id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1305.0061
Cunsheng Ding
Cunsheng Ding and Tor Helleseth
Optimal Ternary Cyclic Codes from Monomials
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms. Perfect nonlinear monomials were employed to construct optimal ternary cyclic codes with parameters $[3^m-1, 3^m-1-2m, 4]$ by Carlet, Ding and Yuan in 2005. In this paper, almost perfect nonlinear monomials, and a number of other monomials over $\gf(3^m)$ are used to construct optimal ternary cyclic codes with the same parameters. Nine open problems on such codes are also presented.
[ { "version": "v1", "created": "Wed, 1 May 2013 00:46:05 GMT" } ]
2013-05-02T00:00:00
[ [ "Ding", "Cunsheng", "" ], [ "Helleseth", "Tor", "" ] ]
new_dataset
0.980817
1305.0101
Pierre Lescanne
Pierre Lescanne (LIP)
Bubbles are rational
Translation of http://hal-ens-lyon.archives-ouvertes.fr/ensl-00646546
null
null
null
cs.GT cs.LO q-fin.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As we show using the notion of equilibrium in the theory of infinite sequential games, bubbles and escalations are rational for economic and environmental agents, who believe in an infinite world. This goes against a vision of a self regulating, wise and pacific economy in equilibrium. In other words, in this context, equilibrium is not a synonymous of stability. We attempt to draw from this statement methodological consequences and a new approach to economics. To the mindware of economic agents (a concept due to cognitive psychology) we propose to add coinduction to properly reason on infinite games. This way we refine the notion of rationality.
[ { "version": "v1", "created": "Wed, 1 May 2013 06:24:39 GMT" } ]
2013-05-02T00:00:00
[ [ "Lescanne", "Pierre", "", "LIP" ] ]
new_dataset
0.994164
1304.7819
Michael Adrir Scott
Michael 'Adrir' Scott
Vocalnayno: Designing a Game-Based Intervention to Support Reading Development in Primary Schools
Presented at the 6th European Conference on Games-Based Learning, Oct 4-5, 2012, Cork, Ireland
Proceedings of the 6th European Conference on Games-Based Learning. ACPI: Reading, UK. 654--657
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Encouraging children to read frequently and helping them to develop their reading skills as effectively as possible can be a challenge for some primary schools. This research questions whether the use of a game-based intervention can integrate into the existing teaching culture to aid volunteer teaching assistants in achieving a more significant impact on pupil reading development. A prototype based on the initial process of requirements gathering is presented using Multimedia Fusion Developer 2. The design incorporates a game-like exercise where a foam volcano character releases bubbles containing letters and words. Pupils must read these aloud in order to burst them open, which is recorded as a metric of reading ability.
[ { "version": "v1", "created": "Mon, 29 Apr 2013 23:58:35 GMT" } ]
2013-05-01T00:00:00
[ [ "Scott", "Michael 'Adrir'", "" ] ]
new_dataset
0.989195
1304.7842
Gobithaasan Rudrusamy
R.U. Gobithaasan, J.M. Ali, Kenjiro T. Miura
The Logarithmic Curvature Graphs of Generalised Cornu Spirals
null
2012 Punjab University Journal of Mathematics, 44, Pg.1-8
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Generalized Cornu Spiral (GCS) was first proposed by Ali et al. in 1995 [9]. Due to the monotonocity of its curvature function, the surface generated with GCS segments has been considered as a high quality surface and it has potential applications in surface design [2]. In this paper, the analysis of GCS segment is carried out by determining its aesthetic value using the log curvature Graph (LCG) as proposed by Kanaya et al.[10]. The analysis of LCG supports the claim that GCS is indeed a generalized aesthetic curve.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 03:10:31 GMT" } ]
2013-05-01T00:00:00
[ [ "Gobithaasan", "R. U.", "" ], [ "Ali", "J. M.", "" ], [ "Miura", "Kenjiro T.", "" ] ]
new_dataset
0.96629
1304.7845
Gobithaasan Rudrusamy
Azhar Ahmad, R.Gobithasan, Jamaluddin Md.Ali
G2 Transition curve using Quartic Bezier Curve
null
2007 Computer Graphics, Imaging and Visualization CGIV 2007, Pg. 223-228
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method to construct transition curves using a family of the quartic Bezier spiral is described. The transition curves discussed are S-shape and C-shape of contact, between two separated circles. A spiral is a curve of monotone increasing or monotone decreasing curvature of one sign. Thus, a spiral cannot have an inflection point or curvature extreme. The family of quartic Bezier spiral form which is introduced has more degrees of freedom and will give a better approximation. It is proved that the methods of constructing transition curves can be simplified by the transformation process and the ratio of two radii has no restriction, which extends the application area, and it gives a family of transition curves that allow more flexible curve designs.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 03:28:07 GMT" } ]
2013-05-01T00:00:00
[ [ "Ahmad", "Azhar", "" ], [ "Gobithasan", "R.", "" ], [ "Ali", "Jamaluddin Md.", "" ] ]
new_dataset
0.980416
1304.7856
EPTCS
Caleb Eggensperger
Proof Pad: A New Development Environment for ACL2
In Proceedings ACL2 2013, arXiv:1304.7123
EPTCS 114, 2013, pp. 13-28
10.4204/EPTCS.114.2
null
cs.SE cs.HC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most software development projects rely on Integrated Development Environments (IDEs) based on the desktop paradigm, with an interactive, mouse-driven user interface. The standard installation of ACL2, on the other hand, is designed to work closely with Emacs. ACL2 experts, on the whole, like this mode of operation, but students and other new programmers who have learned to program with desktop IDEs often react negatively to the process of adapting to an unfamiliar form of interaction. This paper discusses Proof Pad, a new IDE for ACL2. Proof Pad is not the only attempt to provide ACL2 IDEs catering to students and beginning programmers. The ACL2 Sedan and DrACuLa systems arose from similar motivations. Proof Pad builds on the work of those systems, while also taking into account the unique workflow of the ACL2 theorem proving system. The design of Proof Pad incorporated user feedback from the outset, and that process continued through all stages of development. Feedback took the form of direct observation of users interacting with the IDE as well as questionnaires completed by users of Proof Pad and other ACL2 IDEs. The result is a streamlined interface and fast, responsive system that supports using ACL2 as a programming language and a theorem proving system. Proof Pad also provides a property-based testing environment with random data generation and automated interpretation of properties as ACL2 theorem definitions.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 04:14:06 GMT" } ]
2013-05-01T00:00:00
[ [ "Eggensperger", "Caleb", "" ] ]
new_dataset
0.995245
1304.7860
EPTCS
Lucas Helms (University of Wyoming), Ruben Gamboa (University of Wyoming)
An Interpreter for Quantum Circuits
In Proceedings ACL2 2013, arXiv:1304.7123
EPTCS 114, 2013, pp. 85-94
10.4204/EPTCS.114.7
null
cs.LO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes an ACL2 interpreter for "netlists" describing quantum circuits. Several quantum gates are implemented, including the Hadamard gate H, which rotates vectors by 45 degrees, necessitating the use of irrational numbers, at least at the logical level. Quantum measurement presents an especially difficult challenge, because it requires precise comparisons of irrational numbers and the use of random numbers. This paper does not address computation with irrational numbers or the generation of random numbers, although future work includes the development of pseudo-random generators for ACL2.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 04:14:37 GMT" } ]
2013-05-01T00:00:00
[ [ "Helms", "Lucas", "", "University of Wyoming" ], [ "Gamboa", "Ruben", "", "University of\n Wyoming" ] ]
new_dataset
0.998615
1304.7875
EPTCS
Sebastiaan J. C. Joosten, Bernard van Gastel, Julien Schmaltz
A Macro for Reusing Abstract Functions and Theorems
In Proceedings ACL2 2013, arXiv:1304.7123
EPTCS 114, 2013, pp. 29-41
10.4204/EPTCS.114.3
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even though the ACL2 logic is first order, the ACL2 system offers several mechanisms providing users with some operations akin to higher order logic ones. In this paper, we propose a macro, named instance-of-defspec, to ease the reuse of abstract functions and facts proven about them. Defspec is an ACL2 book allowing users to define constrained functions and their associated properties. It contains macros facilitating the definition of such abstract specifications and instances thereof. Currently, lemmas and theorems derived from these abstract functions are not automatically instantiated. This is exactly the purpose of our new macro. instance-of-defspec will not only instantiate functions and theorems within a specification but also many more functions and theorems built on top of the specification. As a working example, we describe various fold functions over monoids, which we gradually built from arbitrary functions.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 04:43:47 GMT" } ]
2013-05-01T00:00:00
[ [ "Joosten", "Sebastiaan J. C.", "" ], [ "van Gastel", "Bernard", "" ], [ "Schmaltz", "Julien", "" ] ]
new_dataset
0.996862
1304.7881
Gobithaasan Rudrusamy
R.U. Gobithaasan
Various Types of Aesthetic Curves
null
2011 The Proceedings of Seminar Bidang Kepakaran Jabatan Matematik 2010, Cherating, Pahang. Disember 27th- 30th 2010, Pg.9-22
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research on developing planar curves to produce visually pleasing products (ranges from electric appliances to car body design) and indentifying/modifying planar curves for special purposes namely for railway design, highway design and robot trajectories have been progressing since 1970s. The pattern of research in this field of study has branched to five major groups namely curve synthesis, fairing process, improvement in control of natural spiral, construction of new type of planar curves and, natural spiral fitting & approximation techniques. The purpose of is this paper is to briefly review recent progresses in Computer Aided Geometric Design (CAGD) focusing on the topics states above.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 05:25:31 GMT" } ]
2013-05-01T00:00:00
[ [ "Gobithaasan", "R. U.", "" ] ]
new_dataset
0.981017
1304.7993
Romain Absil
Romain Absil and Hadrien M\'elot
Digenes: genetic algorithms to discover conjectures about directed and undirected graphs
17 Pages, 2 Figures, 2 Tables
null
null
null
cs.DM cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Digenes, a new discovery system that aims to help researchers in graph theory. While its main task is to find extremal graphs for a given (function of) invariants, it also provides some basic support in proof conception. This has already been proved to be very useful to find new conjectures since the AutoGraphiX system of Caporossi and Hansen (Discrete Math. 212-2000). However, unlike existing systems, Digenes can be used both with directed or undirected graphs. In this paper, we present the principles and functionality of Digenes, describe the genetic algorithms that have been designed to achieve them, and give some computational results and open questions. This do arise some interesting questions regarding genetic algorithms design particular to this field, such as crossover definition.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 13:34:09 GMT" } ]
2013-05-01T00:00:00
[ [ "Absil", "Romain", "" ], [ "Mélot", "Hadrien", "" ] ]
new_dataset
0.992628
1304.8028
Rafik Zitouni
Rafik Zitouni, Stefan Ataman, Marie Mathian and Laurent George
IEEE 802.15.4 transceiver for the 868/915 MHz band using Software Defined Radio
6 pages
Proceedings of SDR'12-WInnComm-Europe, 27-29 June 2012
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reports an implementation of the PHY specifications of the IEEE 802.15.4 standard for the frequency band 868 915 MHz on a Software Defined Radio (SDR) platform. This standard is defined for low power, low data rate and low cost wireless networks. These specifications are used by the Zigbee technology for various applications such as home automation, industry monitoring or medical surveillance. Several hardware PHY 868/915 MHz band IEEE 802.15.4 transceiver implementations have been already reported on ASIC and FPG [1] [2]. SDR offers one possibility to realize a transceiver with high flexibility and reconfigurability [3]. The whole transmitter and receiver chain has been defined in software using the GNU Radio software project [4] and the USRP (Universal Software Radio Peripheral) platform from Ettus Research [5]. Two new blocks have been added to the GNU Radio project, one for the Direct Sequence Spread Spectrum and the second for the reconstruction of the packets. The experimentations have been performed in a noisy environment and the PER, BER and SNR have been computed. The obtained results are coherent with what can be expected from the theory.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 15:16:10 GMT" } ]
2013-05-01T00:00:00
[ [ "Zitouni", "Rafik", "" ], [ "Ataman", "Stefan", "" ], [ "Mathian", "Marie", "" ], [ "George", "Laurent", "" ] ]
new_dataset
0.994208
1304.8109
Ronald Petrlic
Ronald Petrlic and Stephan Sekula
Unlinkable content playbacks in a multiparty DRM system
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a solution to the problem of privacy invasion in a multiparty digital rights management scheme. (Roaming) users buy content licenses from a content provider and execute it at any nearby content distributor. Our approach, which does not need any trusted third party--in contrast to most related work on privacy-preserving DRM--is based on a re-encryption scheme that runs on any mobile Android device. Only a minor security-critical part needs to be performed on the device's smartcard which could, for instance, be a SIM card.
[ { "version": "v1", "created": "Tue, 30 Apr 2013 18:41:08 GMT" } ]
2013-05-01T00:00:00
[ [ "Petrlic", "Ronald", "" ], [ "Sekula", "Stephan", "" ] ]
new_dataset
0.997655
1107.5638
Igor Melatti
Federico Mari, Igor Melatti, Ivano Salvo, Enrico Tronci
Model Based Synthesis of Control Software from System Level Formal Specifications
Accepted for publication by ACM Transactions on Software Engineering and Methodology (TOSEM)
null
null
null
cs.SE cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many Embedded Systems are indeed Software Based Control Systems, that is control systems whose controller consists of control software running on a microcontroller device. This motivates investigation on Formal Model Based Design approaches for automatic synthesis of embedded systems control software. We present an algorithm, along with a tool QKS implementing it, that from a formal model (as a Discrete Time Linear Hybrid System) of the controlled system (plant), implementation specifications (that is, number of bits in the Analog-to-Digital, AD, conversion) and System Level Formal Specifications (that is, safety and liveness requirements for the closed loop system) returns correct-by-construction control software that has a Worst Case Execution Time (WCET) linear in the number of AD bits and meets the given specifications. We show feasibility of our approach by presenting experimental results on using it to synthesize control software for a buck DC-DC converter, a widely used mixed-mode analog circuit, and for the inverted pendulum.
[ { "version": "v1", "created": "Thu, 28 Jul 2011 07:38:41 GMT" }, { "version": "v2", "created": "Fri, 9 Sep 2011 09:06:14 GMT" }, { "version": "v3", "created": "Sat, 27 Apr 2013 14:53:09 GMT" } ]
2013-04-30T00:00:00
[ [ "Mari", "Federico", "" ], [ "Melatti", "Igor", "" ], [ "Salvo", "Ivano", "" ], [ "Tronci", "Enrico", "" ] ]
new_dataset
0.98884
1206.1899
Rajeev Shakya PhD Scholar
Rajeev K. Shakya
TTMA: Traffic-adaptive Time-division Multiple Access Protocol Wireless Sensor Networks
This paper has been withdrawn by arXiv. arXiv admin note: author list truncated due to disputed authorship and content. This submission repeats large portions of text from http://www.cse.msu.edu/~lxiao/publications/TATD_MAC.pdf by other authors
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by arXiv. arXiv admin note: author list truncated due to disputed authorship and content. This submission repeats large portions of text from this http URL by other authors. Duty cycle mode in WSN improves energy-efficiency, but also introduces packet delivery latency. Several duty-cycle based MAC schemes have been proposed to reduce latency, but throughput is limited by duty-cycled scheduling performance. In this paper, a Traffic-adaptive Time-division Multiple Access (TTMA), a distributed TDMA-based MAC protocol is introduced to improves the throughput by traffic-adaptive time-slot scheduling that increases the channel utilisation efficiency. The proposed time-slot scheduling method first avoids time-slots assigned to nodes with no traffic through fast traffic notification. It then achieves better channel utilisation among nodes having traffic through an ordered schedule negotiation scheme. By decomposing traffic notification and data transmission scheduling into two phases leads each phase to be simple and efficient. The performance evaluation shows that the two-phase design significantly improves the throughput and outperforms the time division multiple access (TDMA) control with slot stealing.
[ { "version": "v1", "created": "Sat, 9 Jun 2012 02:06:59 GMT" }, { "version": "v2", "created": "Tue, 12 Jun 2012 02:04:02 GMT" }, { "version": "v3", "created": "Thu, 9 Aug 2012 06:46:12 GMT" } ]
2013-04-30T00:00:00
[ [ "Shakya", "Rajeev K.", "" ] ]
new_dataset
0.998647
1301.0427
Yu. I. Manin
Yuri I. Manin
Zipf's law and L. Levin's probability distributions
19 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zipf's law in its basic incarnation is an empirical probability distribution governing the frequency of usage of words in a language. As Terence Tao recently remarked, it still lacks a convincing and satisfactory mathematical explanation. In this paper I suggest that at least in certain situations, Zipf's law can be explained as a special case of the a priori distribution introduced and studied by L. Levin. The Zipf ranking corresponding to diminishing probability appears then as the ordering determined by the growing Kolmogorov complexity. One argument justifying this assertion is the appeal to a recent interpretation by Yu. Manin and M. Marcolli of asymptotic bounds for error--correcting codes in terms of phase transition. In the respective partition function, Kolmogorov complexity of a code plays the role of its energy. This version contains minor corrections and additions.
[ { "version": "v1", "created": "Thu, 3 Jan 2013 11:47:07 GMT" }, { "version": "v2", "created": "Sun, 28 Apr 2013 15:46:38 GMT" } ]
2013-04-30T00:00:00
[ [ "Manin", "Yuri I.", "" ] ]
new_dataset
0.992226
1304.1672
Daniele Loiacono
Daniele Loiacono and Luigi Cardamone and Pier Luca Lanzi
Simulated Car Racing Championship: Competition Software Manual
null
null
null
null
cs.AI cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This manual describes the competition software for the Simulated Car Racing Championship, an international competition held at major conferences in the field of Evolutionary Computation and in the field of Computational Intelligence and Games. It provides an overview of the architecture, the instructions to install the software and to run the simple drivers provided in the package, the description of the sensors and the actuators.
[ { "version": "v1", "created": "Fri, 5 Apr 2013 10:42:14 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2013 10:17:33 GMT" } ]
2013-04-30T00:00:00
[ [ "Loiacono", "Daniele", "" ], [ "Cardamone", "Luigi", "" ], [ "Lanzi", "Pier Luca", "" ] ]
new_dataset
0.993626
1304.7294
Rushikesh Shreshtha
Rushikesh B. Shreshtha, Rajeswari Goudar
Self Configurable Re-link Establishment using Continuous Neighbor Discovery in Asynchronous Sensor Networks
null
http://ijcsn.org/IJCSN-2012/1-6/IJCSN-2012-1-6-28.pdf
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Sensor network generally has a large number of sensor nodes that are deployed at some audited site. In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighbouring nodes, so there is a need to maintain synchronization between the neighbouring nodes in order to have efficient communication. Hence even after a sensor is aware of its immediate neighbours, it must continuously maintain its view a process we call continuous neighbour discovery. In this proposed work we are maintaining synchronization between neighbouring nodes so that the sensor network will be always active.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 22:10:05 GMT" } ]
2013-04-30T00:00:00
[ [ "Shreshtha", "Rushikesh B.", "" ], [ "Goudar", "Rajeswari", "" ] ]
new_dataset
0.9914
1304.7399
Jared Glover
Jared Glover and Sanja Popovic
Bingham Procrustean Alignment for Object Detection in Clutter
Submitted to IROS 2013
null
null
null
cs.CV cs.RO stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new system for object detection in cluttered RGB-D images is presented. Our main contribution is a new method called Bingham Procrustean Alignment (BPA) to align models with the scene. BPA uses point correspondences between oriented features to derive a probability distribution over possible model poses. The orientation component of this distribution, conditioned on the position, is shown to be a Bingham distribution. This result also applies to the classic problem of least-squares alignment of point sets, when point features are orientation-less, and gives a principled, probabilistic way to measure pose uncertainty in the rigid alignment problem. Our detection system leverages BPA to achieve more reliable object detections in clutter.
[ { "version": "v1", "created": "Sat, 27 Apr 2013 19:24:30 GMT" } ]
2013-04-30T00:00:00
[ [ "Glover", "Jared", "" ], [ "Popovic", "Sanja", "" ] ]
new_dataset
0.994074
1304.7429
Parisa Mansourifard
Negin Golrezaei, Parisa Mansourifard, Andreas F. Molisch, Alexandros G. Dimakis
Base-Station Assisted Device-to-Device Communications for High-Throughput Wireless Video Networks
28 pages, 16 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new scheme for increasing the throughput of video files in cellular communications systems. This scheme exploits (i) the redundancy of user requests as well as (ii) the considerable storage capacity of smartphones and tablets. Users cache popular video files and - after receiving requests from other users - serve these requests via device-to-device localized transmissions. The file placement is optimal when a central control knows a priori the locations of wireless devices when file requests occur. However, even a purely random caching scheme shows only a minor performance loss compared to such a genie-aided scheme. We then analyze the optimal collaboration distance, trading off frequency reuse with the probability of finding a requested file within the collaboration distance. We show that an improvement of spectral efficiency of one to two orders of magnitude is possible, even if there is not very high redundancy in video requests.
[ { "version": "v1", "created": "Sun, 28 Apr 2013 05:23:41 GMT" } ]
2013-04-30T00:00:00
[ [ "Golrezaei", "Negin", "" ], [ "Mansourifard", "Parisa", "" ], [ "Molisch", "Andreas F.", "" ], [ "Dimakis", "Alexandros G.", "" ] ]
new_dataset
0.999811
1304.7451
Bhavani Anantapur
A B Bhavani
Cross-site Scripting Attacks on Android WebView
null
Bhavani A B, Cross-site Scripting Attacks on Android WebView,IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013, ISSN:2277-5420
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WebView is an essential component in Android and iOS. It enables applications to display content from on-line resources. It simplifies task of performing a network request, parsing the data and rendering it. WebView uses a number of APIs which can interact with the web contents inside WebView. In the current paper, Cross-site scripting attacks or XSS attacks specific to Android WebView are discussed. Cross site scripting (XSS) is a type of vulnerability commonly found in web applications. This vulnerability makes it possible for attackers to run malicious code into victim's WebView,through HttpClient APIs. Using this malicious code, the attackers can steal the victim's credentials, such as cookies. The access control policies (that is,the same origin policy) employed by the browser to protect those credentials can be bypassed by exploiting the XSS vulnerability.
[ { "version": "v1", "created": "Sun, 28 Apr 2013 10:27:56 GMT" } ]
2013-04-30T00:00:00
[ [ "Bhavani", "A B", "" ] ]
new_dataset
0.999575
1304.7576
Preyas Popat
Rina Panigrahy and Preyas Popat
Fractal structures in Adversarial Prediction
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractals are self-similar recursive structures that have been used in modeling several real world processes. In this work we study how "fractal-like" processes arise in a prediction game where an adversary is generating a sequence of bits and an algorithm is trying to predict them. We will see that under a certain formalization of the predictive payoff for the algorithm it is most optimal for the adversary to produce a fractal-like sequence to minimize the algorithm's ability to predict. Indeed it has been suggested before that financial markets exhibit a fractal-like behavior. We prove that a fractal-like distribution arises naturally out of an optimization from the adversary's perspective. In addition, we give optimal trade-offs between predictability and expected deviation (i.e. sum of bits) for our formalization of predictive payoff. This result is motivated by the observation that several time series data exhibit higher deviations than expected for a completely random walk.
[ { "version": "v1", "created": "Mon, 29 Apr 2013 07:16:54 GMT" } ]
2013-04-30T00:00:00
[ [ "Panigrahy", "Rina", "" ], [ "Popat", "Preyas", "" ] ]
new_dataset
0.986063
1304.7600
Piotr Beling
Piotr Beling
C++11 - okre\'slanie typ\'ow
6 pages, in Polish
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a review of some new futures introduced to C++ language by ISO/IEC 14882:2011 standard (known as C++11). It describes new language elements which allow to easier expressed of types of variables: auto and decltype keywords, new function declaration syntax, and tools which are included in type_traits header. ----- Niniejszy artyku{\l} jest jednym z serii artyku{\l}\'ow w kt\'orych zawarto przegl{\ka}d nowych element\'ow j{\ke}zyka C++ wprowadzonych przez standard ISO/IEC 14882:2011, znany pod nazw{\ka} C++11. W artykule przedstawiono nowe mo\.zliwo\'sci zwi{\ka}zane ze wskazywaniem typ\'ow zmiennych. Opisano s{\l}owa kluczowe auto i decltype, now{\ka} sk{\l}adnie deklarowania funkcji/metod oraz narz{\ke}dzia zawarte w pliku nag{\l}\'owkowym <type_traits>.
[ { "version": "v1", "created": "Mon, 29 Apr 2013 09:30:33 GMT" } ]
2013-04-30T00:00:00
[ [ "Beling", "Piotr", "" ] ]
new_dataset
0.99946
1304.7615
Adrian Jackson
Adrian Jackson, Par Strand
MDMP: Managed Data Message Passing
Submitted to SC13, 10 pages, 5 figures
null
null
null
cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MDMP is a new parallel programming approach that aims to provide users with an easy way to add parallelism to programs, optimise the message passing costs of traditional scientific simulation algorithms, and enable existing MPI-based parallel programs to be optimised and extended without requiring the whole code to be re-written from scratch. MDMP utilises a directives based approach to enable users to specify what communications should take place in the code, and then implements those communications for the user in an optimal manner using both the information provided by the user and data collected from instrumenting the code and gathering information on the data to be communicated. This work will present the basic concepts and functionality of MDMP and discuss the performance that can be achieved using our prototype implementation of MDMP on some model scientific simulation applications.
[ { "version": "v1", "created": "Mon, 29 Apr 2013 10:35:48 GMT" } ]
2013-04-30T00:00:00
[ [ "Jackson", "Adrian", "" ], [ "Strand", "Par", "" ] ]
new_dataset
0.989338
1211.4047
Garth Wells
Martin S. Alnaes and Anders Logg and Kristian B. Oelgaard and Marie E. Rognes and Garth N. Wells
Unified Form Language: A domain-specific language for weak formulations of partial differential equations
To appear in ACM Transactions on Mathematical Software
null
null
null
cs.MS cs.NA cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Unified Form Language (UFL), which is a domain-specific language for representing weak formulations of partial differential equations with a view to numerical approximation. Features of UFL include support for variational forms and functionals, automatic differentiation of forms and expressions, arbitrary function space hierarchies for multi-field problems, general differential operators and flexible tensor algebra. With these features, UFL has been used to effortlessly express finite element methods for complex systems of partial differential equations in near-mathematical notation, resulting in compact, intuitive and readable programs. We present in this work the language and its construction. An implementation of UFL is freely available as an open-source software library. The library generates abstract syntax tree representations of variational problems, which are used by other software libraries to generate concrete low-level implementations. Some application examples are presented and libraries that support UFL are highlighted.
[ { "version": "v1", "created": "Fri, 16 Nov 2012 21:56:02 GMT" }, { "version": "v2", "created": "Thu, 25 Apr 2013 20:18:09 GMT" } ]
2013-04-29T00:00:00
[ [ "Alnaes", "Martin S.", "" ], [ "Logg", "Anders", "" ], [ "Oelgaard", "Kristian B.", "" ], [ "Rognes", "Marie E.", "" ], [ "Wells", "Garth N.", "" ] ]
new_dataset
0.999585
1304.7054
Chetan Jhurani
Chetan Jhurani
Batched Kronecker product for 2-D matrices and 3-D arrays on NVIDIA GPUs
null
null
null
null
cs.MS cs.DC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an interface and an implementation for performing Kronecker product actions on NVIDIA GPUs for multiple small 2-D matrices and 3-D arrays processed in parallel as a batch. This method is suited to cases where the Kronecker product component matrices are identical but the operands in a matrix-free application vary in the batch. Any batched GEMM (General Matrix Multiply) implementation, for example ours [1] or the one in cuBLAS, can also be used for performing batched Kronecker products on GPUs. However, the specialized implementation presented here is faster and uses less memory. Partly this is because a simple GEMM based approach would require extra copies to and from main memory. We focus on matrix sizes less than or equal to 16, since these are the typical polynomial degrees in Finite Elements, but the implementation can be easily extended for other sizes. We obtain 143 and 285 GFlop/s for single precision real when processing matrices of size 10 and 16, respectively on NVIDIA Tesla K20c using CUDA 5.0. The corresponding speeds for 3-D array Kronecker products are 126 and 268 GFlop/s, respectively. Double precision is easily supported using the C++ template mechanism.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 02:22:25 GMT" } ]
2013-04-29T00:00:00
[ [ "Jhurani", "Chetan", "" ] ]
new_dataset
0.990256
1304.7123
EPTCS
Ruben Gamboa (University of Wyoming, USA), Jared Davis (Centaur Technology, USA)
Proceedings International Workshop on the ACL2 Theorem Prover and its Applications
null
EPTCS 114, 2013
10.4204/EPTCS.114
null
cs.LO cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the Eleventh International Workshop on the ACL2 Theorem Prover and its Applications, held on May 30 and 31, 2013, in Laramie, Wyoming, USA. ACL2 is an industrial-strength automated reasoning system, the latest in the Boyer-Moore family of theorem provers. The ACL2 workshop is the major technical forum for users of the ACL2 theorem proving system to present research on the prover and its applications. This year's workshop received 15 submissions covering a wide range of applications, libraries, prover enhancements, interfaces, and experience reports. 11 papers were selected by the program committee for presentation at the workshop.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 10:59:21 GMT" } ]
2013-04-29T00:00:00
[ [ "Gamboa", "Ruben", "", "University of Wyoming, USA" ], [ "Davis", "Jared", "", "Centaur\n Technology, USA" ] ]
new_dataset
0.995377
1304.7124
Arshiya Begum
Arshiya Begum and Mohammed Tanveer Ali
Security threats in Prepaid Mobile
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by/3.0/
Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing . Prepaid services are driving mobile communication into emerging markets such as South America, Eastern Europe, Asia, Africa and Gulf Countries. Prepaid phone service requires a user to make payment before calling. It is quite common to get prepaid SIM cards on every major Network. This paper discuss about various prepaid techniques, challenges and countermeasures in prepaid mobile communication system .
[ { "version": "v1", "created": "Fri, 26 Apr 2013 11:04:18 GMT" } ]
2013-04-29T00:00:00
[ [ "Begum", "Arshiya", "" ], [ "Ali", "Mohammed Tanveer", "" ] ]
new_dataset
0.996174
1304.7140
Michael Helmberger Michael Helmberger
M. Helmberger, M. Urschler, M. Pienn, Z.Balint, A. Olschewski and H. Bischof
Pulmonary Vascular Tree Segmentation from Contrast-Enhanced CT Images
Part of the OAGM/AAPR 2013 proceedings (1304.1876)
null
null
OAGM-AAPR/2013/09
cs.CV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a pulmonary vessel segmentation algorithm, which is fast, fully automatic and robust. It uses a coarse segmentation of the airway tree and a left and right lung labeled volume to restrict a vessel enhancement filter, based on an offset medialness function, to the lungs. We show the application of our algorithm on contrast-enhanced CT images, where we derive a clinical parameter to detect pulmonary hypertension (PH) in patients. Results on a dataset of 24 patients show that quantitative indices derived from the segmentation are applicable to distinguish patients with and without PH. Further work-in-progress results are shown on the VESSEL12 challenge dataset, which is composed of non-contrast-enhanced scans, where we range in the midfield of participating contestants.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 12:30:36 GMT" } ]
2013-04-29T00:00:00
[ [ "Helmberger", "M.", "" ], [ "Urschler", "M.", "" ], [ "Pienn", "M.", "" ], [ "Balint", "Z.", "" ], [ "Olschewski", "A.", "" ], [ "Bischof", "H.", "" ] ]
new_dataset
0.999787
1304.7209
Roland Kindermann
Roland Kindermann, Tommi Junttila, Ilkka Niemel\"a
Bounded Model Checking of an MITL Fragment for Timed Automata
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Timed automata (TAs) are a common formalism for modeling timed systems. Bounded model checking (BMC) is a verification method that searches for runs violating a property using a SAT or SMT solver. MITL is a real-time extension of the linear time logic LTL. Originally, MITL was defined for traces of non-overlapping time intervals rather than the "super-dense" time traces allowing for intervals overlapping in single points that are employed by the nowadays common semantics of timed automata. In this paper we extend the semantics of a fragment of MITL to super-dense time traces and devise a bounded model checking encoding for the fragment. We prove correctness and completeness in the sense that using a sufficiently large bound a counter-example to any given non-holding property can be found. We have implemented the proposed bounded model checking approach and experimentally studied the efficiency and scalability of the implementation.
[ { "version": "v1", "created": "Fri, 26 Apr 2013 15:52:38 GMT" } ]
2013-04-29T00:00:00
[ [ "Kindermann", "Roland", "" ], [ "Junttila", "Tommi", "" ], [ "Niemelä", "Ilkka", "" ] ]
new_dataset
0.979109
1304.6898
Clemens Wiltsche
Clemens Wiltsche
Automated Synthesis of Controllers for Search and Rescue from Temporal Logic Specifications
Master Thesis
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis, the synthesis of correct-by-construction controllers for robots assisting in Search and Rescue (SAR) is considered. In recent years, the development of robots assisting in disaster mitigation in urban environments has been actively encouraged, since robots can be deployed in dangerous and hazardous areas where human SAR operations would not be possible. In order to meet the reliability requirements in SAR, the specifications of the robots are stated in Linear Temporal Logic and synthesized into finite state machines that can be executed as controllers. The resulting controllers are purely discrete and maintain an ongoing interaction with their environment by changing their internal state according to the inputs they receive from sensors or other robots. Since SAR robots have to cooperate in order to complete the required tasks, the synthesis of controllers that together achieve a common goal is considered. This distributed synthesis problem is provably undecidable, hence it cannot be solved in full generality, but a set of design principles is introduced in order to develop specialized synthesizable specifications. In particular, communication and cooperation are resolved by introducing a verified standardized communication protocol and preempting negotiations between robots. The robots move on a graph on which we consider the search for stationary and moving targets. Searching for moving targets is cast into a game of cops and robbers, and specifications implementing a winning strategy are developed so that the number of robots required is minimized. The viability of the methods is demonstrated by synthesizing controllers for robots performing search and rescue for stationary targets and searching for moving targets. It is shown that the controllers are guaranteed to achieve the common goal of finding and rescuing the targets.
[ { "version": "v1", "created": "Thu, 25 Apr 2013 12:49:15 GMT" } ]
2013-04-26T00:00:00
[ [ "Wiltsche", "Clemens", "" ] ]
new_dataset
0.999106
1304.6450
Ton Kloks
Wing-Kai Hon and Ton Kloks and Hsiang Hsuan Liu and Sheung-Hung Poon and Yue-Li Wang
On independence domination
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let G be a graph. The independence-domination number is the maximum over all independent sets I in G of the minimal number of vertices needed to dominate I. In this paper we investigate the computational complexity of independence domination for graphs in several graph classes related to cographs. We present an exact exponential algorithm. We also present a PTAS for planar graphs.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 00:21:35 GMT" } ]
2013-04-25T00:00:00
[ [ "Hon", "Wing-Kai", "" ], [ "Kloks", "Ton", "" ], [ "Liu", "Hsiang Hsuan", "" ], [ "Poon", "Sheung-Hung", "" ], [ "Wang", "Yue-Li", "" ] ]
new_dataset
0.997035
1304.6486
Ashutosh Lanjewar
Ashutosh Lanjewar and Neelesh Gupta (1) ((1) M.Tech. Student, Digital Communication, T.I.E.I.T (TRUBA), BHOPAL (M.P.)-India, (2) Electronics and Communication, T.I.E.I.T (TRUBA), BHOPAL (M.P.)-India)
Optimizing Cost, Delay, Packet Loss and Network Load in AODV Routing Protocol
6 Pages, 7 Figures, Paper is registered with IJCSIS Journal Vol. 11, No. 4, April 2013
International Journal of Computer Science and Information Security (IJCSIS Journal Vol. 11, No. 4, April 2013)
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
AODV is Ad-hoc On-Demand Distance Vector.A mobile ad-hoc network is a self-configuring network of mobile devices connected by wireless. MANET does not have any fixed infrastructure. The device in a MANET is free to move in any direction and will form the connection as per the requirement of the network. Due to changing topology maintenance of factors like Packet loss, End to End Delay, Number of hops, delivery ratio and controlling the network load is of great challenge. This paper mainly concentrates on reducing the factors such as cost, End-to-End Delay, Network Load and Packet loss in AODV routing protocol. The NS-2 is used for the simulation purpose.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 06:25:56 GMT" } ]
2013-04-25T00:00:00
[ [ "Lanjewar", "Ashutosh", "" ], [ "Gupta", "Neelesh", "" ] ]
new_dataset
0.95116
1304.6499
Frank Nielsen
Frank Nielsen
Logging safely in public spaces using color PINs
null
null
null
null
cs.HC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, we are increasingly logging on many different Internet sites to access private data like emails or photos remotely stored in the clouds. This makes us all the more concerned with digital identity theft and passwords being stolen either by key loggers or shoulder-surfing attacks. Quite surprisingly, the current bottleneck of computer security when logging for authentication is the User Interface (UI): How can we enter safely secret passwords when concealed spy cameras or key loggers may be recording the login session? Logging safely requires to design a secure Human Computer Interface (HCI) robust to those attacks. We describe a novel method and system based on entering secret ID passwords by means of associative secret UI passwords that provides zero-knowledge to observers. We demonstrate the principles using a color Personal Identification Numbers (PINs) login system and describes its various extensions.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 07:52:22 GMT" } ]
2013-04-25T00:00:00
[ [ "Nielsen", "Frank", "" ] ]
new_dataset
0.995576
1304.6626
Makarius Wenzel
Makarius Wenzel
PIDE as front-end technology for Coq
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Isabelle/PIDE is the current Prover IDE technology for Isabelle. It has been developed in ML and Scala in the past 4-5 years for this particular proof assistant, but with an open mind towards other systems. PIDE is based on an asynchronous document model, where the prover receives edits continuously and updates its internal state accordingly. The interpretation of edits and the policies for proof document processing are determined by the prover. The editor front-end merely takes care of visual rendering of formal document content. Here we report on an experiment to connect Coq to the PIDE infrastructure of Isabelle. This requires to re-implement the core PIDE protocol layer of Isabelle/ML in OCaml. The payload for semantic processing of proof document content is restricted to lexical analysis in the sense of existing CoqIde functionality. This is sufficient as proof-of-concept for PIDE connectivity. Actual proof processing is then a matter of improving Coq towards timeless and stateless proof processing, independently of PIDE technicalities. The implementation worked out smoothly and required minimal changes to the refined PIDE architecture of Isabelle2013. This experiment substantiates PIDE as general approach to prover interaction. It illustrates how other provers of the greater ITP family can participate by following similar reforms of the classic TTY loop as was done for Isabelle in the past few years.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 15:21:29 GMT" } ]
2013-04-25T00:00:00
[ [ "Wenzel", "Makarius", "" ] ]
new_dataset
0.997322
1304.5894
Bruno Cornelis
Bruno Cornelis, Yun Yang, Joshua T. Vogelstein, Ann Dooms, Ingrid Daubechies, David Dunson
Bayesian crack detection in ultra high resolution multimodal images of paintings
8 pages, double column
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The preservation of our cultural heritage is of paramount importance. Thanks to recent developments in digital acquisition techniques, powerful image analysis algorithms are developed which can be useful non-invasive tools to assist in the restoration and preservation of art. In this paper we propose a semi-supervised crack detection method that can be used for high-dimensional acquisitions of paintings coming from different modalities. Our dataset consists of a recently acquired collection of images of the Ghent Altarpiece (1432), one of Northern Europe's most important art masterpieces. Our goal is to build a classifier that is able to discern crack pixels from the background consisting of non-crack pixels, making optimal use of the information that is provided by each modality. To accomplish this we employ a recently developed non-parametric Bayesian classifier, that uses tensor factorizations to characterize any conditional probability. A prior is placed on the parameters of the factorization such that every possible interaction between predictors is allowed while still identifying a sparse subset among these predictors. The proposed Bayesian classifier, which we will refer to as conditional Bayesian tensor factorization or CBTF, is assessed by visually comparing classification results with the Random Forest (RF) algorithm.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 09:46:47 GMT" }, { "version": "v2", "created": "Tue, 23 Apr 2013 09:00:01 GMT" } ]
2013-04-24T00:00:00
[ [ "Cornelis", "Bruno", "" ], [ "Yang", "Yun", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Dooms", "Ann", "" ], [ "Daubechies", "Ingrid", "" ], [ "Dunson", "David", "" ] ]
new_dataset
0.997663
1304.6146
Marc Killpack
Advait Jain, Marc D. Killpack, Aaron Edsinger, Charles C. Kemp
Manipulation in Clutter with Whole-Arm Tactile Sensing
This is the first version of a paper that we submitted to the International Journal of Robotics Research on December 31, 2011 and uploaded to our website on January 16, 2012
The International Journal of Robotics Research April 2013 vol. 32 no. 4 pg. 458-482
10.1177/0278364912471865
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We begin this paper by presenting our approach to robot manipulation, which emphasizes the benefits of making contact with the world across the entire manipulator. We assume that low contact forces are benign, and focus on the development of robots that can control their contact forces during goal-directed motion. Inspired by biology, we assume that the robot has low-stiffness actuation at its joints, and tactile sensing across the entire surface of its manipulator. We then describe a novel controller that exploits these assumptions. The controller only requires haptic sensing and does not need an explicit model of the environment prior to contact. It also handles multiple contacts across the surface of the manipulator. The controller uses model predictive control (MPC) with a time horizon of length one, and a linear quasi-static mechanical model that it constructs at each time step. We show that this controller enables both real and simulated robots to reach goal locations in high clutter with low contact forces. Our experiments include tests using a real robot with a novel tactile sensor array on its forearm reaching into simulated foliage and a cinder block. In our experiments, robots made contact across their entire arms while pushing aside movable objects, deforming compliant objects, and perceiving the world.
[ { "version": "v1", "created": "Tue, 23 Apr 2013 01:40:46 GMT" } ]
2013-04-24T00:00:00
[ [ "Jain", "Advait", "" ], [ "Killpack", "Marc D.", "" ], [ "Edsinger", "Aaron", "" ], [ "Kemp", "Charles C.", "" ] ]
new_dataset
0.970431
1304.5545
Adrian Groza
Adrian Groza
Designing Electronic Markets for Defeasible-based Contractual Agents
LAF Workshop 2008
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of punishment policies applied to specific domains linking agents actions to material penalties is an open research issue. The proposed framework applies principles of contract law to set penalties: expectation damages, opportunity cost, reliance damages, and party design remedies. In order to decide which remedy provides maximum welfare within an electronic market, a simulation environment called DEMCA (Designing Electronic Markets for Contractual Agents) was developed. Knowledge representation and the reasoning capabilities of the agents are based on an extended version of temporal defeasible logic.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 21:00:37 GMT" } ]
2013-04-23T00:00:00
[ [ "Groza", "Adrian", "" ] ]
new_dataset
0.980509
1304.5553
Andreas Kl\"ockner
Andreas Kl\"ockner and Nicolas Pinto and Bryan Catanzaro and Yunsup Lee and Paul Ivanov and Ahmed Fasih
GPU Scripting and Code Generation with PyCUDA
null
GPU Computing Gems, edited by Wen-mei Hwu, Elsevier (2011), ISBN 9780123859631, Chapter 27
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-level scripting languages are in many ways polar opposites to GPUs. GPUs are highly parallel, subject to hardware subtleties, and designed for maximum throughput, and they offer a tremendous advance in the performance achievable for a significant number of computational problems. On the other hand, scripting languages such as Python favor ease of use over computational speed and do not generally emphasize parallelism. PyCUDA is a package that attempts to join the two together. This chapter argues that in doing so, a programming environment is created that is greater than just the sum of its two parts. We would like to note that nearly all of this chapter applies in unmodified form to PyOpenCL, a sister project of PyCUDA, whose goal it is to realize the same concepts as PyCUDA for OpenCL.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 21:36:25 GMT" } ]
2013-04-23T00:00:00
[ [ "Klöckner", "Andreas", "" ], [ "Pinto", "Nicolas", "" ], [ "Catanzaro", "Bryan", "" ], [ "Lee", "Yunsup", "" ], [ "Ivanov", "Paul", "" ], [ "Fasih", "Ahmed", "" ] ]
new_dataset
0.973164
1304.5568
Andrew Fuller
Andrew Fuller, Vedran Budimcic
DORI: Distributed Outdoor Robotic Instruments
36 pages, 18 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DORI (Distributed Outdoor Robotic Instruments) is a remotely controlled vehicle that is designed to simulate a planetary exploration mission. DORI is equipped with over 20 environmental sensors and can perform basic data analysis, logging and remote upload. The individual components are distributed across a fault-tolerant bus for redundancy. A partial sensor list includes atmospheric pressure, rainfall, wind speed, GPS, gyroscopic inertia, linear acceleration, magnetic field strength, temperature, laser and ultrasonic distance sensing, as well as digital audio and video capture. The project uses recycled consumer electronics devices as a low-cost source for sensor components. This report describes the hardware design of DORI including sensor electronics, embedded firmware, and physical construction.
[ { "version": "v1", "created": "Sat, 20 Apr 2013 00:26:41 GMT" } ]
2013-04-23T00:00:00
[ [ "Fuller", "Andrew", "" ], [ "Budimcic", "Vedran", "" ] ]
new_dataset
0.999752
1304.5849
Marcin Kami\'nski
Jaroslaw Blasiok and Marcin Kaminski
Chain minors are FPT
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given two finite posets P and Q, P is a chain minor of Q if there exists a partial function f from the elements of Q to the elements of P such that for every chain in P there is a chain C_Q in Q with the property that f restricted to C_Q is an isomorphism of chains. We give an algorithm to decide whether a poset P is a chain minor of o poset Q that runs in time O(|Q| log |Q|) for every fixed poset P. This solves an open problem from the monograph by Downey and Fellows [Parameterized Complexity, 1999] who asked whether the problem was fixed parameter tractable.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 06:22:34 GMT" } ]
2013-04-23T00:00:00
[ [ "Blasiok", "Jaroslaw", "" ], [ "Kaminski", "Marcin", "" ] ]
new_dataset
0.985934
1304.5934
Bugra Caskurlu
Bugra Caskurlu, K. Subramani
On Partial Vertex Cover on Bipartite Graphs and Trees
11 pages, 4 figures
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that the Vertex Cover problem is in P on bipartite graphs, however; the computational complexity of the Partial Vertex Cover problem on bipartite graphs is open. In this paper, we first show that the Partial Vertex Cover problem is NP-hard on bipartite graphs. We then identify an interesting special case of bipartite graphs, for which the Partial Vertex Cover problem can be solved in polynomial-time. We also show that the set of acyclic bipartite graphs, i.e., forests, and the set of bipartite graph where the degree of each vertex is at most 3 fall into that special case. Therefore, we prove that the Partial Vertex Cover problem is in P on trees, and it is also in P on the set of bipartite graphs where the degree of each vertex is at most 3.
[ { "version": "v1", "created": "Mon, 22 Apr 2013 12:59:20 GMT" } ]
2013-04-23T00:00:00
[ [ "Caskurlu", "Bugra", "" ], [ "Subramani", "K.", "" ] ]
new_dataset
0.999166
1304.5304
Matthew Valenti
Don Torrieri, Matthew C. Valenti
Exclusion and Guard Zones in DC-CDMA Ad Hoc Networks
to appear in IEEE Transactions on Communications. arXiv admin note: substantial text overlap with arXiv:1207.2825
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The central issue in direct-sequence code-division multiple-access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by the carrier-sense multiple-access (CSMA) protocol. In the exclusion zone, no mobiles are physically present, modeling the minimum physical separation among mobiles that is always present in actual networks. Potentially interfering mobiles beyond a transmitting mobile's exclusion zone, but within its CSMA guard zone, are deactivated by the protocol. This paper provides an analysis of DS-CSMA networks with either or both types of guard zones. A network of finite extent with a finite number of mobiles and uniform clustering as the spatial distribution is modeled. The analysis applies a closed-form expression for the outage probability in the presence of Nakagami fading, conditioned on the network geometry. The tradeoffs between exclusion zones and CSMA guard zones are explored for DS-CDMA and unspread networks. The spreading factor and the guard-zone radius provide design flexibility in achieving specified levels of average outage probability and transmission capacity. The advantage of an exclusion zone over a CSMA guard zone is that since the network is not thinned, the number of active mobiles remains constant, and higher transmission capacities can be achieved.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 04:03:51 GMT" } ]
2013-04-22T00:00:00
[ [ "Torrieri", "Don", "" ], [ "Valenti", "Matthew C.", "" ] ]
new_dataset
0.978404
1304.5475
Moritz Schubotz
Moritz Schubotz
Making Math Searchable in Wikipedia
7 pages, 2 figures, Conference on Intelligent Computer Mathematics, July 9-14 2012, Bremen, Germany. To be published in Lecture Notes, Artificial Intelligence, Springer
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wikipedia, the world largest encyclopedia contains a lot of knowledge that is expressed as formulae exclusively. Unfortunately, this knowledge is currently not fully accessible by intelligent information retrieval systems. This immense body of knowledge is hidden form value-added services, such as search. In this paper, we present our MathSearch implementation for Wikipedia that enables users to perform a combined text and fully unlock the potential benefits.
[ { "version": "v1", "created": "Fri, 19 Apr 2013 16:48:46 GMT" } ]
2013-04-22T00:00:00
[ [ "Schubotz", "Moritz", "" ] ]
new_dataset
0.976499
1304.5069
Stephan Rafler
Stephan Rafler
The Tap code - a code similar to Morse code for communication by tapping
11 pages, 3 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A code is presented for fast, easy and efficient communication over channels that allow only two signal types: a single sound (e.g. a knock), or no sound (i.e. silence). This is a true binary code while Morse code is a ternary code and does not work in such situations. Thus the presented code is more universal than Morse and can be used in much more situations. Additionally it is very tolerant to variations in signal strength or duration. The paper contains various ways in which the code can be derived, that all lead to the same code. It also contains a comparison to other, similar codes, including the Morse code, in regards to efficiency and other attributes. The replacement of Morse code with Tap code is not proposed.
[ { "version": "v1", "created": "Thu, 18 Apr 2013 10:06:21 GMT" } ]
2013-04-19T00:00:00
[ [ "Rafler", "Stephan", "" ] ]
new_dataset
0.9997
1304.5109
Perrot K\'evin
Kevin Perrot and Eric R\'emila
Kadanoff Sand Pile Model. Avalanche Structure and Wave Shape
30 pages. arXiv admin note: text overlap with arXiv:1106.2670, arXiv:1101.5940
Theoretical Computer Science, ISSN 0304-3975, 10.1016/j.tcs.2013.01.033
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sand pile models are dynamical systems describing the evolution from $N$ stacked grains to a stable configuration. It uses local rules to depict grain moves and iterate it until reaching a fixed configuration from which no rule can be applied. Physicists L. Kadanoff {\em et al} inspire KSPM, extending the well known {\em Sand Pile Model} (SPM). In KSPM($D$), we start from a pile of $N$ stacked grains and apply the rule: $D\!-\!1$ grains can fall from column $i$ onto columns $i+1,i+2,\dots,i+D\!-\!1$ if the difference of height between columns $i$ and $i\!+\!1$ is greater or equal to $D$. Toward the study of fixed points (stable configurations on which no grain can move) obtained from $N$ stacked grains, we propose an iterative study of KSPM evolution consisting in the repeated addition of one grain on a heap of sand, triggering an avalanche at each iteration. We develop a formal background for the study of avalanches, resumed in a finite state word transducer, and explain how this transducer may be used to predict the form of fixed points. Further precise developments provide a plain formula for fixed points of KSPM(3), showing the emergence of a wavy shape.
[ { "version": "v1", "created": "Thu, 18 Apr 2013 12:43:01 GMT" } ]
2013-04-19T00:00:00
[ [ "Perrot", "Kevin", "" ], [ "Rémila", "Eric", "" ] ]
new_dataset
0.978775
1304.4648
Guanghui Zhang
Guanghui Zhang, Bocong Chen
Construction of Self-dual Codes over $F_p+vF_p$
13 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we determine all self-dual codes over $F_p+vF_p$ ($v^2=v$) in terms of self-dual codes over the finite field $F_p$ and give an explicit construction for self-dual codes over $F_p+vF_p$, where $p$ is a prime.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 00:02:41 GMT" } ]
2013-04-18T00:00:00
[ [ "Zhang", "Guanghui", "" ], [ "Chen", "Bocong", "" ] ]
new_dataset
0.954751
1304.4657
Danai Koutra
Danai Koutra, Joshua T. Vogelstein, Christos Faloutsos
DELTACON: A Principled Massive-Graph Similarity Function
2013 SIAM International Conference in Data Mining (SDM)
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How much did a network change since yesterday? How different is the wiring between Bob's brain (a left-handed male) and Alice's brain (a right-handed female)? Graph similarity with known node correspondence, i.e. the detection of changes in the connectivity of graphs, arises in numerous settings. In this work, we formally state the axioms and desired properties of the graph similarity functions, and evaluate when state-of-the-art methods fail to detect crucial connectivity changes in graphs. We propose DeltaCon, a principled, intuitive, and scalable algorithm that assesses the similarity between two graphs on the same nodes (e.g. employees of a company, customers of a mobile carrier). Experiments on various synthetic and real graphs showcase the advantages of our method over existing similarity measures. Finally, we employ DeltaCon to real applications: (a) we classify people to groups of high and low creativity based on their brain connectivity graphs, and (b) do temporal anomaly detection in the who-emails-whom Enron graph.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 00:45:43 GMT" } ]
2013-04-18T00:00:00
[ [ "Koutra", "Danai", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Faloutsos", "Christos", "" ] ]
new_dataset
0.997914
1304.4662
Ankit Chaudhary
J. L. Raheja, A. Chaudhary, K Singal
Tracking of Fingertips and Centres of Palm using KINECT
4 page
In proceedings of the 3rd IEEE International Conference on Computational Intelligence, Modelling and Simulation, Malaysia, 20-22 Sep, 2011, pp. 248-252
null
null
cs.CV
http://creativecommons.org/licenses/publicdomain/
Hand Gesture is a popular way to interact or control machines and it has been implemented in many applications. The geometry of hand is such that it is hard to construct in virtual environment and control the joints but the functionality and DOF encourage researchers to make a hand like instrument. This paper presents a novel method for fingertips detection and centres of palms detection distinctly for both hands using MS KINECT in 3D from the input image. KINECT facilitates us by providing the depth information of foreground objects. The hands were segmented using the depth vector and centres of palms were detected using distance transformation on inverse image. This result would be used to feed the inputs to the robotic hands to emulate human hands operation.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 01:20:10 GMT" } ]
2013-04-18T00:00:00
[ [ "Raheja", "J. L.", "" ], [ "Chaudhary", "A.", "" ], [ "Singal", "K", "" ] ]
new_dataset
0.969548
1304.4927
Yun Fan
Yun Fan and Hongwei Liu
Homogeneous Weights and M\"obius Functions on Finite Rings
This paper has been published in a Chinese journal, see below; here is the English version
Y. Fan and H. Liu, Homogeneous weights of finite rings and M\"obius functions(Chinese), Math. Ann.(Chinese), 31A (2010), 355-364
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The homogeneous weights and the M\"obius functions and Euler phi-functions on finite rings are discussed; some computational formulas for these functions on finite principal ideal rings are characterized; for the residue rings of integers, they are reduced to the classical number-theoretical M\"obius functions and the classical number-theoretical Euler phi-functions.
[ { "version": "v1", "created": "Wed, 17 Apr 2013 19:38:28 GMT" } ]
2013-04-18T00:00:00
[ [ "Fan", "Yun", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.982343
0810.1151
Alban Ponse
Jan A. Bergstra and Alban Ponse
Periodic Single-Pass Instruction Sequences
16 pages, 3 tables, New title
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A program is a finite piece of data that produces a (possibly infinite) sequence of primitive instructions. From scratch we develop a linear notation for sequential, imperative programs, using a familiar class of primitive instructions and so-called repeat instructions, a particular type of control instructions. The resulting mathematical structure is a semigroup. We relate this set of programs to program algebra (PGA) and show that a particular subsemigroup is a carrier for PGA by providing axioms for single-pass congruence, structural congruence, and thread extraction. This subsemigroup characterizes periodic single-pass instruction sequences and provides a direct basis for PGA's toolset.
[ { "version": "v1", "created": "Tue, 7 Oct 2008 13:55:21 GMT" }, { "version": "v2", "created": "Tue, 16 Apr 2013 12:11:12 GMT" } ]
2013-04-17T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
new_dataset
0.996864
1304.0872
David Doty
David Doty
Timing in chemical reaction networks
null
null
null
null
cs.CC cs.DC cs.DS q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising programming language for the design of artificial molecular control circuitry. Due to a formal equivalence between CRNs and a model of distributed computing known as population protocols, results transfer readily between the two models. We show that if a CRN respects finite density (at most O(n) additional molecules can be produced from n initial molecules), then starting from any dense initial configuration (all molecular species initially present have initial count Omega(n), where n is the initial molecular count and volume), then every producible species is produced in constant time with high probability. This implies that no CRN obeying the stated constraints can function as a timer, able to produce a molecule, but doing so only after a time that is an unbounded function of the input size. This has consequences regarding an open question of Angluin, Aspnes, and Eisenstat concerning the ability of population protocols to perform fast, reliable leader election and to simulate arbitrary algorithms from a uniform initial state.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 08:50:30 GMT" } ]
2013-04-17T00:00:00
[ [ "Doty", "David", "" ] ]
new_dataset
0.998975
1304.4548
Hala ElAarag
Hala ElAarag, David Bauschlicher and Steven Bauschlicher
System Architecture of HatterHealthConnect: An Integration of Body Sensor Networks and Social Networks to Improve Health Awareness
null
International Journal of Computer Networks and Communications (IJCNC), Vol.5, No.2, March 2013, pp.1-22, DOI : 10.5121/ijcnc.2013.5201 1 http://airccse.org/journal/ijc2013.html
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the last decade, the demand for efficient healthcare monitoring has increased and forced the health and wellness industry to embrace modern technological advances. Body Sensor Networks, or BSNs, can remotely collect users data and upload vital statistics to servers over the Internet. Advances in wireless technologies such as cellular devices and Bluetooth increase the mobility users experience while wearing a body sensor network. When connected by the proper framework, BSNs can efficiently monitor and record data while minimizing the energy expenditure of nodes in the BSN. Social networking sites play a large role in the aggregation and sharing of data between many users. Connecting a BSN to a social network creates the unique ability to share health related data with other users through social interaction. In this research, we present an integration of BSNs and social networks to establish a community promoting well being and great social awareness. We present the system architecture; both hardware and software, of a prototype implementation using Zephyr HxM heart monitor, Intel-Shimmer EMG senor and a Samsung Captivate smart phone. We provide implementation details for the design on the base station, the database server and the Facebook application. We illustrate how the Android application was designed with both functionality and user perspective in mind that resulted in an easy to use system. This prototype can be used in multiple health related applications based on the type of sensors used.
[ { "version": "v1", "created": "Tue, 16 Apr 2013 18:52:30 GMT" } ]
2013-04-17T00:00:00
[ [ "ElAarag", "Hala", "" ], [ "Bauschlicher", "David", "" ], [ "Bauschlicher", "Steven", "" ] ]
new_dataset
0.962782
1304.4553
Mohsen Ghaffari
Keren Censor-Hillel, Mohsen Ghaffari, Fabian Kuhn
A New Perspective on Vertex Connectivity
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Edge connectivity and vertex connectivity are two fundamental concepts in graph theory. Although by now there is a good understanding of the structure of graphs based on their edge connectivity, our knowledge in the case of vertex connectivity is much more limited. An essential tool in capturing edge connectivity are edge-disjoint spanning trees. The famous results of Tutte and Nash-Williams show that a graph with edge connectivity $\lambda$ contains $\floor{\lambda/2}$ edge-disjoint spanning trees. We present connected dominating set (CDS) partition and packing as tools that are analogous to edge-disjoint spanning trees and that help us to better grasp the structure of graphs based on their vertex connectivity. The objective of the CDS partition problem is to partition the nodes of a graph into as many connected dominating sets as possible. The CDS packing problem is the corresponding fractional relaxation, where CDSs are allowed to overlap as long as this is compensated by assigning appropriate weights. CDS partition and CDS packing can be viewed as the counterparts of the well-studied edge-disjoint spanning trees, focusing on vertex disjointedness rather than edge disjointness. We constructively show that every $k$-vertex-connected graph with $n$ nodes has a CDS packing of size $\Omega(k/\log n)$ and a CDS partition of size $\Omega(k/\log^5 n)$. We prove that the $\Omega(k/\log n)$ CDS packing bound is existentially optimal. Using CDS packing, we show that if vertices of a $k$-vertex-connected graph are independently sampled with probability $p$, then the graph induced by the sampled vertices has vertex connectivity $\tilde{\Omega}(kp^2)$. Moreover, using our $\Omega(k/\log n)$ CDS packing, we get a store-and-forward broadcast algorithm with optimal throughput in the networking model where in each round, each node can send one bounded-size message to all its neighbors.
[ { "version": "v1", "created": "Tue, 16 Apr 2013 19:00:48 GMT" } ]
2013-04-17T00:00:00
[ [ "Censor-Hillel", "Keren", "" ], [ "Ghaffari", "Mohsen", "" ], [ "Kuhn", "Fabian", "" ] ]
new_dataset
0.969391
1304.3850
Hongbo Si
Hongbo Si, O.Ozan Koyluoglu, and Sriram Vishwanath
Polar Coding for Fading Channels
6 pages, 4 figures, conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A polar coding scheme for fading channels is proposed in this paper. More specifically, the focus is Gaussian fading channel with a BPSK modulation technique, where the equivalent channel could be modeled as a binary symmetric channel with varying cross-over probabilities. To deal with variable channel states, a coding scheme of hierarchically utilizing polar codes is proposed. In particular, by observing the polarization of different binary symmetric channels over different fading blocks, each channel use corresponding to a different polarization is modeled as a binary erasure channel such that polar codes could be adopted to encode over blocks. It is shown that the proposed coding scheme, without instantaneous channel state information at the transmitter, achieves the capacity of the corresponding fading binary symmetric channel, which is constructed from the underlying fading AWGN channel through the modulation scheme.
[ { "version": "v1", "created": "Sat, 13 Apr 2013 20:59:40 GMT" } ]
2013-04-16T00:00:00
[ [ "Si", "Hongbo", "" ], [ "Koyluoglu", "O. Ozan", "" ], [ "Vishwanath", "Sriram", "" ] ]
new_dataset
0.999112
1304.4002
Manik Lal Das
Harsh N Thakker, Mayank Saha, Manik Lal Das
Reputation Algebra for Cloud-based Anonymous Data Storage Systems
9 pages
null
null
null
cs.DC cs.CR
http://creativecommons.org/licenses/publicdomain/
Given a cloud-based anonymous data storage system, there are two ways for managing the nodes involved in file transfers. One of them is using reputations and the other uses a micropayment system. In reputation-based approach, each node has a reputation associated with it, which is used as a currency or feedback collection for file exchange operations. There have been several attempts over the years to develop a strong and efficient reputation system that provides credibility, fairness, and accountability. One such attempt was the Free Haven Project that provides a strong foundation for cloud-based anonymous data storage systems. The work proposed in this paper is motivated by the Free Haven Project aimed at developing a reputation system that facilitates dynamic operations such as adding servers, removing servers and changing role of authorities. The proposed system also provides algorithm for scoring and maintaining reputations of the servers in order to achieve credibility, accountability and fairness.
[ { "version": "v1", "created": "Mon, 15 Apr 2013 07:04:32 GMT" } ]
2013-04-16T00:00:00
[ [ "Thakker", "Harsh N", "" ], [ "Saha", "Mayank", "" ], [ "Das", "Manik Lal", "" ] ]
new_dataset
0.963278
1212.2291
Jason Cloud
MinJi Kim, Jason Cloud, Ali ParandehGheibi, Leonardo Urbina, Kerim Fouli, Douglas Leith, Muriel Medard
Network Coded TCP (CTCP)
12 pages, 12 figures, 1 table, submitted to ACM Mobicom 2013. (Revised acknowledgements). arXiv admin note: substantial text overlap with arXiv:1212.1929
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce CTCP, a reliable transport protocol using network coding. CTCP is designed to incorporate TCP features such as congestion control, reliability, and fairness while significantly improving on TCP's performance in lossy, interference-limited and/or dynamic networks. A key advantage of adopting a transport layer over a link layer approach is that it provides backward compatibility with wireless equipment installed throughout existing networks. We present a portable userspace implementation of CTCP and extensively evaluate its performance in both testbed and production wireless networks.
[ { "version": "v1", "created": "Tue, 11 Dec 2012 03:35:22 GMT" }, { "version": "v2", "created": "Sun, 16 Dec 2012 02:17:30 GMT" }, { "version": "v3", "created": "Fri, 12 Apr 2013 17:55:03 GMT" } ]
2013-04-15T00:00:00
[ [ "Kim", "MinJi", "" ], [ "Cloud", "Jason", "" ], [ "ParandehGheibi", "Ali", "" ], [ "Urbina", "Leonardo", "" ], [ "Fouli", "Kerim", "" ], [ "Leith", "Douglas", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.999664
1304.3513
Mahmudur Rahman
Bogdan Carbunar, Mahmudur Rahman, Jaime Ballesteros, Naphtali Rishe
Eat the Cake and Have It Too: Privacy Preserving Location Aggregates in Geosocial Networks
null
null
null
null
cs.CR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geosocial networks are online social networks centered on the locations of subscribers and businesses. Providing input to targeted advertising, profiling social network users becomes an important source of revenue. Its natural reliance on personal information introduces a trade-off between user privacy and incentives of participation for businesses and geosocial network providers. In this paper we introduce location centric profiles (LCPs), aggregates built over the profiles of users present at a given location. We introduce PROFILR, a suite of mechanisms that construct LCPs in a private and correct manner. We introduce iSafe, a novel, context aware public safety application built on PROFILR . Our Android and browser plugin implementations show that PROFILR is efficient: the end-to-end overhead is small even under strong correctness assurances.
[ { "version": "v1", "created": "Fri, 12 Apr 2013 00:43:53 GMT" } ]
2013-04-15T00:00:00
[ [ "Carbunar", "Bogdan", "" ], [ "Rahman", "Mahmudur", "" ], [ "Ballesteros", "Jaime", "" ], [ "Rishe", "Naphtali", "" ] ]
new_dataset
0.965029
1304.3120
Jonathan Arthur Quaye-Ballard
J. A. Quaye-Ballard, R. An, A. B. Agyemang, N. Y. Oppong-Quayson, and J. E. N. Ablade
GUI Database for the Equipment Store of the Department of Geomatic Engineering, KNUST
6 pages, 9 figures, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 7, 2012
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The geospatial analyst is required to apply art, science, and technology to measure relative positions of natural and man-made features above or beneath the earths surface, and to present this information either graphically or numerically. The reference positions for these measurements need to be well archived and managed to effectively sustain the activities in the spatial industry. The research herein described highlights the need for an information system for the Land Surveyors Equipment Store. Such a system is a database management system with a user friendly graphical interface. This paper describes one such system that has been developed for the Equipment Store of the Department of Geomatic Engineering, Kwame Nkrumah University of Science and Technology, Ghana. The system facilitates efficient management and location of instruments, as well as easy location of beacons together with their attribute information, it provides multimedia information about instruments in an Equipment Store. Digital camera was used capture the pictorial descriptions of the beacons. Geographic Information System software was employed to visualize the spatial location of beacons and to publish the various layers for the Graphical User Interface. The aesthetics of the interface was developed with user interface design tools and coded by programming. The developed Suite, powered by a reliable and fully scalable database, provides an efficient way of booking and analyzing transactions in an Equipment Store.
[ { "version": "v1", "created": "Wed, 10 Apr 2013 00:25:01 GMT" } ]
2013-04-12T00:00:00
[ [ "Quaye-Ballard", "J. A.", "" ], [ "An", "R.", "" ], [ "Agyemang", "A. B.", "" ], [ "Oppong-Quayson", "N. Y.", "" ], [ "Ablade", "J. E. N.", "" ] ]
new_dataset
0.977922
1304.3307
Elena Pribavkina
Vladimir V. Gusev, Marina I. Maslennikova, Elena V. Pribavkina
Principal ideal languages and synchronizing automata
15 pages, 9 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study ideal languages generated by a single word. We provide an algorithm to construct a strongly connected synchronizing automaton for which such a language serves as the language of synchronizing words. Also we present a compact formula to calculate the syntactic complexity of this language.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 14:12:55 GMT" } ]
2013-04-12T00:00:00
[ [ "Gusev", "Vladimir V.", "" ], [ "Maslennikova", "Marina I.", "" ], [ "Pribavkina", "Elena V.", "" ] ]
new_dataset
0.980168
1304.3309
Dragan Vidakovic Novak
Dragan Vidakovic, Dusko Parezanovic, Olivera Nikolic and Jelena Kaljevic
RSA Signature: Behind the Scenes
13 pages
Advanced Computing: An International Journal ( ACIJ ), Vol.4, No.2, March 2013
10.5121/acij.2013.4203
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a complete digital signature message stream, just the way the RSA digital signature scheme does it. We will focus on the operations with large numbers due to the fact that operating with large numbers is the essence of RSA that cannot be understood by the usual illustrative examples with small numbers.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 14:16:01 GMT" } ]
2013-04-12T00:00:00
[ [ "Vidakovic", "Dragan", "" ], [ "Parezanovic", "Dusko", "" ], [ "Nikolic", "Olivera", "" ], [ "Kaljevic", "Jelena", "" ] ]
new_dataset
0.999394
1304.3402
Pat Morin
Pat Morin and Sander Verdonschot
On the Average Number of Edges in Theta Graphs
20 pages, 6 figures, 1 table
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theta graphs are important geometric graphs that have many applications, including wireless networking, motion planning, real-time animation, and minimum-spanning tree construction. We give closed form expressions for the average degree of theta graphs of a homogeneous Poisson point process over the plane. We then show that essentially the same bounds---with vanishing error terms---hold for theta graphs of finite sets of points that are uniformly distributed in a square. Finally, we show that the number of edges in a theta graph of points uniformly distributed in a square is concentrated around its expected value.
[ { "version": "v1", "created": "Thu, 11 Apr 2013 19:21:51 GMT" } ]
2013-04-12T00:00:00
[ [ "Morin", "Pat", "" ], [ "Verdonschot", "Sander", "" ] ]
new_dataset
0.966482
1301.3457
Marcelo Cicconet
Marcelo Cicconet, Italo Lima, Davi Geiger, Kris Gunsalus
A Geometric Descriptor for Cell-Division Detection
This paper has been withdrawn by the author since the review process for the conference to which it was applied ended
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a method for cell-division detection based on a geometric-driven descriptor that can be represented as a 5-layers processing network, based mainly on wavelet filtering and a test for mirror symmetry between pairs of pixels. After the centroids of the descriptors are computed for a sequence of frames, the two-steps piecewise constant function that best fits the sequence of centroids determines the frame where the division occurs.
[ { "version": "v1", "created": "Tue, 15 Jan 2013 19:18:52 GMT" }, { "version": "v2", "created": "Wed, 10 Apr 2013 18:32:07 GMT" } ]
2013-04-11T00:00:00
[ [ "Cicconet", "Marcelo", "" ], [ "Lima", "Italo", "" ], [ "Geiger", "Davi", "" ], [ "Gunsalus", "Kris", "" ] ]
new_dataset
0.996768
1304.2814
Gilles Geeraerts
Thomas Brihaye and Morgane Esti\'evenart and Gilles Geeraerts
On MITL and alternating timed automata
28 pages, 3 figures, submitted
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One clock alternating timed automata OCATA have been recently introduced as natural extension of (one clock) timed automata to express the semantics of MTL (Ouaknine, Worrell 2005). We consider the application of OCATA to problem of model-checking MITL formulas (a syntactic fragment of MTL) against timed automata. We introduce a new semantics for OCATA where, intuitively, clock valuations are intervals instead of single real values. Thanks to this new semantics, we show that we can bound the number of clock copies that are necessary to allow an OCATA to recognise the models of an MITL formula. Equipped with this technique, we propose a new algorithm to translate an MITL formula into a timed automaton, and we sketch several ideas to define new model checking algorithms for MITL.
[ { "version": "v1", "created": "Tue, 9 Apr 2013 23:13:43 GMT" } ]
2013-04-11T00:00:00
[ [ "Brihaye", "Thomas", "" ], [ "Estiévenart", "Morgane", "" ], [ "Geeraerts", "Gilles", "" ] ]
new_dataset
0.994479
1304.2888
Nicolas Bredeche
Nicolas Bredeche, Jean-Marc Montanier, Berend Weel, Evert Haasdijk
Roborobo! a Fast Robot Simulator for Swarm and Collective Robotics
2 pages, 1 figure
null
null
null
cs.RO cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Roborobo! is a multi-platform, highly portable, robot simulator for large-scale collective robotics experiments. Roborobo! is coded in C++, and follows the KISS guideline ("Keep it simple"). Therefore, its external dependency is solely limited to the widely available SDL library for fast 2D Graphics. Roborobo! is based on a Khepera/ePuck model. It is targeted for fast single and multi-robots simulation, and has already been used in more than a dozen published research mainly concerned with evolutionary swarm robotics, including environment-driven self-adaptation and distributed evolutionary optimization, as well as online onboard embodied evolution and embodied morphogenesis.
[ { "version": "v1", "created": "Wed, 10 Apr 2013 09:44:52 GMT" } ]
2013-04-11T00:00:00
[ [ "Bredeche", "Nicolas", "" ], [ "Montanier", "Jean-Marc", "" ], [ "Weel", "Berend", "" ], [ "Haasdijk", "Evert", "" ] ]
new_dataset
0.998522
1304.2361
Carl Kadie
Carl Kadie
Rational Nonmonotonic Reasoning
Appears in Proceedings of the Fourth Conference on Uncertainty in Artificial Intelligence (UAI1988)
null
null
UAI-P-1988-PG-197-204
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonmonotonic reasoning is a pattern of reasoning that allows an agent to make and retract (tentative) conclusions from inconclusive evidence. This paper gives a possible-worlds interpretation of the nonmonotonic reasoning problem based on standard decision theory and the emerging probability logic. The system's central principle is that a tentative conclusion is a decision to make a bet, not an assertion of fact. The system is rational, and as sound as the proof theory of its underlying probability log.
[ { "version": "v1", "created": "Wed, 27 Mar 2013 19:43:41 GMT" } ]
2013-04-10T00:00:00
[ [ "Kadie", "Carl", "" ] ]
new_dataset
0.9982
1210.3761
Vasilis Papavasileiou
Panagiotis Manolios and Vasilis Papavasileiou
ILP Modulo Theories
CAV 2013 version plus proofs
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Integer Linear Programming (ILP) Modulo Theories (IMT). An IMT instance is an Integer Linear Programming instance, where some symbols have interpretations in background theories. In previous work, the IMT approach has been applied to industrial synthesis and design problems with real-time constraints arising in the development of the Boeing 787. Many other problems ranging from operations research to software verification routinely involve linear constraints and optimization. Thus, a general ILP Modulo Theories framework has the potential to be widely applicable. The logical next step in the development of IMT and the main goal of this paper is to provide theoretical underpinnings. This is accomplished by means of BC(T), the Branch and Cut Modulo T abstract transition system. We show that BC(T) provides a sound and complete optimization procedure for the ILP Modulo T problem, as long as T is a decidable, stably-infinite theory. We compare a prototype of BC(T) against leading SMT solvers.
[ { "version": "v1", "created": "Sun, 14 Oct 2012 05:15:20 GMT" }, { "version": "v2", "created": "Mon, 8 Apr 2013 18:58:06 GMT" } ]
2013-04-09T00:00:00
[ [ "Manolios", "Panagiotis", "" ], [ "Papavasileiou", "Vasilis", "" ] ]
new_dataset
0.999195
1304.1963
Haibo Jiang
Haibo Jiang, YaoFei Ma, Dongsheng Hong, Zhen Li
A new metric for routing in military wireless network
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Ad-hoc network is generally employed in military and emergencies due to its flexibility and easy-to-use. It's suitable for military wireless network that has the characteristics of mobility and works effectively under severe environment and electromagnetic interfering conditions. However, military network cannot benefit from existing routing protocol directly; there exists quite many features which are only typical for military network. This paper presents a new metric for routing, which is employed in A* algorithm. The goal of the metric is to choose a route of less distance and less transmission delay between a source and a destination. Our metric is a function of the distance between the ends and the bandwidth over the link. Moreover, we take frequency selection into account since a node can work on multi-frequencies. This paper proposed the new metric, and experimented it based on A* algorithm. The simulation results show that this metric can find the optimal route which has less transmission delay compared to the shortest path routing.
[ { "version": "v1", "created": "Sun, 7 Apr 2013 07:01:50 GMT" } ]
2013-04-09T00:00:00
[ [ "Jiang", "Haibo", "" ], [ "Ma", "YaoFei", "" ], [ "Hong", "Dongsheng", "" ], [ "Li", "Zhen", "" ] ]
new_dataset
0.998719
1304.1972
Amelia Carolina Sparavigna
Amelia Carolina Sparavigna
Facial transformations of ancient portraits: the face of Caesar
Image processing, Facial transformation, Morphing, Portraits, Julius Caesar, Arles bust, Tusculum bust
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some software solutions used to obtain the facial transformations can help investigating the artistic metamorphosis of the ancient portraits of the same person. An analysis with a freely available software of portraitures of Julius Caesar is proposed, showing his several "morphs". The software helps enhancing the mood the artist added to a portrait.
[ { "version": "v1", "created": "Sun, 7 Apr 2013 09:43:47 GMT" } ]
2013-04-09T00:00:00
[ [ "Sparavigna", "Amelia Carolina", "" ] ]
new_dataset
0.984159
1304.1986
Andrew Adamatzky
Andrew Adamatzky
On growing connected beta-skeletons
null
Computational Geometry, 46 (2013) 6, 805--816
10.1016/j.comgeo.2012.11.009
null
cs.CG nlin.PS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $\beta$-skeleton, $\beta \geq 1$, is a planar proximity undirected graph of an Euclidean points set, where nodes are connected by an edge if their lune-based neighbourhood contains no other points of the given set. Parameter $\beta$ determines the size and shape of the lune-based neighbourhood. A $\beta$-skeleton of a random planar set is usually a disconnected graph for $\beta>2$. With the increase of $\beta$, the number of edges in the $\beta$-skeleton of a random graph decreases. We show how to grow stable $\beta$-skeletons, which are connected for any given value of $\beta$ and characterise morphological transformations of the skeletons governed by $\beta$ and a degree of approximation. We speculate how the results obtained can be applied in biology and chemistry.
[ { "version": "v1", "created": "Sun, 7 Apr 2013 11:58:28 GMT" } ]
2013-04-09T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.995838
1304.2050
Andrew Adamatzky
Andrew Adamatzky, Rachel Armstrong, Jeff Jones, Yukio-Pegio Gunji
On Creativity of Slime Mould
null
International Journal of General Systems 42 (2013) 5, 441-457
10.1080/03081079.2013.776206
null
cs.ET nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Slime mould Physarum polycephalum is large single cell with intriguingly smart behaviour. The slime mould shows outstanding abilities to adapt its protoplasmic network to varying environmental conditions. The slime mould can solve tasks of computational geometry, image processing, logics and arithmetics when data are represented by configurations of attractants and repellents. We attempt to map behavioural patterns of slime onto the cognitive control versus schizotypy spectrum phase space and thus interpret slime mould's activity in terms of creativity.
[ { "version": "v1", "created": "Sun, 7 Apr 2013 19:41:00 GMT" } ]
2013-04-09T00:00:00
[ [ "Adamatzky", "Andrew", "" ], [ "Armstrong", "Rachel", "" ], [ "Jones", "Jeff", "" ], [ "Gunji", "Yukio-Pegio", "" ] ]
new_dataset
0.998816
1304.2094
Farzad Hessar
Hossein Hosseini, Behnam Bahrak, Farzad Hessar
A GOST-like Blind Signature Scheme Based on Elliptic Curve Discrete Logarithm Problem
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a blind signature scheme and three practical educed schemes based on elliptic curve discrete logarithm problem. The proposed schemes impart the GOST signature structure and utilize the inherent advantage of elliptic curve cryptosystems in terms of smaller key size and lower computational overhead to its counterpart public key cryptosystems such as RSA and ElGamal. The proposed schemes are proved to be secure and have less time complexity in comparison with the existing schemes.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 03:19:45 GMT" } ]
2013-04-09T00:00:00
[ [ "Hosseini", "Hossein", "" ], [ "Bahrak", "Behnam", "" ], [ "Hessar", "Farzad", "" ] ]
new_dataset
0.997113
1304.2103
Hao Lu
Hao Lu, Peilin Hong and Kaiping Xue
High-Throughput Cooperative Communication with Interference Cancellation for Two-Path Relay in Multi-source System
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay-based cooperative communication has become a research focus in recent years because it can achieve diversity gain in wireless networks. In existing works, network coding and two-path relay are adopted to deal with the increase of network size and the half-duplex nature of relay, respectively. To further improve bandwidth efficiency, we propose a novel cooperative transmission scheme which combines network coding and two-path relay together in a multi-source system. Due to the utilization of two-path relay, our proposed scheme achieves full-rate transmission. Adopting complex field network coding (CFNC) at both sources and relays ensures that symbols from different sources are allowed to be broadcast in the same time slot. We also adopt physical-layer network coding (PNC) at relay nodes to deal with the inter-relay interference caused by the two-path relay. With careful process design, the ideal throughput of our scheme achieves by 1 symbol per source per time slot (sym/S/TS). Furthermore, the theoretical analysis provides a method to estimate the symbol error probability (SEP) and throughput in additive complex white Gaussian noise (AWGN) and Rayleigh fading channels. The simulation results verify the improvement achieved by the proposed scheme.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 05:03:55 GMT" } ]
2013-04-09T00:00:00
[ [ "Lu", "Hao", "" ], [ "Hong", "Peilin", "" ], [ "Xue", "Kaiping", "" ] ]
new_dataset
0.956679
1304.2233
Michael Erhard
Michael Erhard and Hans Strauch
Sensors and Navigation Algorithms for Flight Control of Tethered Kites
6 pages, 9 figures, submitted to European Control Conference (ECC) 2013
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the sensor setup and the basic navigation algorithm used for the flight control of the SkySails towing kite system. Starting with brief summaries on system setup and equations of motion of the tethered kite system, we subsequently give an overview of the sensor setup, present the navigation task and discuss challenges which have to be mastered. In the second part we introduce in detail the inertial navigation algorithm which has been used for operational flights for years. The functional capability of this algorithm is illustrated by experimental flight data. Finally we suggest a modification of the algorithms as further development step in order to overcome certain limitations.
[ { "version": "v1", "created": "Mon, 8 Apr 2013 15:14:56 GMT" } ]
2013-04-09T00:00:00
[ [ "Erhard", "Michael", "" ], [ "Strauch", "Hans", "" ] ]
new_dataset
0.963992
1304.1491
Fahiem Bacchus
Fahiem Bacchus
Lp : A Logic for Statistical Information
Appears in Proceedings of the Fifth Conference on Uncertainty in Artificial Intelligence (UAI1989)
null
null
UAI-P-1989-PG-1-6
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This extended abstract presents a logic, called Lp, that is capable of representing and reasoning with a wide variety of both qualitative and quantitative statistical information. The advantage of this logical formalism is that it offers a declarative representation of statistical knowledge; knowledge represented in this manner can be used for a variety of reasoning tasks. The logic differs from previous work in probability logics in that it uses a probability distribution over the domain of discourse, whereas most previous work (e.g., Nilsson [2], Scott et al. [3], Gaifinan [4], Fagin et al. [5]) has investigated the attachment of probabilities to the sentences of the logic (also, see Halpern [6] and Bacchus [7] for further discussion of the differences). The logic Lp possesses some further important features. First, Lp is a superset of first order logic, hence it can represent ordinary logical assertions. This means that Lp provides a mechanism for integrating statistical information and reasoning about uncertainty into systems based solely on logic. Second, Lp possesses transparent semantics, based on sets and probabilities of those sets. Hence, knowledge represented in Lp can be understood in terms of the simple primative concepts of sets and probabilities. And finally, the there is a sound proof theory that has wide coverage (the proof theory is complete for certain classes of models). The proof theory captures a sufficient range of valid inferences to subsume most previous probabilistic uncertainty reasoning systems. For example, the linear constraints like those generated by Nilsson's probabilistic entailment [2] can be generated by the proof theory, and the Bayesian inference underlying belief nets [8] can be performed. In addition, the proof theory integrates quantitative and qualitative reasoning as well as statistical and logical reasoning. In the next section we briefly examine previous work in probability logics, comparing it to Lp. Then we present some of the varieties of statistical information that Lp is capable of expressing. After this we present, briefly, the syntax, semantics, and proof theory of the logic. We conclude with a few examples of knowledge representation and reasoning in Lp, pointing out the advantages of the declarative representation offered by Lp. We close with a brief discussion of probabilities as degrees of belief, indicating how such probabilities can be generated from statistical knowledge encoded in Lp. The reader who is interested in a more complete treatment should consult Bacchus [7].
[ { "version": "v1", "created": "Wed, 27 Mar 2013 19:36:47 GMT" } ]
2013-04-08T00:00:00
[ [ "Bacchus", "Fahiem", "" ] ]
new_dataset
0.998474
1304.1718
Pierre Aboulker
Pierre Aboulker 'and' Nicolas Bousquet
Excluding cycles with a fixed number of chords
30 pages, 7 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Trotignon and Vuskovic completely characterized graphs that do not contain cycles with exactly one chord. In particular, they show that such a graph G has chromatic number at most max(3,w(G)). We generalize this result to the class of graphs that do not contain cycles with exactly two chords and the class of graphs that do not contain cycles with exactly three chords. More precisely we prove that graphs with no cycle with exactly two chords have chromatic number at most 6. And a graph G with no cycle with exactly three chords have chromatic number at most max(96,w(G)+1).
[ { "version": "v1", "created": "Fri, 5 Apr 2013 14:07:53 GMT" } ]
2013-04-08T00:00:00
[ [ "Bousquet", "Pierre Aboulker 'and' Nicolas", "" ] ]
new_dataset
0.997848
1304.1095
Ingo Beinlich
Ingo Beinlich, Edward H. Herskovits
Ergo: A Graphical Environment for Constructing Bayesian
Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)
null
null
UAI-P-1990-PG-114-121
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an environment that considerably simplifies the process of generating Bayesian belief networks. The system has been implemented on readily available, inexpensive hardware, and provides clarity and high performance. We present an introduction to Bayesian belief networks, discuss algorithms for inference with these networks, and delineate the classes of problems that can be solved with this paradigm. We then describe the hardware and software that constitute the system, and illustrate Ergo's use with several example
[ { "version": "v1", "created": "Wed, 27 Mar 2013 13:55:48 GMT" } ]
2013-04-05T00:00:00
[ [ "Beinlich", "Ingo", "" ], [ "Herskovits", "Edward H.", "" ] ]
new_dataset
0.951919
1304.1130
Kathryn Blackmond Laskey
Kathryn Blackmond Laskey
A Probabilistic Reasoning Environment
Appears in Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence (UAI1990)
null
null
UAI-P-1990-PG-415-422
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A framework is presented for a computational theory of probabilistic argument. The Probabilistic Reasoning Environment encodes knowledge at three levels. At the deepest level are a set of schemata encoding the system's domain knowledge. This knowledge is used to build a set of second-level arguments, which are structured for efficient recapture of the knowledge used to construct them. Finally, at the top level is a Bayesian network constructed from the arguments. The system is designed to facilitate not just propagation of beliefs and assimilation of evidence, but also the dynamic process of constructing a belief network, evaluating its adequacy, and revising it when necessary.
[ { "version": "v1", "created": "Wed, 27 Mar 2013 13:59:09 GMT" } ]
2013-04-05T00:00:00
[ [ "Laskey", "Kathryn Blackmond", "" ] ]
new_dataset
0.987218
1304.1207
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen
Fourier-Reflexive Partitions and MacWilliams Identities for Additive Codes
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A partition of a finite abelian group gives rise to a dual partition on the character group via the Fourier transform. Properties of the dual partitions are investigated and a convenient test is given for the case that the bidual partition coincides the primal partition. Such partitions permit MacWilliams identities for the partition enumerators of additive codes. It is shown that dualization commutes with taking products and symmetrized products of partitions on cartesian powers of the given group. After translating the results to Frobenius rings, which are identified with their character module, the approach is applied to partitions that arise from poset structures.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 23:16:52 GMT" } ]
2013-04-05T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ] ]
new_dataset
0.985371
1304.1405
Yun Fan
Yun Fan, San Ling, Hongwei Liu
Homogeneous Weights of Matrix Product Codes over Finite Principal Ideal Rings
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the homogeneous weights of matrix product codes over finite principal ideal rings are studied and a lower bound for the minimum homogeneous weights of such matrix product codes is obtained.
[ { "version": "v1", "created": "Thu, 4 Apr 2013 15:44:15 GMT" } ]
2013-04-05T00:00:00
[ [ "Fan", "Yun", "" ], [ "Ling", "San", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.967078
1202.2684
Michaela Rombach
M. Puck Rombach, Mason A. Porter, James H. Fowler and Peter J. Mucha
Core-Periphery Structure in Networks
null
null
null
null
cs.SI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intermediate-scale (or `meso-scale') structures in networks have received considerable attention, as the algorithmic detection of such structures makes it possible to discover network features that are not apparent either at the local scale of nodes and edges or at the global scale of summary statistics. Numerous types of meso-scale structures can occur in networks, but investigations of such features have focused predominantly on the identification and study of community structure. In this paper, we develop a new method to investigate the meso-scale feature known as core-periphery structure, which entails identifying densely-connected core nodes and sparsely-connected periphery nodes. In contrast to communities, the nodes in a core are also reasonably well-connected to those in the periphery. Our new method of computing core-periphery structure can identify multiple cores in a network and takes different possible cores into account. We illustrate the differences between our method and several existing methods for identifying which nodes belong to a core, and we use our technique to examine core-periphery structure in examples of friendship, collaboration, transportation, and voting networks.
[ { "version": "v1", "created": "Mon, 13 Feb 2012 10:32:51 GMT" }, { "version": "v2", "created": "Tue, 2 Apr 2013 21:47:01 GMT" } ]
2013-04-04T00:00:00
[ [ "Rombach", "M. Puck", "" ], [ "Porter", "Mason A.", "" ], [ "Fowler", "James H.", "" ], [ "Mucha", "Peter J.", "" ] ]
new_dataset
0.970335
1301.2714
Ahmed Rhif
Ahmed Rhif, Zohra Kardous, Naceur Ben Hadj Braiek
A Sliding Mode-Multimodel Control with Sliding Mode Observer for a Sensorless Pumping System
This paper has been withdrawn by the author because it may be reviewed
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work deals with the design of a sliding mode observer with a multi-surfaces sliding mode multimodel control (SM-MMC) for a mechanical sensorless pumping system. The observer is designed to estimate the speed and the mechanical position of the DC motor operating in the process. Robustness tests validated by simulation show the effectiveness of the sliding mode observer associated with this control approach (SM-MMC).
[ { "version": "v1", "created": "Sat, 12 Jan 2013 19:59:55 GMT" }, { "version": "v2", "created": "Sat, 19 Jan 2013 10:44:07 GMT" }, { "version": "v3", "created": "Fri, 22 Feb 2013 15:18:19 GMT" }, { "version": "v4", "created": "Tue, 2 Apr 2013 23:24:07 GMT" } ]
2013-04-04T00:00:00
[ [ "Rhif", "Ahmed", "" ], [ "Kardous", "Zohra", "" ], [ "Braiek", "Naceur Ben Hadj", "" ] ]
new_dataset
0.989049
1302.4205
Walid Belkhir
Walid Belkhir, Yannick Chevalier, Michael Rusinowitch
Fresh-Variable Automata for Service Composition
28 pages. 4 Figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To model Web services handling data from an infinite domain, or with multiple sessions, we introduce fresh-variable automata, a simple extension of finite-state automata in which some transitions are labeled with variables that can be refreshed in some specified states. We prove several closure properties for this class of automata and study their decision problems. We then introduce a notion of simulation that enables us to reduce the Web service composition problem to the construction of a simulation of a target service by the asynchronous product of existing services, and prove that this construction is computable.
[ { "version": "v1", "created": "Mon, 18 Feb 2013 10:05:40 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2013 10:40:52 GMT" }, { "version": "v3", "created": "Wed, 3 Apr 2013 09:24:25 GMT" } ]
2013-04-04T00:00:00
[ [ "Belkhir", "Walid", "" ], [ "Chevalier", "Yannick", "" ], [ "Rusinowitch", "Michael", "" ] ]
new_dataset
0.997963
1304.1000
Wil van der Aalst
Wil van der Aalst
Passages in Graphs
8 pages
null
null
BPM Center Report BPM-12-19
cs.DM math.CO
http://creativecommons.org/licenses/by/3.0/
Directed graphs can be partitioned in so-called passages. A passage P is a set of edges such that any two edges sharing the same initial vertex or sharing the same terminal vertex are both inside $P$ or are both outside of P. Passages were first identified in the context of process mining where they are used to successfully decompose process discovery and conformance checking problems. In this article, we examine the properties of passages. We will show that passages are closed under set operators such as union, intersection and difference. Moreover, any passage is composed of so-called minimal passages. These properties can be exploited when decomposing graph-based analysis and computation problems.
[ { "version": "v1", "created": "Wed, 3 Apr 2013 16:07:46 GMT" } ]
2013-04-04T00:00:00
[ [ "van der Aalst", "Wil", "" ] ]
new_dataset
0.970206
1304.1005
Marius Zimand
N.V. Vinodchandran and Marius Zimand
On optimal language compression for sets in PSPACE/poly
submitted to Theory of Computing Systems
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that if DTIME[2^O(n)] is not included in DSPACE[2^o(n)], then, for every set B in PSPACE/poly, all strings x in B of length n can be represented by a string compressed(x) of length at most log(|B^{=n}|)+O(log n), such that a polynomial-time algorithm, given compressed(x), can distinguish x from all the other strings in B^{=n}. Modulo the O(log n) additive term, this achieves the information-theoretic optimum for string compression. We also observe that optimal compression is not possible for sets more complex than PSPACE/poly because for any time-constructible superpolynomial function t, there is a set A computable in space t(n) such that at least one string x of length n requires compressed(x) to be of length 2 log(|A^=n|).
[ { "version": "v1", "created": "Wed, 3 Apr 2013 16:37:02 GMT" } ]
2013-04-04T00:00:00
[ [ "Vinodchandran", "N. V.", "" ], [ "Zimand", "Marius", "" ] ]
new_dataset
0.951572
1304.0538
Sen Ma Dr
Sen Ma
OESPA:A Theory of Programming that Support Software Engineering
18 pages for FOCS 2013
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new theory of programming is proposed. The theory consists of OE (Operation Expression), SP (Semantic Predicate) and A (Axiom), abbreviated as OESPA. OE is for programming: its syntax is given by BNF formulas and its semantics is defined by axioms on these formulas. Similar to predicates in logic, SP is for describing properties of OE (i.e. programs) and for program property analysis. But SP is different from predicates, it directly relates the final values of variables upon termination of a given OE with initial values of these variables before the same OE. As such, it is feasible to prove or disprove whether a given SP is a property of a given OE by computation based on A (Axioms). SP calculus is proposed for program specification and specification analysis, that is missing in software engineering.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 05:57:44 GMT" } ]
2013-04-03T00:00:00
[ [ "Ma", "Sen", "" ] ]
new_dataset
0.999337
1304.0600
Roman Bezhencev Vadimovich
Bezhentcev Roman Vadimovich
Software for creating pictures in the LaTeX environment
8 pages, 1 figure, 2 formulas, sourcecode
null
null
null
cs.GR
http://creativecommons.org/licenses/by/3.0/
To create a text with graphic instructions for output pictures into LATEX document, we offer software that allows us to build a picture in WIZIWIG mode and for setting the text with these graphical instructions.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 11:55:33 GMT" } ]
2013-04-03T00:00:00
[ [ "Vadimovich", "Bezhentcev Roman", "" ] ]
new_dataset
0.998684
1304.0620
A. Anonymous
Heng Zhang, Yan Zhang
Disjunctive Logic Programs versus Normal Logic Programs
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on the expressive power of disjunctive and normal logic programs under the stable model semantics over finite, infinite, or arbitrary structures. A translation from disjunctive logic programs into normal logic programs is proposed and then proved to be sound over infinite structures. The equivalence of expressive power of two kinds of logic programs over arbitrary structures is shown to coincide with that over finite structures, and coincide with whether or not NP is closed under complement. Over finite structures, the intranslatability from disjunctive logic programs to normal logic programs is also proved if arities of auxiliary predicates and functions are bounded in a certain way.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 12:59:41 GMT" } ]
2013-04-03T00:00:00
[ [ "Zhang", "Heng", "" ], [ "Zhang", "Yan", "" ] ]
new_dataset
0.988021
1304.0660
Pranav Garg
Pranav Garg and P. Madhusudan and Gennaro Parlato
Quantified Data Automata on Skinny Trees: an Abstract Domain for Lists
null
null
null
null
cs.PL cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new approach to heap analysis through an abstract domain of automata, called automatic shapes. The abstract domain uses a particular kind of automata, called quantified data automata on skinny trees (QSDAs), that allows to define universally quantified properties of singly-linked lists. To ensure convergence of the abstract fixed-point computation, we introduce a sub-class of QSDAs called elastic QSDAs, which also form an abstract domain. We evaluate our approach on several list manipulating programs and we show that the proposed domain is powerful enough to prove a large class of these programs correct.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 15:07:47 GMT" } ]
2013-04-03T00:00:00
[ [ "Garg", "Pranav", "" ], [ "Madhusudan", "P.", "" ], [ "Parlato", "Gennaro", "" ] ]
new_dataset
0.972178
1304.0713
Yuan Li
Chris Beck and Yuan Li
Represent MOD function by low degree polynomial with unbounded one-sided error
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove tight lower bounds on the smallest degree of a nonzero polynomial in the ideal generated by $MOD_q$ or $\neg MOD_q$ in the polynomial ring $F_p[x_1, \ldots, x_n]/(x_1^2 = x_1, \ldots, x_n^2 = x_n)$, $p,q$ are coprime, which is called \emph{immunity} over $F_p$. The immunity of $MOD_q$ is lower bounded by $\lfloor (n+1)/2 \rfloor$, which is achievable when $n$ is a multiple of $2q$; the immunity of $\neg MOD_q$ is exactly $\lfloor (n+q-1)/q \rfloor$ for every $q$ and $n$. Our result improves the previous bound $\lfloor \frac{n}{2(q-1)} \rfloor$ by Green. We observe how immunity over $F_p$ is related to $\acc$ circuit lower bound. For example, if the immunity of $f$ over $F_p$ is lower bounded by $n/2 - o(\sqrt{n})$, and $|1_f| = \Omega(2^n)$, then $f$ requires $\acc$ circuit of exponential size to compute.
[ { "version": "v1", "created": "Tue, 2 Apr 2013 17:50:54 GMT" } ]
2013-04-03T00:00:00
[ [ "Beck", "Chris", "" ], [ "Li", "Yuan", "" ] ]
new_dataset
0.99058
1304.0715
Ladislau B\"ol\"oni
Ladislau B\"ol\"oni
A cookbook of translating English to Xapi
null
null
null
XTR-001
cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Xapagy cognitive architecture had been designed to perform narrative reasoning: to model and mimic the activities performed by humans when witnessing, reading, recalling, narrating and talking about stories. Xapagy communicates with the outside world using Xapi, a simplified, "pidgin" language which is strongly tied to the internal representation model (instances, scenes and verb instances) and reasoning techniques (shadows and headless shadows). While not fully a semantic equivalent of natural language, Xapi can represent a wide range of complex stories. We illustrate the representation technique used in Xapi through examples taken from folk physics, folk psychology as well as some more unusual literary examples. We argue that while the Xapi model represents a conceptual shift from the English representation, the mapping is logical and consistent, and a trained knowledge engineer can translate between English and Xapi at near-native speed.
[ { "version": "v1", "created": "Sun, 31 Mar 2013 22:17:19 GMT" } ]
2013-04-03T00:00:00
[ [ "Bölöni", "Ladislau", "" ] ]
new_dataset
0.999257
1201.4856
Matthew Bauer
Matthew S. Bauer
A PSPACE-Complete First Order Fragment of Computability Logic
null
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recently launched research program for developing logic as a formal theory of (interactive) computability, several very interesting logics have been introduced and axiomatized. These fragments of the larger Computability Logic aim not only to describe "what" can be computed, but also provide a mechanism for extracting computational algorithms from proofs. Among the most expressive and fundamental of these is CL4, known to be (constructively) sound and complete with respect to the underlying computational semantics. Furthermore, the fragment of CL4 not containing blind quantifiers was shown to be decidable in polynomial space. The present work extends this result and proves that this fragment is, in fact, PSPACE-complete.
[ { "version": "v1", "created": "Mon, 23 Jan 2012 20:59:22 GMT" }, { "version": "v2", "created": "Tue, 31 Jan 2012 20:00:30 GMT" }, { "version": "v3", "created": "Sun, 31 Mar 2013 20:16:31 GMT" } ]
2013-04-02T00:00:00
[ [ "Bauer", "Matthew S.", "" ] ]
new_dataset
0.999454
1212.1328
Hiroshi Fujita
Hiroshi Fujita
A New Lower Bound for the Ramsey Number R(4, 8)
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The lower bound for the classical Ramsey number R(4, 8) is improved from 56 to 58. The author has found a new edge coloring of K_{57} that has no complete graphs of order 4 in the first color, and no complete graphs of order 8 in the second color. The coloring was found using a SAT solver which is based on MiniSat and customized for solving Ramsey problems.
[ { "version": "v1", "created": "Thu, 6 Dec 2012 14:04:42 GMT" }, { "version": "v2", "created": "Sat, 16 Mar 2013 22:10:56 GMT" }, { "version": "v3", "created": "Sun, 31 Mar 2013 05:41:07 GMT" } ]
2013-04-02T00:00:00
[ [ "Fujita", "Hiroshi", "" ] ]
new_dataset
0.966883
1304.0110
Shachar Shayovitz
Shachar Shayovitz and Dan Raphaeli
A Signal Constellation for Pilotless Communications Over Wiener Phase Noise Channels
Submitted to Globecom 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many satellite communication systems operating today employ low cost upconverters or downconverters which create phase noise. This noise can severely limit the information rate of the system and pose a serious challenge for the detection systems. Moreover, simple solutions for phase noise tracking such as PLL either require low phase noise or otherwise require many pilot symbols which reduce the effective data rate. In order to increase the effective information rate, we propose a signal constellation which does not require pilots, at all, in order to converge in the decoding process. In this contribution, we will present a signal constellation which does not require pilot sequences, but we require a signal that does not present rotational symmetry. For example a simple MPSK cannot be used.Moreover, we will provide a method to analyze the proposed constellations and provide a figure of merit for their performance when iterative decoding algorithms are used.
[ { "version": "v1", "created": "Sat, 30 Mar 2013 14:03:32 GMT" } ]
2013-04-02T00:00:00
[ [ "Shayovitz", "Shachar", "" ], [ "Raphaeli", "Dan", "" ] ]
new_dataset
0.997632
1304.0140
Fotis Foukalas
F. Foukalas, T.Khattab, H.V. Poor
Packet Relaying Control in Sensing-based Spectrum Sharing Systems
null
null
null
null
cs.NI cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive relaying has been introduced for opportunistic spectrum access systems by which a secondary node forwards primary packets whenever the primary link faces an outage condition. For spectrum sharing systems, cognitive relaying is parametrized by an interference power constraint level imposed on the transmit power of the secondary user. For sensing-based spectrum sharing, the probability of detection is also involved in packet relaying control. This paper considers the choice of these two parameters so as to maximize the secondary nodes' throughput under certain constraints. The analysis leads to a Markov decision process using dynamic programming approach. The problem is solved using value iteration. Finally, the structural properties of the resulting optimal control are highlighted.
[ { "version": "v1", "created": "Sat, 30 Mar 2013 21:30:18 GMT" } ]
2013-04-02T00:00:00
[ [ "Foukalas", "F.", "" ], [ "Khattab", "T.", "" ], [ "Poor", "H. V.", "" ] ]
new_dataset
0.97199
1304.0421
Santosh K.C.
K.C. Santosh (LORIA), E. Iwata
Stroke-Based Cursive Character Recognition
null
Advances in Character Recognition INTECH (Ed.) (2012) 175-192
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human eye can see and read what is written or displayed either in natural handwriting or in printed format. The same work in case the machine does is called handwriting recognition. Handwriting recognition can be broken down into two categories: off-line and on-line. ...
[ { "version": "v1", "created": "Mon, 1 Apr 2013 19:14:27 GMT" } ]
2013-04-02T00:00:00
[ [ "Santosh", "K. C.", "", "LORIA" ], [ "Iwata", "E.", "" ] ]
new_dataset
0.998923
1303.7330
EPTCS
Alberto Carraro (PPS, Universit\'e Paris Diderot)
The untyped stack calculus and Bohm's theorem
In Proceedings LSFA 2012, arXiv:1303.7136
EPTCS 113, 2013, pp. 77-92
10.4204/EPTCS.113.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stack calculus is a functional language in which is in a Curry-Howard correspondence with classical logic. It enjoys confluence but, as well as Parigot's lambda-mu, does not admit the Bohm Theorem, typical of the lambda-calculus. We present a simple extension of stack calculus which is for the stack calculus what Saurin's Lambda-mu is for lambda-mu.
[ { "version": "v1", "created": "Fri, 29 Mar 2013 09:02:05 GMT" } ]
2013-04-01T00:00:00
[ [ "Carraro", "Alberto", "", "PPS, Université Paris Diderot" ] ]
new_dataset
0.990374
1303.7331
EPTCS
Alberto Carraro (PPS, Universit\'e Paris Diderot), Thomas Ehrhard (PPS, Universit\'e Paris Diderot), Antonino Salibra (DAIS, Universit\`a Ca' Foscari Venezia)
The stack calculus
In Proceedings LSFA 2012, arXiv:1303.7136
EPTCS 113, 2013, pp. 93-108
10.4204/EPTCS.113.10
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a functional calculus with simple syntax and operational semantics in which the calculi introduced so far in the Curry-Howard correspondence for Classical Logic can be faithfully encoded. Our calculus enjoys confluence without any restriction. Its type system enforces strong normalization of expressions and it is a sound and complete system for full implicational Classical Logic. We give a very simple denotational semantics which allows easy calculations of the interpretation of expressions.
[ { "version": "v1", "created": "Fri, 29 Mar 2013 09:02:13 GMT" } ]
2013-04-01T00:00:00
[ [ "Carraro", "Alberto", "", "PPS, Université Paris Diderot" ], [ "Ehrhard", "Thomas", "", "PPS, Université Paris Diderot" ], [ "Salibra", "Antonino", "", "DAIS, Università Ca'\n Foscari Venezia" ] ]
new_dataset
0.981298
1303.7336
EPTCS
Paulo A. S. Veloso (COPPE-UFRJ), Sheila R. M. Veloso (FEN-UERJ)
A Graph Calculus for Predicate Logic
In Proceedings LSFA 2012, arXiv:1303.7136
EPTCS 113, 2013, pp. 153-168
10.4204/EPTCS.113.15
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a refutation graph calculus for classical first-order predicate logic, which is an extension of previous ones for binary relations. One reduces logical consequence to establishing that a constructed graph has empty extension, i. e. it represents bottom. Our calculus establishes that a graph has empty extension by converting it to a normal form, which is expanded to other graphs until we can recognize conflicting situations (equivalent to a formula and its negation).
[ { "version": "v1", "created": "Fri, 29 Mar 2013 09:02:51 GMT" } ]
2013-04-01T00:00:00
[ [ "Veloso", "Paulo A. S.", "", "COPPE-UFRJ" ], [ "Veloso", "Sheila R. M.", "", "FEN-UERJ" ] ]
new_dataset
0.999136
1303.7115
Dmitry Namiot
Dmitry Namiot, Manfred Schneps-Schneppe
Smart Cities Software from the developer's point of view
8 pages, submitted to 6-th Conference Applied Information and Communication Technology AICT2013
null
null
null
cs.CY cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper discusses the current state and development proposals for Smart Cities and Future Internet projects. Definitions of a Smart City can vary but usually tend to suggest the use of innovative Info-Communication technologies such as the Internet of Things and Web 2.0 to deliver more effective and efficient public services that improve living and working conditions and create more sustainable urban environments. Our goal is to analyze the current proposals from the developer's point of view, highlight the really new elements, the positions borrowed from the existing tools as well as propose some new extensions. We would like to discuss the possible extensions for the existing proposals and describe add-ons that, by our opinion, let keep the future research inline with the modern approaches in the web development domain.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 12:53:22 GMT" } ]
2013-03-29T00:00:00
[ [ "Namiot", "Dmitry", "" ], [ "Schneps-Schneppe", "Manfred", "" ] ]
new_dataset
0.961754
1303.7200
Chrisantha Fernando Dr
Chrisantha Fernando
Design for a Darwinian Brain: Part 1. Philosophy and Neuroscience
Darwinian Neurodynamics. Submitted as a two part paper to Living Machines 2013 Natural History Museum, London
null
null
null
cs.AI q-bio.NC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Physical symbol systems are needed for open-ended cognition. A good way to understand physical symbol systems is by comparison of thought to chemistry. Both have systematicity, productivity and compositionality. The state of the art in cognitive architectures for open-ended cognition is critically assessed. I conclude that a cognitive architecture that evolves symbol structures in the brain is a promising candidate to explain open-ended cognition. Part 2 of the paper presents such a cognitive architecture.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 18:45:52 GMT" } ]
2013-03-29T00:00:00
[ [ "Fernando", "Chrisantha", "" ] ]
new_dataset
0.995115