id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1209.4504
Xiaomin Chen
Xiaomin Chen and Douglas Leith
Frames in Outdoor 802.11 WLANs Provide a Hybrid Binary-Symmetric/Packet-Erasure Channel
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Corrupted frames with CRC errors potentially provide a useful channel through which we can transmit information. Using measurements taken in an outdoor environment, we demonstrate that for 802.11 wireless links the channel provided by corrupted frames alone (i.e. ignoring frames with PHY errors and frames received correctly) can be accurately modelled as a binary symmetric channel (BSC) provided appropriate pre- and post- processing is carried out. Also, the channel provided by corrupted frames and other frames combined can be accurately modelled as a hybrid binary symmetric/packet erasure channel. Importantly, we find that this hybrid channel offers capacity increases of more than 100% compared to a conventional packet erasure channel over a wide range of RSSIs. This is a striking observation as it indicates that the potential exists for significant network throughput gains if the information contained in 802.11 corrupted packets is exploited.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 12:12:23 GMT" }, { "version": "v2", "created": "Wed, 5 Dec 2012 15:48:52 GMT" } ]
2012-12-06T00:00:00
[ [ "Chen", "Xiaomin", "" ], [ "Leith", "Douglas", "" ] ]
new_dataset
0.991751
1212.0992
Aydogan Ozcan
Sam Mavandadi, Steve Feng, Frank Yu, Richard Yu and Aydogan Ozcan
BigFoot: Analysis, monitoring, tracking and sharing of bio-medical features of human appendages using consumer-grade home and office based imaging devices
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Here we describe a system for personal and professional management and analysis of bio-medical images captured using off-the-shelf, consumer-grade imaging devices such as scanners, digital cameras, cellphones, webcams and tablet PCs. Specifically, we describe an implementation of this system for the analysis, monitoring and tracking of conditions and features of human feet using a flatbed scanner as the image capture device and a custom-designed set of algorithms and software to manage and analyze the acquired data.
[ { "version": "v1", "created": "Wed, 5 Dec 2012 10:53:20 GMT" } ]
2012-12-06T00:00:00
[ [ "Mavandadi", "Sam", "" ], [ "Feng", "Steve", "" ], [ "Yu", "Frank", "" ], [ "Yu", "Richard", "" ], [ "Ozcan", "Aydogan", "" ] ]
new_dataset
0.998823
1106.6196
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
On the behaviours produced by instruction sequences under execution
36 pages, consolidates material from arXiv:0811.0436 [cs.PL], arXiv:0902.2859 [cs.PL], and arXiv:0905.2257 [cs.PL]; abstract and introduction rewritten, examples and proofs added
Fundamenta Informaticae, 120(2):111--144, 2012
10.3233/FI-2012-753
null
cs.PL cs.DC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study several aspects of the behaviours produced by instruction sequences under execution in the setting of the algebraic theory of processes known as ACP. We use ACP to describe the behaviours produced by instruction sequences under execution and to describe two protocols implementing these behaviours in the case where the processing of instructions takes place remotely. We also show that all finite-state behaviours considered in ACP can be produced by instruction sequences under execution.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 11:51:25 GMT" }, { "version": "v2", "created": "Mon, 11 Jun 2012 07:11:09 GMT" } ]
2012-12-05T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
new_dataset
0.974018
1212.0804
Tamara Mchedlidze David
Emilio Di Giacomo and Giuseppe Liotta and Tamara Mchedlidze
How many vertex locations can be arbitrarily chosen when drawing planar graphs?
null
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is proven that every set $S$ of distinct points in the plane with cardinality $\lceil \frac{\sqrt{\log_2 n}-1}{4} \rceil$ can be a subset of the vertices of a crossing-free straight-line drawing of any planar graph with $n$ vertices. It is also proven that if $S$ is restricted to be a one-sided convex point set, its cardinality increases to $\lceil \sqrt[3]{n} \rceil$. The proofs are constructive and give rise to O(n)-time drawing algorithms. As a part of our proofs, we show that every maximal planar graph contains a large induced biconnected outerplanar graphs and a large induced outerpath (an outerplanar graph whose weak dual is a path).
[ { "version": "v1", "created": "Tue, 4 Dec 2012 17:33:45 GMT" } ]
2012-12-05T00:00:00
[ [ "Di Giacomo", "Emilio", "" ], [ "Liotta", "Giuseppe", "" ], [ "Mchedlidze", "Tamara", "" ] ]
new_dataset
0.967356
1212.0819
Evgeny Shchepin
Evgeny Shchepin
A Topological Code for Plane Images
null
null
null
null
cs.CV math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is proposed a new code for contours of plane images. This code was applied for optical character recognition of printed and handwritten characters. One can apply it to recognition of any visual images.
[ { "version": "v1", "created": "Tue, 4 Dec 2012 18:39:14 GMT" } ]
2012-12-05T00:00:00
[ [ "Shchepin", "Evgeny", "" ] ]
new_dataset
0.999634
1211.1572
Jarek Duda dr
Jarek Duda
Embedding grayscale halftone pictures in QR Codes using Correction Trees
16 pages, 6 figures
null
null
null
cs.IT cs.CR cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Barcodes like QR Codes have made that encoded messages have entered our everyday life, what suggests to attach them a second layer of information: directly available to human receiver for informational or marketing purposes. We will discuss a general problem of using codes with chosen statistical constrains, for example reproducing given grayscale picture using halftone technique. If both sender and receiver know these constrains, the optimal capacity can be easily approached by entropy coder. The problem is that this time only the sender knows them - we will refer to these scenarios as constrained coding. Kuznetsov and Tsybakov problem in which only the sender knows which bits are fixed can be seen as a special case, surprisingly approaching the same capacity as if both sides would know the constrains. We will analyze Correction Trees to approach analogous capacity in the general case - use weaker: statistical constrains, what allows to apply them to all bits. Finding satisfying coding is similar to finding the proper correction in error correction problem, but instead of single ensured possibility, there are now statistically expected some. While in standard steganography we hide information in the least important bits, this time we create codes resembling given picture - hide information in the freedom of realizing grayness by black and white pixels using halftone technique. We will also discuss combining with error correction and application to rate distortion problem.
[ { "version": "v1", "created": "Wed, 7 Nov 2012 15:19:23 GMT" }, { "version": "v2", "created": "Fri, 23 Nov 2012 08:59:33 GMT" }, { "version": "v3", "created": "Sun, 2 Dec 2012 08:44:38 GMT" } ]
2012-12-04T00:00:00
[ [ "Duda", "Jarek", "" ] ]
new_dataset
0.988699
1211.4976
Benjamin Varcoe
Benjamin T. H. Varcoe
Channel Independent Cryptographic Key Distribution
7 Pages, 5 Figures, Submitted to IEEE Transactions on Information Theory, Corrected typo in eqn 6
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method of cryptographic key distribution using an `artificially' noisy channel. This is an important development because, while it is known that a noisy channel can be used to generate unconditional secrecy, there are many circumstances in which it is not possible to have a noisy information exchange, such as in error corrected communication stacks. It is shown that two legitimate parties can simulate a noisy channel by adding local noise onto the communication and that the simulated channel has a secrecy capacity even if the underlying channel does not. A derivation of the secrecy conditions is presented along with numerical simulations of the channel function to show that key exchange is feasible.
[ { "version": "v1", "created": "Wed, 21 Nov 2012 09:33:12 GMT" }, { "version": "v2", "created": "Mon, 3 Dec 2012 16:29:29 GMT" } ]
2012-12-04T00:00:00
[ [ "Varcoe", "Benjamin T. H.", "" ] ]
new_dataset
0.992669
1212.0094
Samuel Blake T
Samuel T. Blake, Andrew Z. Tirkel
A Construction for Periodic ZCZ Sequences
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a construction for periodic zero correlation zone (ZCZ) sequences over roots of unity. The sequences share similarities to the perfect periodic sequence constructions of Liu, Frank, and Milewski. The sequences have two non-zero off-peak autocorrelation values which asymptotically approach $\pm 2 \pi$, so the sequences are asymptotically perfect.
[ { "version": "v1", "created": "Sat, 1 Dec 2012 11:13:43 GMT" } ]
2012-12-04T00:00:00
[ [ "Blake", "Samuel T.", "" ], [ "Tirkel", "Andrew Z.", "" ] ]
new_dataset
0.998427
1212.0134
Ankit Chaudhary
J.L.Raheja, Karen Das, Ankit Chaudhary
Fingertip Detection: A Fast Method with Natural Hand
null
International Journal of Embedded Systems and Computer Engineering, 2011
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many vision based applications have used fingertips to track or manipulate gestures in their applications. Gesture identification is a natural way to pass the signals to the machine, as the human express its feelings most of the time with hand expressions. Here a novel time efficient algorithm has been described for fingertip detection. This method is invariant to hand direction and in preprocessing it cuts only hand part from the full image, hence further computation would be much faster than processing full image. Binary silhouette of the input image is generated using HSV color space based skin filter and hand cropping done based on intensity histogram of the hand image
[ { "version": "v1", "created": "Sat, 1 Dec 2012 16:59:07 GMT" } ]
2012-12-04T00:00:00
[ [ "Raheja", "J. L.", "" ], [ "Das", "Karen", "" ], [ "Chaudhary", "Ankit", "" ] ]
new_dataset
0.991124
1212.0167
Yuantao Gu
Zhaoqun Chen, Pengfei Liu, Xiaohan Wang, and Yuantao Gu
Follow Whom? Chinese Users Have Different Choice
9 pages, 13 figures
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sina Weibo, which was launched in 2009, is the most popular Chinese micro-blogging service. It has been reported that Sina Weibo has more than 400 million registered users by the end of the third quarter in 2012. Sina Weibo and Twitter have a lot in common, however, in terms of the following preference, Sina Weibo users, most of whom are Chinese, behave differently compared with those of Twitter. This work is based on a data set of Sina Weibo which contains 80.8 million users' profiles and 7.2 billion relations and a large data set of Twitter. Firstly some basic features of Sina Weibo and Twitter are analyzed such as degree and activeness distribution, correlation between degree and activeness, and the degree of separation. Then the following preference is investigated by studying the assortative mixing, friend similarities, following distribution, edge balance ratio, and ranking correlation, where edge balance ratio is newly proposed to measure balance property of graphs. It is found that Sina Weibo has a lower reciprocity rate, more positive balanced relations and is more disassortative. Coinciding with Asian traditional culture, the following preference of Sina Weibo users is more concentrated and hierarchical: they are more likely to follow people at higher or the same social levels and less likely to follow people lower than themselves. In contrast, the same kind of following preference is weaker in Twitter. Twitter users are open as they follow people from levels, which accords with its global characteristic and the prevalence of western civilization. The message forwarding behavior is studied by displaying the propagation levels, delays, and critical users. The following preference derives from not only the usage habits but also underlying reasons such as personalities and social moralities that is worthy of future research.
[ { "version": "v1", "created": "Sat, 1 Dec 2012 23:05:49 GMT" } ]
2012-12-04T00:00:00
[ [ "Chen", "Zhaoqun", "" ], [ "Liu", "Pengfei", "" ], [ "Wang", "Xiaohan", "" ], [ "Gu", "Yuantao", "" ] ]
new_dataset
0.994176
1212.0253
Emmanuel Polonowski
Emmanuel Polonowski
DBGen User Manual
null
null
null
TR--LACL--2012--4
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DBGen is a tool for Coq developers. It takes as input the definition of a term structure with bindings annotations and generates definitions and properties for lifting and substitution in the De Bruijn setting, up to the substitution lemma. It provides also a named syntax and a translation function to the De Bruijn syntax.
[ { "version": "v1", "created": "Sun, 2 Dec 2012 22:28:14 GMT" } ]
2012-12-04T00:00:00
[ [ "Polonowski", "Emmanuel", "" ] ]
new_dataset
0.988236
1212.0383
Asha V
V. Asha, N. U. Bhajantri, P. Nagabhushan
GLCM-based chi-square histogram distance for automatic detection of defects on patterned textures
IJCVR, Vol. 2, No. 4, 2011, pp. 302-313
IJCVR, Vol. 2, No. 4, 2011, pp. 302-313
10.1504/IJCVR.2011.045267
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chi-square histogram distance is one of the distance measures that can be used to find dissimilarity between two histograms. Motivated by the fact that texture discrimination by human vision system is based on second-order statistics, we make use of histogram of gray-level co-occurrence matrix (GLCM) that is based on second-order statistics and propose a new machine vision algorithm for automatic defect detection on patterned textures. Input defective images are split into several periodic blocks and GLCMs are computed after quantizing the gray levels from 0-255 to 0-63 to keep the size of GLCM compact and to reduce computation time. Dissimilarity matrix derived from chi-square distances of the GLCMs is subjected to hierarchical clustering to automatically identify defective and defect-free blocks. Effectiveness of the proposed method is demonstrated through experiments on defective real-fabric images of 2 major wallpaper groups (pmm and p4m groups).
[ { "version": "v1", "created": "Mon, 3 Dec 2012 13:40:41 GMT" } ]
2012-12-04T00:00:00
[ [ "Asha", "V.", "" ], [ "Bhajantri", "N. U.", "" ], [ "Nagabhushan", "P.", "" ] ]
new_dataset
0.999296
1212.0402
Khurram Soomro
Khurram Soomro, Amir Roshan Zamir and Mubarak Shah
UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild
null
null
null
CRCV-TR-12-01
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce UCF101 which is currently the largest dataset of human actions. It consists of 101 action classes, over 13k clips and 27 hours of video data. The database consists of realistic user uploaded videos containing camera motion and cluttered background. Additionally, we provide baseline action recognition results on this new dataset using standard bag of words approach with overall performance of 44.5%. To the best of our knowledge, UCF101 is currently the most challenging dataset of actions due to its large number of classes, large number of clips and also unconstrained nature of such clips.
[ { "version": "v1", "created": "Mon, 3 Dec 2012 14:45:31 GMT" } ]
2012-12-04T00:00:00
[ [ "Soomro", "Khurram", "" ], [ "Zamir", "Amir Roshan", "" ], [ "Shah", "Mubarak", "" ] ]
new_dataset
0.999745
1212.0433
Laurent Jacques
Prasad Sudhakar, Laurent Jacques, Xavier Dubois, Philippe Antoine, Luc Joannes
Compressive Schlieren Deflectometry
9 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Schlieren deflectometry aims at characterizing the deflections undergone by refracted incident light rays at any surface point of a transparent object. For smooth surfaces, each surface location is actually associated with a sparse deflection map (or spectrum). This paper presents a novel method to compressively acquire and reconstruct such spectra. This is achieved by altering the way deflection information is captured in a common Schlieren Deflectometer, i.e., the deflection spectra are indirectly observed by the principle of spread spectrum compressed sensing. These observations are realized optically using a 2-D Spatial Light Modulator (SLM) adjusted to the corresponding sensing basis and whose modulations encode the light deviation subsequently recorded by a CCD camera. The efficiency of this approach is demonstrated experimentally on the observation of few test objects. Further, using a simple parametrization of the deflection spectra we show that relevant key parameters can be directly computed using the measurements, avoiding full reconstruction.
[ { "version": "v1", "created": "Mon, 3 Dec 2012 16:21:07 GMT" } ]
2012-12-04T00:00:00
[ [ "Sudhakar", "Prasad", "" ], [ "Jacques", "Laurent", "" ], [ "Dubois", "Xavier", "" ], [ "Antoine", "Philippe", "" ], [ "Joannes", "Luc", "" ] ]
new_dataset
0.998962
1209.4978
Yanfang Liu
Yanfang Liu and William Zhu
Covering matroid
15 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new type of matroids, namely covering matroids, and investigate the connections with the second type of covering-based rough sets and some existing special matroids. Firstly, as an extension of partitions, coverings are more natural combinatorial objects and can sometimes be more efficient to deal with problems in the real world. Through extending partitions to coverings, we propose a new type of matroids called covering matroids and prove them to be an extension of partition matroids. Secondly, since some researchers have successfully applied partition matroids to classical rough sets, we study the relationships between covering matroids and covering-based rough sets which are an extension of classical rough sets. Thirdly, in matroid theory, there are many special matroids, such as transversal matroids, partition matroids, 2-circuit matroid and partition-circuit matroids. The relationships among several special matroids and covering matroids are studied.
[ { "version": "v1", "created": "Sat, 22 Sep 2012 09:34:10 GMT" }, { "version": "v2", "created": "Fri, 30 Nov 2012 02:42:55 GMT" } ]
2012-12-03T00:00:00
[ [ "Liu", "Yanfang", "" ], [ "Zhu", "William", "" ] ]
new_dataset
0.998163
1211.7161
Michael Soltys
Sam Buss, Michael Soltys
Unshuffling a Square is NP-Hard
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A shuffle of two strings is formed by interleaving the characters into a new string, keeping the characters of each string in order. A string is a square if it is a shuffle of two identical strings. There is a known polynomial time dynamic programming algorithm to determine if a given string z is the shuffle of two given strings x,y; however, it has been an open question whether there is a polynomial time algorithm to determine if a given string z is a square. We resolve this by proving that this problem is NP-complete via a many-one reduction from 3- Partition.
[ { "version": "v1", "created": "Fri, 30 Nov 2012 06:14:06 GMT" } ]
2012-12-03T00:00:00
[ [ "Buss", "Sam", "" ], [ "Soltys", "Michael", "" ] ]
new_dataset
0.999619
1211.7326
Guenda Kenza
Kenza Guenda and T. Aaron Gulliver
Repeated Root Constacyclic Codes of Length $mp^s$ over $\mathbb{F}_{p^r}+u \mathbb{F}_{p^r}+...+ u^{e-1}\mathbb{F}_{p^r}$
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
We give the structure of $\lambda$-constacyclic codes of length $p^sm$ over $R=\mathbb{F}_{p^r}+u \mathbb{F}_{p^r}+...+ u^{e-1}\mathbb{F}_{p^r}$ with $\lambda \in \F_{p^r}^*$. We also give the structure of $\lambda$-constacyclic codes of length $p^sm$ with $\lambda=\alpha_1+u\alpha_2+...+u^{e-1} \alpha_{e-1}$, where $\alpha_1,\alpha_2 \neq 0$ and study the self-duality of these codes.
[ { "version": "v1", "created": "Fri, 30 Nov 2012 17:52:30 GMT" } ]
2012-12-03T00:00:00
[ [ "Guenda", "Kenza", "" ], [ "Gulliver", "T. Aaron", "" ] ]
new_dataset
0.999225
1211.7356
Debashis Dash
Sai Shankar N. and Debashis Dash and Hassan El Madi and Guru Gopalakrishnan
WiGig and IEEE 802.11ad - For multi-gigabyte-per-second WPAN and WLAN
24 pages, 18 figures. Submitted to ZTE Communications 2012
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Wireless Gigabit Alliance (WiGig) and IEEE 802.11ad are developing a multigigabit wireless personal and local area network (WPAN/WLAN) specification in the 60 GHz millimeter wave band. Chipset manufacturers, original equipment manufacturers (OEMs), and telecom companies are also assisting in this development. 60 GHz millimeter wave transmission will scale the speed of WLANs and WPANs to 6.75 Gbit/s over distances less than 10 meters. This technology is the first of its kind and will eliminate the need for cable around personal computers, docking stations, and other consumer electronic devices. High-definition multimedia interface (HDMI), display port, USB 3.0, and peripheral component interconnect express (PCIe) 3.0 cables will all be eliminated. Fast downloads and uploads, wireless sync, and multi-gigabit-per-second WLANs will be possible over shorter distances. 60 GHz millimeter wave supports fast session transfer (FST) protocol, which makes it backward compatible with 5 GHz or 2.4 GHz WLAN so that end users experience the same range as in today's WLANs. IEEE 802.11ad specifies the physical (PHY) sublayer and medium access control (MAC) sublayer of the protocol stack. The MAC protocol is based on time-division multiple access (TDMA), and the PHY layer uses single carrier (SC) and orthogonal frequency division multiplexing (OFDM) to simultaneously enable low-power, high-performance applications.
[ { "version": "v1", "created": "Fri, 30 Nov 2012 19:54:07 GMT" } ]
2012-12-03T00:00:00
[ [ "N.", "Sai Shankar", "" ], [ "Dash", "Debashis", "" ], [ "Madi", "Hassan El", "" ], [ "Gopalakrishnan", "Guru", "" ] ]
new_dataset
0.99907
1207.7139
Nicolas Christin
Nicolas Christin
Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace
26 pages, 13 figures, 4 tables; changes to v1 include revised sales volume and commission estimates (Sec. 5) and slightly expanded discussion
null
null
CMU-Cylab-12-018
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2011 and 2012, including daily crawls of the marketplace for nearly six months in 2012. We obtain a detailed picture of the type of goods being sold on Silk Road, and of the revenues made both by sellers and Silk Road operators. Through examining over 24,400 separate items sold on the site, we show that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks. The majority of sellers disappears within roughly three months of their arrival, but a core of 112 sellers has been present throughout our measurement interval. We evaluate the total revenue made by all sellers, from public listings, to slightly over USD 1.2 million per month; this corresponds to about USD 92,000 per month in commissions for the Silk Road operators. We further show that the marketplace has been operating steadily, with daily sales and number of sellers overall increasing over our measurement interval. We discuss economic and policy implications of our analysis and results, including ethical considerations for future research in this area.
[ { "version": "v1", "created": "Tue, 31 Jul 2012 00:21:48 GMT" }, { "version": "v2", "created": "Wed, 28 Nov 2012 23:01:33 GMT" } ]
2012-11-30T00:00:00
[ [ "Christin", "Nicolas", "" ] ]
new_dataset
0.999102
1209.5456
Yanfang Liu
Yanfang Liu and William Zhu
Relation matroid and its relationship with generalized rough set based on relation
15 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the relationship between matroids and generalized rough sets based on relations has been studied from the viewpoint of linear independence of matrices. In this paper, we reveal more relationships by the predecessor and successor neighborhoods from relations. First, through these two neighborhoods, we propose a pair of matroids, namely predecessor relation matroid and successor relation matroid, respectively. Basic characteristics of this pair of matroids, such as dependent sets, circuits, the rank function and the closure operator, are described by the predecessor and successor neighborhoods from relations. Second, we induce a relation from a matroid through the circuits of the matroid. We prove that the induced relation is always an equivalence relation. With these two inductions, a relation induces a relation matroid, and the relation matroid induces an equivalence relation, then the connection between the original relation and the induced equivalence relation is studied. Moreover, the relationships between the upper approximation operator in generalized rough sets and the closure operator in matroids are investigated.
[ { "version": "v1", "created": "Mon, 24 Sep 2012 23:42:09 GMT" }, { "version": "v2", "created": "Thu, 29 Nov 2012 10:43:02 GMT" } ]
2012-11-30T00:00:00
[ [ "Liu", "Yanfang", "" ], [ "Zhu", "William", "" ] ]
new_dataset
0.9984
1211.6781
Grenville croll
Jerzy Tyszkiewicz, Dermot Balson
User Defined Spreadsheet Functions in Excel
11 Pages, 9 B&W & Colour Figures
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Creating user defined functions (UDFs) is a powerful method to improve the quality of computer applications, in particular spreadsheets. However, the only direct way to use UDFs in spreadsheets is to switch from the functional and declarative style of spreadsheet formulas to the imperative VBA, which creates a high entry barrier even for proficient spreadsheet users. It has been proposed to extend Excel by UDFs declared by a spreadsheet: user defined spreadsheet functions (UDSFs). In this paper we present a method to create a limited form of UDSFs in Excel without any use of VBA. Calls to those UDSFs utilize what-if data tables to execute the same part of a worksheet several times, thus turning it into a reusable function definition.
[ { "version": "v1", "created": "Wed, 28 Nov 2012 23:25:12 GMT" } ]
2012-11-30T00:00:00
[ [ "Tyszkiewicz", "Jerzy", "" ], [ "Balson", "Dermot", "" ] ]
new_dataset
0.998298
1108.1464
Claudio Pacchierotti
Domenico Prattichizzo, Claudio Pacchierotti, Giulio Rosati
Cutaneous Force Feedback as a Sensory Subtraction Technique in Haptics
null
D. Prattichizzo, C. Pacchierotti, G. Rosati. Cutaneous force feedback as a sensory subtraction technique in haptics. IEEE Transactions on Haptics, 5(4):289-300, 2012
10.1109/TOH.2012.15
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel sensory substitution technique is presented. Kinesthetic and cutaneous force feedback are substituted by cutaneous feedback (CF) only, provided by two wearable devices able to apply forces to the index finger and the thumb, while holding a handle during a teleoperation task. The force pattern, fed back to the user while using the cutaneous devices, is similar, in terms of intensity and area of application, to the cutaneous force pattern applied to the finger pad while interacting with a haptic device providing both cutaneous and kinesthetic force feedback. The pattern generated using the cutaneous devices can be thought as a subtraction between the complete haptic feedback (HF) and the kinesthetic part of it. For this reason, we refer to this approach as sensory subtraction instead of sensory substitution. A needle insertion scenario is considered to validate the approach. The haptic device is connected to a virtual environment simulating a needle insertion task. Experiments show that the perception of inserting a needle using the cutaneous-only force feedback is nearly indistinguishable from the one felt by the user while using both cutaneous and kinesthetic feedback. As most of the sensory substitution approaches, the proposed sensory subtraction technique also has the advantage of not suffering from stability issues of teleoperation systems due, for instance, to communication delays. Moreover, experiments show that the sensory subtraction technique outperforms sensory substitution with more conventional visual feedback (VF).
[ { "version": "v1", "created": "Sat, 6 Aug 2011 08:37:25 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2012 16:54:14 GMT" }, { "version": "v3", "created": "Tue, 27 Nov 2012 17:38:24 GMT" } ]
2012-11-28T00:00:00
[ [ "Prattichizzo", "Domenico", "" ], [ "Pacchierotti", "Claudio", "" ], [ "Rosati", "Giulio", "" ] ]
new_dataset
0.972925
1211.6039
Giovanni Viglietta
Giovanni Viglietta
Rendezvous of two robots with visible bits
18 pages, 4 figures
null
null
null
cs.MA cs.CG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the rendezvous problem for two robots moving in the plane (or on a line). Robots are autonomous, anonymous, oblivious, and carry colored lights that are visible to both. We consider deterministic distributed algorithms in which robots do not use distance information, but try to reduce (or increase) their distance by a constant factor, depending on their lights' colors. We give a complete characterization of the number of colors that are necessary to solve the rendezvous problem in every possible model, ranging from fully synchronous to semi-synchronous to asynchronous, rigid and non-rigid, with preset or arbitrary initial configuration. In particular, we show that three colors are sufficient in the non-rigid asynchronous model with arbitrary initial configuration. In contrast, two colors are insufficient in the rigid asynchronous model with arbitrary initial configuration and in the non-rigid asynchronous model with preset initial configuration. Additionally, if the robots are able to distinguish between zero and non-zero distances, we show how they can solve rendezvous and detect termination using only three colors, even in the non-rigid asynchronous model with arbitrary initial configuration.
[ { "version": "v1", "created": "Mon, 26 Nov 2012 17:55:01 GMT" }, { "version": "v2", "created": "Tue, 27 Nov 2012 05:15:55 GMT" } ]
2012-11-28T00:00:00
[ [ "Viglietta", "Giovanni", "" ] ]
new_dataset
0.997947
1211.6191
EPTCS
Tatiana Mangels, Jan Peleska
CTGEN - a Unit Test Generator for C
In Proceedings SSV 2012, arXiv:1211.5873
EPTCS 102, 2012, pp. 88-102
10.4204/EPTCS.102.9
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new unit test generator for C code, CTGEN. It generates test data for C1 structural coverage and functional coverage based on pre-/post-condition specifications or internal assertions. The generator supports automated stub generation, and data to be returned by the stub to the unit under test (UUT) may be specified by means of constraints. The typical application field for CTGEN is embedded systems testing; therefore the tool can cope with the typical aliasing problems present in low-level C, including pointer arithmetics, structures and unions. CTGEN creates complete test procedures which are ready to be compiled and run against the UUT. In this paper we describe the main features of CTGEN, their technical realisation, and we elaborate on its performance in comparison to a list of competing test generation tools. Since 2011, CTGEN is used in industrial scale test campaigns for embedded systems code in the automotive domain.
[ { "version": "v1", "created": "Tue, 27 Nov 2012 02:36:52 GMT" } ]
2012-11-28T00:00:00
[ [ "Mangels", "Tatiana", "" ], [ "Peleska", "Jan", "" ] ]
new_dataset
0.959047
1211.6279
Hasan Tavakoli
H. Tavakoli, M. Ahmadian, M. Reza Peyghami
Optimal Rate Irregular LDPC Codes in Binary Erasure Channel
published in IET Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design the optimal rate capacity approaching irregular Low-Density Parity-Check code ensemble over Binary Erasure Channel, by using practical Semi-Definite Programming approach. Our method does not use any relaxation or any approximate solution unlike previous works. Our simulation results include two parts; first, we present some codes and their degree distribution functions that their rates are close to the capacity. Second, the maximum achievable rate behavior of codes in our method is illustrated through some figures.
[ { "version": "v1", "created": "Tue, 27 Nov 2012 12:16:28 GMT" } ]
2012-11-28T00:00:00
[ [ "Tavakoli", "H.", "" ], [ "Ahmadian", "M.", "" ], [ "Peyghami", "M. Reza", "" ] ]
new_dataset
0.994051
1211.6321
Guo Zhang
Guo Zhang, Ying Ding, Sta\v{s}a Milojevi\'c
Citation content analysis (cca): A framework for syntactic and semantic analysis of citation content
null
null
null
null
cs.DL cs.IR cs.IT math.IT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new framework for Citation Content Analysis (CCA), for syntactic and semantic analysis of citation content that can be used to better analyze the rich sociocultural context of research behavior. The framework could be considered the next generation of citation analysis. This paper briefly reviews the history and features of content analysis in traditional social sciences, and its previous application in Library and Information Science. Based on critical discussion of the theoretical necessity of a new method as well as the limits of citation analysis, the nature and purposes of CCA are discussed, and potential procedures to conduct CCA, including principles to identify the reference scope, a two-dimensional (citing and cited) and two-modular (syntactic and semantic modules) codebook, are provided and described. Future works and implications are also suggested.
[ { "version": "v1", "created": "Tue, 27 Nov 2012 15:07:43 GMT" } ]
2012-11-28T00:00:00
[ [ "Zhang", "Guo", "" ], [ "Ding", "Ying", "" ], [ "Milojević", "Staša", "" ] ]
new_dataset
0.976791
1012.6012
Ofer Shayevitz
Ofer Shayevitz and Michele Wigger
On the Capacity of the Discrete Memoryless Broadcast Channel with Feedback
Accepted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A coding scheme for the discrete memoryless broadcast channel with {noiseless, noisy, generalized} feedback is proposed, and the associated achievable region derived. The scheme is based on a block-Markov strategy combining the Marton scheme and a lossy version of the Gray-Wyner scheme with side-information. In each block the transmitter sends fresh data and update information that allows the receivers to improve the channel outputs observed in the previous block. For a generalization of Dueck's broadcast channel our scheme achieves the noiseless-feedback capacity, which is strictly larger than the no-feedback capacity. For a generalization of Blackwell's channel and when the feedback is noiseless our new scheme achieves rate points that are outside the no-feedback capacity region. It follows by a simple continuity argument that for both these channels and when the feedback noise is sufficiently low, our scheme improves on the no-feedback capacity even when the feedback is noisy.
[ { "version": "v1", "created": "Wed, 29 Dec 2010 19:48:40 GMT" }, { "version": "v2", "created": "Wed, 30 Nov 2011 16:51:09 GMT" }, { "version": "v3", "created": "Sun, 25 Nov 2012 15:15:38 GMT" } ]
2012-11-27T00:00:00
[ [ "Shayevitz", "Ofer", "" ], [ "Wigger", "Michele", "" ] ]
new_dataset
0.998549
1211.1345
Bata Vasic Mr.
Bata Vasic
Ordered Statistics Vertex Extraction and Tracing Algorithm (OSVETA)
Accepted for publishing and Copyright transfered to Advances in Electrical and Computer Engineering, November 23th 2012
null
null
null
cs.CG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an algorithm for identifying vertices from three dimensional (3D) meshes that are most important for a geometric shape creation. Extracting such a set of vertices from a 3D mesh is important in applications such as digital watermarking, but also as a component of optimization and triangulation. In the first step, the Ordered Statistics Vertex Extraction and Tracing Algorithm (OSVETA) estimates precisely the local curvature, and most important topological features of mesh geometry. Using the vertex geometric importance ranking, the algorithm traces and extracts a vector of vertices, ordered by decreasing index of importance.
[ { "version": "v1", "created": "Tue, 6 Nov 2012 18:39:50 GMT" }, { "version": "v2", "created": "Sat, 24 Nov 2012 14:30:35 GMT" } ]
2012-11-27T00:00:00
[ [ "Vasic", "Bata", "" ] ]
new_dataset
0.996047
1211.5629
Wook-Sung Yoo
Wook-Sung Yoo
Prototype for Extended XDB Using Wiki
8 pages
International Journal of Database Management Systems (IJDMS) Vol.4, No.5, October 2012
null
null
cs.DB cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a prototype of extended XDB. XDB is an open-source and extensible database architecture developed by National Aeronautics and Space Administration (NASA) to provide integration of heterogeneous and distributed information resources for scientific and engineering applications. XDB enables an unlimited number of desktops and distributed information sources to be linked seamlessly and efficiently into an information grid using Data Access and Retrieval Composition (DARC) protocol which provides a contextual search and retrieval capability useful for lightweight web applications. This paper shows the usage of XDB on common data management in the enterprise without burdening users and application developers with unnecessary complexity and formal schemas. Supported by NASA Ames Research Center through NASA Exploration System Mission Directorate (ESMD) Higher Education grant, a project team at Fairfield University extended this concept and developed an extended XDB protocol and a prototype providing text-searches for Wiki. The technical specification of the protocol was posted to Source Forge (sourceforge.net) and a prototype providing text-searches for Wiki was developed. The prototype was created for 16 tags of the MediaWiki dialect. As part of future works, the prototype will be further extended to the complete Wiki markups and other dialects of Wiki.
[ { "version": "v1", "created": "Sat, 24 Nov 2012 00:58:19 GMT" } ]
2012-11-27T00:00:00
[ [ "Yoo", "Wook-Sung", "" ] ]
new_dataset
0.991438
1211.5820
Erjia Yan
Erjia Yan, Ying Ding, Blaise Cronin, Loet Leydesdorff
A bird's-eye view of scientific trading: Dependency relations among fields of science
null
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use a trading metaphor to study knowledge transfer in the sciences as well as the social sciences. The metaphor comprises four dimensions: (a) Discipline Self-dependence, (b) Knowledge Exports/Imports, (c) Scientific Trading Dynamics, and (d) Scientific Trading Impact. This framework is applied to a dataset of 221 Web of Science subject categories. We find that: (i) the Scientific Trading Impact and Dynamics of Materials Science And Transportation Science have increased; (ii) Biomedical Disciplines, Physics, And Mathematics are significant knowledge exporters, as is Statistics & Probability; (iii) in the social sciences, Economics, Business, Psychology, Management, And Sociology are important knowledge exporters; (iv) Discipline Self-dependence is associated with specialized domains which have ties to professional practice (e.g., Law, Ophthalmology, Dentistry, Oral Surgery & Medicine, Psychology, Psychoanalysis, Veterinary Sciences, And Nursing).
[ { "version": "v1", "created": "Sun, 25 Nov 2012 23:22:05 GMT" } ]
2012-11-27T00:00:00
[ [ "Yan", "Erjia", "" ], [ "Ding", "Ying", "" ], [ "Cronin", "Blaise", "" ], [ "Leydesdorff", "Loet", "" ] ]
new_dataset
0.954173
1211.6089
Menelaos Karavelas
Menelaos I. Karavelas, Christos Konaxis, and Eleni Tzanaki
The maximum number of faces of the Minkowski sum of three convex polytopes
44 pages, 3 figures
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive tight expressions for the maximum number of $k$-faces, $0\le k\le d-1$, of the Minkowski sum, $P_1+P_2+P_3$, of three $d$-dimensional convex polytopes $P_1$, $P_2$ and $P_3$, as a function of the number of vertices of the polytopes, for any $d\ge 2$. Expressing the Minkowski sum of the three polytopes as a section of their Cayley polytope $\mathcal{C}$, the problem of counting the number of $k$-faces of $P_1+P_2+P_3$, reduces to counting the number of $(k+2)$-faces of the subset of $\mathcal{C}$ comprising of the faces that contain at least one vertex from each $P_i$. In two dimensions our expressions reduce to known results, while in three dimensions, the tightness of our bounds follows by exploiting known tight bounds for the number of faces of $r$ $d$-polytopes, where $r\ge d$. For $d\ge 4$, the maximum values are attained when $P_1$, $P_2$ and $P_3$ are $d$-polytopes, whose vertex sets are chosen appropriately from three distinct $d$-dimensional moment-like curves.
[ { "version": "v1", "created": "Mon, 26 Nov 2012 20:47:25 GMT" } ]
2012-11-27T00:00:00
[ [ "Karavelas", "Menelaos I.", "" ], [ "Konaxis", "Christos", "" ], [ "Tzanaki", "Eleni", "" ] ]
new_dataset
0.976988
1102.3270
Emmanuel Lochin
R\'emi Diana and Emmanuel Lochin
Analytical Model of TCP Relentless Congestion Control
Extended version of the one presented at 6th International Workshop on Verification and Evaluation of Computer and Communication Systems (Vecos 2012)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a model of the Relentless Congestion Control proposed by Matt Mathis. Relentless Congestion Control (RCC) is a modification of the AIMD (Additive Increase Multiplicative Decrease) congestion control which consists in decreasing the TCP congestion window by the number of lost segments instead of halving it. Despite some on-going discussions at the ICCRG IRTF-group, this congestion control has, to the best of our knowledge, never been modeled. In this paper, we provide an analytical model of this novel congestion control and propose an implementation of RCC for the commonly-used network simulator ns-2. We also improve RCC with the addition of a loss retransmission detection scheme (based on SACK+) to prevent RTO caused by a loss of a retransmission and called this new version RCC+. The proposed models describe both the original RCC algorithm and RCC+ improvement and would allow to better assess the impact of this new congestion control scheme over the network traffic.
[ { "version": "v1", "created": "Wed, 16 Feb 2011 09:12:26 GMT" }, { "version": "v2", "created": "Thu, 8 Nov 2012 12:26:23 GMT" }, { "version": "v3", "created": "Thu, 22 Nov 2012 03:53:26 GMT" } ]
2012-11-26T00:00:00
[ [ "Diana", "Rémi", "" ], [ "Lochin", "Emmanuel", "" ] ]
new_dataset
0.98201
1210.4053
Omry Tuval
Avinatan Hassidim, Haim Kaplan, Omry Tuval
Joint Cache Partition and Job Assignment on Multi-Core Processors
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicore shared cache processors pose a challenge for designers of embedded systems who try to achieve minimal and predictable execution time of workloads consisting of several jobs. To address this challenge the cache is statically partitioned among the cores and the jobs are assigned to the cores so as to minimize the makespan. Several heuristic algorithms have been proposed that jointly decide how to partition the cache among the cores and assign the jobs. We initiate a theoretical study of this problem which we call the joint cache partition and job assignment problem. By a careful analysis of the possible cache partitions we obtain a constant approximation algorithm for this problem. For some practical special cases we obtain a 2-approximation algorithm, and show how to improve the approximation factor even further by allowing the algorithm to use additional cache. We also study possible improvements that can be obtained by allowing dynamic cache partitions and dynamic job assignments. We define a natural special case of the well known scheduling problem on unrelated machines in which machines are ordered by "strength". Our joint cache partition and job assignment problem generalizes this scheduling problem which we think is of independent interest. We give a polynomial time algorithm for this scheduling problem for instances obtained by fixing the cache partition in a practical case of the joint cache partition and job assignment problem where job loads are step functions.
[ { "version": "v1", "created": "Mon, 15 Oct 2012 14:47:01 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2012 09:03:28 GMT" }, { "version": "v3", "created": "Thu, 22 Nov 2012 17:16:23 GMT" } ]
2012-11-26T00:00:00
[ [ "Hassidim", "Avinatan", "" ], [ "Kaplan", "Haim", "" ], [ "Tuval", "Omry", "" ] ]
new_dataset
0.968443
1210.8293
Sivaranjani S
K. P. Nagarjun, S. Sivaranjani, George Koshy
Lyapunov Control of Quantum Systems with Applications to Quantum Computing
A final version will be uploaded with significant expansions
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the design of complex quantum systems like ion traps for quantum computing, it is usually desired to stabilize a particular system state or make the system state track a desired trajectory. Several control theoretical approaches based on feedback seem attractive to solve such problems. But the uncertain dynamics introduced by measurement on quantum systems makes the synthesis of feedback control laws very complicated. Although we have not explicitly modeled the change in system dynamics due to measurement (we have assumed weak measurements), this is a first step towards a more detailed analysis and closed-loop feedback design. Here, we present a Lyapunov-based control approach on the lines of that developed by Mirrahimi, Rouchon, Turnici (2005). The states are assumed to be obtained from weak measurements. The Lyapunov control technique has not been applied to realistic quantum systems so far. We have extended and applied the technique to two realistic physical systems - the quantum harmonic oscillator and the n-qubit system. We also propose to extend this concept to ion traps.
[ { "version": "v1", "created": "Wed, 31 Oct 2012 10:51:41 GMT" }, { "version": "v2", "created": "Thu, 22 Nov 2012 16:14:37 GMT" } ]
2012-11-26T00:00:00
[ [ "Nagarjun", "K. P.", "" ], [ "Sivaranjani", "S.", "" ], [ "Koshy", "George", "" ] ]
new_dataset
0.999246
1211.5157
Fotis Foukalas
Fotis Foukalas and Tamer Khattab
To Relay or Not To Relay in Cognitive Radio Sensor Networks
null
null
null
null
cs.NI cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent works proposed the relaying at the MAC layer in cognitive radio networks whereby the primary packets are forwarded by the secondary node maintaining an extra queue devoted to the relaying function. However, relaying of primary packets may introduce delays on the secondary packets (called secondary delay) and require additional power budget in order to forward the primary packets that is especially crucial when the network is deployed using sensors with limited power resources. To this end, an admission control can be employed in order to manage efficiently the relaying in cognitive radio sensor networks. In this paper, we first analyse and formulate the secondary delay and the required power budget of the secondary sensor node in relation with the acceptance factor that indicates whether the primary packets are allowed to be forwarded or not. Having defined the above, we present the tradeoff between the secondary delay and the required power budget when the acceptance factor is adapted. In the sequel, we formulate an optimization problem to minimize the secondary delay over the admission control parameter subject to a limit on the required power budget plus the constraints related to the stabilities of the individual queues due to their interdependencies observed by the analysis. The solution of this problem is provided using iterative decomposition methods i.e. dual and primal decompositions using Lagrange multipliers that simplifies the original complicated problem resulting in a final equivalent dual problem that includes the initial Karush Kuhn Tucker conditions. Using the derived equivalent dual problem, we obtain the optimal acceptance factor while in addition we highlight the possibilities for extra delay minimization that is provided by relaxing the initial constraints through changing the values of the Lagrange multipliers.
[ { "version": "v1", "created": "Wed, 21 Nov 2012 21:47:19 GMT" } ]
2012-11-26T00:00:00
[ [ "Foukalas", "Fotis", "" ], [ "Khattab", "Tamer", "" ] ]
new_dataset
0.997883
1211.5248
Partha Garai
Chaitali Biswas Dutta, Partha Garai and Amitabha Sinha
Design Of A Reconfigurable DSP Processor With Bit Efficient Residue Number System
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Residue Number System (RNS), which originates from the Chinese Remainder Theorem, offers a promising future in VLSI because of its carry-free operations in addition, subtraction and multiplication. This property of RNS is very helpful to reduce the complexity of calculation in many applications. A residue number system represents a large integer using a set of smaller integers, called residues. But the area overhead, cost and speed not only depend on this word length, but also the selection of moduli, which is a very crucial step for residue system. This parameter determines bit efficiency, area, frequency etc. In this paper a new moduli set selection technique is proposed to improve bit efficiency which can be used to construct a residue system for digital signal processing environment. Subsequently, it is theoretically proved and illustrated using examples, that the proposed solution gives better results than the schemes reported in the literature. The novelty of the architecture is shown by comparison the different schemes reported in the literature. Using the novel moduli set, a guideline for a Reconfigurable Processor is presented here that can process some predefined functions. As RNS minimizes the carry propagation, the scheme can be implemented in Real Time Signal Processing & other fields where high speed computations are required.
[ { "version": "v1", "created": "Thu, 22 Nov 2012 10:46:25 GMT" } ]
2012-11-26T00:00:00
[ [ "Dutta", "Chaitali Biswas", "" ], [ "Garai", "Partha", "" ], [ "Sinha", "Amitabha", "" ] ]
new_dataset
0.999543
1211.5251
Josep Rif\`a
\'Angel del Rio, Josep Rif\`a
Families of Hadamard Z2Z4Q8-codes
Submitted to IT-IEEE
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Z2Z4Q8-code is a non-empty subgroup of a direct product of copies of Z_2, Z_4 and Q_8 (the binary field, the ring of integers modulo 4 and the quaternion group on eight elements, respectively). Such Z2Z4Q8-codes are translation invariant propelinear codes as the well known Z_4-linear or Z_2Z_4-linear codes. In the current paper, we show that there exist "pure" Z2Z4Q8-codes, that is, codes that do not admit any abelian translation invariant propelinear structure. We study the dimension of the kernel and rank of the Z2Z4Q8-codes, and we give upper and lower bounds for these parameters. We give tools to construct a new class of Hadamard codes formed by several families of Z2Z4Q8-codes; we study and show the different shapes of such a codes and we improve the upper and lower bounds for the rank and the dimension of the kernel when the codes are Hadamard.
[ { "version": "v1", "created": "Thu, 22 Nov 2012 10:56:58 GMT" } ]
2012-11-26T00:00:00
[ [ "del Rio", "Ángel", "" ], [ "Rifà", "Josep", "" ] ]
new_dataset
0.998798
1211.4986
Sonja Kabicher-Fuchs
Sonja Kabicher-Fuchs and Stefanie Rinderle-Ma and Jan Recker and Marta Indulska and Francois Charoy and Rob Christiaanse and Reinhold Dunkl and Gregor Grambow and Jens Kolb and Henrik Leopold and Jan Mendling
Human-Centric Process-Aware Information Systems (HC-PAIS)
8 pages
null
null
TR-201211213534
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Process-Aware Information Systems (PAIS) support organizations in managing and automating their processes. A full automation of processes is in particular industries, such as service-oriented markets, not practicable. The integration of humans in PAIS is necessary to manage and perform processes that require human capabilities, judgments and decisions. A challenge of interdisciplinary PAIS research is to provide concepts and solutions that support human integration in PAIS and human orientation of PAIS in a way that provably increase the PAIS users' satisfaction and motivation with working with the Human-Centric Process Aware Information System (HC-PAIS) and consequently influence users' performance of tasks. This work is an initial step of research that aims at providing a definition of Human-Centric Process Aware Information Systems (HC-PAIS) and future research challenges of HC-PAIS. Results of focus group research are presented.
[ { "version": "v1", "created": "Wed, 21 Nov 2012 10:36:12 GMT" } ]
2012-11-22T00:00:00
[ [ "Kabicher-Fuchs", "Sonja", "" ], [ "Rinderle-Ma", "Stefanie", "" ], [ "Recker", "Jan", "" ], [ "Indulska", "Marta", "" ], [ "Charoy", "Francois", "" ], [ "Christiaanse", "Rob", "" ], [ "Dunkl", "Reinhold", "" ], [ "Grambow", "Gregor", "" ], [ "Kolb", "Jens", "" ], [ "Leopold", "Henrik", "" ], [ "Mendling", "Jan", "" ] ]
new_dataset
0.97827
1008.0770
Giorgi Japaridze
Giorgi Japaridze
Introduction to clarithmetic III
null
null
null
null
cs.LO math.LO math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper constructs three new systems of clarithmetic (arithmetic based on computability logic --- see http://www.cis.upenn.edu/~giorgi/cl.html): CLA8, CLA9 and CLA10. System CLA8 is shown to be sound and extensionally complete with respect to PA-provably recursive time computability. This is in the sense that an arithmetical problem A has a t-time solution for some PA-provably recursive function t iff A is represented by some theorem of CLA8. System CLA9 is shown to be sound and intensionally complete with respect to constructively PA-provable computability. This is in the sense that a sentence X is a theorem of CLA9 iff, for some particular machine M, PA proves that M computes (the problem represented by) X. And system CLA10 is shown to be sound and intensionally complete with respect to not-necessarily-constructively PA-provable computability. This means that a sentence X is a theorem of CLA10 iff PA proves that X is computable, even if PA does not "know" of any particular machine M that computes X.
[ { "version": "v1", "created": "Wed, 4 Aug 2010 12:53:20 GMT" }, { "version": "v2", "created": "Tue, 20 Nov 2012 16:13:23 GMT" } ]
2012-11-21T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
new_dataset
0.966624
1106.2649
Joseph Y. Halpern
Joseph Y. Halpern and David C. Parkes
Viewpoint: Journals for Certification, Conferences for Rapid Dissemination
To appear, Communications of the ACM
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The publication culture in Computer Science is different from that of all other disciplines. Whereas other disciplines focus on journal publication, the standard practice in CS has been to publish in a conference and then (sometimes) publish a journal version of the conference paper. We discuss the role of journal publication in CS. Indeed, it is through publication in selective, leading conferences that the quality of CS research is typically assessed.
[ { "version": "v1", "created": "Tue, 14 Jun 2011 09:37:39 GMT" }, { "version": "v2", "created": "Thu, 1 Dec 2011 13:45:46 GMT" }, { "version": "v3", "created": "Mon, 19 Nov 2012 22:17:24 GMT" } ]
2012-11-21T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Parkes", "David C.", "" ] ]
new_dataset
0.989849
1211.4723
Arindam Sarkar
Arindam Sarkar and J. K. Mandal
Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP)
17 pages, International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, No 5, October 2012. arXiv admin note: substantial text overlap with arXiv:1208.2334; and text overlap with arXiv:0711.2411 by other authors
null
10.5121/ijsptm.2012.1503
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a key generation and certification technique using multilayer perceptron (KGCMLP) has been proposed in wireless communication of data/information. In this proposed KGCMLP technique both sender and receiver uses an identical multilayer perceptrons. Both perceptrons are start synchronization by exchanging some control frames. During synchronization process message integrity test and synchronization test has been carried out. Only the synchronization test does not guarantee the security for this reason key certification phase also been introduced in KGCMLP technique. After Key generation and certification procedure synchronized identical weight vector forms the key for encryption/decryption. Parametric tests have been done and results are compared with some existing classical techniques, which show comparable results for the proposed technique.
[ { "version": "v1", "created": "Tue, 20 Nov 2012 12:04:55 GMT" } ]
2012-11-21T00:00:00
[ [ "Sarkar", "Arindam", "" ], [ "Mandal", "J. K.", "" ] ]
new_dataset
0.972418
1211.4779
EPTCS
Adriana Compagnoni (Stevens Institute of Technology), Mariangiola Dezani-Ciancaglini (Universita' di Torino), Paola Giannini (Universita' del Piemonte Orientale), Karin Sauer (Binghamton University), Vishakha Sharma (Stevens Institute of Technology), Angelo Troina (Universita' di Torino)
Parallel BioScape: A Stochastic and Parallel Language for Mobile and Spatial Interactions
In Proceedings MeCBIC 2012, arXiv:1211.3476
EPTCS 100, 2012, pp. 101-106
10.4204/EPTCS.100.7
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BioScape is a concurrent language motivated by the biological landscapes found at the interface of biology and biomaterials. It has been motivated by the need to model antibacterial surfaces, biofilm formation, and the effect of DNAse in treating and preventing biofilm infections. As its predecessor, SPiM, BioScape has a sequential semantics based on Gillespie's algorithm, and its implementation does not scale beyond 1000 agents. However, in order to model larger and more realistic systems, a semantics that may take advantage of the new multi-core and GPU architectures is needed. This motivates the introduction of parallel semantics, which is the contribution of this paper: Parallel BioScape, an extension with fully parallel semantics.
[ { "version": "v1", "created": "Sat, 17 Nov 2012 09:15:14 GMT" } ]
2012-11-21T00:00:00
[ [ "Compagnoni", "Adriana", "", "Stevens Institute of Technology" ], [ "Dezani-Ciancaglini", "Mariangiola", "", "Universita' di Torino" ], [ "Giannini", "Paola", "", "Universita' del\n Piemonte Orientale" ], [ "Sauer", "Karin", "", "Binghamton University" ], [ "Sharma", "Vishakha", "", "Stevens Institute of Technology" ], [ "Troina", "Angelo", "", "Universita' di Torino" ] ]
new_dataset
0.999202
1206.6098
EPTCS
Adrien Basso-Blandin (IBISC Lab), Franck Delaplace (IBISC Lab)
GUBS, a Behavior-based Language for Open System Dedicated to Synthetic Biology
In Proceedings MeCBIC 2012, arXiv:1211.3476
EPTCS 100, 2012, pp. 29-47
10.4204/EPTCS.100.3
null
cs.PL cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose a domain specific language, GUBS (Genomic Unified Behavior Specification), dedicated to the behavioral specification of synthetic biological devices, viewed as discrete open dynamical systems. GUBS is a rule-based declarative language. By contrast to a closed system, a program is always a partial description of the behavior of the system. The semantics of the language accounts the existence of some hidden non-specified actions possibly altering the behavior of the programmed device. The compilation framework follows a scheme similar to automatic theorem proving, aiming at improving synthetic biological design safety.
[ { "version": "v1", "created": "Tue, 26 Jun 2012 19:56:41 GMT" }, { "version": "v2", "created": "Mon, 19 Nov 2012 00:07:07 GMT" } ]
2012-11-20T00:00:00
[ [ "Basso-Blandin", "Adrien", "", "IBISC Lab" ], [ "Delaplace", "Franck", "", "IBISC Lab" ] ]
new_dataset
0.975882
1210.6456
Loet Leydesdorff
Loet Leydesdorff, Duncan Kushnir, and Ismael Rafols
Interactive Overlay Maps for US Patent (USPTO) Data Based on International Patent Classifications (IPC)
Scientometrics (forthcoming)
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on the development of an interface to the US Patent and Trademark Office (USPTO) that allows for the mapping of patent portfolios as overlays to basemaps constructed from citation relations among all patents contained in this database during the period 1976-2011. Both the interface and the data are in the public domain; the freeware programs VOSViewer and/or Pajek can be used for the visualization. These basemaps and overlays can be generated at both the 3-digit and 4-digit levels of the International Patent Classifications (IPC) of the World Intellectual Property Organization (WIPO). The basemaps can provide a stable mental framework for analysts to follow developments over searches for different years, which can be animated. The full flexibility of the advanced search engines of USPTO are available for generating sets of patents and/or patent applications which can thus be visualized and compared. This instrument allows for addressing questions about technological distance, diversity in portfolios, and animating the developments of both technologies and technological capacities of organizations over time.
[ { "version": "v1", "created": "Wed, 24 Oct 2012 08:32:44 GMT" }, { "version": "v2", "created": "Sun, 18 Nov 2012 11:17:07 GMT" } ]
2012-11-20T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Kushnir", "Duncan", "" ], [ "Rafols", "Ismael", "" ] ]
new_dataset
0.993271
1211.4095
EPTCS
Masahiro Hamano (PRESTO, Japan Science and Technology Agency (JST))
RNA interference and Register Machines (extended abstract)
In Proceedings MeCBIC 2012, arXiv:1211.3476
EPTCS 100, 2012, pp. 107-112
10.4204/EPTCS.100.8
null
cs.LO cs.CE q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RNA interference (RNAi) is a mechanism whereby small RNAs (siRNAs) directly control gene expression without assistance from proteins. This mechanism consists of interactions between RNAs and small RNAs both of which may be single or double stranded. The target of the mechanism is mRNA to be degraded or aberrated, while the initiator is double stranded RNA (dsRNA) to be cleaved into siRNAs. Observing the digital nature of RNAi, we represent RNAi as a Minsky register machine such that (i) The two registers hold single and double stranded RNAs respectively, and (ii) Machine's instructions are interpreted by interactions of enzyme (Dicer), siRNA (with RISC com- plex) and polymerization (RdRp) to the appropriate registers. Interpreting RNAi as a computational structure, we can investigate the computational meaning of RNAi, especially its complexity. Initially, the machine is configured as a Chemical Ground Form (CGF), which generates incorrect jumps. To remedy this problem, the system is remodeled as recursive RNAi, in which siRNA targets not only mRNA but also the machine instructional analogues of Dicer and RISC. Finally, probabilistic termination is investigated in the recursive RNAi system.
[ { "version": "v1", "created": "Sat, 17 Nov 2012 09:15:22 GMT" } ]
2012-11-20T00:00:00
[ [ "Hamano", "Masahiro", "", "PRESTO, Japan Science and Technology Agency" ] ]
new_dataset
0.999165
1211.4113
Ivan Guo
Ivan Guo
Unilaterally Competitive Multi-Player Stopping Games
25 pages, 2 figures
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-player competitive Dynkin stopping game is constructed. Each player can either exit the game for a fixed payoff, determined a priori, or stay and receive an adjusted payoff depending on the decision of other players. The single period case is shown to be "weakly unilaterally competitive". We present an explicit construction of the unique value at which Nash and optimal equilibria are attained. Multiple period generalisations are explored. The game has interpretations in economic and financial contexts, for example, as a consumption model with bounded resources. It also serves as a starting point to the construction of multi-person financial game options. In particular, the concept of optimal equilibria becomes pivotal in the pricing of the game options via super-replication.
[ { "version": "v1", "created": "Sat, 17 Nov 2012 11:16:56 GMT" } ]
2012-11-20T00:00:00
[ [ "Guo", "Ivan", "" ] ]
new_dataset
0.993746
1211.4384
Jan Oksanen
Jan Oksanen, Visa Koivunen, H. Vincent Poor
A Sensing Policy Based on Confidence Bounds and a Restless Multi-Armed Bandit Model
In proceedings of the 46th Asilomar conference 2012
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sensing policy for the restless multi-armed bandit problem with stationary but unknown reward distributions is proposed. The work is presented in the context of cognitive radios in which the bandit problem arises when deciding which parts of the spectrum to sense and exploit. It is shown that the proposed policy attains asymptotically logarithmic weak regret rate when the rewards are bounded independent and identically distributed or finite state Markovian. Simulation results verifying uniformly logarithmic weak regret are also presented. The proposed policy is a centrally coordinated index policy, in which the index of a frequency band is comprised of a sample mean term and a confidence term. The sample mean term promotes spectrum exploitation whereas the confidence term encourages exploration. The confidence term is designed such that the time interval between consecutive sensing instances of any suboptimal band grows exponentially. This exponential growth between suboptimal sensing time instances leads to logarithmically growing weak regret. Simulation results demonstrate that the proposed policy performs better than other similar methods in the literature.
[ { "version": "v1", "created": "Mon, 19 Nov 2012 12:19:45 GMT" } ]
2012-11-20T00:00:00
[ [ "Oksanen", "Jan", "" ], [ "Koivunen", "Visa", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.999136
1211.4552
Gabriel Synnaeve
Gabriel Synnaeve (LIG, LPPA), Pierre Bessiere (LPPA)
A Dataset for StarCraft AI \& an Example of Armies Clustering
Artificial Intelligence in Adversarial Real-Time Games 2012, Palo Alto : United States (2012)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper advocates the exploration of the full state of recorded real-time strategy (RTS) games, by human or robotic players, to discover how to reason about tactics and strategy. We present a dataset of StarCraft games encompassing the most of the games' state (not only player's orders). We explain one of the possible usages of this dataset by clustering armies on their compositions. This reduction of armies compositions to mixtures of Gaussian allow for strategic reasoning at the level of the components. We evaluated this clustering method by predicting the outcomes of battles based on armies compositions' mixtures components
[ { "version": "v1", "created": "Mon, 19 Nov 2012 20:18:43 GMT" } ]
2012-11-20T00:00:00
[ [ "Synnaeve", "Gabriel", "", "LIG, LPPA" ], [ "Bessiere", "Pierre", "", "LPPA" ] ]
new_dataset
0.999416
1201.1462
Xudong Ma
Xudong Ma
Symbol-Index-Feedback Polar Coding Schemes for Low-Complexity Devices
Accepted for publication in the Proceedings of the International Conference on Computing, Networking and Communications 2013, San Diego, USA, January 28-31, 2013
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a new class of error-control codes, the polar codes, have attracted much attention. The polar codes are the first known class of capacity-achieving codes for many important communication channels. In addition, polar codes have low-complexity encoding algorithms. Therefore, these codes are favorable choices for low-complexity devices, for example, in ubiquitous computing and sensor networks. However, the polar codes fall short in terms of finite-length error probabilities, compared with the state-of-the-art codes, such as the low-density parity-check codes. In this paper, in order to improve the error probabilities of the polar codes, we propose novel interactive coding schemes using receiver feedbacks based on polar codes. The proposed coding schemes have very low computational complexities at the transmitter side. By experimental results, we show that the proposed coding schemes achieve significantly lower error probabilities.
[ { "version": "v1", "created": "Fri, 6 Jan 2012 18:04:54 GMT" }, { "version": "v2", "created": "Fri, 16 Nov 2012 08:18:15 GMT" } ]
2012-11-19T00:00:00
[ [ "Ma", "Xudong", "" ] ]
new_dataset
0.998559
1211.3700
Michael Clarkson
Andrew K. Hirsch and Michael R. Clarkson
Nexus Authorization Logic (NAL): Logical Results
null
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nexus Authorization Logic (NAL) [Schneider et al. 2011] is a logic for reasoning about authorization in distributed systems. A revised version of NAL is given here, including revised syntax, a revised proof theory using localized hypotheses, and a new Kripke semantics. The proof theory is proved sound with respect to the semantics, and that proof is formalized in Coq.
[ { "version": "v1", "created": "Thu, 15 Nov 2012 19:22:11 GMT" }, { "version": "v2", "created": "Fri, 16 Nov 2012 03:29:01 GMT" } ]
2012-11-19T00:00:00
[ [ "Hirsch", "Andrew K.", "" ], [ "Clarkson", "Michael R.", "" ] ]
new_dataset
0.99964
1001.2913
Mirela Damian
Prosenjit Bose, Mirela Damian, Karim Douieb, Joseph O'Rourke, Ben Seamone, Michiel Smid and Stefanie Wuhrer
Pi/2-Angle Yao Graphs are Spanners
20 pages, 9 figures
International Journal of Computational Geometry & Applications, 22(1):61-82, 2012
10.1142/S0218195912600047
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the Yao graph Y4 in the L2 metric is a spanner with stretch factor 8(29+23sqrt(2)). Enroute to this, we also show that the Yao graph Y4 in the Linf metric is a planar spanner with stretch factor 8.
[ { "version": "v1", "created": "Sun, 17 Jan 2010 18:38:36 GMT" } ]
2012-11-15T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Damian", "Mirela", "" ], [ "Douieb", "Karim", "" ], [ "O'Rourke", "Joseph", "" ], [ "Seamone", "Ben", "" ], [ "Smid", "Michiel", "" ], [ "Wuhrer", "Stefanie", "" ] ]
new_dataset
0.995933
1211.3128
Ankur Kulkarni
Ankur A. Kulkarni and Negar Kiyavash
Non-asymptotic Upper Bounds for Deletion Correcting Codes
18 pages, 4 figures
null
null
null
cs.IT math.CO math.IT math.NT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Explicit non-asymptotic upper bounds on the sizes of multiple-deletion correcting codes are presented. In particular, the largest single-deletion correcting code for $q$-ary alphabet and string length $n$ is shown to be of size at most $\frac{q^n-q}{(q-1)(n-1)}$. An improved bound on the asymptotic rate function is obtained as a corollary. Upper bounds are also derived on sizes of codes for a constrained source that does not necessarily comprise of all strings of a particular length, and this idea is demonstrated by application to sets of run-length limited strings. The problem of finding the largest deletion correcting code is modeled as a matching problem on a hypergraph. This problem is formulated as an integer linear program. The upper bound is obtained by the construction of a feasible point for the dual of the linear programming relaxation of this integer linear program. The non-asymptotic bounds derived imply the known asymptotic bounds of Levenshtein and Tenengolts and improve on known non-asymptotic bounds. Numerical results support the conjecture that in the binary case, the Varshamov-Tenengolts codes are the largest single-deletion correcting codes.
[ { "version": "v1", "created": "Tue, 13 Nov 2012 21:02:06 GMT" } ]
2012-11-15T00:00:00
[ [ "Kulkarni", "Ankur A.", "" ], [ "Kiyavash", "Negar", "" ] ]
new_dataset
0.95377
1211.3189
Tao Feng
Tao Feng
A characterization of two-weight projective cyclic codes
5 pages
null
null
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give necessary conditions for a two-weight projective cyclic code to be the direct sum of two one-weight irreducible cyclic subcodes of the same dimension, following the work of Wolfmann and Vega. This confirms Vega's conjecture that all the two-weight cyclic codes of this type are the known ones in the projective case.
[ { "version": "v1", "created": "Wed, 14 Nov 2012 03:10:49 GMT" } ]
2012-11-15T00:00:00
[ [ "Feng", "Tao", "" ] ]
new_dataset
0.99413
1211.2365
Sylvester Eriksson-Bique
Sylvester Eriksson-Bique (University of Washington and University of Helsinki) and David Kirkpatrick (University of British Columbia) and Valentin Polishchuk (University of Helsinki)
Discrete Dubins Paths
26 pages
null
null
null
cs.DM cs.CG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Dubins path is a shortest path with bounded curvature. The seminal result in non-holonomic motion planning is that (in the absence of obstacles) a Dubins path consists either from a circular arc followed by a segment followed by another arc, or from three circular arcs [Dubins, 1957]. Dubins original proof uses advanced calculus; later, Dubins result was reproved using control theory techniques [Reeds and Shepp, 1990], [Sussmann and Tang, 1991], [Boissonnat, C\'er\'ezo, and Leblond, 1994]. We introduce and study a discrete analogue of curvature-constrained motion. We show that shortest "bounded-curvature" polygonal paths have the same structure as Dubins paths. The properties of Dubins paths follow from our results as a limiting case---this gives a new, "discrete" proof of Dubins result.
[ { "version": "v1", "created": "Sun, 11 Nov 2012 01:45:17 GMT" } ]
2012-11-14T00:00:00
[ [ "Eriksson-Bique", "Sylvester", "", "University of Washington and University of\n Helsinki" ], [ "Kirkpatrick", "David", "", "University of British Columbia" ], [ "Polishchuk", "Valentin", "", "University of Helsinki" ] ]
new_dataset
0.999037
1211.3020
J\"org Fischer
J\"org Fischer, Achim Hekler, Maxim Dolgov, Uwe D. Hanebeck
Optimal Sequence-Based LQG Control over TCP-like Networks Subject to Random Transmission Delays and Packet Losses
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of sequence-based controller design for Networked Control Systems (NCS), where control inputs and measurements are transmitted over TCP-like network connections that are subject to stochastic packet losses and time-varying packet delays. At every time step, the controller sends a sequence of predicted control inputs to the actuator in addition to the current control input. In this sequence-based setup, we derive an optimal solution to the Linear Quadratic Gaussian (LQG) control problem and prove that the separation principle holds. Simulations demonstrate the improved performance of this optimal controller compared to other sequence-based approaches.
[ { "version": "v1", "created": "Tue, 13 Nov 2012 15:29:08 GMT" } ]
2012-11-14T00:00:00
[ [ "Fischer", "Jörg", "" ], [ "Hekler", "Achim", "" ], [ "Dolgov", "Maxim", "" ], [ "Hanebeck", "Uwe D.", "" ] ]
new_dataset
0.998518
1104.0405
Linh Anh Nguyen D.Sc.
Linh Anh Nguyen
A Cut-Free ExpTime Tableau Decision Procedure for the Logic Extending Converse-PDL with Regular Inclusion Axioms
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first cut-free ExpTime (optimal) tableau decision procedure for the logic CPDLreg, which extends Converse-PDL with regular inclusion axioms characterized by finite automata. The logic CPDLreg is the combination of Converse-PDL and regular grammar logic with converse. Our tableau decision procedure uses global state caching and has been designed to increase efficiency and allow various optimization techniques, including on-the-fly propagation of local and global (in)consistency.
[ { "version": "v1", "created": "Sun, 3 Apr 2011 16:59:59 GMT" }, { "version": "v2", "created": "Sun, 11 Nov 2012 18:57:19 GMT" } ]
2012-11-13T00:00:00
[ [ "Nguyen", "Linh Anh", "" ] ]
new_dataset
0.999393
1210.5486
Nisheeth Joshi
Juhi Ameta, Nisheeth Joshi, Iti Mathur
A Lightweight Stemmer for Gujarati
In Proceedings of 46th Annual Convention of Computer Society of India
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gujarati is a resource poor language with almost no language processing tools being available. In this paper we have shown an implementation of a rule based stemmer of Gujarati. We have shown the creation of rules for stemming and the richness in morphology that Gujarati possesses. We have also evaluated our results by verifying it with a human expert.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 17:49:06 GMT" }, { "version": "v2", "created": "Sun, 11 Nov 2012 17:10:35 GMT" } ]
2012-11-13T00:00:00
[ [ "Ameta", "Juhi", "" ], [ "Joshi", "Nisheeth", "" ], [ "Mathur", "Iti", "" ] ]
new_dataset
0.999723
1211.2367
Ada Wai-chee Fu
Ada Wai-Chee Fu and Huanhuan Wu and James Cheng and Shumo Chu and Raymond Chi-Wing Wong
IS-LABEL: an Independent-Set based Labeling Scheme for Point-to-Point Distance Querying on Large Graphs
12 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of computing shortest path or distance between two query vertices in a graph, which has numerous important applications. Quite a number of indexes have been proposed to answer such distance queries. However, all of these indexes can only process graphs of size barely up to 1 million vertices, which is rather small in view of many of the fast-growing real-world graphs today such as social networks and Web graphs. We propose an efficient index, which is a novel labeling scheme based on the independent set of a graph. We show that our method can handle graphs of size three orders of magnitude larger than those existing indexes.
[ { "version": "v1", "created": "Sun, 11 Nov 2012 01:59:11 GMT" } ]
2012-11-13T00:00:00
[ [ "Fu", "Ada Wai-Chee", "" ], [ "Wu", "Huanhuan", "" ], [ "Cheng", "James", "" ], [ "Chu", "Shumo", "" ], [ "Wong", "Raymond Chi-Wing", "" ] ]
new_dataset
0.993008
1211.2386
Mohamed Labib Borham
Mohamed Labib Borham, Mostafa Sami Mostafa, Hossam Eldeen Moustafa Shamardan
MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks
5 pages, 9 figures. arXiv admin note: text overlap with arXiv:1201.0178, arXiv:1011.2795, arXiv:0902.1278, arXiv:0908.4419 by other authors
International Journal of Advanced Computer Science and Applications (IJACSA),Vol. 3, No. 10, 2012
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a Modified distributed storage algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity,and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different reasons such as battery failure or physical damage. Since every node collects significant data about its region, it is important to find a methodology to recover these data in case of failure of the source node. Distributed storage algorithms provide reliable access to data through the redundancy spread over individual unreliable nodes. The proposed algorithm uses flooding to spread data over the network and unicasting to provide controlled data redundancy through the network. We evaluate the performance of the proposed algorithm through implementation and simulation. We show the results and the performance evaluation of the proposed algorithm.
[ { "version": "v1", "created": "Sun, 11 Nov 2012 09:05:14 GMT" } ]
2012-11-13T00:00:00
[ [ "Borham", "Mohamed Labib", "" ], [ "Mostafa", "Mostafa Sami", "" ], [ "Shamardan", "Hossam Eldeen Moustafa", "" ] ]
new_dataset
0.990404
1211.2404
Rayed AlGhamdi
Rayed AlGhamdi, Steve Drew and Waleed Al-Ghaith
Factors unflinching e-commerce adoption by retailers in Saudi Arabia: Qual Analysis
null
The Electronic Journal on Information Systems in Developing Countries (2011)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the preliminary findings of a study researching the diffusion and the adoption of online retailing in Saudi Arabia. It reports new research that identifies and explores the key issues that positively and negatively influence retailers in Saudi Arabia regarding the adoption of electronic commerce. Retailers in Saudi Arabia have been reserved in their adoption of electronically delivered aspects of their business. Despite the fact that Saudi Arabia has the largest and fastest growth of ICT marketplaces in the Arab region, ecommerce activities are not progressing at the same speed. Only a tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, are involved in e-commerce implementation. Based on qualitative data, collected by conducting interviews with a sample population of retail sector decision makers in Saudi Arabia, both positive and negative issues influencing retailer adoption of electronic retailing systems in Saudi Arabia are identified. A number of impediments which include cultural, business and technical issues were reported. Facilitating factors include access to educational programs and awareness building of e-commerce, government support and assistance for ecommerce, trustworthy and secure online payment options, developing strong ICT infrastructure, and provision of sample e-commerce software to trial. While literature reveals that government promotion has had limited effects on the diffusion of e-commerce in most countries, this study significantly indicates government promotion and support as a key driver to online retailing in KSA.
[ { "version": "v1", "created": "Sun, 11 Nov 2012 11:45:31 GMT" } ]
2012-11-13T00:00:00
[ [ "AlGhamdi", "Rayed", "" ], [ "Drew", "Steve", "" ], [ "Al-Ghaith", "Waleed", "" ] ]
new_dataset
0.958731
1211.2495
Mohamed Firdhous
M. F. M. Firdhous and D. L. Basnayake and K. H. L. Kodithuwakku and N. K. Haththalla and N. W. Charlin and P. M. R. I. K. Bandara
Route Planning Made Easy - An Automated System for Sri Lanka
17 pages, 17 figures and 2 tables
Route Planning Made Easy-An Automated System for Sri Lanka, Bhumi: the Planning Research Journal of the University of Moratuwa, Vol. 02 No. 02, 2010, pp. 13-24
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Commercial cities like Colombo constantly face to problem of traffic congestion due to the large number of people visiting the city for various reasons. Also these cities have a large number of roads with many roads connecting any two selected locations. Finding the best path between two locations in Colombo city is not a trivial task, due to the complexity of the road network and other reasons such as heavy traffic, changes to the road networks such as road closures and one-ways. This paper presents the results of a study carried out to understand this problem and development of a system to plan the travel way ahead of the planned day or time of the journey. This system can compute the best route from between two locations taking multiple factors such as traffic conditions, road closures or one-way declarations etc., into account. This system also has the capability to compute the best route between any two locations on a future date based on the road conditions on that date. The system comprises three main modules and two user interfaces one for normal users and the other for administrators. The Administrative interface can only be accessed via web browser running on a computer, while the other interface can be accessed either via a web browser or a GPRS enabled mobile phone. The system is powered mainly by the Geographic Information System (GIS) technology and the other supporting technologies used are database management system, ASP.Net technology and the GPRS technology. Finally the developed system was evaluated for its functionality and user friendliness using a user survey. The results of the survey are also presented in this paper.
[ { "version": "v1", "created": "Mon, 12 Nov 2012 02:13:46 GMT" } ]
2012-11-13T00:00:00
[ [ "Firdhous", "M. F. M.", "" ], [ "Basnayake", "D. L.", "" ], [ "Kodithuwakku", "K. H. L.", "" ], [ "Haththalla", "N. K.", "" ], [ "Charlin", "N. W.", "" ], [ "Bandara", "P. M. R. I. K.", "" ] ]
new_dataset
0.997767
1211.2569
Ka Chun Lam
Lok Ming Lui, Ka Chun Lam, Shing-Tung Yau, Xianfeng Gu
Teichm\"uller extremal mapping and its applications to landmark matching registration
26 pages, 21 figures
null
null
null
cs.CG cs.GR cs.MM math.DG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Registration, which aims to find an optimal 1-1 correspondence between shapes, is an important process in different research areas. Conformal mappings have been widely used to obtain a diffeomorphism between shapes that minimizes angular distortion. Conformal registrations are beneficial since it preserves the local geometry well. However, when landmark constraints are enforced, conformal mappings generally do not exist. This motivates us to look for a unique landmark matching quasi-conformal registration, which minimizes the conformality distortion. Under suitable condition on the landmark constraints, a unique diffeomporphism, called the Teichm\"uller extremal mapping between two surfaces can be obtained, which minimizes the maximal conformality distortion. In this paper, we propose an efficient iterative algorithm, called the Quasi-conformal (QC) iterations, to compute the Teichm\"uller mapping. The basic idea is to represent the set of diffeomorphisms using Beltrami coefficients (BCs), and look for an optimal BC associated to the desired Teichm\"uller mapping. The associated diffeomorphism can be efficiently reconstructed from the optimal BC using the Linear Beltrami Solver(LBS). Using BCs to represent diffeomorphisms guarantees the diffeomorphic property of the registration. Using our proposed method, the Teichm\"uller mapping can be accurately and efficiently computed within 10 seconds. The obtained registration is guaranteed to be bijective. The proposed algorithm can also be extended to compute Teichm\"uller mapping with soft landmark constraints. We applied the proposed algorithm to real applications, such as brain landmark matching registration, constrained texture mapping and human face registration. Experimental results shows that our method is both effective and efficient in computing a non-overlap landmark matching registration with least amount of conformality distortion.
[ { "version": "v1", "created": "Mon, 12 Nov 2012 11:16:31 GMT" } ]
2012-11-13T00:00:00
[ [ "Lui", "Lok Ming", "" ], [ "Lam", "Ka Chun", "" ], [ "Yau", "Shing-Tung", "" ], [ "Gu", "Xianfeng", "" ] ]
new_dataset
0.995946
1211.2723
S. M. Hossein Tabatabaei Yazdi
S. M. Hossein Tabatabaei Yazdi, Serap A. Savari
On the Relationships among Optimal Symmetric Fix-Free Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symmetric fix-free codes are prefix condition codes in which each codeword is required to be a palindrome. Their study is motivated by the topic of joint source-channel coding. Although they have been considered by a few communities they are not well understood. In earlier work we used a collection of instances of Boolean satisfiability problems as a tool in the generation of all optimal binary symmetric fix-free codes with n codewords and observed that the number of different optimal codelength sequences grows slowly compared with the corresponding number for prefix condition codes. We demonstrate that all optimal symmetric fix-free codes can alternatively be obtained by sequences of codes generated by simple manipulations starting from one particular code. We also discuss simplifications in the process of searching for this set of codes.
[ { "version": "v1", "created": "Mon, 12 Nov 2012 18:26:32 GMT" } ]
2012-11-13T00:00:00
[ [ "Yazdi", "S. M. Hossein Tabatabaei", "" ], [ "Savari", "Serap A.", "" ] ]
new_dataset
0.976195
1211.2063
Padmanabha Venkatagiri Seshadri
Padmanabha Venkatagiri Seshadri, Mun Choon Chan, Wei Tsang Ooi (National University of Singapore)
Mobile-to-Mobile Video Recommendation
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile device users can now easily capture and socially share video clips in a timely manner by uploading them wirelessly to a server. When attending crowded events, such as an exhibition or the Olympic Games, however, timely sharing of videos becomes difficult due to choking bandwidth in the network infrastructure, preventing like-minded attendees from easily sharing videos with each other through a server. One solution to alleviate this problem is to use direct device-to-device communication to share videos among nearby attendees. Contact capacity between two devices, however, is limited, and thus a recommendation algorithm, such as collaborative filtering, is needed to select and transmit only videos of potential interest to an attendee. In this paper, we address the question: which video clip should be transmitted to which user. We proposed an video transmission scheduling algorithm, called CoFiGel, that runs in a distributed manner and aims to improve both the prediction coverage and precision of the collaborative filtering algorithm. At each device, CoFiGel transmits the video that would increase the estimated number of positive user-video ratings the most if this video is transferred to the destination device. We evaluated CoFiGel using real-world traces and show that substantial improvement can be achieved compared to baseline schemes that do not consider rating or contact history.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 07:43:16 GMT" } ]
2012-11-12T00:00:00
[ [ "Seshadri", "Padmanabha Venkatagiri", "", "National University of Singapore" ], [ "Chan", "Mun Choon", "", "National University of Singapore" ], [ "Ooi", "Wei Tsang", "", "National University of Singapore" ] ]
new_dataset
0.999291
1211.2073
Yang Lu
Yang Lu and Mengying Wang and Kenny Q. Zhu and Bo Yuan
LAGE: A Java Framework to reconstruct Gene Regulatory Networks from Large-Scale Continues Expression Data
2 pages
null
null
null
cs.LG cs.CE q-bio.QM stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LAGE is a systematic framework developed in Java. The motivation of LAGE is to provide a scalable and parallel solution to reconstruct Gene Regulatory Networks (GRNs) from continuous gene expression data for very large amount of genes. The basic idea of our framework is motivated by the philosophy of divideand-conquer. Specifically, LAGE recursively partitions genes into multiple overlapping communities with much smaller sizes, learns intra-community GRNs respectively before merge them altogether. Besides, the complete information of overlapping communities serves as the byproduct, which could be used to mine meaningful functional modules in biological networks.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 08:34:25 GMT" } ]
2012-11-12T00:00:00
[ [ "Lu", "Yang", "" ], [ "Wang", "Mengying", "" ], [ "Zhu", "Kenny Q.", "" ], [ "Yuan", "Bo", "" ] ]
new_dataset
0.994441
1211.2081
Tianyu Wang
Tianyu Wang, Lingyang Song, Zhu Han, and Bingli Jiao
Dynamic Popular Content Distribution in Vehicular Networks using Coalition Formation Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driven by both safety concerns and commercial interests, vehicular ad hoc networks (VANETs) have recently received considerable attentions. In this paper, we address popular content distribution (PCD) in VANETs, in which one large popular file is downloaded from a stationary roadside unit (RSU), by a group of on-board units (OBUs) driving through an area of interest (AoI) along a highway. Due to high speeds of vehicles and deep fadings of vehicle-to-roadside (V2R) channels, some of the vehicles may not finish downloading the entire file but only possess several pieces of it. To successfully send a full copy to each OBU, we propose a cooperative approach based on the coalition formation games, in which OBUs exchange their possessed pieces by broadcasting to and receiving from their neighbors. Simulation results show that our proposed approach presents a considerable performance improvement relative to the non-cooperative approach, in which the OBUs broadcast randomly selected pieces to their neighbors as along as the spectrum is detected to be unoccupied.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 09:11:56 GMT" } ]
2012-11-12T00:00:00
[ [ "Wang", "Tianyu", "" ], [ "Song", "Lingyang", "" ], [ "Han", "Zhu", "" ], [ "Jiao", "Bingli", "" ] ]
new_dataset
0.999089
1211.2087
Arindam Sarkar
Arindam Sarkar and J. K. Mandal
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)
9 pages
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012, 137-145
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper secured wireless communication using fuzzy logic based high speed public key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public key cryptography used in wireless communication provides equivalent level of security like other existing public key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 09:57:16 GMT" } ]
2012-11-12T00:00:00
[ [ "Sarkar", "Arindam", "" ], [ "Mandal", "J. K.", "" ] ]
new_dataset
0.998344
1211.2118
Tillmann Miltzow
Tillmann Miltzow
Trees in simple Polygons
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that every simple polygon contains a degree 3 tree encompassing a prescribed set of vertices. We give tight bounds on the minimal number of degree 3 vertices. We apply this result to reprove a result from Bose et al. that every set of disjoint line segments in the plane admits a binary tree.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 13:01:54 GMT" } ]
2012-11-12T00:00:00
[ [ "Miltzow", "Tillmann", "" ] ]
new_dataset
0.992718
1211.2150
Mohamed Ben Halima
Mohamed Ben Halima, Hichem karray, Adel. M. Alimi and Ana Fern\'andez Vila
NF-SAVO: Neuro-Fuzzy system for Arabic Video OCR
09 pages
International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012, 128-136
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a robust approach for text extraction and recognition from video clips which is called Neuro-Fuzzy system for Arabic Video OCR. In Arabic video text recognition, a number of noise components provide the text relatively more complicated to separate from the background. Further, the characters can be moving or presented in a diversity of colors, sizes and fonts that are not uniform. Added to this, is the fact that the background is usually moving making text extraction a more intricate process. Video include two kinds of text, scene text and artificial text. Scene text is usually text that becomes part of the scene itself as it is recorded at the time of filming the scene. But artificial text is produced separately and away from the scene and is laid over it at a later stage or during the post processing time. The emergence of artificial text is consequently vigilantly directed. This type of text carries with it important information that helps in video referencing, indexing and retrieval.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 14:57:53 GMT" } ]
2012-11-12T00:00:00
[ [ "Halima", "Mohamed Ben", "" ], [ "karray", "Hichem", "" ], [ "Alimi", "Adel. M.", "" ], [ "Vila", "Ana Fernández", "" ] ]
new_dataset
0.999669
1211.2187
Ali Eslami
Ali Eslami and H. Pishro-Nik
On Finite-Length Performance of Polar Codes: Stopping Sets, Error Floor, and Concatenated Design
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates properties of polar codes that can be potentially useful in real-world applications. We start with analyzing the performance of finite-length polar codes over the binary erasure channel (BEC), while assuming belief propagation as the decoding method. We provide a stopping set analysis for the factor graph of polar codes, where we find the size of the minimum stopping set. We also find the girth of the graph for polar codes. Our analysis along with bit error rate (BER) simulations demonstrate that finite-length polar codes show superior error floor performance compared to the conventional capacity-approaching coding techniques. In order to take advantage from this property while avoiding the shortcomings of polar codes, we consider the idea of combining polar codes with other coding schemes. We propose a polar code-based concatenated scheme to be used in Optical Transport Networks (OTNs) as a potential real-world application. Comparing against conventional concatenation techniques for OTNs, we show that the proposed scheme outperforms the existing methods by closing the gap to the capacity while avoiding error floor, and maintaining a low complexity at the same time.
[ { "version": "v1", "created": "Fri, 9 Nov 2012 16:58:22 GMT" } ]
2012-11-12T00:00:00
[ [ "Eslami", "Ali", "" ], [ "Pishro-Nik", "H.", "" ] ]
new_dataset
0.996642
1208.5413
Alan Guo
Alan Guo, Swastik Kopparty, Madhu Sudan
New affine-invariant codes from lifting
27 pages
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we explore error-correcting codes derived from the "lifting" of "affine-invariant" codes. Affine-invariant codes are simply linear codes whose coordinates are a vector space over a field and which are invariant under affine-transformations of the coordinate space. Lifting takes codes defined over a vector space of small dimension and lifts them to higher dimensions by requiring their restriction to every subspace of the original dimension to be a codeword of the code being lifted. While the operation is of interest on its own, this work focusses on new ranges of parameters that can be obtained by such codes, in the context of local correction and testing. In particular we present four interesting ranges of parameters that can be achieved by such lifts, all of which are new in the context of affine-invariance and some may be new even in general. The main highlight is a construction of high-rate codes with sublinear time decoding. The only prior construction of such codes is due to Kopparty, Saraf and Yekhanin \cite{KSY}. All our codes are extremely simple, being just lifts of various parity check codes (codes with one symbol of redundancy), and in the final case, the lift of a Reed-Solomon code. We also present a simple connection between certain lifted codes and lower bounds on the size of "Nikodym sets". Roughly, a Nikodym set in $\mathbb{F}_q^m$ is a set $S$ with the property that every point has a line passing through it which is almost entirely contained in $S$. While previous lower bounds on Nikodym sets were roughly growing as $q^m/2^m$, we use our lifted codes to prove a lower bound of $(1 - o(1))q^m$ for fields of constant characteristic.
[ { "version": "v1", "created": "Mon, 27 Aug 2012 14:57:52 GMT" }, { "version": "v2", "created": "Thu, 8 Nov 2012 19:32:06 GMT" } ]
2012-11-09T00:00:00
[ [ "Guo", "Alan", "" ], [ "Kopparty", "Swastik", "" ], [ "Sudan", "Madhu", "" ] ]
new_dataset
0.976203
1209.5805
Eduardo Arvelo
Eduardo Arvelo, Eric Kim and Nuno C. Martins
Memoryless Control Design for Persistent Surveillance under Safety Constraints
null
null
null
null
cs.SY cs.RO math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the design of time-invariant memoryless control policies for robots that move in a finite two- dimensional lattice and are tasked with persistent surveillance of an area in which there are forbidden regions. We model each robot as a controlled Markov chain whose state comprises its position in the lattice and the direction of motion. The goal is to find the minimum number of robots and an associated time-invariant memoryless control policy that guarantees that the largest number of states are persistently surveilled without ever visiting a forbidden state. We propose a design method that relies on a finitely parametrized convex program inspired by entropy maximization principles. Numerical examples are provided.
[ { "version": "v1", "created": "Wed, 26 Sep 2012 01:18:33 GMT" }, { "version": "v2", "created": "Thu, 8 Nov 2012 17:56:24 GMT" } ]
2012-11-09T00:00:00
[ [ "Arvelo", "Eduardo", "" ], [ "Kim", "Eric", "" ], [ "Martins", "Nuno C.", "" ] ]
new_dataset
0.975018
1211.1904
Dan Wallach
Josh Benaloh and Mike Byrne and Philip Kortum and Neal McBurnett and Olivier Pereira and Philip B. Stark and Dan S. Wallach
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It provides both a paper trail and end-to-end cryptography using COTS hardware. It is designed to support both ballot-level risk-limiting audits, and auditing by individual voters and observers. The human interface and process flow is based on modern usability research. This paper describes the STAR-Vote architecture, which could well be the next-generation voting system for Travis County and perhaps elsewhere.
[ { "version": "v1", "created": "Thu, 8 Nov 2012 17:06:33 GMT" } ]
2012-11-09T00:00:00
[ [ "Benaloh", "Josh", "" ], [ "Byrne", "Mike", "" ], [ "Kortum", "Philip", "" ], [ "McBurnett", "Neal", "" ], [ "Pereira", "Olivier", "" ], [ "Stark", "Philip B.", "" ], [ "Wallach", "Dan S.", "" ] ]
new_dataset
0.967657
1207.5124
Jeffrey Shallit
Daniel Goc, Kalle Saari, Jeffrey Shallit
Primitive Words and Lyndon Words in Automatic and Linearly Recurrent Sequences
null
null
null
null
cs.FL math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate questions related to the presence of primitive words and Lyndon words in automatic and linearly recurrent sequences. We show that the Lyndon factorization of a k-automatic sequence is itself k-automatic. We also show that the function counting the number of primitive factors (resp., Lyndon factors) of length n in a k-automatic sequence is k-regular. Finally, we show that the number of Lyndon factors of a linearly recurrent sequence is bounded.
[ { "version": "v1", "created": "Sat, 21 Jul 2012 11:55:09 GMT" }, { "version": "v2", "created": "Thu, 26 Jul 2012 12:18:52 GMT" }, { "version": "v3", "created": "Tue, 6 Nov 2012 21:32:27 GMT" } ]
2012-11-08T00:00:00
[ [ "Goc", "Daniel", "" ], [ "Saari", "Kalle", "" ], [ "Shallit", "Jeffrey", "" ] ]
new_dataset
0.998229
1211.1581
Volker Weinberg
Volker Weinberg
Data-parallel programming with Intel Array Building Blocks (ArBB)
13 pages, 7 figures, PRACE Whitepaper
null
null
null
cs.PF cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intel Array Building Blocks is a high-level data-parallel programming environment designed to produce scalable and portable results on existing and upcoming multi- and many-core platforms. We have chosen several mathematical kernels - a dense matrix-matrix multiplication, a sparse matrix-vector multiplication, a 1-D complex FFT and a conjugate gradients solver - as synthetic benchmarks and representatives of scientific codes and ported them to ArBB. This whitepaper describes the ArBB ports and presents performance and scaling measurements on the Westmere-EX based system SuperMIG at LRZ in comparison with OpenMP and MKL.
[ { "version": "v1", "created": "Wed, 7 Nov 2012 16:00:28 GMT" } ]
2012-11-08T00:00:00
[ [ "Weinberg", "Volker", "" ] ]
new_dataset
0.999708
1211.1661
Mark Korenblit
Mark Korenblit and Vadim E. Levit
A One-Vertex Decomposition Algorithm for Generating Algebraic Expressions of Square Rhomboids
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates relationship between algebraic expressions and graphs. We consider a digraph called a square rhomboid that is an example of non-series-parallel graphs. Our intention is to simplify the expressions of square rhomboids and eventually find their shortest representations. With that end in view, we describe the new algorithm for generating square rhomboid expressions, which improves on our previous algorithms.
[ { "version": "v1", "created": "Wed, 7 Nov 2012 20:25:20 GMT" } ]
2012-11-08T00:00:00
[ [ "Korenblit", "Mark", "" ], [ "Levit", "Vadim E.", "" ] ]
new_dataset
0.952536
1211.1109
Raghu Meka
Daniel Kane, Raghu Meka
A PRG for Lipschitz Functions of Polynomials with Applications to Sparsest Cut
null
null
null
null
cs.CC cs.DS math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give improved pseudorandom generators (PRGs) for Lipschitz functions of low-degree polynomials over the hypercube. These are functions of the form psi(P(x)), where P is a low-degree polynomial and psi is a function with small Lipschitz constant. PRGs for smooth functions of low-degree polynomials have received a lot of attention recently and play an important role in constructing PRGs for the natural class of polynomial threshold functions. In spite of the recent progress, no nontrivial PRGs were known for fooling Lipschitz functions of degree O(log n) polynomials even for constant error rate. In this work, we give the first such generator obtaining a seed-length of (log n)\tilde{O}(d^2/eps^2) for fooling degree d polynomials with error eps. Previous generators had an exponential dependence on the degree. We use our PRG to get better integrality gap instances for sparsest cut, a fundamental problem in graph theory with many applications in graph optimization. We give an instance of uniform sparsest cut for which a powerful semi-definite relaxation (SDP) first introduced by Goemans and Linial and studied in the seminal work of Arora, Rao and Vazirani has an integrality gap of exp(\Omega((log log n)^{1/2})). Understanding the performance of the Goemans-Linial SDP for uniform sparsest cut is an important open problem in approximation algorithms and metric embeddings and our work gives a near-exponential improvement over previous lower bounds which achieved a gap of \Omega(log log n).
[ { "version": "v1", "created": "Tue, 6 Nov 2012 04:51:27 GMT" } ]
2012-11-07T00:00:00
[ [ "Kane", "Daniel", "" ], [ "Meka", "Raghu", "" ] ]
new_dataset
0.993838
1211.1279
Sunirmal Khatua
Sunirmal Khatua and Nandini Mukherjee
Application-centric Resource Provisioning for Amazon EC2 Spot Instances
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In late 2009, Amazon introduced spot instances to offer their unused resources at lower cost with reduced reliability. Amazon's spot instances allow customers to bid on unused Amazon EC2 capacity and run those instances for as long as their bid exceeds the current spot price. The spot price changes periodically based on supply and demand, and customers whose bids exceed it gain access to the available spot instances. Customers may expect their services at lower cost with spot instances compared to on-demand or reserved. However the reliability is compromised since the instances(IaaS) providing the service(SaaS) may become unavailable at any time without any notice to the customer. Checkpointing and migration schemes are of great use to cope with such situation. In this paper we study various checkpointing schemes that can be used with spot instances. Also we device some algorithms for checkpointing scheme on top of application-centric resource provisioning framework that increase the reliability while reducing the cost significantly.
[ { "version": "v1", "created": "Tue, 6 Nov 2012 15:58:55 GMT" } ]
2012-11-07T00:00:00
[ [ "Khatua", "Sunirmal", "" ], [ "Mukherjee", "Nandini", "" ] ]
new_dataset
0.995717
1211.1332
Hossein Jahandideh
Hossein Jahandideh, Mehrzad Namvar
Use of PSO in Parameter Estimation of Robot Dynamics; Part Two: Robustness
6 pages, 1 figure, 5 tables, Published in the International Conference on System Theory, Control and Computing 2012 (IEEE) Proceedings, to be indexed in IEEExplore
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the robustness of the PSO-based approach to parameter estimation of robot dynamics presented in Part One. We have made attempts to make the PSO method more robust by experimenting with potential cost functions. The simulated system is a cylindrical robot; through simulation, the robot is excited, samples are taken, error is added to the samples, and the noisy samples are used for estimating the robot parameters through the presented method. Comparisons are made with the least squares, total least squares, and robust least squares methods of estimation.
[ { "version": "v1", "created": "Tue, 6 Nov 2012 18:08:26 GMT" } ]
2012-11-07T00:00:00
[ [ "Jahandideh", "Hossein", "" ], [ "Namvar", "Mehrzad", "" ] ]
new_dataset
0.963211
1211.0645
Pietro Oliva
Pietro Oliva
Project G.N.O.S.I.S.: Geographical Network Of Synoptic Information System
3 pages, Proposal for future project
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Everybody knows how much synoptic maps are useful today. An excellent example above all is Google Earth: its simplicity and friendly interface allows every user to have the Earth maps ready in just one simple layout; nevertheless a crucial dimension is missing in Google Earth: the time. This doesn't mean we simply aim to add history to Google Earth (though it could be already a nice goal): the main idea behind GNOSIS project is to produce applications to "dress up" the Globe with a set of skin-maps representing the most various different kind of histories like the evolution of geology, genetics, agriculture, ethnology, linguistics, musicology, metallurgy and so forth, in time. It may be interesting in the near future to have such a possibility to watch on the map the positions and movements of the armies during the battles of Waterloo or Thermopylae, the spreading of the cultivation of corn in time, the rise and fall of Roman Empire or the diffusion of Smallpox together with the spread of a religion, a specific dialect, the early pottery techniques or the natural resources available to pre-Columbian civilizations on a Google-Earth-map-like, that is to say to have at one's hand the ultimate didactic-enciclopedic tool. To do so we foresee the use of a general-purpose intermediate/high level programming language, possibly object-oriented such C++ or Java.
[ { "version": "v1", "created": "Sat, 3 Nov 2012 22:33:34 GMT" } ]
2012-11-06T00:00:00
[ [ "Oliva", "Pietro", "" ] ]
new_dataset
0.95457
1105.2375
Bharath Bettagere
B. N. Bharath and Chandra R. Murthy
On the DMT of TDD-SIMO Systems with Channel-Dependent Reverse Channel Training
Accepted for publication in IEEE Transactions on Communications
null
10.1109/TCOMM.2012.082712.110820
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the Diversity-Multiplexing gain Trade-off (DMT) of a training based reciprocal Single Input Multiple Output (SIMO) system, with (i) perfect Channel State Information (CSI) at the Receiver (CSIR) and noisy CSI at the Transmitter (CSIT), and (ii) noisy CSIR and noisy CSIT. In both the cases, the CSIT is acquired through Reverse Channel Training (RCT), i.e., by sending a training sequence from the receiver to the transmitter. A channel-dependent fixed-power training scheme is proposed for acquiring CSIT, along with a forward-link data transmit power control scheme. With perfect CSIR, the proposed scheme is shown to achieve a diversity order that is quadratically increasing with the number of receive antennas. This is in contrast with conventional orthogonal RCT schemes, where the diversity order is known to saturate as the number of receive antennas is increased, for a given channel coherence time. Moreover, the proposed scheme can achieve a larger DMT compared to the orthogonal training scheme. With noisy CSIR and noisy CSIT, a three-way training scheme is proposed and its DMT performance is analyzed. It is shown that nearly the same diversity order is achievable as in the perfect CSIR case. The time-overhead in the training schemes is explicitly accounted for in this work, and the results show that the proposed channel-dependent RCT and data power control schemes offer a significant improvement in terms of the DMT, compared to channel-agnostic orthogonal RCT schemes. The outage performance of the proposed scheme is illustrated through Monte-Carlo simulations.
[ { "version": "v1", "created": "Thu, 12 May 2011 05:38:33 GMT" }, { "version": "v2", "created": "Fri, 2 Nov 2012 04:43:04 GMT" } ]
2012-11-05T00:00:00
[ [ "Bharath", "B. N.", "" ], [ "Murthy", "Chandra R.", "" ] ]
new_dataset
0.996166
1210.5660
Dong Fang
Dong Fang and Alister Burr
Linear Physical-layer Network Coding in Galois Field for Rayleigh fading 2-Way Relay Channels
There is a a crucial error for the conditons of generating linear combination. The corresponding simulations are thus incorrect. The draft should be withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel linear physicallayer network coding (LPNC) for Rayleigh fading 2-way relay channels (2-WRC). Rather than the simple modulo-2 (bit-XOR) operation, the relay directly maps the superimposed signal of the two users into the linear network coded combination in GF(2^2) by multiplying the user data by properly selected generator matrix. We derive the constellation constrained capacities for LPNC and 5QAM denoise-and forward (5QAM-DNF) [2] and further explicitly characterize the capacity difference between LPNC and 5QAM-DNF. Based on our analysis and simulation, we highlight that without employing the irregular 5QAM mapping and sacrificing the spectral efficiency, our LPNC in GF(2^2) is superior to 5QAM-DNF scheme in low SNR regime while they achieve equal performance in the the moderate-to-high SNR regime.
[ { "version": "v1", "created": "Sat, 20 Oct 2012 22:08:52 GMT" }, { "version": "v2", "created": "Fri, 2 Nov 2012 13:56:41 GMT" } ]
2012-11-05T00:00:00
[ [ "Fang", "Dong", "" ], [ "Burr", "Alister", "" ] ]
new_dataset
0.95787
1211.0175
Herman Haverkort
Herman Haverkort
Harmonious Hilbert curves and other extradimensional space-filling curves
40 pages, 10 figures, pseudocode included
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new way of generalizing Hilbert's two-dimensional space-filling curve to arbitrary dimensions. The new curves, called harmonious Hilbert curves, have the unique property that for any d' < d, the d-dimensional curve is compatible with the d'-dimensional curve with respect to the order in which the curves visit the points of any d'-dimensional axis-parallel space that contains the origin. Similar generalizations to arbitrary dimensions are described for several variants of Peano's curve (the original Peano curve, the coil curve, the half-coil curve, and the Meurthe curve). The d-dimensional harmonious Hilbert curves and the Meurthe curves have neutral orientation: as compared to the curve as a whole, arbitrary pieces of the curve have each of d! possible rotations with equal probability. Thus one could say these curves are `statistically invariant' under rotation---unlike the Peano curves, the coil curves, the half-coil curves, and the familiar generalization of Hilbert curves by Butz and Moore. In addition, prompted by an application in the construction of R-trees, this paper shows how to construct a 2d-dimensional generalized Hilbert or Peano curve that traverses the points of a certain d-dimensional diagonally placed subspace in the order of a given d-dimensional generalized Hilbert or Peano curve. Pseudocode is provided for comparison operators based on the curves presented in this paper.
[ { "version": "v1", "created": "Thu, 1 Nov 2012 13:40:52 GMT" } ]
2012-11-02T00:00:00
[ [ "Haverkort", "Herman", "" ] ]
new_dataset
0.99887
1210.8318
H.R. Chennamma
H. R. Chennamma and Lalitha Rangarajan
Mugshot Identification from Manipulated Facial Images
8 pages, 5 figures, 1 table, journal. arXiv admin note: substantial text overlap with arXiv:1106.4907
International Journal of Machine Intelligence, Volume 4, Issue 1, pp. 407, 2012
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Editing on digital images is ubiquitous. Identification of deliberately modified facial images is a new challenge for face identification system. In this paper, we address the problem of identification of a face or person from heavily altered facial images. In this face identification problem, the input to the system is a manipulated or transformed face image and the system reports back the determined identity from a database of known individuals. Such a system can be useful in mugshot identification in which mugshot database contains two views (frontal and profile) of each criminal. We considered only frontal view from the available database for face identification and the query image is a manipulated face generated by face transformation software tool available online. We propose SIFT features for efficient face identification in this scenario. Further comparative analysis has been given with well known eigenface approach. Experiments have been conducted with real case images to evaluate the performance of both methods.
[ { "version": "v1", "created": "Wed, 31 Oct 2012 12:55:57 GMT" } ]
2012-11-01T00:00:00
[ [ "Chennamma", "H. R.", "" ], [ "Rangarajan", "Lalitha", "" ] ]
new_dataset
0.986303
1210.8433
Ender Ayanoglu
Ender Ayanoglu
Green Cellular Wireless Networks: Where to Begin?
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency. As a result, these networks have an enormous Carbon footprint. In this note, we describe the sources of the inefficiencies in such networks. First we quantify how much Carbon footprint such networks generate. We also discuss how much more mobile traffic is expected to increase so that this Carbon footprint will even increase tremendously more. We then discuss specific sources of inefficiency and potential sources of improvement at the physical layer as well as higher layers of the communication protocol hierarchy. In particular, considering that most of the energy inefficiency in wireless cellular networks is at the base stations, we discuss multi-tier networks and point to the potential of exploiting mobility patterns in order to use base station energy judiciously.
[ { "version": "v1", "created": "Wed, 31 Oct 2012 18:39:47 GMT" } ]
2012-11-01T00:00:00
[ [ "Ayanoglu", "Ender", "" ] ]
new_dataset
0.998414
1210.5802
Ryan Rossi
Ryan A. Rossi, David F. Gleich, Assefaw H. Gebremedhin, Md. Mostofa Ali Patwary
What if CLIQUE were fast? Maximum Cliques in Information Networks and Strong Components in Temporal Networks
null
null
null
null
cs.SI cs.DC cs.DM physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exact maximum clique finders have progressed to the point where we can investigate cliques in million-node social and information networks, as well as find strongly connected components in temporal networks. We use one such finder to study a large collection of modern networks emanating from biological, social, and technological domains. We show inter-relationships between maximum cliques and several other common network properties, including network density, maximum core, and number of triangles. In temporal networks, we find that the largest temporal strong components have around 20-30% of the vertices of the entire network. These components represent groups of highly communicative individuals. In addition, we discuss and improve the performance and utility of the maximum clique finder itself.
[ { "version": "v1", "created": "Mon, 22 Oct 2012 04:21:07 GMT" }, { "version": "v2", "created": "Tue, 30 Oct 2012 19:57:39 GMT" } ]
2012-10-31T00:00:00
[ [ "Rossi", "Ryan A.", "" ], [ "Gleich", "David F.", "" ], [ "Gebremedhin", "Assefaw H.", "" ], [ "Patwary", "Md. Mostofa Ali", "" ] ]
new_dataset
0.950012
1210.7931
Franti\v{s}ek Mat\'u\v{s}
Franti\v{s}ek Mat\'u\v{s}
Polymatroids and polyquantoids
null
\emph{Proceedings of WUPES 2012}, Sept.\ 12--15, Mari\'ansk\'e L\'azn\`i, Czech Republic, 126--136
null
null
cs.IT cs.CR math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When studying entropy functions of multivariate probability distributions, polymatroids and matroids emerge. Entropy functions of pure multiparty quantum states give rise to analogous notions, called here polyquantoids and quantoids. Polymatroids and polyquantoids are related via linear mappings and duality. Quantum secret sharing schemes that are ideal are described by selfdual matroids. Expansions of integer polyquantoids to quantoids are studied and linked to that of polymatroids.
[ { "version": "v1", "created": "Tue, 30 Oct 2012 08:48:03 GMT" } ]
2012-10-31T00:00:00
[ [ "Matúš", "František", "" ] ]
new_dataset
0.982942
1210.8025
Ka Chun Lam
Lok Ming Lui, Ka Chun Lam, Tsz Wai Wong, XianFeng Gu
Beltrami Representation and its applications to texture map and video compression
30 pages, 23 figures
null
null
null
cs.MM cs.GR math.DG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Surface parameterizations and registrations are important in computer graphics and imaging, where 1-1 correspondences between meshes are computed. In practice, surface maps are usually represented and stored as 3D coordinates each vertex is mapped to, which often requires lots of storage memory. This causes inconvenience in data transmission and data storage. To tackle this problem, we propose an effective algorithm for compressing surface homeomorphisms using Fourier approximation of the Beltrami representation. The Beltrami representation is a complex-valued function defined on triangular faces of the surface mesh with supreme norm strictly less than 1. Under suitable normalization, there is a 1-1 correspondence between the set of surface homeomorphisms and the set of Beltrami representations. Hence, every bijective surface map is associated with a unique Beltrami representation. Conversely, given a Beltrami representation, the corresponding bijective surface map can be exactly reconstructed using the Linear Beltrami Solver introduced in this paper. Using the Beltrami representation, the surface homeomorphism can be easily compressed by Fourier approximation, without distorting the bijectivity of the map. The storage memory can be effectively reduced, which is useful for many practical problems in computer graphics and imaging. In this paper, we proposed to apply the algorithm to texture map compression and video compression. With our proposed algorithm, the storage requirement for the texture properties of a textured surface can be significantly reduced. Our algorithm can further be applied to compressing motion vector fields for video compression, which effectively improve the compression ratio.
[ { "version": "v1", "created": "Thu, 18 Oct 2012 12:17:12 GMT" } ]
2012-10-31T00:00:00
[ [ "Lui", "Lok Ming", "" ], [ "Lam", "Ka Chun", "" ], [ "Wong", "Tsz Wai", "" ], [ "Gu", "XianFeng", "" ] ]
new_dataset
0.988701
1210.8055
Sudhindu Bikash Mandal SBM
Sudhindu Bikash Mandal, Amlan Chakrabarti, Susmita Sur-Kolay
A Synthesis Method for Quaternary Quantum Logic Circuits
10 pages
Progress in VLSI Design and Test Lecture Notes in Computer Science Volume 7373, 2012, pp 270-280
10.1007/978-3-642-31494-0_31
null
cs.OH quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synthesis of quaternary quantum circuits involves basic quaternary gates and logic operations in the quaternary quantum domain. In this paper, we propose new projection operations and quaternary logic gates for synthesizing quaternary logic functions. We also demonstrate the realization of the proposed gates using basic quantum quaternary operations. We then employ our synthesis method to design of quaternary adder and some benchmark circuits. Our results in terms of circuit cost, are better than the existing works.
[ { "version": "v1", "created": "Fri, 26 Oct 2012 12:34:05 GMT" } ]
2012-10-31T00:00:00
[ [ "Mandal", "Sudhindu Bikash", "" ], [ "Chakrabarti", "Amlan", "" ], [ "Sur-Kolay", "Susmita", "" ] ]
new_dataset
0.978789
1210.6154
Federico-Vladimir Gutierrez-Corea
Federico-Vladimir Gutierrez-Corea (UNI), Adolfo-Javier Urrutia-Zambrana (UNI)
Propuesta de sistema GeoInform\'atico con representaci\'on de escenarios para auxiliar en la nueva metodolog\'ia propuesta por INETER y la UNI para el estudio a gran escala de la vulnerabilidad y da\~nos debido a sismos en las edificaciones
Published date: 02/07/2007
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A GIS based software is presented which permits the estimation of seismic vulnerability and the presentation of results in digital maps for single houses, groups of buildings, parts of settlements or even complete towns. Nicaragua is a country with a high seismic activity. The assessment of seismic vulnerability requires the execution of distinct tasks, e.g. recollection of field data, integration of data from the municipal cadastre, reprocessing or screening to test the reliability of the data, definition of calculation of vulnerability functions, calculation of vulnerability for single objects as houses or buildings, calculation of mean vulnerability for certain areas as barrios or squares. In order to reduce time and effort to be spent with several unspecialized tools and procedures, an integrated software system was created, the user of which has not to care about separate software tools for each part of the process. The main advantage of the software is the combination of Geographical Information System (GIS) with the logics that surrounds the specific methodologies of seismic vulnerability index, index of damages and presentation of results. The new software uses a connection with an external centralized Enterprise Data Base which stores all the input information and calculation results and which is automatically synchronized for the presentation of results using GIS. The cadastral information contains data on the constructive type of the house, dimensions, year of construction, type of walls, roof, number of inhabitants, etc.. The system also allows to present damage scenarios for specific seismic events with given hypocenter and magnitude. The documentation of the software serves as a guide for students working on object oriented software engineering by using unified modeling language (UML) and software logic architecture (3-tiers).
[ { "version": "v1", "created": "Tue, 23 Oct 2012 07:41:58 GMT" }, { "version": "v2", "created": "Fri, 26 Oct 2012 23:01:13 GMT" } ]
2012-10-30T00:00:00
[ [ "Gutierrez-Corea", "Federico-Vladimir", "", "UNI" ], [ "Urrutia-Zambrana", "Adolfo-Javier", "", "UNI" ] ]
new_dataset
0.998518
1210.7282
Ruggero Micheletto
Robert Bishop and Ruggero Micheletto
The Hangulphabet: A Descriptive Alphabet
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the Hangulphabet, a new writing system that should prove useful in a number of contexts. Using the Hangulphabet, a user can instantly see voicing, manner and place of articulation of any phoneme found in human language. The Hangulphabet places consonant graphemes on a grid with the x-axis representing the place of articulation and the y-axis representing manner of articulation. Each individual grapheme contains radicals from both axes where the points intersect. The top radical represents manner of articulation where the bottom represents place of articulation. A horizontal line running through the middle of the bottom radical represents voicing. For vowels, place of articulation is located on a grid that represents the position of the tongue in the mouth. This grid is similar to that of the IPA vowel chart (International Phonetic Association, 1999). The difference with the Hangulphabet being the trapezoid representing the vocal apparatus is on a slight tilt. Place of articulation for a vowel is represented by a breakout figure from the grid. This system can be used as an alternative to the International Phonetic Alphabet (IPA) or as a complement to it. Beginning students of linguistics may find it particularly useful. A Hangulphabet font has been created to facilitate switching between the Hangulphabet and the IPA.
[ { "version": "v1", "created": "Sat, 27 Oct 2012 02:34:35 GMT" } ]
2012-10-30T00:00:00
[ [ "Bishop", "Robert", "" ], [ "Micheletto", "Ruggero", "" ] ]
new_dataset
0.999424
1210.7295
Chung-Chieh Fang
Chung-Chieh Fang and Eyad H. Abed
Analysis and Control of Period-Doubling Bifurcation in Buck Converters Using Harmonic Balance
Published in the International Journal of Latin American Applied Research, 31(3), pp. 149-156, Jul. 2001, Special theme issue: Bifurcation Control: Methodologies and Applications, In Honor of the 65th Birthday of Professor Leon O. Chua
International Journal of Latin American Applied Research, 31(3), pp. 149-156, Jul. 2001
null
null
cs.SY math.DS nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Period doubling bifurcation in buck converters is studied by using the harmonic balance method. A simple dynamic model of a buck converter in continuous conduction mode under voltage mode or current mode control is derived. This model consists of the feedback connection of a linear system and a nonlinear one. An exact harmonic balance analysis is used to obtain a necessary and sufficient condition for a period doubling bifurcation to occur. If such a bifurcation occurs, the analysis also provides information on its exact location. Using the condition for bifurcation, a feedforward control is designed to eliminate the period doubling bifurcation. This results in a wider range of allowed source voltage, and also in improved line regulation.
[ { "version": "v1", "created": "Sat, 27 Oct 2012 06:24:07 GMT" } ]
2012-10-30T00:00:00
[ [ "Fang", "Chung-Chieh", "" ], [ "Abed", "Eyad H.", "" ] ]
new_dataset
0.970484
1210.7349
Katherine Edwards
Maria Chudnovsky, Katherine Edwards, Ken-ichi Kawarabayashi, Paul Seymour
Edge-colouring seven-regular planar graphs
23 pages. arXiv admin note: substantial text overlap with arXiv:1209.1176
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conjecture due to the fourth author states that every $d$-regular planar multigraph can be $d$-edge-coloured, provided that for every odd set $X$ of vertices, there are at least $d$ edges between $X$ and its complement. For $d = 3$ this is the four-colour theorem, and the conjecture has been proved for all $d\le 8$, by various authors. In particular, two of us proved it when $d=7$; and then three of us proved it when $d=8$. The methods used for the latter give a proof in the $d=7$ case that is simpler than the original, and we present it here.
[ { "version": "v1", "created": "Sat, 27 Oct 2012 17:12:37 GMT" } ]
2012-10-30T00:00:00
[ [ "Chudnovsky", "Maria", "" ], [ "Edwards", "Katherine", "" ], [ "Kawarabayashi", "Ken-ichi", "" ], [ "Seymour", "Paul", "" ] ]
new_dataset
0.996608
1210.7401
Huiyue Yi
Huiyue Yi
Joint Doppler frequency shift compensation and data detection method using 2-D unitary ESPRIT algorithm for SIMO-OFDM railway communication systems
25 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a joint Doppler frequency shift compensation and data detection method using 2-D unitary ESPRIT algorithm for SIMO-OFDM railway communication systems over fast time-varying sparse multipath channels. By creating the spatio-temporal array data matrix utilizing the ISI-free part of the CP (cyclic prefix), we first propose a novel algorithm for obtaining auto-paired joint DOA and Doppler frequency shift estimates of all paths via 2-D unitary ESPRIT algorithm. Thereafter, based on the obtained estimates, a joint Doppler frequency shift compensation and data detection method is developed. This method consists of three parts: (a) the received signal is spatially filtered to get the signal corresponding to each path, and the signal corresponding to each path is compensated for the Doppler frequency shift in time domain, (b) the Doppler frequency shift-compensated signals of all paths are summed together, and (c) the desired information is detected by performing FFT on the summed signal after excluding the CP. Moreover, we prove that the channel matrix becomes time-invariant after Doppler frequency shift compensation and the ICI is effectively avoided. Finally, simulation results are presented to demonstrate the performance of the proposed method and compare it with the conventional method.
[ { "version": "v1", "created": "Sun, 28 Oct 2012 05:17:56 GMT" } ]
2012-10-30T00:00:00
[ [ "Yi", "Huiyue", "" ] ]
new_dataset
0.994812
1210.7417
Roohallah Rastaghi
Roohallah Rastaghi, Hamid R. Dalili Oskouei
Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm
null
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 1, September 2012
null
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We proposed a new attack against Hwang et al.'s cryptosystem. This cryptosystem uses a super-increasing sequence as private key and the authors investigate a new algorithm called permutation combination algorithm to enhance density of knapsack to avoid the low-density attack. Sattar J. Aboud [Aboud j. Sattar, "An improved knapsack public key cryptography system", International Journal of Internet Technology and Secured Transactions, Vol.3 (3), pp.310-319, 2011] used Shamir's attack on the basic Merkle-Hellman cryptosystem to break this cryptosystem. In this paper, we introduce a direct attack against Hwang et al.'s cryptosystem based on Lattice basis reduction algorithms. By computing complexity of propose attack, we show that unlike Aboud's cryptanalysis, our cryptanalysis is more efficient and practicable.
[ { "version": "v1", "created": "Sun, 28 Oct 2012 07:41:20 GMT" } ]
2012-10-30T00:00:00
[ [ "Rastaghi", "Roohallah", "" ], [ "Oskouei", "Hamid R. Dalili", "" ] ]
new_dataset
0.995338
1210.7482
Nader Ale Ebrahim
Nader Ale Ebrahim, Shamsuddin Ahmed, Zahari Taha
Modified Stage-Gate: A Conceptual Model of Virtual Product Development Process
24 pages
African Journal of Marketing Management, 1(9) (2009) 211-219
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In today s dynamic marketplace, manufacturing companies are under strong pressure to introduce new products for long-term survival with their competitors. Nevertheless, every company cannot cope up progressively or immediately with the market requirements due to knowledge dynamics being experienced in the competitive milieu. Increased competition and reduced product life cycles put force upon companies to develop new products faster. In response to these pressing needs, there should be some new approach compatible in flexible circumstances. This paper presents a solution based on the popular Stage-Gate system, which is closely linked with virtual team approach. Virtual teams can provide a platform to advance the knowledge-base in a company and thus to reduce time-to-market. This article introduces conceptual product development architecture under a virtual team umbrella. The paper describes all the major aspects of new product development (NPD), NPD process and its relationship with virtual teams, Stage-Gate system finally presents a modified Stage-Gate system to cope up with the changing needs. It also provides the guidelines for the successful implementation of virtual teams in new product development.
[ { "version": "v1", "created": "Sun, 28 Oct 2012 17:50:48 GMT" } ]
2012-10-30T00:00:00
[ [ "Ebrahim", "Nader Ale", "" ], [ "Ahmed", "Shamsuddin", "" ], [ "Taha", "Zahari", "" ] ]
new_dataset
0.968607
1210.7515
Eitan Yaakobi
Eitan Yaakobi, Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf
Rewriting Codes for Flash Memories
arXiv admin note: substantial text overlap with arXiv:0905.1512
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flash memory is a non-volatile computer memory comprising blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes (or flash codes) and buffer codes - have been designed in order to maximize the number of times that information stored in a flash memory can be written (and re-written) prior to incurring a block erasure. An (n,k,t)q flash code C is a coding scheme for storing k information bits in $n$ cells in such a way that any sequence of up to t writes can be accommodated without a block erasure. The total number of available level transitions in n cells is n(q-1), and the write deficiency of C, defined as \delta(C) = n(q-1)-t, is a measure of how close the code comes to perfectly utilizing all these transitions. In this paper, we show a construction of flash codes with write deficiency O(qk\log k) if q \geq \log_2k, and at most O(k\log^2 k) otherwise. An (n,r,\ell,t)q buffer code is a coding scheme for storing a buffer of r \ell-ary symbols such that for any sequence of t symbols it is possible to successfully decode the last r symbols that were written. We improve upon a previous upper bound on the maximum number of writes t in the case where there is a single cell to store the buffer. Then, we show how to improve a construction by Jiang et al. that uses multiple cells, where n\geq 2r.
[ { "version": "v1", "created": "Sun, 28 Oct 2012 21:33:42 GMT" } ]
2012-10-30T00:00:00
[ [ "Yaakobi", "Eitan", "" ], [ "Mahdavifar", "Hessam", "" ], [ "Siegel", "Paul H.", "" ], [ "Vardy", "Alexander", "" ], [ "Wolf", "Jack K.", "" ] ]
new_dataset
0.998858
1210.7605
Zdenek Dvorak
Zdenek Dvorak and Ken-ichi Kawarabayashi
List-coloring embedded graphs
14 pages, 0 figures, accepted to SODA'13
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For any fixed surface Sigma of genus g, we give an algorithm to decide whether a graph G of girth at least five embedded in Sigma is colorable from an assignment of lists of size three in time O(|V(G)|). Furthermore, we can allow a subgraph (of any size) with at most s components to be precolored, at the expense of increasing the time complexity of the algorithm to O(|V(G)|^{K(g+s)+1}) for some absolute constant K; in both cases, the multiplicative constant hidden in the O-notation depends on g and s. This also enables us to find such a coloring when it exists. The idea of the algorithm can be applied to other similar problems, e.g., 5-list-coloring of graphs on surfaces.
[ { "version": "v1", "created": "Mon, 29 Oct 2012 09:56:59 GMT" } ]
2012-10-30T00:00:00
[ [ "Dvorak", "Zdenek", "" ], [ "Kawarabayashi", "Ken-ichi", "" ] ]
new_dataset
0.994614
1210.7631
Amelia Carolina Sparavigna
Amelia Carolina Sparavigna
The fortresses of Ejin: an example of outlining a site from satellite images
Keywords: Satellite Imagery, Image processing, GIS, fortresses, China
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From 1960's to 1970's, the Chinese Army built some fortified artificial hills. Some of them are located in the Inner Mongolia, Western China. These large fortresses are surrounded by moats. For some of them it is still possible to see earthworks, trenches and ditches, the planning of which could have a symbolic meaning. We can argue this result form their digital outlining, obtained after an image processing of satellite images, based on edge detection.
[ { "version": "v1", "created": "Mon, 29 Oct 2012 11:53:35 GMT" } ]
2012-10-30T00:00:00
[ [ "Sparavigna", "Amelia Carolina", "" ] ]
new_dataset
0.993443
1210.7102
Harivinod N
B. H. Shekar, N. Harivinod, M. Sharmila Kumari, K. Raghurama Holla
3D Face Recognition using Significant Point based SULD Descriptor
null
null
10.1109/ICRTIT.2011.5972443
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this work, we present a new 3D face recognition method based on Speeded-Up Local Descriptor (SULD) of significant points extracted from the range images of faces. The proposed model consists of a method for extracting distinctive invariant features from range images of faces that can be used to perform reliable matching between different poses of range images of faces. For a given 3D face scan, range images are computed and the potential interest points are identified by searching at all scales. Based on the stability of the interest point, significant points are extracted. For each significant point we compute the SULD descriptor which consists of vector made of values from the convolved Haar wavelet responses located on concentric circles centred on the significant point, and where the amount of Gaussian smoothing is proportional to the radii of the circles. Experimental results show that the newly proposed method provides higher recognition rate compared to other existing contemporary models developed for 3D face recognition.
[ { "version": "v1", "created": "Fri, 26 Oct 2012 11:27:33 GMT" } ]
2012-10-29T00:00:00
[ [ "Shekar", "B. H.", "" ], [ "Harivinod", "N.", "" ], [ "Kumari", "M. Sharmila", "" ], [ "Holla", "K. Raghurama", "" ] ]
new_dataset
0.997467