id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1206.4708
Serban Vlad E.
Serban E. Vlad
On the serial connection of the regular asynchronous systems
9 pages; ROMAI Journal, Vol. 7, Nr. 2, 2011
null
null
null
cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The asynchronous systems f are multi-valued functions, representing the non-deterministic models of the asynchronous circuits from the digital electrical engineering. In real time, they map an 'admissible input' function u:R\rightarrow{0,1}^{m} to a set f(u) of 'possible states' x\inf(u), where x:R\rightarrow{0,1}^{m}. When f is defined by making use of a 'generator function' {\Phi}:{0,1}^{n}\times{0,1}^{m}\rightarrow{0,1}^{n}, the system is called regular. The usual definition of the serial connection of systems as composition of multi-valued functions does not bring the regular systems into regular systems, thus the first issue in this study is to modify in an acceptable manner the definition of the serial connection in a way that matches regularity. This intention was expressed for the first time, without proving the regularity of the serial connection of systems, in a previous work. Our present purpose is to restate with certain corrections and prove that result.
[ { "version": "v1", "created": "Wed, 20 Jun 2012 20:14:13 GMT" } ]
2012-06-22T00:00:00
[ [ "Vlad", "Serban E.", "" ] ]
new_dataset
0.97834
1206.4522
Phil Gooch
Phil Gooch
BADREX: In situ expansion and coreference of biomedical abbreviations using dynamic regular expressions
6 pages, 2 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BADREX uses dynamically generated regular expressions to annotate term definition-term abbreviation pairs, and corefers unpaired acronyms and abbreviations back to their initial definition in the text. Against the Medstract corpus BADREX achieves precision and recall of 98% and 97%, and against a much larger corpus, 90% and 85%, respectively. BADREX yields improved performance over previous approaches, requires no training data and allows runtime customisation of its input parameters. BADREX is freely available from https://github.com/philgooch/BADREX-Biomedical-Abbreviation-Expander as a plugin for the General Architecture for Text Engineering (GATE) framework and is licensed under the GPLv3.
[ { "version": "v1", "created": "Wed, 20 Jun 2012 15:06:48 GMT" } ]
2012-06-21T00:00:00
[ [ "Gooch", "Phil", "" ] ]
new_dataset
0.971976
1206.4531
Jaume Barcelo
Jaume Barcelo, Boris Bellalta, Cristina Cano, Azadeh Faridi, Miquel Oliver
On the Distributed Construction of a Collision-Free Schedule in Multi-Hop Packet Radio Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a protocol that distributively constructs a collision-free schedule for multi-hop packet radio networks in the presence of hidden terminals. As a preliminary step, each wireless station computes the schedule length after gathering information about the number of flows in its neighbourhood. Then, a combination of deterministic and random backoffs are used to reach a collision-free schedule. A deterministic backoff is used after successful transmissions and a random backoff is used otherwise. It is explained that the short acknowledgement control packets can easily result in channel time fragmentation and, to avoid this, the use of link layer delayed acknowledgements is advocated and implemented. The performance results show that a collision-free protocol easily outperforms a collision-prone protocol such as Aloha. The time that is required for the network to converge to a collision-free schedule is assessed by means of simulation.
[ { "version": "v1", "created": "Wed, 20 Jun 2012 15:25:54 GMT" } ]
2012-06-21T00:00:00
[ [ "Barcelo", "Jaume", "" ], [ "Bellalta", "Boris", "" ], [ "Cano", "Cristina", "" ], [ "Faridi", "Azadeh", "" ], [ "Oliver", "Miquel", "" ] ]
new_dataset
0.985209
1111.0654
Mojtaba Vaezi
Mojtaba Vaezi and Fabrice Labeau
Distributed Lossy Source Coding Using Real-Number Codes
5 pages, 5 figures, to appear in VTC_Fall 2012
null
null
null
cs.IT cs.CV cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how real-number codes can be used to compress correlated sources, and establish a new framework for lossy distributed source coding, in which we quantize compressed sources instead of compressing quantized sources. This change in the order of binning and quantization blocks makes it possible to model correlation between continuous-valued sources more realistically and correct quantization error when the sources are completely correlated. The encoding and decoding procedures are described in detail, for discrete Fourier transform (DFT) codes. Reconstructed signal, in the mean squared error sense, is seen to be better than that in the conventional approach.
[ { "version": "v1", "created": "Wed, 2 Nov 2011 20:46:44 GMT" }, { "version": "v2", "created": "Tue, 19 Jun 2012 16:54:47 GMT" } ]
2012-06-20T00:00:00
[ [ "Vaezi", "Mojtaba", "" ], [ "Labeau", "Fabrice", "" ] ]
new_dataset
0.985934
1206.4126
Yousuf Ibrahim Khan
Yousuf Ibrahim Khan
Image based Cryptography from a distance
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An information is a message which is received and understood. Information can be sent one person to another over a long range but the process of sending information must be done in a secure way especially in case of a private message. Mathematicians and Engineers have historically relied on different algorithmic techniques to secure messages and signals. Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Sometimes it is safer to send a message using an image and thus cryptography can also be done using images during an emergency. The need to extract information from images and interpret their contents has been one of the driving factors in the development of image processing and cryptography during the past decades. In this paper, a simple cryptographic method was used to decode a message which was in an image and it was done using a popular computational software.
[ { "version": "v1", "created": "Tue, 19 Jun 2012 06:02:32 GMT" } ]
2012-06-20T00:00:00
[ [ "Khan", "Yousuf Ibrahim", "" ] ]
new_dataset
0.99515
1206.4185
Eliyahu Osherovich
Eliyahu Osherovich
Ant Robotics: Covering Continuous Domains by Multi-A(ge)nt Systems
null
null
null
MSC-2007-18
cs.RO cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present an algorithm for covering continuous connected domains by ant-like robots with very limited capabilities. The robots can mark visited places with pheromone marks and sense the level of the pheromone in their local neighborhood. In case of multiple robots these pheromone marks can be sensed by all robots and provide the only way of (indirect) communication between the robots. The robots are assumed to be memoryless, and to have no global information such as the domain map, their own position (either absolute or relative), total marked area percentage, maximal pheromone level, etc.. Despite the robots' simplicity, we show that they are able, by running a very simple rule of behavior, to ensure efficient covering of arbitrary connected domains, including non-planar and multidimensional ones. The novelty of our algorithm lies in the fact that, unlike previously proposed methods, our algorithm works on continuous domains without relying on some "induced" underlying graph, that effectively reduces the problem to a discrete case of graph covering. The algorithm guarantees complete coverage of any connected domain. We also prove that the algorithm is noise immune, i.e., it is able to cope with any initial pheromone profile (noise). In addition the algorithm provides a bounded constant time between two successive visits of the robot, and thus, is suitable for patrolling or surveillance applications.
[ { "version": "v1", "created": "Tue, 19 Jun 2012 12:00:47 GMT" } ]
2012-06-20T00:00:00
[ [ "Osherovich", "Eliyahu", "" ] ]
new_dataset
0.99022
1206.4226
Mahtab Mirmohseni Dr
Mahtab Mirmohseni, Bahareh Akhbari, and Mohammad Reza Aref
Three-User Cognitive Interference Channel: Capacity Region with Strong Interference
To appear in IET Communications, 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study investigates the capacity region of a three-user cognitive radio network with two primary users and one cognitive user. A three-user Cognitive Interference Channel (C-IFC) is proposed by considering a three-user Interference Channel (IFC) where one of the transmitters has cognitive capabilities and knows the messages of the other two transmitters in a non-causal manner. First, two inner bounds on the capacity region of the three-user C-IFC are obtained based on using the schemes which allow all receivers to decode all messages with two different orders. Next, two sets of conditions are derived, under which the capacity region of the proposed model coincides with the capacity region of a three-user C-IFC in which all three messages are required at all receivers. Under these conditions, referred to as strong interference conditions, the capacity regions for the proposed three-user C-IFC are characterized. Moreover, the Gaussian three-user C-IFC is considered and the capacity results are derived for the Gaussian case. Some numerical examples are also provided.
[ { "version": "v1", "created": "Tue, 19 Jun 2012 14:39:18 GMT" } ]
2012-06-20T00:00:00
[ [ "Mirmohseni", "Mahtab", "" ], [ "Akhbari", "Bahareh", "" ], [ "Aref", "Mohammad Reza", "" ] ]
new_dataset
0.994804
1201.2430
Li Tan
Li Tan
A Well-typed Lightweight Situation Calculus
In Proceedings of the 21st Workshop on Logic-based methods in Programming Environments (WLPE'11), ICLP 2011 Workshop, pp. 62-73, Lexington, Kentucky, USA, July 2011
null
null
null
cs.PL cs.AI
http://creativecommons.org/licenses/by/3.0/
Situation calculus has been widely applied in Artificial Intelligence related fields. This formalism is considered as a dialect of logic programming language and mostly used in dynamic domain modeling. However, type systems are hardly deployed in situation calculus in the literature. To achieve a correct and sound typed program written in situation calculus, adding typing elements into the current situation calculus will be quite helpful. In this paper, we propose to add more typing mechanisms to the current version of situation calculus, especially for three basic elements in situation calculus: situations, actions and objects, and then perform rigid type checking for existing situation calculus programs to find out the well-typed and ill-typed ones. In this way, type correctness and soundness in situation calculus programs can be guaranteed by type checking based on our type system. This modified version of a lightweight situation calculus is proved to be a robust and well-typed system.
[ { "version": "v1", "created": "Wed, 11 Jan 2012 21:44:18 GMT" }, { "version": "v2", "created": "Fri, 15 Jun 2012 23:18:40 GMT" } ]
2012-06-19T00:00:00
[ [ "Tan", "Li", "" ] ]
new_dataset
0.993006
1205.4378
Yu Zheng
Yin Zhu, Yu Zheng, Liuhang Zhang, Darshan Santani, Xing Xie, Qiang Yang
Inferring Taxi Status Using GPS Trajectories
null
null
null
null
cs.AI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we infer the statuses of a taxi, consisting of occupied, non-occupied and parked, in terms of its GPS trajectory. The status information can enable urban computing for improving a city's transportation systems and land use planning. In our solution, we first identify and extract a set of effective features incorporating the knowledge of a single trajectory, historical trajectories and geographic data like road network. Second, a parking status detection algorithm is devised to find parking places (from a given trajectory), dividing a trajectory into segments (i.e., sub-trajectories). Third, we propose a two-phase inference model to learn the status (occupied or non-occupied) of each point from a taxi segment. This model first uses the identified features to train a local probabilistic classifier and then carries out a Hidden Semi-Markov Model (HSMM) for globally considering long term travel patterns. We evaluated our method with a large-scale real-world trajectory dataset generated by 600 taxis, showing the advantages of our method over baselines.
[ { "version": "v1", "created": "Sun, 20 May 2012 03:24:25 GMT" }, { "version": "v2", "created": "Mon, 18 Jun 2012 08:15:27 GMT" } ]
2012-06-19T00:00:00
[ [ "Zhu", "Yin", "" ], [ "Zheng", "Yu", "" ], [ "Zhang", "Liuhang", "" ], [ "Santani", "Darshan", "" ], [ "Xie", "Xing", "" ], [ "Yang", "Qiang", "" ] ]
new_dataset
0.998777
1206.3562
Chunbao Ding
Chunbao Ding, Wanrong Zhang, Dongyue Jin, Hongyun Xie, Pei Shen, Liang Chen
A Novel Low Power UWB Cascode SiGe BiCMOS LNA with Current Reuse and Zero-Pole Cancellation
7 pages, 13 figures
null
null
null
cs.OH physics.ins-det
http://creativecommons.org/licenses/by/3.0/
A low power cascode SiGe BiCMOS low noise amplifier (LNA) with current reuse and zero-pole cancellation is presented for ultra-wideband (UWB) application. The LNA is composed of cascode input stage and common emitter (CE) output stage with dual loop feedbacks. The novel cascode-CE current reuse topology replaces the traditional two stages topology so as to obtain low power consumption. The emitter degenerative inductor in input stage is adopted to achieve good input impedance matching and noise performance. The two poles are introduced by the emitter inductor, which will degrade the gain performance, are cancelled by the dual loop feedbacks of the resistance-inductor (RL) shunt-shunt feedback and resistance-capacitor (RC) series-series feedback in the output stage. Meanwhile, output impedance matching is also achieved. Based on TSMC 0.35{\mu}m SiGe BiCMOS process, the topology and chip layout of the proposed LNA are designed and post-simulated. The LNA achieves the noise figure of 2.3~4.1dB, gain of 18.9~20.2dB, gain flatness of \pm0.65dB, input third order intercept point (IIP3) of -7dBm at 6GHz, exhibits less than 16ps of group delay variation, good input and output impedances matching, and unconditionally stable over the whole band. The power consuming is only 18mW.
[ { "version": "v1", "created": "Fri, 15 Jun 2012 02:53:12 GMT" } ]
2012-06-19T00:00:00
[ [ "Ding", "Chunbao", "" ], [ "Zhang", "Wanrong", "" ], [ "Jin", "Dongyue", "" ], [ "Xie", "Hongyun", "" ], [ "Shen", "Pei", "" ], [ "Chen", "Liang", "" ] ]
new_dataset
0.99885
1206.3881
Alessandro Rozza
Claudio Ceruti and Simone Bassis and Alessandro Rozza and Gabriele Lombardi and Elena Casiraghi and Paola Campadelli
DANCo: Dimensionality from Angle and Norm Concentration
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last decades the estimation of the intrinsic dimensionality of a dataset has gained considerable importance. Despite the great deal of research work devoted to this task, most of the proposed solutions prove to be unreliable when the intrinsic dimensionality of the input dataset is high and the manifold where the points lie is nonlinearly embedded in a higher dimensional space. In this paper we propose a novel robust intrinsic dimensionality estimator that exploits the twofold complementary information conveyed both by the normalized nearest neighbor distances and by the angles computed on couples of neighboring points, providing also closed-forms for the Kullback-Leibler divergences of the respective distributions. Experiments performed on both synthetic and real datasets highlight the robustness and the effectiveness of the proposed algorithm when compared to state of the art methodologies.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 10:33:29 GMT" } ]
2012-06-19T00:00:00
[ [ "Ceruti", "Claudio", "" ], [ "Bassis", "Simone", "" ], [ "Rozza", "Alessandro", "" ], [ "Lombardi", "Gabriele", "" ], [ "Casiraghi", "Elena", "" ], [ "Campadelli", "Paola", "" ] ]
new_dataset
0.97015
1206.3999
C\'edric Bentz
C\'edric Bentz
A polynomial-time algorithm for planar multicuts with few source-sink pairs
11 pages, 1 figure
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an edge-weighted undirected graph and a list of k source-sink pairs of vertices, the well-known minimum multicut problem consists in selecting a minimum-weight set of edges whose removal leaves no path between every source and its corresponding sink. We give the first polynomial-time algorithm to solve this problem in planar graphs, when k is fixed. Previously, this problem was known to remain NP-hard in general graphs with fixed k, and in trees with arbitrary k; the most noticeable tractable case known so far was in planar graphs with fixed k and sources and sinks lying on the outer face.
[ { "version": "v1", "created": "Mon, 18 Jun 2012 17:32:34 GMT" } ]
2012-06-19T00:00:00
[ [ "Bentz", "Cédric", "" ] ]
new_dataset
0.98682
1206.3138
Ashish Khisti
Ashish Khisti, Brett Hern, and Krishna Narayanan
On Modulo-Sum Computation over an Erasure Multiple Access Channel
Shorter Version will Appear at ISIT 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study computation of a modulo-sum of two binary source sequences over a two-user erasure multiple access channel. The channel is modeled as a binary-input, erasure multiple access channel, which can be in one of three states - either the channel output is a modulo-sum of the two input symbols, or the channel output equals the input symbol on the first link and an erasure on the second link, or vice versa. The associated state sequence is independent and identically distributed. We develop a new upper bound on the sum-rate by revealing only part of the state sequence to the transmitters. Our coding scheme is based on the compute and forward and the decode and forward techniques. When a (strictly) causal feedback of the channel state is available to the encoders, we show that the modulo-sum capacity is increased. Extensions to the case of lossy reconstruction of the modulo-sum and to channels involving additional states are also treated briefly.
[ { "version": "v1", "created": "Thu, 14 Jun 2012 15:23:23 GMT" } ]
2012-06-15T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Hern", "Brett", "" ], [ "Narayanan", "Krishna", "" ] ]
new_dataset
0.991858
1206.2914
Thiyagarajan P
P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan
Steganalysis Using Color Model Conversion
arXiv admin note: substantial text overlap with arXiv:1206.2586
Thiyagarajan P, Aghila G, Prasanna Venkatesan V, "Steganalysis using Color Model Conversion", Signal and Image Processing: An International Journal (SIPIJ) ISSN 0976-710x Volume 2, No 4 December 2011
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence of hidden messages inside digital medium. This paper focuses on universal image steganalysis method which uses RGB to HSI colour model conversion. Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. The developed Universal Steganalysis algorithm is tested in stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-image sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms and it helps to rate its efficiency. Proposed Steganalysis using Colour Model has been tested with our Image Database and the results were affirmative.
[ { "version": "v1", "created": "Tue, 12 Jun 2012 06:59:51 GMT" } ]
2012-06-14T00:00:00
[ [ "Thiyagarajan", "P.", "" ], [ "Aghila", "G.", "" ], [ "Venkatesan", "V. Prasanna", "" ] ]
new_dataset
0.979803
1206.0142
Hicham Elasri
Hicham Elasri, Neknane Mehdi, Aatab Jamila and Ganoun Karima
Open source based cadastral information system : ANCFCC-MOROCCO
International conference of GIS users, May 23-24, 2012, Fez (Morocco)
null
null
null
cs.OH
http://creativecommons.org/licenses/by/3.0/
This present project is developing a geographic information system to support the cadastral business. This system based on open source solutions which developed within the National Agency of Land Registry, Cadastre and Cartography (ANCFCC) enabling monitoring and analysis of cadastral procedures as well as offering consumable services by other information systems: consultation and querying spatial data. The project will also assist the various user profiles in the completion of production tasks and the possibility to eliminate the deficiencies identified to ensure an optimum level of productivity
[ { "version": "v1", "created": "Fri, 1 Jun 2012 10:42:20 GMT" } ]
2012-06-13T00:00:00
[ [ "Elasri", "Hicham", "" ], [ "Mehdi", "Neknane", "" ], [ "Jamila", "Aatab", "" ], [ "Karima", "Ganoun", "" ] ]
new_dataset
0.993118
1206.0549
Achim Hekler
Achim Hekler, J\"org Fischer, Uwe D. Hanebeck
Sequence-Based Control for Networked Control Systems Based on Virtual Control Inputs
null
null
null
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of controlling a system over an unreliable connection that is affected by time-varying delays and randomly occurring packet losses. A novel sequence-based approach is proposed that extends a given controller designed without consideration of the network-induced disturbances. Its key idea is to model the unknown future control inputs by random variables, the so-called virtual control inputs, which are characterized by discrete probability density functions. Subject to this probabilistic description, the actual sequence of future control inputs is determined and transmitted to the actuator. The high performance of the proposed approach is demonstrated by means of Monte Carlo simulation runs with an inverted pendulum on a cart and by a detailed comparison to standard NCS approaches.
[ { "version": "v1", "created": "Mon, 4 Jun 2012 08:56:35 GMT" }, { "version": "v2", "created": "Tue, 12 Jun 2012 08:11:21 GMT" } ]
2012-06-13T00:00:00
[ [ "Hekler", "Achim", "" ], [ "Fischer", "Jörg", "" ], [ "Hanebeck", "Uwe D.", "" ] ]
new_dataset
0.968236
1206.2544
Shah Mahmood Mr.
Shah Mahmood and Ismatullah Nazar
Education in Conflict Zones: a Web and Mobility Approach
null
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new framework for education in conflict zones, considering the explosive growth of social media, web services, and mobile Internet over the past decade. Moreover, we focus on one conflict zone, Afghanistan, as a case study, because of its alarmingly high illiteracy rate, lack of qualified teachers, rough terrain, and relatively high mobile penetration of over 50%. In several of Afghanistan's provinces, it is hard to currently sustain the traditional bricks-and-mortar school model, due to numerous incidents of schools, teachers, and students being attacked because of the ongoing insurgency and political instability. Our model improves the virtual school model, by addressing most of its disadvantages, to provide students in Afghanistan with an opportunity to achieve standardised education, even when the security situation does not allow them to attend traditional schools. One of the biggest advantages of this model is that it is sufficiently robust to deal with gender discrimination, imposed by culture or politics of the region.
[ { "version": "v1", "created": "Tue, 12 Jun 2012 14:32:55 GMT" } ]
2012-06-13T00:00:00
[ [ "Mahmood", "Shah", "" ], [ "Nazar", "Ismatullah", "" ] ]
new_dataset
0.998745
1206.2583
Thiyagarajan P
P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan
Dynamic Pattern Based Image Steganography
Journal of Computing ISSN 2151-9617, Volume 3, Issue 2 February 2011
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Steganography is the art of hiding secret information in media such as image, audio and video. The purpose of steganography is to conceal the existence of the secret information in any given medium. This work aims at strengthening the security in steganography algorithm by generating dynamic pattern in selection of indicator sequence. In addition to this dynamicity is also encompassed in number of bits embedded in data channel. This technique has been implemented and the results have been compared and evaluated with existing similar techniques.
[ { "version": "v1", "created": "Tue, 12 Jun 2012 16:38:29 GMT" } ]
2012-06-13T00:00:00
[ [ "Thiyagarajan", "P.", "" ], [ "Aghila", "G.", "" ], [ "Venkatesan", "V. Prasanna", "" ] ]
new_dataset
0.974359
1206.1918
Sugata Sanyal
Preetida Vinayakray-Jani, Sugata Sanyal
Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis
7 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present comparative analysis of MANET (Mobile Ad-Hoc Network) and VANET (Vehicular Ad-Hoc Network) routing protocols, in this paper. The analysis is based on various design factors. The traditional routing protocols of AODV (Ad hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and DSDV (Destination-Sequenced Distance-Vector) of MANET are utilizing node centric routing which leads to frequent breaking of routes, causing instability in routing. Usage of these protocols in high mobility environment like VANET may eventually cause many packets to drop. Route repairs and failures notification overheads increase significantly leading to low throughput and long delays. Such phenomenon is not suitable for Vehicular Ad hoc Networks (VANET) due to high mobility of nodes where network can be dense or sparse. Researchers have proposed various routing algorithms or mechanism for MANET and VANET. This paper describes the relevant protocols, associated algorithm and the strength and weakness of these routing protocols.
[ { "version": "v1", "created": "Sat, 9 Jun 2012 09:05:19 GMT" } ]
2012-06-12T00:00:00
[ [ "Vinayakray-Jani", "Preetida", "" ], [ "Sanyal", "Sugata", "" ] ]
new_dataset
0.994789
1206.2132
Lei Li
Lei Li, Tianshi Chen, Yunji Chen, Ling Li, and Ruiyang Wu
RepTFD: Replay Based Transient Fault Detection
22 pages, 11 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advances in IC process make future chip multiprocessors (CMPs) more and more vulnerable to transient faults. To detect transient faults, previous core-level schemes provide redundancy for each core separately. As a result, they may leave transient faults in the uncore parts, which consume over 50% area of a modern CMP, escaped from detection. This paper proposes RepTFD, the first core-level transient fault detection scheme with 100% coverage. Instead of providing redundancy for each core separately, RepTFD provides redundancy for a group of cores as a whole. To be specific, it replays the execution of the checked group of cores on a redundant group of cores. Through comparing the execution results between the two groups of cores, all malignant transient faults can be caught. Moreover, RepTFD adopts a novel pending period based record-replay approach, which can greatly reduce the number of execution orders that need to be enforced in the replay-run. Hence, RepTFD brings only 4.76% performance overhead in comparison to the normal execution without fault-tolerance according to our experiments on the RTL design of an industrial CMP named Godson-3. In addition, RepTFD only consumes about 0.83% area of Godson-3, while needing only trivial modifications to existing components of Godson-3.
[ { "version": "v1", "created": "Mon, 11 Jun 2012 08:50:37 GMT" } ]
2012-06-12T00:00:00
[ [ "Li", "Lei", "" ], [ "Chen", "Tianshi", "" ], [ "Chen", "Yunji", "" ], [ "Li", "Ling", "" ], [ "Wu", "Ruiyang", "" ] ]
new_dataset
0.994627
1206.2320
YenFu Ou
Yen-Fu Ou, Yuanyi Xue, Yao Wang
Q-STAR:A Perceptual Video Quality Model Considering Impact of Spatial, Temporal, and Amplitude Resolutions
13 pages
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the impact of spatial, temporal and amplitude resolution (STAR) on the perceptual quality of a compressed video. Subjective quality tests were carried out on a mobile device. Seven source sequences are included in the tests and for each source sequence we have 27 test configurations generated by JSVM encoder (3 QP levels, 3 spatial resolutions, and 3 temporal resolutions), resulting a total of 189 processed video sequences (PVSs). Videos coded at different spatial resolutions are displayed at the full screen size of the mobile platform. Subjective data reveal that the impact of spatial resolution (SR), temporal resolution (TR) and quantization stepsize (QS) can each be captured by a function with a single content-dependent parameter. The joint impact of SR, TR and QS can be accurately modeled by the product of these three functions with only three parameters. We further find that the quality decay rates with SR and QS, respectively are independent of TR, and likewise, the decay rate with TR is independent of SR and QS, respectively. However, there is a significant interaction between the effects of SR and QS. The overall quality model is further validated on five other datasets with very high accuracy. The complete model correlates well with the subjective ratings with a Pearson Correlation Coefficient (PCC) of 0.991.
[ { "version": "v1", "created": "Mon, 11 Jun 2012 19:06:07 GMT" } ]
2012-06-12T00:00:00
[ [ "Ou", "Yen-Fu", "" ], [ "Xue", "Yuanyi", "" ], [ "Wang", "Yao", "" ] ]
new_dataset
0.988593
1206.2322
Yipeng Liu Dr.
Rong Fan, Qun Wan, Xiao Zhang, Hui Chen, Yipeng Liu
A Fast HRRP Synthesis Algorithm with Sensing Dictionary in GTD Model
16 pages, 8 figures, 2 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To achieve high range resolution profile (HRRP), the geometric theory of diffraction (GTD) parametric model is widely used in stepped-frequency radar system. In the paper, a fast synthetic range profile algorithm, called orthogonal matching pursuit with sensing dictionary (OMP-SD), is proposed. It formulates the traditional HRRP synthetic to be a sparse approximation problem over redundant dictionary. As it employs a priori information that targets are sparsely distributed in the range space, the synthetic range profile (SRP) can be accomplished even in presence of data lost. Besides, the computational complexity is reduced by introducing sensing dictionary (SD) and it mitigates the model mismatch at the same time. The computation complexity decreases from O(MNDK) flops for OMP to O(M(N +D)K) flops for OMP-SD. Simulation experiments illustrate its advantages both in additive white Gaussian noise (AWGN) and noiseless situation, respectively.
[ { "version": "v1", "created": "Mon, 11 Jun 2012 19:11:32 GMT" } ]
2012-06-12T00:00:00
[ [ "Fan", "Rong", "" ], [ "Wan", "Qun", "" ], [ "Zhang", "Xiao", "" ], [ "Chen", "Hui", "" ], [ "Liu", "Yipeng", "" ] ]
new_dataset
0.996705
1206.1618
Ahmed Dooguy Kora
Ahmed Dooguy Kora
DWDM/OOC and large spectrum sources performance in broadband access network
(IJDPS) Vol.3, No.3, May 2012, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.3, May 2012
null
10.5121/ijdps.2012.3317
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a performance evaluation based on elaborated analytical expressions of error probability for broadband access network in the case of a combined technique of dense wavelength division multiplexing (DWDM) and one dimensional optical orthogonal codes (1D-OOC). Optical sources with relatively large spectrum has been considered and simulated. Besides the Multiple Access Interference (MAI) at the receiver due to the access method which is optical code division multiple access (OCDMA), the emitted radiation of these sources in a dense WDM communication link introduces additional interference. Conventional correlation receiver (CCR) and parallel interference cancellation (PIC) receiver limitations are discussed. This paper has investigated the kind of optical sources with large spectrum bandwidth which could be accepted for a targeted bit error rate (BER) and given number of users in broadband access network supporting DWDM with optical orthogonal codes.
[ { "version": "v1", "created": "Thu, 7 Jun 2012 21:06:15 GMT" } ]
2012-06-11T00:00:00
[ [ "Kora", "Ahmed Dooguy", "" ] ]
new_dataset
0.994355
1206.1674
Ankur Dumka Mr.
Ankur Dumka and Hardwari Lal Mandoria
Dynamic MPLS with Feedback
6 pages and 3 figures
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.2, April 2012, 125-130
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER), where as the label switch routers (LSRs) uses Label Distribution Protocol (LDP) or RSVP (Resource reservation Protocol) for label allocation and Label table for packet forwarding. Dynamic protocol is implemented which carries a Updates packets for the details of Label Switch Paths, along with this feedback mechanism is also introduced which find the shortest path among MPLS network and also feedback is provided which also help to overcome congestion, this feedback mechanism is on a hop by hop basis rather than end to end thus providing a more reliable and much faster and congestion free path for the packets.
[ { "version": "v1", "created": "Fri, 8 Jun 2012 06:53:46 GMT" } ]
2012-06-11T00:00:00
[ [ "Dumka", "Ankur", "" ], [ "Mandoria", "Hardwari Lal", "" ] ]
new_dataset
0.999203
1206.1722
Surekha T.P
T.P. Surekha, T. Ananthapadmanabha, C. Puttamadappa
C-Band VSAT Data Communication System and RF Impairments
18 pages
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with modelling and simulation of VSAT (very small aperture terminal) data messaging network operating in India at Karnataka with extended C-band. VSATs in Karnataka of KPTCL use VSATS 6.875-6.9465G Hz uplinks and 4.650- 4.7215 GHz downlinks. These frequencies are dedicated to fixed services. The Satellite is Intelsat -3A, the hub has a 7.2 m diameter antenna and uses 350W or 600W TWTA (Travelling wave Tube Amplifier). The VSAT's are 1.2 m with RF power of 1W or 2W depending on their position in the uplink beam with data rate of 64 or 128 K bit/s. The performance of the system is analysed by the error probability called BER (Bit Error Rate) and results are derived from Earth station to hub and hub to Earth station using satellite Transponder as the media of communication channel. The Link budgets are developed for a single one-way satellite link.
[ { "version": "v1", "created": "Fri, 8 Jun 2012 10:37:57 GMT" } ]
2012-06-11T00:00:00
[ [ "Surekha", "T. P.", "" ], [ "Ananthapadmanabha", "T.", "" ], [ "Puttamadappa", "C.", "" ] ]
new_dataset
0.971079
1206.1833
Richard van de Stadt
Richard van de Stadt
CyberChair: A Web-Based Groupware Application to Facilitate the Paper Reviewing Process
7 pages, 7 figures, created 29 May 2000, when I still worked at the University of Twente, The Netherlands. The paper was submitted to a Python conference and accepted, but due to a misunderstanding with my employer, I had to withdraw the paper from the conference. The paper describes the public version, called CyberChair, and not the commercial version called CyberChairPRO
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe CyberChair, a web-based groupware application that supports the review process for technical contributions to conferences. CyberChair deals with most administrative tasks that are involved in the review process, such as storing author information, abstracts, (camera-ready) papers and reviews. It generates several overviews based on the reviews which support the Program Committee (PC) in selecting the best papers. CyberChair points out conflicting reviews and offers the reviewers means to easily communicate to solve these conflicts. In his paper Identify the Champion, O. Nierstrasz describes this review process in terms of a pattern language. CyberChair supports PCs by using these patterns in its implementation.
[ { "version": "v1", "created": "Fri, 8 Jun 2012 18:19:01 GMT" } ]
2012-06-11T00:00:00
[ [ "van de Stadt", "Richard", "" ] ]
new_dataset
0.997188
1107.3438
Sudhir R. Ghorpade
Peter Beelen, Sudhir R. Ghorpade, Tom Hoeholdt
Duals of Affine Grassmann Codes and their Relatives
20 pages
IEEE Transactions on Information Theory, Vol. 58, No. 6 (2012), pp. 3843-3855
10.1109/TIT.2012.2187171
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Affine Grassmann codes are a variant of generalized Reed-Muller codes and are closely related to Grassmann codes. These codes were introduced in a recent work [2]. Here we consider, more generally, affine Grassmann codes of a given level. We explicitly determine the dual of an affine Grassmann code of any level and compute its minimum distance. Further, we ameliorate the results of [2] concerning the automorphism group of affine Grassmann codes. Finally, we prove that affine Grassmann codes and their duals have the property that they are linear codes generated by their minimum-weight codewords. This provides a clean analogue of a corresponding result for generalized Reed-Muller codes.
[ { "version": "v1", "created": "Mon, 18 Jul 2011 14:05:15 GMT" } ]
2012-06-07T00:00:00
[ [ "Beelen", "Peter", "" ], [ "Ghorpade", "Sudhir R.", "" ], [ "Hoeholdt", "Tom", "" ] ]
new_dataset
0.989098
1206.1312
Joseph O'Rourke
Stephanie Jakus and Joseph O'Rourke
From Pop-Up Cards to Coffee-Cup Caustics: The Knight's Visor
12 pages, 13 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As a pedagogical exercise, we derive the shape of a particularly elegant pop-up card design, and show that it connects to a classically studied plane curve that is (among other interpretations) a caustic of a circle.
[ { "version": "v1", "created": "Wed, 6 Jun 2012 19:38:53 GMT" } ]
2012-06-07T00:00:00
[ [ "Jakus", "Stephanie", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.971445
1206.0805
Gelasio Salazar
J\'ozsef Balogh, Hern\'an Gonz\'alez-Aguilar, and Gelasio Salazar
Large convex holes in random point sets
null
null
null
null
cs.CG math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A {\em convex hole} (or {\em empty convex polygon)} of a point set $P$ in the plane is a convex polygon with vertices in $P$, containing no points of $P$ in its interior. Let $R$ be a bounded convex region in the plane. We show that the expected number of vertices of the largest convex hole of a set of $n$ random points chosen independently and uniformly over $R$ is $\Theta(\log{n}/(\log{\log{n}}))$, regardless of the shape of $R$.
[ { "version": "v1", "created": "Tue, 5 Jun 2012 01:00:18 GMT" } ]
2012-06-06T00:00:00
[ [ "Balogh", "József", "" ], [ "González-Aguilar", "Hernán", "" ], [ "Salazar", "Gelasio", "" ] ]
new_dataset
0.998217
1206.0848
M Sinaie
Hashem Moradmand Ziyabar, Mahnaz Sinaie, Ali Payandeh, Vahid Tabataba Vakili
Secure FSM- based arithmetic codes
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper a method which adds secrecy to this well-known source code is proposed. Finite state arithmetic code (FSAC) is used as source code to add security. Its finite state machine (FSM) characteristic is exploited to insert some random jumps during source coding process. In addition, a Huffman code is designed for each state to make decoding possible even in jumps. Being Prefix free, Huffman codes are useful in tracking correct states for an authorized user when s/he decodes with correct symmetric pseudo random key. The robustness of our proposed scheme is further reinforced by adding another extra uncertainty by swapping outputs of Huffman codes in each state. Several test images are used for inspecting the validity of the proposed Huffman Finite State Arithmetic Coding (HFSAC). The results of several experimental, key space analyses, statistical analysis, key sensitivity and plaintext sensitivity tests show that HFSAC with a little effect on compression efficiency for image cryptosystem provides an efficient and secure way for real-time image encryption and transmission.
[ { "version": "v1", "created": "Tue, 5 Jun 2012 09:08:47 GMT" } ]
2012-06-06T00:00:00
[ [ "Ziyabar", "Hashem Moradmand", "" ], [ "Sinaie", "Mahnaz", "" ], [ "Payandeh", "Ali", "" ], [ "Vakili", "Vahid Tabataba", "" ] ]
new_dataset
0.999545
1206.0978
Sanjay Singh
Pradeep B. H. and Sanjay Singh
Privacy Preserving and Ownership Authentication in Ubiquitous Computing Devices using Secure Three Way Authentication
13 pages, 4 figures, presented at IIT'12, Al Ain, UAE
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In todays world of technology and gadgets almost every person is having a portable device, be it a laptop or the smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. Maybe he wants some data from the fellow user or from the service provider or maybe he wants to control his smart devices at home from wherever he is. In the present era of mobile environments, interactions between the user device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a "Secure Three Way Authentication (STWA)" technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check if the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged.
[ { "version": "v1", "created": "Tue, 5 Jun 2012 16:17:14 GMT" } ]
2012-06-06T00:00:00
[ [ "H.", "Pradeep B.", "" ], [ "Singh", "Sanjay", "" ] ]
new_dataset
0.990736
1206.0995
Mahsa Shirmohammadi
Laurent Doyen, Thierry Massart, Mahsa Shirmohammadi
Infinite Synchronizing Words for Probabilistic Automata (Erratum)
5 pages, 3 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In [1], we introduced the weakly synchronizing languages for probabilistic automata. In this report, we show that the emptiness problem of weakly synchronizing languages for probabilistic automata is undecidable. This implies that the decidability result of [1-3] for the emptiness problem of weakly synchronizing language is incorrect.
[ { "version": "v1", "created": "Mon, 19 Mar 2012 17:54:53 GMT" } ]
2012-06-06T00:00:00
[ [ "Doyen", "Laurent", "" ], [ "Massart", "Thierry", "" ], [ "Shirmohammadi", "Mahsa", "" ] ]
new_dataset
0.957479
1004.0777
arXiv Admin
Kamaljit Lakhtaria (1), Bhaskar N. Patel (2), Satish G. Prajapati (2), N. N. Jani (3),((1) Rajkot Gujarat, India,(2) Ganpat Vidyanagar, Kherava, Gujarat, India,(3) Kadi Vishvadiva Vidyalaya (Deemed University), S K Patel Gandhinagar, India)
Securing AODV for MANETs using Message Digest with Secret Key
This article has been withdrawn by arXiv admins because it contains plagiarized content from International Conference on Computer Networks and Security (ICCNS 2008, September 27-28, 2008): "Securing AODV for MANETs using Message Digest with Secret Key", by Sunil J. Soni and Prashant B. Swadas
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
This article has been withdrawn by arXiv admins because it contains plagiarized content from International Conference on Computer Networks and Security (ICCNS 2008, September 27-28, 2008): "Securing AODV for MANETs using Message Digest with Secret Key", by Sunil J. Soni and Prashant B. Swadas.
[ { "version": "v1", "created": "Tue, 6 Apr 2010 05:49:56 GMT" }, { "version": "v2", "created": "Mon, 4 Jun 2012 15:14:26 GMT" } ]
2012-06-05T00:00:00
[ [ "Lakhtaria", "Kamaljit", "" ], [ "Patel", "Bhaskar N.", "" ], [ "Prajapati", "Satish G.", "" ], [ "Jani", "N. N.", "" ] ]
new_dataset
0.970361
1109.2613
Xiaomeng Shi
Xiaomeng Shi, Muriel Medard, Daniel E. Lucani
Whether and Where to Code in the Wireless Relay Channel
11 pages, 12 figures, to be published in the IEEE JSAC Special Issue on Theories and Methods for Advanced Wireless Relays
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations. In energy-constrained systems, however, coding subgraphs should be chosen to control the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of network coding in the wireless packet erasure relay channel according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. In addition to transmission energy, we take into account coding and reception energies. We show that coding at the relay alone while operating in a rateless fashion is neither throughput nor energy efficient. Given a set of system parameters, our analysis determines the optimal amount of time the relay should participate in the transmission, and where coding should be performed.
[ { "version": "v1", "created": "Mon, 12 Sep 2011 20:15:27 GMT" }, { "version": "v2", "created": "Fri, 1 Jun 2012 21:26:51 GMT" } ]
2012-06-05T00:00:00
[ [ "Shi", "Xiaomeng", "" ], [ "Medard", "Muriel", "" ], [ "Lucani", "Daniel E.", "" ] ]
new_dataset
0.992397
1202.5282
Mohammad Iftekhar Husain
Mohammad Iftekhar Husain, Lokesh Mandvekar, Chunming Qiao, Ramalingam Sridhar
How to Bypass Verified Boot Security in Chromium OS
Update information about Chromium OS. Added new and advanced exploits. Added mitigation techniques and evaluation
null
null
null
cs.CR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Verified boot is an interesting feature of Chromium OS that supposedly can detect any modification in the root file system (rootfs) by a dedicated adversary. However, by exploiting a design flaw in verified boot, we show that an adversary can replace the original rootfs by a malicious rootfs containing exploits such as a spyware or keylogger and still pass the verified boot process. The exploit is based on the fact that a dedicated adversary can replace the rootfs and the corresponding verification information in the bootloader. We experimentally demonstrate an attack using both the base and developer version of Chromium OS in which the adversary installs a spyware in the target system to send cached user data to the attacker machine in plain text which are otherwise encrypted, and thus inaccessible. We also demonstrate techniques to mitigate this vulnerability.
[ { "version": "v1", "created": "Thu, 23 Feb 2012 20:12:00 GMT" }, { "version": "v2", "created": "Sat, 2 Jun 2012 15:56:26 GMT" } ]
2012-06-05T00:00:00
[ [ "Husain", "Mohammad Iftekhar", "" ], [ "Mandvekar", "Lokesh", "" ], [ "Qiao", "Chunming", "" ], [ "Sridhar", "Ramalingam", "" ] ]
new_dataset
0.998936
1204.6325
Konstantinos Chorianopoulos
Konstantinos Chorianopoulos, Vassiliki Tsaknaki
CELL: Connecting Everyday Life in an archipeLago
This paper has been withdrawn by the author due to some errors
null
null
null
cs.HC cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the design of a seamless broadcast communication system that brings together the distributed community of remote secondary education schools. In contrast to higher education, primary and secondary education establishments should remain distributed, in order to maintain a balance of urban and rural life in the developing and the developed world. We plan to deploy an ambient and social interactive TV platform (physical installation, authoring tools, interactive content) that supports social communication in a positive way. In particular, we present the physical design and the conceptual model of the system.
[ { "version": "v1", "created": "Fri, 27 Apr 2012 20:10:16 GMT" }, { "version": "v2", "created": "Sun, 3 Jun 2012 08:45:46 GMT" } ]
2012-06-05T00:00:00
[ [ "Chorianopoulos", "Konstantinos", "" ], [ "Tsaknaki", "Vassiliki", "" ] ]
new_dataset
0.998101
1206.0381
Shamim Ripon
Md. Nawab Yousuf Ali, Shamim Ripon and Shaikh Muhammad Allayear
UNL Based Bangla Natural Text Conversion - Predicate Preserving Parser Approach
7 pages, International Journal of Computer Science Issues (IJCSI), Volume 9, Issue 3 May 2012
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Universal Networking Language (UNL) is a declarative formal language that is used to represent semantic data extracted from natural language texts. This paper presents a novel approach to converting Bangla natural language text into UNL using a method known as Predicate Preserving Parser (PPP) technique. PPP performs morphological, syntactic and semantic, and lexical analysis of text synchronously. This analysis produces a semantic-net like structure represented using UNL. We demonstrate how Bangla texts are analyzed following the PPP technique to produce UNL documents which can then be translated into any other suitable natural language facilitating the opportunity to develop a universal language translation method via UNL.
[ { "version": "v1", "created": "Sat, 2 Jun 2012 13:23:18 GMT" } ]
2012-06-05T00:00:00
[ [ "Ali", "Md. Nawab Yousuf", "" ], [ "Ripon", "Shamim", "" ], [ "Allayear", "Shaikh Muhammad", "" ] ]
new_dataset
0.954497
1206.0420
Gopalakrishnan Tr Nair
Mary Cherian, T. R. Gopalakrishnan Nair
Multipath Routing With Novel Packet Scheduling Approach In Wireless Sensor Networks
pages 5, figures 5, ISSN: 1793-821X (Online Version); 1793-8201 (Print Version), International Journal of Computer Theory and Engineering, Vol. 3, No. 5, October 2011,pp. 666-670
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks sense and monitor real-time events. They supervise a geographic area where a phenomenon is to be monitored. The data in sensor networks have different levels of priority and hence their criticality differs. In order to keep up the real time commitment, the applications need higher transmission rates and reliability in information delivery. In this work we propose a multipath routing algorithm which enables the reliable delivery of data. By controlling the scheduling rate, it is possible to prevent congestion and packet loss in the network. The algorithm provides an efficient way to prevent the packet loss at each node. This results in congestion management in the sensor networks. This protocol prevents packet clustering and provides smoothness to the traffic. Through monitoring and controlling the scheduling rate the flow control and congestion control are managed.
[ { "version": "v1", "created": "Sun, 3 Jun 2012 04:54:18 GMT" } ]
2012-06-05T00:00:00
[ [ "Cherian", "Mary", "" ], [ "Nair", "T. R. Gopalakrishnan", "" ] ]
new_dataset
0.997709
1206.0514
Taylor Gordon
Taylor Gordon
Simultaneous Embeddings with Vertices Mapping to Pre-Specified Points
12 pages (plus appendix), 7 figures
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the problem of embedding graphs in the plane with restrictions on the vertex mapping. In particular, we introduce a technique for drawing planar graphs with a fixed vertex mapping that bounds the number of times edges bend. An immediate consequence of this technique is that any planar graph can be drawn with a fixed vertex mapping so that edges map to piecewise linear curves with at most $3n + O(1)$ bends each. By considering uniformly random planar graphs, we show that $2n + O(1)$ bends per edge is sufficient on average. To further utilize our technique, we consider simultaneous embeddings of $k$ uniformly random planar graphs with vertices mapping to a fixed, common point set. We explain how to achieve such a drawing so that edges map to piecewise linear curves with $O(n^{1-1/k})$ bends each, which holds with overwhelming probability. This result improves upon the previously best known result of O(n) bends per edge for the case where $k \geq 2$. Moreover, we give a lower bound on the number of bends that matches our upper bound, proving our results are optimal.
[ { "version": "v1", "created": "Mon, 4 Jun 2012 04:06:13 GMT" } ]
2012-06-05T00:00:00
[ [ "Gordon", "Taylor", "" ] ]
new_dataset
0.973071
1206.0604
Adrian Glaubitz
John Paul Adrian Glaubitz
Modern consumerism and the waste problem
8 pages, 4 images
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advance of industrial mass production, modern micro-electronics and computers, the intervals between the release of new generations of consumer products have been dramatically reduced and so have their lifetime cycles. While it was very natural in the post-war era, that sophisticated consumer products like television sets and stereo equipment would not be replaced with a new product until they break, and usually beyond that point since it was very common to have a broken television set serviced, the habits of consumers have changed during the last quarter of the 20th century. A modern consumer product, like Apple's famous iPhone has a market life of approximately one year until a successor is announced and subsequently pushed into the market. Usually these new generations bring a bunch of new features, have a higher performance while maintaining the price or becoming even cheaper, thus the consumer greatly benefits from the reduced lifetime cycle of these products. However, electronic devices not only require a lot of of Earth's limited resources for their production, but their production processes are a major source for harmful climate gases like carbon dioxide and toxic waste like heavy metal alloys, acids and alkalis. And last but not least is every obsoleted iPhone a candidate for waste facilities unless consumers are going to sell them on the second hand market. While we can not expect consumers and manufacturers to go back to the early days of consumer products where lifetime cycles reached up to 20 years, the world record being the famous "Centennial Lightbulb" in Livermore, CA in the US, which has been lit for over 100 years, it is certainly about time to rethink modern consumerism with regard to responsibility to future generations.
[ { "version": "v1", "created": "Mon, 4 Jun 2012 13:01:09 GMT" } ]
2012-06-05T00:00:00
[ [ "Glaubitz", "John Paul Adrian", "" ] ]
new_dataset
0.999424
1205.5224
Rafael Dowsley
Nico D\"ottling, Rafael Dowsley, J\"orn M\"uller-Quade and Anderson C. A. Nascimento
A CCA2 Secure Variant of the McEliece Cryptosystem
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer. Moreover, even tough McEliece PKC has a relatively big key size, encryption and decryption operations are rather efficient. In spite of all the recent results in coding theory based cryptosystems, to the date, there are no constructions secure against chosen ciphertext attacks in the standard model - the de facto security notion for public-key cryptosystems. In this work, we show the first construction of a McEliece based public-key cryptosystem secure against chosen ciphertext attacks in the standard model. Our construction is inspired by a recently proposed technique by Rosen and Segev.
[ { "version": "v1", "created": "Wed, 23 May 2012 17:11:21 GMT" }, { "version": "v2", "created": "Tue, 29 May 2012 23:35:29 GMT" }, { "version": "v3", "created": "Fri, 1 Jun 2012 00:32:10 GMT" } ]
2012-06-04T00:00:00
[ [ "Döttling", "Nico", "" ], [ "Dowsley", "Rafael", "" ], [ "Müller-Quade", "Jörn", "" ], [ "Nascimento", "Anderson C. A.", "" ] ]
new_dataset
0.998054
1206.0107
Andrea Munari
Andrea Munari, Marco Levorato, Michele Zorzi
Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part II: Proactive Schemes
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work is the second of a two-part series of papers on the effectiveness of cooperative techniques in non-centralized carrier sense-based ad hoc wireless networks. While Part I extensively discussed reactive cooperation, characterized by relayed transmissions triggered by failure events at the intended receiver, Part II investigates in depth proactive solutions, in which the source of a packet exploits channel state information to preemptively coordinate with relays in order to achieve the optimal overall rate to the destination. In particular, this work shows by means of both analysis and simulation that the performance of reactive cooperation is reduced by the intrinsic nature of the considered medium access policy, which biases the distribution of the available relays, locating them in unfavorable positions for rate optimization. Moreover, the highly dynamic nature of interference that characterizes non-infrastructured ad hoc networks is proved to hamper the efficacy and the reliability of preemptively allocated cooperative links, as unpredicted births and deaths of surrounding transmissions may force relays to abort their support and/or change the maximum achievable rate at the intended receiver. As a general conclusion, our work extensively suggests that CSMA-based link layers are not apt to effectively support cooperative strategies in large-scale non-centralized ad hoc networks.
[ { "version": "v1", "created": "Fri, 1 Jun 2012 07:24:24 GMT" } ]
2012-06-04T00:00:00
[ [ "Munari", "Andrea", "" ], [ "Levorato", "Marco", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.958917
1206.0122
Jeremy Buisson
Jean-Eudes M\'ehus (CREC), Thais Batista (DIMAP), J\'er\'emy Buisson (CREC, IRISA, UEB)
ACME vs PDDL: support for dynamic reconfiguration of software architectures
6\`eme \'edition de la Conf\'erence Francophone sur les Architectures Logicielles (CAL 2012), Montpellier : France (2012)
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On the one hand, ACME is a language designed in the late 90s as an interchange format for software architectures. The need for recon guration at runtime has led to extend the language with speci c support in Plastik. On the other hand, PDDL is a predicative language for the description of planning problems. It has been designed in the AI community for the International Planning Competition of the ICAPS conferences. Several related works have already proposed to encode software architectures into PDDL. Existing planning algorithms can then be used in order to generate automatically a plan that updates an architecture to another one, i.e., the program of a recon guration. In this paper, we improve the encoding in PDDL. Noticeably we propose how to encode ADL types and constraints in the PDDL representation. That way, we can statically check our design and express PDDL constraints in order to ensure that the generated plan never goes through any bad or inconsistent architecture, not even temporarily.
[ { "version": "v1", "created": "Fri, 1 Jun 2012 08:19:16 GMT" } ]
2012-06-04T00:00:00
[ [ "Méhus", "Jean-Eudes", "", "CREC" ], [ "Batista", "Thais", "", "DIMAP" ], [ "Buisson", "Jérémy", "", "CREC, IRISA, UEB" ] ]
new_dataset
0.998347
1206.0169
Pradeep Singla
Pradeep Singla, Kamya Dhingra, Naveen Kr. Malik
DSTN (Distributed Sleep Transistor Network) for Low Power Programmable Logic array Design
6 pages, 7 Figures
IJCA 45(17):31-36, May 2012. Published by Foundation of Computer Science, New York, USA
10.5120/7004-9563
null
cs.OH
http://creativecommons.org/licenses/by/3.0/
With the high demand of the portable electronic products, Low- power design of VLSI circuits & Power dissipation has been recognized as a challenging technology in the recent years. PLA (Programming logic array) is one of the important off shelf part in the industrial application. This paper describes the new design of PLA using power gating structure sleep transistor at circuit level implementation for the low power applications. The important part of the power gating design i.e. header and footer switch selection is also describes in the paper. The simulating results of the proposed architecture of the new PLA is shown and compared with the conventional PLA. This paper clearly shows the optimization in the reduction of power dissipation in the new design implementation of the PLA. The transient response of the power gates structure of PLA is also illustrate in the paper by using TINA-PRO software.
[ { "version": "v1", "created": "Fri, 1 Jun 2012 13:09:24 GMT" } ]
2012-06-04T00:00:00
[ [ "Singla", "Pradeep", "" ], [ "Dhingra", "Kamya", "" ], [ "Malik", "Naveen Kr.", "" ] ]
new_dataset
0.999283
1205.6832
Michael Zock
Ga\"elle Lortal (TRT), Brigitte Grau (LIMSI), Michael Zock (LIF)
Syst\`eme d'aide \`a l'acc\`es lexical : trouver le mot qu'on a sur le bout de la langue
TALN, Fez : Maroc (2004)
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of the Tip of the Tongue phenomenon (TOT) provides valuable clues and insights concerning the organisation of the mental lexicon (meaning, number of syllables, relation with other words, etc.). This paper describes a tool based on psycho-linguistic observations concerning the TOT phenomenon. We've built it to enable a speaker/writer to find the word he is looking for, word he may know, but which he is unable to access in time. We try to simulate the TOT phenomenon by creating a situation where the system knows the target word, yet is unable to access it. In order to find the target word we make use of the paradigmatic and syntagmatic associations stored in the linguistic databases. Our experiment allows the following conclusion: a tool like SVETLAN, capable to structure (automatically) a dictionary by domains can be used sucessfully to help the speaker/writer to find the word he is looking for, if it is combined with a database rich in terms of paradigmatic links like EuroWordNet.
[ { "version": "v1", "created": "Fri, 20 Jan 2012 17:33:47 GMT" } ]
2012-06-01T00:00:00
[ [ "Lortal", "Gaëlle", "", "TRT" ], [ "Grau", "Brigitte", "", "LIMSI" ], [ "Zock", "Michael", "", "LIF" ] ]
new_dataset
0.996231
1205.7044
Negin Golrezaei
Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch
Wireless Device-to-Device Communications with Distributed Caching
to appear in ISIT 2012
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel wireless device-to-device (D2D) collaboration architecture that exploits distributed storage of popular content to enable frequency reuse. We identify a fundamental conflict between collaboration distance and interference and show how to optimize the transmission power to maximize frequency reuse. Our analysis depends on the user content request statistics which are modeled by a Zipf distribution. Our main result is a closed form expression of the optimal collaboration distance as a function of the content reuse distribution parameters. We show that if the Zipf exponent of the content reuse distribution is greater than 1, it is possible to have a number of D2D interference-free collaboration pairs that scales linearly in the number of nodes. If the Zipf exponent is smaller than 1, we identify the best possible scaling in the number of D2D collaborating links. Surprisingly, a very simple distributed caching policy achieves the optimal scaling behavior and therefore there is no need to centrally coordinate what each node is caching.
[ { "version": "v1", "created": "Thu, 31 May 2012 17:02:31 GMT" } ]
2012-06-01T00:00:00
[ [ "Golrezaei", "Negin", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Molisch", "Andreas F.", "" ] ]
new_dataset
0.999034
1204.1677
Anatoly Khina
Idan Livni, Anatoly Khina, Ayal Hitron, Uri Erez
Space-Time MIMO Multicasting
ISIT 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicasting is the general method of conveying the same information to multiple users over a broadcast channel. In this work, the Gaussian MIMO broadcast channel is considered, with multiple users and any number of antennas at each node. A "closed loop" scenario is assumed, for which a practical capacity-achieving multicast scheme is constructed. In the proposed scheme, linear modulation is carried over time and space together, which allows to transform the problem into that of transmission over parallel scalar sub-channels, the gains of which are equal, except for a fraction of sub-channels that vanishes with the number of time slots used. Over these sub-channels, off-the-shelf fixed-rate AWGN codes can be used to approach capacity.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 20:41:33 GMT" }, { "version": "v2", "created": "Wed, 30 May 2012 11:08:09 GMT" } ]
2012-05-31T00:00:00
[ [ "Livni", "Idan", "" ], [ "Khina", "Anatoly", "" ], [ "Hitron", "Ayal", "" ], [ "Erez", "Uri", "" ] ]
new_dataset
0.982964
1205.6568
Wei Su
Wei Su, Alexander Pott, and Xiaohu Tang
Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present necessary and sufficient conditions for a Boolean function to be a negabent function for both even and odd number of variables, which demonstrate the relationship between negabent functions and bent functions. By using these necessary and sufficient conditions for Boolean functions to be negabent, we obtain that the nega spectrum of a negabent function has at most 4 values. We determine the nega spectrum distribution of negabent functions. Further, we provide a method to construct bent-negabent functions in $n$ variables ($n$ even) of algebraic degree ranging from 2 to $\frac{n}{2}$, which implies that the maximum algebraic degree of an $n$-variable bent-negabent function is equal to $\frac{n}{2}$. Thus, we answer two open problems proposed by Parker and Pott and by St\v{a}nic\v{a} \textit{et al.} respectively.
[ { "version": "v1", "created": "Wed, 30 May 2012 07:55:46 GMT" } ]
2012-05-31T00:00:00
[ [ "Su", "Wei", "" ], [ "Pott", "Alexander", "" ], [ "Tang", "Xiaohu", "" ] ]
new_dataset
0.98232
1205.6605
Jan Egger
Jan Egger, Bernd Freisleben, Christopher Nimsky, Tina Kapur
Template-Cut: A Pattern-Based Segmentation Paradigm
8 pages, 6 figures, 3 tables, 6 equations, 51 references
J. Egger, B. Freisleben, C. Nimsky, T. Kapur. Template-Cut: A Pattern-Based Segmentation Paradigm. Nature - Scientific Reports, Nature Publishing Group (NPG), 2(420), 2012
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present a scale-invariant, template-based segmentation paradigm that sets up a graph and performs a graph cut to separate an object from the background. Typically graph-based schemes distribute the nodes of the graph uniformly and equidistantly on the image, and use a regularizer to bias the cut towards a particular shape. The strategy of uniform and equidistant nodes does not allow the cut to prefer more complex structures, especially when areas of the object are indistinguishable from the background. We propose a solution by introducing the concept of a "template shape" of the target object in which the nodes are sampled non-uniformly and non-equidistantly on the image. We evaluate it on 2D-images where the object's textures and backgrounds are similar, and large areas of the object have the same gray level appearance as the background. We also evaluate it in 3D on 60 brain tumor datasets for neurosurgical planning purposes.
[ { "version": "v1", "created": "Wed, 30 May 2012 09:44:43 GMT" } ]
2012-05-31T00:00:00
[ [ "Egger", "Jan", "" ], [ "Freisleben", "Bernd", "" ], [ "Nimsky", "Christopher", "" ], [ "Kapur", "Tina", "" ] ]
new_dataset
0.970757
1205.6699
Benjamin Sowell
Benjamin Sowell, Wojciech Golab, Mehul A. Shah
Minuet: A Scalable Distributed Multiversion B-Tree
VLDB2012
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 9, pp. 884-895 (2012)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data management systems have traditionally been designed to support either long-running analytics queries or short-lived transactions, but an increasing number of applications need both. For example, online games, socio-mobile apps, and e-commerce sites need to not only maintain operational state, but also analyze that data quickly to make predictions and recommendations that improve user experience. In this paper, we present Minuet, a distributed, main-memory B-tree that supports both transactions and copy-on-write snapshots for in-situ analytics. Minuet uses main-memory storage to enable low-latency transactional operations as well as analytics queries without compromising transaction performance. In addition to supporting read-only analytics queries on snapshots, Minuet supports writable clones, so that users can create branching versions of the data. This feature can be quite useful, e.g. to support complex "what-if" analysis or to facilitate wide-area replication. Our experiments show that Minuet outperforms a commercial main-memory database in many ways. It scales to hundreds of cores and TBs of memory, and can process hundreds of thousands of B-tree operations per second while executing long-running scans.
[ { "version": "v1", "created": "Wed, 30 May 2012 14:33:38 GMT" } ]
2012-05-31T00:00:00
[ [ "Sowell", "Benjamin", "" ], [ "Golab", "Wojciech", "" ], [ "Shah", "Mehul A.", "" ] ]
new_dataset
0.997578
1102.1107
Ketan Savla
Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh and Emilio Frazzoli
Robust Distributed Routing in Dynamical Flow Networks - Part I: Locally Responsive Policies and Weak Resilience
32 pages, 5 figures, journal submission
null
10.1016/j.compeleceng.2012.04.013
null
cs.SY math.CA math.DS math.OC nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robustness of distributed routing policies is studied for dynamical flow networks, with respect to adversarial disturbances that reduce the link flow capacities. A dynamical flow network is modeled as a system of ordinary differential equations derived from mass conservation laws on a directed acyclic graph with a single origin-destination pair and a constant inflow at the origin. Routing policies regulate the way the inflow at a non-destination node gets split among its outgoing links as a function of the current particle density, while the outflow of a link is modeled to depend on the current particle density on that link through a flow function. The dynamical flow network is called partially transferring if the total inflow at the destination node is asymptotically bounded away from zero, and its weak resilience is measured as the minimum sum of the link-wise magnitude of all disturbances that make it not partially transferring. The weak resilience of a dynamical flow network with arbitrary routing policy is shown to be upper-bounded by the network's min-cut capacity, independently of the initial flow conditions. Moreover, a class of distributed routing policies that rely exclusively on local information on the particle densities, and are locally responsive to that, is shown to yield such maximal weak resilience. These results imply that locality constraints on the information available to the routing policies do not cause loss of weak resilience. Some fundamental properties of dynamical flow networks driven by locally responsive distributed policies are analyzed in detail, including global convergence to a unique limit flow.
[ { "version": "v1", "created": "Sat, 5 Feb 2011 23:12:19 GMT" }, { "version": "v2", "created": "Fri, 25 Mar 2011 01:26:51 GMT" } ]
2012-05-30T00:00:00
[ [ "Como", "Giacomo", "" ], [ "Savla", "Ketan", "" ], [ "Acemoglu", "Daron", "" ], [ "Dahleh", "Munther A.", "" ], [ "Frazzoli", "Emilio", "" ] ]
new_dataset
0.995136
1201.2471
Tao Yang
Tao Yang, Xiaojun Yuan, Li Ping, Iain B. Collings, Jinhong Yuan
Eigen-Direction Alignment Based Physical-Layer Network Coding for MIMO Two-Way Relay Channels
This work was partially presented at IEEE ISIT 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel communication strategy which incorporates physical-layer network coding (PNC) into multiple-input multiple output (MIMO) two-way relay channels (TWRCs). At the heart of the proposed scheme lies a new key technique referred to as eigen-direction alignment (EDA) precoding. The EDA precoding efficiently aligns the two-user's eigen-modes into the same directions. Based on that, we carry out multi-stream PNC over the aligned eigen-modes. We derive an achievable rate of the proposed EDA-PNC scheme, based on nested lattice codes, over a MIMO TWRC. Asymptotic analysis shows that the proposed EDA-PNC scheme approaches the capacity upper bound as the number of user antennas increases towards infinity. For a finite number of user antennas, we formulate the design criterion of the optimal EDA precoder and present solutions. Numerical results show that there is only a marginal gap between the achievable rate of the proposed EDA-PNC scheme and the capacity upper bound of the MIMO TWRC, in the median-to-large SNR region. We also show that the proposed EDA-PNC scheme significantly outperforms existing amplify-and-forward and decode-and-forward based schemes for MIMO TWRCs.
[ { "version": "v1", "created": "Thu, 12 Jan 2012 03:57:33 GMT" }, { "version": "v2", "created": "Tue, 29 May 2012 05:58:05 GMT" } ]
2012-05-30T00:00:00
[ [ "Yang", "Tao", "" ], [ "Yuan", "Xiaojun", "" ], [ "Ping", "Li", "" ], [ "Collings", "Iain B.", "" ], [ "Yuan", "Jinhong", "" ] ]
new_dataset
0.995089
1110.4123
Antonios Garas
David Garcia, Antonios Garas, and Frank Schweitzer
Positive words carry less information than negative words
16 pages, 3 figures, 3 tables
EPJ Data Science 2012, 1:3
10.1140/epjds3
null
cs.CL cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the frequency of word use is not only determined by the word length \cite{Zipf1935} and the average information content \cite{Piantadosi2011}, but also by its emotional content. We have analyzed three established lexica of affective word usage in English, German, and Spanish, to verify that these lexica have a neutral, unbiased, emotional content. Taking into account the frequency of word usage, we find that words with a positive emotional content are more frequently used. This lends support to Pollyanna hypothesis \cite{Boucher1969} that there should be a positive bias in human expression. We also find that negative words contain more information than positive words, as the informativeness of a word increases uniformly with its valence decrease. Our findings support earlier conjectures about (i) the relation between word frequency and information content, and (ii) the impact of positive emotions on communication and social links.
[ { "version": "v1", "created": "Tue, 18 Oct 2011 20:54:21 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2011 10:19:34 GMT" }, { "version": "v3", "created": "Wed, 18 Apr 2012 12:29:23 GMT" }, { "version": "v4", "created": "Sun, 27 May 2012 14:55:40 GMT" } ]
2012-05-29T00:00:00
[ [ "Garcia", "David", "" ], [ "Garas", "Antonios", "" ], [ "Schweitzer", "Frank", "" ] ]
new_dataset
0.998708
1205.5863
Hassan Mehri
Hassan Mehri and Mohammad Reza Sadeghi
Construction of LDGM lattices
null
null
null
null
cs.IT cs.CR math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low density generator matrix (LDGM) codes have an acceptable performance under iterative decoding algorithms. This idea is used to construct a class of lattices with relatively good performance and low encoding and decoding complexity. To construct such lattices, Construction D is applied to a set of generator vectors of a class of LDGM codes. Bounds on the minimum distance and the coding gain of the corresponding lattices and a corollary for the cross sections and projections of these lattices are provided. The progressive edge growth (PEG) algorithm is used to construct a class of binary codes to generate the corresponding lattice. Simulation results confirm the acceptable performance of these class of lattices.
[ { "version": "v1", "created": "Sat, 26 May 2012 09:03:57 GMT" } ]
2012-05-29T00:00:00
[ [ "Mehri", "Hassan", "" ], [ "Sadeghi", "Mohammad Reza", "" ] ]
new_dataset
0.963207
1205.5975
Paolo Bientinesi
Diego Fabregat-Traver (1) and Paolo Bientinesi (1), ((1) AICES, RWTH Aachen)
A Domain-Specific Compiler for Linear Algebra Operations
null
null
null
AICES-2012/01-2
cs.MS cs.PL cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a prototypical linear algebra compiler that automatically exploits domain-specific knowledge to generate high-performance algorithms. The input to the compiler is a target equation together with knowledge of both the structure of the problem and the properties of the operands. The output is a variety of high-performance algorithms, and the corresponding source code, to solve the target equation. Our approach consists in the decomposition of the input equation into a sequence of library-supported kernels. Since in general such a decomposition is not unique, our compiler returns not one but a number of algorithms. The potential of the compiler is shown by means of its application to a challenging equation arising within the genome-wide association study. As a result, the compiler produces multiple "best" algorithms that outperform the best existing libraries.
[ { "version": "v1", "created": "Sun, 27 May 2012 15:22:23 GMT" } ]
2012-05-29T00:00:00
[ [ "Fabregat-Traver", "Diego", "" ], [ "Bientinesi", "Paolo", "" ] ]
new_dataset
0.983833
1112.2795
Luke Mathieson
Bernard Mans and Luke Mathieson
On the Treewidth of Dynamic Graphs
null
null
null
null
cs.CC cs.DM cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic graph theory is a novel, growing area that deals with graphs that change over time and is of great utility in modelling modern wireless, mobile and dynamic environments. As a graph evolves, possibly arbitrarily, it is challenging to identify the graph properties that can be preserved over time and understand their respective computability. In this paper we are concerned with the treewidth of dynamic graphs. We focus on metatheorems, which allow the generation of a series of results based on general properties of classes of structures. In graph theory two major metatheorems on treewidth provide complexity classifications by employing structural graph measures and finite model theory. Courcelle's Theorem gives a general tractability result for problems expressible in monadic second order logic on graphs of bounded treewidth, and Frick & Grohe demonstrate a similar result for first order logic and graphs of bounded local treewidth. We extend these theorems by showing that dynamic graphs of bounded (local) treewidth where the length of time over which the graph evolves and is observed is finite and bounded can be modelled in such a way that the (local) treewidth of the underlying graph is maintained. We show the application of these results to problems in dynamic graph theory and dynamic extensions to static problems. In addition we demonstrate that certain widely used dynamic graph classes naturally have bounded local treewidth.
[ { "version": "v1", "created": "Tue, 13 Dec 2011 05:13:24 GMT" }, { "version": "v2", "created": "Fri, 25 May 2012 04:55:40 GMT" } ]
2012-05-28T00:00:00
[ [ "Mans", "Bernard", "" ], [ "Mathieson", "Luke", "" ] ]
new_dataset
0.998333
1205.5611
Jason Priem
Judit Bar-Ilan (1), Stefanie Haustein (2), Isabella Peters (3), Jason Priem (4), Hadas Shema (1) and Jens Terliesner (3) ((1) Department of Information Science, Bar-Ilan University, (2) Central Library, Forschungszentrum J\"ulich, (3) Department of Information Science, Heinrich-Heine-University, (4) School of Information and Library Science, University of North Carolina-Chapel Hill)
Beyond citations: Scholars' visibility on the social Web
Accepted to 17th International Conference on Science and Technology Indicators, Montreal, Canada, 5-8 Sept. 2012. 14 pages, 3 figures, 3 tables
null
null
null
cs.DL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditionally, scholarly impact and visibility have been measured by counting publications and citations in the scholarly literature. However, increasingly scholars are also visible on the Web, establishing presences in a growing variety of social ecosystems. But how wide and established is this presence, and how do measures of social Web impact relate to their more traditional counterparts? To answer this, we sampled 57 presenters from the 2010 Leiden STI Conference, gathering publication and citations counts as well as data from the presenters' Web "footprints." We found Web presence widespread and diverse: 84% of scholars had homepages, 70% were on LinkedIn, 23% had public Google Scholar profiles, and 16% were on Twitter. For sampled scholars' publications, social reference manager bookmarks were compared to Scopus and Web of Science citations; we found that Mendeley covers more than 80% of sampled articles, and that Mendeley bookmarks are significantly correlated (r=.45) to Scopus citation counts.
[ { "version": "v1", "created": "Fri, 25 May 2012 04:41:40 GMT" } ]
2012-05-28T00:00:00
[ [ "Bar-Ilan", "Judit", "" ], [ "Haustein", "Stefanie", "" ], [ "Peters", "Isabella", "" ], [ "Priem", "Jason", "" ], [ "Shema", "Hadas", "" ], [ "Terliesner", "Jens", "" ] ]
new_dataset
0.969812
1205.5699
Marin\^es Guerreiro
Gladys Chalom, Raul Ant\^onio Ferraz, Marin\^es Guerreiro and C\'esar Polcino Milies
Minimal Binary Abelian Codes of length $p^m q^n$
8 pages, contents partially presented at the Groups, Rings and Group Rings Conferences held in Ubatuba-SP (Brasil) and Edmonton-AL (Canada)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider binary abelian codes of length $p^m q^n$, where $p$ and $q$ are prime rational integers under some restrictive hypotheses. In this case, we determine the idempotents generating minimal codes and either the respective weights or bounds of these weights. We give examples showing that these bounds are attained in some cases.
[ { "version": "v1", "created": "Fri, 25 May 2012 14:05:03 GMT" } ]
2012-05-28T00:00:00
[ [ "Chalom", "Gladys", "" ], [ "Ferraz", "Raul Antônio", "" ], [ "Guerreiro", "Marinês", "" ], [ "Milies", "César Polcino", "" ] ]
new_dataset
0.997862
1110.3014
Sonoko Moriyama
Yoshikazu Aoshima, David Avis, Theresa Deering, Yoshitake Matsumoto, Sonoko Moriyama
On the Existence of Hamiltonian Paths for History Based Pivot Rules on Acyclic Unique Sink Orientations of Hypercubes
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An acyclic USO on a hypercube is formed by directing its edges in such as way that the digraph is acyclic and each face of the hypercube has a unique sink and a unique source. A path to the global sink of an acyclic USO can be modeled as pivoting in a unit hypercube of the same dimension with an abstract objective function, and vice versa. In such a way, Zadeh's 'least entered rule' and other history based pivot rules can be applied to the problem of finding the global sink of an acyclic USO. In this paper we present some theoretical and empirical results on the existence of acyclic USOs for which the various history based pivot rules can be made to follow a Hamiltonian path. In particular, we develop an algorithm that can enumerate all such paths up to dimension 6 using efficient pruning techniques. We show that Zadeh's original rule admits Hamiltonian paths up to dimension 9 at least, and prove that most of the other rules do not for all dimensions greater than 5.
[ { "version": "v1", "created": "Thu, 13 Oct 2011 17:57:59 GMT" }, { "version": "v2", "created": "Thu, 24 May 2012 15:19:07 GMT" } ]
2012-05-25T00:00:00
[ [ "Aoshima", "Yoshikazu", "" ], [ "Avis", "David", "" ], [ "Deering", "Theresa", "" ], [ "Matsumoto", "Yoshitake", "" ], [ "Moriyama", "Sonoko", "" ] ]
new_dataset
0.991883
1205.5395
Abuzer Yakaryilmaz
Abuzer Yakaryilmaz
Turing-equivalent automata using a fixed-size quantum memory
28 pages
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new public quantum interactive proof system and the first quantum alternating Turing machine: qAM proof system and qATM, respectively. Both are obtained from their classical counterparts (Arthur-Merlin proof system and alternating Turing machine, respectively,) by augmenting them with a fixed-size quantum register. We focus on space-bounded computation, and obtain the following surprising results: Both of them with constant-space are Turing-equivalent. More specifically, we show that for any Turing-recognizable language, there exists a constant-space weak-qAM system, (the nonmembers do not need to be rejected with high probability), and we show that any Turing-recognizable language can be recognized by a constant-space qATM even with one-way input head. For strong proof systems, where the nonmembers must be rejected with high probability, we show that the known space-bounded classical private protocols can also be simulated by our public qAM system with the same space bound. Besides, we introduce a strong version of qATM: The qATM that must halt in every computation path. Then, we show that strong qATMs (similar to private ATMs) can simulate deterministic space with exponentially less space. This leads to shifting the deterministic space hierarchy exactly by one-level. The method behind the main results is a new public protocol cleverly using its fixed-size quantum register. Interestingly, the quantum part of this public protocol cannot be simulated by any space-bounded classical protocol in some cases.
[ { "version": "v1", "created": "Thu, 24 May 2012 10:48:02 GMT" } ]
2012-05-25T00:00:00
[ [ "Yakaryilmaz", "Abuzer", "" ] ]
new_dataset
0.999673
1205.5055
Matthew Anderson
Matthew Anderson, Maciej Brodowicz, Hartmut Kaiser, Bryce Adelstein-Lelbach, and Thomas Sterling
Neutron Star Evolutions using Tabulated Equations of State with a New Execution Model
9 pages, 8 figures. arXiv admin note: substantial text overlap with arXiv:1110.1131
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The addition of nuclear and neutrino physics to general relativistic fluid codes allows for a more realistic description of hot nuclear matter in neutron star and black hole systems. This additional microphysics requires that each processor have access to large tables of data, such as equations of state, and in large simulations the memory required to store these tables locally can become excessive unless an alternative execution model is used. In this work we present relativistic fluid evolutions of a neutron star obtained using a message driven multi-threaded execution model known as ParalleX. These neutron star simulations would require substantial memory overhead dedicated entirely to the equation of state table if using a more traditional execution model. We introduce a ParalleX component based on Futures for accessing large tables of data, including out-of-core sized tables, which does not require substantial memory overhead and effectively hides any increased network latency.
[ { "version": "v1", "created": "Tue, 22 May 2012 20:46:11 GMT" } ]
2012-05-24T00:00:00
[ [ "Anderson", "Matthew", "" ], [ "Brodowicz", "Maciej", "" ], [ "Kaiser", "Hartmut", "" ], [ "Adelstein-Lelbach", "Bryce", "" ], [ "Sterling", "Thomas", "" ] ]
new_dataset
0.982911
1205.5088
Dustin Webb
Dustin J. Webb, Jur van den Berg
Kinodynamic RRT*: Optimal Motion Planning for Systems with Linear Differential Constraints
8 pages, 7 figures, 1 table, slated for submission to ICRA 2013
null
null
null
cs.RO cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Kinodynamic RRT*, an incremental sampling-based approach for asymptotically optimal motion planning for robots with linear differential constraints. Our approach extends RRT*, which was introduced for holonomic robots (Karaman et al. 2011), by using a fixed-final-state-free-final-time controller that exactly and optimally connects any pair of states, where the cost function is expressed as a trade-off between the duration of a trajectory and the expended control effort. Our approach generalizes earlier work on extending RRT* to kinodynamic systems, as it guarantees asymptotic optimality for any system with controllable linear dynamics, in state spaces of any dimension. Our approach can be applied to non-linear dynamics as well by using their first-order Taylor approximations. In addition, we show that for the rich subclass of systems with a nilpotent dynamics matrix, closed-form solutions for optimal trajectories can be derived, which keeps the computational overhead of our algorithm compared to traditional RRT* at a minimum. We demonstrate the potential of our approach by computing asymptotically optimal trajectories in three challenging motion planning scenarios: (i) a planar robot with a 4-D state space and double integrator dynamics, (ii) an aerial vehicle with a 10-D state space and linearized quadrotor dynamics, and (iii) a car-like robot with a 5-D state space and non-linear dynamics.
[ { "version": "v1", "created": "Wed, 23 May 2012 04:00:24 GMT" } ]
2012-05-24T00:00:00
[ [ "Webb", "Dustin J.", "" ], [ "Berg", "Jur van den", "" ] ]
new_dataset
0.976673
1205.4813
Praveen Sivadasan
Praveen Sivadasan, P. Sojan Lal
Securing SQLJ Source Codes from Business Logic Disclosure by Data Hiding Obfuscation
4 pages,3 Figures
null
null
null
cs.CR cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information security is protecting information from unauthorized access, use, disclosure, disruption, modification, perusal and destruction. CAIN model suggest maintaining the Confidentiality, Authenticity, Integrity and Non-repudiation (CAIN) of information. Oracle 8i, 9i and 11g Databases support SQLJ framework allowing embedding of SQL statements in Java Programs and providing programmer friendly means to access the Oracle database. As cloud computing technology is becoming popular, SQLJ is considered as a flexible and user friendly language for developing distributed applications in grid architectures. SQLJ source codes are translated to java byte codes and decompilation is generation of source codes from intermediate byte codes. The intermediate SQLJ application byte codes are open to decompilation, allowing a malicious reader to forcefully decompile it for understanding confidential business logic or data from the codes. To the best of our knowledge, strong and cost effective techniques exist for Oracle Database security, but still data security techniques are lacking for client side applications, giving possibility for revelation of confidential business data. Data obfuscation is hiding the data in codes and we suggest enhancing the data security in SQLJ source codes by data hiding, to mitigate disclosure of confidential business data, especially integers in distributed applications.
[ { "version": "v1", "created": "Tue, 22 May 2012 06:18:32 GMT" } ]
2012-05-23T00:00:00
[ [ "Sivadasan", "Praveen", "" ], [ "Lal", "P. Sojan", "" ] ]
new_dataset
0.960278
1205.4829
Somdip Dey Mr.
Somdip Dey
SD-EQR: A New Technique To Use QR CodesTM in Cryptography
6 Pages and 3 figures, International Journal of Information Technology & Computer Science (IJITCS), May/June 2012
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the author present a new technique of using QR Codes (commonly known as 'Quick Respond Codes') in the field of Cryptography. QR Codes are mainly used to convey or store messages because they have higher or large storage capacity than any other normal conventional 'barcodes'. In this paper the primary focus will be on storing messages in encrypted format with a password and send it to the required destination hiding in a QR Code, without being tracked or decrypted properly by any hacker or spyware. Since QR Codes have fast response time and have large storage capacity, QR Codes can be used perfectly to send encrypted data (messages) to the receiver. This method will be suitable in any business house, government sectors, communication network to send their encrypted messages faster to the destination. Or a person can even use this method to keep his important documents, like passport number, pan-card id, social security number, perfectly secured with him all the time, without the information getting leaked to outside world. The new method is achieved by entering the message along with a password. This password will generate a secret code, which will be added to each digit or alphabet in the numbers or text entered in the message (which is needed to be encrypted) and generate the first phase of encryption. That newly generated encrypted message will again be encrypted using various other methods to generate the final encrypted message.
[ { "version": "v1", "created": "Tue, 22 May 2012 07:46:15 GMT" } ]
2012-05-23T00:00:00
[ [ "Dey", "Somdip", "" ] ]
new_dataset
0.999434
1205.4832
Somdip Dey Mr.
Somdip Dey
SD-REE: A Cryptographic Method to Exclude Repetition from a Message
7 Pages,1 table for Results, 1 table for Cryptanalysis and 6 figures
Proceedings of The International Conference on Informatics and Applications (ICIA2012), Malaysia
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the author presents a new cryptographic technique, SD-REE, to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person to retrieve or predict the original message from the encrypted message. In modern world, cryptography hackers try to break a code or cryptographic algorithm [1,2] or retrieve the key, used for encryption, by inserting repetitive bytes / characters in the message and encrypt the message or by analyzing repetitions in the encrypted message, to find out the encryption algorithm or retrieve the key used for the encryption. But in SD-REE method the repetitive bytes / characters are removed and there is no trace of any repetition in the message, which was encrypted.
[ { "version": "v1", "created": "Tue, 22 May 2012 08:02:59 GMT" } ]
2012-05-23T00:00:00
[ [ "Dey", "Somdip", "" ] ]
new_dataset
0.990903
1205.4889
Thomas Brihaye
Thomas Brihaye, V\'eronique Bruy\`ere, Julie De Pril
On Equilibria in Quantitative Games with Reachability/Safety Objectives
Full version of the CSR 2010 proceedings paper
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study turn-based quantitative multiplayer non zero-sum games played on finite graphs with both reachability and safety objectives. In this framework a player with a reachability objective aims at reaching his own goal as soon as possible, whereas a player with a safety objective aims at avoiding his bad set or, if impossible, delaying its visit as long as possible. We prove the existence of Nash equilibria with finite memory in quantitative multiplayer reachability/safety games. Moreover, we prove the existence of finite-memory secure equilibria for quantitative two-player reachability games.
[ { "version": "v1", "created": "Tue, 22 May 2012 12:08:37 GMT" } ]
2012-05-23T00:00:00
[ [ "Brihaye", "Thomas", "" ], [ "Bruyère", "Véronique", "" ], [ "De Pril", "Julie", "" ] ]
new_dataset
0.980684
1205.4900
Adethya Sudarsanan Mr
Adethya Sudarsanan
CloudPass - a passport system based on Cloud Computing and Near Field Communication
Presented at Cloud2012 - International Workshop on Cloud Computing, New Delhi, India
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communication has penetrated into all fields of technology, especially in mobility, where wireless transactions are gaining importance with improvements in standards like 3G and 4G. There are many technologies that support the wireless forms of interactions between devices. One among them is NFC - Near Field Communication. In addition to NFC, other external technologies like Quick Response (QR) Codes assist in establishing interactions among participating devices. In this paper, we examine an approach that will involve standards and technologies like NFC, QR Codes and Cloud Infrastructure to design a mobile application which will perform desired functionalities. Cloud Storage is used as a reservoir to store the artifacts used by the application. Development and testing of the application is initially carried out on emulators or simulators followed by testing on real handsets/devices.
[ { "version": "v1", "created": "Tue, 22 May 2012 12:47:45 GMT" } ]
2012-05-23T00:00:00
[ [ "Sudarsanan", "Adethya", "" ] ]
new_dataset
0.998906
0903.4014
Jun Muramatsu
Jun Muramatsu and Shigeki Miyake
Construction of Codes for Wiretap Channel and Secret Key Agreement from Correlated Source Outputs by Using Sparse Matrices
A part of this paper is presented in part at 2009 IEEE Information Theory Workshop (ITW2009), Taormina, Italy, pp.105-109, 2009. This paper is submitted to IEEE Transactions on Information Theory. 34 pages
IEEE Transactions on Information Theory, vol. 58, no. 2, pp. 671-692, Feb. 2012
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to prove coding theorems for the wiretap channel coding problem and secret key agreement problem based on the the notion of a hash property for an ensemble of functions. These theorems imply that codes using sparse matrices can achieve the optimal rate. Furthermore, fixed-rate universal coding theorems for a wiretap channel and a secret key agreement are also proved.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 05:29:04 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2010 06:22:59 GMT" } ]
2012-05-22T00:00:00
[ [ "Muramatsu", "Jun", "" ], [ "Miyake", "Shigeki", "" ] ]
new_dataset
0.974472
1010.1260
Laura Grigori
Ioan O. Hupca, Joel Falcou, Laura Grigori, and Radek Stompor
Spherical harmonic transform with GPUs
null
Proceedings of Euro-Par 2011, Lecture Notes in Computer Science, 2012, Vol. 7155/2012, p. 355
10.1007/978-3-642-29737-3_40
INRIA technical report 7409
cs.DC astro-ph.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm for computing an inverse spherical harmonic transform suitable for graphic processing units (GPU). We use CUDA and base our implementation on a Fortran90 routine included in a publicly available parallel package, S2HAT. We focus our attention on the two major sequential steps involved in the transforms computation, retaining the efficient parallel framework of the original code. We detail optimization techniques used to enhance the performance of the CUDA-based code and contrast them with those implemented in the Fortran90 version. We also present performance comparisons of a single CPU plus GPU unit with the S2HAT code running on either a single or 4 processors. In particular we find that use of the latest generation of GPUs, such as NVIDIA GF100 (Fermi), can accelerate the spherical harmonic transforms by as much as 18 times with respect to S2HAT executed on one core, and by as much as 5.5 with respect to S2HAT on 4 cores, with the overall performance being limited by the Fast Fourier transforms. The work presented here has been performed in the context of the Cosmic Microwave Background simulations and analysis. However, we expect that the developed software will be of more general interest and applicability.
[ { "version": "v1", "created": "Wed, 6 Oct 2010 20:06:54 GMT" } ]
2012-05-22T00:00:00
[ [ "Hupca", "Ioan O.", "" ], [ "Falcou", "Joel", "" ], [ "Grigori", "Laura", "" ], [ "Stompor", "Radek", "" ] ]
new_dataset
0.984145
1205.4261
Belkacem Kouninef Dr
Kouninef Belkacem and Bouzerita Mohamed
Deployment of software components: Application to Wireless System
null
ARPN Journal of Systems and Software Volume 1 No. 3, JUNE 2011 ISSN 2222-9833
null
null
cs.SE
http://creativecommons.org/licenses/by/3.0/
The wide variety of wireless devices brings to design mobile applications as a collection of interchangeable software components adapted to the deployment environment of the software. To ensure the proper functioning of the software assembly and make a real enforcement in case of failures, the introduction of concepts, models and tools necessary for the administration of these components is crucial. This article proposes a method for deploying components in wireless systems.
[ { "version": "v1", "created": "Fri, 18 May 2012 20:48:55 GMT" } ]
2012-05-22T00:00:00
[ [ "Belkacem", "Kouninef", "" ], [ "Mohamed", "Bouzerita", "" ] ]
new_dataset
0.991454
1205.4279
Somdip Dey Mr.
Somdip Dey
SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted
The paper (manuscript) consist of 5 pages, in which there are 10 figures and 1 table for results
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the author presents a new cryptographic technique to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person to retrieve or predict the original message from the encrypted message. In modern world, cryptography hackers try to break a code or cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message, by analyzing the insertion or presence of repetitive bits / characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repetitive terms such that no trace of repetitions can be tracked down. For this reason we apply SD-AREE cryptographic method to exclude repetitive terms from a message, which is to be encrypted. In SD-AREE method the repetitive bits / characters are removed and there is no trace of any repetition in the message.
[ { "version": "v1", "created": "Fri, 18 May 2012 23:02:07 GMT" } ]
2012-05-22T00:00:00
[ [ "Dey", "Somdip", "" ] ]
new_dataset
0.998941
1205.4361
Muhammad Fahad Khan
Muhammad Fahad Khan and Saira Beg
Transference & Retrieval of Pulse-code modulation Audio over Short Messaging Service
3,3, International Journal of Computer Applications (0975 - 8887),Volume 32- No.10, October 2011
International Journal of Computer Applications ,Volume 32-- No.10, October 2011
null
null
cs.NI cs.MM cs.SD
http://creativecommons.org/licenses/by/3.0/
The paper presents the method of transferring PCM (Pulse-Code Modulation) based audio messages through SMS (Short Message Service) over GSM (Global System for Mobile Communications) network. As SMS is text based service, and could not send voice. Our method enables voice transferring through SMS, by converting PCM audio into characters. Than Huffman coding compression technique is applied in order to reduce numbers of characters which will latterly set as payload text of SMS. Testing the said method we develop an application using J2me platform
[ { "version": "v1", "created": "Sat, 19 May 2012 21:25:17 GMT" } ]
2012-05-22T00:00:00
[ [ "Khan", "Muhammad Fahad", "" ], [ "Beg", "Saira", "" ] ]
new_dataset
0.983585
1205.4487
Rajesh V
V. Rajesh, P. Vijaya Kumar
CDMA Based Interconnect Mechanism for SOPC
IJCSI Vol.9 Issue 2, 2012
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Network-on-chip (NoC) designs consisting of large pack of Intellectual Property (IP) blocks (cores) on the same silicon die is becoming technically possible nowadays. But, the communication between the IP Cores is the main issue in recent years. This paper presents the design of a Code Division Multiple Access (CDMA) based wrapper interconnect as a component of System on programmable chip (SOPC) builder to communicate between IP cores. In the proposal, only bus lines that carry address and data signals are CDMA coded. CDMA technology has better data integrity, channel continuity, channel isolation, and also mainly it reduces the no.of lines in the bus architecture for transmitting the data from master to slave.
[ { "version": "v1", "created": "Mon, 21 May 2012 05:01:24 GMT" } ]
2012-05-22T00:00:00
[ [ "Rajesh", "V.", "" ], [ "Kumar", "P. Vijaya", "" ] ]
new_dataset
0.954492
1205.4489
Saraju Mohanty
Saraju P. Mohanty
ISWAR: An Imaging System with Watermarking and Attack Resilience
null
null
null
null
cs.CR cs.DL cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the explosive growth of internet technology, easy transfer of digital multimedia is feasible. However, this kind of convenience with which authorized users can access information, turns out to be a mixed blessing due to information piracy. The emerging field of Digital Rights Management (DRM) systems addresses issues related to the intellectual property rights of digital content. In this paper, an object-oriented (OO) DRM system, called "Imaging System with Watermarking and Attack Resilience" (ISWAR), is presented that generates and authenticates color images with embedded mechanisms for protection against infringement of ownership rights as well as security attacks. In addition to the methods, in the object-oriented sense, for performing traditional encryption and decryption, the system implements methods for visible and invisible watermarking. This paper presents one visible and one invisible watermarking algorithm that have been integrated in the system. The qualitative and quantitative results obtained for these two watermarking algorithms with several benchmark images indicate that high-quality watermarked images are produced by the algorithms. With the help of experimental results it is demonstrated that the presented invisible watermarking techniques are resilient to the well known benchmark attacks and hence a fail-safe method for providing constant protection to ownership rights.
[ { "version": "v1", "created": "Mon, 21 May 2012 05:25:48 GMT" } ]
2012-05-22T00:00:00
[ [ "Mohanty", "Saraju P.", "" ] ]
new_dataset
0.998509
1205.3863
Saeed Hajizadeh
Saeed Hajizadeh and Ghosheh Abed Hodtani
Three-Receiver Broadcast Channels with Side Information
5 pages, 2 figures, This paper was accepted for presentation at IEEE ISIT 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Three-receiver broadcast channel (BC) is of interest due to its information theoretical differences with two receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information available at the transmitter, Multilevel BC and 3-receiver less noisy BC, by using superposition coding, Gel'fand-Pinsker binning scheme and Nair-El Gamal indirect decoding. Our rate region for multilevel BC subsumes the Steinberg rate region for 2-receiver degraded BC with side information as its special case. We also find the capacity region of 3-receiver less noisy BC when side information is available both at the transmitter and at the receivers.
[ { "version": "v1", "created": "Thu, 17 May 2012 07:00:13 GMT" }, { "version": "v2", "created": "Fri, 18 May 2012 11:51:39 GMT" } ]
2012-05-21T00:00:00
[ [ "Hajizadeh", "Saeed", "" ], [ "Hodtani", "Ghosheh Abed", "" ] ]
new_dataset
0.979787
1205.4049
Vincent Gauthier
Teck Aguilar, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi and Chin-Liang Wang
CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks
null
IEEE Transactions on Wireless Communications (2011)
10.1109/TWC.2011.060711.100480
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative relaying has been proposed as a promising transmission technique that effectively creates spatial diversity through the cooperation among spatially distributed nodes. However, to achieve efficient communications while gaining full benefits from cooperation, more interactions at higher protocol layers, particularly the MAC (Medium Access Control) and network layers, are vitally required. This is ignored in most existing articles that mainly focus on physical (PHY)-layer relaying techniques. In this paper, we propose a novel cross-layer framework involving two levels of joint design---a MAC-network cross-layer design for forwarder selection (or termed routing) and a MAC-PHY for relay selection---over symbol-wise varying channels. Based on location knowledge and contention processes, the proposed cross-layer protocol, CoopGeo, aims at providing an efficient, distributed approach to select next hops and optimal relays along a communication path. Simulation results demonstrate that CoopGeo not only operates properly with varying densities of nodes, but performs significantly better than the existing protocol BOSS in terms of packet error rate, transmission error probability, and saturated throughput.
[ { "version": "v1", "created": "Thu, 17 May 2012 21:48:59 GMT" } ]
2012-05-21T00:00:00
[ [ "Aguilar", "Teck", "" ], [ "Syue", "Syue-Ju", "" ], [ "Gauthier", "Vincent", "" ], [ "Afifi", "Hossam", "" ], [ "Wang", "Chin-Liang", "" ] ]
new_dataset
0.998227
1205.3986
Yusuf Perwej
Omar S. Al-Mushayt, Yusuf Perwej, Kashiful Haq
Electronic-government in Saudi Arabia: A positive revolution in the peninsula
12 Pages, 1 Figures, ISSN Print: (0974-7273),ISSN Online:(0975-3761)
International Transactions in Applied Sciences (ITAS), January 2009, Volume 1 , Number 1, Pages 87-98
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The informatization practice of countries all over the world has shown that the level of a government's informatization is one main factor that can affect its international competitive power. At present, e-government construction is regarded as one of the most important tasks for the national economy and society upliftment and informatization in Saudi Arabia. Unlike the traditional governments, an e-government takes on a new look with its framework and operation mode more suitable for the contemporary era. In fact, it is a basic national strategy to promote Saudi Arabia's informatization by means of e-government construction. This talk firstly introduces the basic concepts and relevant viewpoints of egovernment, then reviews the development process of e-government in Saudi Arabia, and describes the current states, development strategies of e-government in Saudi Arabia. And also review e-government maturity models and synthesize them e-government maturity models are investigated, in which the authors have proposed the Delloite's six-stage model, Layne and Lee four-stage model and Accenture five-stage model. So, the main e-government maturity stages are: online presence, interaction, transaction, transformation and digital democracy. After that, according to many references, the main technologies which are used in each stage are summarized.
[ { "version": "v1", "created": "Thu, 17 May 2012 17:23:50 GMT" } ]
2012-05-18T00:00:00
[ [ "Al-Mushayt", "Omar S.", "" ], [ "Perwej", "Yusuf", "" ], [ "Haq", "Kashiful", "" ] ]
new_dataset
0.998986
1205.3998
Yiannis Andreopoulos
Dujdow Buranapanichkit and Yiannis Andreopoulos
Distributed Time-Frequency Division Multiple Access Protocol For Wireless Sensor Networks
4 pages, IEEE Wireless Communications Letters, to appear in 2012
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that biology-inspired self-maintaining algorithms in wireless sensor nodes achieve near optimum time division multiple access (TDMA) characteristics in a decentralized manner and with very low complexity. We extend such distributed TDMA approaches to multiple channels (frequencies). This is achieved by extending the concept of collaborative reactive listening in order to balance the number of nodes in all available channels. We prove the stability of the new protocol and estimate the delay until the balanced system state is reached. Our approach is benchmarked against single-channel distributed TDMA and channel hopping approaches using TinyOS imote2 wireless sensors.
[ { "version": "v1", "created": "Thu, 17 May 2012 18:11:22 GMT" } ]
2012-05-18T00:00:00
[ [ "Buranapanichkit", "Dujdow", "" ], [ "Andreopoulos", "Yiannis", "" ] ]
new_dataset
0.97841
1205.3570
Gopalakrishnan Tr Nair
Mary Cherian, T.R Gopalakrishnan Nair
A QoS-Aware Routing Protocol for Real-time Applications in Wireless Sensor Networks
10 pages. arXiv admin note: text overlap with arXiv:1001.5339 by other authors
Innovative Systems Design and Engineering, ISSN 2222-1727 (Paper),ISSN 2222-2871 (Online), Vol 2, No 7, 2011 pp. 84-93
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a quality of service aware routing protocol which provides low latency for high priority packets. Packets are differentiated based on their priority by applying queuing theory. Low priority packets are transferred through less energy paths. The sensor nodes interact with the pivot nodes which in turn communicate with the sink node. This protocol can be applied in monitoring context aware physical environments for critical applications.
[ { "version": "v1", "created": "Wed, 16 May 2012 06:48:43 GMT" } ]
2012-05-17T00:00:00
[ [ "Cherian", "Mary", "" ], [ "Nair", "T. R Gopalakrishnan", "" ] ]
new_dataset
0.997241
1205.3642
Ana Monga
Ana Monga, Balwinder Singh
Finite State Machine based Vending Machine Controller with Auto-Billing Features
null
International Journal on VLSI and Communication System,April 2012 pp 19-28
10.5121/vlsic.2012.3202
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, Vending Machines are well known among Japan, Malaysia and Singapore. The quantity of machines in these countries is on the top worldwide. This is due to the modern lifestyles which require fast food processing with high quality. This paper describes the designing of multi select machine using Finite State Machine Model with Auto-Billing Features. Finite State Machine (FSM) modelling is the most crucial part in developing proposed model as this reduces the hardware. In this paper the process of four state (user Selection, Waiting for money insertion, product delivery and servicing) has been modelled using MEALY Machine Model. The proposed model is tested using Spartan 3 development board and its performance is compared with CMOS based machine.
[ { "version": "v1", "created": "Wed, 16 May 2012 11:59:48 GMT" } ]
2012-05-17T00:00:00
[ [ "Monga", "Ana", "" ], [ "Singh", "Balwinder", "" ] ]
new_dataset
0.997234
1205.3728
Ignasi Sau
Nicolas Bousquet, Daniel Gon\c{c}alves, George B. Mertzios, Christophe Paul, Ignasi Sau, and St\'ephan Thomass\'e
Parameterized Domination in Circle Graphs
null
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A circle graph is the intersection graph of a set of chords in a circle. Keil [Discrete Applied Mathematics, 42(1):51-63, 1993] proved that Dominating Set, Connected Dominating Set, and Total Dominating Set are NP-complete in circle graphs. To the best of our knowledge, nothing was known about the parameterized complexity of these problems in circle graphs. In this paper we prove the following results, which contribute in this direction: - Dominating Set, Independent Dominating Set, Connected Dominating Set, Total Dominating Set, and Acyclic Dominating Set are W[1]-hard in circle graphs, parameterized by the size of the solution. - Whereas both Connected Dominating Set and Acyclic Dominating Set are W[1]-hard in circle graphs, it turns out that Connected Acyclic Dominating Set is polynomial-time solvable in circle graphs. - If T is a given tree, deciding whether a circle graph has a dominating set isomorphic to T is NP-complete when T is in the input, and FPT when parameterized by |V(T)|. We prove that the FPT algorithm is subexponential.
[ { "version": "v1", "created": "Wed, 16 May 2012 16:32:43 GMT" } ]
2012-05-17T00:00:00
[ [ "Bousquet", "Nicolas", "" ], [ "Gonçalves", "Daniel", "" ], [ "Mertzios", "George B.", "" ], [ "Paul", "Christophe", "" ], [ "Sau", "Ignasi", "" ], [ "Thomassé", "Stéphan", "" ] ]
new_dataset
0.997114
1202.4576
Maxwell Young
Seth Gilbert, Maxwell Young
Making Evildoers Pay: Resource-Competitive Broadcast in Sensor Networks
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a time-slotted, single-hop, wireless sensor network (WSN) consisting of n correct devices and and t=f*n Byzantine devices where f>=0 is any constant; that is, the Byzantine devices may outnumber the correct ones. There exists a trusted sender Alice who wishes to deliver a message m over a single channel to the correct devices. There also exists a malicious user Carol who controls the t Byzantine devices and uses them to disrupt the communication channel. For a constant k>=2, the correct and Byzantine devices each possess a meager energy budget of O(n^{1/k}), Alice and Carol each possess a limited budget of \tilde{O}(n^{1/k}), and sending or listening in a slot incurs unit cost. This general setup captures the inherent challenges of guaranteeing communication despite scarce resources and attacks on the network. Given this Alice versus Carol scenario, we ask: Is communication of m feasible and, if so, at what cost? We develop a protocol which, for an arbitrarily small constant \epsilon>0, ensures that at least (1-\epsilon)n correct devices receive m with high probability. Furthermore, if Carol's devices expend T energy jamming the channel, then Alice and the correct devices each spend only \tilde{O}(T^{1/(k+1)}). In other words, delaying the transmission of m forces a jammer to rapidly deplete its energy supply and, consequently, cease attacks on the network.
[ { "version": "v1", "created": "Tue, 21 Feb 2012 09:42:51 GMT" }, { "version": "v2", "created": "Wed, 28 Mar 2012 05:36:14 GMT" }, { "version": "v3", "created": "Sun, 22 Apr 2012 17:48:38 GMT" }, { "version": "v4", "created": "Tue, 15 May 2012 00:45:22 GMT" } ]
2012-05-16T00:00:00
[ [ "Gilbert", "Seth", "" ], [ "Young", "Maxwell", "" ] ]
new_dataset
0.997926
1205.3212
Lin Zhong
Siqi Zhao, Lin Zhong, Jehan Wickramasuriya, Venu Vasudevan, Robert LiKamWa, Ahmad Rahmati
SportSense: Real-Time Detection of NFL Game Events from Twitter
null
null
null
Technical Report TR0511-2012
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report our experience in building a working system, SportSense (http://www.sportsense.us), which exploits Twitter users as human sensors of the physical world to detect events in real-time. Using the US National Football League (NFL) games as a case study, we report in-depth measurement studies of the delay and post rate of tweets, and their dependence on other properties. We subsequently develop a novel event detection method based on these findings, and demonstrate that it can effectively and accurately extract game events using open access Twitter data. SportSense has been evolving during the 2010-11 and 2011-12 NFL seasons and is able to recognize NFL game big plays in 30 to 90 seconds with 98% true positive, and 9% false positive rates. Using a smart electronic TV program guide, we show that SportSense can utilize human sensors to empower novel services.
[ { "version": "v1", "created": "Mon, 14 May 2012 22:57:15 GMT" } ]
2012-05-16T00:00:00
[ [ "Zhao", "Siqi", "" ], [ "Zhong", "Lin", "" ], [ "Wickramasuriya", "Jehan", "" ], [ "Vasudevan", "Venu", "" ], [ "LiKamWa", "Robert", "" ], [ "Rahmati", "Ahmad", "" ] ]
new_dataset
0.999652
0902.4060
Ken Yamamoto
Ken Yamamoto, Yoshihiro Yamazaki
Network of two-Chinese-character compound words in Japanese language
null
Physica A 388, 2555-2560 (2009)
10.1016/j.physa.2009.02.032
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some statistical properties of a network of two-Chinese-character compound words in Japanese language are reported. In this network, a node represents a Chinese character and an edge represents a two-Chinese-character compound word. It is found that this network has properties of "small-world" and "scale-free." A network formed by only Chinese characters for common use ({\it joyo-kanji} in Japanese), which is regarded as a subclass of the original network, also has small-world property. However, a degree distribution of the network exhibits no clear power law. In order to reproduce disappearance of the power-law property, a model for a selecting process of the Chinese characters for common use is proposed.
[ { "version": "v1", "created": "Tue, 24 Feb 2009 04:53:49 GMT" } ]
2012-05-15T00:00:00
[ [ "Yamamoto", "Ken", "" ], [ "Yamazaki", "Yoshihiro", "" ] ]
new_dataset
0.998184
1103.6248
Garth Wells
Anders Logg and Garth N. Wells
DOLFIN: Automated Finite Element Computing
null
ACM Transactions on Mathematical Software 37(2), Article 20 (April 2010), 28 pages
10.1145/1731022.1731030
null
cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe here a library aimed at automating the solution of partial differential equations using the finite element method. By employing novel techniques for automated code generation, the library combines a high level of expressiveness with efficient computation. Finite element variational forms may be expressed in near mathematical notation, from which low-level code is automatically generated, compiled and seamlessly integrated with efficient implementations of computational meshes and high-performance linear algebra. Easy-to-use object-oriented interfaces to the library are provided in the form of a C++ library and a Python module. This paper discusses the mathematical abstractions and methods used in the design of the library and its implementation. A number of examples are presented to demonstrate the use of the library in application code.
[ { "version": "v1", "created": "Thu, 31 Mar 2011 17:29:27 GMT" } ]
2012-05-15T00:00:00
[ [ "Logg", "Anders", "" ], [ "Wells", "Garth N.", "" ] ]
new_dataset
0.999154
1201.6117
Justin Thaler
Ioana Ivan, Michael Mitzenmacher, Justin Thaler, Henry Yuen
Continuous Time Channels with Interference
7 pages. To appear in ISIT 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Khanna and Sudan \cite{KS11} studied a natural model of continuous time channels where signals are corrupted by the effects of both noise and delay, and showed that, surprisingly, in some cases both are not enough to prevent such channels from achieving unbounded capacity. Inspired by their work, we consider channels that model continuous time communication with adversarial delay errors. The sender is allowed to subdivide time into an arbitrarily large number $M$ of micro-units in which binary symbols may be sent, but the symbols are subject to unpredictable delays and may interfere with each other. We model interference by having symbols that land in the same micro-unit of time be summed, and we study $k$-interference channels, which allow receivers to distinguish sums up to the value $k$. We consider both a channel adversary that has a limit on the maximum number of steps it can delay each symbol, and a more powerful adversary that only has a bound on the average delay. We give precise characterizations of the threshold between finite and infinite capacity depending on the interference behavior and on the type of channel adversary: for max-bounded delay, the threshold is at $D_{\text{max}}=\ThetaM \log\min{k, M}))$, and for average bounded delay the threshold is at $D_{\text{avg}} = \Theta(\sqrt{M \cdot \min\{k, M\}})$.
[ { "version": "v1", "created": "Mon, 30 Jan 2012 07:05:58 GMT" }, { "version": "v2", "created": "Fri, 11 May 2012 20:45:29 GMT" } ]
2012-05-15T00:00:00
[ [ "Ivan", "Ioana", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Thaler", "Justin", "" ], [ "Yuen", "Henry", "" ] ]
new_dataset
0.99281
1205.2748
Juliusz Chroboczek
Juliusz Chroboczek (PPS), Sylvain Lebresne (PPS)
Juppix: a Linux Live-CD for Undergraduate Students
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Juppix is a Linux Live-CD with a comfortable programming environment for the Java, C and O'Caml programming languages that has been distributed to hundreds of undergaduate students at the University of Paris 7 over the last few years. We describe the lessons we learnt while compiling and distributing Juppix, and outline our future plans.
[ { "version": "v1", "created": "Sat, 12 May 2012 07:51:54 GMT" } ]
2012-05-15T00:00:00
[ [ "Chroboczek", "Juliusz", "", "PPS" ], [ "Lebresne", "Sylvain", "", "PPS" ] ]
new_dataset
0.999898
1205.2797
Yusuf Perwej
Yusuf Perwej, Asif Perwej
Forecasting of Indian Rupee (INR) / US Dollar (USD) Currency Exchange Rate Using Artificial Neural Network
12 Pages, 3 Figures, ISSN:2230-9616(Online);2231-0088(Print)
International Journal of Computer Science, Engineering and Applications (IJCSEA), April 2012, Volume 2, Number 2, Pages 41-52
10.5121/ijcsea.2012.2204
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large part of the workforce, and growing every day, is originally from India. India one of the second largest populations in the world, they have a lot to offer in terms of jobs. The sheer number of IT workers makes them a formidable travelling force as well, easily picking up employment in English speaking countries. The beginning of the economic crises since 2008 September, many Indians have return homeland, and this has had a substantial impression on the Indian Rupee (INR) as liken to the US Dollar (USD). We are using numerational knowledge based techniques for forecasting has been proved highly successful in present time. The purpose of this paper is to examine the effects of several important neural network factors on model fitting and forecasting the behaviours. In this paper, Artificial Neural Network has successfully been used for exchange rate forecasting. This paper examines the effects of the number of inputs and hidden nodes and the size of the training sample on the in-sample and out-of-sample performance. The Indian Rupee (INR) / US Dollar (USD) is used for detailed examinations. The number of input nodes has a greater impact on performance than the number of hidden nodes, while a large number of observations do reduce forecast errors.
[ { "version": "v1", "created": "Sat, 12 May 2012 17:26:49 GMT" } ]
2012-05-15T00:00:00
[ [ "Perwej", "Yusuf", "" ], [ "Perwej", "Asif", "" ] ]
new_dataset
0.999596
1205.3021
Sari Haj Hussein
Sari Haj Hussein
The Hush Cryptosystem
7 pages. 5 figures. Appeared in the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turkey; Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009), North Cyprus, Turkey
null
10.1145/1626195.1626224
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem" for hiding encrypted data in innocent Arabic sentences. The main purpose of this cryptosystem is to fool observer-supporting software into thinking that the encrypted data is not encrypted at all. We employ a modified Word Substitution Method known as the Grammatical Substitution Method in our cryptosystem. We also make use of Hidden Markov Models. We test our cryptosystem using a computer program written in the Java Programming Language. Finally, we test the output of our cryptosystem using statistical tests.
[ { "version": "v1", "created": "Mon, 14 May 2012 13:35:03 GMT" } ]
2012-05-15T00:00:00
[ [ "Hussein", "Sari Haj", "" ] ]
new_dataset
0.997227
1205.0699
Dieter Duyck
Dieter Duyck, Sheng Yang, Fambirai Takawira, Joseph J. Boutros and Marc Moeneclaey
Time-Varying Space-Only Codes for Coded MIMO
submitted to IEEE Trans. on Inf. Theory, May 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple antenna (MIMO) devices are widely used to increase reliability and information bit rate. Optimal error rate performance (full diversity and large coding gain), for unknown channel state information at the transmitter and for maximal rate, can be achieved by approximately universal space-time codes, but comes at a price of large detection complexity, infeasible for most practical systems. We propose a new coded modulation paradigm: error-correction outer code with space-only but time-varying precoder (as inner code). We refer to the latter as Ergodic Mutual Information (EMI) code. The EMI code achieves the maximal multiplexing gain and full diversity is proved in terms of the outage probability. Contrary to most of the literature, our work is not based on the elegant but difficult classical algebraic MIMO theory. Instead, the relation between MIMO and parallel channels is exploited. The theoretical proof of full diversity is corroborated by means of numerical simulations for many MIMO scenarios, in terms of outage probability and word error rate of LDPC coded systems. The full-diversity and full-rate at low detection complexity comes at a price of a small coding gain loss for outer coding rates close to one, but this loss vanishes with decreasing coding rate.
[ { "version": "v1", "created": "Thu, 3 May 2012 12:55:08 GMT" }, { "version": "v2", "created": "Fri, 11 May 2012 18:56:47 GMT" } ]
2012-05-14T00:00:00
[ [ "Duyck", "Dieter", "" ], [ "Yang", "Sheng", "" ], [ "Takawira", "Fambirai", "" ], [ "Boutros", "Joseph J.", "" ], [ "Moeneclaey", "Marc", "" ] ]
new_dataset
0.999073
1205.2432
Kamal Chauhan
Kamal Kumar Chauhan and Amit Kumar Singh Sanger
Securing Mobile Ad hoc Networks:Key Management and Routing
11 pages,(65-75)
International Journal on AdHoc Networking Systems (IJANS) Vol. 2, No. 2, April 2012
10.5121/ijans.2012.2207
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Secure communication between two nodes in a network depends on reliable key management systems that generate and distribute keys between communicating nodes and a secure routing protocol that establishes a route between them. But due to lack of central server and infrastructure in Mobile Ad hoc Networks (MANETs), this is major problem to manage the keys in the network. Dynamically changes in network's topology causes weak trust relationship among the nodes in the network. In MANETs a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in MANETs; where there may be one or more malicious nodes in between source and destination. A routing protocol is said to be secure that detects the detrimental effects of malicious node(s in the path from source to destination). In this paper, we proposed a key management scheme and a secure routing protocol that secures on demand routing protocol such as DSR and AODV. We assume that MANETs is divided into groups having a group leader in each group. Group leader has responsibility of key management in its group. Proposed key management scheme is a decentralized scheme that does not require any Trusted Third Party (TTP) for key management. In proposed key management system, both a new node and group leader authenticates each other mutually before joining the network. While proposed secure routing protocol allows both communicating parties as well as intermediate nodes to authenticate other nodes and maintains message integrity
[ { "version": "v1", "created": "Fri, 11 May 2012 05:57:39 GMT" } ]
2012-05-14T00:00:00
[ [ "Chauhan", "Kamal Kumar", "" ], [ "Sanger", "Amit Kumar Singh", "" ] ]
new_dataset
0.997304
1205.2483
Ton Kloks
Maw-Shang Chang and Ton Kloks and Ching-Hao Liu
Edge-clique graphs of cocktail parties have unbounded rankwidth
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an attempt to find a polynomial-time algorithm for the edge-clique cover problem on cographs we tried to prove that the edge-clique graphs of cographs have bounded rankwidth. However, this is not the case. In this note we show that the edge-clique graphs of cocktail party graphs have unbounded rankwidth.
[ { "version": "v1", "created": "Fri, 11 May 2012 11:12:11 GMT" } ]
2012-05-14T00:00:00
[ [ "Chang", "Maw-Shang", "" ], [ "Kloks", "Ton", "" ], [ "Liu", "Ching-Hao", "" ] ]
new_dataset
0.999605
1205.2638
Albert Xin Jiang
Albert Xin Jiang, Kevin Leyton-Brown, Avi Pfeffer
Temporal Action-Graph Games: A New Representation for Dynamic Games
Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI2009)
null
null
UAI-P-2009-PG-268-276
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce temporal action graph games (TAGGs), a novel graphical representation of imperfect-information extensive form games. We show that when a game involves anonymity or context-specific utility independencies, its encoding as a TAGG can be much more compact than its direct encoding as a multiagent influence diagram (MAID).We also show that TAGGs can be understood as indirect MAID encodings in which many deterministic chance nodes are introduced. We provide an algorithm for computing with TAGGs, and show both theoretically and empirically that our approach improves significantly on the previous state of the art.
[ { "version": "v1", "created": "Wed, 9 May 2012 15:36:06 GMT" } ]
2012-05-14T00:00:00
[ [ "Jiang", "Albert Xin", "" ], [ "Leyton-Brown", "Kevin", "" ], [ "Pfeffer", "Avi", "" ] ]
new_dataset
0.999107
1205.2164
Ankit Kumar
Ankit Kumar, Tushar Patnaik, Vivek Kr Verma
Discrimination of English to other Indian languages (Kannada and Hindi) for OCR system
9 Pages, 5 Figure, 5 Tables, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.2, April 2012
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
India is a multilingual multi-script country. In every state of India there are two languages one is state local language and the other is English. For example in Andhra Pradesh, a state in India, the document may contain text words in English and Telugu script. For Optical Character Recognition (OCR) of such a bilingual document, it is necessary to identify the script before feeding the text words to the OCRs of individual scripts. In this paper, we are introducing a simple and efficient technique of script identification for Kannada, English and Hindi text words of a printed document. The proposed approach is based on the horizontal and vertical projection profile for the discrimination of the three scripts. The feature extraction is done based on the horizontal projection profile of each text words. We analysed 700 different words of Kannada, English and Hindi in order to extract the discrimination features and for the development of knowledge base. We use the horizontal projection profile of each text word and based on the horizontal projection profile we extract the appropriate features. The proposed system is tested on 100 different document images containing more than 1000 text words of each script and a classification rate of 98.25%, 99.25% and 98.87% is achieved for Kannada, English and Hindi respectively.
[ { "version": "v1", "created": "Thu, 10 May 2012 06:14:51 GMT" } ]
2012-05-11T00:00:00
[ [ "Kumar", "Ankit", "" ], [ "Patnaik", "Tushar", "" ], [ "Verma", "Vivek Kr", "" ] ]
new_dataset
0.999171
1205.2345
Salah A. Aly
Hossam Zawbaa and Salah A. Aly
Hajj and Umrah Event Recognition Datasets
4 pages, 18 figures with 33 images
null
null
null
cs.CV cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, new Hajj and Umrah Event Recognition datasets (HUER) are presented. The demonstrated datasets are based on videos and images taken during 2011-2012 Hajj and Umrah seasons. HUER is the first collection of datasets covering the six types of Hajj and Umrah ritual events (rotating in Tawaf around Kabaa, performing Sa'y between Safa and Marwa, standing on the mount of Arafat, staying overnight in Muzdalifah, staying two or three days in Mina, and throwing Jamarat). The HUER datasets also contain video and image databases for nine types of human actions during Hajj and Umrah (walking, drinking from Zamzam water, sleeping, smiling, eating, praying, sitting, shaving hairs and ablutions, reading the holy Quran and making duaa). The spatial resolutions are 1280 x 720 pixels for images and 640 x 480 pixels for videos and have lengths of 20 seconds in average with 30 frame per second rates.
[ { "version": "v1", "created": "Thu, 10 May 2012 19:10:18 GMT" } ]
2012-05-11T00:00:00
[ [ "Zawbaa", "Hossam", "" ], [ "Aly", "Salah A.", "" ] ]
new_dataset
0.999724
1205.2352
Samir Medjiah
Samir Medjiah (LaBRI), Toufik Ahmed (LaBRI)
Orion Routing Protocol for Delay-Tolerant Networks
null
IEEE International Conference on Communications (ICC), 2011, Kyoto : Japan (2011)
10.1109/icc.2011.5963362
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of efficient routing in delay tolerant network. We propose a new routing protocol dubbed as ORION. In ORION, only a single copy of a data packet is kept in the network and transmitted, contact by contact, towards the destination. The aim of the ORION routing protocol is twofold: on one hand, it enhances the delivery ratio in networks where an end-to-end path does not necessarily exist, and on the other hand, it minimizes the routing delay and the network overhead to achieve better performance. In ORION, nodes are aware of their neighborhood by the mean of actual and statistical estimation of new contacts. ORION makes use of autoregressive moving average (ARMA) stochastic processes for best contact prediction and geographical coordinates for optimal greedy data packet forwarding. Simulation results have demonstrated that ORION outperforms other existing DTN routing protocols such as PRoPHET in terms of end-to-end delay, packet delivery ratio, hop count and first packet arrival.
[ { "version": "v1", "created": "Thu, 10 May 2012 19:16:43 GMT" } ]
2012-05-11T00:00:00
[ [ "Medjiah", "Samir", "", "LaBRI" ], [ "Ahmed", "Toufik", "", "LaBRI" ] ]
new_dataset
0.998352
1205.2357
Samir Medjiah
Samir Medjiah (LaBRI), Toufik Ahmed (LaBRI), Abolghasem Hamid Asgari (TRT UK)
Streaming multimedia over WMSNs: an online multipath routing protocol
null
International Journal of Sensor Networks 11, 1 (2012) 10-21
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilizing: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in high density WMSN.
[ { "version": "v1", "created": "Thu, 10 May 2012 19:21:07 GMT" } ]
2012-05-11T00:00:00
[ [ "Medjiah", "Samir", "", "LaBRI" ], [ "Ahmed", "Toufik", "", "LaBRI" ], [ "Asgari", "Abolghasem Hamid", "", "TRT UK" ] ]
new_dataset
0.998436
1205.1823
Anna-Lena Trautmann
Anna-Lena Trautmann
Pl\"ucker Embedding of Cyclic Orbit Codes
to appear in Proceedings of the 20th International Symposium on Mathematical Theory of Networks and Systems 2012, Melbourne, Australia
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic orbit codes are a family of constant dimension codes used for random network coding. We investigate the Pl\"ucker embedding of these codes and show how to efficiently compute the Grassmann coordinates of the code words.
[ { "version": "v1", "created": "Tue, 8 May 2012 20:52:28 GMT" } ]
2012-05-10T00:00:00
[ [ "Trautmann", "Anna-Lena", "" ] ]
new_dataset
0.999572
1205.1886
Ishit Makwana
Ishit Makwana, Vitrag Sheth
A low power high bandwidth four quadrant analog multiplier in 32 nm CNFET technology
null
International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.2, April 2012, 73-83
10.5121/vlsic.2012.3207
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Carbon Nanotube Field Effect Transistor (CNFET) is a promising new technology that overcomes several limitations of traditional silicon integrated circuit technology. In recent years, the potential of CNFET for analog circuit applications has been explored. This paper proposes a novel four quadrant analog multiplier design using CNFETs. The simulation based on 32nm CNFET technology shows that the proposed multiplier has very low harmonic distortion (<0.45%), large input range ({\pm}400mV), large bandwidth (~50GHz) and low power consumption (~247{\mu}W), while operating at a supply voltage of {\pm}0.9V.
[ { "version": "v1", "created": "Wed, 9 May 2012 07:16:28 GMT" } ]
2012-05-10T00:00:00
[ [ "Makwana", "Ishit", "" ], [ "Sheth", "Vitrag", "" ] ]
new_dataset
0.989171
1205.2007
Asif Khan Mr
Ahmed Barnawi, Nadine Akkari, Muhammad Emran, Asif Irshad Khan
Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed
6 Pages, Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi International, Riyadh, KSA, 24-26 April 2011
IEEE Xplore, E-ISBN: 978-1-4577-0067-5 ,April 2011
10.1109/SIECPC.2011.5876936
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past few years, mobile operators are faced with enormous challenges. Of such challenges, evolved user demands on personalized applications. Telecommunications industry as well as research community have paid enormous attention to Next Generation Networks (NGN) to address this challenge. NGN is perceived as a sophisticated platform where both application developers and mobile operators cooperate to develop user applications with enhanced quality of experience. The objective of this paper is twofold: first we present an introduction to state-of-the-art NGN testbed to be developed at KAU, and second we provide initial analysis for deploying a mobile application on top of the testbed.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 10:09:43 GMT" } ]
2012-05-10T00:00:00
[ [ "Barnawi", "Ahmed", "" ], [ "Akkari", "Nadine", "" ], [ "Emran", "Muhammad", "" ], [ "Khan", "Asif Irshad", "" ] ]
new_dataset
0.97148