id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1210.6275
Jo\~ao Eugenio Marynowski
Jo\~ao Eugenio Marynowski
Ambiente de Planejamento Ip\^e
MSc dissertation involving Artificial Intelligence, Planning, Petri Net, Plangraph, Intelig\^encia Artificial, Planejamento, Redes de Petri e Grafo de Planos
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we investigate the systems that implements algorithms for the planning problem in Artificial Intelligence, called planners, with especial attention to the planners based on the plan graph. We analyze the problem of comparing the performance of the different algorithms and we propose an environment for the development and analysis of planners.
[ { "version": "v1", "created": "Tue, 23 Oct 2012 15:54:00 GMT" }, { "version": "v2", "created": "Wed, 24 Oct 2012 20:03:00 GMT" } ]
2012-10-26T00:00:00
[ [ "Marynowski", "João Eugenio", "" ] ]
new_dataset
0.996099
1210.6918
Vadim E. Levit
Vadim Levit and David Tankus
Well-Covered Graphs Without Cycles of Lengths 4, 5 and 6
11 pages, 2 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph G is well-covered if all its maximal independent sets are of the same cardinality. Assume that a weight function w is defined on its vertices. Then G is w-well-covered if all maximal independent sets are of the same weight. For every graph G, the set of weight functions w such that G is w-well-covered is a vector space. Given an input graph G without cycles of length 4, 5, and 6, we characterize polynomially the vector space of weight functions w for which G is w-well-covered. Let B be an induced complete bipartite subgraph of G on vertex sets of bipartition B_{X} and B_{Y}. Assume that there exists an independent set S such that both the union of S and B_{X} and the union of S and B_{Y} are maximal independent sets of G. Then B is a generating subgraph of G, and it produces the restriction w(B_{X})=w(B_{Y}). It is known that for every weight function w, if G is w-well-covered, then the above restriction is satisfied. In the special case, where B_{X}={x} and B_{Y}={y}, we say that xy is a relating edge. Recognizing relating edges and generating subgraphs is an NP-complete problem. However, we provide a polynomial algorithm for recognizing generating subgraphs of an input graph without cycles of length 5, 6 and 7. We also present a polynomial algorithm for recognizing relating edges in an input graph without cycles of length 5 and 6.
[ { "version": "v1", "created": "Thu, 25 Oct 2012 17:26:13 GMT" } ]
2012-10-26T00:00:00
[ [ "Levit", "Vadim", "" ], [ "Tankus", "David", "" ] ]
new_dataset
0.982089
cs/0403042
Aikaterini Argyraki
Katerina J. Argyraki, David R. Cheriton
Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks
Description and evaluation of a filter management protocol that reactively protects public-access sites against DDoS attacks. 12 pages long
Updated versions in Proc. USENIX Annual Technical Conference, April 2005, and IEEE/ACM Transactions on Networking, 17(4):1284-1297, August 2009
10.1109/TNET.2008.2007431
null
cs.NI
null
A distributed denial-of-service (DDoS) attack can flood a victim site with malicious traffic, causing service disruption or even complete failure. Public-access sites like amazon or ebay are particularly vulnerable to such attacks, because they have no way of a priori blocking unauthorized traffic. We present Active Internet Traffic Filtering (AITF), a mechanism that protects public-access sites from highly distributed attacks by causing undesired traffic to be blocked as close as possible to its sources. We identify filters as a scarce resource and show that AITF protects a significant amount of the victim's bandwidth, while requiring from each participating router a number of filters that can be accommodated by today's routers. AITF is incrementally deployable, because it offers a substantial benefit even to the first sites that deploy it.
[ { "version": "v1", "created": "Mon, 29 Mar 2004 19:24:14 GMT" }, { "version": "v2", "created": "Mon, 24 May 2004 07:20:17 GMT" } ]
2012-10-26T00:00:00
[ [ "Argyraki", "Katerina J.", "" ], [ "Cheriton", "David R.", "" ] ]
new_dataset
0.978754
1210.6370
Ma\"el Le Treust
Ma\"el Le Treust, Yezekael Hayel, Samson Lasaulce, M\'erouane Debbah
"To sense" or "not to sense" in energy-efficient power control games
Proc. of the 2nd International Conference on Game Theory for Network (GAMENETS), 2011
null
null
null
cs.GT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A network of cognitive transmitters is considered. Each transmitter has to decide his power control policy in order to maximize energy-efficiency of his transmission. For this, a transmitter has two actions to take. He has to decide whether to sense the power levels of the others or not (which corresponds to a finite sensing game), and to choose his transmit power level for each block (which corresponds to a compact power control game). The sensing game is shown to be a weighted potential game and its set of correlated equilibria is studied. Interestingly, it is shown that the general hybrid game where each transmitter can jointly choose the hybrid pair of actions (to sense or not to sense, transmit power level) leads to an outcome which is worse than the one obtained by playing the sensing game first, and then playing the power control game. This is an interesting Braess-type paradox to be aware of for energy-efficient power control in cognitive networks.
[ { "version": "v1", "created": "Tue, 23 Oct 2012 20:27:12 GMT" } ]
2012-10-25T00:00:00
[ [ "Treust", "Maël Le", "" ], [ "Hayel", "Yezekael", "" ], [ "Lasaulce", "Samson", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.999234
1210.6385
Bino John
Guodong Liu, Zhihua Li, Yuefeng Lin, and Bino John
Automated family-based naming of small RNAs for next generation sequencing data using a modified MD5-digest algorithm
12 pages, 1 main table, 3 supplementary information tables
null
null
null
cs.CR q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We developed NameMyGene, a web tool and a stand alone program to easily generate putative family-based names for small RNA sequences so that laboratories can easily organize, analyze, and observe patterns from, the massive amount of data generated by next-generation sequencers. NameMyGene, also applicable to other emerging methods such as RNA-Seq, and Chip-Seq, solely uses the input small RNA sequence and does not require any additional data such as other sequence data sets. The web server and software is freely available (http://www.johnlab.org/NameMyGene) and is based on Java to ensure platform independency.
[ { "version": "v1", "created": "Tue, 23 Oct 2012 21:22:16 GMT" } ]
2012-10-25T00:00:00
[ [ "Liu", "Guodong", "" ], [ "Li", "Zhihua", "" ], [ "Lin", "Yuefeng", "" ], [ "John", "Bino", "" ] ]
new_dataset
0.950621
1007.3804
Bruno Grenet
Bruno Grenet (LIP), Erich Kaltofen, Pascal Koiran (LIP), Natacha Portier (LIP)
Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits
To appear in the AMS Contemporary Mathematics volume on Randomization, Relaxation, and Complexity in Polynomial Equation Solving, edited by Gurvits, Pebay, Rojas and Thompson
Randomization, Relaxation, and Complexity in Polynomial Equation Solving, Amer. Math. Soc. (Ed.) (2011) 61-96
10.1090/conm/556
RRLIP2010-24
cs.CC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We deploy algebraic complexity theoretic techniques for constructing symmetric determinantal representations of for00504925mulas and weakly skew circuits. Our representations produce matrices of much smaller dimensions than those given in the convex geometry literature when applied to polynomials having a concise representation (as a sum of monomials, or more generally as an arithmetic formula or a weakly skew circuit). These representations are valid in any field of characteristic different from 2. In characteristic 2 we are led to an almost complete solution to a question of B\"urgisser on the VNP-completeness of the partial permanent. In particular, we show that the partial permanent cannot be VNP-complete in a finite field of characteristic 2 unless the polynomial hierarchy collapses.
[ { "version": "v1", "created": "Thu, 22 Jul 2010 06:07:33 GMT" }, { "version": "v2", "created": "Mon, 26 Jul 2010 19:14:57 GMT" }, { "version": "v3", "created": "Fri, 14 Jan 2011 09:56:07 GMT" }, { "version": "v4", "created": "Tue, 25 Oct 2011 06:13:10 GMT" } ]
2012-10-24T00:00:00
[ [ "Grenet", "Bruno", "", "LIP" ], [ "Kaltofen", "Erich", "", "LIP" ], [ "Koiran", "Pascal", "", "LIP" ], [ "Portier", "Natacha", "", "LIP" ] ]
new_dataset
0.99363
1210.6286
James Aspnes
James Aspnes
A one-bit swap object using test-and-sets and a max register
null
null
null
YALEU/DCS/TR-1464
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a linearizable, wait-free implementation of a one-bit swap object from a single max register and an unbounded array of test-and-set bits. Each swap operation takes at most three steps. Using standard randomized constructions, the max register and test-and-set bits can be replaced by read-write registers, at the price of raising the cost of a swap operation to an expected O(max(log n, min(log t, n))) steps, where t is the number of times the swap object has previously changed its value and n is the number of processes.
[ { "version": "v1", "created": "Tue, 23 Oct 2012 16:49:56 GMT" } ]
2012-10-24T00:00:00
[ [ "Aspnes", "James", "" ] ]
new_dataset
0.997415
1210.6338
Guido Stolfi
Guido Stolfi (University of Sao Paulo)
A Ternary Digital to Analog Converter with High Power Output and 170-dB Dynamic Range
4 pages, 10 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A prototype of a very high dynamic range 32-bits Digital to Analog Converter (DAC) was designed and built for the purpose of direct auditory stimulus generation. It provides signals from less than 100 nV up to 50 Watts peak power output, driving a 32-Ohms earphone or speaker. The use of ternary cells makes possible a 170 dB dynamic range that is basically limited by thermal noise only.
[ { "version": "v1", "created": "Mon, 22 Oct 2012 15:11:08 GMT" } ]
2012-10-24T00:00:00
[ [ "Stolfi", "Guido", "", "University of Sao Paulo" ] ]
new_dataset
0.998581
1111.0084
Natasha Devroye
Yiwei Song and Natasha Devroye
Lattice codes for the Gaussian relay channel: Decode-and-Forward and Compress-and-Forward
submitted to IEEE Transactions on Information Theory, October 30, 2011. Revised October 15, 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lattice codes are known to achieve capacity in the Gaussian point-to-point channel, achieving the same rates as independent, identically distributed (i.i.d.) random Gaussian codebooks. Lattice codes are also known to outperform random codes for certain channel models that are able to exploit their linearity. In this work, we show that lattice codes may be used to achieve the same performance as known i.i.d. Gaussian random coding techniques for the Gaussian relay channel, and show several examples of how this may be combined with the linearity of lattices codes in multi-source relay networks. In particular, we present a nested lattice list decoding technique, by which, lattice codes are shown to achieve the Decode-and-Forward (DF) rate of single source, single destination Gaussian relay channels with one or more relays. We next present two examples of how this DF scheme may be combined with the linearity of lattice codes to achieve new rate regions which for some channel conditions outperform analogous known Gaussian random coding techniques in multi-source relay channels. That is, we derive a new achievable rate region for the two-way relay channel with direct links and compare it to existing schemes, and derive another achievable rate region for the multiple access relay channel. We furthermore present a lattice Compress-and-Forward (CF) scheme for the Gaussian relay channel which exploits a lattice Wyner-Ziv binning scheme and achieves the same rate as the Cover-El Gamal CF rate evaluated for Gaussian random codes. These results suggest that structured/lattice codes may be used to mimic, and sometimes outperform, random Gaussian codes in general Gaussian networks.
[ { "version": "v1", "created": "Tue, 1 Nov 2011 00:12:38 GMT" }, { "version": "v2", "created": "Sun, 21 Oct 2012 16:34:07 GMT" } ]
2012-10-23T00:00:00
[ [ "Song", "Yiwei", "" ], [ "Devroye", "Natasha", "" ] ]
new_dataset
0.962571
1203.1527
Jon-Lark Kim
Finley Freibert, Jon-Lark Kim
Optimum Subcodes of Self-Dual Codes and Their Optimum Distance Profiles
This paper is a revised version with the title "Optimal Subcodes of Self-Dual Codes and Their Optimum Distance Profiles"
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary optimal codes often contain optimal or near-optimal subcodes. In this paper we show that this is true for the family of self-dual codes. One approach is to compute the optimum distance profiles (ODPs) of linear codes, which was introduced by Luo, et. al. (2010). One of our main results is the development of general algorithms, called the Chain Algorithms, for finding ODPs of linear codes. Then we determine the ODPs for the Type II codes of lengths up to 24 and the extremal Type II codes of length 32, give a partial result of the ODP of the extended quadratic residue code $q_{48}$ of length 48. We also show that there does not exist a $[48,k,16]$ subcode of $q_{48}$ for $k \ge 17$, and we find a first example of a doubly-even self-complementary $[48, 16, 16]$ code.
[ { "version": "v1", "created": "Wed, 7 Mar 2012 16:34:21 GMT" }, { "version": "v2", "created": "Sun, 25 Mar 2012 18:53:04 GMT" }, { "version": "v3", "created": "Fri, 19 Oct 2012 02:40:07 GMT" }, { "version": "v4", "created": "Mon, 22 Oct 2012 14:49:58 GMT" } ]
2012-10-23T00:00:00
[ [ "Freibert", "Finley", "" ], [ "Kim", "Jon-Lark", "" ] ]
new_dataset
0.954572
1210.5541
Matthijs Ruijgrok
Matthijs Ruijgrok
A single-item continuous double auction game
37 pages, 15 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A double auction game with an infinite number of buyers and sellers is introduced. All sellers posses one unit of a good, all buyers desire to buy one unit. Each seller and each buyer has a private valuation of the good. The distribution of the valuations define supply and demand functions. One unit of the good is auctioned. At successive, discrete time instances, a player is randomly selected to make a bid (buyer) or an ask (seller). When the maximum of the bids becomes larger than the minimum of the asks, a transaction occurs and the auction is closed. The players have to choose the value of their bid or ask before the auction starts and use this value when they are selected. Assuming that the supply and demand functions are known, expected profits as functions of the strategies are derived, as well as expected transaction prices. It is shown that for linear supply and demand functions, there exists at most one Bayesian Nash equilibrium. Competitive behaviour is not an equilibrium of the game. For linear supply and demand functions, the sum of the expected profit of the sellers and the buyers is the same for the Bayesian Nash equilibrium and the market where players behave competitively. Connections are made with the ZI-C traders model and the $k$-double auction.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 21:25:39 GMT" } ]
2012-10-23T00:00:00
[ [ "Ruijgrok", "Matthijs", "" ] ]
new_dataset
0.99425
1210.5701
Juraj Stacho
Mathew Francis, Pavol Hell, Juraj Stacho
Obstructions to chordal circular-arc graphs of small independence number
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A blocking quadruple (BQ) is a quadruple of vertices of a graph such that any two vertices of the quadruple either miss (have no neighbours on) some path connecting the remaining two vertices of the quadruple, or are connected by some path missed by the remaining two vertices. This is akin to the notion of asteroidal triple used in the classical characterization of interval graphs by Lekkerkerker and Boland. We show that a circular-arc graph cannot have a blocking quadruple. We also observe that the absence of blocking quadruples is not in general sufficient to guarantee that a graph is a circular-arc graph. Nonetheless, it can be shown to be sufficient for some special classes of graphs, such as those investigated by Bonomo et al. In this note, we focus on chordal graphs, and study the relationship between the structure of chordal graphs and the presence/absence of blocking quadruples. Our contribution is two-fold. Firstly, we provide a forbidden induced subgraph characterization of chordal graphs without blocking quadruples. In particular, we observe that all the forbidden subgraphs are variants of the subgraphs forbidden for interval graphs. Secondly, we show that the absence of blocking quadruples is sufficient to guarantee that a chordal graph with no independent set of size five is a circular-arc graph. In our proof we use a novel geometric approach, constructing a circular-arc representation by traversing around a carefully chosen clique tree.
[ { "version": "v1", "created": "Sun, 21 Oct 2012 07:58:40 GMT" } ]
2012-10-23T00:00:00
[ [ "Francis", "Mathew", "" ], [ "Hell", "Pavol", "" ], [ "Stacho", "Juraj", "" ] ]
new_dataset
0.999104
1210.5888
Wojciech Mazurczyk
Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
Steganalysis of Transcoding Steganography
13 pages, 7 figures, 2 tables
null
null
null
cs.CR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TranSteg (Trancoding Steganography) is a fairly new IP telephony steganographic method that functions by compressing overt (voice) data to make space for the steganogram by means of transcoding. It offers high steganographic bandwidth, retains good voice quality and is generally harder to detect than other existing VoIP steganographic methods. In TranSteg, after the steganogram reaches the receiver, the hidden information is extracted and the speech data is practically restored to what was originally sent. This is a huge advantage compared with other existing VoIP steganographic methods, where the hidden data can be extracted and removed but the original data cannot be restored because it was previously erased due to a hidden data insertion process. In this paper we address the issue of steganalysis of TranSteg. Various TranSteg scenarios and possibilities of warden(s) localization are analyzed with regards to the TranSteg detection. A steganalysis method based on MFCC (Mel-Frequency Cepstral Coefficients) parameters and GMMs (Gaussian Mixture Models) was developed and tested for various overt/covert codec pairs in a single warden scenario with double transcoding. The proposed method allowed for efficient detection of some codec pairs (e.g., G.711/G.729), whilst some others remained more resistant to detection (e.g., iLBC/AMR).
[ { "version": "v1", "created": "Mon, 22 Oct 2012 13:18:19 GMT" } ]
2012-10-23T00:00:00
[ [ "Janicki", "Artur", "" ], [ "Mazurczyk", "Wojciech", "" ], [ "Szczypiorski", "Krzysztof", "" ] ]
new_dataset
0.99874
1210.5913
Ikuesan R. Adeyemi Mr.
Ikuesan R. Adeyemi, Norafida Bt Ithnin
Bio-Thentic Card: Authentication concept for RFID Card
(IJCSIS) International Journal of Computer Science and Information Security 2012
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query or interrogation irrespective of "Who" holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is classified as an unauthorized use of Card, and it forms the bedrock for RFID Card compromise especially in access control. As an on-card authentication mechanism, this research proposed a concept termed Bio-Thentic Card, which can be adopted to prevent this single point of failure of RFID Card. The Bio-Thentic Card was fabricated, tested and assessed in line with the known threats, and attacks; and it was observed to proffer substantive solution to unauthorized use of RFID Card vulnerability
[ { "version": "v1", "created": "Fri, 5 Oct 2012 05:09:45 GMT" } ]
2012-10-23T00:00:00
[ [ "Adeyemi", "Ikuesan R.", "" ], [ "Ithnin", "Norafida Bt", "" ] ]
new_dataset
0.983641
1210.5935
Scherer Gabriel
Gabriel Scherer (INRIA Rocquencourt), Didier R\'emy (INRIA Rocquencourt)
GADT meet Subtyping
No. RR-8114 (2012)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While generalized abstract datatypes (GADT) are now considered well-understood, adding them to a language with a notion of subtyping comes with a few surprises. What does it mean for a GADT parameter to be covariant? The answer turns out to be quite subtle. It involves fine-grained properties of the subtyping relation that raise interesting design questions. We allow variance annotations in GADT definitions, study their soundness, and present a sound and complete algorithm to check them. Our work may be applied to real-world ML-like languages with explicit subtyping such as OCaml, or to languages with general subtyping constraints.
[ { "version": "v1", "created": "Mon, 22 Oct 2012 15:36:56 GMT" } ]
2012-10-23T00:00:00
[ [ "Scherer", "Gabriel", "", "INRIA Rocquencourt" ], [ "Rémy", "Didier", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.983616
1210.5946
Roberto Maieli
Roberto Maieli
Bipolar Proof Nets for MALL
Proceedings of the "Proof, Computation, Complexity" International Workshop, 17-18 August 2012, University of Copenhagen, Denmark
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present a computation paradigm based on a concurrent and incremental construction of proof nets (de-sequentialized or graphical proofs) of the pure multiplicative and additive fragment of Linear Logic, a resources conscious refinement of Classical Logic. Moreover, we set a correspon- dence between this paradigm and those more pragmatic ones inspired to transactional or distributed systems. In particular we show that the construction of additive proof nets can be interpreted as a model for super-ACID (or co-operative) transactions over distributed transactional systems (typi- cally, multi-databases).
[ { "version": "v1", "created": "Mon, 22 Oct 2012 16:11:55 GMT" } ]
2012-10-23T00:00:00
[ [ "Maieli", "Roberto", "" ] ]
new_dataset
0.978335
1210.5973
Zungeru Adamu Murtala
A. M. Zungeru, J. G. Kolo, I. Olumide
A Simple and Reliable Touch Sensitive Security System
17 Pages, 7 Figures, Journal Publication
International Journal of Network Security & Its Applications (IJNSA), vol. 4, issue 5, pp. 149-169, 2012
10.5121/ijnsa.2012.4512
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research focuses on detection of unauthorized access to residential and commercial buildings when the residents are far away from the access gate of the house. The system is a simple and reliable touch activated security system and uses sensor technology to revolutionize the standards of living. The system provides a best solution to most of the problems faced by house owners in their daily life. Due to its simple electronic components nature, it is more adaptable and cost-effective. The system is divided into three units; the power supply unit which employs the use of both DC battery and mains supply to ensure constant power supply to the circuit, the trigger unit which is responsible for activating the alarm unit and designed to have much time and period and moderate sensitivity in order to reduce the rate of false alarm, and the alarm amplitude unit which main function is to produce amplitude alarm sound when triggered by the trigger unit with the aim of producing a large audible sound that can alert the entire neighborhood or scare an intruder away. The design of the system was achieved by considering some factors such as economy, availability of components and research materials, efficiency, compatibility and portability and also durability in the design process. The performance of the system after test met design specifications. This system works on the principle of touch sensor. The general operation of the system and performance is dependent on the presence of an intruder entering through the door and touching any part of the door. The overall system was constructed and tested and it work perfectly.
[ { "version": "v1", "created": "Wed, 10 Oct 2012 12:53:25 GMT" } ]
2012-10-23T00:00:00
[ [ "Zungeru", "A. M.", "" ], [ "Kolo", "J. G.", "" ], [ "Olumide", "I.", "" ] ]
new_dataset
0.963093
1210.5975
Tasha Frankie
Tasha Frankie, Gordon Hughes, Ken Kreutz-Delgado
Solid State Disk Object-Based Storage with Trim Commands
null
null
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a model of NAND flash SSD utilization and write amplification when the ATA/ATAPI SSD Trim command is incorporated into object-based storage under a variety of user workloads, including a uniform random workload with objects of fixed size and a uniform random workload with objects of varying sizes. We first summarize the existing models for write amplification in SSDs for workloads with and without the Trim command, then propose an alteration of the models that utilizes a framework of object-based storage. The utilization of objects and pages in the SSD is derived, with the analytic results compared to simulation. Finally, the effect of objects on write amplification and its computation is discussed along with a potential application to optimization of SSD usage through object storage metadata servers that allocate object classes of distinct object size.
[ { "version": "v1", "created": "Wed, 10 Oct 2012 18:02:33 GMT" } ]
2012-10-23T00:00:00
[ [ "Frankie", "Tasha", "" ], [ "Hughes", "Gordon", "" ], [ "Kreutz-Delgado", "Ken", "" ] ]
new_dataset
0.99655
1209.2086
Donglin Hu
Donglin Hu and Shiwen Mao
On Cooperative Relay Networks with Video Applications
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the problem of cooperative relay in CR networks for further enhanced network performance. In particular, we focus on the two representative cooperative relay strategies, and develop optimal spectrum sensing and $p$-Persistent CSMA for spectrum access. Then, we study the problem of cooperative relay in CR networks for video streaming. We incorporate interference alignment to allow transmitters collaboratively send encoded signals to all CR users. In the cases of a single licensed channel and multiple licensed channels with channel bonding, we develop an optimal distributed algorithm with proven convergence and convergence speed. In the case of multiple channels without channel bonding, we develop a greedy algorithm with bounded performance.
[ { "version": "v1", "created": "Mon, 10 Sep 2012 18:38:07 GMT" }, { "version": "v2", "created": "Fri, 19 Oct 2012 19:43:03 GMT" } ]
2012-10-22T00:00:00
[ [ "Hu", "Donglin", "" ], [ "Mao", "Shiwen", "" ] ]
new_dataset
0.987248
1210.5287
Amit Sahai
Amit Sahai and Brent Waters
Attribute-Based Encryption for Circuits from Multilinear Maps
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 00:14:59 GMT" } ]
2012-10-22T00:00:00
[ [ "Sahai", "Amit", "" ], [ "Waters", "Brent", "" ] ]
new_dataset
0.966624
1210.5321
Koji Ohnishi
Koji Ohnishi
The origin of Mayan languages from Formosan language group of Austronesian
6 pages, 1 Table. Proceedings of the 145th Annual Meeting of the Linguistic Society of Japan
null
null
null
cs.CL q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Basic body-part names (BBPNs) were defined as body-part names in Swadesh basic 200 words. Non-Mayan cognates of Mayan (MY) BBPNs were extensively searched for, by comparing with non-MY vocabulary, including ca.1300 basic words of 82 AN languages listed by Tryon (1985), etc. Thus found cognates (CGs) in non-MY are listed in Table 1, as classified by language groups to which most similar cognates (MSCs) of MY BBPNs belong. CGs of MY are classified to 23 mutually unrelated CG-items, of which 17.5 CG-items have their MSCs in Austronesian (AN), giving its closest similarity score (CSS), CSS(AN) = 17.5, which consists of 10.33 MSCs in Formosan, 1.83 MSCs in Western Malayo-Polynesian (W.MP), 0.33 in Central MP, 0.0 in SHWNG, and 5.0 in Oceanic [i.e., CSS(FORM)= 10.33, CSS(W.MP) = 1.88, ..., CSS(OC)= 5.0]. These CSSs for language (sub)groups are also listed in the underline portion of every section of (Section1 - Section 6) in Table 1. Chi-squar test (degree of freedom = 1) using [Eq 1] and [Eqs.2] revealed that MSCs of MY BBPNs are distributed in Formosan in significantly higher frequency (P < 0.001) than in other subgroups of AN, as well as than in non-AN languages. MY is thus concluded to have been derived from Formosan of AN. Eskimo shows some BBPN similarities to FORM and MY.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 05:50:58 GMT" } ]
2012-10-22T00:00:00
[ [ "Ohnishi", "Koji", "" ] ]
new_dataset
0.999777
1210.5363
Micha{\l} Pilipczuk
Micha{\l} Pilipczuk
Computing cutwidth and pathwidth of semi-complete digraphs via degree orderings
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notions of cutwidth and pathwidth of digraphs play a central role in the containment theory for tournaments, or more generally semi-complete digraphs, developed in a recent series of papers by Chudnovsky, Fradkin, Kim, Scott, and Seymour [2, 3, 4, 8, 9, 11]. In this work we introduce a new approach to computing these width measures on semi-complete digraphs, via degree orderings. Using the new technique we are able to reprove the main results of [2, 9] in a unified and significantly simplified way, as well as obtain new results. First, we present polynomial-time approximation algorithms for both cutwidth and pathwidth, faster and simpler than the previously known ones; the most significant improvement is in case of pathwidth, where instead of previously known O(OPT)-approximation in fixed-parameter tractable time [6] we obtain a constant-factor approximation in polynomial time. Secondly, by exploiting the new set of obstacles for cutwidth and pathwidth, we show that topological containment and immersion in semi-complete digraphs can be tested in single-exponential fixed-parameter tractable time. Finally, we present how the new approach can be used to obtain exact fixed-parameter tractable algorithms for cutwidth and pathwidth, with single- exponential running time dependency on the optimal width.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 09:44:21 GMT" } ]
2012-10-22T00:00:00
[ [ "Pilipczuk", "Michał", "" ] ]
new_dataset
0.996279
1210.5454
Mina Guirguis
Mina Guirguis and George Atia
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion
null
null
null
null
cs.NI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization. Due to the vulnerable nature of wireless communication against interference and intentional jamming, ITS face new challenges to ensure the reliability and the safety of the overall system. In this paper, we expose a class of stealthy attacks -- Stuck in Traffic (SiT) attacks -- that aim to cause congestion by exploiting how drivers make decisions based on smart traffic signs. An attacker mounting a SiT attack solves a Markov Decision Process problem to find optimal/suboptimal attack policies in which he/she interferes with a well-chosen subset of signals that are based on the state of the system. We apply Approximate Policy Iteration (API) algorithms to derive potent attack policies. We evaluate their performance on a number of systems and compare them to other attack policies including random, myopic and DoS attack policies. The generated policies, albeit suboptimal, are shown to significantly outperform other attack policies as they maximize the expected cumulative reward from the standpoint of the attacker.
[ { "version": "v1", "created": "Fri, 19 Oct 2012 15:48:54 GMT" } ]
2012-10-22T00:00:00
[ [ "Guirguis", "Mina", "" ], [ "Atia", "George", "" ] ]
new_dataset
0.997479
1208.2724
Monik Khare
Monik Khare, Neal E. Young
Caching with rental cost and zapping
Caching with rental cost, caching with zapping
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The \emph{file caching} problem is defined as follows. Given a cache of size $k$ (a positive integer), the goal is to minimize the total retrieval cost for the given sequence of requests to files. A file $f$ has size $size(f)$ (a positive integer) and retrieval cost $cost(f)$ (a non-negative number) for bringing the file into the cache. A \emph{miss} or \emph{fault} occurs when the requested file is not in the cache and the file has to be retrieved into the cache by paying the retrieval cost, and some other file may have to be removed (\emph{evicted}) from the cache so that the total size of the files in the cache does not exceed $k$. We study the following variants of the online file caching problem. \textbf{\emph{Caching with Rental Cost} (or \emph{Rental Caching})}: There is a rental cost $\lambda$ (a positive number) for each file in the cache at each time unit. The goal is to minimize the sum of the retrieval costs and the rental costs. \textbf{\emph{Caching with Zapping}}: A file can be \emph{zapped} by paying a zapping cost $N \ge 1$. Once a file is zapped, all future requests of the file don't incur any cost. The goal is to minimize the sum of the retrieval costs and the zapping costs. We study these two variants and also the variant which combines these two (rental caching with zapping). We present deterministic lower and upper bounds in the competitive-analysis framework. We study and extend the online covering algorithm from \citep{young02online} to give deterministic online algorithms. We also present randomized lower and upper bounds for some of these problems.
[ { "version": "v1", "created": "Mon, 13 Aug 2012 22:49:00 GMT" }, { "version": "v2", "created": "Wed, 15 Aug 2012 05:07:27 GMT" }, { "version": "v3", "created": "Thu, 23 Aug 2012 18:26:43 GMT" }, { "version": "v4", "created": "Tue, 4 Sep 2012 19:27:13 GMT" }, { "version": "v5", "created": "Thu, 18 Oct 2012 19:05:01 GMT" } ]
2012-10-19T00:00:00
[ [ "Khare", "Monik", "" ], [ "Young", "Neal E.", "" ] ]
new_dataset
0.997097
1210.4850
Raja Hafiz Affandi
Raja Hafiz Affandi, Alex Kulesza, Emily B. Fox
Markov Determinantal Point Processes
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
null
null
UAI-P-2012-PG-26-35
cs.LG cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A determinantal point process (DPP) is a random process useful for modeling the combinatorial problem of subset selection. In particular, DPPs encourage a random subset Y to contain a diverse set of items selected from a base set Y. For example, we might use a DPP to display a set of news headlines that are relevant to a user's interests while covering a variety of topics. Suppose, however, that we are asked to sequentially select multiple diverse sets of items, for example, displaying new headlines day-by-day. We might want these sets to be diverse not just individually but also through time, offering headlines today that are unlike the ones shown yesterday. In this paper, we construct a Markov DPP (M-DPP) that models a sequence of random sets {Yt}. The proposed M-DPP defines a stationary process that maintains DPP margins. Crucially, the induced union process Zt = Yt u Yt-1 is also marginally DPP-distributed. Jointly, these properties imply that the sequence of random sets are encouraged to be diverse both at a given time step as well as across time steps. We describe an exact, efficient sampling procedure, and a method for incrementally learning a quality measure over items in the base set Y based on external preferences. We apply the M-DPP to the task of sequentially displaying diverse and relevant news articles to a user with topic preferences.
[ { "version": "v1", "created": "Tue, 16 Oct 2012 17:35:39 GMT" } ]
2012-10-19T00:00:00
[ [ "Affandi", "Raja Hafiz", "" ], [ "Kulesza", "Alex", "" ], [ "Fox", "Emily B.", "" ] ]
new_dataset
0.999484
1210.4874
Hoong Chuin Lau
Hoong Chuin Lau, William Yeoh, Pradeep Varakantham, Duc Thien Nguyen, Huaxing Chen
Dynamic Stochastic Orienteering Problems for Risk-Aware Applications
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
null
null
UAI-P-2012-PG-448-458
cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orienteering problems (OPs) are a variant of the well-known prize-collecting traveling salesman problem, where the salesman needs to choose a subset of cities to visit within a given deadline. OPs and their extensions with stochastic travel times (SOPs) have been used to model vehicle routing problems and tourist trip design problems. However, they suffer from two limitations travel times between cities are assumed to be time independent and the route provided is independent of the risk preference (with respect to violating the deadline) of the user. To address these issues, we make the following contributions: We introduce (1) a dynamic SOP (DSOP) model, which is an extension of SOPs with dynamic (time-dependent) travel times; (2) a risk-sensitive criterion to allow for different risk preferences; and (3) a local search algorithm to solve DSOPs with this risk-sensitive criterion. We evaluated our algorithms on a real-world dataset for a theme park navigation problem as well as synthetic datasets employed in the literature.
[ { "version": "v1", "created": "Tue, 16 Oct 2012 17:42:27 GMT" } ]
2012-10-19T00:00:00
[ [ "Lau", "Hoong Chuin", "" ], [ "Yeoh", "William", "" ], [ "Varakantham", "Pradeep", "" ], [ "Nguyen", "Duc Thien", "" ], [ "Chen", "Huaxing", "" ] ]
new_dataset
0.997369
1201.4871
Alexander Heu{\ss}ner
Gilles Geeraerts and Alexander Heu{\ss}ner and Jean-Fran\c{c}ois Raskin
Queue-Dispatch Asynchronous Systems
38 pages, submitted for publication
null
null
null
cs.LO cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To make the development of efficient multi-core applications easier, libraries, such as Grand Central Dispatch, have been proposed. When using such a library, the programmer writes so-called blocks, which are chunks of codes, and dispatches them, using synchronous or asynchronous calls, to several types of waiting queues. A scheduler is then responsible for dispatching those blocks on the available cores. Blocks can synchronize via a global memory. In this paper, we propose Queue-Dispatch Asynchronous Systems as a mathematical model that faithfully formalizes the synchronization mechanisms and the behavior of the scheduler in those systems. We study in detail their relationships to classical formalisms such as pushdown systems, Petri nets, fifo systems, and counter systems. Our main technical contributions are precise worst-case complexity results for the Parikh coverability problem for several subclasses of our model.
[ { "version": "v1", "created": "Mon, 23 Jan 2012 21:19:03 GMT" }, { "version": "v2", "created": "Mon, 16 Apr 2012 15:28:10 GMT" }, { "version": "v3", "created": "Wed, 17 Oct 2012 07:00:58 GMT" } ]
2012-10-18T00:00:00
[ [ "Geeraerts", "Gilles", "" ], [ "Heußner", "Alexander", "" ], [ "Raskin", "Jean-François", "" ] ]
new_dataset
0.999388
1210.4644
Yashpal Singh Mr
Yashpal Singh, Kapil Gulati and S. Niranjan ((1) Mewar University, Rajasthan, (2) BITS College of Engg, Bhiwani, Haryana, (3) PDM College of Engg, Bahadurgarh)
Dimensions and issues of mobile agent technology
11 pages, 6 figure
International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.5, 2012, 51-61
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile Agent is a type of software system which acts "intelligently" on one's behalf with the feature of autonomy, learning ability and most importantly mobility. Now mobile agents are gaining interest in the research community. In this article mobile agents will be addressed as tools for mobile computing. Mobile agents have been used in applications ranging from network management to information management. We present mobile agent concept, characteristics, classification, need, applications and technical constraints in the mobile technology. We also provide a brief case study about how mobile agent is used for information retrieval.
[ { "version": "v1", "created": "Wed, 17 Oct 2012 06:52:04 GMT" } ]
2012-10-18T00:00:00
[ [ "Singh", "Yashpal", "" ], [ "Gulati", "Kapil", "" ], [ "Niranjan", "S.", "" ] ]
new_dataset
0.985494
1210.4661
Jose Oliveira
Jose N. Oliveira
Functions as types or the "Hoare logic" of functional dependencies
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by the trend on unifying theories of programming, this paper shows how the algebraic treatment of standard data dependency theory equips relational data with functional types and an associated type system which is useful for type checking database operations and for query optimization. Such a typed approach to database programming is then shown to be of the same family as other programming logics such as eg. Hoare logic or that of strongest invariant functions which has been used in the analysis of while statements. The prospect of using automated deduction systems such as Prover9 for type-checking and query optimization on top of such an algebraic approach is considered.
[ { "version": "v1", "created": "Wed, 17 Oct 2012 08:07:46 GMT" } ]
2012-10-18T00:00:00
[ [ "Oliveira", "Jose N.", "" ] ]
new_dataset
0.972478
1210.4791
Callum James Corbett
Roger A. Sauer and Thang X. Duong and Callum J. Corbett
A computational formulation for constrained solid and liquid membranes considering isogeometric finite elements
null
null
null
null
cs.CE physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A geometrically exact membrane formulation is presented that is based on curvilinear coordinates and isogeometric finite elements, and is suitable for both solid and liquid membranes. The curvilinear coordinate system is used to describe both the theory and the finite element equations of the membrane. In the latter case this avoids the use of local cartesian coordinates at the element level. Consequently, no transformation of derivatives is required. The formulation considers a split of the in-plane and out-of-plane membrane contributions, which allows the construction of a stable formulation for liquid membranes with constant surface tension. The proposed membrane formulation is general, and accounts for dead and live loading, as well as enclosed volume, area, and contact constraints. The new formulation is illustrated by several challenging examples, considering linear and quadratic Lagrange elements, as well as isogeometric elements based on quadratic NURBS and cubic T-splines. It is seen that the isogeometric elements are much more accurate than standard Lagrange elements. The gain is especially large for the liquid membrane formulation since it depends explicitly on the surface curvature.
[ { "version": "v1", "created": "Wed, 17 Oct 2012 16:45:52 GMT" } ]
2012-10-18T00:00:00
[ [ "Sauer", "Roger A.", "" ], [ "Duong", "Thang X.", "" ], [ "Corbett", "Callum J.", "" ] ]
new_dataset
0.966604
1210.4416
Giovanni Marro
Giovanni Marro
A Direct Proof of a Theorem Concerning Singular Hamiltonian Systems
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This technical report presents a direct proof of Theorem~1 in [1] and some consequences that also account for (20) in [1]. This direct proof exploits a state space change of basis which replaces the coupled difference equations (10) in [1] with two equivalent difference equations which, instead, are decoupled.
[ { "version": "v1", "created": "Tue, 16 Oct 2012 14:07:24 GMT" } ]
2012-10-17T00:00:00
[ [ "Marro", "Giovanni", "" ] ]
new_dataset
0.969019
1210.4517
Konstantinos Pelechrinis
Konstantinos Pelechrinis, Prashant Krishnamurthy, Ke Zhang
Gaming the Game: Honeypot Venues Against Cheaters in Location-based Social Networks
Preprint - ACM HotMobile Submission
null
null
null
cs.SI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation of location-based social networks (LBSNs) has provided the community with an abundant source of information that can be exploited and used in many different ways. LBSNs offer a number of conveniences to its participants, such as - but not limited to - a list of places in the vicinity of a user, recommendations for an area never explored before provided by other peers, tracking of friends, monetary rewards in the form of special deals from the venues visited as well as a cheap way of advertisement for the latter. However, service convenience and security have followed disjoint paths in LBSNs and users can misuse the offered features. The major threat for the service providers is that of fake check-ins. Users can easily manipulate the localization module of the underlying application and declare their presence in a counterfeit location. The incentives for these behaviors can be both earning monetary as well as virtual rewards. Therefore, while fake check-ins driven from the former motive can cause monetary losses, those aiming in virtual rewards are also harmful. In particular, they can significantly degrade the services offered from the LBSN providers (such as recommendations) or third parties using these data (e.g., urban planners). In this paper, we propose and analyze a honeypot venue-based solution, enhanced with a challenge-response scheme, that flags users who are generating fake spatial information. We believe that our work will stimulate further research on this important topic and will provide new directions with regards to possible solutions.
[ { "version": "v1", "created": "Tue, 16 Oct 2012 18:29:05 GMT" } ]
2012-10-17T00:00:00
[ [ "Pelechrinis", "Konstantinos", "" ], [ "Krishnamurthy", "Prashant", "" ], [ "Zhang", "Ke", "" ] ]
new_dataset
0.97441
1207.3807
Hao-Hsiang Hung
Hao-Hsiang Hung
Light Spanner and Monotone Tree
arXiv admin note: text overlap with arXiv:1104.4669
null
10.1007/978-3-642-32589-2_42
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
In approximation algorithm design, light spanners has applications in graph-metric problems such as metric TSP (the traveling salesman problem). We have developed an efficient algorithm for light spanners in bounded pathwidth graphs, based on an intermediate data structure called monotone tree. In this paper, we extended the results to include bounded catwidth graphs.
[ { "version": "v1", "created": "Mon, 16 Jul 2012 20:01:55 GMT" } ]
2012-10-16T00:00:00
[ [ "Hung", "Hao-Hsiang", "" ] ]
new_dataset
0.985976
1210.3729
Tanmoy Chakraborty
Tanmoy Chakraborty and Sivaji Bandyopadhyay
Inference of Fine-grained Attributes of Bengali Corpus for Stylometry Detection
5 pages, 2 figures, 4 tables. arXiv admin note: substantial text overlap with arXiv:1208.6268
Polibits (44) 2011, pp. 79-83
null
null
cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stylometry, the science of inferring characteristics of the author from the characteristics of documents written by that author, is a problem with a long history and belongs to the core task of Text categorization that involves authorship identification, plagiarism detection, forensic investigation, computer security, copyright and estate disputes etc. In this work, we present a strategy for stylometry detection of documents written in Bengali. We adopt a set of fine-grained attribute features with a set of lexical markers for the analysis of the text and use three semi-supervised measures for making decisions. Finally, a majority voting approach has been taken for final classification. The system is fully automatic and language-independent. Evaluation results of our attempt for Bengali author's stylometry detection show reasonably promising accuracy in comparison to the baseline model.
[ { "version": "v1", "created": "Sat, 13 Oct 2012 18:02:26 GMT" } ]
2012-10-16T00:00:00
[ [ "Chakraborty", "Tanmoy", "" ], [ "Bandyopadhyay", "Sivaji", "" ] ]
new_dataset
0.991246
1210.3943
Rodolfo Baggio
Rodolfo Baggio and Giacomo Del Chiappa
Tourism destinations as digital business ecosystems
9 pages, 3 figures, 2 tables; accepted for publication in the proceedings of: ENTER2013: 20th International Conference on Information Technology and Travel and Tourism, January 23-25, 2013, Innsbruck (Austria)
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tourism has been experiencing very relevant changes since when Information and Communication Technologies (ICTs), in all their forms, have started to pervade the industry and the market. In the last decade, a new concept gained the attention of both researchers and practitioners, that of Digital Business Ecosystem (DBE). It can be considered as a technological infrastructure aimed at creating a digital environment to support and enhance networking between enterprises and stakeholders operating within a sector. Aim of this paper is to assess the extent to which the technological connection has affected the structural configuration of the tourism system and, specifically, of tourism destinations. The present study argues that two components can be considered when assessing the relationships among stakeholders within a tourism destination: a real and a virtual one. Further it shows how these two components are structurally strongly coupled and co-evolve forming a single system.
[ { "version": "v1", "created": "Mon, 15 Oct 2012 09:00:57 GMT" } ]
2012-10-16T00:00:00
[ [ "Baggio", "Rodolfo", "" ], [ "Del Chiappa", "Giacomo", "" ] ]
new_dataset
0.977249
1210.4006
Maayan Harel Maayan Harel
Maayan Harel and Shie Mannor
The Perturbed Variation
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new discrepancy score between two distributions that gives an indication on their similarity. While much research has been done to determine if two samples come from exactly the same distribution, much less research considered the problem of determining if two finite samples come from similar distributions. The new score gives an intuitive interpretation of similarity; it optimally perturbs the distributions so that they best fit each other. The score is defined between distributions, and can be efficiently estimated from samples. We provide convergence bounds of the estimated score, and develop hypothesis testing procedures that test if two data sets come from similar distributions. The statistical power of this procedures is presented in simulations. We also compare the score's capacity to detect similarity with that of other known measures on real data.
[ { "version": "v1", "created": "Mon, 15 Oct 2012 12:43:03 GMT" } ]
2012-10-16T00:00:00
[ [ "Harel", "Maayan", "" ], [ "Mannor", "Shie", "" ] ]
new_dataset
0.995151
1210.3491
Joydeep Basu
Joydeep Basu and Tarun K. Bhattacharyya
Microelectromechanical system cantilever-based frequency doublers
The final, definitive version of this paper has been published in Journal of Intelligent Material Systems and Structures, 2012 by SAGE Publications Ltd. (http://online.sagepub.com), All rights reserved. Journal of Intelligent Material Systems and Structures, 2012
null
10.1177/1045389X12461695
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for high frequency signal processing circuits like reference oscillators and filters. This is due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption, low cost batch fabrication etc. A capacitively transduced cantilever beam resonator is one such popular MEMS resonator topology. In this letter, the inherent square-law nonlinearity of the voltage-to-force transfer function of a cantilever resonator's capacitive transducer has been employed for the realization of frequency doubling effect. Using this concept, frequency doubling of input signals of 500 kHz to 1 MHz, and 227.5 kHz to 455 kHz has been experimentally demonstrated for two cantilever beams of length 51.75 and 76.75 micrometer respectively. The MEMS cantilevers have been fabricated with polysilicon using the PolyMUMPs surface micromachining process, and their testing has been performed using Laser Doppler Vibrometry. The test results obtained are in reasonable compliance with the analytical and CoventorWare finite-element simulation results. The high efficiency demonstrated by the cantilever frequency doubler makes it a promising choice for signal generation at high frequencies.
[ { "version": "v1", "created": "Fri, 12 Oct 2012 12:27:11 GMT" } ]
2012-10-15T00:00:00
[ [ "Basu", "Joydeep", "" ], [ "Bhattacharyya", "Tarun K.", "" ] ]
new_dataset
0.979611
1210.3597
Francois Pellegrini
Fran\c{c}ois Pellegrini (LaBRI, INRIA Bordeaux - Sud-Ouest), S\'ebastien Canevet (CERSA)
Le droit du num\'erique : une histoire \`a pr\'eserver
No. RR-8100 (2012)
null
null
null
cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the history of informatics is recent, this field poses unusual problems with respect to its preservation. These problems are amplified by legal issues, digital law being in itself a subject matter whose history is also worth presenting in a computer science museum. The purpose of this paper is to present a quick overview of the evolution of law regarding digital matters, from an historical perspective as well as with respect to the preservation and presentation of the works.
[ { "version": "v1", "created": "Fri, 12 Oct 2012 18:48:58 GMT" } ]
2012-10-15T00:00:00
[ [ "Pellegrini", "François", "", "LaBRI, INRIA Bordeaux - Sud-Ouest" ], [ "Canevet", "Sébastien", "", "CERSA" ] ]
new_dataset
0.997966
1207.5720
Tomasz Rutkowski
Tomasz M. Rutkowski, Hiromu Mori, Yoshihiro Matsumoto, Zhenyu Cai, Moonjeong Chang, Nozomu Nishikawa, Shoji Makino, and Koichi Mori
Haptic BCI Paradigm based on Somatosensory Evoked Potential
2 pages, 1 figure
null
null
null
cs.HC q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new concept and an online prototype of haptic BCI paradigm are presented. Our main goal is to develop a new, alternative and low cost paradigm, with open-source hardware and software components. We also report results obtained with the novel dry EEG electrodes based signal acquisition system by g.tec, which further improves experimental comfort. We address the following points: a novel application of the BCI; a new methodological approach used compared to earlier projects; a new benefit for potential users of a BCI; the approach working online/in real-time; development of a novel stimuli delivery hardware and software. The results with five healthy subjects and discussion of future developments conclude this submission.
[ { "version": "v1", "created": "Tue, 24 Jul 2012 15:05:50 GMT" }, { "version": "v2", "created": "Fri, 27 Jul 2012 08:49:54 GMT" }, { "version": "v3", "created": "Mon, 30 Jul 2012 10:21:31 GMT" }, { "version": "v4", "created": "Tue, 31 Jul 2012 06:10:36 GMT" }, { "version": "v5", "created": "Thu, 23 Aug 2012 13:24:59 GMT" }, { "version": "v6", "created": "Thu, 11 Oct 2012 02:45:58 GMT" } ]
2012-10-12T00:00:00
[ [ "Rutkowski", "Tomasz M.", "" ], [ "Mori", "Hiromu", "" ], [ "Matsumoto", "Yoshihiro", "" ], [ "Cai", "Zhenyu", "" ], [ "Chang", "Moonjeong", "" ], [ "Nishikawa", "Nozomu", "" ], [ "Makino", "Shoji", "" ], [ "Mori", "Koichi", "" ] ]
new_dataset
0.998541
1210.3115
EPTCS
Robbert Krebbers (Radboud University Nijmegen)
A call-by-value lambda-calculus with lists and control
In Proceedings CL&C 2012, arXiv:1210.2890
EPTCS 97, 2012, pp. 19-33
10.4204/EPTCS.97.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Calculi with control operators have been studied to reason about control in programming languages and to interpret the computational content of classical proofs. To make these calculi into a real programming language, one should also include data types. As a step into that direction, this paper defines a simply typed call-by-value lambda calculus with the control operators catch and throw, a data type of lists, and an operator for primitive recursion (a la Goedel's T). We prove that our system satisfies subject reduction, progress, confluence for untyped terms, and strong normalization for well-typed terms.
[ { "version": "v1", "created": "Thu, 11 Oct 2012 03:52:15 GMT" } ]
2012-10-12T00:00:00
[ [ "Krebbers", "Robbert", "", "Radboud University Nijmegen" ] ]
new_dataset
0.987836
1210.3312
Juan Manuel Torres Moreno
Juan-Manuel Torres-Moreno
Artex is AnotheR TEXt summarizer
11 pages, 5 figures. arXiv admin note: substantial text overlap with arXiv:1209.3126
null
null
null
cs.IR cs.AI cs.CL
http://creativecommons.org/licenses/by/3.0/
This paper describes Artex, another algorithm for Automatic Text Summarization. In order to rank sentences, a simple inner product is calculated between each sentence, a document vector (text topic) and a lexical vector (vocabulary used by a sentence). Summaries are then generated by assembling the highest ranked sentences. No ruled-based linguistic post-processing is necessary in order to obtain summaries. Tests over several datasets (coming from Document Understanding Conferences (DUC), Text Analysis Conferences (TAC), evaluation campaigns, etc.) in French, English and Spanish have shown that summarizer achieves interesting results.
[ { "version": "v1", "created": "Thu, 11 Oct 2012 18:21:01 GMT" } ]
2012-10-12T00:00:00
[ [ "Torres-Moreno", "Juan-Manuel", "" ] ]
new_dataset
0.999558
1210.2951
Georg Regensburger
Anja Korporal, Georg Regensburger, Markus Rosenkranz
Regular and Singular Boundary Problems in Maple
14 pages; Berlin/Heidelberg, Springer
Computer Algebra in Scientific Computing (CASC 2011), LNCS 6885, pp. 280-293, 2011
10.1007/978-3-642-23568-9_22
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new Maple package for treating boundary problems for linear ordinary differential equations, allowing two-/multipoint as well as Stieltjes boundary conditions. For expressing differential operators, boundary conditions, and Green's operators, we employ the algebra of integro-differential operators. The operations implemented for regular boundary problems include computing Green's operators as well as composing and factoring boundary problems. Our symbolic approach to singular boundary problems is new; it provides algorithms for computing compatibility conditions and generalized Green's operators.
[ { "version": "v1", "created": "Wed, 10 Oct 2012 15:13:55 GMT" } ]
2012-10-11T00:00:00
[ [ "Korporal", "Anja", "" ], [ "Regensburger", "Georg", "" ], [ "Rosenkranz", "Markus", "" ] ]
new_dataset
0.999062
1210.2453
EPTCS
Alessandro Solimando (University of Genova, Italy), Giorgio Delzanno (University of Genova, Italy), Giovanna Guerrini (University of Genova, Italy)
Automata-based Static Analysis of XML Document Adaptation
In Proceedings GandALF 2012, arXiv:1210.2028
EPTCS 96, 2012, pp. 85-98
10.4204/EPTCS.96.7
null
cs.DB cs.DS cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The structure of an XML document can be optionally specified by means of XML Schema, thus enabling the exploitation of structural information for efficient document handling. Upon schema evolution, or when exchanging documents among different collections exploiting related but not identical schemas, the need may arise of adapting a document, known to be valid for a given schema S, to a target schema S'. The adaptation may require knowledge of the element semantics and cannot always be automatically derived. In this paper, we present an automata-based method for the static analysis of user-defined XML document adaptations, expressed as sequences of XQuery Update update primitives. The key feature of the method is the use of an automatic inference method for extracting the type, expressed as a Hedge Automaton, of a sequence of document updates. The type is computed starting from the original schema S and from rewriting rules that formally define the operational semantics of a sequence of document updates. Type inclusion can then be used as conformance test w.r.t. the type extracted from the target schema S'.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 00:53:46 GMT" } ]
2012-10-10T00:00:00
[ [ "Solimando", "Alessandro", "", "University of Genova, Italy" ], [ "Delzanno", "Giorgio", "", "University of Genova, Italy" ], [ "Guerrini", "Giovanna", "", "University of Genova,\n Italy" ] ]
new_dataset
0.975136
1210.2456
EPTCS
Ricardo Almeida, Sabine Broda, Nelma Moreira
Deciding KAT and Hoare Logic with Derivatives
In Proceedings GandALF 2012, arXiv:1210.2028
EPTCS 96, 2012, pp. 127-140
10.4204/EPTCS.96.10
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kleene algebra with tests (KAT) is an equational system for program verification, which is the combination of Boolean algebra (BA) and Kleene algebra (KA), the algebra of regular expressions. In particular, KAT subsumes the propositional fragment of Hoare logic (PHL) which is a formal system for the specification and verification of programs, and that is currently the base of most tools for checking program correctness. Both the equational theory of KAT and the encoding of PHL in KAT are known to be decidable. In this paper we present a new decision procedure for the equivalence of two KAT expressions based on the notion of partial derivatives. We also introduce the notion of derivative modulo particular sets of equations. With this we extend the previous procedure for deciding PHL. Some experimental results are also presented.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 00:54:12 GMT" } ]
2012-10-10T00:00:00
[ [ "Almeida", "Ricardo", "" ], [ "Broda", "Sabine", "" ], [ "Moreira", "Nelma", "" ] ]
new_dataset
0.998837
1210.2457
EPTCS
Daniel Neider (RWTH Aachen University), Roman Rabinovich (RWTH Aachen University), Martin Zimmermann (RWTH Aachen University and University of Warsaw)
Down the Borel Hierarchy: Solving Muller Games via Safety Games
In Proceedings GandALF 2012, arXiv:1210.2028
EPTCS 96, 2012, pp. 169-182
10.4204/EPTCS.96.13
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We transform a Muller game with n vertices into a safety game with (n!)^3 vertices whose solution allows to determine the winning regions of the Muller game and to compute a finite-state winning strategy for one player. This yields a novel antichain-based memory structure and a natural notion of permissive strategies for Muller games. Moreover, we generalize our construction by presenting a new type of game reduction from infinite games to safety games and show its applicability to several other winning conditions.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 00:54:33 GMT" } ]
2012-10-10T00:00:00
[ [ "Neider", "Daniel", "", "RWTH Aachen University" ], [ "Rabinovich", "Roman", "", "RWTH Aachen\n University" ], [ "Zimmermann", "Martin", "", "RWTH Aachen University and University of\n Warsaw" ] ]
new_dataset
0.980806
1210.2462
EPTCS
Alex Kruckman (Berkeley University), Sasha Rubin (TU Vienna and IST Austria), John Sheridan, Ben Zax
A Myhill-Nerode theorem for automata with advice
In Proceedings GandALF 2012, arXiv:1210.2028
EPTCS 96, 2012, pp. 238-246
10.4204/EPTCS.96.18
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An automaton with advice is a finite state automaton which has access to an additional fixed infinite string called an advice tape. We refine the Myhill-Nerode theorem to characterize the languages of finite strings that are accepted by automata with advice. We do the same for tree automata with advice.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 00:55:28 GMT" } ]
2012-10-10T00:00:00
[ [ "Kruckman", "Alex", "", "Berkeley University" ], [ "Rubin", "Sasha", "", "TU Vienna and IST\n Austria" ], [ "Sheridan", "John", "" ], [ "Zax", "Ben", "" ] ]
new_dataset
0.989663
1210.2514
Jitendra Mohan Dr
J. Mohan, S. Maheshwari, and D. S. Chauhan
Minimum Grounded Component Based Voltage-Mode Quadrature Oscillator using DVCC
International Journal on Recent Trends in Engineering & Technology, vol.3, issue 4, 2010
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new voltage-mode quadrature oscillator using minimum number of active and passive component is proposed. The proposed circuit employs single modified DVCC, two grounded capacitor and two grounded resistors, which is ideal for IC implementation. The active and passive sensitivity are no more than unity. The proposed circuit is verified through PSPICE simulation results.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 07:34:55 GMT" } ]
2012-10-10T00:00:00
[ [ "Mohan", "J.", "" ], [ "Maheshwari", "S.", "" ], [ "Chauhan", "D. S.", "" ] ]
new_dataset
0.995734
1210.2582
Adrian Agustin
Adrian Agustin, Josep Vidal
Degrees of Freedom Region of the MIMO X channel with an Arbitrary Number of Antennas
submitted to IEEE Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize the total degrees of freedom (DoF) of the full-rank MIMO X channel with arbitrary number of antennas at each node. We elucidate that the existing outer bound is tight for any antenna configuration and provide transmit and receive filter designs that attain this outer bound. The proposed achievable scheme exploits channel extensions in terms of both, symbol and asymmetric complex signaling when the communication is carried out over a constant channel case, and is also applicable to time varying channels. The proposed scheme represents a general framework for the derivation of the total DoF of any two-by-two multiuser channels. Furthermore, the rank-deficient MIMO channels case is naturally addressed, and it is shown that the total DoF of the interference (IC) and MIMO X channels are in general superior to the full rank MIMO case
[ { "version": "v1", "created": "Tue, 9 Oct 2012 12:38:18 GMT" } ]
2012-10-10T00:00:00
[ [ "Agustin", "Adrian", "" ], [ "Vidal", "Josep", "" ] ]
new_dataset
0.989175
1210.2584
Mansour Moufid
Mansour Moufid
Sudoku as a special transportation problem
6 pages; 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sudoku is a popular combinatorial puzzle. A new method of solving Sudoku is presented, which involves formulating a puzzle as a special type of transportation problem. This model allows one to solve puzzles with more than one solution, keeping the constraints of the problem fixed, and simply changing a cost matrix between solutions.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 12:50:27 GMT" } ]
2012-10-10T00:00:00
[ [ "Moufid", "Mansour", "" ] ]
new_dataset
0.99878
1210.2704
Aslan Tchamkerten
Hamed Mirghasemi and Aslan Tchamkerten
On the Capacity of the One-Bit Deletion and Duplication Channel
Allerton 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The one-bit deletion and duplication channel is investigated. An input to this channel consists of a block of bits which experiences either a deletion, or a duplication, or remains unchanged. For this channel a capacity expression is obtained in a certain asymptotic regime where the deletion and duplication probabilities tend to zero. As a corollary, we obtain an asymptotic expression for the capacity of the segmented deletion and duplication channel where the input now consists of several blocks and each block independently experiences either a deletion, or a duplication, or remains unchanged.
[ { "version": "v1", "created": "Tue, 9 Oct 2012 19:48:34 GMT" } ]
2012-10-10T00:00:00
[ [ "Mirghasemi", "Hamed", "" ], [ "Tchamkerten", "Aslan", "" ] ]
new_dataset
0.998549
cs/0605029
Shiva Kasiviswanathan
Martin Furer, Shiva Prasad Kasiviswanathan
Spanners for Geometric Intersection Graphs
16 pages, 5 figures, Latex
Journal of Computational Geometry 3(1) (2012) 31-64
null
null
cs.CG
null
Efficient algorithms are presented for constructing spanners in geometric intersection graphs. For a unit ball graph in R^k, a (1+\epsilon)-spanner is obtained using efficient partitioning of the space into hypercubes and solving bichromatic closest pair problems. The spanner construction has almost equivalent complexity to the construction of Euclidean minimum spanning trees. The results are extended to arbitrary ball graphs with a sub-quadratic running time. For unit ball graphs, the spanners have a small separator decomposition which can be used to obtain efficient algorithms for approximating proximity problems like diameter and distance queries. The results on compressed quadtrees, geometric graph separators, and diameter approximation might be of independent interest.
[ { "version": "v1", "created": "Sun, 7 May 2006 23:38:00 GMT" } ]
2012-10-10T00:00:00
[ [ "Furer", "Martin", "" ], [ "Kasiviswanathan", "Shiva Prasad", "" ] ]
new_dataset
0.98186
1206.1948
Mojtaba Vaezi
Mojtaba Vaezi
The Capacity of Less Noisy Cognitive Interference Channels
6 pages, one figure, one table. Appeared at the 50th Annual Allerton Conference on Communications, Control, and Computing (Allerton 2012)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fundamental limits of the cognitive interference channel (CIC) with two pairs of transmitter-receiver has been under exploration for several years. In this paper, we study the discrete memoryless cognitive interference channel (DM-CIC) in which the cognitive transmitter non-causally knows the message of the primary transmitter. The capacity of this channel is not known in general; it is only known in some special cases. Inspired by the concept of less noisy broadcast channel (BC), in this work we introduce the notion of less noisy cognitive interference channel. Unlike BC, due to the inherent asymmetry of the cognitive channel, two different less noisy channels are distinguishable; these are named the primary-less-noisy and cognitive-less-noisy channels. We derive capacity region for the latter case, by introducing inner and outer bounds on the capacity of the DM-CIC and showing that these bounds coincide for the cognitive-less-noisy channel. Having established the capacity region, we prove that superposition coding is the optimal encoding technique.
[ { "version": "v1", "created": "Sat, 9 Jun 2012 15:40:53 GMT" }, { "version": "v2", "created": "Sun, 7 Oct 2012 21:30:19 GMT" } ]
2012-10-09T00:00:00
[ [ "Vaezi", "Mojtaba", "" ] ]
new_dataset
0.959262
1206.4753
Tianshi Chen
Daofu Liu, Yunji Chen, Qi Guo, Tianshi Chen, Ling Li, Qunfeng Dong, Weiwu Hu
DLS: Directoryless Shared Last-level Cache
This paper has been withdrawn by the authors due to a major revision
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Directory-based protocols have been the de facto solution for maintaining cache coherence in shared-memory parallel systems comprising multi/many cores, where each store instruction is eagerly made globally visible by invalidating the private cache (PC) backups of other cores. Consequently, the directory not only consumes large chip area, but also incurs considerable energy consumption and performance degradation, due to the large number of Invalidation/Ack messages transferred in the interconnection network and resulting network congestion. In this paper, we reveal the interesting fact that the directory is actually an unnecessary luxury for practical parallel systems. Because of widely deployed software/hardware techniques involving instruction reordering, most (if not all) parallel systems work under the weak consistency model, where a remote store instruction is allowed to be invisible to a core before the next synchronization of the core, instead of being made visible eagerly by invalidating PC backups of other cores. Based on this key observation, we propose a lightweight novel scheme called {\em DLS (DirectoryLess Shared last-level cache)}, which completely removes the directory and Invalidation/Ack messages, and efficiently maintains cache coherence using a novel {\em self-suspicion + speculative execution} mechanism. Experimental results over SPLASH-2 benchmarks show that on a 16-core processor, DLS not only completely removes the chip area cost of the directory, but also improves processor performance by 11.08%, reduces overall network traffic by 28.83%, and reduces energy consumption of the network by 15.65% on average (compared with traditional MESI protocol with full directory). Moreover, DLS does not involve any modification to programming languages and compilers, and hence is seamlessly compatible with legacy codes.
[ { "version": "v1", "created": "Thu, 21 Jun 2012 00:59:43 GMT" }, { "version": "v2", "created": "Sun, 7 Oct 2012 04:08:02 GMT" } ]
2012-10-09T00:00:00
[ [ "Liu", "Daofu", "" ], [ "Chen", "Yunji", "" ], [ "Guo", "Qi", "" ], [ "Chen", "Tianshi", "" ], [ "Li", "Ling", "" ], [ "Dong", "Qunfeng", "" ], [ "Hu", "Weiwu", "" ] ]
new_dataset
0.998405
1207.0782
David Burshtein
David Burshtein and Alona Strugatski
Polar write once memory codes
submitted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A coding scheme for write once memory (WOM) using polar codes is presented. It is shown that the scheme achieves the capacity region of noiseless WOMs when an arbitrary number of multiple writes is permitted. The encoding and decoding complexities scale as O(N log N) where N is the blocklength. For N sufficiently large, the error probability decreases sub-exponentially in N. The results can be generalized from binary to generalized WOMs, described by an arbitrary directed acyclic graph, using nonbinary polar codes. In the derivation we also obtain results on the typical distortion of polar codes for lossy source coding. Some simulation results with finite length codes are presented.
[ { "version": "v1", "created": "Tue, 3 Jul 2012 19:11:25 GMT" }, { "version": "v2", "created": "Sun, 7 Oct 2012 10:53:03 GMT" } ]
2012-10-09T00:00:00
[ [ "Burshtein", "David", "" ], [ "Strugatski", "Alona", "" ] ]
new_dataset
0.999673
1210.1940
Kondwani Magamba
Kondwani Magamba, Solomon Kadaleka and Ansley Kasambara
Variable-length Hill Cipher with MDS Key Matrix
null
null
null
null
cs.CR cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
The Hill Cipher is a classical symmetric cipher which breaks plaintext into blocks of size m and then multiplies each block by an m by m key matrix to yield ciphertext. However, it is well known that the Hill cipher succumbs to cryptanalysis relatively easily. As a result, there have been efforts to strengthen the cipher through the use of various techniques e.g. permuting rows and columns of the key matrix to encrypt each plaintext vector with a new key matrix. In this paper, we strengthen the security of the Hill cipher against a known-plaintext attack by encrypting each plaintext matrix by a variable-length key matrix obtained from a Maximum Distance Separable (MDS) master key matrix.
[ { "version": "v1", "created": "Sat, 6 Oct 2012 11:20:31 GMT" } ]
2012-10-09T00:00:00
[ [ "Magamba", "Kondwani", "" ], [ "Kadaleka", "Solomon", "" ], [ "Kasambara", "Ansley", "" ] ]
new_dataset
0.997759
1210.2025
Abdul Razaque
Wafa Elmannai, Abdul Razaque, Khaled Elleithy
TCP-UB: A New congestion aware transmission control protocolvariant
13 Pages, 11 figures
International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.4, July 2012
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmission control protocol (TCP) is a connection oriented protocol for several types of distributed applications. TCP is reliable particularly for traditional fixed networks. With emergence of faster wireless networks, TCP has been performing poorly in its original format. The performance of TCP is affected due to assorted factors including congestion window, maximum packet size, retry limit, recovery mechanism, backup mechanism and mobility. To overcome deficiency of original TCP, Several modifications have been introduced to improve network quality. The mobility is a major hurdle in degrading the performance of mobile wireless networks. In this paper, we introduce and implement new TCP variant University of Bridgeport (UB) that combines the features of TCP Westwood and Vegas. We examine the performance of TCP-UB, Vegas and Westwood using different realistic scenarios. NS2 simulator demonstrates the stability of TCP-UB as compared with TCP Vegas and Westwood in highly congested networks from the mobility point of view.
[ { "version": "v1", "created": "Sun, 7 Oct 2012 06:13:44 GMT" } ]
2012-10-09T00:00:00
[ [ "Elmannai", "Wafa", "" ], [ "Razaque", "Abdul", "" ], [ "Elleithy", "Khaled", "" ] ]
new_dataset
0.999644
1210.2028
EPTCS
Marco Faella (Universit\`a di Napoli "Federico II"), Aniello Murano (Universit\`a di Napoli "Federico II")
Proceedings Third International Symposium on Games, Automata, Logics and Formal Verification
null
EPTCS 96, 2012
10.4204/EPTCS.96
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the Third International Symposium on Games, Automata, Logic and Formal Verification (GandALF), held in Naples (Italy) from September 6th to 8th, 2012. GandALF was founded by a number of Italian computer scientists interested in mathematical logic, automata theory, game theory, and their applications to the specification, design, and verification of complex systems. Its aim is to provide a forum where people from different areas, and possibly with different backgrounds, can fruitfully interact. Even though the idea of the symposium emerged within the Italian research community, the event has a truly international nature, as witnessed by the composition of the conference committees and the programme.
[ { "version": "v1", "created": "Sun, 7 Oct 2012 06:44:34 GMT" } ]
2012-10-09T00:00:00
[ [ "Faella", "Marco", "", "Università di Napoli \"Federico II\"" ], [ "Murano", "Aniello", "", "Università di Napoli \"Federico II\"" ] ]
new_dataset
0.989172
1210.2030
Abdul Razaque
Abdul Razaque, Khaled Elleithy
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL)
20 pages, 9 figures International Journal of E -Technology Volume 3 Number 2 May 2012. arXiv admin note: substantial text overlap with arXiv:1208.2073
International Journal of E -Technology Volume 3 Number 2 May 2012
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF) explained in [24].The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms and inclusion of new rules in existing IDS. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with known existing techniques.
[ { "version": "v1", "created": "Sun, 7 Oct 2012 06:54:51 GMT" } ]
2012-10-09T00:00:00
[ [ "Razaque", "Abdul", "" ], [ "Elleithy", "Khaled", "" ] ]
new_dataset
0.980206
1210.2035
Clemens Wiltsche
Clemens Wiltsche, Ufuk Topcu and Richard M. Murray
Synthesis of Reactive Protocols for Vehicle-to-Vehicle Communication
Technical report for the paper with the same title prepared for submission to ICCPS'13, April 8--11, 2013, Philadelphia, PA, USA
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a synthesis method for communication protocols for active safety applications that satisfy certain formal specifications on quality of service requirements. The protocols are developed to provide reliable communication services for automobile active safety applications. The synthesis method transforms a specification into a distributed implementation of senders and receivers that together satisfy the quality of service requirements by transmitting messages over an unreliable medium. We develop a specification language and an execution model for the implementations, and demonstrate the viability of our method by developing a protocol for a traffic scenario in which a car runs a red light at a busy intersection.
[ { "version": "v1", "created": "Sun, 7 Oct 2012 08:00:19 GMT" } ]
2012-10-09T00:00:00
[ [ "Wiltsche", "Clemens", "" ], [ "Topcu", "Ufuk", "" ], [ "Murray", "Richard M.", "" ] ]
new_dataset
0.997818
1210.2149
Ragib Hasan
Shams Zawoad and Ragib Hasan
The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices
To appear at MobiHealth 2012
null
null
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel attacks from malicious parties. The emerging threat from malicious mobile devices is significant and severe, since attackers can steal confidential data from a patient's medical device. Also, attackers can compromise the medical device and either feed doctors bad data from it or issue potentially fatal commands to the device, which may even result in the death of the patient. As the mobile devices are often at close proximity to the patient (either in the hospital or home settings), attacks from such devices are hard to prevent. In this paper, we present a systematic analysis of this new threat from mobile devices on medical devices and healthcare infrastructure. We also perform a thorough security analysis of a major hospital and uncover potential vulnerabilities. Finally, we propose a set of potential solutions and defenses against such attacks.
[ { "version": "v1", "created": "Mon, 8 Oct 2012 05:34:18 GMT" } ]
2012-10-09T00:00:00
[ [ "Zawoad", "Shams", "" ], [ "Hasan", "Ragib", "" ] ]
new_dataset
0.994421
1210.2159
Joerg Kliewer
Matthieu R. Bloch, Laura Luzzi, Joerg Kliewer
Strong Coordination with Polar Codes
7 pages doublespaced, presented at the 50th Annual Allerton Conference on Communication, Control and Computing 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design explicit codes for strong coordination in two-node networks. Specifically, we consider a two-node network in which the action imposed by nature is binary and uniform, and the action to coordinate is obtained via a symmetric discrete memoryless channel. By observing that polar codes are useful for channel resolvability over binary symmetric channels, we prove that nested polar codes achieve a subset of the strong coordination capacity region, and therefore provide a constructive and low complexity solution for strong coordination.
[ { "version": "v1", "created": "Mon, 8 Oct 2012 07:02:27 GMT" } ]
2012-10-09T00:00:00
[ [ "Bloch", "Matthieu R.", "" ], [ "Luzzi", "Laura", "" ], [ "Kliewer", "Joerg", "" ] ]
new_dataset
0.999325
1201.0414
Xuechong Guan
Xuechong Guan and Yongming Li
Continuity in Information Algebras
null
null
10.1142/S0218488512500304
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, the continuity and strong continuity in domain-free information algebras and labeled information algebras are introduced respectively. A more general concept of continuous function which is defined between two domain-free continuous information algebras is presented. It is shown that, with the operations combination and focusing, the set of all continuous functions between two domain-free s-continuous information algebras forms a new s-continuous information algebra. By studying the relationship between domain-free information algebras and labeled information algebras, it is demonstrated that they do correspond to each other on s-compactness.
[ { "version": "v1", "created": "Mon, 2 Jan 2012 02:40:12 GMT" } ]
2012-10-08T00:00:00
[ [ "Guan", "Xuechong", "" ], [ "Li", "Yongming", "" ] ]
new_dataset
0.988062
1210.1771
A. Emre Cetin
A. Emre Cetin
In-place associative permutation sort
25 pages. arXiv admin note: substantial text overlap with arXiv:1209.0572, arXiv:1209.3668, arXiv:1209.1942, arXiv:1209.4714
null
null
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/3.0/
In-place associative integer sorting technique was developed, improved and specialized for distinct integers. The technique is suitable for integer sorting. Hence, given a list S of n integers S[0...n-1], the technique sorts the integers in ascending or descending order. It replaces bucket sort, distribution counting sort and address calculation sort family of algorithms and requires only constant amount of additional memory for storing counters and indices beside the input list. The technique was inspired from one of the ordinal theories of "serial order in behavior" and explained by the analogy with the three main stages in the formation and retrieval of memory in cognitive neuroscience: (i) practicing, (ii) storing and (iii) retrieval. In this study in-place associative permutation technique is introduced for integer key sorting problem. Given a list S of n elements S[0...n-1] each have an integer key in the range [0,m-1], the technique sorts the elements according to their integer keys in O(n) time using only O(1) amount of memory if m<=n. On the other hand, if m>n, it sorts in O(n+m) time for the worst, O(m) time for the average (uniformly distributed keys) and O(n) time for the best case using O(1) extra space.
[ { "version": "v1", "created": "Fri, 5 Oct 2012 14:30:37 GMT" } ]
2012-10-08T00:00:00
[ [ "Cetin", "A. Emre", "" ] ]
new_dataset
0.97821
1206.1996
Srimanta Bhattacharya
Niranjan Balachandran and Srimanta Bhattacharya
On an Extremal Hypergraph Problem Related to Combinatorial Batch Codes
9 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $n, r, k$ be positive integers such that $3\leq k < n$ and $2\leq r \leq k-1$. Let $m(n, r, k)$ denote the maximum number of edges an $r$-uniform hypergraph on $n$ vertices can have under the condition that any collection of $i$ edges, span at least $i$ vertices for all $1 \leq i \leq k$. We are interested in the asymptotic nature of $m(n, r, k)$ for fixed $r$ and $k$ as $n \rightarrow \infty$. This problem is related to the forbidden hypergraph problem introduced by Brown, Erd\H{o}s, and S\'os and very recently discussed in the context of combinatorial batch codes. In this short paper we obtain the following results. {enumerate}[(i)] Using a result due to Erd\H{o}s we are able to show $m(n, k, r) = o(n^r)$ for $7\leq k$, and $3 \leq r \leq k-1-\lceil\log k \rceil$. This result is best possible with respect to the upper bound on $r$ as we subsequently show through explicit construction that for $6 \leq k$, and $k-\lceil \log k \rceil \leq r \leq k-1, m(n, r, k) = \Theta(n^r)$. This explicit construction improves on the non-constructive general lower bound obtained by Brown, Erd\H{o}s, and S\'os for the considered parameter values. For 2-uniform CBCs we obtain the following results. {enumerate} We provide exact value of $m(n, 2, 5)$ for $n \geq 5$. Using a result of Lazebnik,et al. regarding maximum size of graphs with large girth, we improve the existing lower bound on $m(n, 2, k)$ ($\Omega(n^{\frac{k+1}{k-1}})$) for all $k \geq 8$ and infinitely many values of $n$. We show $m(n, 2, k) = O(n^{1+\frac{1}{\lfloor\frac{k}{4}\rfloor}})$ by using a result due to Bondy and Simonovits, and also show $m(n, 2, k) = \Theta(n^{3/2})$ for $k = 6, 7, 8$ by using a result of K\"{o}vari, S\'os, and Tur\'{a}n.
[ { "version": "v1", "created": "Sun, 10 Jun 2012 05:46:49 GMT" }, { "version": "v2", "created": "Fri, 17 Aug 2012 08:46:54 GMT" }, { "version": "v3", "created": "Thu, 30 Aug 2012 15:58:23 GMT" }, { "version": "v4", "created": "Thu, 4 Oct 2012 16:25:04 GMT" } ]
2012-10-05T00:00:00
[ [ "Balachandran", "Niranjan", "" ], [ "Bhattacharya", "Srimanta", "" ] ]
new_dataset
0.989942
1210.1039
Frederic Le Mouel
Julien Ponge (CITI), Fr\'ed\'eric Le Mou\"el (CITI)
JooFlux: Hijacking Java 7 InvokeDynamic To Support Live Code Modifications
null
null
null
null
cs.OS cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Changing functional and non-functional software implementation at runtime is useful and even sometimes critical both in development and production environments. JooFlux is a JVM agent that allows both the dynamic replacement of method implementations and the application of aspect advices. It works by doing bytecode transformation to take advantage of the new invokedynamic instruction added in Java SE 7 to help implementing dynamic languages for the JVM. JooFlux can be managed using a JMX agent so as to operate dynamic modifications at runtime, without resorting to a dedicated domain-specific language. We compared JooFlux with existing AOP platforms and dynamic languages. Results demonstrate that JooFlux performances are close to the Java ones --- with most of the time a marginal overhead, and sometimes a gain --- where AOP platforms and dynamic languages present significant overheads. This paves the way for interesting future evolutions and applications of JooFlux.
[ { "version": "v1", "created": "Wed, 3 Oct 2012 09:15:19 GMT" } ]
2012-10-04T00:00:00
[ [ "Ponge", "Julien", "", "CITI" ], [ "Mouël", "Frédéric Le", "", "CITI" ] ]
new_dataset
0.999377
1210.0613
EPTCS
Ugo Dal Lago (Universit\`a di Bologna & INRIA Sophia Antipolis), Claudia Faggian (CNRS & Universit\'e Denis-Diderot Paris 7)
On Multiplicative Linear Logic, Modality and Quantum Circuits
In Proceedings QPL 2011, arXiv:1210.0298
EPTCS 95, 2012, pp. 55-66
10.4204/EPTCS.95.6
null
cs.LO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A logical system derived from linear logic and called QMLL is introduced and shown able to capture all unitary quantum circuits. Conversely, any proof is shown to compute, through a concrete GoI interpretation, some quantum circuits. The system QMLL, which enjoys cut-elimination, is obtained by endowing multiplicative linear logic with a quantum modality.
[ { "version": "v1", "created": "Tue, 2 Oct 2012 00:34:21 GMT" } ]
2012-10-03T00:00:00
[ [ "Lago", "Ugo Dal", "", "Università di Bologna & INRIA Sophia Antipolis" ], [ "Faggian", "Claudia", "", "CNRS & Université Denis-Diderot Paris 7" ] ]
new_dataset
0.995268
1104.4356
Daniel Loebenberger
Daniel Loebenberger and Michael N\"usken
Notions for RSA integers
null
null
null
null
cs.CR math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a "secure" RSA modulus it does not matter how exactly one generates RSA integers. In this work we show that this is indeed the case to a large extend: First, we give a theoretical framework that will enable us to easily compute the entropy of the output distribution of the considered standards and show that it is comparatively high. To do so, we compute for each standard the number of integers they define (up to an error of very small order) and discuss different methods of generating integers of a specific form. Second, we show that factoring such integers is hard, provided factoring a product of two primes of similar size is hard.
[ { "version": "v1", "created": "Thu, 21 Apr 2011 20:44:19 GMT" }, { "version": "v2", "created": "Wed, 11 May 2011 14:46:20 GMT" }, { "version": "v3", "created": "Mon, 1 Oct 2012 11:27:49 GMT" } ]
2012-10-02T00:00:00
[ [ "Loebenberger", "Daniel", "" ], [ "Nüsken", "Michael", "" ] ]
new_dataset
0.996715
1202.0168
Wei Yang
Wei Yang and Giuseppe Durisi and Erwin Riegler
On the Capacity of Large-MIMO Block-Fading Channels
To appear in IEEE Journal on Selected Areas in Communication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize the capacity of Rayleigh block-fading multiple-input multiple-output (MIMO) channels in the noncoherent setting where transmitter and receiver have no a priori knowledge of the realizations of the fading channel. We prove that unitary space-time modulation (USTM) is not capacity-achieving in the high signal-to-noise ratio (SNR) regime when the total number of antennas exceeds the coherence time of the fading channel (expressed in multiples of the symbol duration), a situation that is relevant for MIMO systems with large antenna arrays (large-MIMO systems). This result settles a conjecture by Zheng & Tse (2002) in the affirmative. The capacity-achieving input signal, which we refer to as Beta-variate space-time modulation (BSTM), turns out to be the product of a unitary isotropically distributed random matrix, and a diagonal matrix whose nonzero entries are distributed as the square-root of the eigenvalues of a Beta-distributed random matrix of appropriate size. Numerical results illustrate that using BSTM instead of USTM in large-MIMO systems yields a rate gain as large as 13% for SNR values of practical interest.
[ { "version": "v1", "created": "Wed, 1 Feb 2012 13:26:08 GMT" }, { "version": "v2", "created": "Wed, 13 Jun 2012 11:06:22 GMT" }, { "version": "v3", "created": "Sun, 30 Sep 2012 15:21:27 GMT" } ]
2012-10-02T00:00:00
[ [ "Yang", "Wei", "" ], [ "Durisi", "Giuseppe", "" ], [ "Riegler", "Erwin", "" ] ]
new_dataset
0.996133
1210.0511
Tayeb Lemlouma
Tayeb Lemlouma, Julien Luciana, Bastien Oza, Leandro Sierra and Mika\"el Sala\"un
An Easy Cellular Gateway for Providing Shared Services and Data
6 pages; The Fifth International Conference on Systems and Networks Communications, ICSNC 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new framework that links the two worlds of wired and cellular users sharing systems. The approach is to propose an easy gateway that enables the use of cellular networks based services by wireline users and applications. The idea is to use a mobile terminal or wireless equipment for sharing cellular services, available thanks to its cellular network, to other users that use the wireline Internet. The software application acts as a gateway between the cellular and the wired network; it is responsible for supporting the services provided by the wireless network and make them accessible and usable, in a standard and easy way, by anyone on the wireline network. The gateway software can be integrated easily on any complex architecture since it can interact with any cellular modem. The paper describes an implementation prototype where some examples of services, such as the ability of using messaging services and calls streaming, are experimented. The proposed platform combines different standards to guarantee the use of our gateway in heterogeneous environments.
[ { "version": "v1", "created": "Mon, 1 Oct 2012 19:16:15 GMT" } ]
2012-10-02T00:00:00
[ [ "Lemlouma", "Tayeb", "" ], [ "Luciana", "Julien", "" ], [ "Oza", "Bastien", "" ], [ "Sierra", "Leandro", "" ], [ "Salaün", "Mikaël", "" ] ]
new_dataset
0.997511
1207.3586
Gregory Gutin
Robert Crowston, Gregory Gutin, Mark Jones
Directed Acyclic Subgraph Problem Parameterized above the Poljak-Turzik Bound
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An oriented graph is a directed graph without directed 2-cycles. Poljak and Turz\'{i}k (1986) proved that every connected oriented graph $G$ on $n$ vertices and $m$ arcs contains an acyclic subgraph with at least $\frac{m}{2}+\frac{n-1}{4}$ arcs. Raman and Saurabh (2006) gave another proof of this result and left it as an open question to establish the parameterized complexity of the following problem: does $G$ have an acyclic subgraph with least $\frac{m}{2}+\frac{n-1}{4}+k$ arcs, where $k$ is the parameter? We answer this question by showing that the problem can be solved by an algorithm of runtime $(12k)!n^{O(1)}$. Thus, the problem is fixed-parameter tractable. We also prove that there is a polynomial time algorithm that either establishes that the input instance of the problem is a Yes-instance or reduces the input instance to an equivalent one of size $O(k^2)$.
[ { "version": "v1", "created": "Mon, 16 Jul 2012 06:36:56 GMT" }, { "version": "v2", "created": "Fri, 28 Sep 2012 13:10:18 GMT" } ]
2012-10-01T00:00:00
[ [ "Crowston", "Robert", "" ], [ "Gutin", "Gregory", "" ], [ "Jones", "Mark", "" ] ]
new_dataset
0.952323
1209.6578
Ender Y\"uksel
Bo Friis Nielsen and Flemming Nielson and Henrik Pilegaard and Michael James Andrew Smith and Ender Y\"uksel and Kebin Zeng and Lijun Zhang
Roadmap Document on Stochastic Analysis
This work has been supported by MT-LAB, a VKR Centre of Excellence for the Modelling of Information Technology
null
null
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document was prepared as part of the MT-LAB research centre. The research centre studies the Modelling of Information Technology and is a VKR Centre of Excellence funded for five years by the VILLUM Foundation. You can read more about MT-LAB at its webpage www.MT-LAB.dk. The goal of the document is to serve as an introduction to new PhD students addressing the research goals of MT-LAB. As such it aims to provide an overview of a number of selected approaches to the modelling of stochastic systems. It should be readable not only by computers scientists with a background in formal methods but also by PhD students in stochastics that are interested in understanding the computer science approach to stochastic model checking. We have no intention of being encyclopedic in our treatment of the approaches or the literature. Rather we have made the selection of material based on the competences of the groups involved in or closely affiliated to MT-LAB, so as to ease the task of the PhD students in navigating an otherwise vast amount of literature. We have decided to publish the document in case other young researchers may find it helpful. The list of authors reflect those that have at times played a significant role in the production of the document.
[ { "version": "v1", "created": "Thu, 27 Sep 2012 12:38:56 GMT" } ]
2012-10-01T00:00:00
[ [ "Nielsen", "Bo Friis", "" ], [ "Nielson", "Flemming", "" ], [ "Pilegaard", "Henrik", "" ], [ "Smith", "Michael James Andrew", "" ], [ "Yüksel", "Ender", "" ], [ "Zeng", "Kebin", "" ], [ "Zhang", "Lijun", "" ] ]
new_dataset
0.97112
1209.6140
Veronique Cherfaoui
Paul George (HEUDIASYC), Indira Thouvenin (HEUDIASYC), Vincent Fremont (HEUDIASYC), V\'eronique Cherfaoui (HEUDIASYC)
DAARIA: Driver Assistance by Augmented Reality for Intelligent Automobile
null
2012 IEEE Intelligent Vehicles Symposium, Spain (2012)
null
null
cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Taking into account the drivers' state is a major challenge for designing new advanced driver assistance systems. In this paper we present a driver assistance system strongly coupled to the user. DAARIA 1 stands for Driver Assistance by Augmented Reality for Intelligent Automobile. It is an augmented reality interface powered by several sensors. The detection has two goals: one is the position of obstacles and the quantification of the danger represented by them. The other is the driver's behavior. A suitable visualization metaphor allows the driver to perceive at any time the location of the relevant hazards while keeping his eyes on the road. First results show that our method could be applied to a vehicle but also to aerospace, fluvial or maritime navigation.
[ { "version": "v1", "created": "Thu, 27 Sep 2012 07:15:22 GMT" } ]
2012-09-28T00:00:00
[ [ "George", "Paul", "", "HEUDIASYC" ], [ "Thouvenin", "Indira", "", "HEUDIASYC" ], [ "Fremont", "Vincent", "", "HEUDIASYC" ], [ "Cherfaoui", "Véronique", "", "HEUDIASYC" ] ]
new_dataset
0.99974
1209.6228
Maryam Tanha
Maryam Tanha, Fazirulhisyam Hashima, S. Shamalab, Khairulmizam Samsudin
Highly Available Smart Grid Control Centers through Intrusion Tolerance
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Societies' norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious attacks and contributes to enhance the resilience and security of the key components of smart grid, mainly SCADA and control centers. Hence, an intrusion tolerant system architecture for smart grid control centers is proposed in this paper. The proposed architecture consists of several modules namely, replication & diversity, compromised/faulty replica detector, reconfiuration, auditing and proxy. Some of distinctive features of the proposed ITS are diversity as well as the combined and fine-grained rejuvenation approach. The security of the proposed architecture is evaluated with regard to availability and mean time to security failure as performance measures. The analysis is conducted using a Discrete Time Semi Markov Model and the acquired results show improvements compared to two established intrusion tolerant architectures. The viability of SLA as another performance metric is also investigated.
[ { "version": "v1", "created": "Wed, 26 Sep 2012 16:12:39 GMT" } ]
2012-09-28T00:00:00
[ [ "Tanha", "Maryam", "" ], [ "Hashima", "Fazirulhisyam", "" ], [ "Shamalab", "S.", "" ], [ "Samsudin", "Khairulmizam", "" ] ]
new_dataset
0.9921
1209.6262
Tapalina Bhattasali
Tapalina Bhattasali
SEGNET: Secure Geo-Sensor Network Model
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Geo-Sensor Networks (GEONET) are suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor nodes from going into low-power sleep state. So that compromised sensor node's battery power is drained out and it stops working. Due to the limited capability of sensor nodes, it is very difficult to prevent a sensor node from this type of attack which apparently appears as innocent interaction. In this paper, a framework of secure GEONET model (SEGNET) is proposed, based on dynamic load distribution mechanism for heterogeneous environment. It considers hybrid detection approach using three modules for anomaly detection, intrusion confirmation and decision making to reduce the probability of false detection, compared to other existing approaches.
[ { "version": "v1", "created": "Thu, 27 Sep 2012 15:53:16 GMT" } ]
2012-09-28T00:00:00
[ [ "Bhattasali", "Tapalina", "" ] ]
new_dataset
0.99964
1209.5907
Long Shi
Long Shi, Wei Zhang, Xiang-Gen Xia
On Designs of Full Diversity Space-Time Block Codes for Two-User MIMO Interference Channels
Accepted by IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a design criterion for space-time block codes (STBC) is proposed for two-user MIMO interference channels when a group zero-forcing (ZF) algorithm is applied at each receiver to eliminate the inter-user interference. Based on the design criterion, a design of STBC for two-user interference channels is proposed that can achieve full diversity for each user with the group ZF receiver. The code rate approaches one when the time delay in the encoding (or code block size) gets large. Performance results demonstrate that the full diversity can be guaranteed by our proposed STBC with the group ZF receiver.
[ { "version": "v1", "created": "Wed, 26 Sep 2012 11:51:43 GMT" } ]
2012-09-27T00:00:00
[ [ "Shi", "Long", "" ], [ "Zhang", "Wei", "" ], [ "Xia", "Xiang-Gen", "" ] ]
new_dataset
0.998953
1209.5982
Robert Templeman
Robert Templeman, Zahid Rahman, David Crandall, Apu Kapadia
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
null
null
null
null
cs.CR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware.
[ { "version": "v1", "created": "Wed, 26 Sep 2012 15:56:07 GMT" } ]
2012-09-27T00:00:00
[ [ "Templeman", "Robert", "" ], [ "Rahman", "Zahid", "" ], [ "Crandall", "David", "" ], [ "Kapadia", "Apu", "" ] ]
new_dataset
0.998732
1208.5991
Nishant Doshi mr.
Nishant Doshi, Devesh Jinwala
Constant Ciphertext Length in CP-ABE
12 pages; NWC, 2011
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly varying with the number of attributes with additional pairing operations during encryption and decryption. In this paper, we propose a scheme in which ciphertext remains constant in length, irrespective of the number of attributes. Our scheme works for a threshold case: the number of attributes in a policy must be a subset of attributes in a secret key. The security of propose scheme is based on Decisional Bilinear Diffie-Hellman (DBDH) problem.
[ { "version": "v1", "created": "Wed, 29 Aug 2012 19:01:19 GMT" }, { "version": "v2", "created": "Tue, 25 Sep 2012 11:10:55 GMT" } ]
2012-09-26T00:00:00
[ [ "Doshi", "Nishant", "" ], [ "Jinwala", "Devesh", "" ] ]
new_dataset
0.999628
1209.4896
Harsh Alkutkar Mr.
Harsh Alkutkar, Ajinkya Abhyankar, Rushikesh Gawali, Saurabh Gandhele
Using Microsoft PowerPoint Presentations To Create HTML5 Based E-learning Courses
Paper has been withdrawn due to inconsistencies in images
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper introduces how to use Microsoft PowerPoint presentation files to generate HTML5 based interactive e-learning courses packaged in SCORM format.
[ { "version": "v1", "created": "Wed, 19 Sep 2012 05:26:57 GMT" }, { "version": "v2", "created": "Tue, 25 Sep 2012 06:01:45 GMT" } ]
2012-09-26T00:00:00
[ [ "Alkutkar", "Harsh", "" ], [ "Abhyankar", "Ajinkya", "" ], [ "Gawali", "Rushikesh", "" ], [ "Gandhele", "Saurabh", "" ] ]
new_dataset
0.986452
1209.5388
Mohammad Rahman
Atsuko Miyaji and Mohammad Shahriar Rahman
KIMAP: Key-Insulated Mutual Authentication Protocol for RFID
23 pages. arXiv admin note: substantial text overlap with arXiv:1209.5066, arXiv:1209.5076
International Journal of Automated Identification Technology (IJAIT), Vol 3, No 2, pp. 61-74, 2011
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RFID tags are heavily constrained in computational and storage capabilities, and raise numerous privacy concerns in everyday life due to their vulnerability to different attacks. Both forward security and backward security are required to maintain the privacy of a tag i.e., exposure of a tag's secret key should not reveal the past or future secret keys of the tag. We envisage the need for a formal model for backward security for RFID protocol designs in shared key settings, since the RFID tags are too resource-constrained to support public key settings. However, there has not been much research on backward security for shared key environment since Serge Vaudenay in his Asiacrypt 2007 paper showed that perfect backward security is impossible to achieve without public key settings. We propose a Key-Insulated Mutual Authentication Protocol for shared key environment, KIMAP, which minimizes the damage caused by secret key exposure using insulated keys. Even if a tag's secret key is exposed during an authentication session, forward security and `restricted' backward security of the tag are preserved under our assumptions. The notion of `restricted' backward security is that the adversary misses the protocol transcripts which are needed to update the compromised secret key. Although our definition does not capture perfect backward security, it is still suitable for effective implementation as the tags are highly mobile in practice. We also provide a formal security model of KIMAP. Our scheme is more efficient than previous proposals from the viewpoint of computational requirements.
[ { "version": "v1", "created": "Sun, 23 Sep 2012 15:07:04 GMT" } ]
2012-09-26T00:00:00
[ [ "Miyaji", "Atsuko", "" ], [ "Rahman", "Mohammad Shahriar", "" ] ]
new_dataset
0.999054
1209.5435
Muhanad Hayder Mohammed
Muhanad Hayder Mohammed
Secure electronic lock using pic 16f628a microcontroller
null
International Journal of Research in Computer Science IJORCS, September 21, 2012
10.7815/ijorcs.25.2012.047
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proposed system implements the electronic embedded lock, its provides a great benefit over traditional lock, which use the manual key, so if the key lost or theft then anybody could open the lock, while thieving or losing the long and complex password is harder compare to traditional key, furthermore combining both manual key with computerized password make the system more secure. Long password will reduce the possibilities of breaking the code and opening the lock. The system comprised keypad, and HD44780 20x2 LCD Along with PIC16f628a microcontroller. The firmware control these components such that interaction with keypad is very is ver easy and smoothly, the LCD provide user with messages and notification to be informed about what is the system state. User can performing opening and closing the lock, changing the current password in the microcontroller EEPROM and clearing single digit while entering the password when wrong digit entered (back space). The proposed system firmware developed using assembly language with MPLAB development environment. It tested and implemented in real hardware with proper functioning and bug free.
[ { "version": "v1", "created": "Mon, 24 Sep 2012 21:37:14 GMT" } ]
2012-09-26T00:00:00
[ [ "Mohammed", "Muhanad Hayder", "" ] ]
new_dataset
0.983455
1209.5464
Javad Ghaderi
Javad Ghaderi, Tianxiong Ji, R. Srikant
Flow-Level Stability of Wireless Networks: Separation of Congestion Control and Packet Scheduling
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is by now well-known that wireless networks with file arrivals and departures are stable if one uses alpha-fair congestion control and back-pressure based scheduling and routing. In this paper, we examine whether ?alpha-fair congestion control is necessary for flow-level stability. We show that stability can be ensured even with very simple congestion control mechanisms, such as a fixed window size scheme which limits the maximum number of packets that are allowed into the ingress queue of a flow. A key ingredient of our result is the use of the difference between the logarithms of queue lengths as the link weights. This result is reminiscent of results in the context of CSMA algorithms, but for entirely different reasons.
[ { "version": "v1", "created": "Tue, 25 Sep 2012 00:51:44 GMT" } ]
2012-09-26T00:00:00
[ [ "Ghaderi", "Javad", "" ], [ "Ji", "Tianxiong", "" ], [ "Srikant", "R.", "" ] ]
new_dataset
0.994781
1209.5626
Robert Smith
Robert Smith
A Tutorial for Creating and Publishing Open Source Lisp Software
Accepted for the International Lisp Conference 2012
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation and accessability of the Internet have made it simple to view, download, and publish source code. This paper gives a short tutorial on how to create a new Common Lisp project and publish it.
[ { "version": "v1", "created": "Tue, 25 Sep 2012 14:41:47 GMT" } ]
2012-09-26T00:00:00
[ [ "Smith", "Robert", "" ] ]
new_dataset
0.981886
1209.5715
Abhigyan Sharma
Abhigyan Sharma, Arun Venkataramani, Ramesh Sitaraman
Distributing Content Simplifies ISP Traffic Engineering
12 pages, 13 Figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several major Internet service providers (e.g., Level-3, AT&T, Verizon) today also offer content distribution services. The emergence of such "Network-CDNs" (NCDNs) are driven by market forces that place more value on content services than just carrying the bits. NCDNs are also necessitated by the need to reduce the cost of carrying ever-increasing volumes of traffic across their backbones. An NCDN has the flexibility to determine both where content is placed and how traffic is routed within the network. However NCDNs today continue to treat traffic engineering independently from content placement and request redirection decisions. In this paper, we investigate the interplay between content distribution strategies and traffic engineering and ask how an NCDN should engineer traffic in a content-aware manner. Our experimental analysis, based on traces from a large content distribution network and real ISP topologies, shows that effective content placement can significantly simplify traffic engineering and in most cases obviate the need to engineer NCDN traffic all together! Further, we show that simple demand-oblivious schemes for routing and placement such as InverseCap and LRU suffice as they achieve network costs that are close to the best possible.
[ { "version": "v1", "created": "Tue, 25 Sep 2012 18:41:15 GMT" } ]
2012-09-26T00:00:00
[ [ "Sharma", "Abhigyan", "" ], [ "Venkataramani", "Arun", "" ], [ "Sitaraman", "Ramesh", "" ] ]
new_dataset
0.973627
1106.0151
Mofreh Zaghloul
Mofreh R. Zaghloul and Ahmed N. Ali
Algorithm 916: computing the Faddeyeva and Voigt functions
27 pages, 5 tables, 9 figurs
ACM Transactions on Mathematical Software, Vol 38, No. 2, Article 15(2011),22 pages
null
null
cs.NA math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a MATLAB function for the numerical evaluation of the Faddeyeva function w(z). The function is based on a newly developed accurate algorithm. In addition to its higher accuracy, the software provides a flexible accuracy vs efficiency trade-off through a controlling parameter that may be used to reduce accuracy and computational time and vice versa. Verification of the flexibility, reliability and superior accuracy of the algorithm is provided through comparison with standard algorithms available in other libraries and software packages.
[ { "version": "v1", "created": "Wed, 1 Jun 2011 12:01:12 GMT" }, { "version": "v2", "created": "Sun, 23 Sep 2012 08:07:56 GMT" } ]
2012-09-25T00:00:00
[ [ "Zaghloul", "Mofreh R.", "" ], [ "Ali", "Ahmed N.", "" ] ]
new_dataset
0.956391
1205.1212
Abdoul Aziz Ciss
Abdoul Aziz Ciss and Ahmed Youssef Ould Cheikh and Djiby Sow
A Factoring and Discrete Logarithm based Cryptosystem
Something was not correct in the paper
null
null
null
cs.CR math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient public key cryptosystem. To break the scheme, an adversary may solve the IFP and the DLP separately which is computationally infeasible. The key generation is a simple operation based on the discrete logarithm modulo a composite moduli. The encryption phase is based both on the cube root computation and the DLP. These operations are computationally efficient.
[ { "version": "v1", "created": "Sun, 6 May 2012 12:27:15 GMT" }, { "version": "v2", "created": "Sun, 23 Sep 2012 22:47:15 GMT" } ]
2012-09-25T00:00:00
[ [ "Ciss", "Abdoul Aziz", "" ], [ "Cheikh", "Ahmed Youssef Ould", "" ], [ "Sow", "Djiby", "" ] ]
new_dataset
0.998725
1209.0286
Nilanjan Sen
Nilanjan Sen and Indrajit Banerjee
CAWS - Security Algorithms for Wireless Sensor Networks: A Cellular Automata Based Approach
Proceedings of "All India Seminar on Role of ICT in Improving Quality of Life" on March 26-27, 2010 organized by The Institution of Engineers (India) and Bengal Engineering and Science University, Shibpur
Proceedings of "All India Seminar on Role of ICT in Improving Quality of Life", Dated on March 26-27, 2010; pp: 81-88
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security in the Wireless Sensor Networks (WSN) is a very challenging task because of their dissimilarities with the conventional wireless networks. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of WSNs. In this paper we have proposed a set of cellular automata based security algorithms (CAWS) which consists of CAKD, a Cellular Automata (CA) based key management algorithm and CASC, a CA based secure data communication algorithm, which require very small amount of memory as well as simple computation.
[ { "version": "v1", "created": "Mon, 3 Sep 2012 09:55:29 GMT" } ]
2012-09-25T00:00:00
[ [ "Sen", "Nilanjan", "" ], [ "Banerjee", "Indrajit", "" ] ]
new_dataset
0.999414
1209.4975
Yanfang Liu
Yanfang Liu and William Zhu
Parametric matroid of rough set
15 pages
null
null
null
cs.AI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rough set is mainly concerned with the approximations of objects through an equivalence relation on a universe. Matroid is a combinatorial generalization of linear independence in vector spaces. In this paper, we define a parametric set family, with any subset of a universe as its parameter, to connect rough sets and matroids. On the one hand, for a universe and an equivalence relation on the universe, a parametric set family is defined through the lower approximation operator. This parametric set family is proved to satisfy the independent set axiom of matroids, therefore it can generate a matroid, called a parametric matroid of the rough set. Three equivalent representations of the parametric set family are obtained. Moreover, the parametric matroid of the rough set is proved to be the direct sum of a partition-circuit matroid and a free matroid. On the other hand, since partition-circuit matroids were well studied through the lower approximation number, we use it to investigate the parametric matroid of the rough set. Several characteristics of the parametric matroid of the rough set, such as independent sets, bases, circuits, the rank function and the closure operator, are expressed by the lower approximation number.
[ { "version": "v1", "created": "Sat, 22 Sep 2012 09:19:54 GMT" } ]
2012-09-25T00:00:00
[ [ "Liu", "Yanfang", "" ], [ "Zhu", "William", "" ] ]
new_dataset
0.987209
1209.5066
Mohammad Rahman
Atsuko Miyaji and Mohammad Shahriar Rahman
APRAP: Another Privacy Preserving RFID Authentication Protocol
6 pages, 1 figure, The 6th workshop on Secure Network Protocols (NPSec 2010), IEEE
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy preserving RFID (Radio Frequency Identification) authentication has been an active research area in recent years. Both forward security and backward security are required to maintain the privacy of a tag, i.e., exposure of a tag's secret key should not reveal the past or future secret keys of the tag. We envisage the need for a formal model for backward security for RFID protocol designs in shared key settings, since the RFID tags are too resource-constrained to support public key settings. However, there has not been much research on backward security for shared key environment since Serge Vaudenay in his Asiacrypt 2007 paper showed that perfect backward security is impossible to achieve without public key settings. We propose a Privacy Preserving RFID Authentication Protocol for shared key environment, APRAP, which minimizes the damage caused by secret key exposure using insulated keys. Even if a tag's secret key is exposed during an authentication session, forward security and 'restricted' backward security of the tag are preserved under our assumptions. The notion of 'restricted' backward security is that the adversary misses the protocol transcripts which are needed to update the compromised secret key. Although our definition does not capture perfect backward security, it is still suitable for effective implementation as the tags are highly mobile in practice. We also provide a formal security model of APRAP. Our scheme is more efficient than previous proposals from the viewpoint of computational requirements.
[ { "version": "v1", "created": "Sun, 23 Sep 2012 13:52:30 GMT" } ]
2012-09-25T00:00:00
[ [ "Miyaji", "Atsuko", "" ], [ "Rahman", "Mohammad Shahriar", "" ] ]
new_dataset
0.995915
1209.5145
Viral Shah
Jeff Bezanson, Stefan Karpinski, Viral B. Shah, Alan Edelman
Julia: A Fast Dynamic Language for Technical Computing
null
null
null
null
cs.PL cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic languages have become popular for scientific computing. They are generally considered highly productive, but lacking in performance. This paper presents Julia, a new dynamic language for technical computing, designed for performance from the beginning by adapting and extending modern programming language techniques. A design based on generic functions and a rich type system simultaneously enables an expressive programming model and successful type inference, leading to good performance for a wide range of programs. This makes it possible for much of the Julia library to be written in Julia itself, while also incorporating best-of-breed C and Fortran libraries.
[ { "version": "v1", "created": "Mon, 24 Sep 2012 03:55:45 GMT" } ]
2012-09-25T00:00:00
[ [ "Bezanson", "Jeff", "" ], [ "Karpinski", "Stefan", "" ], [ "Shah", "Viral B.", "" ], [ "Edelman", "Alan", "" ] ]
new_dataset
0.999545
1209.5307
Sarah Allen
Sarah R. Allen and John Iacono
Packing identical simple polygons is NP-hard
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a small polygon S, a big simple polygon B and a positive integer k, it is shown to be NP-hard to determine whether k copies of the small polygon (allowing translation and rotation) can be placed in the big polygon without overlap. Previous NP-hardness results were only known in the case where the big polygon is allowed to be non-simple. A novel reduction from Planar-Circuit-SAT is presented where a small polygon is constructed to encode the entire circuit.
[ { "version": "v1", "created": "Mon, 24 Sep 2012 15:43:11 GMT" } ]
2012-09-25T00:00:00
[ [ "Allen", "Sarah R.", "" ], [ "Iacono", "John", "" ] ]
new_dataset
0.998277
1209.4635
Sachin Lakra
Sachin Lakra, Deepak Kumar Sharma
DolNet: A Division Of Labour Based Distributed Object Oriented Software Process Model
9 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1209.4453
Published in proceedings of the First International Conference on Data Management 2008, Ghaziabad, Uttar Pradesh, India, Feb 2008, pp.1284-1290
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed Software Development today is in its childhood and not too widespread as a method of developing software in the global IT Industry. In this context, Petrinets are a mathematical model for describing distributed systems theoretically, whereas AttNets are one of their offshoots. But development of true distributed software is limited to network operating systems majorly. Software that runs on many machines with separate programs for each machine, are very few. This paper introduces and defines Distributed Object Oriented Software Engineering DOOSE as a new field in software engineering. The paper further gives a Distributed Object Oriented Software Process Model DOOSPM, called the DolNet, which describes how work may be done by a software development organization while working on Distributed Object Oriented DOO Projects.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 14:39:45 GMT" } ]
2012-09-24T00:00:00
[ [ "Lakra", "Sachin", "" ], [ "Sharma", "Deepak Kumar", "" ] ]
new_dataset
0.987652
1209.4687
Lei Zhang
Lei Zhang, Hui Li, and Dongning Guo
Capacity of Gaussian Channels with Duty Cycle and Power Constraints
36 pages, 6 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many wireless communication systems, radios are subject to a duty cycle constraint, that is, a radio only actively transmits signals over a fraction of the time. For example, it is desirable to have a small duty cycle in some low power systems; a half-duplex radio cannot keep transmitting if it wishes to receive useful signals; and a cognitive radio needs to listen and detect primary users frequently. This work studies the capacity of scalar discrete-time Gaussian channels subject to duty cycle constraint as well as average transmit power constraint. An idealized duty cycle constraint is first studied, which can be regarded as a requirement on the minimum fraction of nontransmissions or zero symbols in each codeword. A unique discrete input distribution is shown to achieve the channel capacity. In many situations, numerically optimized on-off signaling can achieve much higher rate than Gaussian signaling over a deterministic transmission schedule. This is in part because the positions of nontransmissions in a codeword can convey information. Furthermore, a more realistic duty cycle constraint is studied, where the extra cost of transitions between transmissions and nontransmissions due to pulse shaping is accounted for. The capacity-achieving input is no longer independent over time and is hard to compute. A lower bound of the achievable rate as a function of the input distribution is shown to be maximized by a first-order Markov input process, the distribution of which is also discrete and can be computed efficiently. The results in this paper suggest that, under various duty cycle constraints, departing from the usual paradigm of intermittent packet transmissions may yield substantial gain.
[ { "version": "v1", "created": "Fri, 21 Sep 2012 01:51:54 GMT" } ]
2012-09-24T00:00:00
[ [ "Zhang", "Lei", "" ], [ "Li", "Hui", "" ], [ "Guo", "Dongning", "" ] ]
new_dataset
0.994381
1209.4383
Kumar Viswanatha
Kumar Viswanatha and Emrah Akyol and Kenneth Rose
Minimum Communication Cost for Joint Distributed Source Coding and Dispersive Information Routing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of minimum cost communication of correlated sources over a network with multiple sinks, which consists of distributed source coding followed by routing. We introduce a new routing paradigm called dispersive information routing, wherein the intermediate nodes are allowed to `split' a packet and forward subsets of the received bits on each of the forward paths. This paradigm opens up a rich class of research problems which focus on the interplay between encoding and routing in a network. Unlike conventional routing methods such as in [1], dispersive information routing ensures that each sink receives just the information needed to reconstruct the sources it is required to reproduce. We demonstrate using simple examples that our approach offers better asymptotic performance than conventional routing techniques. This paradigm leads to a new information theoretic setup, which has not been studied earlier. We propose a new coding scheme, using principles from multiple descriptions encoding [2] and Han and Kobayashi decoding [3]. We show that this coding scheme achieves the complete rate region for certain special cases of the general setup and thereby achieves the minimum communication cost under this routing paradigm.
[ { "version": "v1", "created": "Wed, 19 Sep 2012 22:31:29 GMT" } ]
2012-09-21T00:00:00
[ [ "Viswanatha", "Kumar", "" ], [ "Akyol", "Emrah", "" ], [ "Rose", "Kenneth", "" ] ]
new_dataset
0.97017
1209.4471
Nikola Milo\v{s}evi\'c MSc
Nikola Milo\v{s}evi\'c
Stemmer for Serbian language
16 pages, 8 figures, code included
null
null
null
cs.CL cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
In linguistic morphology and information retrieval, stemming is the process for reducing inflected (or sometimes derived) words to their stem, base or root form; generally a written word form. In this work is presented suffix stripping stemmer for Serbian language, one of the highly inflectional languages.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 09:21:29 GMT" } ]
2012-09-21T00:00:00
[ [ "Milošević", "Nikola", "" ] ]
new_dataset
0.999806
1209.4554
Erez Buchnik
Erez M. Buchnik
Bouma2 - A Quasi-Stateless, Tunable Multiple String-Match Algorithm
33 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Bouma2 algorithm attempts to challenge the prevalent "stateful" exact string-match paradigms by suggesting a "quasi-stateless" approach. We claim that using state-machines to solve the multiple exact string-match problem introduces a hidden artificial constraint, namely the Consume-Order Dependency, which results in unnecessary overhead. Bouma2 is not restricted in this sense; we postulate that this allows memory-efficiency and improved performance versus its state-machine equivalents. The heart of the Bouma2 preprocessing problem is formulated as a weighted Integer Linear Programming problem, that can be tuned for memory footprint and performance optimization. Specifically, this allows Bouma2 to be input-sensitive, as tuning can be based on input characteristics. Evaluating Bouma2 against the Aho-Corasick variant of the popular Snort Intrusion Prevention System, we demonstrate double the throughput while using about 10% of the memory.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 14:59:48 GMT" } ]
2012-09-21T00:00:00
[ [ "Buchnik", "Erez M.", "" ] ]
new_dataset
0.981434
1209.4621
Krishnama Raju Kanchu
Krishnama Raju Kanchu and Subhash Kak
Goldbach Circles and Balloons and Their Cross Correlation
9 pages, 7 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Goldbach partitions can be used in creation of ellipses and circles on the number line. We extend this work and determine the count and other properties of concentric Goldbach circles for different values of n. The autocorrelation function of this sequence with respect to even and odd values suggests that it has excellent randomness properties. Cross correlation properties of ellipse and circle sequences are provided that indicate that these sequences have minimal dependencies and, therefore, they can be used in spread spectrum and other cryptographic applications.
[ { "version": "v1", "created": "Thu, 20 Sep 2012 19:17:00 GMT" } ]
2012-09-21T00:00:00
[ [ "Kanchu", "Krishnama Raju", "" ], [ "Kak", "Subhash", "" ] ]
new_dataset
0.962139
1111.6990
Kyle Fox
Kyle Fox
Shortest Non-trivial Cycles in Directed and Undirected Surface Graphs
Accepted to SODA 2013. Updated for reviewer comments, to include new results for undirected graphs, and to include new title
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let G be a graph embedded on a surface of genus g with b boundary cycles. We describe algorithms to compute multiple types of non-trivial cycles in G, using different techniques depending on whether or not G is an undirected graph. If G is undirected, then we give an algorithm to compute a shortest non-separating cycle in 2^O(g) n log log n time. Similar algorithms are given to compute a shortest non-contractible or non-null-homologous cycle in 2^O(g+b) n log log n time. Our algorithms for undirected G combine an algorithm of Kutz with known techniques for efficiently enumerating homotopy classes of curves that may be shortest non-trivial cycles. Our main technical contributions in this work arise from assuming G is a directed graph with possibly asymmetric edge weights. For this case, we give an algorithm to compute a shortest non-contractible cycle in G in O((g^3 + g b)n log n) time. In order to achieve this time bound, we use a restriction of the infinite cyclic cover that may be useful in other contexts. We also describe an algorithm to compute a shortest non-null-homologous cycle in G in O((g^2 + g b)n log n) time, extending a known algorithm of Erickson to compute a shortest non-separating cycle. In both the undirected and directed cases, our algorithms improve the best time bounds known for many values of g and b.
[ { "version": "v1", "created": "Tue, 29 Nov 2011 21:24:21 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2011 20:42:03 GMT" }, { "version": "v3", "created": "Wed, 19 Sep 2012 15:50:06 GMT" } ]
2012-09-20T00:00:00
[ [ "Fox", "Kyle", "" ] ]
new_dataset
0.998804
1203.2870
Giuseppe Cocco
Giuseppe Cocco, Deniz G\"und\"uz and Christian Ibars
Streaming Transmitter over Block-Fading Channels with Delay Constraint
Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data streaming transmission over a block fading channel is studied. It is assumed that the transmitter receives a new message at each channel block at a constant rate, which is fixed by an underlying application, and tries to deliver the arriving messages by a common deadline. Various transmission schemes are proposed and compared with an informed transmitter upper bound in terms of the average decoded rate. It is shown that in the single receiver case the adaptive joint encoding (aJE) scheme is asymptotically optimal, in that it achieves the ergodic capacity as the transmission deadline goes to infinity; and it closely follows the performance of the informed transmitter upper bound in the case of finite transmission deadline. On the other hand, in the presence of multiple receivers with different signal-to-noise ratios (SNR), memoryless transmission (MT), time sharing (TS) and superposition transmission (ST) schemes are shown to be more robust than the joint encoding (JE) scheme as they have gradual performance loss with decreasing SNR.
[ { "version": "v1", "created": "Tue, 13 Mar 2012 17:24:59 GMT" }, { "version": "v2", "created": "Sat, 17 Mar 2012 10:33:58 GMT" }, { "version": "v3", "created": "Tue, 8 May 2012 11:51:14 GMT" }, { "version": "v4", "created": "Wed, 19 Sep 2012 14:27:04 GMT" } ]
2012-09-20T00:00:00
[ [ "Cocco", "Giuseppe", "" ], [ "Gündüz", "Deniz", "" ], [ "Ibars", "Christian", "" ] ]
new_dataset
0.989894
1205.5025
Casper Steinmann
Casper Steinmann, Mikael W. Ibsen, Anne S. Hansen and Jan H. Jensen
FragIt: A Tool to Prepare Input Files for Fragment Based Quantum Chemical Calculations
27 pages, 9 figures
null
10.1371/journal.pone.0044480
null
cs.CE physics.chem-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Near linear scaling fragment based quantum chemical calculations are becoming increasingly popular for treating large systems with high accuracy and is an active field of research. However, it remains difficult to set up these calculations without expert knowledge. To facilitate the use of such methods, software tools need to be available to support these methods and help to set up reasonable input files which will lower the barrier of entry for usage by non-experts. Previous tools relies on specific annotations in structure files for automatic and successful fragmentation such as residues in PDB files. We present a general fragmentation methodology and accompanying tools called FragIt to help setup these calculations. FragIt uses the SMARTS language to locate chemically appropriate fragments in large structures and is applicable to fragmentation of any molecular system given suitable SMARTS patterns. We present SMARTS patterns of fragmentation for proteins, DNA and polysaccharides, specifically for D-galactopyranose for use in cyclodextrins. FragIt is used to prepare input files for the Fragment Molecular Orbital method in the GAMESS program package, but can be extended to other computational methods easily.
[ { "version": "v1", "created": "Tue, 22 May 2012 14:39:44 GMT" }, { "version": "v2", "created": "Thu, 2 Aug 2012 12:38:53 GMT" } ]
2012-09-20T00:00:00
[ [ "Steinmann", "Casper", "" ], [ "Ibsen", "Mikael W.", "" ], [ "Hansen", "Anne S.", "" ], [ "Jensen", "Jan H.", "" ] ]
new_dataset
0.998024
1207.2825
Matthew Valenti
Don Torrieri and Matthew C. Valenti
Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks
to appear at Milcom-2012
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The central issue in direct-sequence code-division multiple-access (DS-CDMA) ad hoc networks is the prevention of a near-far problem. This paper considers two types of guard zones that may be used to control the near-far problem: a fundamental exclusion zone and an additional CSMA guard zone that may be established by the carrier-sense multiple-access (CSMA) protocol. In the exclusion zone, no mobiles are physically present, modeling the minimum physical separation among mobiles that is always present in actual networks. Potentially interfering mobiles beyond a transmitting mobile's exclusion zone, but within its CSMA guard zone, are deactivated by the protocol. This paper provides an analysis of DS-CSMA networks with either or both types of guard zones. A network of finite extent with a finite number of mobiles is modeled as a uniform clustering process. The analysis uses a closed-form expression for the outage probability in the presence of Nakagami fading, conditioned on the network geometry. By using the analysis developed in this paper, the tradeoffs between exclusion zones and CSMA guard zones are explored for DS-CDMA and unspread networks.
[ { "version": "v1", "created": "Thu, 12 Jul 2012 02:06:57 GMT" }, { "version": "v2", "created": "Mon, 10 Sep 2012 04:49:53 GMT" }, { "version": "v3", "created": "Thu, 13 Sep 2012 04:10:15 GMT" }, { "version": "v4", "created": "Mon, 17 Sep 2012 15:13:49 GMT" }, { "version": "v5", "created": "Wed, 19 Sep 2012 19:26:11 GMT" } ]
2012-09-20T00:00:00
[ [ "Torrieri", "Don", "" ], [ "Valenti", "Matthew C.", "" ] ]
new_dataset
0.982954