delayed, it is very challenging to achieve both budget and performance goals at the same time. In this paper, we present an online approach to the smooth budget delivery while optimizing for the conversion performance. Our algorithm tries to select high quality impressions and adjust the bid price based on the prior performance distribution in an adaptive manner by distributing the budget optimally across time. Our experimental results from real advertising campaigns demonstrate the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Tue, 14 May 2013 03:39:45 GMT" } ]
2013-05-15T00:00:00
[ [ "Lee", "Kuang-Chih", "" ], [ "Jalali", "Ali", "" ], [ "Dasdan", "Ali", "" ] ]
new_dataset
0.987824
1305.3105
Daqiang Zhang
Daqiang Zhang, Qin Zou, Zhiren Sun
SECA: Snapshot-based Event Detection for Checking Asynchronous Context Consistency in Ubiquitous Computing
This paper is not presented in WCNC'2012 as I missed the time owing to the traffic jam. So the paper is not included in IEEE Explorer, although it is in the Proceedings of the WCNC'2012. in Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012), pp. 3339--3344
null
null
null
cs.DC cs.ET cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context-consistency checking is challenging in the dynamic and uncertain ubiquitous computing environments. This is because contexts are often noisy owing to unreliable sensing data streams, inaccurate data measurement, fragile connectivity and resource constraints. One of the state-of-the-art efforts is CEDA, which concurrently detects context consistency by exploring the \emph{happened-before} relation among events. However, CEDA is seriously limited by several side effects --- centralized detection manner that easily gets down the checker process, heavy computing complexity and false negative. In this paper, we propose SECA: Snapshot-based Event Detection for Checking Asynchronous Context Consistency in ubiquitous computing. SECA introduces snapshot-based timestamp to check event relations, which can detect scenarios where CEDA fails. Moreover, it simplifies the logical clock instead of adopting the vector clock, and thus significantly reduces both time and space complexity. Empirical studies show that SECA outperforms CEDA in terms of detection accuracy, scalability, and computing complexity.
[ { "version": "v1", "created": "Tue, 14 May 2013 10:48:54 GMT" } ]
2013-05-15T00:00:00
[ [ "Zhang", "Daqiang", "" ], [ "Zou", "Qin", "" ], [ "Sun", "Zhiren", "" ] ]
new_dataset
0.998019
1305.3199
Philipp Winter
Philipp Winter, Tobias Pulls, Juergen Fuss
ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep packet inspection technology became a cornerstone of Internet censorship by facilitating cheap and effective filtering of what censors consider undesired information. Moreover, filtering is not limited to simple pattern matching but makes use of sophisticated techniques such as active probing and protocol classification to block access to popular circumvention tools such as Tor. In this paper, we propose ScrambleSuit; a thin protocol layer above TCP whose purpose is to obfuscate the transported application data. By using morphing techniques and a secret exchanged out-of-band, we show that ScrambleSuit can defend against active probing and other fingerprinting techniques such as protocol classification and regular expressions. We finally demonstrate that our prototype exhibits little overhead and enables effective and lightweight obfuscation for application layer protocols.
[ { "version": "v1", "created": "Tue, 14 May 2013 16:19:53 GMT" } ]
2013-05-15T00:00:00
[ [ "Winter", "Philipp", "" ], [ "Pulls", "Tobias", "" ], [ "Fuss", "Juergen", "" ] ]
new_dataset
0.978217
1305.3203
Gurpreet Saini
Gurpreet Singh Saini, Ashish Kots, Manoj Kumar
DREAM_OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)
Published at IJCTT, 2013 Volume4 Issue5 http://www.ijcttjournal.org/volume-4/issue-5/IJCTT-V4I5P25.pdf
null
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
This paper lays down a proposal of protocol named DREAM_OLSR. The protocol has been developed so as to effect current OLSR (RFC 3626) [4] protocol. The protocol establishes an optimized solution hence the name has been manipulated from Open Link State Routing to DREAM Optimized Link State Routing. DREAM specifies Distance Routing Effective Algorithm for Mobility wherein it implements the Distance routing effective algorithm for the optimized solution. This optimization includes higher efficiency and fewer overheads for the MANET.
[ { "version": "v1", "created": "Tue, 14 May 2013 16:33:40 GMT" } ]
2013-05-15T00:00:00
[ [ "Saini", "Gurpreet Singh", "" ], [ "Kots", "Ashish", "" ], [ "Kumar", "Manoj", "" ] ]
new_dataset
0.96176
1305.3213
Sowmyan Jegatheesan
Senthur Balan S, Sowmyan Jegatheesan and Sakthi Ganesh M
The Product Promotion and Consumer Retention Gap in Online Shopping
4 Pages,1 Table, 2012 4th International Conference on Electronics Computer Technology (ICECT 2012) 978-1-4673-1850-1/12 2012 IEEE Page 158-161
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number of online shopping websites increases day by day, so are the online advertisement strategies and promotional techniques. The number of people who uses internet keeps on increasing daily and it has become a vast marketplace to promote products, surely it will be a prime reason to drive any companies growth in the future.This paper primarily focuses on the areas on which online shopping lags product promotion and customer retention. Sellers must concentrate on the areas in which online marketing lags product promotion techniques; also they should introduce new strategies to increase their market share to gain customers attention towards their products.
[ { "version": "v1", "created": "Tue, 14 May 2013 17:14:57 GMT" } ]
2013-05-15T00:00:00
[ [ "S", "Senthur Balan", "" ], [ "Jegatheesan", "Sowmyan", "" ], [ "M", "Sakthi Ganesh", "" ] ]
new_dataset
0.9972
1202.6174
Kiril Solovey
Kiril Solovey and Dan Halperin
k-Color Multi-Robot Motion Planning
23
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple and natural extension of the multi-robot motion planning problem where the robots are partitioned into groups (colors), such that in each group the robots are interchangeable. Every robot is no longer required to move to a specific target, but rather to some target placement that is assigned to its group. We call this problem k-color multi-robot motion planning and provide a sampling-based algorithm specifically designed for solving it. At the heart of the algorithm is a novel technique where the k-color problem is reduced to several discrete multi-robot motion planning problems. These reductions amplify basic samples into massive collections of free placements and paths for the robots. We demonstrate the performance of the algorithm by an implementation for the case of disc robots and polygonal robots translating in the plane. We show that the algorithm successfully and efficiently copes with a variety of challenging scenarios, involving many robots, while a simplified version of this algorithm, that can be viewed as an extension of a prevalent sampling-based algorithm for the k-color case, fails even on simple scenarios. Interestingly, our algorithm outperforms a well established implementation of PRM for the standard multi-robot problem, in which each robot has a distinct color.
[ { "version": "v1", "created": "Tue, 28 Feb 2012 10:37:05 GMT" }, { "version": "v2", "created": "Sat, 13 Oct 2012 09:48:38 GMT" }, { "version": "v3", "created": "Mon, 13 May 2013 19:24:27 GMT" } ]
2013-05-14T00:00:00
[ [ "Solovey", "Kiril", "" ], [ "Halperin", "Dan", "" ] ]
new_dataset
0.96662
1303.6034
Akira SaiToh
Akira SaiToh
ZKCM: a C++ library for multiprecision matrix computation with applications in quantum information
19 pages, 5 figures, to appear in Comput. Phys. Comm.; this is an extended version of arXiv:1111.3124, v2: typographical corrections only
Comput. Phys. Comm. 184, 2005-2020 (2013)
10.1016/j.cpc.2013.03.022
null
cs.MS physics.comp-ph quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ZKCM is a C++ library developed for the purpose of multiprecision matrix computation, on the basis of the GNU MP and MPFR libraries. It provides an easy-to-use syntax and convenient functions for matrix manipulations including those often used in numerical simulations in quantum physics. Its extension library, ZKCM_QC, is developed for simulating quantum computing using the time-dependent matrix-product-state simulation method. This paper gives an introduction about the libraries with practical sample programs.
[ { "version": "v1", "created": "Mon, 25 Mar 2013 06:18:35 GMT" }, { "version": "v2", "created": "Mon, 15 Apr 2013 10:46:46 GMT" } ]
2013-05-14T00:00:00
[ [ "SaiToh", "Akira", "" ] ]
new_dataset
0.999619
1305.2548
Ilan Shomorony
Ra\'ul Etkin, Farzad Parvaresh, Ilan Shomorony, A. Salman Avestimehr
On Min-Cut Algorithms for Half-Duplex Relay Networks
Submitted to IEEE Transactions on Information Theory. Part of this work will be presented at ISIT 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing the cut-set bound in half-duplex relay networks is a challenging optimization problem, since it requires finding the cut-set optimal half-duplex schedule. This subproblem in general involves an exponential number of variables, since the number of ways to assign each node to either transmitter or receiver mode is exponential in the number of nodes. We present a general technique that takes advantage of specific structures in the topology of a given network and allows us to reduce the complexity of computing the half-duplex schedule that maximizes the cut-set bound (with i.i.d. input distribution). In certain classes of network topologies, our approach yields polynomial time algorithms. We use simulations to show running time improvements over alternative methods and compare the performance of various half-duplex scheduling approaches in different SNR regimes.
[ { "version": "v1", "created": "Sun, 12 May 2013 00:31:55 GMT" } ]
2013-05-14T00:00:00
[ [ "Etkin", "Raúl", "" ], [ "Parvaresh", "Farzad", "" ], [ "Shomorony", "Ilan", "" ], [ "Avestimehr", "A. Salman", "" ] ]
new_dataset
0.97144
1305.2636
Mark Korenblit
Mark Korenblit
Full Square Rhomboids and Their Algebraic Expressions
13 pages, 10 figures. arXiv admin note: substantial text overlap with arXiv:1211.1661
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates relationship between algebraic expressions and graphs. We consider a digraph called a full square rhomboid that is an example of non-series-parallel graphs. Our intention is to simplify the expressions of full square rhomboids and eventually find their shortest representations. With that end in view, we describe two decomposition methods for generating expressions of full square rhomboids and carry out their comparative analysis.
[ { "version": "v1", "created": "Sun, 12 May 2013 21:30:50 GMT" } ]
2013-05-14T00:00:00
[ [ "Korenblit", "Mark", "" ] ]
new_dataset
0.997415
1305.2724
Said Broumi
Said Broumi
Generalized Neutrosophic Soft Set
14 pages, 11 figures
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.3, No.2,April2013
10.5121/ijcseit.2013.3202
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new concept called generalized neutrosophic soft set. This concept incorporates the beneficial properties of both generalized neutrosophic set introduced by A.A. Salama [7]and soft set techniques proposed by Molodtsov [4]. We also study some properties of this concept. Some definitions and operations have been introduced on generalized neutrosophic soft set. Finally we present an application of generalized neuutrosophic soft set in decision making problem.
[ { "version": "v1", "created": "Mon, 13 May 2013 09:42:50 GMT" } ]
2013-05-14T00:00:00
[ [ "Broumi", "Said", "" ] ]
new_dataset
0.983151
1305.2837
Urmila Shrawankar Ms
Sumedha Chokhandre and Urmila Shrawankar
An Algorithm to Improve Performance over Multihop Wireless Mesh Network
Pages: 05 Figures: 07
Journal of Computing, Volume 3, Issue 5, May 2011, ISSN 2151-9617, pp 155,159
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmission Control Protocol (TCP) is the dominant reliable transport protocol utilized in the Internet. Improving the performance of TCP associated with the presence of multi-hop is one of the research challenges in wireless mesh networks. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. In wireless mesh network, when congestion loss and wireless loss are co-existed the number of packets dropped increases and will have adverse effects on TCP and its congestion control mechanism which leads to low throughput. Here we have designed a new TCP scheme for multi-hop wireless mesh networks, by modifying the sender side congestion control functionality of TCP NewReno, which is tuned towards improving the performance of TCP. The simulation results show that TCP SAC has higher performance than TCP NewReno, Reno, Sack and Vegas in multi-hop wireless mesh networks.
[ { "version": "v1", "created": "Fri, 10 May 2013 07:32:53 GMT" } ]
2013-05-14T00:00:00
[ [ "Chokhandre", "Sumedha", "" ], [ "Shrawankar", "Urmila", "" ] ]
new_dataset
0.990086
1305.2865
Sultan Ullah
Sultan Ullah and Zheng Xuefeng and Zhou Feng
TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing
null
International Journal of Computer Applications, Volume 62, No.2, January 2013, 01-07
10.5120/10049-4636
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources services against security infringements. Based on analysis of current cloud computing security characteristics, the preamble of the concept of trust, role-based access control policy, combined with the characteristics of the cloud computing environment, there are multiple security management domains, so a new cross domain framework is for access control is proposed which is based on trust. It will establish and calculate the degree of trust in the single as well as multiple domains. Role Based Access Control is used for the implementation of the access control policies in a single domain environment with the introduction of the trust concept. In multiple domains the access control will be based on the conversion of roles. On the basis of trust, and role based access control model, a new novel framework of flexible cross domain access control framework is presented. The role assignment and conversion will take place dynamically.
[ { "version": "v1", "created": "Wed, 10 Apr 2013 09:16:17 GMT" } ]
2013-05-14T00:00:00
[ [ "Ullah", "Sultan", "" ], [ "Xuefeng", "Zheng", "" ], [ "Feng", "Zhou", "" ] ]
new_dataset
0.999598
1304.4682
Yuan Li
Yuan Li, Haoyu Gao, Mingmin Yang, Wanqiu Guan, Haixin Ma, Weining Qian, Zhigang Cao, Xiaoguang Yang
What are Chinese Talking about in Hot Weibos?
null
null
null
null
cs.SI cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SinaWeibo is a Twitter-like social network service emerging in China in recent years. People can post weibos (microblogs) and communicate with others on it. Based on a dataset of 650 million weibos from August 2009 to January 2012 crawled from APIs of SinaWeibo, we study the hot ones that have been reposted for at least 1000 times. We find that hot weibos can be roughly classified into eight categories, i.e. Entertainment & Fashion, Hot Social Events, Leisure & Mood, Life & Health, Seeking for Help, Sales Promotion, Fengshui & Fortune and Deleted Weibos. In particular, Leisure & Mood and Hot Social Events account for almost 65% of all the hot weibos. This reflects very well the fundamental dual-structure of the current society of China: On the one hand, economy has made a great progress and quite a part of people are now living a relatively prosperous and fairly easy life. On the other hand, there still exist quite a lot of serious social problems, such as government corruptions and environmental pollutions. It is also shown that users' posting and reposting behaviors are greatly affected by their identity factors (gender, verification status, and regional location). For instance, (1) Two thirds of the hot weibos are created by male users. (2) Although verified users account for only 0.1% in SinaWeibo, 46.5% of the hot weibos are contributed by them. Very interestingly, 39.2% are written by SPA users. A more or less pathetic fact is that only 14.4% of the hot weibos are created by grassroots (individual users that are neither SPA nor verified). (3) Users from different areas of China have distinct posting and reposting behaviors which usually reflect very their local cultures. Homophily is also examined for people's reposting behaviors.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 04:25:33 GMT" }, { "version": "v2", "created": "Fri, 10 May 2013 09:52:35 GMT" } ]
2013-05-13T00:00:00
[ [ "Li", "Yuan", "" ], [ "Gao", "Haoyu", "" ], [ "Yang", "Mingmin", "" ], [ "Guan", "Wanqiu", "" ], [ "Ma", "Haixin", "" ], [ "Qian", "Weining", "" ], [ "Cao", "Zhigang", "" ], [ "Yang", "Xiaoguang", "" ] ]
new_dataset
0.999299
1305.2233
Tianyang Bai
Tianyang Bai and Robert W. Heath, Jr
Asymptotic Coverage Probability and Rate in Massive MIMO Networks
Submitted to IEEE Wireless Communications Letters, May 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive multiple-input multiple-output (MIMO) is a transmission technique for cellular systems that uses many antennas to support not-as-many users. Thus far, the performance of massive MIMO has only been examined in finite cellular networks. In this letter, we analyze its performance in random cellular networks with Poisson distributed base station locations. Specifically, we provide analytical expressions for the asymptotic coverage probability and rate in both downlink and uplink when each base station has a large number of antennas. The results show that, though limited by pilot contamination, massive MIMO can provide significantly higher asymptotic data rate per user than the single-antenna network.
[ { "version": "v1", "created": "Fri, 10 May 2013 00:53:46 GMT" } ]
2013-05-13T00:00:00
[ [ "Bai", "Tianyang", "" ], [ "Heath,", "Robert W.", "Jr" ] ]
new_dataset
0.980768
1305.2322
Harry Boyer
Harimalala Razanamanampisoa, Zely Arivelo Randriamanantany, Hery Tiana Rakotondramiarana, Fran\c{c}ois Garde (PIMENT), Harry Boyer (PIMENT)
Simulation of a typical house in the region of Antananarivo, Madagascar. Determination of passive solutions using local materials
null
3rd International Madagascar Conference in High-Energy Physics (HEP-MAD 07), Antanarivo : Madagascar (2007)
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with new proposals for the design of passive solutions adapted to the climate of the highlands of Madagascar. While the strongest population density is located in the central highlands, the problem of thermal comfort in buildings occurs mainly during winter time. Currently, people use raw wood to warm the poorly designed houses. This leads to a large scale deforestation of the areas and causes erosion and environmental problems. The methodology used consisted of the identification of a typical building and of a typical meteorological year. Simulations were carried out using a thermal and airflow software (CODYRUN) to improve each building component (roof, walls, windows, and soil) in such a way as to estimate the influence of some technical solutions on each component in terms of thermal comfort. The proposed solutions also took into account the use of local materials and the standard of living of the country.
[ { "version": "v1", "created": "Fri, 10 May 2013 12:16:41 GMT" } ]
2013-05-13T00:00:00
[ [ "Razanamanampisoa", "Harimalala", "", "PIMENT" ], [ "Randriamanantany", "Zely Arivelo", "", "PIMENT" ], [ "Rakotondramiarana", "Hery Tiana", "", "PIMENT" ], [ "Garde", "François", "", "PIMENT" ], [ "Boyer", "Harry", "", "PIMENT" ] ]
new_dataset
0.98197
1305.2387
Zhang Lei
Jianxin Liao, Lei Zhang, Xiaomin Zhu, Jingyu Wang, Minyan Liao
Loss Rate Based Fountain Codes for Data Transfer
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fountain codes are becoming increasingly important for data transferring over dedicated high-speed long-distance network. However, the encoding and decoding complexity of traditional fountain codes such as LT and Raptor codes are still high. In this paper, a new fountain codes named LRF (Loss Rate Based Fountain) codes for data transfer is proposed. In order to improve the performance of encoding and decoding efficiency and decrease the number of redundant encoding symbols, an innovative degree distribution instead of robust soliton degree distribution in LT (Luby Transfer) codes is proposed. In LRF codes, the degree of encoding symbol is decided by loss rate property, and the window size is extended dynamic. Simulations result using LRF codes show that the proposed method has better performance in term of encoding ratio, degree ratio, encoding and decoding efficiency with respect to LT and Raptor codes.
[ { "version": "v1", "created": "Fri, 10 May 2013 17:05:17 GMT" } ]
2013-05-13T00:00:00
[ [ "Liao", "Jianxin", "" ], [ "Zhang", "Lei", "" ], [ "Zhu", "Xiaomin", "" ], [ "Wang", "Jingyu", "" ], [ "Liao", "Minyan", "" ] ]
new_dataset
0.998891
1305.2395
Toshiro Kubota
Toshiro Kubota, Jessica Ranck, Briley Acker, and Herman De Haan
Shape Reconstruction and Recognition with Isolated Non-directional Cues
28 pages, 14 figures, 4 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates a hypothesis that our visual system groups visual cues based on how they form a surface, or more specifically triangulation derived from the visual cues. To test our hypothesis, we compare shape recognition with three different representations of visual cues: a set of isolated dots delineating the outline of the shape, a set of triangles obtained from Delaunay triangulation of the set of dots, and a subset of Delaunay triangles excluding those outside of the shape. Each participant was assigned to one particular representation type and increased the number of dots (and consequentially triangles) until the underlying shape could be identified. We compare the average number of dots needed for identification among three types of representations. Our hypothesis predicts that the results from the three representations will be similar. However, they show statistically significant differences. The paper also presents triangulation based algorithms for reconstruction and recognition of a shape from a set of isolated dots. Experiments showed that the algorithms were more effective and perceptually agreeable than similar contour based ones. From these experiments, we conclude that triangulation does affect our shape recognition. However, the surface based approach presents a number of computational advantages over the contour based one and should be studied further.
[ { "version": "v1", "created": "Fri, 10 May 2013 17:35:02 GMT" } ]
2013-05-13T00:00:00
[ [ "Kubota", "Toshiro", "" ], [ "Ranck", "Jessica", "" ], [ "Acker", "Briley", "" ], [ "De Haan", "Herman", "" ] ]
new_dataset
0.981033
1208.4721
Willi-Hans Steeb WHS
Willi-Hans Steeb and Yorick Hardy
Hamilton Operators, Discrete Symmetries, Brute Force and SymbolicC++
null
Int. J. Mod. Phys. C 24, 1250095 (2013)
10.1142/S0129183112500957
null
cs.MS math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To find the discrete symmetries of a Hamilton operator $\hat H$ is of central importance in quantum theory. Here we describe and implement a brute force method to determine the discrete symmetries given by permutation matrices for Hamilton operators acting in a finite-dimensional Hilbert space. Spin and Fermi systems are considered as examples. A computer algebra implementation in SymbolicC++ is provided.
[ { "version": "v1", "created": "Thu, 23 Aug 2012 11:09:57 GMT" } ]
2013-05-10T00:00:00
[ [ "Steeb", "Willi-Hans", "" ], [ "Hardy", "Yorick", "" ] ]
new_dataset
0.980657
1305.1375
Rob Gysel
Rob Gysel
Unique Perfect Phylogeny Characterizations via Uniquely Representable Chordal Graphs
null
null
null
null
cs.DM cs.CE math.CO q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The perfect phylogeny problem is a classic problem in computational biology, where we seek an unrooted phylogeny that is compatible with a set of qualitative characters. Such a tree exists precisely when an intersection graph associated with the character set, called the partition intersection graph, can be triangulated using a restricted set of fill edges. Semple and Steel used the partition intersection graph to characterize when a character set has a unique perfect phylogeny. Bordewich, Huber, and Semple showed how to use the partition intersection graph to find a maximum compatible set of characters. In this paper, we build on these results, characterizing when a unique perfect phylogeny exists for a subset of partial characters. Our characterization is stated in terms of minimal triangulations of the partition intersection graph that are uniquely representable, also known as ur-chordal graphs. Our characterization is motivated by the structure of ur-chordal graphs, and the fact that the block structure of minimal triangulations is mirrored in the graph that has been triangulated.
[ { "version": "v1", "created": "Tue, 7 May 2013 01:20:15 GMT" }, { "version": "v2", "created": "Wed, 8 May 2013 08:15:31 GMT" } ]
2013-05-09T00:00:00
[ [ "Gysel", "Rob", "" ] ]
new_dataset
0.984748
1305.1737
Rushan Ziatdinov
Rushan Ziatdinov, Rifkat I. Nabiyev, Kenjiro T. Miura
MC-curves and aesthetic measurements for pseudospiral curve segments
null
Mathematical Design & Technical Aesthetics 1(1), 6-17, 2013
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article studies families of curves with monotonic curvature function (MC-curves) and their applications in geometric modelling and aesthetic design. Aesthetic analysis and assessment of the structure and plastic qualities of pseudospirals, which are curves with monotonic curvature function, are conducted for the first time in the field of geometric modelling from the position of technical aesthetics laws. The example of car body surface modelling with the use of aesthetics splines is given.
[ { "version": "v1", "created": "Wed, 8 May 2013 07:59:52 GMT" } ]
2013-05-09T00:00:00
[ [ "Ziatdinov", "Rushan", "" ], [ "Nabiyev", "Rifkat I.", "" ], [ "Miura", "Kenjiro T.", "" ] ]
new_dataset
0.989255
1202.1387
Somayeh Salimi
Somayeh Salimi, Mikael Skoglund, Mahmoud Salmasizadeh, Mohammad Reza Aref
Successive Secret Key Agreement over Generalized Multiple Access and Broadcast Channels
This paper has been withdrawn by the author due to the fact that an extended version is accepted in IEEE J-SAC
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A secret key agreement framework between three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a broadcast channel (BC) from user 3 to users 1 and 2. Secret key sharing is intended where GDMMAC and BC can be successively used. In this framework, an inner bound of the secret key capacity region is derived. Moreover, for a special case where the channel inputs and outputs of the GDMAC and the BC form Markov chains in some order, the secret key capacity region is derived. Also the results are discussed through a binary example.
[ { "version": "v1", "created": "Tue, 7 Feb 2012 10:04:48 GMT" }, { "version": "v2", "created": "Mon, 7 May 2012 10:46:04 GMT" }, { "version": "v3", "created": "Tue, 7 May 2013 11:38:42 GMT" } ]
2013-05-08T00:00:00
[ [ "Salimi", "Somayeh", "" ], [ "Skoglund", "Mikael", "" ], [ "Salmasizadeh", "Mahmoud", "" ], [ "Aref", "Mohammad Reza", "" ] ]
new_dataset
0.998568
1305.1293
Xiang Ying Xiang Ying
Xiang Ying, Shi-Qing Xin, Ying He
Parallel Chen-Han (PCH) Algorithm for Discrete Geodesics
10 pages, accepted to ACM Transactions on Graphics with major revision
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many graphics applications, the computation of exact geodesic distance is very important. However, the high computational cost of the existing geodesic algorithms means that they are not practical for large-scale models or time-critical applications. To tackle this challenge, we propose the parallel Chen-Han (or PCH) algorithm, which extends the classic Chen-Han (CH) discrete geodesic algorithm to the parallel setting. The original CH algorithm and its variant both lack a parallel solution because the windows (a key data structure that carries the shortest distance in the wavefront propagation) are maintained in a strict order or a tightly coupled manner, which means that only one window is processed at a time. We propose dividing the CH's sequential algorithm into four phases, window selection, window propagation, data organization, and events processing so that there is no data dependence or conflicts in each phase and the operations within each phase can be carried out in parallel. The proposed PCH algorithm is able to propagate a large number of windows simultaneously and independently. We also adopt a simple yet effective strategy to control the total number of windows. We implement the PCH algorithm on modern GPUs (such as Nvidia GTX 580) and analyze the performance in detail. The performance improvement (compared to the sequential algorithms) is highly consistent with GPU double-precision performance (GFLOPS). Extensive experiments on real-world models demonstrate an order of magnitude improvement in execution time compared to the state-of-the-art.
[ { "version": "v1", "created": "Tue, 7 May 2013 14:09:16 GMT" } ]
2013-05-08T00:00:00
[ [ "Ying", "Xiang", "" ], [ "Xin", "Shi-Qing", "" ], [ "He", "Ying", "" ] ]
new_dataset
0.984496
1305.1473
Rushan Ziatdinov
Rushan Ziatdinov, Kenjiro T. Miura
On the variety of planar spirals and their applications in computer aided design
null
European Researcher 27(8-2), 1227-1232, 2012
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we discuss the variety of planar spiral segments and their applications in objects in both the real and artificial world. The discussed curves with monotonic curvature function are well-known in geometric modelling and computer aided geometric design as fair curves, and they are very significant in aesthetic shape modelling. Fair curve segments are used for two-point G1 and G2 Hermite interpolation, as well as for generating aesthetic splines.
[ { "version": "v1", "created": "Tue, 7 May 2013 11:35:49 GMT" } ]
2013-05-08T00:00:00
[ [ "Ziatdinov", "Rushan", "" ], [ "Miura", "Kenjiro T.", "" ] ]
new_dataset
0.978242
1305.1598
Aria Ghasemian Sahebi
Aria G. Sahebi and S. Sandeep Pradhan
Abelian Group Codes for Source Coding and Channel Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the asymptotic performance of Abelian group codes for the lossy source coding problem for arbitrary discrete (finite alphabet) memoryless sources as well as the channel coding problem for arbitrary discrete (finite alphabet) memoryless channels. For the source coding problem, we derive an achievable rate-distortion function that is characterized in a single-letter information-theoretic form using the ensemble of Abelian group codes. When the underlying group is a field, it simplifies to the symmetric rate-distortion function. Similarly, for the channel coding problem, we find an achievable rate characterized in a single-letter information-theoretic form using group codes. This simplifies to the symmetric capacity of the channel when the underlying group is a field. We compute the rate-distortion function and the achievable rate for several examples of sources and channels. Due to the non-symmetric nature of the sources and channels considered, our analysis uses a synergy of information theoretic and group-theoretic tools.
[ { "version": "v1", "created": "Tue, 7 May 2013 18:13:41 GMT" } ]
2013-05-08T00:00:00
[ [ "Sahebi", "Aria G.", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
new_dataset
0.978325
1304.7346
Imran Sarwar Bajwa Dr.
Imran Sarwar Bajwa, Behzad Bordbar, Mark Lee
SBVR vs OCL: A Comparative Analysis of Standards
14th IEEE International Multitopic Conference (INMIC 2011), pp.261-266, Karachi, Pakistan
null
10.1109/INMIC.2011.6151485
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In software modelling, the designers have to produce UML visual models with software constraints. Similarly, in business modelling, designers have to model business processes using business constraints (business rules). Constraints are the key components in the skeleton of business or software models. A designer has to write constraints to semantically compliment business models or UML models and finally implementing the constraints into business processes or source code. Business constraints/rules can be written using SBVR (Semantics of Business Vocabulary and Rules) while OCL (Object Constraint Language) is the well-known medium for writing software constraints. SBVR and OCL are two significant standards from OMG. Both standards are principally different as SBVR is typically used in business domains and OCL is employed to compliment software models. However, we have identified a few similarities in both standards that are interesting to study. In this paper, we have performed a comparative analysis of both standards as we are looking for a mechanism for automatic transformation of SBVR to OCL. The major emphasis of the study is to highlight principal features of SBVR and OCL such as similarities, differences and key parameters on which these both standards can work together.
[ { "version": "v1", "created": "Sat, 27 Apr 2013 08:17:53 GMT" } ]
2013-05-07T00:00:00
[ [ "Bajwa", "Imran Sarwar", "" ], [ "Bordbar", "Behzad", "" ], [ "Lee", "Mark", "" ] ]
new_dataset
0.998103
1305.0918
Jalaluddin Qureshi
Jalaluddin Qureshi and Chuan Heng Fohy and Jianfei Cai
Primer and Recent Developments on Fountain Codes
This paper appears in BSP Recent Patents on Telecommunications
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we survey the various erasure codes which had been proposed and patented recently, and along the survey we provide introductory tutorial on many of the essential concepts and readings in erasure and Fountain codes. Packet erasure is a fundamental characteristic inherent in data storage and data transmission system. Traditionally replication/ retransmission based techniques had been employed to deal with packet erasures in such systems. While the Reed-Solomon (RS) erasure codes had been known for quite some time to improve system reliability and reduce data redundancy, the high decoding computation cost of RS codes has offset wider implementation of RS codes. However recent exponential growth in data traffic and demand for larger data storage capacity has simmered interest in erasure codes. Recent results have shown promising results to address the decoding computation complexity and redundancy tradeoff inherent in erasure codes.
[ { "version": "v1", "created": "Sat, 4 May 2013 13:10:02 GMT" } ]
2013-05-07T00:00:00
[ [ "Qureshi", "Jalaluddin", "" ], [ "Fohy", "Chuan Heng", "" ], [ "Cai", "Jianfei", "" ] ]
new_dataset
0.980768
1305.0958
Sundeep Rangan
Russell Ford, Changkyu Kim, Sundeep Rangan
Opportunistic Third-Party Backhaul for Cellular Wireless Networks
9 pages, 6 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With high capacity air interfaces and large numbers of small cells, backhaul -- the wired connectivity to base stations -- is increasingly becoming the cost driver in cellular wireless networks. One reason for the high cost of backhaul is that capacity is often purchased on leased lines with guaranteed rates provisioned to peak loads. In this paper, we present an alternate \emph{opportunistic backhaul} model where third parties provide base stations and backhaul connections and lease out excess capacity in their networks to the cellular provider when available, presumably at significantly lower costs than guaranteed connections. We describe a scalable architecture for such deployments using open access femtocells, which are small plug-and-play base stations that operate in the carrier's spectrum but can connect directly into the third party provider's wired network. Within the proposed architecture, we present a general user association optimization algorithm that enables the cellular provider to dynamically determine which mobiles should be assigned to the third-party femtocells based on the traffic demands, interference and channel conditions and third-party access pricing. Although the optimization is non-convex, the algorithm uses a computationally efficient method for finding approximate solutions via dual decomposition. Simulations of the deployment model based on actual base station locations are presented that show that large capacity gains are achievable if adoption of third-party, open access femtocells can reach even a small fraction of the current market penetration of WiFi access points.
[ { "version": "v1", "created": "Sat, 4 May 2013 20:51:56 GMT" } ]
2013-05-07T00:00:00
[ [ "Ford", "Russell", "" ], [ "Kim", "Changkyu", "" ], [ "Rangan", "Sundeep", "" ] ]
new_dataset
0.993026
1305.1112
Tommaso Urli
Tommaso Urli
json2run: a tool for experiment design & analysis
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
json2run is a tool to automate the running, storage and analysis of experiments. The main advantage of json2run is that it allows to describe a set of experiments concisely as a JSON-formatted parameter tree. It also supports parallel execution of experiments, automatic parameter tuning through the F-Race framework and storage and analysis of experiments with MongoDB and R.
[ { "version": "v1", "created": "Mon, 6 May 2013 08:31:48 GMT" } ]
2013-05-07T00:00:00
[ [ "Urli", "Tommaso", "" ] ]
new_dataset
0.996053
1305.1221
Mario Blaum
Mario Blaum and James S. Plank
Construction of two SD Codes
8 pages. arXiv admin note: text overlap with arXiv:1305.0032
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SD codes are erasure codes that address the mixed failure mode of current RAID systems. Rather than dedicate entire disks to erasure coding, as done in RAID-5, RAID-6 and Reed-Solomon coding, an SD code dedicates entire disks, plus individual sectors to erasure coding. The code then tolerates combinations of disk and sector errors, rather than solely disk errors. It is been an open problem to construct general codes that have the SD property, and previous work has relied on Monte Carlo searches. In this paper, we present two general constructions that address the cases with one disk and two sectors, and two disks and two sectors. Additionally, we make an observation about shortening SD codes that allows us to prune Monte Carlo searches.
[ { "version": "v1", "created": "Mon, 6 May 2013 15:30:31 GMT" } ]
2013-05-07T00:00:00
[ [ "Blaum", "Mario", "" ], [ "Plank", "James S.", "" ] ]
new_dataset
0.999662
1305.1270
Grasha Jacob Mrs
Grasha Jacob, A. Murugan
An Encryption Scheme with DNA Technology and JPEG Zigzag Coding for Secure Transmission of Images
5 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet is a ubiquitous and affordable communications network suited for e-commerce and medical image communications. Security has become a major issue as data communication channels can be intruded by intruders during transmission. Though, different methods have been proposed and used to protect the transmission of data from illegal and unauthorized access, code breakers have come up with various methods to crack them. DNA based Cryptography brings forward a new hope for unbreakable algorithms. This paper outlines an encryption scheme with DNA technology and JPEG Zigzag Coding for Secure Transmission of Images.
[ { "version": "v1", "created": "Mon, 6 May 2013 18:37:12 GMT" } ]
2013-05-07T00:00:00
[ [ "Jacob", "Grasha", "" ], [ "Murugan", "A.", "" ] ]
new_dataset
0.992144
1305.0668
Ayad Ghany Ismaeel
Ayad Ghany Ismaeel, Raghad Zuhair Yousif and Essa F. Abdallh
GUI Based Automatic Remote Control of Gas Reduction System using PIC Microcontroller
11 pages, 25 figures, Tables 4, and this research obtained certificate from Erbil Power Station, which is the beneficiary company of it. Available at http://www.estij.org/papers/vol3no22013/1vol3no2.pdf, 2013
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The GRS is a one of the important units in Erbil Power Station EPS, which is responsible on controlling gas pressure and gas temperature this unit previously works manually. The local control panel for GRS system contains two types of digital signals the first one indicated by Light Emitting Diodes LED to point normal operations, fault and alarm, and event of operations while the second indicated by ON-OFF switches, which consists of two types the push buttons switch and mode selector switch. To overcome human in manual control faults in controlling GRS systems, automation system becomes the best solution. The purpose of this research is to design and implement embedded automation system that can be used to control a GRS automatically through a GUI and from remote location by using programmable interface controller (PIC16F877A). In this research the (PIC) software which is based on (C language), developed by Microchip (MPLAB) is used in programming a PIC microcontroller, then Visual Basic is used in the construction of GUI, the RS-232 serial cable is used as a connector between PIC and PC. Implement the proposed design and test it as a first system shows all operations of GRS successful were converted into full computerize controlling (with the ability of full automatic control) from remote location through proposed GUI. Keywords-Peripheral Interface Controller (PIC); Microcontroller; Graphical User Interface (GUI); Remote; Control.
[ { "version": "v1", "created": "Fri, 3 May 2013 10:51:38 GMT" } ]
2013-05-06T00:00:00
[ [ "Ismaeel", "Ayad Ghany", "" ], [ "Yousif", "Raghad Zuhair", "" ], [ "Abdallh", "Essa F.", "" ] ]
new_dataset
0.9677
0912.3016
Akitoshi Kawamura
Akitoshi Kawamura, Ji\v{r}\'i Matou\v{s}ek, Takeshi Tokuyama
Zone Diagrams in Euclidean Spaces and in Other Normed Spaces
Title page + 16 pages, 20 figures
Mathematische Annalen 354(4):1201-1221, 2012
10.1007/s00208-011-0761-1
null
cs.CG math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zone diagram is a variation on the classical concept of a Voronoi diagram. Given n sites in a metric space that compete for territory, the zone diagram is an equilibrium state in the competition. Formally it is defined as a fixed point of a certain "dominance" map. Asano, Matousek, and Tokuyama proved the existence and uniqueness of a zone diagram for point sites in Euclidean plane, and Reem and Reich showed existence for two arbitrary sites in an arbitrary metric space. We establish existence and uniqueness for n disjoint compact sites in a Euclidean space of arbitrary (finite) dimension, and more generally, in a finite-dimensional normed space with a smooth and rotund norm. The proof is considerably simpler than that of Asano et al. We also provide an example of non-uniqueness for a norm that is rotund but not smooth. Finally, we prove existence and uniqueness for two point sites in the plane with a smooth (but not necessarily rotund) norm.
[ { "version": "v1", "created": "Tue, 15 Dec 2009 22:01:11 GMT" } ]
2013-05-03T00:00:00
[ [ "Kawamura", "Akitoshi", "" ], [ "Matoušek", "Jiří", "" ], [ "Tokuyama", "Takeshi", "" ] ]
new_dataset
0.998674
1305.0300
Andrew Adamatzky
Andrew Adamatzky and Genaro J. Martinez
Bio-imitaiton of Mexican migration routes to the USA with slime mould on 3D terrains
null
Adamatzky A. and Martinez G. J. Bio-Imitation of Mexican Migration Routes to the USA with Slime Mould on 3D Terrains. J Bionic Engineering 10 (2013) 242--250
10.1016/S1672-6529(13)60220-6
null
cs.ET nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plasmodium of Physarum polycephalum is a large single cell visible by unaided eye. It shows sophisticated behavioural traits in foraging for nutrients and developing an optimal transport network of protoplasmic tubes spanning sources of nutrients. When placed in an environment with distributed sources of nutrients the cell 'computes' an optimal graph spanning the nutrients by growing a network of protoplasmic tubes. P. polycephalum imitates development of man-made transport networks of a country when configuration of nutrients represents major urban areas. We employ this feature of the slime mould to imitate mexican migration to USA. The Mexican migration to USA is the World's largest migration system. We bio-physically imitate the migration using slime mould P. polycephalum. In laboratory experiments with 3D Nylon terrains of USA we imitated development of migratory routes from Mexico-USA border to ten urban areas with high concentration of Mexican migrants. From results of laboratory experiments we extracted topologies of migratory routes, and highlighted a role of elevations in shaping the human movement networks.
[ { "version": "v1", "created": "Wed, 1 May 2013 21:52:02 GMT" } ]
2013-05-03T00:00:00
[ [ "Adamatzky", "Andrew", "" ], [ "Martinez", "Genaro J.", "" ] ]
new_dataset
0.999274
1305.0433
Ioan Todinca
Mathieu Chapelle (1), Mathieu Liedloff (2), Ioan Todinca (2), and Yngve Villanger (3) ((1) University Paris Est, France, (2) University of Orleans, France, (3) University of Bergen, Norway)
TREEWIDTH and PATHWIDTH parameterized by vertex cover
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After the number of vertices, Vertex Cover is the largest of the classical graph parameters and has more and more frequently been used as a separate parameter in parameterized problems, including problems that are not directly related to the Vertex Cover. Here we consider the TREEWIDTH and PATHWIDTH problems parameterized by k, the size of a minimum vertex cover of the input graph. We show that the PATHWIDTH and TREEWIDTH can be computed in O*(3^k) time. This complements recent polynomial kernel results for TREEWIDTH and PATHWIDTH parameterized by the Vertex Cover.
[ { "version": "v1", "created": "Thu, 2 May 2013 13:49:35 GMT" } ]
2013-05-03T00:00:00
[ [ "Chapelle", "Mathieu", "" ], [ "Liedloff", "Mathieu", "" ], [ "Todinca", "Ioan", "" ], [ "Villanger", "Yngve", "" ] ]
new_dataset
0.999667
1305.0032
Mario Blaum
Mario Blaum
Construction of PMDS and SD Codes extending RAID 5
7 pages
null
null
IBM Research Report, IBM Research Report, RJ10504, March 2013
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A construction of Partial Maximum Distance Separable (PMDS) and Sector-Disk (SD) codes extending RAID 5 with two extra parities is given, solving an open problem. Previous constructions relied on computer searches, while our constructions provide a theoretical solution to the problem.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 21:45:17 GMT" } ]
2013-05-02T00:00:00
[ [ "Blaum", "Mario", "" ] ]
new_dataset
0.996449