id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1303.6777
|
Andreas Angerer
|
Andreas Angerer, Remi Smirra, Alwin Hoffmann, Andreas Schierl, Michael
Vistein and Wolfgang Reif
|
A Graphical Language for Real-Time Critical Robot Commands
|
Presented at DSLRob 2012 (arXiv:cs/1302.5082)
| null | null |
DSLRob/2012/02
|
cs.RO cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Industrial robotics is characterized by sophisticated mechanical components
and highly-developed real-time control algorithms. However, the efficient use
of robotic systems is very much limited by existing proprietary programming
methods. In the research project SoftRobot, a software architecture was
developed that enables the programming of complex real-time critical robot
tasks with an object-oriented general purpose language. On top of this
architecture, a graphical language was developed to ease the specification of
complex robot commands, which can then be used as part of robot application
workflows. This paper gives an overview about the design and implementation of
this graphical language and illustrates its usefulness with some examples.
|
[
{
"version": "v1",
"created": "Wed, 27 Mar 2013 10:14:44 GMT"
}
] | 2013-03-28T00:00:00 |
[
[
"Angerer",
"Andreas",
""
],
[
"Smirra",
"Remi",
""
],
[
"Hoffmann",
"Alwin",
""
],
[
"Schierl",
"Andreas",
""
],
[
"Vistein",
"Michael",
""
],
[
"Reif",
"Wolfgang",
""
]
] |
new_dataset
| 0.994764 |
1112.1795
|
Francois Clement
|
Sylvie Boldo (INRIA Saclay - Ile de France, LRI), Francois Clement
(INRIA Rocquencourt), Jean-Christophe Filli\^atre (INRIA Saclay - Ile de
France, LRI), Micaela Mayero (LIPN, Inria Grenoble Rh\^one-Alpes / LIP
Laboratoire de l'Informatique du Parall\'elisme), Guillaume Melquiond (INRIA
Saclay - Ile de France, LRI), Pierre Weis (INRIA Rocquencourt)
|
Wave Equation Numerical Resolution: a Comprehensive Mechanized Proof of
a C Program
|
No. RR-7826 (2011)
|
Journal of Automated Reasoning 50, 4 (2013) 423-456
|
10.1007/s10817-012-9255-4
| null |
cs.LO math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We formally prove correct a C program that implements a numerical scheme for
the resolution of the one-dimensional acoustic wave equation. Such an
implementation introduces errors at several levels: the numerical scheme
introduces method errors, and floating-point computations lead to round-off
errors. We annotate this C program to specify both method error and round-off
error. We use Frama-C to generate theorems that guarantee the soundness of the
code. We discharge these theorems using SMT solvers, Gappa, and Coq. This
involves a large Coq development to prove the adequacy of the C program to the
numerical scheme and to bound errors. To our knowledge, this is the first time
such a numerical analysis program is fully machine-checked.
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2011 09:45:56 GMT"
},
{
"version": "v2",
"created": "Wed, 16 May 2012 06:57:05 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jul 2012 13:32:53 GMT"
}
] | 2013-03-27T00:00:00 |
[
[
"Boldo",
"Sylvie",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Clement",
"Francois",
"",
"INRIA Rocquencourt"
],
[
"Filliâtre",
"Jean-Christophe",
"",
"INRIA Saclay - Ile de\n France, LRI"
],
[
"Mayero",
"Micaela",
"",
"LIPN, Inria Grenoble Rhône-Alpes / LIP\n Laboratoire de l'Informatique du Parallélisme"
],
[
"Melquiond",
"Guillaume",
"",
"INRIA\n Saclay - Ile de France, LRI"
],
[
"Weis",
"Pierre",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.99183 |
1008.2750
|
Alex Alvarado
|
Alex Alvarado, Leszek Szczecinski, Erik Agrell
|
On BICM receivers for TCM transmission
|
Submitted to the IEEE Transactions on Communications
|
IEEE Trans. Commun., vol. 59, no. 10, pp. 2692-2702 , 2011
|
10.1109/TCOMM.2011.091411.100505
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent results have shown that the performance of bit-interleaved coded
modulation (BICM) using convolutional codes in nonfading channels can be
significantly improved when the interleaver takes a trivial form (BICM-T),
i.e., when it does not interleave the bits at all. In this paper, we give a
formal explanation for these results and show that BICM-T is in fact the
combination of a TCM transmitter and a BICM receiver. To predict the
performance of BICM-T, a new type of distance spectrum for convolutional codes
is introduced, analytical bounds based on this spectrum are developed, and
asymptotic approximations are also presented. It is shown that the minimum
distance of the code is not the relevant optimization criterion for BICM-T.
Optimal convolutional codes for different constrain lengths are tabulated and
asymptotic gains of about 2 dB are obtained. These gains are found to be the
same as those obtained by Ungerboeck's one-dimensional trellis coded modulation
(1D-TCM), and therefore, in nonfading channels, BICM-T is shown to be
asymptotically as good as 1D-TCM.
|
[
{
"version": "v1",
"created": "Mon, 16 Aug 2010 19:52:04 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Dec 2010 17:31:37 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Alvarado",
"Alex",
""
],
[
"Szczecinski",
"Leszek",
""
],
[
"Agrell",
"Erik",
""
]
] |
new_dataset
| 0.963693 |
1209.5931
|
Stefan Hild
|
Stefan Hild, Sean Leavey, Christian Gr\"af and Borja Sorazu
|
Smart Charging Technologies for Portable Electronic Devices
|
Updated version with a new section describing a software based
charging control of a laptop
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we describe our efforts of extending demand-side control
concepts to the application in portable electronic devices, such as laptop
computers, mobile phones and tablet computers. As these devices feature
built-in energy storage (in the form of batteries) and the ability to run
complex control routines, they are ideal for the implementation of smart
charging concepts. We developed a prototype of a smart laptop charger that
controls the charging process depending on the locally measured frequency of
the electricity grid. If this technique is incorporated into millions of
devices in UK households, this will contribute significantly to the stability
of the electricity grid, help to mitigate the power production fluctuations
from renewable energy sources and avoid the high cost of building and
maintaining conventional power plants as standby reserve.
|
[
{
"version": "v1",
"created": "Tue, 25 Sep 2012 13:37:10 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Mar 2013 15:30:17 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Hild",
"Stefan",
""
],
[
"Leavey",
"Sean",
""
],
[
"Gräf",
"Christian",
""
],
[
"Sorazu",
"Borja",
""
]
] |
new_dataset
| 0.999363 |
1210.7774
|
Mads Kristensen
|
Mads Ruben Burgdorff Kristensen, Simon Andreas Frimann Lund, Troels
Blum, Brian Vinter
|
cphVB: A System for Automated Runtime Optimization and Parallelization
of Vectorized Applications
| null |
Proceedings of The 11th Python In Science Conference (SciPy 2012)
| null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern processor architectures, in addition to having still more cores, also
require still more consideration to memory-layout in order to run at full
capacity. The usefulness of most languages is deprecating as their
abstractions, structures or objects are hard to map onto modern processor
architectures efficiently.
The work in this paper introduces a new abstract machine framework, cphVB,
that enables vector oriented high-level programming languages to map onto a
broad range of architectures efficiently. The idea is to close the gap between
high-level languages and hardware optimized low-level implementations. By
translating high-level vector operations into an intermediate vector bytecode,
cphVB enables specialized vector engines to efficiently execute the vector
operations.
The primary success parameters are to maintain a complete abstraction from
low-level details and to provide efficient code execution across different,
modern, processors. We evaluate the presented design through a setup that
targets multi-core CPU architectures. We evaluate the performance of the
implementation using Python implementations of well-known algorithms: a jacobi
solver, a kNN search, a shallow water simulation and a synthetic stencil
simulation. All demonstrate good performance.
|
[
{
"version": "v1",
"created": "Fri, 26 Oct 2012 12:03:08 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Mar 2013 15:18:56 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Kristensen",
"Mads Ruben Burgdorff",
""
],
[
"Lund",
"Simon Andreas Frimann",
""
],
[
"Blum",
"Troels",
""
],
[
"Vinter",
"Brian",
""
]
] |
new_dataset
| 0.996517 |
1303.4905
|
Giuseppe Pirr\'o
|
Valeria Fionda, Claudio Gutierrez, Giuseppe Pirr\'o
|
Web Maps and Their Algebra
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A map is an abstract visual representation of a region, taken from a given
space, usually designed for final human consumption. Traditional cartography
focuses on the mapping of Euclidean spaces by using some distance metric. In
this paper we aim at mapping the Web space by leveraging its relational nature.
We introduce a general mathematical framework for maps and an algebra and
discuss the feasibility of maps suitable for interpretation not only by humans
but also by machines.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 11:15:10 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Mar 2013 10:39:36 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Fionda",
"Valeria",
""
],
[
"Gutierrez",
"Claudio",
""
],
[
"Pirró",
"Giuseppe",
""
]
] |
new_dataset
| 0.998454 |
1303.5364
|
Dr. Nadeem Javaid
|
S. Faisal, N. Javaid, A. Javaid, M. A. Khan, S. H. Bouk, Z. A. Khan
|
Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks
| null |
Journal of Basic and Applied Scientific Research (JBASR), 2013
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes,
with restricted energy, that co-operate to accomplish a sensing task. Various
routing Protocols are designed for transmission in WSNs. In this paper, we
proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for
heterogeneous WSNs. In this protocol, some nodes transmit data directly to base
station while some use clustering technique to send data to base station as in
SEP. We implemented Z-SEP and compared it with traditional Low Energy adaptive
clustering hierarchy (LEACH) and SEP. Simulation results showed that Z-SEP
enhanced the stability period and throughput than existing protocols like LEACH
and SEP.
|
[
{
"version": "v1",
"created": "Thu, 21 Mar 2013 18:37:48 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Mar 2013 16:26:36 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Faisal",
"S.",
""
],
[
"Javaid",
"N.",
""
],
[
"Javaid",
"A.",
""
],
[
"Khan",
"M. A.",
""
],
[
"Bouk",
"S. H.",
""
],
[
"Khan",
"Z. A.",
""
]
] |
new_dataset
| 0.997126 |
1303.5800
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Eliana-Dina Tirsa
|
Line-Constrained Geometric Server Placement
| null |
Metalurgia International, vol. 16, no. 11, pp. 106-110, 2011.
(ISSN: 1582-2214)
| null | null |
cs.DS cs.CG cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present new algorithmic solutions for several constrained
geometric server placement problems. We consider the problems of computing the
1-center and obnoxious 1-center of a set of line segments, constrained to lie
on a line segment, and the problem of computing the K-median of a set of
points, constrained to lie on a line. The presented algorithms have
applications in many types of distributed systems, as well as in various fields
which make use of distributed systems for running some of their applications
(like chemistry, metallurgy, physics, etc.).
|
[
{
"version": "v1",
"created": "Sat, 23 Mar 2013 00:29:24 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
]
] |
new_dataset
| 0.952986 |
1303.5874
|
Oscar Mora
|
Oscar Mora and Jes\'us Bisbal
|
BIMS: Biomedical Information Management System
|
5 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present BIMS (Biomedical Information Management System).
BIMS is a software architecture designed to provide a flexible computational
framework to manage the information needs of a wide range of biomedical
research projects. The main goal is to facilitate the clinicians' job in data
entry, and researcher's tasks in data management, in high data quality
biomedical research projects. The BIMS architecture has been designed following
the two-level modeling paradigm, a promising methodology to model rich and
dynamic information environments. In addition, a functional implementation of
BIMS architecture has been developed as a web-based application. The result is
a highly flexible web application which allows modeling and managing large
amounts of heterogeneous biomedical data sets, both textual as well as visual
(medical images) information.
|
[
{
"version": "v1",
"created": "Sat, 23 Mar 2013 18:54:02 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Mora",
"Oscar",
""
],
[
"Bisbal",
"Jesús",
""
]
] |
new_dataset
| 0.964129 |
1303.5929
|
Sourish Dasgupta
|
Sourish Dasgupta, Ankur Padia, Kushal Shah, Rupali KaPatel, Prasenjit
Majumder
|
DLOLIS-A: Description Logic based Text Ontology Learning
|
11 pages
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ontology Learning has been the subject of intensive study for the past
decade. Researchers in this field have been motivated by the possibility of
automatically building a knowledge base on top of text documents so as to
support reasoning based knowledge extraction. While most works in this field
have been primarily statistical (known as light-weight Ontology Learning) not
much attempt has been made in axiomatic Ontology Learning (called heavy-weight
Ontology Learning) from Natural Language text documents. Heavy-weight Ontology
Learning supports more precise formal logic-based reasoning when compared to
statistical ontology learning. In this paper we have proposed a sound Ontology
Learning tool DLOL_(IS-A) that maps English language IS-A sentences into their
equivalent Description Logic (DL) expressions in order to automatically
generate a consistent pair of T-box and A-box thereby forming both regular
(definitional form) and generalized (axiomatic form) DL ontology. The current
scope of the paper is strictly limited to IS-A sentences that exclude the
possible structures of: (i) implicative IS-A sentences, and (ii) "Wh" IS-A
questions. Other linguistic nuances that arise out of pragmatics and epistemic
of IS-A sentences are beyond the scope of this present work. We have adopted
Gold Standard based Ontology Learning evaluation on chosen IS-A rich Wikipedia
documents.
|
[
{
"version": "v1",
"created": "Sun, 24 Mar 2013 08:39:18 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Dasgupta",
"Sourish",
""
],
[
"Padia",
"Ankur",
""
],
[
"Shah",
"Kushal",
""
],
[
"KaPatel",
"Rupali",
""
],
[
"Majumder",
"Prasenjit",
""
]
] |
new_dataset
| 0.998531 |
1303.5943
|
Dmitry Namiot
|
Dmitry Namiot and Manfred Sneps-Sneppe
|
Geofence and Network Proximity
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many of modern location-based services are often based on an area or place as
opposed to an accurate determination of the precise location. Geo-fencing
approach is based on the observation that users move from one place to another
and then stay at that place for a while. These places can be, for example,
commercial properties, homes, office centers and so on. As per geo-fencing
approach they could be described (defined) as some geographic areas bounded by
polygons. It assumes users simply move from fence to fence and stay inside
fences for a while. In this article we replace geo-based boundaries with
network proximity rules. This new approach let us effectively deploy location
based services indoor and provide a significant energy saving for mobile
devices comparing with the traditional methods.
|
[
{
"version": "v1",
"created": "Sun, 24 Mar 2013 12:52:51 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Namiot",
"Dmitry",
""
],
[
"Sneps-Sneppe",
"Manfred",
""
]
] |
new_dataset
| 0.996948 |
1303.6076
|
Yu Wu
|
Yu Wu, Chuan Wu, Bo Li, Francis C.M. Lau
|
vSkyConf: Cloud-assisted Multi-party Mobile Video Conferencing
|
10 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As an important application in the busy world today, mobile video
conferencing facilitates virtual face-to-face communication with friends,
families and colleagues, via their mobile devices on the move. However, how to
provision high-quality, multi-party video conferencing experiences over mobile
devices is still an open challenge. The fundamental reason behind is the lack
of computation and communication capacities on the mobile devices, to scale to
large conferencing sessions. In this paper, we present vSkyConf, a
cloud-assisted mobile video conferencing system to fundamentally improve the
quality and scale of multi-party mobile video conferencing. By novelly
employing a surrogate virtual machine in the cloud for each mobile user, we
allow fully scalable communication among the conference participants via their
surrogates, rather than directly. The surrogates exchange conferencing streams
among each other, transcode the streams to the most appropriate bit rates, and
buffer the streams for the most efficient delivery to the mobile recipients. A
fully decentralized, optimal algorithm is designed to decide the best paths of
streams and the most suitable surrogates for video transcoding along the paths,
such that the limited bandwidth is fully utilized to deliver streams of the
highest possible quality to the mobile recipients. We also carefully tailor a
buffering mechanism on each surrogate to cooperate with optimal stream
distribution. We have implemented vSkyConf based on Amazon EC2 and verified the
excellent performance of our design, as compared to the widely adopted unicast
solutions.
|
[
{
"version": "v1",
"created": "Mon, 25 Mar 2013 10:35:35 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Wu",
"Yu",
""
],
[
"Wu",
"Chuan",
""
],
[
"Li",
"Bo",
""
],
[
"Lau",
"Francis C. M.",
""
]
] |
new_dataset
| 0.999449 |
1303.6200
|
Xujin Chen
|
Zhigang Cao, Xujin Chen, Changjun Wang
|
How to Schedule the Marketing of Products with Negative Externalities
|
16 pages, 1 figure
| null | null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In marketing products with negative externalities, a schedule which specifies
an order of consumer purchase decisions is crucial, since in the social network
of consumers, the decision of each consumer is negatively affected by the
choices of her neighbors. In this paper, we study the problems of finding a
marketing schedule for two asymmetric products with negative externalites. The
goals are two-fold: maximizing the sale of one product and ensuring regret-free
purchase decisions. We show that the maximization is NP-hard, and provide
efficient algorithms with satisfactory performance guarantees. Two of these
algorithms give regret-proof schedules, i.e. they reach Nash equilibria where
no consumers regret their previous decisions. Our work is the first attempt to
address these marketing problems from an algorithmic point of view.
|
[
{
"version": "v1",
"created": "Mon, 25 Mar 2013 16:32:20 GMT"
}
] | 2013-03-26T00:00:00 |
[
[
"Cao",
"Zhigang",
""
],
[
"Chen",
"Xujin",
""
],
[
"Wang",
"Changjun",
""
]
] |
new_dataset
| 0.996744 |
1207.1266
|
Gabriel Nivasch
|
Gabriel Nivasch, J\'anos Pach, Rom Pinchasi, Shira Zerbib
|
The number of distinct distances from a vertex of a convex polygon
|
11 pages, 4 figures
|
Journal of Computational Geometry, 4:1-12, 2013
| null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Erd\H{o}s conjectured in 1946 that every n-point set P in convex position in
the plane contains a point that determines at least floor(n/2) distinct
distances to the other points of P. The best known lower bound due to
Dumitrescu (2006) is 13n/36 - O(1). In the present note, we slightly improve on
this result to (13/36 + eps)n - O(1) for eps ~= 1/23000. Our main ingredient is
an improved bound on the maximum number of isosceles triangles determined by P.
|
[
{
"version": "v1",
"created": "Thu, 5 Jul 2012 14:22:41 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Mar 2013 04:59:53 GMT"
}
] | 2013-03-25T00:00:00 |
[
[
"Nivasch",
"Gabriel",
""
],
[
"Pach",
"János",
""
],
[
"Pinchasi",
"Rom",
""
],
[
"Zerbib",
"Shira",
""
]
] |
new_dataset
| 0.995009 |
1303.5691
|
Martin Rumpf
|
Benjamin Berkels, Ivan Cabrilo, Sven Haller, Martin Rumpf, Carlo
Schaller
|
Cortical Surface Co-Registration based on MRI Images and Photos
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brain shift, i.e. the change in configuration of the brain after opening the
dura mater, is a key problem in neuronavigation. We present an approach to
co-register intra-operative microscope images with pre-operative MRI to adapt
and optimize intra-operative neuronavigation. The tools are a robust
classification of sulci on MRI extracted cortical surfaces, guided user marking
of most prominent sulci on a microscope image, and the actual variational
registration method with a fidelity energy for 3D deformations of the cortical
surface combined with a higher order, linear elastica type prior energy.
Furthermore, the actual registration is validated on an artificial testbed with
known ground truth deformation and on real data of a neuro clinical patient.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 19:07:13 GMT"
}
] | 2013-03-25T00:00:00 |
[
[
"Berkels",
"Benjamin",
""
],
[
"Cabrilo",
"Ivan",
""
],
[
"Haller",
"Sven",
""
],
[
"Rumpf",
"Martin",
""
],
[
"Schaller",
"Carlo",
""
]
] |
new_dataset
| 0.994731 |
1303.5698
|
Mehdi Bennis
|
Mehdi Bennis, Meryem Simsek, Walid Saad, Stefan Valentin, Merouane
Debbah, Andreas Czylwik
|
When Cellular Meets WiFi in Wireless Small Cell Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The deployment of small cell base stations(SCBSs) overlaid on existing
macro-cellular systems is seen as a key solution for offloading traffic,
optimizing coverage, and boosting the capacity of future cellular wireless
systems. The next-generation of SCBSs is envisioned to be multi-mode, i.e.,
capable of transmitting simultaneously on both licensed and unlicensed bands.
This constitutes a cost-effective integration of both WiFi and cellular radio
access technologies (RATs) that can efficiently cope with peak wireless data
traffic and heterogeneous quality-of-service requirements. To leverage the
advantage of such multi-mode SCBSs, we discuss the novel proposed paradigm of
cross-system learning by means of which SCBSs self-organize and autonomously
steer their traffic flows across different RATs. Cross-system learning allows
the SCBSs to leverage the advantage of both the WiFi and cellular worlds. For
example, the SCBSs can offload delay-tolerant data traffic to WiFi, while
simultaneously learning the probability distribution function of their
transmission strategy over the licensed cellular band. This article will first
introduce the basic building blocks of cross-system learning and then provide
preliminary performance evaluation in a Long-Term Evolution (LTE) simulator
overlaid with WiFi hotspots. Remarkably, it is shown that the proposed
cross-system learning approach significantly outperforms a number of benchmark
traffic steering policies.
|
[
{
"version": "v1",
"created": "Fri, 22 Mar 2013 19:48:54 GMT"
}
] | 2013-03-25T00:00:00 |
[
[
"Bennis",
"Mehdi",
""
],
[
"Simsek",
"Meryem",
""
],
[
"Saad",
"Walid",
""
],
[
"Valentin",
"Stefan",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Czylwik",
"Andreas",
""
]
] |
new_dataset
| 0.98037 |
1208.0460
|
Patrick Prosser
|
Alice Miller and Patrick Prosser
|
Diamond-free Degree Sequences
|
8 pages, 2 figures, 2 algorithms, 2 models, 1 table
|
Acta Univ. Sapientiae, Informatica, 4(2): 189-200, 2012
| null |
TR-2010-318
|
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new problem, CSPLib problem number 50, to generate all degree
sequences that have a corresponding diamond-free graph with secondary
properties. This problem arises naturally from a problem in mathematics to do
with balanced incomplete block designs; we devote a section of this paper to
this. The problem itself is challenging with respect to computational effort
arising from the large number of symmetries within the models. We introduce two
models for this problem. The second model is an improvement on the first, and
this improvement largely consists of breaking the problem into two stages, the
first stage producing graphical degree sequences that satisfy arithmetic
constraints and the second part testing that there exists a graph with that
degree sequence that is diamond-free.
|
[
{
"version": "v1",
"created": "Thu, 2 Aug 2012 12:11:25 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Aug 2012 10:38:35 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Aug 2012 15:32:06 GMT"
}
] | 2013-03-22T00:00:00 |
[
[
"Miller",
"Alice",
""
],
[
"Prosser",
"Patrick",
""
]
] |
new_dataset
| 0.955884 |
1303.5134
|
Angeline Rao
|
Angeline Rao, Ying Liu, Yezhou Feng, and Jian Shen
|
Bounds on the Number of Huffman and Binary-Ternary Trees
|
17 pages, 6 figures, 1 table data
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Huffman coding is a widely used method for lossless data compression because
it optimally stores data based on how often the characters occur in Huffman
trees. An $n$-ary Huffman tree is a connected, cycle-lacking graph where each
vertex can have either $n$ "children" vertices connecting to it, or 0 children.
Vertices with 0 children are called \textit{leaves}. We let $h_n(q)$ represent
the total number of $n$-ary Huffman trees with $q$ leaves. In this paper, we
use a recursive method to generate upper and lower bounds on $h_n(q)$ and get
$h_2(q) \approx (0.1418532)(1.7941471)^q+(0.0612410)(1.2795491)^q$ for $n=2$.
This matches the best results achieved by Elsholtz, Heuberger, and Prodinger in
August 2011. Our approach reveals patterns in Huffman trees that we used in our
analysis of the Binary-Ternary (BT) trees we created. Our research opens a
completely new door in data compression by extending the study of Huffman trees
to BT trees. Our study of BT trees paves the way for designing data-specific
trees, minimizing possible wasted storage space from Huffman coding. We prove a
recursive formula for the number of BT trees with $q$ leaves. Furthermore, we
provide analysis and further proofs to reach numeric bounds. Our discoveries
have broad applications in computer data compression. These results also
improve graphical representations of protein sequences that facilitate in-depth
genome analysis used in researching evolutionary patterns.
|
[
{
"version": "v1",
"created": "Thu, 21 Mar 2013 01:21:41 GMT"
}
] | 2013-03-22T00:00:00 |
[
[
"Rao",
"Angeline",
""
],
[
"Liu",
"Ying",
""
],
[
"Feng",
"Yezhou",
""
],
[
"Shen",
"Jian",
""
]
] |
new_dataset
| 0.971092 |
1301.3577
|
Rostislav Goroshin
|
Rostislav Goroshin and Yann LeCun
|
Saturating Auto-Encoders
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a simple new regularizer for auto-encoders whose hidden-unit
activation functions contain at least one zero-gradient (saturated) region.
This regularizer explicitly encourages activations in the saturated region(s)
of the corresponding activation function. We call these Saturating
Auto-Encoders (SATAE). We show that the saturation regularizer explicitly
limits the SATAE's ability to reconstruct inputs which are not near the data
manifold. Furthermore, we show that a wide variety of features can be learned
when different activation functions are used. Finally, connections are
established with the Contractive and Sparse Auto-Encoders.
|
[
{
"version": "v1",
"created": "Wed, 16 Jan 2013 04:07:46 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Feb 2013 00:28:01 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Mar 2013 15:37:33 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Goroshin",
"Rostislav",
""
],
[
"LeCun",
"Yann",
""
]
] |
new_dataset
| 0.99756 |
1303.4788
|
Pedro Hipola
|
Antonio Munoz-Canavate, Pedro Hipola
|
Business information through Spain's Chambers of Commerce: meeting
business needs
| null |
Munoz-Canavate, Antonio; Hipola Pedro. Business information
through Spain's Chambers of Commerce: meeting business needs. Business
Information Review. vol. 25, 4, December 2008, pp. 224-229. DOI:
10.1177/0266382108098866
|
10.1177/0266382108098866
| null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From different public and private instances, mechanisms have been set in
action that allow for companies to obtain information in order to make
decisions with a stronger foundation. This article is focused on the
description of an entire information system for the business world, developed
in the realm of the Chambers of Commerce of Spain, which have given rise to the
creation of an authentic network of inter-chamber information.
In Spain, the obligatory membership of businesses to the Chambers of Commerce
in their geographic areas, and therefore the compulsory payment of member
quotas, has traditionally generated some polemics, above all because many firms
have not perceived a material usefulness of the services offered by these
Chambers.
Notwithstanding, the 85 Chambers currently existing in Spain, as well as the
organism that coordinates them -the Upper Council or Consejo Superior de
Camaras de Comercio- and the company created expressly to commercialize
informational services online, Camerdata, have developed genuinely informative
tools that cover a good part of the informational demands that a business might
claim, described here.
|
[
{
"version": "v1",
"created": "Tue, 19 Mar 2013 23:21:59 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Munoz-Canavate",
"Antonio",
""
],
[
"Hipola",
"Pedro",
""
]
] |
new_dataset
| 0.999351 |
1303.4839
|
Firoj Parwej Dr.
|
Dr. Firoj Parwej
|
The State of the Art Recognize in Arabic Script through Combination of
Online and Offline
|
Pages 7, Figure 6, Table 2. arXiv admin note: text overlap with
arXiv:1110.1488 by other authors
|
International Journal of Computer Science and Telecommunications
(IJCST), UK, London (http://www.ijcst.org) , ISSN 2047-3338 , Vol. 4, Issue
3, pages 60 - 66, March 2013. Link - http://www.ijcst.org/Volume4/Issue3.html
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Handwriting recognition refers to the identification of written characters.
Handwriting recognition has become an acute research area in recent years for
the ease of access of computer science. In this paper primarily discussed
On-line and Off-line handwriting recognition methods for Arabic words which are
often used among then across the Middle East and North Africa People. Arabic
word online handwriting recognition is a very challenging task due to its
cursive nature. Because of the characteristic of the whole body of the Arabic
script, namely connectivity between the characters, thereby the segmentation of
An Arabic script is very difficult. In this paper we introduced an Arabic
script multiple classifier system for recognizing notes written on a Starboard.
This Arabic script multiple classifier system combines one off-line and on-line
handwriting recognition systems. The Arabic script recognizers are all based on
Hidden Markov Models but vary in the way of preprocessing and normalization. To
combine the Arabic script output sequences of the recognizers, we incrementally
align the word sequences using a norm string matching algorithm. The Arabic
script combination we could increase the system performance over the excellent
character recognizer by about 3%. The proposed technique is also the necessary
step towards character recognition, person identification, personality
determination where input data is processed from all perspectives.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 04:54:44 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Parwej",
"Dr. Firoj",
""
]
] |
new_dataset
| 0.994317 |
1303.4840
|
Igor Polk
|
Igor Polkovnikov
|
Asynchronous Cellular Operations on Gray Images Extracting Topographic
Shape Features and Their Relations
|
19 pages, 37 figures, 10 function classes
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A variety of operations of cellular automata on gray images is presented. All
operations are of a wave-front nature finishing in a stable state. They are
used to extract shape descripting gray objects robust to a variety of pattern
distortions. Topographic terms are used: "lakes", "dales", "dales of dales". It
is shown how mutual object relations like "above" can be presented in terms of
gray image analysis and how it can be used for character classification and for
gray pattern decomposition. Algorithms can be realized with a parallel
asynchronous architecture. Keywords: Pattern Recognition, Mathematical
Morphology, Cellular Automata, Wave-front Algorithms, Gray Image Analysis,
Topographical Shape Descriptors, Asynchronous Parallel Processors, Holes,
Cavities, Concavities, Graphs.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 04:59:08 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Polkovnikov",
"Igor",
""
]
] |
new_dataset
| 0.998242 |
1303.4949
|
Claudia Picardi
|
Fabio Varesano
|
FreeIMU: An Open Hardware Framework for Orientation and Motion Sensing
|
10 pages, 1 figure
| null | null | null |
cs.ET cs.AR cs.HC
|
http://creativecommons.org/licenses/by/3.0/
|
Orientation and Motion Sensing are widely implemented on various consumer
products, such as mobile phones, tablets and cameras as they enable immediate
interaction with virtual information. The prototyping phase of any orientation
and motion sensing capable device is however a quite difficult process as it
may involve complex hardware designing, math algorithms and programming.
In this paper, we present FreeIMU, an Open Hardware Framework for prototyping
orientation and motion sensing capable devices. The framework consists in a
small circuit board containing various sensors and a software library, built on
top of the Arduino platform. Both the hardware and library are released under
open licences and supported by an active community allowing to be implemented
into research and commercial projects.
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 14:25:14 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Varesano",
"Fabio",
""
]
] |
new_dataset
| 0.99985 |
1303.4994
|
Albert Wegener
|
Albert Wegener
|
Universal Numerical Encoder and Profiler Reduces Computing's Memory Wall
with Software, FPGA, and SoC Implementations
|
10 pages, 4 figures, 3 tables, 19 references
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the multicore era, the time to computational results is increasingly
determined by how quickly operands are accessed by cores, rather than by the
speed of computation per operand. From high-performance computing (HPC) to
mobile application processors, low multicore utilization rates result from the
slowness of accessing off-chip operands, i.e. the memory wall. The APplication
AXcelerator (APAX) universal numerical encoder reduces computing's memory wall
by compressing numerical operands (integers and floats), thereby decreasing CPU
access time by 3:1 to 10:1 as operands stream between memory and cores. APAX
encodes numbers using a low-complexity algorithm designed both for time series
sensor data and for multi-dimensional data, including images. APAX encoding
parameters are determined by a profiler that quantifies the uncertainty
inherent in numerical datasets and recommends encoding parameters reflecting
this uncertainty. Compatible software, FPGA, and systemon-chip (SoC)
implementations efficiently support encoding rates between 150 MByte/sec and
1.5 GByte/sec at low power. On 25 integer and floating-point datasets, we
achieved encoding rates between 3:1 and 10:1, with average correlation of
0.999959, while accelerating computational "time to results."
|
[
{
"version": "v1",
"created": "Wed, 20 Mar 2013 17:11:12 GMT"
}
] | 2013-03-21T00:00:00 |
[
[
"Wegener",
"Albert",
""
]
] |
new_dataset
| 0.996327 |
1109.5034
|
Piotr Gawron jr.
|
Micha{\l} Romaszewski and Przemys{\l}aw G{\l}omb and Piotr Gawron
|
Natural hand gestures for human identification in a Human-Computer
Interface
|
13 pages, 3 figures, This is a major rewrite of previous version of
the paper. The same dataset as in previous version was used. The analysis is
now focused on application of the gestures classification methods to human
identification
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of this work is the identification of humans based on motion data in
the form of natural hand gestures. In this paper, the identification problem is
formulated as classification with classes corresponding to persons' identities,
based on recorded signals of performed gestures. The identification performance
is examined with a database of twenty-two natural hand gestures recorded with
two types of hardware and three state-of-art classifiers: Linear Discrimination
Analysis (LDA), Support Vector machines (SVM) and k-Nearest Neighbour (k-NN).
Results show that natural hand gestures allow for an effective human
classification.
|
[
{
"version": "v1",
"created": "Fri, 23 Sep 2011 11:16:25 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Mar 2013 18:42:02 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Romaszewski",
"Michał",
""
],
[
"Głomb",
"Przemysław",
""
],
[
"Gawron",
"Piotr",
""
]
] |
new_dataset
| 0.99723 |
1212.2054
|
Myongchol Ri
|
Dokjun An, Myongchol Ri, Changil Choe, Sunam Han, Yongmin Kim
|
SDMS-based Disk Encryption Method
| null |
Journal of Mobile,Embeded and Distributed Systems, Vol.4, No.4,
209-214, 2012
| null |
KISU-MATH-2012-E-R-010
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a disk encryption method, called secure disk mixed system (SDMS)
in this paper, for data protection of disk storages such as USB flash memory,
USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitation
problems of existing disk encryption methods and to control security
performance flexibly according to the security requirement of system. SDMS
stores data by encrypting with different encryption key per sector and updates
sector encryption keys each time data is written. Security performance of SDMS
is analyzed at the end of the paper.
|
[
{
"version": "v1",
"created": "Mon, 10 Dec 2012 13:24:08 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"An",
"Dokjun",
""
],
[
"Ri",
"Myongchol",
""
],
[
"Choe",
"Changil",
""
],
[
"Han",
"Sunam",
""
],
[
"Kim",
"Yongmin",
""
]
] |
new_dataset
| 0.960502 |
1212.2789
|
Changil Choe
|
Changil Choe, Hyejong Hong, Kukhwan Kim
|
Formal Design and Verification of N-M Switching Control System
| null |
Romanian Journal of Mathematics and Computer Science, Vol. 2, No.
2, 2012, 36-43
| null |
KISU-MATH-2012-E-R-008
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Production factories in which stable voltage is critical, e.g.,
electro-plating factory, require constantly stable voltage to minimize loss by
adjusting incoming voltage in real time, even if low-quality electricity is
supplied from outside. To solve such problem often being raised from the
factories located in the area with unstable electricity supply, we designed N-M
switching control system and verified its correctness using LTL model checking
technique.
|
[
{
"version": "v1",
"created": "Wed, 12 Dec 2012 12:26:25 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Choe",
"Changil",
""
],
[
"Hong",
"Hyejong",
""
],
[
"Kim",
"Kukhwan",
""
]
] |
new_dataset
| 0.951275 |
1301.4732
|
Nicolas Kuhn M.
|
Nicolas Kuhn, Olivier Mehani, Huyen-Chi Bui, Jerome Lacan, Jose Radzik
and Emmanuel Lochin
|
Physical Channel Access (PCA): Time and Frequency Access Methods
Emulation in NS-2
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an NS-2 module, Physical Channel Access (PCA), to simulate
different access methods on a link shared with Multi-Frequency Time Division
Multiple Access (MF-TDMA). This tech- nique is widely used in various network
technologies, such as satellite communication. In this context, different
access methods at the gateway induce different queuing delays and available
capacities, which strongly impact transport layer performance. Depending on QoS
requirements, design of new congestion and flow control mechanisms and/or
access methods requires evaluation through simulations.
PCA module emulates the delays that packets will experience using the shared
link, based on descriptive parameters of lower layers characteris- tics. Though
PCA has been developed with DVB-RCS2 considerations in mind (for which we
present a use case), other MF-TDMA-based appli- cations can easily be simulated
by adapting input parameters. Moreover, the presented implementation details
highlight the main methods that might need modifications to implement more
specific functionality or emulate other similar access methods (e.g., OFDMA).
|
[
{
"version": "v1",
"created": "Mon, 21 Jan 2013 02:43:04 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Jan 2013 22:55:05 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Feb 2013 23:25:25 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Mar 2013 05:50:42 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Kuhn",
"Nicolas",
""
],
[
"Mehani",
"Olivier",
""
],
[
"Bui",
"Huyen-Chi",
""
],
[
"Lacan",
"Jerome",
""
],
[
"Radzik",
"Jose",
""
],
[
"Lochin",
"Emmanuel",
""
]
] |
new_dataset
| 0.999086 |
1303.4376
|
Dominique Rossin
|
Adeline Pierrot (LIAFA), Dominique Rossin (LIX)
|
2-stack pushall sortable permutations
|
41 pages
| null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the 60's, Knuth introduced stack-sorting and serial compositions of
stacks. In particular, one significant question arise out of the work of Knuth:
how to decide efficiently if a given permutation is sortable with 2 stacks in
series? Whether this problem is polynomial or NP-complete is still unanswered
yet. In this article we introduce 2-stack pushall permutations which form a
subclass of 2-stack sortable permutations and show that these two classes are
closely related. Moreover, we give an optimal O(n^2) algorithm to decide if a
given permutation of size n is 2-stack pushall sortable and describe all its
sortings. This result is a step to the solve the general 2-stack sorting
problem in polynomial time.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 19:44:45 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Pierrot",
"Adeline",
"",
"LIAFA"
],
[
"Rossin",
"Dominique",
"",
"LIX"
]
] |
new_dataset
| 0.970657 |
1303.4439
|
Xu Chen
|
Xu Chen, Dongning Guo and John Grosspietsch
|
The Public Safety Broadband Network: A Novel Architecture with Mobile
Base Stations
|
ICC 2013
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A nationwide interoperable public safety broadband network is being planned
by the United States government. The network will be based on long term
evolution (LTE) standards and use recently designated spectrum in the 700 MHz
band. The public safety network has different objectives and traffic patterns
than commercial wireless networks. In particular, the public safety network
puts more emphasis on coverage, reliability and latency in the worst case
scenario. Moreover, the routine public safety traffic is relatively light,
whereas when a major incident occurs, the traffic demand at the incident scene
can be significantly heavier than that in a commercial network. Hence it is
prohibitively costly to build the public safety network using conventional
cellular network architecture consisting of an infrastructure of stationary
base transceiver stations. A novel architecture is proposed in this paper for
the public safety broadband network. The architecture deploys stationary base
stations sparsely to serve light routine traffic and dispatches mobile base
stations to incident scenes along with public safety personnel to support heavy
traffic. The analysis shows that the proposed architecture can potentially
offer more than 75% reduction in terms of the total number of base stations
needed.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 21:52:45 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Chen",
"Xu",
""
],
[
"Guo",
"Dongning",
""
],
[
"Grosspietsch",
"John",
""
]
] |
new_dataset
| 0.998475 |
1303.4451
|
Kristina Lerman
|
Kristina Lerman, Prachi Jain, Rumi Ghosh, Jeon-Hyung Kang, Ponnurangam
Kumaraguru
|
Limited Attention and Centrality in Social Networks
|
in Proceedings of International Conference on Social Intelligence and
Technology (SOCIETY2013)
| null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How does one find important or influential people in an online social
network? Researchers have proposed a variety of centrality measures to identify
individuals that are, for example, often visited by a random walk, infected in
an epidemic, or receive many messages from friends. Recent research suggests
that a social media users' capacity to respond to an incoming message is
constrained by their finite attention, which they divide over all incoming
information, i.e., information sent by users they follow. We propose a new
measure of centrality --- limited-attention version of Bonacich's
Alpha-centrality --- that models the effect of limited attention on epidemic
diffusion. The new measure describes a process in which nodes broadcast
messages to their out-neighbors, but the neighbors' ability to receive the
message depends on the number of in-neighbors they have. We evaluate the
proposed measure on real-world online social networks and show that it can
better reproduce an empirical influence ranking of users than other popular
centrality measures.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 22:52:09 GMT"
}
] | 2013-03-20T00:00:00 |
[
[
"Lerman",
"Kristina",
""
],
[
"Jain",
"Prachi",
""
],
[
"Ghosh",
"Rumi",
""
],
[
"Kang",
"Jeon-Hyung",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.98006 |
1104.3314
|
Zino H. Hu
|
Zino H. Hu
|
On Direct Product and Quotient of Strongly Connected Automata
|
11 pages including examples
| null | null | null |
cs.FL math.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An automaton is isomorphic to the direct product of a permutation strongly
connected automaton and a synchronizing strongly connected automaton if and
only if all of the following conditions are met: (i) it is strongly connected;
(ii) the minimal ideal of its transition semigroup is a right group and (iii)
the ranges of the idempotent elements of the minimal ideal of its transition
semigroup form a partition on its set of states.
|
[
{
"version": "v1",
"created": "Sun, 17 Apr 2011 13:06:30 GMT"
},
{
"version": "v10",
"created": "Sun, 17 Mar 2013 11:38:26 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Apr 2011 03:06:07 GMT"
},
{
"version": "v3",
"created": "Wed, 18 May 2011 07:09:05 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Jun 2011 02:00:36 GMT"
},
{
"version": "v5",
"created": "Tue, 21 Jun 2011 12:49:16 GMT"
},
{
"version": "v6",
"created": "Tue, 25 Oct 2011 12:52:41 GMT"
},
{
"version": "v7",
"created": "Mon, 31 Oct 2011 12:43:07 GMT"
},
{
"version": "v8",
"created": "Thu, 19 Jan 2012 11:45:59 GMT"
},
{
"version": "v9",
"created": "Tue, 8 May 2012 06:51:09 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Hu",
"Zino H.",
""
]
] |
new_dataset
| 0.998598 |
1302.6274
|
Ibrahim Al Shourbaji H
|
Ibrahim Al Shourbaji, Rafat AlAmeer
|
Wireless Intrusion Detection Systems(WIDS)
|
6 pages,2 figures,World Science Publisher,Advances in Computer
Science and its Applications (ACSA),Vol. 2, No. 3,February 2013
| null | null | null |
cs.CR cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
The rapid proliferation of wireless networks and mobile computing
applications has changed the landscape of network security,the wireless
networks have changed the way business, organizations work and offered a new
range of possibilities and flexibilities; It is clear that wireless solutions
are transforming the way we work and live. Employees are able to keep in touch
with their e-mail, calendar and employer from mobile devices, but on the other
hands they introduced a new security threats appeared. While an attacker needs
physical access to a wired network in order to gain access to the network and
to accomplish his goals, a wireless network allows anyone within its range to
passively monitor the traffic or even start an attack,one of the
countermeasures that can be used is the intrusion detection systems in order to
allow us to know both the threats affecting our wireless network and our system
vulnerabilities in order to prevent those attackers, the IDS its main purpose
is to manage the system and its operations and Its duty depends on .
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 23:07:24 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Feb 2013 20:09:56 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Shourbaji",
"Ibrahim Al",
""
],
[
"AlAmeer",
"Rafat",
""
]
] |
new_dataset
| 0.999618 |
1303.3921
|
Sergey Yekhanin
|
Michael Forbes and Sergey Yekhanin
|
On the Locality of Codeword Symbols in Non-Linear Codes
| null | null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider a possibly non-linear (n,K,d)_q code. Coordinate i has locality r if
its value is determined by some r other coordinates. A recent line of work
obtained an optimal trade-off between information locality of codes and their
redundancy. Further, for linear codes meeting this trade-off, structure
theorems were derived. In this work we give a new proof of the locality /
redundancy trade-off and generalize structure theorems to non-linear codes.
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 22:46:46 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Forbes",
"Michael",
""
],
[
"Yekhanin",
"Sergey",
""
]
] |
new_dataset
| 0.994278 |
1303.4224
|
Nouh Sa\"id Mr
|
Abderrazzak Farchane, Mostafa Belkasmi and Said Nouh
|
Generalized parallel concatenated block codes based on BCH and RS codes,
construction and Iterative decoding
| null |
Journal Of Telecommunications, Volume 12, Issue 1, January 2012
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a generalization of parallel concatenated block GPCB codes
based on BCH and RS codes is presented.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 12:14:44 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Farchane",
"Abderrazzak",
""
],
[
"Belkasmi",
"Mostafa",
""
],
[
"Nouh",
"Said",
""
]
] |
new_dataset
| 0.997026 |
1303.4262
|
James Alderman
|
James Alderman and Jason Crampton
|
On the Use of Key Assignment Schemes in Authentication Protocols
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Key Assignment Schemes (KASs) have been extensively studied in the context of
cryptographically-enforced access control, where derived keys are used to
decrypt protected resources. In this paper, we explore the use of KASs in
entity authentication protocols, where we use derived keys to encrypt
challenges. This novel use of KASs permits the efficient authentication of an
entity in accordance with an authentication policy by associating entities with
security labels representing specific services. Cryptographic keys are
associated with each security label and demonstrating knowledge of an
appropriate key is used as the basis for authentication. Thus, by controlling
the distribution of such keys, restrictions may be efficiently placed upon the
circumstances under which an entity may be authenticated and the services to
which they may gain access.
In this work, we explore how both standardized protocols and novel
constructions may be developed to authenticate entities as members of a group
associated to a particular security label, whilst protecting the long-term
secrets in the system. We also see that such constructions may allow for
authentication whilst preserving anonymity, and that by including a trusted
third party we can achieve the authentication of individual identities and
authentication based on timestamps without the need for synchronized clocks.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 14:32:26 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Alderman",
"James",
""
],
[
"Crampton",
"Jason",
""
]
] |
new_dataset
| 0.990511 |
1303.4264
|
Wojciech Mazurczyk
|
Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski
|
StegTorrent: a Steganographic Method for the P2P File Sharing Service
|
7 pages, 7 figures, 1 table
| null | null | null |
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper proposes StegTorrent a new network steganographic method for the
popular P2P file transfer service-BitTorrent. It is based on modifying the
order of data packets in the peer-peer data exchange protocol. Unlike other
existing steganographic methods that modify the packets' order it does not
require any synchronization. Experimental results acquired from prototype
implementation proved that it provides high steganographic bandwidth of up to
270 b/s while introducing little transmission distortion and providing
difficult detectability.
|
[
{
"version": "v1",
"created": "Mon, 18 Mar 2013 14:36:53 GMT"
}
] | 2013-03-19T00:00:00 |
[
[
"Kopiczko",
"Pawel",
""
],
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] |
new_dataset
| 0.992269 |
1104.3353
|
Anthony Labarre
|
Simona Grusea and Anthony Labarre
|
The distribution of cycles in breakpoint graphs of signed permutations
| null | null |
10.1016/j.dam.2013.02.002
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Breakpoint graphs are ubiquitous structures in the field of genome
rearrangements. Their cycle decomposition has proved useful in computing and
bounding many measures of (dis)similarity between genomes, and studying the
distribution of those cycles is therefore critical to gaining insight on the
distributions of the genomic distances that rely on it. We extend here the work
initiated by Doignon and Labarre, who enumerated unsigned permutations whose
breakpoint graph contains $k$ cycles, to signed permutations, and prove
explicit formulas for computing the expected value and the variance of the
corresponding distributions, both in the unsigned case and in the signed case.
We also compare these distributions to those of several well-studied distances,
emphasising the cases where approximations obtained in this way stand out.
Finally, we show how our results can be used to derive simpler proofs of other
previously known results.
|
[
{
"version": "v1",
"created": "Sun, 17 Apr 2011 21:41:45 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Aug 2012 14:32:39 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Grusea",
"Simona",
""
],
[
"Labarre",
"Anthony",
""
]
] |
new_dataset
| 0.977824 |
1209.6152
|
Son Hoang Dau
|
Son Hoang Dau, Yan Jia, Chao Jin, Weiya Xi, Kheong Sann Chan
|
Parity Declustering for Fault-Tolerant Storage Systems via $t$-designs
|
13 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parity declustering allows faster reconstruction of a disk array when some
disk fails. Moreover, it guarantees uniform reconstruction workload on all
surviving disks. It has been shown that parity declustering for one-failure
tolerant array codes can be obtained via Balanced Incomplete Block Designs. We
extend this technique for array codes that can tolerate an arbitrary number of
disk failures via $t$-designs.
|
[
{
"version": "v1",
"created": "Thu, 27 Sep 2012 07:59:15 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Mar 2013 09:04:40 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Dau",
"Son Hoang",
""
],
[
"Jia",
"Yan",
""
],
[
"Jin",
"Chao",
""
],
[
"Xi",
"Weiya",
""
],
[
"Chan",
"Kheong Sann",
""
]
] |
new_dataset
| 0.997448 |
1303.3427
|
Antonios Argyriou
|
Antonios Argyriou
|
Distributed Space-Time Coding of Over-the-Air Superimposed Packets in
Wireless Networks
|
ICC 2013
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a new cooperative packet transmission scheme that
allows independent sources to superimpose over-the-air their packet
transmissions. Relay nodes are used and cooperative diversity is combined with
distributed space-time block coding (STBC). With the proposed scheme the
participating relays create a ST code for the over-the-air superimposed symbols
that are received locally and without proceeding to any decoding step
beforehand. The advantage of the proposed scheme is that communication is
completed in fewer transmission slots because of the concurrent packet
transmissions, while the diversity benefit from the use of the STBC results in
higher decoding performance. The proposed scheme does not depend on the STBC
that is applied at the relays. Simulation results reveal significant throughput
benefits even in the low SNR regime.
|
[
{
"version": "v1",
"created": "Thu, 14 Mar 2013 12:38:28 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Argyriou",
"Antonios",
""
]
] |
new_dataset
| 0.994799 |
1303.3624
|
Weiqiang Xu
|
Weiqiang Xu, Qingjiang Shi, Xiaoyun Wei, Yaming Wang
|
Distributed Optimal Rate-Reliability-Lifetime Tradeoff in Wireless
Sensor Networks
|
27 pages, 10 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The transmission rate, delivery reliability and network lifetime are three
fundamental but conflicting design objectives in energy-constrained wireless
sensor networks. In this paper, we address the optimal
rate-reliability-lifetime tradeoff with link capacity constraint, reliability
constraint and energy constraint. By introducing the weight parameters, we
combine the objectives at rate, reliability, and lifetime into a single
objective to characterize the tradeoff among them. However, the optimization
formulation of the rate-reliability-reliability tradeoff is neither separable
nor convex. Through a series of transformations, a separable and convex problem
is derived, and an efficient distributed Subgradient Dual Decomposition
algorithm (SDD) is proposed. Numerical examples confirm its convergence. Also,
numerical examples investigate the impact of weight parameters on the rate
utility, reliability utility and network lifetime, which provide a guidance to
properly set the value of weight parameters for a desired performance of WSNs
according to the realistic application's requirements.
|
[
{
"version": "v1",
"created": "Thu, 14 Mar 2013 22:09:41 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Xu",
"Weiqiang",
""
],
[
"Shi",
"Qingjiang",
""
],
[
"Wei",
"Xiaoyun",
""
],
[
"Wang",
"Yaming",
""
]
] |
new_dataset
| 0.960642 |
1303.3665
|
Harshan Jagadeesh
|
J. Harshan, Emanuele Viterbo
|
Integer Space-Time Block Codes for Practical MIMO Systems
|
10 pages and 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Full-rate space-time block codes (STBCs) achieve high spectral-efficiency by
transmitting linear combinations of information symbols through every transmit
antenna. However, the coefficients used for the linear combinations, if not
chosen carefully, results in ({\em i}) large number of processor bits for the
encoder and ({\em ii}) high peak-to-average power ratio (PAPR) values. In this
work, we propose a new class of full-rate STBCs called Integer STBCs (ICs) for
multiple-input multiple-output (MIMO) fading channels. A unique property of ICs
is the presence of integer coefficients in the code structure which enables
reduced numbers of processor bits for the encoder and lower PAPR values. We
show that the reduction in the number of processor bits is significant for
small MIMO channels, while the reduction in the PAPR is significant for large
MIMO channels. We also highlight the advantages of the proposed codes in
comparison with the well known full-rate algebraic STBCs.
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 03:07:48 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Harshan",
"J.",
""
],
[
"Viterbo",
"Emanuele",
""
]
] |
new_dataset
| 0.99769 |
1303.3737
|
Joaquim Borges
|
Jos\'e Joaqu\'in Bernal, Joaquim Borges, Cristina
Fern\'andez-C\'ordoba, Merc\`e Villanueva
|
Permutation decoding of Z2Z4-linear codes
| null | null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An alternative permutation decoding method is described which can be used for
any binary systematic encoding scheme, regardless whether the code is linear or
not. Thus, the method can be applied to some important codes such as
Z2Z4-linear codes, which are binary and, in general, nonlinear codes in the
usual sense. For this, it is proved that these codes allow a systematic
encoding scheme. As a particular example, this permutation decoding method is
applied to some Hadamard Z2Z4-linear codes.
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 11:23:26 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Bernal",
"José Joaquín",
""
],
[
"Borges",
"Joaquim",
""
],
[
"Fernández-Córdoba",
"Cristina",
""
],
[
"Villanueva",
"Mercè",
""
]
] |
new_dataset
| 0.998322 |
1303.3828
|
Jo\~ao Em\'ilio Almeida
|
Jo\~ao Ribeiro, Jo\~ao Em\'ilio Almeida, Rosaldo J. F. Rossetti,
Ant\'onio Coelho, Ant\'onio Le\c{c}a Coelho
|
Using Serious Games to Train Evacuation Behaviour
|
CISTI 2012 - 7 Conferencia Ib\'erica de Sistemas y Tecnolog\'ias de
Informaci\'on, pp 771-776, Madrid, Spain. ISBN: 978-989-96247-6-4
| null | null | null |
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Emergency evacuation plans and evacuation drills are mandatory in public
buildings in many countries. Their importance is considerable when it comes to
guarantee safety and protection during a crisis. However, sometimes
discrepancies arise between the goals of the plan and its outcomes, because
people find it hard to take them very seriously, or due to the financial and
time resources required. Serious games are a possible solution to tackle this
problem. They have been successfully applied in different areas such as health
care and education, since they can simulate an environment/task quite
accurately, making them a practical alternative to real-life simulations. This
paper presents a serious game developed using Unity3D to recreate a virtual
fire evacuation training tool. The prototype application was deployed which
allowed the validation by user testing. A sample of 30 individuals tested the
evacuating scenario, having to leave the building during a fire in the shortest
time possible. Results have shown that users effectively end up learning some
evacuation procedures from the activity, even if only to look for emergency
signs indicating the best evacuation paths. It was also evidenced that users
with higher video game experience had a significantly better performance.
|
[
{
"version": "v1",
"created": "Fri, 15 Mar 2013 16:58:00 GMT"
}
] | 2013-03-18T00:00:00 |
[
[
"Ribeiro",
"João",
""
],
[
"Almeida",
"João Emílio",
""
],
[
"Rossetti",
"Rosaldo J. F.",
""
],
[
"Coelho",
"António",
""
],
[
"Coelho",
"António Leça",
""
]
] |
new_dataset
| 0.998383 |
1005.4973
|
Mutsuo Saito
|
Mutsuo Saito and Makoto Matsumoto
|
Variants of Mersenne Twister Suitable for Graphic Processors
|
23 pages, 6 figures
|
Transactions on Mathematical Software, 39 (2013), 12:1--12:20
| null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a type of pseudorandom number generator, Mersenne Twister
for Graphic Processor (MTGP), for efficient generation on graphic processessing
units (GPUs). MTGP supports large state sizes such as 11213 bits, and uses the
high parallelism of GPUs in computing many steps of the recursion in parallel.
The second proposal is a parameter-set generator for MTGP, named MTGP Dynamic
Creator (MTGPDC). MT- GPDC creates up to 2^32 distinct parameter sets which
generate sequences with high-dimensional uniformity. This facility is suitable
for a large grid of GPUs where each GPU requires separate random number
streams. MTGP is based on linear recursion over the two-element field, and has
better high-dimensional equidistribution than the Mersenne Twister pseudorandom
number generator.
|
[
{
"version": "v1",
"created": "Thu, 27 May 2010 01:06:54 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Jun 2010 06:17:48 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Mar 2012 08:12:08 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Saito",
"Mutsuo",
""
],
[
"Matsumoto",
"Makoto",
""
]
] |
new_dataset
| 0.980287 |
1205.6595
|
Mouradian Alexandre
|
Alexandre Mouradian (CITI, CITI Insa Lyon / Inria Grenoble
Rh\^one-Alpes), Isabelle Aug\'e-Blum (CITI Insa Lyon / Inria Grenoble
Rh\^one-Alpes), Fabrice Valois (CITI, CITI Insa Lyon / Inria Grenoble
Rh\^one-Alpes)
|
RTXP : A Localized Real-Time Mac-Routing Protocol for Wireless Sensor
Networks
| null |
N° RR-7978 (2012)
| null |
RR-7978
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Protocols developed during the last years for Wireless Sensor Networks (WSNs)
are mainly focused on energy efficiency and autonomous mechanisms (e.g.
self-organization, self-configuration, etc). Nevertheless, with new WSN
applications, appear new QoS requirements such as time constraints. Real-time
applications require the packets to be delivered before a known time bound
which depends on the application requirements. We particularly focus on
applications which consist in alarms sent to the sink node. We propose
Real-Time X-layer Protocol (RTXP), a real-time communication protocol. To the
best of our knowledge, RTXP is the first MAC and routing real-time
communication protocol that is not centralized, but instead relies only on
local information. The solution is cross-layer (X-layer) because it allows to
control the delays due to MAC and Routing layers interactions. RTXP uses a
suited hop-count-based Virtual Coordinate System which allows deterministic
medium access and forwarder selection. In this paper we describe the protocol
mechanisms. We give theoretical bound on the end-to-end delay and the capacity
of the protocol. Intensive simulation results confirm the theoretical
predictions and allow to compare with a real-time centralized solution. RTXP is
also simulated under harsh radio channel, in this case the radio link
introduces probabilistic behavior. Nevertheless, we show that RTXP it performs
better than a non-deterministic solution. It thus advocates for the usefulness
of designing real-time (deterministic) protocols even for highly unreliable
networks such as WSNs.
|
[
{
"version": "v1",
"created": "Wed, 30 May 2012 09:11:50 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Mar 2013 07:43:42 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Mouradian",
"Alexandre",
"",
"CITI, CITI Insa Lyon / Inria Grenoble\n Rhône-Alpes"
],
[
"Augé-Blum",
"Isabelle",
"",
"CITI Insa Lyon / Inria Grenoble\n Rhône-Alpes"
],
[
"Valois",
"Fabrice",
"",
"CITI, CITI Insa Lyon / Inria Grenoble\n Rhône-Alpes"
]
] |
new_dataset
| 0.998687 |
1303.3026
|
Yuming Jiang
|
Yuming Jiang
|
Stochastic Service Curve and Delay Bound Analysis: A Single Node Case
| null | null | null | null |
cs.PF cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A packet-switched network node with constant capacity (in bps) is considered,
where packets within each flow are served in the first in first out (FIFO)
manner. While this single node system is perhaps the simplest computer
communication system, its stochastic service curve characterization and
independent case analysis in the context of stochastic network calculus
(snetcal) are still basic and many crucial questions surprisingly remain open.
Specifically, when the input is a single flow, what stochastic service curve
and delay bound does the node provide? When the considered flow shares the node
with another flow, what stochastic service curve and delay bound does the node
provide to the considered flow, and if the two flows are independent, can this
independence be made use of and how? The aim of this paper is to provide
answers to these fundamental questions.
|
[
{
"version": "v1",
"created": "Tue, 12 Mar 2013 20:59:46 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Jiang",
"Yuming",
""
]
] |
new_dataset
| 0.990635 |
1303.3071
|
Ankit Chaudhary
|
S. Kumar, R. Sehgal, P. Singh, Ankit Chaudhary
|
Nepenthes Honeypots based Botnet Detection
|
http://ojs.academypublisher.com/index.php/jait/article/view/jait0304215221
|
JAIT 3(4), 2012
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The numbers of the botnet attacks are increasing day by day and the detection
of botnet spreading in the network has become very challenging. Bots are having
specific characteristics in comparison of normal malware as they are controlled
by the remote master server and usually dont show their behavior like normal
malware until they dont receive any command from their master server. Most of
time bot malware are inactive, hence it is very difficult to detect. Further
the detection or tracking of the network of theses bots requires an
infrastructure that should be able to collect the data from a diverse range of
data sources and correlate the data to bring the bigger picture in view. In
this paper, we are sharing our experience of botnet detection in the private
network as well as in public zone by deploying the nepenthes honeypots. The
automated framework for malware collection using nepenthes and analysis using
anti-virus scan are discussed. The experimental results of botnet detection by
enabling nepenthes honeypots in network are shown. Also we saw that existing
known bots in our network can be detected.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 00:55:21 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Kumar",
"S.",
""
],
[
"Sehgal",
"R.",
""
],
[
"Singh",
"P.",
""
],
[
"Chaudhary",
"Ankit",
""
]
] |
new_dataset
| 0.996958 |
1303.3072
|
John Baillieul
|
Zhaodan Kong, Kayhan \"Ozcimder, Nathan Fuller, Alison Greco, Diane
Theriault, Zheng Wu, Thomas Kunz, Margrit Betke, John Baillieul
|
Optical Flow Sensing and the Inverse Perception Problem for Flying Bats
|
20 Pages, 7 figures
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The movements of birds, bats, and other flying species are governed by
complex sensorimotor systems that allow the animals to react to stationary
environmental features as well as to wind disturbances, other animals in nearby
airspace, and a wide variety of unexpected challenges. The paper and talk will
describe research that analyzes the three-dimensional trajectories of bats
flying in a habitat in Texas. The trajectories are computed with stereoscopic
methods using data from synchronous thermal videos that were recorded with high
temporal and spatial resolution from three viewpoints. Following our previously
reported work, we examine the possibility that bat trajectories in this habitat
are governed by optical flow sensing that interpolates periodic distance
measurements from echolocation. Using an idealized geometry of bat eyes, we
introduce the concept of time-to-transit, and recall some research that
suggests that this quantity is computed by the animals' visual cortex. Several
steering control laws based on time-to-transit are proposed for an idealized
flight model, and it is shown that these can be used to replicate the observed
flight of what we identify as typical bats. Although the vision-based motion
control laws we propose and the protocols for switching between them are quite
simple, some of the trajectories that have been synthesized are qualitatively
bat-like. Examination of the control protocols that generate these trajectories
suggests that bat motions are governed both by their reactions to a subset of
key feature points as well by their memories of where these feature points are
located.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 00:59:05 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Kong",
"Zhaodan",
""
],
[
"Özcimder",
"Kayhan",
""
],
[
"Fuller",
"Nathan",
""
],
[
"Greco",
"Alison",
""
],
[
"Theriault",
"Diane",
""
],
[
"Wu",
"Zheng",
""
],
[
"Kunz",
"Thomas",
""
],
[
"Betke",
"Margrit",
""
],
[
"Baillieul",
"John",
""
]
] |
new_dataset
| 0.964069 |
1303.3229
|
Radu Dragusin
|
Radu Dragusin (1 and 2), Paula Petcu (1 and 3), Christina Lioma (1 and
2), Birger Larsen (4), Henrik L. J{\o}rgensen (5), Ingemar J. Cox (1 and 6),
Lars Kai Hansen (1), Peter Ingwersen (4), Ole Winther (1) ((1) DTU Compute,
Technical University of Denmark, Denmark, (2) Department of Computer Science,
University of Copenhagen, Denmark, (3) Findwise, Copenhagen, Denmark, (4)
Information Systems and Interaction Design, Royal School of Library and
Information Science, Copenhagen, Denmark, (5) Department of Clinical
Biochemistry, Bispebjerg Hospital, Copenhagen, Denmark, (6) Department of
Computer Science, University College London, London, United Kingdom)
|
FindZebra: A search engine for rare diseases
| null |
International Journal of Medical Informatics, Available online 23
February 2013, ISSN 1386-5056
|
10.1016/j.ijmedinf.2013.01.005
| null |
cs.IR cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: The web has become a primary information resource about illnesses
and treatments for both medical and non-medical users. Standard web search is
by far the most common interface for such information. It is therefore of
interest to find out how well web search engines work for diagnostic queries
and what factors contribute to successes and failures. Among diseases, rare (or
orphan) diseases represent an especially challenging and thus interesting class
to diagnose as each is rare, diverse in symptoms and usually has scattered
resources associated with it. Methods: We use an evaluation approach for web
search engines for rare disease diagnosis which includes 56 real life
diagnostic cases, state-of-the-art evaluation measures, and curated information
resources. In addition, we introduce FindZebra, a specialized (vertical) rare
disease search engine. FindZebra is powered by open source search technology
and uses curated freely available online medical information. Results:
FindZebra outperforms Google Search in both default setup and customised to the
resources used by FindZebra. We extend FindZebra with specialized
functionalities exploiting medical ontological information and UMLS medical
concepts to demonstrate different ways of displaying the retrieved results to
medical experts. Conclusions: Our results indicate that a specialized search
engine can improve the diagnostic quality without compromising the ease of use
of the currently widely popular web search engines. The proposed evaluation
approach can be valuable for future development and benchmarking. The FindZebra
search engine is available at http://www.findzebra.com/.
|
[
{
"version": "v1",
"created": "Wed, 13 Mar 2013 17:47:57 GMT"
}
] | 2013-03-14T00:00:00 |
[
[
"Dragusin",
"Radu",
"",
"1 and 2"
],
[
"Petcu",
"Paula",
"",
"1 and 3"
],
[
"Lioma",
"Christina",
"",
"1 and\n 2"
],
[
"Larsen",
"Birger",
"",
"1 and 6"
],
[
"Jørgensen",
"Henrik L.",
"",
"1 and 6"
],
[
"Cox",
"Ingemar J.",
"",
"1 and 6"
],
[
"Hansen",
"Lars Kai",
""
],
[
"Ingwersen",
"Peter",
""
],
[
"Winther",
"Ole",
""
]
] |
new_dataset
| 0.988671 |
1303.2967
|
Flavio D'Alessandro
|
A. Bertoni. Ch. Choffrut, F. D'Alessandro
|
Quantum finite automata and linear context-free languages: a decidable
problem
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the so-called measure once finite quantum automata model
introduced by Moore and Crutchfield in 2000. We show that given a language
recognized by such a device and a linear context-free language, it is
recursively decidable whether or not they have a nonempty intersection. This
extends a result of Blondel et al. which can be interpreted as solving the
problem with the free monoid in place of the family of linear context-free
languages.
|
[
{
"version": "v1",
"created": "Tue, 12 Mar 2013 17:51:57 GMT"
}
] | 2013-03-13T00:00:00 |
[
[
"Choffrut",
"A. Bertoni. Ch.",
""
],
[
"D'Alessandro",
"F.",
""
]
] |
new_dataset
| 0.999135 |
0908.3545
|
Pat Morin
|
Vida Dujmovic, Joachim Gudmundsson, Pat Morin, Thomas Wolle
|
Notes on large angle crossing graphs
| null |
Chicago Journal of Theoretical Computer Science, Article 2011-4
|
10.4086/cjtcs.2011.004
| null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph G is an a-angle crossing (aAC) graph if every pair of crossing edges
in G intersect at an angle of at least a. The concept of right angle crossing
(RAC) graphs (a=Pi/2) was recently introduced by Didimo et. al. It was shown
that any RAC graph with n vertices has at most 4n-10 edges and that there are
infinitely many values of n for which there exists a RAC graph with n vertices
and 4n-10 edges. In this paper, we give upper and lower bounds for the number
of edges in aAC graphs for all 0 < a < Pi/2.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 06:21:41 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Nov 2010 15:05:40 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Dujmovic",
"Vida",
""
],
[
"Gudmundsson",
"Joachim",
""
],
[
"Morin",
"Pat",
""
],
[
"Wolle",
"Thomas",
""
]
] |
new_dataset
| 0.998956 |
0911.2484
|
Pat Morin
|
Dan Chen, Luc Devroye, Vida Dujmovic, and Pat Morin
|
Memoryless Routing in Convex Subdivisions: Random Walks are Optimal
|
11 pages, 6 figures
|
Computational Geometry: Theory and Applications, Volume 45, Issue
4, May 2012, Pages 178-185
|
10.1016/j.comgeo.2011.12.005
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A memoryless routing algorithm is one in which the decision about the next
edge on the route to a vertex t for a packet currently located at vertex v is
made based only on the coordinates of v, t, and the neighbourhood, N(v), of v.
The current paper explores the limitations of such algorithms by showing that,
for any (randomized) memoryless routing algorithm A, there exists a convex
subdivision on which A takes Omega(n^2) expected time to route a message
between some pair of vertices. Since this lower bound is matched by a random
walk, this result implies that the geometric information available in convex
subdivisions is not helpful for this class of routing algorithms. The current
paper also shows the existence of triangulations for which the Random-Compass
algorithm proposed by Bose etal (2002,2004) requires 2^{\Omega(n)} time to
route between some pair of vertices.
|
[
{
"version": "v1",
"created": "Thu, 12 Nov 2009 21:53:08 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Chen",
"Dan",
""
],
[
"Devroye",
"Luc",
""
],
[
"Dujmovic",
"Vida",
""
],
[
"Morin",
"Pat",
""
]
] |
new_dataset
| 0.99782 |
1209.0236
|
Han Mao Kiah
|
Yeow Meng Chee, Han Mao Kiah, Punarbasu Purkayastha, Chengmin Wang
|
Cross-Bifix-Free Codes Within a Constant Factor of Optimality
| null | null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A cross-bifix-free code is a set of words in which no prefix of any length of
any word is the suffix of any word in the set. Cross-bifix-free codes arise in
the study of distributed sequences for frame synchronization. We provide a new
construction of cross-bifix-free codes which generalizes the construction in
Bajic (2007) to longer code lengths and to any alphabet size. The codes are
shown to be nearly optimal in size. We also establish new results on Fibonacci
sequences, that are used in estimating the size of the cross-bifix-free codes.
|
[
{
"version": "v1",
"created": "Mon, 3 Sep 2012 03:29:10 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Mar 2013 09:20:08 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Chee",
"Yeow Meng",
""
],
[
"Kiah",
"Han Mao",
""
],
[
"Purkayastha",
"Punarbasu",
""
],
[
"Wang",
"Chengmin",
""
]
] |
new_dataset
| 0.998971 |
1303.0045
|
Bogdan State
|
Bogdan State, Patrick Park, Ingmar Weber, Yelena Mejova, Michael Macy
|
The Mesh of Civilizations and International Email Flows
|
10 pages, 3 figures
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In The Clash of Civilizations, Samuel Huntington argued that the primary axis
of global conflict was no longer ideological or economic but cultural and
religious, and that this division would characterize the "battle lines of the
future." In contrast to the "top down" approach in previous research focused on
the relations among nation states, we focused on the flows of interpersonal
communication as a bottom-up view of international alignments. To that end, we
mapped the locations of the world's countries in global email networks to see
if we could detect cultural fault lines. Using IP-geolocation on a worldwide
anonymized dataset obtained from a large Internet company, we constructed a
global email network. In computing email flows we employ a novel rescaling
procedure to account for differences due to uneven adoption of a particular
Internet service across the world. Our analysis shows that email flows are
consistent with Huntington's thesis. In addition to location in Huntington's
"civilizations," our results also attest to the importance of both cultural and
economic factors in the patterning of inter-country communication ties.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 23:29:11 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Mar 2013 19:15:12 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"State",
"Bogdan",
""
],
[
"Park",
"Patrick",
""
],
[
"Weber",
"Ingmar",
""
],
[
"Mejova",
"Yelena",
""
],
[
"Macy",
"Michael",
""
]
] |
new_dataset
| 0.986466 |
1303.2219
|
Boris Ryabko
|
Boris Ryabko
|
The Vernam cipher is robust to small deviations from randomness
| null | null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Vernam cipher (or one-time pad) has played an important rule in
cryptography because it is a perfect secrecy system. For example, if an English
text (presented in binary system) $X_1 X_2 ... $ is enciphered according to the
formula $Z_i = (X_i + Y_i) \mod 2 $, where $Y_1 Y_2 ...$ is a key sequence
generated by the Bernoulli source with equal probabilities of 0 and 1, anyone
who knows $Z_1 Z_2 ... $ has no information about $X_1 X_2 ... $ without the
knowledge of the key $Y_1 Y_2 ...$. (The best strategy is to guess $X_1 X_2 ...
$ not paying attention to $Z_1 Z_2 ... $.)
But what should one say about secrecy of an analogous method where the key
sequence $Y_1 Y_2 ...$ is generated by the Bernoulli source with a small bias,
say, $P(0) = 0.49, $ $ P(1) = 0.51$? To the best of our knowledge, there are no
theoretical estimates for the secrecy of such a system, as well as for the
general case where $X_1 X_2 ... $ (the plaintext) and key sequence are
described by stationary ergodic processes. We consider the running-key ciphers
where the plaintext and the key are generated by stationary ergodic sources and
show how to estimate the secrecy of such systems. In particular, it is shown
that, in a certain sense, the Vernam cipher is robust to small deviations from
randomness.
|
[
{
"version": "v1",
"created": "Sat, 9 Mar 2013 15:12:46 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Ryabko",
"Boris",
""
]
] |
new_dataset
| 0.989251 |
1303.2282
|
Xiyong Zhang
|
Xiyong Zhang and Guangpu Gao
|
On the conjecture about the nonexistence of rotation symmetric bent
functions
| null | null | null | null |
cs.CR math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe a different approach to the proof of the
nonexistence of homogeneous rotation symmetric bent functions. As a result, we
obtain some new results which support the conjecture made in this journal,
i.e., there are no homogeneous rotation symmetric bent functions of degree >2.
Also we characterize homogeneous degree 2 rotation symmetric bent functions by
using GCD of polynomials.
|
[
{
"version": "v1",
"created": "Sun, 10 Mar 2013 02:10:54 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Zhang",
"Xiyong",
""
],
[
"Gao",
"Guangpu",
""
]
] |
new_dataset
| 0.996923 |
1303.2547
|
Josep Rif\`a
|
J. Rifa, V. Zinoviev
|
On a family of binary completely transitive codes with growing covering
radius
|
Submitted to Discrete mathematics. March 10, 2013
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new family of binary linear completely transitive (and, therefore,
completely regular) codes is constructed. The covering radius of these codes is
growing with the length of the code. In particular, for any integer r > 1,
there exist two codes with d=3, covering radius r and length 2r(4r-1) and
(2r+1)(4r+1), respectively. These new completely transitive codes induce, as
coset graphs, a family of distance-transitive graphs of growing diameter.
|
[
{
"version": "v1",
"created": "Mon, 11 Mar 2013 15:19:46 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Rifa",
"J.",
""
],
[
"Zinoviev",
"V.",
""
]
] |
new_dataset
| 0.999893 |
1303.2553
|
Yi-ying Tseng
|
Jen-Yeu Chen, Yi-ying Tseng
|
Distributed Intrusion Detection of Byzantine Attacks in Wireless
Networks with Random Linear Network Coding
| null |
International Journal of Distributed Sensor Networks, Volume 2012
(2012), Article ID 758340, 10 pages
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network coding is an elegant technique where, instead of simply relaying the
packets of information they receive, the nodes of a network are allowed to
combine \emph{several} packets together for transmission and this technique can
be used to achieve the maximum possible information flow in a network and save
the needed number of packet transmissions. Moreover, in an energy-constraint
wireless network such as Wireless Sensor Network (a typical type of wireless ad
hoc network), applying network coding to reduce the number of wireless
transmissions can also prolong the life time of sensor nodes. Although applying
network coding in a wireless sensor network is obviously beneficial, due to the
operation that one transmitting information is actually combination of multiple
other information, it is possible that an error propagation may occur in the
network. This special characteristic also exposes network coding system to a
wide range of error attacks, especially Byzantine attacks. When some adversary
nodes generate error data in the network with network coding, those erroneous
information will be mixed at intermeidate nodes and thus corrupt all the
information reaching a destination. Recent research efforts have shown that
network coding can be combined with classical error control codes and
cryptography for secure communication or misbehavior detection. Nevertheless,
when it comes to Byzantine attacks, these results have limited effect. In fact,
unless we find out those adversary nodes and isolate them, network coding may
perform much worse than pure routing in the presence of malicious nodes. In
this paper, a distributed hierarchical algorithm based on random linear network
coding is developed to detect, locate and isolate malicious nodes.
|
[
{
"version": "v1",
"created": "Mon, 11 Mar 2013 15:50:51 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Chen",
"Jen-Yeu",
""
],
[
"Tseng",
"Yi-ying",
""
]
] |
new_dataset
| 0.996908 |
1303.1461
|
Paul Dagum
|
Paul Dagum, Adam Galper
|
Forecasting Sleep Apnea with Dynamic Network Models
|
Appears in Proceedings of the Ninth Conference on Uncertainty in
Artificial Intelligence (UAI1993)
| null | null |
UAI-P-1993-PG-64-71
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic network models (DNMs) are belief networks for temporal reasoning. The
DNM methodology combines techniques from time series analysis and probabilistic
reasoning to provide (1) a knowledge representation that integrates
noncontemporaneous and contemporaneous dependencies and (2) methods for
iteratively refining these dependencies in response to the effects of exogenous
influences. We use belief-network inference algorithms to perform forecasting,
control, and discrete event simulation on DNMs. The belief network formulation
allows us to move beyond the traditional assumptions of linearity in the
relationships among time-dependent variables and of normality in their
probability distributions. We demonstrate the DNM methodology on an important
forecasting problem in medicine. We conclude with a discussion of how the
methodology addresses several limitations found in traditional time series
analyses.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 14:19:03 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Dagum",
"Paul",
""
],
[
"Galper",
"Adam",
""
]
] |
new_dataset
| 0.972278 |
1303.1492
|
Marek J. Druzdzel
|
Marek J. Druzdzel, Max Henrion
|
Intercausal Reasoning with Uninstantiated Ancestor Nodes
|
Appears in Proceedings of the Ninth Conference on Uncertainty in
Artificial Intelligence (UAI1993)
| null | null |
UAI-P-1993-PG-317-325
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intercausal reasoning is a common inference pattern involving probabilistic
dependence of causes of an observed common effect. The sign of this dependence
is captured by a qualitative property called product synergy. The current
definition of product synergy is insufficient for intercausal reasoning where
there are additional uninstantiated causes of the common effect. We propose a
new definition of product synergy and prove its adequacy for intercausal
reasoning with direct and indirect evidence for the common effect. The new
definition is based on a new property matrix half positive semi-definiteness, a
weakened form of matrix positive semi-definiteness.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 14:22:00 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Druzdzel",
"Marek J.",
""
],
[
"Henrion",
"Max",
""
]
] |
new_dataset
| 0.999098 |
1303.1501
|
Tom S. Verma
|
Tom S. Verma, Judea Pearl
|
Deciding Morality of Graphs is NP-complete
|
Appears in Proceedings of the Ninth Conference on Uncertainty in
Artificial Intelligence (UAI1993)
| null | null |
UAI-P-1993-PG-391-399
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to find a causal explanation for data presented in the form of
covariance and concentration matrices it is necessary to decide if the graph
formed by such associations is a projection of a directed acyclic graph (dag).
We show that the general problem of deciding whether such a dag exists is
NP-complete.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 14:22:53 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Verma",
"Tom S.",
""
],
[
"Pearl",
"Judea",
""
]
] |
new_dataset
| 0.985161 |
1303.1597
|
Sumit Kumar
|
Garimella Rama Murthy (IIIT-Hyderabad, India)
|
Concurrent Cyber Physical Systems:Tensor State Space Representation
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this research paper, state space representation of concurrent, linearly
coupled dynamical systems is discussed. It is reasoned that the Tensor State
Space Representation (TSSR) proposed in [Rama1] is directly applicable in such
a problem. Also some discussion on linearly coupled, concurrent systems
evolving on multiple time scales is included. Briefly new ideas related to
distributed signal processing in cyber physical systems are included.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 02:43:45 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Murthy",
"Garimella Rama",
"",
"IIIT-Hyderabad, India"
]
] |
new_dataset
| 0.961743 |
1303.1697
|
Tino
|
Avinash Bhujbal, Ashish Jagtap, Devendra Gurav, Tino Jameskutty
|
Secure Video Streaming Plug-In
| null | null | null | null |
cs.MM cs.CR
|
http://creativecommons.org/licenses/by/3.0/
|
Video sharing sites like YouTube, Metacafe, Dailymotion, Vimeo, etc. provide
a platform for media content sharing among its users. Some of these videos are
copyright protected and restricted from being downloaded and saved. But users
can use various download managers or application programs to download and save
these videos. This affects the incoming traffic on these websites reducing
their hit rate and consequently reducing their revenue. Adobe Flash Player is
the most commonly used player for watching online videos. It uses RTMP (Real
Time Messaging Protocol) to stream audio, video and data over the Internet,
between a Flash Player and Adobe Flash Media Server.Here, we propose a plug-in
that enables the site owner control over downloading of videos from such
website. The plug-in will be installed at the client side with the consent of
the user. When the video is being played this plug-in will send unique keys to
the media server. The server will continue streaming the video after verifying
the keys. Download managers or application programs will not be able to
download the videos as they wont be able to create the unique keys that need to
be sent to the server.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 14:17:23 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Bhujbal",
"Avinash",
""
],
[
"Jagtap",
"Ashish",
""
],
[
"Gurav",
"Devendra",
""
],
[
"Jameskutty",
"Tino",
""
]
] |
new_dataset
| 0.997315 |
1303.1716
|
Kim Nguyen
|
V\'eronique Benzaken (LRI), Giuseppe Castagna (PPS), Kim Nguy\~\^en
(LRI), J\'er\^ome Sim\'eon
|
Static and dynamic semantics of NoSQL languages
| null |
POPL, Rome : Italy (2013)
|
10.1145/2429069.2429083
| null |
cs.PL cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a calculus for processing semistructured data that spans
differences of application area among several novel query languages, broadly
categorized as "NoSQL". This calculus lets users define their own operators,
capturing a wider range of data processing capabilities, whilst providing a
typing precision so far typical only of primitive hard-coded operators. The
type inference algorithm is based on semantic type checking, resulting in type
information that is both precise, and flexible enough to handle structured and
semistructured data. We illustrate the use of this calculus by encoding a large
fragment of Jaql, including operations and iterators over JSON, embedded SQL
expressions, and co-grouping, and show how the encoding directly yields a
typing discipline for Jaql as it is, namely without the addition of any type
definition or type annotation in the code.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 15:19:21 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Benzaken",
"Véronique",
"",
"LRI"
],
[
"Castagna",
"Giuseppe",
"",
"PPS"
],
[
"Nguy\\~ên",
"Kim",
"",
"LRI"
],
[
"Siméon",
"Jérôme",
""
]
] |
new_dataset
| 0.99559 |
1303.1728
|
Zungeru Adamu Murtala
|
A.M. Zungeru, P.O. Abraham-Attah
|
A Digital Automatic Sliding Door with a Room Light Control System
|
17 pages, 17 figures, Journal paper
|
A.M. Zungeru, P.O. Abraham-Attah. A Digital Automatic Sliding Door
with a Room Light Control System, International Journal of Information
Technology, Modeling and Computing (IJITMC), vol. 1(1), pp. 1-17, 2012
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automatic door is an automated movable barrier installed in the entry of a
room or building to restrict access, provide ease of opening a door or provide
visual privacy. As a result of enhanced civilization and modernization, the
human nature demands more comfort to his life. The man seeks ways to do things
easily and which saves time. So thus, the automatic gates are one of the
examples that human nature invent to bring comfort and ease in its daily life.
To this end, we model and design an automatic sliding door with a room light
control system to provide the mentioned needs. This was achieved by considering
some factors such as economy, availability of components and research
materials, efficiency, compatibility and portability and also durability in the
design process. The performance of the system after test met design
specifications. This system works on the principle of breaking an infrared beam
of light, sensed by a photodiode. It consists of two transmitting infrared
diodes and two receiving photo-diodes. The first one is for someone coming in
and the second one is for someone going out of the room. The photodiodes are
connected to comparators, which give a lower output when the beam is broken and
high output when transmitting normally. The general operation of the work and
performance is dependent on the presence of an intruder entering through the
door and how close he/she is in closer to the door. The door is meant to open
automatically but in a case where there is no power supply trying to force the
door open would damage the mechanical control system of the unit. The overall
work was implemented with a constructed work, tested working and perfectly
functional.
|
[
{
"version": "v1",
"created": "Thu, 7 Mar 2013 16:02:28 GMT"
}
] | 2013-03-08T00:00:00 |
[
[
"Zungeru",
"A. M.",
""
],
[
"Abraham-Attah",
"P. O.",
""
]
] |
new_dataset
| 0.997008 |
1303.1232
|
Jessica C. Ram\'irez
|
Jessica Ram\'irez, Masayuki Asahara, Yuji Matsumoto
|
Japanese-Spanish Thesaurus Construction Using English as a Pivot
| null |
In Proceeding of The Third International Joint Conference on
Natural Language Processing (IJCNLP-08), Hyderabad, India. pages 473-480,
2008
| null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the results of research with the goal of automatically creating a
multilingual thesaurus based on the freely available resources of Wikipedia and
WordNet. Our goal is to increase resources for natural language processing
tasks such as machine translation targeting the Japanese-Spanish language pair.
Given the scarcity of resources, we use existing English resources as a pivot
for creating a trilingual Japanese-Spanish-English thesaurus. Our approach
consists of extracting the translation tuples from Wikipedia, disambiguating
them by mapping them to WordNet word senses. We present results comparing two
methods of disambiguation, the first using VSM on Wikipedia article texts and
WordNet definitions, and the second using categorical information extracted
from Wikipedia, We find that mixing the two methods produces favorable results.
Using the proposed method, we have constructed a multilingual
Spanish-Japanese-English thesaurus consisting of 25,375 entries. The same
method can be applied to any pair of languages that are linked to English in
Wikipedia.
|
[
{
"version": "v1",
"created": "Wed, 6 Mar 2013 01:30:58 GMT"
}
] | 2013-03-07T00:00:00 |
[
[
"Ramírez",
"Jessica",
""
],
[
"Asahara",
"Masayuki",
""
],
[
"Matsumoto",
"Yuji",
""
]
] |
new_dataset
| 0.988885 |
1303.0930
|
Jun Zhang
|
Jun Zhang, Xinran Li and Fang-Wei Fu
|
An Authentication Scheme for Subspace Codes over Network Based on Linear
Codes
|
18 pages
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network coding provides the advantage of maximizing the usage of network
resources, and has great application prospects in future network
communications. However, the properties of network coding also make the
pollution attack more serious. In this paper, we give an unconditional secure
authentication scheme for network coding based on a linear code $C$.
Safavi-Naini and Wang gave an authentication code for multi-receivers and
multiple messages. We notice that the scheme of Safavi-Naini and Wang is
essentially constructed with Reed-Solomon codes. And we modify their
construction slightly to make it serve for authenticating subspace codes over
linear network. Also, we generalize the construction with linear codes. The
generalization to linear codes has the similar advantages as generalizing
Shamir's secret sharing scheme to linear secret sharing sceme based on linear
codes. One advantage of this generalization is that for a fixed message space,
our scheme allows arbitrarily many receivers to check the integrity of their
own messages, while the scheme with Reed-Solomon codes has a constraint on the
number of verifying receivers. Another advantage is that we introduce access
structure in the generalized scheme. Massey characterized the access structure
of linear secret sharing scheme by minimal codewords in the dual code whose
first component is 1. We slightly modify the definition of minimal codewords.
Let $C$ be a $[V,k]$ linear code. For any coordinate $i\in \{1,2,\cdots,V\}$, a
codeword $\vec{c}$ in $C$ is called minimal respect to $i$ if the codeword
$\vec{c}$ has component 1 at the $i$-th coordinate and there is no other
codeword whose $i$-th component is 1 with support strictly contained in that of
$\vec{c}$. Then the security of receiver $R_i$ in our authentication scheme is
characterized by the minimal codewords respect to $i$ in the dual code
$C^\bot$.
|
[
{
"version": "v1",
"created": "Tue, 5 Mar 2013 05:33:40 GMT"
}
] | 2013-03-06T00:00:00 |
[
[
"Zhang",
"Jun",
""
],
[
"Li",
"Xinran",
""
],
[
"Fu",
"Fang-Wei",
""
]
] |
new_dataset
| 0.99705 |
1303.0964
|
Jan Egger
|
Jan Egger, Tina Kapur, Andriy Fedorov, Steve Pieper, James V. Miller,
Harini Veeraraghavan, Bernd Freisleben, Alexandra Golby, Christopher Nimsky,
Ron Kikinis
|
GBM Volumetry using the 3D Slicer Medical Image Computing Platform
|
7 pages, 6 figures, 2 tables, 1 equation, 43 references
|
Sci. Rep. 3, 1364, 2013
|
10.1038/srep01364
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Volumetric change in glioblastoma multiforme (GBM) over time is a critical
factor in treatment decisions. Typically, the tumor volume is computed on a
slice-by-slice basis using MRI scans obtained at regular intervals. (3D)Slicer
- a free platform for biomedical research - provides an alternative to this
manual slice-by-slice segmentation process, which is significantly faster and
requires less user interaction. In this study, 4 physicians segmented GBMs in
10 patients, once using the competitive region-growing based GrowCut
segmentation module of Slicer, and once purely by drawing boundaries completely
manually on a slice-by-slice basis. Furthermore, we provide a variability
analysis for three physicians for 12 GBMs. The time required for GrowCut
segmentation was on an average 61% of the time required for a pure manual
segmentation. A comparison of Slicer-based segmentation with manual
slice-by-slice segmentation resulted in a Dice Similarity Coefficient of 88.43
+/- 5.23% and a Hausdorff Distance of 2.32 +/- 5.23 mm.
|
[
{
"version": "v1",
"created": "Tue, 5 Mar 2013 09:40:46 GMT"
}
] | 2013-03-06T00:00:00 |
[
[
"Egger",
"Jan",
""
],
[
"Kapur",
"Tina",
""
],
[
"Fedorov",
"Andriy",
""
],
[
"Pieper",
"Steve",
""
],
[
"Miller",
"James V.",
""
],
[
"Veeraraghavan",
"Harini",
""
],
[
"Freisleben",
"Bernd",
""
],
[
"Golby",
"Alexandra",
""
],
[
"Nimsky",
"Christopher",
""
],
[
"Kikinis",
"Ron",
""
]
] |
new_dataset
| 0.99631 |
1303.1006
|
EPTCS
|
Jan Peleska (University of Bremen, Verified Systems International
GmbH, Bremen, Germany)
|
Industrial-Strength Model-Based Testing - State of the Art and Current
Challenges
|
In Proceedings MBT 2013, arXiv:1303.0379
|
EPTCS 111, 2013, pp. 3-28
|
10.4204/EPTCS.111.1
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As of today, model-based testing (MBT) is considered as leading-edge
technology in industry. We sketch the different MBT variants that - according
to our experience - are currently applied in practice, with special emphasis on
the avionic, railway and automotive domains. The key factors for successful
industrial-scale application of MBT are described, both from a scientific and a
managerial point of view. With respect to the former view, we describe the
techniques for automated test case, test data and test procedure generation for
concurrent reactive real-time systems which are considered as the most
important enablers for MBT in practice. With respect to the latter view, our
experience with introducing MBT approaches in testing teams are sketched.
Finally, the most challenging open scientific problems whose solutions are
bound to improve the acceptance and effectiveness of MBT in industry are
discussed.
|
[
{
"version": "v1",
"created": "Tue, 5 Mar 2013 12:18:09 GMT"
}
] | 2013-03-06T00:00:00 |
[
[
"Peleska",
"Jan",
"",
"University of Bremen, Verified Systems International\n GmbH, Bremen, Germany"
]
] |
new_dataset
| 0.958759 |
1303.1119
|
Zungeru Adamu Murtala
|
A.M. Zungeru, L.-M. Ang, K.P. Seng
|
Termite-hill: From natural to artificial termites in sensor networks
|
26 pages, 4 figures
|
A.M. Zungeru, L.-M. Ang, K.P. Seng. Termite-hill: From Natural to
Artificial Termites in Sensor Networks, International Journal of Swarm
Intelligence Research (IGI-Publishers), vol. 3(4), pp. 1-23, 2012
|
10.4018/jsir.2012100101
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Termites present a very good natural metaphor to evolutionary computation.
While each individuals computational power is small compared to more evolved
species, it is the power of their colonies that inspires communication
engineers. This paper presents a study of artificial termites in sensor
networks for the purpose of solving its routing problem. The behaviors of each
of the termites in their colony allow their simulation in a restricted
environment. The simulating behavior demonstrates how the termites make use of
an auto-catalytic behavior in order to collectively find a solution for a posed
problem in reasonable time. The derived algorithm termed Termite-hill
demonstrates the principle of termites behavior to routing problem solving in
the real applications of sensor networks. The performance of the algorithm was
tested on static and dynamic sink scenarios. The results as compared with other
routing algorithms and with varying network density show that Termite-hill is
scalable and improved on network energy consumption with a control over
best-effort-service.
|
[
{
"version": "v1",
"created": "Tue, 5 Mar 2013 17:58:29 GMT"
}
] | 2013-03-06T00:00:00 |
[
[
"Zungeru",
"A. M.",
""
],
[
"Ang",
"L. -M.",
""
],
[
"Seng",
"K. P.",
""
]
] |
new_dataset
| 0.9997 |
1302.4043
|
Belhassen Akrout
|
Belhassen Akrout, Imen Khanfir Kallel, Chokri Ben Amar
|
A new scheme of signature extraction for iris authentication
|
7 pages, 13 figures,International Multi-Conference on Systems Signals
and Devices
|
IEEE 6th International Multi-Conference on Systems, Signals and
Devices. (2009) 1-8
|
10.1109/SSD.2009.4956749
|
REGIM-2009-03
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Iris recognition, a relatively new biometric technology, has great
advantages, such as variability, stability and security, thus is the most
promising for high security environment. Iris recognition is proposed in this
report. We describe some methods, the first one is based on grey level
histogram to extract the pupil, the second is based on elliptic and parabolic
HOUGH transformation to determinate the edge of iris, upper and lower eyelids,
the third we used 2D Gabor Wavelets to encode the iris and finally we used the
Hamming distance for authentication.
|
[
{
"version": "v1",
"created": "Sun, 17 Feb 2013 08:11:58 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Akrout",
"Belhassen",
""
],
[
"Kallel",
"Imen Khanfir",
""
],
[
"Amar",
"Chokri Ben",
""
]
] |
new_dataset
| 0.987377 |
1302.5414
|
Marco Chiesa
|
Marco Chiesa, Gabriele Lospoto, Massimo Rimondini, and Giuseppe Di
Battista
|
Intra-Domain Pathlet Routing
|
13 figures, 1 table
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internal routing inside an ISP network is the foundation for lots of services
that generate revenue from the ISP's customers. A fine-grained control of paths
taken by network traffic once it enters the ISP's network is therefore a
crucial means to achieve a top-quality offer and, equally important, to enforce
SLAs. Many widespread network technologies and approaches (most notably, MPLS)
offer limited (e.g., with RSVP-TE), tricky (e.g., with OSPF metrics), or no
control on internal routing paths. On the other hand, recent advances in the
research community are a good starting point to address this shortcoming, but
miss elements that would enable their applicability in an ISP's network.
We extend pathlet routing by introducing a new control plane for internal
routing that has the following qualities: it is designed to operate in the
internal network of an ISP; it enables fine-grained management of network paths
with suitable configuration primitives; it is scalable because routing changes
are only propagated to the network portion that is affected by the changes; it
supports independent configuration of specific network portions without the
need to know the configuration of the whole network; it is robust thanks to the
adoption of multipath routing; it supports the enforcement of QoS levels; it is
independent of the specific data plane used in the ISP's network; it can be
incrementally deployed and it can nicely coexist with other control planes.
Besides formally introducing the algorithms and messages of our control plane,
we propose an experimental validation in the simulation framework OMNeT++ that
we use to assess the effectiveness and scalability of our approach.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2013 20:55:20 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Mar 2013 02:45:12 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Chiesa",
"Marco",
""
],
[
"Lospoto",
"Gabriele",
""
],
[
"Rimondini",
"Massimo",
""
],
[
"Di Battista",
"Giuseppe",
""
]
] |
new_dataset
| 0.99944 |
1302.7051
|
Wesam Elshamy
|
Wesam Elshamy, Hassan M Emara, Ahmed Bahgat
|
Polyploidy and Discontinuous Heredity Effect on Evolutionary
Multi-Objective Optimization
|
Corrected the last name of the second author to match his name in the
paper
| null | null |
EPM-217-2006
|
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper examines the effect of mimicking discontinuous heredity caused by
carrying more than one chromosome in some living organisms cells in
Evolutionary Multi-Objective Optimization algorithms. In this representation,
the phenotype may not fully reflect the genotype. By doing so we are mimicking
living organisms inheritance mechanism, where traits may be silently carried
for many generations to reappear later. Representations with different number
of chromosomes in each solution vector are tested on different benchmark
problems with high number of decision variables and objectives. A comparison
with Non-Dominated Sorting Genetic Algorithm-II is done on all problems.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 01:32:28 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Mar 2013 00:20:07 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Elshamy",
"Wesam",
""
],
[
"Emara",
"Hassan M",
""
],
[
"Bahgat",
"Ahmed",
""
]
] |
new_dataset
| 0.9747 |
1303.0058
|
Mohammad Shahrokh Esfahani
|
Mohammad Shahrokh Esfahani and Masoumeh Nasiri-Kenari
|
A Cooperative MARC Scheme Using Analogue Network Coding to Achieve
Second-Order Diversity
| null | null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A multiple access relay channel (MARC) is considered in which an
analogue-like network coding is implemented in the relay node. This analogue
coding is a simple addition of the received signals at the relay node. Using
"nulling detection" structure employed in V-BLAST receiver, we propose a
detection scheme in the destination which is able to provide a diversity order
of two for all users. We analytically evaluate the performance of our proposed
scheme for the MARC with two users where tight upper bounds for both uncoded
and Convolutionally coded transmission blocks are provided. We verify our
analytical evaluations by simulations and compare the results with those of
noncooperative transmission and Alamouti's scheme for the same power and rate
transmission. Our results indicate that while our proposed scheme shows a
comparable performance compared to the Alamouti's scheme, it substantially
outperforms the non-cooperate transmission.
|
[
{
"version": "v1",
"created": "Fri, 1 Mar 2013 00:47:29 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Mar 2013 19:33:18 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Esfahani",
"Mohammad Shahrokh",
""
],
[
"Nasiri-Kenari",
"Masoumeh",
""
]
] |
new_dataset
| 0.970282 |
1303.0405
|
Waqas Ahmed Imtiaz
|
Waqas Ahmed Imtiaz, Muhammad Afaq, Muhammad Asmatullah Khan Babar
|
mSCTP Based Decentralized Mobility Framework
|
7 Pages, Journal
|
International Journal of Advanced Computer Science and
Applications, Vol. 2, No.9, 2011, Page 106-112
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To conceive the full potential of wireless IP services, Mobile Nodes (MNs)
must be able to roam seamlessly across different networks. Mobile Stream
Control Transmission Protocol (mSCTP) is a transport layer solution, which
unlike Mobile IP (MIP), provides seamless mobility with minimum delay and
negligible packet loss. However, mSCTP fails to locate the current IP address
of the mobile node when Correspondent Node (CN) wants to initiate a session. In
this paper, we propose DHT Chord to provide the required location management.
Chord is a P2P algorithm, which can efficiently provide the IP address of the
called MN by using its key-value mapping. The proposed decentralized mobility
framework collectively exploits the multihoming feature of mSCTP, and efficient
key-value mapping of chord to provide seamless mobility. Suitability of the
framework is analyzed by preliminary analysis of chord lookup efficiency, and
mSCTP handover procedure using overlay weaver and NS-2. Performance analysis
shows that mSCTP multihoming feature and Chord efficient key-value mapping can
provide a non-delayed, reliable, and an efficient IP handover solution.
|
[
{
"version": "v1",
"created": "Sat, 2 Mar 2013 17:35:19 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Imtiaz",
"Waqas Ahmed",
""
],
[
"Afaq",
"Muhammad",
""
],
[
"Babar",
"Muhammad Asmatullah Khan",
""
]
] |
new_dataset
| 0.991988 |
1303.0484
|
Folke Mitzlaff
|
Folke Mitzlaff and Gerd Stumme
|
Onomastics 2.0 - The Power of Social Co-Occurrences
|
Historically, this is the first paper on the analysis of names in the
context of the name search engine 'nameling'. arXiv admin note: text overlap
with arXiv:1302.4412
| null | null | null |
cs.IR cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Onomastics is "the science or study of the origin and forms of proper names
of persons or places." ["Onomastics". Merriam-Webster.com, 2013.
http://www.merriam-webster.com (11 February 2013)]. Especially personal names
play an important role in daily life, as all over the world future parents are
facing the task of finding a suitable given name for their child. This choice
is influenced by different factors, such as the social context, language,
cultural background and, in particular, personal taste.
With the rise of the Social Web and its applications, users more and more
interact digitally and participate in the creation of heterogeneous,
distributed, collaborative data collections. These sources of data also reflect
current and new naming trends as well as new emerging interrelations among
names.
The present work shows, how basic approaches from the field of social network
analysis and information retrieval can be applied for discovering relations
among names, thus extending Onomastics by data mining techniques. The
considered approach starts with building co-occurrence graphs relative to data
from the Social Web, respectively for given names and city names. As a main
result, correlations between semantically grounded similarities among names
(e.g., geographical distance for city names) and structural graph based
similarities are observed.
The discovered relations among given names are the foundation of "nameling"
[http://nameling.net], a search engine and academic research platform for given
names which attracted more than 30,000 users within four months,
underpinningthe relevance of the proposed methodology.
|
[
{
"version": "v1",
"created": "Sun, 3 Mar 2013 10:11:44 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Mitzlaff",
"Folke",
""
],
[
"Stumme",
"Gerd",
""
]
] |
new_dataset
| 0.999493 |
1303.0598
|
M.M.A. Hashem
|
Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque and M. M. A.
Hashem
|
A Newer User Authentication, File encryption and Distributed Server
Based Cloud Computing Security Architecture
| null |
International Journal of Advanced Computer Science and
Applications (IJACSA), Vol. 3, No. 10, pp. 181-186, [ISSN: 2156-5570] (2012)
| null | null |
cs.DC cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The cloud computing platform gives people the opportunity for sharing
resources, services and information among the people of the whole world. In
private cloud system, information is shared among the persons who are in that
cloud. For this, security or personal information hiding process hampers. In
this paper we have proposed new security architecture for cloud computing
platform. This ensures secure communication system and hiding information from
others. AES based file encryption system and asynchronous key system for
exchanging information or data is included in this model. This structure can be
easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS.
This model also includes onetime password system for user authentication
process. Our work mainly deals with the security system of the whole cloud
computing platform.
|
[
{
"version": "v1",
"created": "Mon, 4 Mar 2013 04:19:15 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Nafi",
"Kawser Wazed",
""
],
[
"Kar",
"Tonny Shekha",
""
],
[
"Hoque",
"Sayed Anisul",
""
],
[
"Hashem",
"M. M. A.",
""
]
] |
new_dataset
| 0.996142 |
1303.0646
|
Stefano Braghin
|
Anwitaman Datta and Stefano Braghin and Jackson Tan Teck Yong
|
The Zen of Multidisciplinary Team Recommendation
| null | null | null | null |
cs.SI cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to accomplish complex tasks, it is often necessary to compose a team
consisting of experts with diverse competencies. However, for proper
functioning, it is also preferable that a team be socially cohesive. A team
recommendation system, which facilitates the search for potential team members
can be of great help both for (i) individuals who need to seek out
collaborators and (ii) managers who need to build a team for some specific
tasks.
A decision support system which readily helps summarize such metrics, and
possibly rank the teams in a personalized manner according to the end users'
preferences, can be a great tool to navigate what would otherwise be an
information avalanche.
In this work we present a general framework of how to compose such subsystems
together to build a composite team recommendation system, and instantiate it
for a case study of academic teams.
|
[
{
"version": "v1",
"created": "Mon, 4 Mar 2013 09:07:04 GMT"
}
] | 2013-03-05T00:00:00 |
[
[
"Datta",
"Anwitaman",
""
],
[
"Braghin",
"Stefano",
""
],
[
"Yong",
"Jackson Tan Teck",
""
]
] |
new_dataset
| 0.974863 |
1302.6352
|
Roohallah Rastaghi
|
Roohallah Rastaghi
|
URDP: General Framework for Direct CCA2 Security from any Lattice-Based
PKE Scheme
|
arXiv admin note: text overlap with arXiv:1302.0347, arXiv:1211.6984;
and with arXiv:1205.5224 by other authors
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Design efficient lattice-based cryptosystem secure against adaptive chosen
ciphertext attack (IND-CCA2) is a challenge problem. To the date, full
CCA2-security of all proposed lattice-based PKE schemes achieved by using a
generic transformations such as either strongly unforgeable one-time signature
schemes (SU-OT-SS), or a message authentication code (MAC) and weak form of
commitment. The drawback of these schemes is that encryption requires "separate
encryption". Therefore, the resulting encryption scheme is not sufficiently
efficient to be used in practice and it is inappropriate for many applications
such as small ubiquitous computing devices with limited resources such as smart
cards, active RFID tags, wireless sensor networks and other embedded devices.
In this work, for the first time, we introduce an efficient universal random
data padding (URDP) scheme, and show how it can be used to construct a "direct"
CCA2-secure encryption scheme from "any" worst-case hardness problems in
(ideal) lattice in the standard model, resolving a problem that has remained
open till date. This novel approach is a "black-box" construction and leads to
the elimination of separate encryption, as it avoids using general
transformation from CPA-secure scheme to a CCA2-secure one. IND-CCA2 security
of this scheme can be tightly reduced in the standard model to the assumption
that the underlying primitive is an one-way trapdoor function.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 08:22:22 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Mar 2013 19:07:42 GMT"
}
] | 2013-03-04T00:00:00 |
[
[
"Rastaghi",
"Roohallah",
""
]
] |
new_dataset
| 0.995579 |
1303.0213
|
Phillip Lord Dr
|
Phillip Lord
|
The Semantic Web takes Wing: Programming Ontologies with Tawny-OWL
| null | null | null | null |
cs.AI cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
The Tawny-OWL library provides a fully-programmatic environment for ontology
building; it enables the use of a rich set of tools for ontology development,
by recasting development as a form of programming. It is built in Clojure - a
modern Lisp dialect, and is backed by the OWL API. Used simply, it has a
similar syntax to OWL Manchester syntax, but it provides arbitrary
extensibility and abstraction. It builds on existing facilities for Clojure,
which provides a rich and modern programming tool chain, for versioning,
distributed development, build, testing and continuous integration. In this
paper, we describe the library, this environment and the its potential
implications for the ontology development process.
|
[
{
"version": "v1",
"created": "Fri, 1 Mar 2013 16:35:19 GMT"
}
] | 2013-03-04T00:00:00 |
[
[
"Lord",
"Phillip",
""
]
] |
new_dataset
| 0.999264 |
1302.7111
|
Ruggero Pagnan
|
Ruggero Pagnan
|
Syllogisms in Rudimentary Linear Logic, Diagrammatically
| null | null | null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a reading of the traditional syllogistics in a fragment of the
propositional intuitionistic multiplicative linear logic and prove that with
respect to a diagrammatic logical calculus that we introduced in a previous
paper, a syllogism is provable in such a fragment if and only if it is
diagrammatically provable. We extend this result to syllogistics with
complemented terms \`a la De Morgan, with respect to a suitable extension of
the diagrammatic reasoning system for the traditional case and a corresponding
reading of such De Morgan style syllogistics in the previously referred to
fragment of linear logic.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 08:40:40 GMT"
}
] | 2013-03-01T00:00:00 |
[
[
"Pagnan",
"Ruggero",
""
]
] |
new_dataset
| 0.999347 |
1302.7145
|
Farhat Masood
|
Rao Farhat Masood (Member IEEE, MIE (Pak), PEC)
|
Adaptive Modulation (QPSK, QAM)
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, introduced below are the concepts of digital modulation used
in many communication systems today. Techniques described include quadrature
phase shift keying (QPSK) and quadrature amplitude modulation (QAM) and how
these techniques can be used to increase the capacity and speed of a wireless
network. These modulation techniques are the basis of communications for
systems like cable modems, DSL modems, CDMA, 3G, Wi-Fi* (IEEE 802.11) and
WiMAX* (IEEE 802.16).
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 10:46:41 GMT"
}
] | 2013-03-01T00:00:00 |
[
[
"Masood",
"Rao Farhat",
"",
"Member IEEE, MIE"
]
] |
new_dataset
| 0.991681 |
1302.7314
|
Kevin Galloway
|
Kevin Galloway, Koushil Sreenath, Aaron D. Ames and J.W. Grizzle
|
Torque Saturation in Bipedal Robotic Walking through Control Lyapunov
Function Based Quadratic Programs
| null | null | null | null |
cs.SY cs.RO math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel method for directly incorporating user-defined
control input saturations into the calculation of a control Lyapunov function
(CLF)-based walking controller for a biped robot. Previous work by the authors
has demonstrated the effectiveness of CLF controllers for stabilizing periodic
gaits for biped walkers, and the current work expands on those results by
providing a more effective means for handling control saturations. The new
approach, based on a convex optimization routine running at a 1 kHz control
update rate, is useful not only for handling torque saturations but also for
incorporating a whole family of user-defined constraints into the online
computation of a CLF controller. The paper concludes with an experimental
implementation of the main results on the bipedal robot MABEL.
|
[
{
"version": "v1",
"created": "Thu, 28 Feb 2013 20:50:26 GMT"
}
] | 2013-03-01T00:00:00 |
[
[
"Galloway",
"Kevin",
""
],
[
"Sreenath",
"Koushil",
""
],
[
"Ames",
"Aaron D.",
""
],
[
"Grizzle",
"J. W.",
""
]
] |
new_dataset
| 0.983179 |
1302.6666
|
Yan Huang
|
Yan Huang, Ruoming Jin, Favyen Bastani, Xiaoyang Sean Wang
|
Large Scale Real-time Ridesharing with Service Guarantee on Road
Networks
| null | null | null | null |
cs.DS
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The mean occupancy rates of personal vehicle trips in the United States is
only 1.6 persons per vehicle mile. Urban traffic gridlock is a familiar scene.
Ridesharing has the potential to solve many environmental, congestion, and
energy problems. In this paper, we introduce the problem of large scale
real-time ridesharing with service guarantee on road networks. Servers and trip
requests are dynamically matched while waiting time and service time
constraints of trips are satisfied. We first propose two basic algorithms: a
branch-and-bound algorithm and an integer programing algorithm. However, these
algorithm structures do not adapt well to the dynamic nature of the ridesharing
problem. Thus, we then propose a kinetic tree algorithm capable of better
scheduling dynamic requests and adjusting routes on-the-fly. We perform
experiments on a large real taxi dataset from Shanghai. The results show that
the kinetic tree algorithm is faster than other algorithms in response time.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2013 05:41:49 GMT"
}
] | 2013-02-28T00:00:00 |
[
[
"Huang",
"Yan",
""
],
[
"Jin",
"Ruoming",
""
],
[
"Bastani",
"Favyen",
""
],
[
"Wang",
"Xiaoyang Sean",
""
]
] |
new_dataset
| 0.99881 |
1302.6803
|
Didier Dubois
|
Didier Dubois, Luis Farinas del Cerro, Andreas Herzig, Henri Prade
|
An Ordinal View of Independence with Application to Plausible Reasoning
|
Appears in Proceedings of the Tenth Conference on Uncertainty in
Artificial Intelligence (UAI1994)
| null | null |
UAI-P-1994-PG-195-203
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An ordinal view of independence is studied in the framework of possibility
theory. We investigate three possible definitions of dependence, of increasing
strength. One of them is the counterpart to the multiplication law in
probability theory, and the two others are based on the notion of conditional
possibility. These two have enough expressive power to support the whole
possibility theory, and a complete axiomatization is provided for the strongest
one. Moreover we show that weak independence is well-suited to the problems of
belief change and plausible reasoning, especially to address the problem of
blocking of property inheritance in exception-tolerant taxonomic reasoning.
|
[
{
"version": "v1",
"created": "Wed, 27 Feb 2013 14:15:38 GMT"
}
] | 2013-02-28T00:00:00 |
[
[
"Dubois",
"Didier",
""
],
[
"del Cerro",
"Luis Farinas",
""
],
[
"Herzig",
"Andreas",
""
],
[
"Prade",
"Henri",
""
]
] |
new_dataset
| 0.998198 |
1302.6911
|
Oskar Schirmer
|
Oskar Schirmer
|
Using Virtual Addresses with Communication Channels
|
5 pages, 4 figures
| null | null | null |
cs.DC cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While for single processor and SMP machines, memory is the allocatable
quantity, for machines made up of large amounts of parallel computing units,
each with its own local memory, the allocatable quantity is a single computing
unit. Where virtual address management is used to keep memory coherent and
allow allocation of more than physical memory is actually available, virtual
communication channel references can be used to make computing units stay
connected across allocation and swapping.
|
[
{
"version": "v1",
"created": "Mon, 11 Feb 2013 20:34:05 GMT"
}
] | 2013-02-28T00:00:00 |
[
[
"Schirmer",
"Oskar",
""
]
] |
new_dataset
| 0.99868 |
1203.2268
|
Aaron Clauset
|
Winter Mason and Aaron Clauset
|
Friends FTW! Friendship, Collaboration and Competition in Halo: Reach
|
12 pages, 12 figures, 4 tables
|
Proceedings of the 2013 Conference on Computer Supported
Cooperative Work (CSCW '13), 375-386 (2013)
|
10.1145/2441776.2441820
| null |
cs.SI cs.CY cs.HC physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How important are friendships in determining success by individuals and teams
in complex collaborative environments? By combining a novel data set containing
the dynamics of millions of ad hoc teams from the popular multiplayer online
first person shooter Halo: Reach with survey data on player demographics, play
style, psychometrics and friendships derived from an anonymous online survey,
we investigate the impact of friendship on collaborative and competitive
performance. In addition to finding significant differences in player behavior
across these variables, we find that friendships exert a strong influence,
leading to both improved individual and team performance--even after
controlling for the overall expertise of the team--and increased pro-social
behaviors. Players also structure their in-game activities around social
opportunities, and as a result hidden friendship ties can be accurately
inferred directly from behavioral time series. Virtual environments that enable
such friendship effects will thus likely see improved collaboration and
competition.
|
[
{
"version": "v1",
"created": "Sat, 10 Mar 2012 17:31:47 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Feb 2013 03:12:07 GMT"
}
] | 2013-02-27T00:00:00 |
[
[
"Mason",
"Winter",
""
],
[
"Clauset",
"Aaron",
""
]
] |
new_dataset
| 0.970046 |
1302.6267
|
Shams Zawoad
|
Shams Zawoad, Amit Kumar Dutta, Ragib Hasan
|
SecLaaS: Secure Logging-as-a-Service for Cloud Forensics
|
To appear at the 8th ACM Symposium on Information, Computer and
Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%)
| null | null | null |
cs.CR cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing has emerged as a popular computing paradigm in recent years.
However, today's cloud computing architectures often lack support for computer
forensic investigations. Analyzing various logs (e.g., process logs, network
logs) plays a vital role in computer forensics. Unfortunately, collecting logs
from a cloud is very hard given the black-box nature of clouds and the
multi-tenant cloud models, where many users share the same processing and
network resources. Researchers have proposed using log API or cloud management
console to mitigate the challenges of collecting logs from cloud
infrastructure. However, there has been no concrete work, which shows how to
provide cloud logs to investigator while preserving users' privacy and
integrity of the logs. In this paper, we introduce Secure-Logging-as-a-Service
(SecLaaS), which stores virtual machines' logs and provides access to forensic
investigators ensuring the confidentiality of the cloud users. Additionally,
SeclaaS preserves proofs of past log and thus protects the integrity of the
logs from dishonest investigators or cloud providers. Finally, we evaluate the
feasibility of the scheme by implementing SecLaaS for network access logs in
OpenStack - a popular open source cloud platform.
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 22:36:06 GMT"
}
] | 2013-02-27T00:00:00 |
[
[
"Zawoad",
"Shams",
""
],
[
"Dutta",
"Amit Kumar",
""
],
[
"Hasan",
"Ragib",
""
]
] |
new_dataset
| 0.998911 |
1302.6330
|
EPTCS
|
Massimo Bartoletti (Universita' degli Studi di Cagliari), Tiziana
Cimoli (Universita' degli Studi di Cagliari), G. Michele Pinna (Universita'
degli Studi di Cagliari), Roberto Zunino (DISI-Universita' degli Studi di
Trento and COSBI, Italy)
|
An event-based model for contracts
|
In Proceedings PLACES 2012, arXiv:1302.5798
|
EPTCS 109, 2013, pp. 13-20
|
10.4204/EPTCS.109.3
| null |
cs.LO cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a basic model for contracts. Our model extends event structures
with a new relation, which faithfully captures the circular dependencies among
contract clauses. We establish whether an agreement exists which respects all
the contracts at hand (i.e. all the dependencies can be resolved), and we
detect the obligations of each participant. The main technical contribution is
a correspondence between our model and a fragment of the contract logic PCL.
More precisely, we show that the reachable events are exactly those which
correspond to provable atoms in the logic. Despite of this strong
correspondence, our model improves previous work on PCL by exhibiting a
finer-grained notion of culpability, which takes into account the legitimate
orderings of events.
|
[
{
"version": "v1",
"created": "Tue, 26 Feb 2013 06:48:55 GMT"
}
] | 2013-02-27T00:00:00 |
[
[
"Bartoletti",
"Massimo",
"",
"Universita' degli Studi di Cagliari"
],
[
"Cimoli",
"Tiziana",
"",
"Universita' degli Studi di Cagliari"
],
[
"Pinna",
"G. Michele",
"",
"Universita'\n degli Studi di Cagliari"
],
[
"Zunino",
"Roberto",
"",
"DISI-Universita' degli Studi di\n Trento and COSBI, Italy"
]
] |
new_dataset
| 0.95095 |
1109.5416
|
M. H. van Emden
|
M. H. van Emden
|
Matrix Code
|
39 pages, 19 figures; extensions and minor corrections
| null | null |
DCS-341-IR
|
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Matrix Code gives imperative programming a mathematical semantics and
heuristic power comparable in quality to functional and logic programming. A
program in Matrix Code is developed incrementally from a specification in
pre/post-condition form. The computations of a code matrix are characterized by
powers of the matrix when it is interpreted as a transformation in a space of
vectors of logical conditions. Correctness of a code matrix is expressed in
terms of a fixpoint of the transformation. The abstract machine for Matrix Code
is the dual-state machine, which we present as a variant of the classical
finite-state machine.
|
[
{
"version": "v1",
"created": "Sun, 25 Sep 2011 23:31:15 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Oct 2011 00:21:50 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Nov 2011 19:49:50 GMT"
},
{
"version": "v4",
"created": "Mon, 11 Jun 2012 01:42:49 GMT"
},
{
"version": "v5",
"created": "Tue, 17 Jul 2012 00:09:57 GMT"
},
{
"version": "v6",
"created": "Mon, 25 Feb 2013 05:37:09 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"van Emden",
"M. H.",
""
]
] |
new_dataset
| 0.999795 |
1204.4714
|
Joseph Simons
|
Maarten L\"offler, Joe Simons, Darren Strash
|
Dynamic Planar Point Location with Sub-Logarithmic Local Updates
| null | null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study planar point location in a collection of disjoint fat regions, and
investigate the complexity of \emph {local updates}: replacing any region by a
different region that is "similar" to the original region. (i.e., the size
differs by at most a constant factor, and distance between the two regions is a
constant times that size). We show that it is possible to create a linear size
data structure that allows for insertions, deletions, and queries in
logarithmic time, and allows for local updates in sub-logarithmic time on a
pointer machine.
|
[
{
"version": "v1",
"created": "Fri, 20 Apr 2012 19:47:45 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Feb 2013 23:21:09 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Löffler",
"Maarten",
""
],
[
"Simons",
"Joe",
""
],
[
"Strash",
"Darren",
""
]
] |
new_dataset
| 0.992062 |
1208.6268
|
Tanmoy Chakraborty
|
Tanmoy Chakraborty
|
Authorship Identification in Bengali Literature: a Comparative Analysis
|
9 pages, 5 tables, 4 pictures
|
Chakraborty, T., Authorship Identification in Bengali Literature:
a Comparative Analysis, Proceedings of COLING 2012: Demonstration Papers,
December, 2012, pp. 41-50
| null | null |
cs.CL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stylometry is the study of the unique linguistic styles and writing behaviors
of individuals. It belongs to the core task of text categorization like
authorship identification, plagiarism detection etc. Though reasonable number
of studies have been conducted in English language, no major work has been done
so far in Bengali. In this work, We will present a demonstration of authorship
identification of the documents written in Bengali. We adopt a set of
fine-grained stylistic features for the analysis of the text and use them to
develop two different models: statistical similarity model consisting of three
measures and their combination, and machine learning model with Decision Tree,
Neural Network and SVM. Experimental results show that SVM outperforms other
state-of-the-art methods after 10-fold cross validations. We also validate the
relative importance of each stylistic feature to show that some of them remain
consistently significant in every model used in this experiment.
|
[
{
"version": "v1",
"created": "Thu, 30 Aug 2012 19:09:24 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Aug 2012 19:34:18 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Sep 2012 17:08:33 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Feb 2013 09:27:56 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Chakraborty",
"Tanmoy",
""
]
] |
new_dataset
| 0.993548 |
1302.5198
|
Arunasalam Sambhanthan
|
Arunasalam Sambhanthan, Alice Good
|
Implications for Improving Accessibility to E-Commerce Websites in
Developing Countries: A Subjective Study of Sri Lankan Hotel Websites
|
Conference paper. Journal version is arXiv:1302.5491
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This research explores the accessibility issues with regard to the e-commerce
websites in developing countries, through a subjective study of Sri Lankan
hotel websites. A web survey and a web content analysis were conducted as the
methods to elicit data on web accessibility. Factors preventing accessibility
were hypothesized as an initial experiment. Hazardous design elements are
identified through web content analysis, the results of which are utilized to
develop specific implications for improving web accessibility. The hypothesis
tests show that there is no significant correlation between accessibility and
geographical or economic factors. However, physical impairments of users have a
considerable influence on the accessibility. Especially, visual and mobility
impaired users experience poor accessibility. Poor readability and less
navigable page designs are two observable issues, which pose threats to
accessibility. The lack of conformance to W3C accessibility guidelines and the
poor design process are the specific shortcomings which reduce the overall
accessibility. Guidelines aim to improve the accessibility of sites with a
strategic focus. Further enhancements are suggested with adherence to
principles and user centered design and developing customizable web portals
compatible for connections with differing speeds. A need for developing new
design models for differencing user groups and implementing web accessibility
strategy are emphasized as vital steps towards effective information
dissemination via e-commerce websites in the developing countries.
|
[
{
"version": "v1",
"created": "Thu, 21 Feb 2013 06:36:29 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Sambhanthan",
"Arunasalam",
""
],
[
"Good",
"Alice",
""
]
] |
new_dataset
| 0.993991 |
1302.5491
|
Arunasalam Sambhanthan
|
Arunasalam Sambhanthan, Alice Good
|
Implications for Improving Accessibility to E-Commerce Websites in
Developing Countries - A Study of Hotel Websites
|
Journal article. conference version is arXiv:1302.5198
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This research explores the accessibility issues with regard to the e-commerce
websites in developing countries, through a study of Sri Lankan hotel websites.
A web survey and a web content analysis were conducted as the methods to elicit
data on web accessibility. Factors preventing accessibility were hypothesized
as an initial experiment. Affecting design elements are identified through web
content analysis, the results of which are utilized to develop specific
implications for improving web accessibility. The hypothesis tests show that
there is no significant correlation between accessibility and geographical or
economic factors. However, physical impairments of users have a considerable
influence on the accessibility of web page user interface if it has been
designed without full consideration of the needs of all users. Especially,
visual and mobility impaired users experience poor accessibility. Poor
readability and less navigable page designs are two observable issues, which
pose threats to accessibility. The lack of conformance to W3C accessibility
guidelines and the poor design process are the specific shortcomings which
reduce the overall accessibility. Guidelines aim to improve the accessibility
of sites with a strategic focus. Further enhancements are suggested with
adherence to principles, user centered design and developing customizable web
portals compatible for connections with differing speeds. Re-ordering search
results has been suggested as one of the finest step towards making the web
content accessible for users with differing needs. A need for developing new
design models for differencing user groups and implementing web accessibility
strategy are emphasized as vital steps towards effective information
dissemination via e-commerce websites in the developing countries.
|
[
{
"version": "v1",
"created": "Fri, 22 Feb 2013 06:15:44 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Sambhanthan",
"Arunasalam",
""
],
[
"Good",
"Alice",
""
]
] |
new_dataset
| 0.973557 |
1302.5894
|
Sonya Eini
|
Sonya Eini and Abdolah Chalechale
|
Four Side Distance: A New Fourier Shape Signature
|
6 pages, 7 figures, International Journal of Advanced Studies in
Computers, Science and Engineering
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Shape is one of the main features in content based image retrieval (CBIR).
This paper proposes a new shape signature. In this technique, features of each
shape are extracted based on four sides of the rectangle that covers the shape.
The proposed technique is Fourier based and it is invariant to translation,
scaling and rotation. The retrieval performance between some commonly used
Fourier based signatures and the proposed four sides distance (FSD) signature
has been tested using MPEG-7 database. Experimental results are shown that the
FSD signature has better performance compared with those signatures.
|
[
{
"version": "v1",
"created": "Sun, 24 Feb 2013 10:49:39 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Eini",
"Sonya",
""
],
[
"Chalechale",
"Abdolah",
""
]
] |
new_dataset
| 0.953407 |
1302.5985
|
Xiaodi Hou
|
Xiaodi Hou and Alan Yuille and Christof Koch
|
A Meta-Theory of Boundary Detection Benchmarks
|
NIPS 2012 Workshop on Human Computation for Science and Computational
Sustainability
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human labeled datasets, along with their corresponding evaluation algorithms,
play an important role in boundary detection. We here present a psychophysical
experiment that addresses the reliability of such benchmarks. To find better
remedies to evaluate the performance of any boundary detection algorithm, we
propose a computational framework to remove inappropriate human labels and
estimate the intrinsic properties of boundaries.
|
[
{
"version": "v1",
"created": "Mon, 25 Feb 2013 03:12:12 GMT"
}
] | 2013-02-26T00:00:00 |
[
[
"Hou",
"Xiaodi",
""
],
[
"Yuille",
"Alan",
""
],
[
"Koch",
"Christof",
""
]
] |
new_dataset
| 0.998529 |
1302.5502
|
Srimugunthan Dhandapani
|
Srimugunthan, K. Gopinath, Giridhar Appaji Nag Yasa
|
LFTL: A multi-threaded FTL for a Parallel IO Flash Card under Linux
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New PCI-e flash cards and SSDs supporting over 100,000 IOPs are now
available, with several usecases in the design of a high performance storage
system. By using an array of flash chips, arranged in multiple banks, large
capacities are achieved. Such multi-banked architecture allow parallel read,
write and erase operations. In a raw PCI-e flash card, such parallelism is
directly available to the software layer. In addition, the devices have
restrictions such as, pages within a block can only be written sequentially.
The devices also have larger minimum write sizes (greater than 4KB). Current
flash translation layers (FTLs) in Linux are not well suited for such devices
due to the high device speeds, architectural restrictions as well as other
factors such as high lock contention. We present a FTL for Linux that takes
into account the hardware restrictions, that also exploits the parallelism to
achieve high speeds. We also consider leveraging the parallelism for garbage
collection by scheduling the garbage collection activities on idle banks. We
propose and evaluate an adaptive method to vary the amount of garbage
collection according to the current I/O load on the device.
|
[
{
"version": "v1",
"created": "Fri, 22 Feb 2013 07:32:48 GMT"
}
] | 2013-02-25T00:00:00 |
[
[
"Srimugunthan",
"",
""
],
[
"Gopinath",
"K.",
""
],
[
"Yasa",
"Giridhar Appaji Nag",
""
]
] |
new_dataset
| 0.999636 |
1302.5611
|
Dennis Luxen
|
Julian Arz, Dennis Luxen, Peter Sanders
|
Transit Node Routing Reconsidered
|
19 pages, submitted to SEA'2013
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transit Node Routing (TNR) is a fast and exact distance oracle for road
networks. We show several new results for TNR. First, we give a surprisingly
simple implementation fully based on Contraction Hierarchies that speeds up
preprocessing by an order of magnitude approaching the time for just finding a
CH (which alone has two orders of magnitude larger query time). We also develop
a very effective purely graph theoretical locality filter without any
compromise in query times. Finally, we show that a specialization to the online
many-to-one (or one-to-many) shortest path further speeds up query time by an
order of magnitude. This variant even has better query time than the fastest
known previous methods which need much more space.
|
[
{
"version": "v1",
"created": "Fri, 22 Feb 2013 14:43:06 GMT"
}
] | 2013-02-25T00:00:00 |
[
[
"Arz",
"Julian",
""
],
[
"Luxen",
"Dennis",
""
],
[
"Sanders",
"Peter",
""
]
] |
new_dataset
| 0.999563 |
1302.5657
|
Bernat Gaston
|
Bernat Gast\'on, Jaume Pujol, Merc\`e Villanueva
|
A realistic distributed storage system: the rack model
|
Submitted to IEEE Transactions on Information Theory. arXiv admin
note: text overlap with arXiv:1301.1549
| null | null | null |
cs.IT cs.DC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a realistic distributed storage environment, storage nodes are usually
placed in racks, a metallic support designed to accommodate electronic
equipment. It is known that the communication (bandwidth) cost between nodes
which are in the same rack is much lower than between nodes which are in
different racks.
In this paper, a new model, where the storage nodes are placed in two racks,
is proposed and analyzed. Moreover, the two-rack model is generalized to any
number of racks. In this model, the storage nodes have different repair costs
depending on the rack where they are placed. A threshold function, which
minimizes the amount of stored data per node and the bandwidth needed to
regenerate a failed node, is shown. This threshold function generalizes the
ones given for previous distributed storage models. The tradeoff curve obtained
from this threshold function is compared with the ones obtained from the
previous models, and it is shown that this new model outperforms the previous
ones in terms of repair cost.
|
[
{
"version": "v1",
"created": "Fri, 22 Feb 2013 17:35:50 GMT"
}
] | 2013-02-25T00:00:00 |
[
[
"Gastón",
"Bernat",
""
],
[
"Pujol",
"Jaume",
""
],
[
"Villanueva",
"Mercè",
""
]
] |
new_dataset
| 0.992842 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.