id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1205.2048
Joseph O'Rourke
Joseph O'Rourke
Unfolding Prismatoids as Convex Patches: Counterexamples and Positive Results
This paper was prepared for but never submitted to CCCG'12. 12 two-column pages. 27 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the unsolved problem of unfolding prismatoids in a new context, viewing a "topless prismatoid" as a convex patch---a polyhedral subset of the surface of a convex polyhedron homeomorphic to a disk. We show that several natural strategies for unfolding a prismatoid can fail, but obtain a positive result for "petal unfolding" topless prismatoids. We also show that the natural extension to a convex patch consisting of a face of a polyhedron and all its incident faces, does not always have a nonoverlapping petal unfolding. However, we obtain a positive result by excluding the problematical patches. This then leads a positive result for restricted prismatoids. Finally, we suggest suggest studying the unfolding of convex patches in general, and offer some possible lines of investigation.
[ { "version": "v1", "created": "Wed, 9 May 2012 17:52:51 GMT" } ]
2012-05-10T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.995376
1201.1259
Romain Boulet
Romain Boulet (LMTG), Pierre Mazzega (LMTG), Dani\`ele Bourcier (CERSA)
Network Analysis of the French Environmental Code
AI Approaches to the Complexity of Legal Systems (AICOL 2009), Rotterdam : Netherlands (2009)
null
10.1007/978-3-642-16524-5_4
null
cs.SI cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform a detailed analysis of the network constituted by the citations in a legal code, we search for hidden structures and properties. The graph associated to the Environmental code has a small-world structure and it is partitioned in several hidden communities of articles that only partially coincide with the organization of the code as given by its table of content. Several articles are also connected with a low number of articles but are intermediate between large communities. The structure of the Environmental Code is contrasting with the reference network of all the French Legal Codes that presents a rich-club of ten codes very central to the whole French legal system, but no small-world property. This comparison shows that the structural properties of the reference network associated to a legal system strongly depends on the scale and granularity of the analysis, as is the case for many complex systems
[ { "version": "v1", "created": "Tue, 22 Nov 2011 20:54:43 GMT" } ]
2012-05-09T00:00:00
[ [ "Boulet", "Romain", "", "LMTG" ], [ "Mazzega", "Pierre", "", "LMTG" ], [ "Bourcier", "Danièle", "", "CERSA" ] ]
new_dataset
0.996081
1205.1604
Mohammad Arif
Mohammad Arif and Tara Rani
ACO based routing for MANETs
12 pages, 7 figures, ISSN:0975-3834 (Online); 0975-4679 (Print), 2012
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile ad hoc network (MANET) is a collection of wireless mobile nodes. It dynamically forms a temporary network without using any pre existing network infrastructure or centralized administration i.e. with minimal prior planning. All nodes have routing capabilities and forward data packets to other nodes in multi-hop fashion. As the network is dynamic, the network topology continuously experiences alterations during deployment. The biggest challenge in MANETs is to find a path between communicating nodes. The considerations of the MANET environment and the nature of the mobile nodes create further complications which results in the need to develop special routing algorithms to meet these challenges. Swarm intelligence, a bio-inspired technique, which has proven to be very adaptable in other problem domains, has been applied to the MANET routing problem as it forms a good fit to the problem. In ant societies the activities of the individuals are not regulated by any explicit form of centralized control but are the result of self-organizing dynamics driven by local interactions and communications among a number of relatively simple individuals. This unique characteristic has made ant societies an attractive and inspiring model for building new algorithms and new multi-agent systems. In this paper, we have studied and reviewed Ant Colony based routing algorithms and its variants. Finally, a performance evaluation of the original ARA and the EARA is carried out with respect to each other.
[ { "version": "v1", "created": "Tue, 8 May 2012 07:12:47 GMT" } ]
2012-05-09T00:00:00
[ [ "Arif", "Mohammad", "" ], [ "Rani", "Tara", "" ] ]
new_dataset
0.9994
1205.1630
Karima Ben Hamida El Abri
Karima Ben Hamida El Abri and Ammar Bouallegue
A New UWB System Based on a Frequency Domain Transformation Of The Received Signal
14 pages,5 figures, journal paper
Karima Ben Hamida El Abri and Ammar Bouallegue,"A New UWB System Based on a Frequency Domain Transformation Of The Received Signal", IJWMN, april 2012
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Differential system for ultra wide band (UWB) transmission is a very attractive solution from a practical point of view. In this paper, we present a new direct sequence (DS) UWB system based on the conversion of the received signal from time domain to frequency domain that's why we called FDR receiver. Simulation results show that the proposed receiver structure outperforms the classical differential one for both low and high data rate systems.
[ { "version": "v1", "created": "Tue, 8 May 2012 08:50:33 GMT" } ]
2012-05-09T00:00:00
[ [ "Abri", "Karima Ben Hamida El", "" ], [ "Bouallegue", "Ammar", "" ] ]
new_dataset
0.991604
1205.1642
Jose Texier
Jose Texier and Bermudez Manuel
Traductor Writing System Web
LACCEI 2008, ISBN-10 0-9822896-1-8, ISBN-13 978-0-9822896-1-7
null
null
null
cs.OH
http://creativecommons.org/licenses/by-nc-sa/3.0/
A compilator is a program which is development in a programming language that read a file known as source. After this file have to translate and have to convert in other program known as object or to generate a exit. The best way for to know any programming language is analizing a compilation process which is same in all programming paradigm existents. To like to generate a tool that permit a learning in university course. This course could explain in any plataform such as Linux o Windows. This goal is posible through development a Web aplication which is unite with a compilator, it is Traductor Writing System (Sistema de Escritura de Traductores). This system is complete and permit extend and modify the compilator. The system is a module in Moodle which is a Course Management System (CMS) that help teachers for to create comunities of learning in line. This software is in free software license (GPL).
[ { "version": "v1", "created": "Tue, 8 May 2012 09:30:46 GMT" } ]
2012-05-09T00:00:00
[ [ "Texier", "Jose", "" ], [ "Manuel", "Bermudez", "" ] ]
new_dataset
0.99889
1205.1657
Maher Heni
Maher Heni and Ridha Bouallegue
Power control in reactive routing protocol for Mobile Ad Hoc Network
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector) in order to improve the energy consumption in mobile ad hoc networks (MANET). The purpose is to minimize the regular period of HELLO messages generated by the AODV protocol used for the research, development and maintenance of routes. This information is useful to have an idea about battery power levels of different network hosts. After storing this information, the node elect the shortest path following the classical model used this information to elect safest path (make a compromise) in terms of energy. Transmitter node does not select another node as its battery will be exhausted soon. Any node of the network can have the same information's about the neighborhoods as well as other information about the energy level of the different terminal to avoid routing using a link that will be lost due to an exhausted battery of a node in this link. Analytical study and simulations by Jist/SWANS have been conducted to note that no divergence relatively to the classical AODV, a node can have this type of information that improves the energy efficiency in ad hoc networks.
[ { "version": "v1", "created": "Tue, 8 May 2012 10:35:54 GMT" } ]
2012-05-09T00:00:00
[ [ "Heni", "Maher", "" ], [ "Bouallegue", "Ridha", "" ] ]
new_dataset
0.998443
1205.1745
Pedram Hajiani Mr.
Pedram Hajiani, Javad Poshtan
Reconfigurable Controller Design For Actuator Faults In A Four-Tank System Benchmark
8 pages, 5 figures, 3 tables
International Journal of Instrumentation and Control Systems (IJICS) Vol.2, No.2, April 2012
null
null
cs.SY
http://creativecommons.org/licenses/publicdomain/
The purpose of this work is to design a state feedback controller using Parametric Eigenstructure Assignment (PAE) technique that has the capacity to be reconfigured in the case that partial actuator faults occur. The proposed controller is capable of compensating the gain losses in actuators and maintaining the control performance in faulty situations. Simulations show the performance enhancement in comparison to the non-reconfigurable controller through Integral Absolute Error (IAE) index for different fault scenarios.
[ { "version": "v1", "created": "Tue, 8 May 2012 17:06:37 GMT" } ]
2012-05-09T00:00:00
[ [ "Hajiani", "Pedram", "" ], [ "Poshtan", "Javad", "" ] ]
new_dataset
0.998721
1202.3097
Friedrich Slivovsky
Friedrich Slivovsky and Stefan Szeider
Computing Resolution-Path Dependencies in Linear Time
14 pages, SAT 2012
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The alternation of existential and universal quantifiers in a quantified boolean formula (QBF) generates dependencies among variables that must be respected when evaluating the formula. Dependency schemes provide a general framework for representing such dependencies. Since it is generally intractable to determine dependencies exactly, a set of potential dependencies is computed instead, which may include false positives. Among the schemes proposed so far, resolution-path dependencies introduce the fewest spurious dependencies. In this work, we describe an algorithm that detects resolution-path dependencies in linear time, resolving a problem posed by Van Gelder (CP 2011).
[ { "version": "v1", "created": "Tue, 14 Feb 2012 17:33:34 GMT" }, { "version": "v2", "created": "Wed, 15 Feb 2012 20:56:46 GMT" }, { "version": "v3", "created": "Sat, 5 May 2012 10:13:45 GMT" } ]
2012-05-08T00:00:00
[ [ "Slivovsky", "Friedrich", "" ], [ "Szeider", "Stefan", "" ] ]
new_dataset
0.998579
1202.5449
John Fearnley
John Fearnley, Doron Peled, Sven Schewe
Synthesis of Succinct Systems
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synthesis of correct by design systems from specification has recently attracted much attention. The theoretical results imply that this problem is highly intractable, e.g., synthesizing a system is 2EXPTIME-complete for an LTL specification, and EXPTIME-complete for a CTL specification. However, an argument against it is that the temporal specification is highly compact, and the complexity reflects the large size of the system constructed. In that respect, the complexity should, perhaps, be specified relative to the size of the minimal satisfying system. A careful observation reveals that the size of the system is presented in such arguments as the size of its state space. This view is a bit nonstandard, in the sense that the state space can be exponentially larger than the size of a reasonable implementation such as a circuit or a program. Although this alternative measure of the size of the synthesized system is more intuitive (e.g., this is the standard way model checking problems are measured), research on synthesis has so far stayed with measuring the system in terms of the explicit state space. This raises the question of whether or not there always exists a small system. In this paper, we show that this is the case if, and only if, PSPACE = EXPTIME.
[ { "version": "v1", "created": "Fri, 24 Feb 2012 13:26:18 GMT" }, { "version": "v2", "created": "Fri, 4 May 2012 16:34:18 GMT" } ]
2012-05-07T00:00:00
[ [ "Fearnley", "John", "" ], [ "Peled", "Doron", "" ], [ "Schewe", "Sven", "" ] ]
new_dataset
0.95533
1205.0919
Omri Mohamed Nazih
Radhouane Boughammoura Lobna Hlaoua and Mohamed Nazih Omri
ViQIE: A New Approach for Visual Query Interpretation and Extraction
ICITES 2012 - 2nd International Conference on Information Technology and e-Services
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web services are accessed via query interfaces which hide databases containing thousands of relevant information. User's side, distant database is a black box which accepts query and returns results, there is no way to access database schema which reflect data and query meanings. Hence, web services are very autonomous. Users view this autonomy as a major drawback because they need often to combine query capabilities of many web services at the same time. In this work, we will present a new approach which allows users to benefit of query capabilities of many web services while respecting autonomy of each service. This solution is a new contribution in Information Retrieval research axe and has proven good performances on two standard datasets.
[ { "version": "v1", "created": "Fri, 4 May 2012 11:08:31 GMT" } ]
2012-05-07T00:00:00
[ [ "Hlaoua", "Radhouane Boughammoura Lobna", "" ], [ "Omri", "Mohamed Nazih", "" ] ]
new_dataset
0.998381
1009.3819
Md. Saiful Islam
Md. Saiful Islam, Muhammad Mahbubur Rahman, Zerina Begum, Mohd. Zulfiquar Hafiz
Fault Tolerant Variable Block Carry Skip Logic (VBCSL) using Parity Preserving Reversible Gates
9 pages, 16 figures, 2 tables, Accepted for publication in IJCEE, IACSIT, Singapore
International Journal of Computer and Electrical Engineering vol. 3, no. 1, pp. 1-7, 2011
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reversible logic design has become one of the promising research directions in low power dissipating circuit design in the past few years and has found its application in low power CMOS design, digital signal processing and nanotechnology. This paper presents the efficient design approaches of fault tolerant carry skip adders (FTCSAs) and compares those designs with the existing ones. Variable block carry skip logic (VBCSL) using the fault tolerant full adders (FTFAs) has also been developed. The designs are minimized in terms of hardware complexity, gate count, constant inputs and garbage outputs. Besides of it, technology independent evaluation of the proposed designs clearly demonstrates its superiority with the existing counterparts.
[ { "version": "v1", "created": "Mon, 20 Sep 2010 13:53:39 GMT" } ]
2012-05-04T00:00:00
[ [ "Islam", "Md. Saiful", "" ], [ "Rahman", "Muhammad Mahbubur", "" ], [ "Begum", "Zerina", "" ], [ "Hafiz", "Mohd. Zulfiquar", "" ] ]
new_dataset
0.985176
1204.4535
Jay Shah
Jay Shah and Ayan Mahalanobis
A New Guess-and-Determine Attack on the A5/1 Stream Cipher
14 pages, 4 figures, 3 tables
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of 2^(48.5), which is much less than the brute-force attack with a complexity of 2^(64). The attack has a 100% success rate and requires about 5.65GB storage. We provide a detailed description of our new attack along with its implementation and results.
[ { "version": "v1", "created": "Fri, 20 Apr 2012 05:53:40 GMT" }, { "version": "v2", "created": "Thu, 3 May 2012 06:54:15 GMT" } ]
2012-05-04T00:00:00
[ [ "Shah", "Jay", "" ], [ "Mahalanobis", "Ayan", "" ] ]
new_dataset
0.99899
1205.0337
Pejman Goudarzi
Pejman Goudarzi
Stochastic TCO minimization for Video Transmission over IP Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From the viewpoint of service operators the Total Cost of Ownership (TCO) for developing a communication service comprises from two parts; CAPital EXpenditure (CAPEX) and OPerational EXpenditure (OPEX). These two types of costs are interrelated and affect any service provider's deployment strategy. In many traditional methods, selection of critical elements of a new service is performed in a heuristic manner aimed at reducing only the OPEX part of the TCO which is not necessarily optimal. Furthermore, exact cost modeling for such services is not always possible and contains some uncertainties. In the current work, after cost modeling of each video streaming element by capturing the effect of the model uncertainties, the TCO optimization problem for video streaming over IP networks is formulated as a stochastic optimization problem. The solution of the proposed optimization problem can cope with the cost modeling uncertainties and track the dynamism in the TCO and lead to a time-varying optimal solution. Numerical analysis results verify the developed method.
[ { "version": "v1", "created": "Wed, 2 May 2012 06:40:34 GMT" } ]
2012-05-03T00:00:00
[ [ "Goudarzi", "Pejman", "" ] ]
new_dataset
0.997364
1205.0076
Ketan Savla
Giacomo Como, Ketan Savla, Daron Acemoglu, Munther A. Dahleh and Emilio Frazzoli
Robust Distributed Routing in Dynamical Networks with Cascading Failures
null
null
null
null
cs.SY math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robustness of routing policies for networks is a central problem which is gaining increased attention with a growing awareness to safeguard critical infrastructure networks against natural and man-induced disruptions. Routing under limited information and the possibility of cascades through the network adds serious challenges to this problem. This abstract considers the framework of dynamical networks introduced in our earlier work [1,2], where the network is modeled by a system of ordinary differential equations derived from mass conservation laws on directed acyclic graphs with a single origin-destination pair and a constant inflow at the origin. The rate of change of the particle density on each link of the network equals the difference between the inflow and the outflow on that link. The latter is modeled to depend on the current particle density on that link through a flow function. The novel modeling element in this paper is that every link is assumed to have finite capacity for particle density and that the flow function is modeled to be strictly increasing as density increases from zero up to the maximum density capacity, and is discontinuous at the maximum density capacity, with the flow function value being zero at that point. This feature, in particular, allows for the possibility of spill-backs in our model. In this paper, we present our results on resilience of such networks under distributed routing, towards perturbations that reduce link-wise flow functions.
[ { "version": "v1", "created": "Tue, 1 May 2012 02:54:21 GMT" } ]
2012-05-02T00:00:00
[ [ "Como", "Giacomo", "" ], [ "Savla", "Ketan", "" ], [ "Acemoglu", "Daron", "" ], [ "Dahleh", "Munther A.", "" ], [ "Frazzoli", "Emilio", "" ] ]
new_dataset
0.993541
1205.0125
Rafayel Kamalian
A.M. Khachatryan, R.R. Kamalian
On the parameter $\mu_{21}$ of a complete bipartite graph
5 pages, no figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A proper edge $t$-coloring of a graph $G$ is a coloring of edges of $G$ with colors $1,2,...,t$ such that all colors are used, and no two adjacent edges receive the same color. The set of colors of edges incident with a vertex $x$ is called a spectrum of $x$. An arbitrary nonempty subset of consecutive integers is called an interval. Suppose that all edges of a graph $G$ are colored in the game of Alice and Bob with asymmetric distribution of roles. Alice determines the number $t$ of colors in the future proper edge coloring of $G$ and aspires to minimize the number of vertices with an interval spectrum in it. Bob colors edges of $G$ with $t$ colors and aspires to maximize that number. $\mu_{21}(G)$ is equal to the number of vertices of $G$ with an interval spectrum at the finish of the game on the supposition that both players choose their best strategies. In this paper, for arbitrary positive integers $m$ and $n$, the exact value of the parameter $\mu_{21}(K_{m,n})$ is found.
[ { "version": "v1", "created": "Tue, 1 May 2012 10:21:51 GMT" } ]
2012-05-02T00:00:00
[ [ "Khachatryan", "A. M.", "" ], [ "Kamalian", "R. R.", "" ] ]
new_dataset
0.992382
1205.0128
Rafayel Kamalian
R.R. Kamalian
It was not known about simple cycles
7 pages, no figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A proper edge $t$-coloring of a graph is a coloring of its edges with colors $1,2,...,t$ such that all colors are used, and no two adjacent edges receive the same color. For any integer $n\geq 3$, all possible values of $t$ are found, for which there exists such a proper edge $t$-coloring of the simple cycle C(n), which uses for each pair of adjacent edges either consecutive colors or the first and the last ones.
[ { "version": "v1", "created": "Tue, 1 May 2012 10:38:18 GMT" } ]
2012-05-02T00:00:00
[ [ "Kamalian", "R. R.", "" ] ]
new_dataset
0.997035
1204.6411
Wolfgang Slany
Wolfgang Slany
Catroid: A Mobile Visual Programming System for Children
4 pages. Demo paper at the 11th International Conference on Interaction Design and Children (IDC 2012)
null
null
null
cs.PL cs.CY cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Catroid is a free and open source visual programming language, programming environment, image manipulation program, and website. Catroid allows casual and first-time users starting from age eight to develop their own animations and games solely using their Android phones or tablets. Catroid also allows to wirelessly control external hardware such as Lego Mindstorms robots via Bluetooth, Bluetooth Arduino boards, as well as Parrot's popular and inexpensive AR.Drone quadcopters via WiFi.
[ { "version": "v1", "created": "Sat, 28 Apr 2012 14:26:56 GMT" } ]
2012-05-01T00:00:00
[ [ "Slany", "Wolfgang", "" ] ]
new_dataset
0.999848
1204.6459
Jean-Pierre Tillich
Val\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
A Distinguisher-Based Attack on a Variant of McEliece's Cryptosystem Based on Reed-Solomon Codes
arXiv admin note: substantial text overlap with arXiv:1203.6686
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Baldi et \textit{al.} proposed a variant of McEliece's cryptosystem. The main idea is to replace its permutation matrix by adding to it a rank 1 matrix. The motivation for this change is twofold: it would allow the use of codes that were shown to be insecure in the original McEliece's cryptosystem, and it would reduce the key size while keeping the same security against generic decoding attacks. The authors suggest to use generalized Reed-Solomon codes instead of Goppa codes. The public code built with this method is not anymore a generalized Reed-Solomon code. On the other hand, it contains a very large secret generalized Reed-Solomon code. In this paper we present an attack that is built upon a distinguisher which is able to identify elements of this secret code. The distinguisher is constructed by considering the code generated by component-wise products of codewords of the public code (the so-called "square code"). By using square-code dimension considerations, the initial generalized Reed-Solomon code can be recovered which permits to decode any ciphertext. A similar technique has already been successful for mounting an attack against a homomorphic encryption scheme suggested by Bogdanoc et \textit{al.}. This work can be viewed as another illustration of how a distinguisher of Reed-Solomon codes can be used to devise an attack on cryptosystems based on them.
[ { "version": "v1", "created": "Sun, 29 Apr 2012 07:34:55 GMT" } ]
2012-05-01T00:00:00
[ [ "Gauthier", "Valérie", "" ], [ "Otmani", "Ayoub", "" ], [ "Tillich", "Jean-Pierre", "" ] ]
new_dataset
0.987864
1204.6492
Fernando Brito e Abreu
Tiago Pessoa, Fernando Brito e Abreu, Miguel Pessoa Monteiro, Sergio Bryton
An Eclipse Plugin to Support Code Smells Detection
12 pages, 7 figures
INFORUM'2011 conference proceedings, Luis Caires e Raul Barbosa (eds.), 8-9 September, Coimbra, Portugal, 2011
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Eradication of code smells is often pointed out as a way to improve readability, extensibility and design in existing software. However, code smell detection in large systems remains time consuming and error-prone, partly due to the inherent subjectivity of the detection processes presently available. In view of mitigating the subjectivity problem, this paper presents a tool that automates a technique for the detection and assessment of code smells in Java source code, developed as an Eclipse plug-in. The technique is based upon a Binary Logistic Regression model and calibrated by expert's knowledge. A short overview of the technique is provided and the tool is described.
[ { "version": "v1", "created": "Sun, 29 Apr 2012 16:33:53 GMT" } ]
2012-05-01T00:00:00
[ [ "Pessoa", "Tiago", "" ], [ "Abreu", "Fernando Brito e", "" ], [ "Monteiro", "Miguel Pessoa", "" ], [ "Bryton", "Sergio", "" ] ]
new_dataset
0.999218
1204.6628
Federico Calzolari
Daniele Licari, Federico Calzolari
The Anatomy of a Grid portal
6 pages
Journal of Physics: Conference Series 331 (2011) 072043
10.1088/1742-6596/331/7/072043
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a new way to deal with Grid portals referring to our implementation. L-GRID is a light portal to access the EGEE/EGI Grid infrastructure via Web, allowing users to submit their jobs from a common Web browser in a few minutes, without any knowledge about the Grid infrastructure. It provides the control over the complete lifecycle of a Grid Job, from its submission and status monitoring, to the output retrieval. The system, implemented as client-server architecture, is based on the Globus Grid middleware. The client side application is based on a java applet; the server relies on a Globus User Interface. There is no need of user registration on the server side, and the user needs only his own X.509 personal certificate. The system is user-friendly, secure (it uses SSL protocol, mechanism for dynamic delegation and identity creation in public key infrastructures), highly customizable, open source, and easy to install. The X.509 personal certificate does not get out from the local machine. It allows to reduce the time spent for the job submission, granting at the same time a higher efficiency and a better security level in proxy delegation and management.
[ { "version": "v1", "created": "Mon, 30 Apr 2012 13:32:48 GMT" } ]
2012-05-01T00:00:00
[ [ "Licari", "Daniele", "" ], [ "Calzolari", "Federico", "" ] ]
new_dataset
0.996379
1204.6098
Ankit Singh Rawat
Ankit Singh Rawat and Sriram Vishwanath
On Locality in Distributed Storage Systems
Submitted to the IEEE Information Theory Workshop (ITW) 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the design of codes for distributed storage systems (DSS) that enable local repair in the event of node failure. This paper presents locally repairable codes based on low degree multivariate polynomials. Its code construction mechanism extends work on Noisy Interpolating Set by Dvir et al. \cite{dvir2011}. The paper presents two classes of codes that allow node repair to be performed by contacting 2 and 3 surviving nodes respectively. It further shows that both classes are good in terms of their rate and minimum distance, and allow their rate to be bartered for greater flexibility in the repair process.
[ { "version": "v1", "created": "Fri, 27 Apr 2012 01:39:42 GMT" } ]
2012-04-30T00:00:00
[ [ "Rawat", "Ankit Singh", "" ], [ "Vishwanath", "Sriram", "" ] ]
new_dataset
0.997385
1204.6106
Shengmei Zhao
Peng Shi and Shengmei Zhao and Bei Wang
Performance of Polar Codes on wireless communications Channel
5 pages, to be submitted to GlobeCom 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the performance of polar codes, the capacity-achieving channel codes, on wireless communication channel in this paper. By generalizing the definition of Bhattacharyya Parameter in discrete memoryless channel, we present the special expression of the parameter for Gaussian and Rayleigh fading the two continuous channels, including the recursive formulas and the initial values. We analyze the applications of polar codes with the defined parameter over Rayleigh fading channel by transmitting image and speech. By comparing with low density parity-check codes(LDPC) at the same cases, our simulation results show that polar codes have better performance than that of LDPC codes. Polar codes will be good candidate for wireless communication channel.
[ { "version": "v1", "created": "Fri, 27 Apr 2012 03:42:09 GMT" } ]
2012-04-30T00:00:00
[ [ "Shi", "Peng", "" ], [ "Zhao", "Shengmei", "" ], [ "Wang", "Bei", "" ] ]
new_dataset
0.999475
1204.6284
Romain Boulet
Pierre Mazzega (LMTG), Dani\`ele Bourcier (CERSA), Romain Boulet (LMTG)
The Network of French Legal Codes
null
12th International Conference on Artificial Intelligence and Law (ICAIL 2009), Barcelona : Espagne (2009)
10.1145/1568234.1568271
null
cs.AI cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an analysis of the codified Law of France as a structured system. Fifty two legal codes are selected on the basis of explicit legal criteria and considered as vertices with their mutual quotations forming the edges in a network which properties are analyzed relying on graph theory. We find that a group of 10 codes are simultaneously the most citing and the most cited by other codes, and are also strongly connected together so forming a "rich club" sub-graph. Three other code communities are also found that somewhat partition the legal field is distinct thematic sub-domains. The legal interpretation of this partition is opening new untraditional lines of research. We also conjecture that many legal systems are forming such new kind of networks that share some properties in common with small worlds but are far denser. We propose to call "concentrated world".
[ { "version": "v1", "created": "Thu, 24 Nov 2011 07:56:00 GMT" } ]
2012-04-30T00:00:00
[ [ "Mazzega", "Pierre", "", "LMTG" ], [ "Bourcier", "Danièle", "", "CERSA" ], [ "Boulet", "Romain", "", "LMTG" ] ]
new_dataset
0.999073
1111.7299
Pierre Lescanne
Pierre Lescanne (LIP)
Les crashs sont rationnels
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As we show by using notions of equilibrium in infinite sequential games, crashes or financial escalations are rational for economic or environmental agents, who have a vision of an infinite world. This contradicts a picture of a self-regulating, wise and pacific economic world. In other words, in this context, equilibrium is not synonymous of stability. We try to draw, from this statement, methodological consequences and new ways of thinking, especially in economic game theory. Among those new paths, coinduction is the basis of our reasoning in infinite games.
[ { "version": "v1", "created": "Wed, 30 Nov 2011 20:27:28 GMT" }, { "version": "v2", "created": "Mon, 12 Dec 2011 15:14:21 GMT" }, { "version": "v3", "created": "Tue, 20 Dec 2011 15:39:40 GMT" }, { "version": "v4", "created": "Sun, 8 Jan 2012 07:03:24 GMT" }, { "version": "v5", "created": "Thu, 26 Apr 2012 12:01:55 GMT" } ]
2012-04-27T00:00:00
[ [ "Lescanne", "Pierre", "", "LIP" ] ]
new_dataset
0.997013
1204.5828
Adrian Dumitrescu
Adrian Dumitrescu
The traveling salesman problem for lines and rays in the plane
10 pages, 5 figures
null
null
null
cs.CG math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Euclidean TSP with neighborhoods (TSPN), we are given a collection of $n$ regions (neighborhoods) and we seek a shortest tour that visits each region. In the path variant, we seek a shortest path that visits each region. We present several linear-time approximation algorithms with improved ratios for these problems for two cases of neighborhoods that are (infinite) lines, and respectively, (half-infinite) rays. Along the way we derive a tight bound on the minimum perimeter of a rectangle enclosing an open curve of length $L$.
[ { "version": "v1", "created": "Thu, 26 Apr 2012 04:56:56 GMT" } ]
2012-04-27T00:00:00
[ [ "Dumitrescu", "Adrian", "" ] ]
new_dataset
0.972318
1204.5852
Youssef Bassil
Youssef Bassil, Mohammad Alwani
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information
LACSC - Lebanese Association for Computational Sciences - http://www.lacsc.org
Computer and Information Science, Vol. 5, No. 3, May 2012
10.5539/cis.v5n3p37
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In computing, spell checking is the process of detecting and sometimes providing spelling suggestions for incorrectly spelled words in a text. Basically, a spell checker is a computer program that uses a dictionary of words to perform spell checking. The bigger the dictionary is, the higher is the error detection rate. The fact that spell checkers are based on regular dictionaries, they suffer from data sparseness problem as they cannot capture large vocabulary of words including proper names, domain-specific terms, technical jargons, special acronyms, and terminologies. As a result, they exhibit low error detection rate and often fail to catch major errors in the text. This paper proposes a new context-sensitive spelling correction method for detecting and correcting non-word and real-word errors in digital text documents. The approach hinges around data statistics from Google Web 1T 5-gram data set which consists of a big volume of n-gram word sequences, extracted from the World Wide Web. Fundamentally, the proposed method comprises an error detector that detects misspellings, a candidate spellings generator based on a character 2-gram model that generates correction suggestions, and an error corrector that performs contextual error correction. Experiments conducted on a set of text documents from different domains and containing misspellings, showed an outstanding spelling error correction rate and a drastic reduction of both non-word and real-word errors. In a further study, the proposed algorithm is to be parallelized so as to lower the computational cost of the error detection and correction processes.
[ { "version": "v1", "created": "Thu, 26 Apr 2012 07:44:18 GMT" } ]
2012-04-27T00:00:00
[ [ "Bassil", "Youssef", "" ], [ "Alwani", "Mohammad", "" ] ]
new_dataset
0.998435
1204.5887
Rigo Michel
Michel Rigo
Numeration Systems: a Link between Number Theory and Formal Language Theory
21 pages, 3 figures, invited talk DLT'2010
Proceedings of Developments in Language Theory, London, Ontario, Canada (2010), Lect. Notes in Comput. Sci. 6224, 33-53 Springer-Verlag (2010)
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey facts mostly emerging from the seminal results of Alan Cobham obtained in the late sixties and early seventies. We do not attempt to be exhaustive but try instead to give some personal interpretations and some research directions. We discuss the notion of numeration systems, recognizable sets of integers and automatic sequences. We briefly sketch some results about transcendence related to the representation of real numbers. We conclude with some applications to combinatorial game theory and verification of infinite-state systems and present a list of open problems.
[ { "version": "v1", "created": "Thu, 26 Apr 2012 11:26:44 GMT" } ]
2012-04-27T00:00:00
[ [ "Rigo", "Michel", "" ] ]
new_dataset
0.992272
1204.5929
Fabrizio Luccio
Fabrizio Luccio and Linda Pagli
Chain Rotations: a New Look at Tree Distance
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As well known the rotation distance D(S,T) between two binary trees S, T of n vertices is the minimum number of rotations of pairs of vertices to transform S into T. We introduce the new operation of chain rotation on a tree, involving two chains of vertices, that requires changing exactly three pointers in the data structure as for a standard rotation, and define the corresponding chain distance C(S,T). As for D(S,T), no polynomial time algorithm to compute C(S,T) is known. We prove a constructive upper bound and an analytical lower bound on C(S,T) based on the number of maximal chains in the two trees. In terms of n we prove the general upper bound C(S,T)<= n-1 and we show that there are pairs of trees for which this bound is tight. No similar result is known for D(S,T) where the best upper and lower bounds are 2n-6 and 5n/3-4 respectively.
[ { "version": "v1", "created": "Thu, 26 Apr 2012 14:05:22 GMT" } ]
2012-04-27T00:00:00
[ [ "Luccio", "Fabrizio", "" ], [ "Pagli", "Linda", "" ] ]
new_dataset
0.984305
1108.3033
Karl Schlechta
Dov Gabbay, Karl Schlechta
Equilibria und weiteres Heiteres II
arXiv admin note: incorporates entirety of text from arXiv:0907.4017
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate several technical and conceptual questions. Our main subject is the investigation of independence as a ternary relation in the context of non-monotonic logic. In the context of probability, this investigation was started by W.Spohn et al., and then followed by J.Pearl. We look at products of function sets, and thus continue our own investigation of independence in non-monotonic logic. We show that a finite characterization of this relation in our context is impossible, and indicate how to construct all valid rules.
[ { "version": "v1", "created": "Mon, 15 Aug 2011 16:59:07 GMT" }, { "version": "v2", "created": "Fri, 9 Sep 2011 11:56:02 GMT" }, { "version": "v3", "created": "Sat, 17 Sep 2011 19:36:06 GMT" }, { "version": "v4", "created": "Sun, 16 Oct 2011 05:37:12 GMT" }, { "version": "v5", "created": "Tue, 31 Jan 2012 09:18:23 GMT" }, { "version": "v6", "created": "Wed, 25 Apr 2012 06:28:15 GMT" } ]
2012-04-26T00:00:00
[ [ "Gabbay", "Dov", "" ], [ "Schlechta", "Karl", "" ] ]
new_dataset
0.998628
1204.5580
Damien Chablat
Montserrat Manubens, Guillaume Moroz (INRIA Lorraine - LORIA), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), Fabrice Rouillier (INRIA Rocquencourt)
Cusp Points in the Parameter Space of Degenerate 3-RPR Planar Parallel Manipulators
ASME Journal of Mechanisms and Robotics (2012) 1-10
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the conditions in the design parameter space for the existence and distribution of the cusp locus for planar parallel manipulators. Cusp points make possible non-singular assembly-mode changing motion, which increases the maximum singularity-free workspace. An accurate algorithm for the determination is proposed amending some imprecisions done by previous existing algorithms. This is combined with methods of Cylindric Algebraic Decomposition, Gr\"obner bases and Discriminant Varieties in order to partition the parameter space into cells with constant number of cusp points. These algorithms will allow us to classify a family of degenerate 3-RPR manipulators.
[ { "version": "v1", "created": "Wed, 25 Apr 2012 08:03:31 GMT" } ]
2012-04-26T00:00:00
[ [ "Manubens", "Montserrat", "", "INRIA Lorraine - LORIA" ], [ "Moroz", "Guillaume", "", "INRIA Lorraine - LORIA" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Rouillier", "Fabrice", "", "INRIA\n Rocquencourt" ] ]
new_dataset
0.97914
1204.5267
K.S.Kuppusamy
K.S. Kuppusamy, Leena Mary Francis, G. Aghila
WILI - Web Interface for people with Lowvision Issues
8 Pages; 6 Figures, International Journal on Computational Sciences & Applications (IJCSA) Vo2, No.2, April 2012, ISSN: 2200-0011
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Though World Wide Web is the single largest source of information, it is ill-equipped to serve the people with vision related problems. With the prolific increase in the interest to make the web accessible to all sections of the society, solving this accessibility problem becomes mandatory. This paper presents a technique for making web pages accessible for people with low vision issues. A model for making web pages accessible, WILI (Web Interface for people with Low-vision Issues) has been proposed. The approach followed in this work is to automatically replace the existing display style of a web page with a new skin following the guidelines given by Clear Print Booklet provided by Royal National Institute of Blind. "Single Click Solution" is one of the primary advantages provided by WILI. A prototype using the WILI model is implemented and various experiments are conducted. The results of experiments conducted on WILI indicate 82% effective conversion rate.
[ { "version": "v1", "created": "Tue, 24 Apr 2012 04:11:26 GMT" } ]
2012-04-25T00:00:00
[ [ "Kuppusamy", "K. S.", "" ], [ "Francis", "Leena Mary", "" ], [ "Aghila", "G.", "" ] ]
new_dataset
0.963165
1204.5284
Heping Jiang
Heping Jiang
Non-Hamiltonian Holes in Grid Graphs
10 pages, 8 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we extend general grid graphs to the grid graphs consist of polygons tiling on a plane, named polygonal grid graphs. With a cycle basis satisfied polygons tiling, we study the cyclic structure of Hamilton graphs. A Hamilton cycle can be expressed as a symmetric difference of a subset of cycles in the basis. From the combinatorial relations of vertices in the subset of cycles in the basis, we deduce the formula of inside faces in Grinberg theorem, called Grinberg equation, and derive a kind of cycles whose existence make a polygonal grid graph non-Hamiltonian, called non-Hamiltonian holes, and then we characterize the existence condition of non-Hamiltonian holes and obtain the necessary and sufficient condition of a polygonal grid graph to be Hamiltonian. The result in this paper provides a new starting point for developing a polynomial-time algorithm for Hamilton problem in general grid graphs.
[ { "version": "v1", "created": "Tue, 24 Apr 2012 07:10:26 GMT" } ]
2012-04-25T00:00:00
[ [ "Jiang", "Heping", "" ] ]
new_dataset
0.97601
1204.5306
Anna Bernasconi
Anna Bernasconi and Valentina Ciriani and Fabrizio Luccio and Linda Pagli
Compact DSOP and partial DSOP Forms
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a Boolean function f on n variables, a Disjoint Sum-of-Products (DSOP) of f is a set of products (ANDs) of subsets of literals whose sum (OR) equals f, such that no two products cover the same minterm of f. DSOP forms are a special instance of partial DSOPs, i.e. the general case where a subset of minterms must be covered exactly once and the other minterms (typically corresponding to don't care conditions of $f$) can be covered any number of times. We discuss finding DSOPs and partial DSOP with a minimal number of products, a problem theoretically connected with various properties of Boolean functions and practically relevant in the synthesis of digital circuits. Finding an absolute minimum is hard, in fact we prove that the problem of absolute minimization of partial DSOPs is NP-hard. Therefore it is crucial to devise a polynomial time heuristic that compares favorably with the known minimization tools. To this end we develop a further piece of theory starting from the definition of the weight of a product p as a functions of the number of fragments induced on other cubes by the selection of p, and show how product weights can be exploited for building a class of minimization heuristics for DSOP and partial DSOP synthesis. A set of experiments conducted on major benchmark functions show that our method, with a family of variants, always generates better results than the ones of previous heuristics, including the method based on a BDD representation of f.
[ { "version": "v1", "created": "Tue, 24 Apr 2012 08:48:34 GMT" } ]
2012-04-25T00:00:00
[ [ "Bernasconi", "Anna", "" ], [ "Ciriani", "Valentina", "" ], [ "Luccio", "Fabrizio", "" ], [ "Pagli", "Linda", "" ] ]
new_dataset
0.991125
1204.5407
Pradeep Singla
Pradeep Singla, Naveen Kr. Malik
Reversible Programmable Logic Array (RPLA) using Feynman & MUX Gates for Low Power Industrial Applications
9 Pages, 9 Figures
Pradeep Singla and Naveen Kr. Malik. Article: Reversible Programmable Logic Array (RPLA) using Feynman & MUX Gates for Low Power Industrial Applications. Proceedinggs of ICIAICT-2012,pp 411-419, March 2012
null
null
cs.AR
http://creativecommons.org/licenses/by/3.0/
This paper present the research work directed towards the design of reversible programmable logic array using very high speed integrated circuit hardware description language (VHDL). Reversible logic circuits have significant importance in bioinformatics, optical information processing, CMOS design etc. In this paper the authors propose the design of new RPLA using Feynman & MUX gate.VHDL based codes of reversible gates with simulating results are shown .This proposed RPLA may be further used to design any reversible logic function or Boolean function (Adder, subtractor etc.) which dissipate very low or ideally no heat.
[ { "version": "v1", "created": "Tue, 24 Apr 2012 15:28:25 GMT" } ]
2012-04-25T00:00:00
[ [ "Singla", "Pradeep", "" ], [ "Malik", "Naveen Kr.", "" ] ]
new_dataset
0.988239
1106.1933
Puduru Reddy V
Dario Bauso, Puduru Viswanadha Reddy and Tamer Basar
Lyapunov stochastic stability and control of robust dynamic coalitional games with transferable utilities
null
null
null
null
cs.GT cs.LG cs.SY math.OC
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper considers a dynamic game with transferable utilities (TU), where the characteristic function is a continuous-time bounded mean ergodic process. A central planner interacts continuously over time with the players by choosing the instantaneous allocations subject to budget constraints. Before the game starts, the central planner knows the nature of the process (bounded mean ergodic), the bounded set from which the coalitions' values are sampled, and the long run average coalitions' values. On the other hand, he has no knowledge of the underlying probability function generating the coalitions' values. Our goal is to find allocation rules that use a measure of the extra reward that a coalition has received up to the current time by re-distributing the budget among the players. The objective is two-fold: i) guaranteeing convergence of the average allocations to the core (or a specific point in the core) of the average game, ii) driving the coalitions' excesses to an a priori given cone. The resulting allocation rules are robust as they guarantee the aforementioned convergence properties despite the uncertain and time-varying nature of the coaltions' values. We highlight three main contributions. First, we design an allocation rule based on full observation of the extra reward so that the average allocation approaches a specific point in the core of the average game, while the coalitions' excesses converge to an a priori given direction. Second, we design a new allocation rule based on partial observation on the extra reward so that the average allocation converges to the core of the average game, while the coalitions' excesses converge to an a priori given cone. And third, we establish connections to approachability theory and attainability theory.
[ { "version": "v1", "created": "Thu, 9 Jun 2011 23:55:58 GMT" }, { "version": "v2", "created": "Mon, 23 Apr 2012 18:19:52 GMT" } ]
2012-04-24T00:00:00
[ [ "Bauso", "Dario", "" ], [ "Reddy", "Puduru Viswanadha", "" ], [ "Basar", "Tamer", "" ] ]
new_dataset
0.991108
1110.1687
Chi-Yao Hong
Ankit Singla, Chi-Yao Hong, Lucian Popa, P. Brighten Godfrey
Jellyfish: Networking Data Centers Randomly
14 pages, 12 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Industry experience indicates that the ability to incrementally expand data centers is essential. However, existing high-bandwidth network designs have rigid structure that interferes with incremental expansion. We present Jellyfish, a high-capacity network interconnect, which, by adopting a random graph topology, yields itself naturally to incremental expansion. Somewhat surprisingly, Jellyfish is more cost-efficient than a fat-tree: A Jellyfish interconnect built using the same equipment as a fat-tree, supports as many as 25% more servers at full capacity at the scale of a few thousand nodes, and this advantage improves with scale. Jellyfish also allows great flexibility in building networks with different degrees of oversubscription. However, Jellyfish's unstructured design brings new challenges in routing, physical layout, and wiring. We describe and evaluate approaches that resolve these challenges effectively, indicating that Jellyfish could be deployed in today's data centers.
[ { "version": "v1", "created": "Sat, 8 Oct 2011 01:24:57 GMT" }, { "version": "v2", "created": "Wed, 12 Oct 2011 15:05:52 GMT" }, { "version": "v3", "created": "Fri, 20 Apr 2012 20:38:43 GMT" } ]
2012-04-24T00:00:00
[ [ "Singla", "Ankit", "" ], [ "Hong", "Chi-Yao", "" ], [ "Popa", "Lucian", "" ], [ "Godfrey", "P. Brighten", "" ] ]
new_dataset
0.995363
1204.4951
Chathuranga Widanapathirana
C.H. Widanapathirana, Bok-Min Goi, Sim Moh Lim
MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks
Innovative Technologies in Intelligent Systems and Industrial Applications(CITISIA) 2009
null
10.1109/CITISIA.2009.5224195
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community Wireless Mesh Networks (WMN) is a paradigm in wireless communication of 21st centuary as means of providing high speed braodband access. Un-cooperative nodes, both selfish and malicious proves to be a significant threat in Community WMN that require a solution independent of routing protocols being used. We propose to implement Modified PIFA (MPIFA), an Improved version of Protocol Independent Fairness Algorithm (PIFA) proposed by Younghwan Yoo, Sanghyun and P. Agrawal [6] with ability to cater specific requirements in Community WMN. MPIFA has malicious nodes detection rate improvement of 50% when nodes demonstrate low probabilistic malicious behavior of 10% to circumvent the security measures in place. Improvements were also made to reduce false malicious node detections to 4% when node-to-node link failures occur in Community WMN.
[ { "version": "v1", "created": "Mon, 23 Apr 2012 00:02:11 GMT" } ]
2012-04-24T00:00:00
[ [ "Widanapathirana", "C. H.", "" ], [ "Goi", "Bok-Min", "" ], [ "Lim", "Sim Moh", "" ] ]
new_dataset
0.99181
1105.3671
Michal Kryczka
Michal Kryczka, Ruben Cuevas, Roberto Gonzalez, Angel Cuevas, Arturo Azcorra
TorrentGuard: stopping scam and malware distribution in the BitTorrent ecosystem
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that fake content represents an important portion (35%) of those files shared in BitTorrent and just a few tens of users are responsible for 90% of this content. Furthermore, more than 99% of the analysed fake files are linked to either malware or scam websites. This creates a serious threat for the BitTorrent ecosystem. To address this issue, we present a new detection tool named TorrentGuard for the early detection of fake content. Based on our evaluation this tool may prevent the download of more than 35 millions of fake files per year. This could help to reduce the number of computer infections and scams suffered by BitTorrent users. TorrentGuard is already available and it can be accessed through both a webpage or a Vuze plugin.
[ { "version": "v1", "created": "Wed, 18 May 2011 15:56:24 GMT" }, { "version": "v2", "created": "Thu, 22 Sep 2011 11:18:11 GMT" }, { "version": "v3", "created": "Thu, 19 Apr 2012 21:28:21 GMT" } ]
2012-04-23T00:00:00
[ [ "Kryczka", "Michal", "" ], [ "Cuevas", "Ruben", "" ], [ "Gonzalez", "Roberto", "" ], [ "Cuevas", "Angel", "" ], [ "Azcorra", "Arturo", "" ] ]
new_dataset
0.997886
1204.4476
Rizwan Chaudhry
Rizwan Chaudhry and Gregory Hager and Rene Vidal
Dynamic Template Tracking and Recognition
null
null
null
null
cs.CV cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the problem of tracking non-rigid objects whose local appearance and motion changes as a function of time. This class of objects includes dynamic textures such as steam, fire, smoke, water, etc., as well as articulated objects such as humans performing various actions. We model the temporal evolution of the object's appearance/motion using a Linear Dynamical System (LDS). We learn such models from sample videos and use them as dynamic templates for tracking objects in novel videos. We pose the problem of tracking a dynamic non-rigid object in the current frame as a maximum a-posteriori estimate of the location of the object and the latent state of the dynamical system, given the current image features and the best estimate of the state in the previous frame. The advantage of our approach is that we can specify a-priori the type of texture to be tracked in the scene by using previously trained models for the dynamics of these textures. Our framework naturally generalizes common tracking methods such as SSD and kernel-based tracking from static templates to dynamic templates. We test our algorithm on synthetic as well as real examples of dynamic textures and show that our simple dynamics-based trackers perform at par if not better than the state-of-the-art. Since our approach is general and applicable to any image feature, we also apply it to the problem of human action tracking and build action-specific optical flow trackers that perform better than the state-of-the-art when tracking a human performing a particular action. Finally, since our approach is generative, we can use a-priori trained trackers for different texture or action classes to simultaneously track and recognize the texture or action in the video.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 21:17:08 GMT" } ]
2012-04-23T00:00:00
[ [ "Chaudhry", "Rizwan", "" ], [ "Hager", "Gregory", "" ], [ "Vidal", "Rene", "" ] ]
new_dataset
0.96095
1204.4301
Maulahikmah Galinium
Bunga Sugiarto, Danny Laidi, Arra'di Nur Rizal, Maulahikmah Galinium, Pradana Atmadiputra, Melvin Rubianto, Husni Fahmi, Tri Sampurno, Marsudi Kisworo
Design and Implementation of the Connectionless Network Protocol (CLNP) as Loadable Kernel Modules in Linux Kernel 2.6
7 pages conference paper. Published in Proceedings of MoMM2007 & iiWAS2007 Workshops
2007, Frontiers in Mobile and Web Computing: Proceedings of MoMM2007 & iiWAS2007 Workshops, pp. 239-245, published by \"Osterreichische Computer Gesellschaft Komitee f\"ur \"Offentlichkeitsarbeit
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an implementation of CLNP ground-to-ground packet processing for ATN in Linux kernel version 2.6. We present the big picture of CLNP packet processing, the details of input, routing, and output processing functions, and the implementation of each function based on ISO 8473-1. The functions implemented in this work are PDU header decomposition, header format analysis, header error detection, error reporting, reassembly, source routing, congestion notification, forwarding, composition, segmentation, and transmit to device functions. Each function is initially implemented and tested as a separated loadable kernel module. These modules are successfully loaded into Linux kernel 2.6.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 10:05:17 GMT" } ]
2012-04-20T00:00:00
[ [ "Sugiarto", "Bunga", "" ], [ "Laidi", "Danny", "" ], [ "Rizal", "Arra'di Nur", "" ], [ "Galinium", "Maulahikmah", "" ], [ "Atmadiputra", "Pradana", "" ], [ "Rubianto", "Melvin", "" ], [ "Fahmi", "Husni", "" ], [ "Sampurno", "Tri", "" ], [ "Kisworo", "Marsudi", "" ] ]
new_dataset
0.991308
1204.4307
Andino Maseleno
Andino Maseleno, Md. Mahmud Hasan
Avian Influenza (H5N1) Warning System using Dempster-Shafer Theory and Web Mapping
International Seminar Indonesian Students in ASEAN "Green Technology, Social Work and Public Health for the Development of Indonesia", 28 - 29 October 2011, Bangkok, Thailand
null
null
null
cs.AI math.PR
http://creativecommons.org/licenses/by/3.0/
Based on Cumulative Number of Confirmed Human Cases of Avian Influenza (H5N1) Reported to World Health Organization (WHO) in the 2011 from 15 countries, Indonesia has the largest number death because Avian Influenza which 146 deaths. In this research, the researcher built a Web Mapping and Dempster-Shafer theory as early warning system of avian influenza. Early warning is the provision of timely and effective information, through identified institutions, that allows individuals exposed to a hazard to take action to avoid or reduce their risk and prepare for effective response. In this paper as example we use five symptoms as major symptoms which include depression, combs, wattle, bluish face region, swollen face region, narrowness of eyes, and balance disorders. Research location is in the Lampung Province, South Sumatera. The researcher reason to choose Lampung Province in South Sumatera on the basis that has a high poultry population. Geographically, Lampung province is located at 103040' to 105050' East Longitude and 6045' - 3045' South latitude, confined with: South Sumatera and Bengkulu on North Side, Sunda Strait on the Side, Java Sea on the East Side, Indonesia Ocean on the West Side. Our approach uses Dempster Shafer theory to combine beliefs in certain hypotheses under conditions of uncertainty and ignorance, and allows quantitative measurement of the belief and plausibility in our identification result. Web Mapping is also used for displaying maps on a screen to visualize the result of the identification process. The result reveal that avian influenza warning system has successfully identified the existence of avian influenza and the maps can be displayed as the visualization.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 10:55:14 GMT" } ]
2012-04-20T00:00:00
[ [ "Maseleno", "Andino", "" ], [ "Hasan", "Md. Mahmud", "" ] ]
new_dataset
0.996925
1204.4311
Andino Maseleno
Andino Maseleno, Md. Mahmud Hasan
Avian Influenza (H5N1) Expert System using Dempster-Shafer Theory
International Conference on Informatics for Development 2011, 26 November 2011, Yogyakarta, Indonesia
null
null
null
cs.AI math.PR
http://creativecommons.org/licenses/by/3.0/
Based on Cumulative Number of Confirmed Human Cases of Avian Influenza (H5N1) Reported to World Health Organization (WHO) in the 2011 from 15 countries, Indonesia has the largest number death because Avian Influenza which 146 deaths. In this research, the researcher built an Avian Influenza (H5N1) Expert System for identifying avian influenza disease and displaying the result of identification process. In this paper, we describe five symptoms as major symptoms which include depression, combs, wattle, bluish face region, swollen face region, narrowness of eyes, and balance disorders. We use chicken as research object. Research location is in the Lampung Province, South Sumatera. The researcher reason to choose Lampung Province in South Sumatera on the basis that has a high poultry population. Dempster-Shafer theory to quantify the degree of belief as inference engine in expert system, our approach uses Dempster-Shafer theory to combine beliefs under conditions of uncertainty and ignorance, and allows quantitative measurement of the belief and plausibility in our identification result. The result reveal that Avian Influenza (H5N1) Expert System has successfully identified the existence of avian influenza and displaying the result of identification process.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 11:12:43 GMT" } ]
2012-04-20T00:00:00
[ [ "Maseleno", "Andino", "" ], [ "Hasan", "Md. Mahmud", "" ] ]
new_dataset
0.985821
1204.4366
Michael Robinson
Michael Robinson
Multipath-dominant, pulsed doppler analysis of rotating blades
9 pages, 16 figures
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel angular fingerprinting algorithm for detecting changes in the direction of rotation of a target with a monostatic, stationary sonar platform. Unlike other approaches, we assume that the target's centroid is stationary, and exploit doppler multipath signals to resolve the otherwise unavoidable ambiguities that arise. Since the algorithm is based on an underlying differential topological theory, it is highly robust to distortions in the collected data. We demonstrate performance of this algorithm experimentally, by exhibiting a pulsed doppler sonar collection system that runs on a smartphone. The performance of this system is sufficiently good to both detect changes in target rotation direction using angular fingerprints, and also to form high-resolution inverse synthetic aperature images of the target.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 15:02:30 GMT" } ]
2012-04-20T00:00:00
[ [ "Robinson", "Michael", "" ] ]
new_dataset
0.957596
1204.4428
Marco Vieira
Marco Vieira and Ilir Gashi
EDCC 2012 - Fast Abstracts & Student Forum Proceedings
Ninth European Dependable Computing Conference - EDCC 2012, Sibiu, Romania, May 8-11, 2012
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast Abstracts at EDCC 2012 are short presentations, aiming to serve as a rapid and flexible mechanism to report on current work that may or may not be complete, introduce new ideas to the community, and state positions on controversial issues or open problems. This way, fast abstracts provide an opportunity to introduce new work, or present radical opinions, and receive early feedback from the community. Contributions are welcome from both academia and industry. The goal of the Student Forum is to encourage students to attend EDCC 2012 and present their work, exchange ideas with researchers and practitioners, and get early feedback on their research efforts. All papers were peer-reviewed by at least three program committee members, and the authors were provided with detailed comments on their work. In the end we had one accepted paper for the Student forum.
[ { "version": "v1", "created": "Thu, 19 Apr 2012 18:27:58 GMT" } ]
2012-04-20T00:00:00
[ [ "Vieira", "Marco", "" ], [ "Gashi", "Ilir", "" ] ]
new_dataset
0.999504
1202.3549
Pierre Aboulker
Pierre Aboulker
Excluding 4-wheels
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A 4-wheel is a graph formed by a cycle C and a vertex not in C that has at least four neighbors in C. We prove that a graph G that does not contain a 4-wheel as a subgraph is 4-colorable and we describe some structural properties of such a graph.
[ { "version": "v1", "created": "Thu, 16 Feb 2012 09:58:29 GMT" }, { "version": "v2", "created": "Wed, 18 Apr 2012 09:14:52 GMT" } ]
2012-04-19T00:00:00
[ [ "Aboulker", "Pierre", "" ] ]
new_dataset
0.991889
1204.4054
Christoforos Raptopoulos Christoforos Raptopoulos
S. Nikoletseas, C. Raptopoulos, P. G. Spirakis
Maximum Cliques in Graphs with Small Intersection Number and Random Intersection Graphs
null
null
null
null
cs.DM math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we relate the problem of finding a maximum clique to the intersection number of the input graph (i.e. the minimum number of cliques needed to edge cover the graph). In particular, we consider the maximum clique problem for graphs with small intersection number and random intersection graphs (a model in which each one of $m$ labels is chosen independently with probability $p$ by each one of $n$ vertices, and there are edges between any vertices with overlaps in the labels chosen). We first present a simple algorithm which, on input $G$ finds a maximum clique in $O(2^{2^m + O(m)} + n^2 \min\{2^m, n\})$ time steps, where $m$ is an upper bound on the intersection number and $n$ is the number of vertices. Consequently, when $m \leq \ln{\ln{n}}$ the running time of this algorithm is polynomial. We then consider random instances of the random intersection graphs model as input graphs. As our main contribution, we prove that, when the number of labels is not too large ($m=n^{\alpha}, 0< \alpha <1$), we can use the label choices of the vertices to find a maximum clique in polynomial time whp. The proof of correctness for this algorithm relies on our Single Label Clique Theorem, which roughly states that whp a "large enough" clique cannot be formed by more than one label. This theorem generalizes and strengthens other related results in the state of the art, but also broadens the range of values considered. As an important consequence of our Single Label Clique Theorem, we prove that the problem of inferring the complete information of label choices for each vertex from the resulting random intersection graph (i.e. the \emph{label representation of the graph}) is \emph{solvable} whp. Finding efficient algorithms for constructing such a label representation is left as an interesting open problem for future research.
[ { "version": "v1", "created": "Wed, 18 Apr 2012 11:45:17 GMT" } ]
2012-04-19T00:00:00
[ [ "Nikoletseas", "S.", "" ], [ "Raptopoulos", "C.", "" ], [ "Spirakis", "P. G.", "" ] ]
new_dataset
0.992847
0903.1147
Toby Walsh
Yasuhiko Takenaga and Toby Walsh
Tetravex is NP-complete
null
Inf. Process. Lett. 99(5): 171-174 (2006)
null
null
cs.CC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tetravex is a widely played one person computer game in which you are given $n^2$ unit tiles, each edge of which is labelled with a number. The objective is to place each tile within a $n$ by $n$ square such that all neighbouring edges are labelled with an identical number. Unfortunately, playing Tetravex is computationally hard. More precisely, we prove that deciding if there is a tiling of the Tetravex board is NP-complete. Deciding where to place the tiles is therefore NP-hard. This may help to explain why Tetravex is a good puzzle. This result compliments a number of similar results for one person games involving tiling. For example, NP-completeness results have been shown for: the offline version of Tetris, KPlumber (which involves rotating tiles containing drawings of pipes to make a connected network), and shortest sliding puzzle problems. It raises a number of open questions. For example, is the infinite version Turing-complete? How do we generate Tetravex problems which are truly puzzling as random NP-complete problems are often surprising easy to solve? Can we observe phase transition behaviour? What about the complexity of the problem when it is guaranteed to have an unique solution? How do we generate puzzles with unique solutions?
[ { "version": "v1", "created": "Fri, 6 Mar 2009 04:00:47 GMT" } ]
2012-04-18T00:00:00
[ [ "Takenaga", "Yasuhiko", "" ], [ "Walsh", "Toby", "" ] ]
new_dataset
0.998792
1111.3879
Siham Bekkai
Siham Bekkai
Minimum degree, independence number and pseudo [2,b]-factors in graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pseudo [2,b]-factor of a graph G is a spanning subgraph in which each component C on at least three vertices is a [2,b]-graph. The main contibution of this paper, is to give an upper bound to the number of components that are edges or vertices in a pseudo [2,b]-factor of a graph G. This bound is sharp.
[ { "version": "v1", "created": "Wed, 16 Nov 2011 17:29:01 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2011 15:56:23 GMT" }, { "version": "v3", "created": "Tue, 17 Apr 2012 12:53:48 GMT" } ]
2012-04-18T00:00:00
[ [ "Bekkai", "Siham", "" ] ]
new_dataset
0.999083
1204.3685
Muhammad Anshari Mr
Mohammad Nabil Almunawar and Muhammad Anshari
Improving Customer Service in Healthcare with CRM 2.0
Global Science And Technology Forum (GSTF) Business Review, Volume 1 No. 2, October 2011
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Healthcare industry is undergoing a paradigm shift from healthcare institution-centred care to a citizen-centred care that emphasises on continuity of care from prevention to rehabilitation. The recent development of Information and Communication Technology (ICT), especially the Internet and its related technologies has become the main driver of the paradigm shift. Managing relationship with customers (patients) is becoming more important in the new paradigm. The paper discusses Customer Relationship Management (CRM) in healthcare and proposes a Social CRM or CRM 2.0 model to take advantage of the multi-way relationships created by Web 2.0 and its widespread use in improving customer services for mutual benefits between healthcare providers and their customers.
[ { "version": "v1", "created": "Tue, 17 Apr 2012 01:58:27 GMT" } ]
2012-04-18T00:00:00
[ [ "Almunawar", "Mohammad Nabil", "" ], [ "Anshari", "Muhammad", "" ] ]
new_dataset
0.982442
1204.3689
Muhammad Anshari Mr
Muhammad Anshari and Mohammad Nabil Almunawar
Evaluating CRM Implementation in Healthcare Organization
Proceedings of 2011 International Conference on Economics and Business Information (ICEBI 2011)
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, many healthcare organizations are adopting CRM as a strategy, which involves using technology to organize, automate, and coordinate business processes, in managing interactions with their patients. CRM with the Web technology provides healthcare providers the ability to broaden their services beyond usual practices, and thus offers suitable environment using latest technology to achieve superb patient care. This paper discusses and demonstrates how a new approach in CRM based on Web 2.0 will help the healthcare providers improving their customer support, avoiding conflict, and promoting better health to patient. With this new approach patients will benefit from the customized personal service with full information access to perform self managed their own health. It also helps healthcare providers retaining the right customer. A conceptual framework of the new approach will be discussed.
[ { "version": "v1", "created": "Tue, 17 Apr 2012 02:34:30 GMT" } ]
2012-04-18T00:00:00
[ [ "Anshari", "Muhammad", "" ], [ "Almunawar", "Mohammad Nabil", "" ] ]
new_dataset
0.991981
1204.3691
Muhammad Anshari Mr
Mohammad Nabil Almunawar, Zaw Wint, Patrick Kim Cheng Low, Muhammad Anshari
E-Health Initiative and Customer's Expectation: Case Brunei
CiiT International Journal of Automation and Autonomous System, 2012
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is to determine the dimension of e-health services in Brunei Darussalam (Brunei) from customers' perspective. It is to identify, understand, analyze and evaluate public's expectation on e-health in Brunei. A questionnaire was designed to gather quantitative and qualitative data to survey patients, patient's family, and health practitioners at hospitals, clinics, or home care centers in Brunei starting from February to March, 2011. A 25-item Likert-type survey instrument was specifically developed for this study and administered to a sample of 366 patients. The data were analyzed to provide initial ideas and recommendation to policy makers on how to move forward with the e-health initiative as a mean to improve healthcare services. The survey revealed that there exists a high demand and expectation from people in Brunei to have better healthcare services accessible through an e-health system in order to improve health literacy as well as quality and efficiency of healthcare. Regardless of the limitations of the survey, the general public has responded with a great support for the capabilities of an e-health system listed from the questionnaires. The results of the survey provide a solid foundation for our on going research project to proceed further to develop a model of e-health and subsequently develop a system prototype that incorporate expectations from the people.
[ { "version": "v1", "created": "Tue, 17 Apr 2012 02:44:06 GMT" } ]
2012-04-18T00:00:00
[ [ "Almunawar", "Mohammad Nabil", "" ], [ "Wint", "Zaw", "" ], [ "Low", "Patrick Kim Cheng", "" ], [ "Anshari", "Muhammad", "" ] ]
new_dataset
0.969447
1204.3831
Kaiping Xue
Kaiping Xue, Peilin Hong, Changsha Ma
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture
21pages, 2 fingures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional password based authentication schemes are mostly considered in single server environments. They are unfitted for the multi-server environments from two aspects. On the one hand, users need to register in each server and to store large sets of data, including identities and passwords. On the other hand, servers are required to store a verification table containing user identities and passwords. Recently, On the base on Sood et al.'s protocol(2011), Li et al. proposed an improved dynamic identity based authentication and key agreement protocol for multi-server architecture(2012). Li et al. claims that the proposed scheme can make up the security weaknesses of Sood et al.'s protocol. Unfortunately, our further research shows that Li et al.'s protocol contains several drawbacks and can not resist some types of known attacks, such as replay attack, Deny-of-Service attack, internal attack, eavesdropping attack, masquerade attack, and so on. In this paper, we further propose a light dynamic pseudonym identity based authentication and key agreement protocol for multi-server architecture. In our scheme, service providing servers don't need to maintain verification tables for users. The proposed protocol provides not only the declared security features in Li et al.'s paper, but also some other security features, such as traceability and identity protection.
[ { "version": "v1", "created": "Tue, 17 Apr 2012 16:38:16 GMT" } ]
2012-04-18T00:00:00
[ [ "Xue", "Kaiping", "" ], [ "Hong", "Peilin", "" ], [ "Ma", "Changsha", "" ] ]
new_dataset
0.999528
1202.6035
Nicholas Ruozzi
Nicholas Ruozzi
The Bethe Partition Function of Log-supermodular Graphical Models
Typo, bug fixes, and improved exposition
null
null
null
cs.DM math-ph math.CO math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sudderth, Wainwright, and Willsky have conjectured that the Bethe approximation corresponding to any fixed point of the belief propagation algorithm over an attractive, pairwise binary graphical model provides a lower bound on the true partition function. In this work, we resolve this conjecture in the affirmative by demonstrating that, for any graphical model with binary variables whose potential functions (not necessarily pairwise) are all log-supermodular, the Bethe partition function always lower bounds the true partition function. The proof of this result follows from a new variant of the "four functions" theorem that may be of independent interest.
[ { "version": "v1", "created": "Mon, 27 Feb 2012 19:29:10 GMT" }, { "version": "v2", "created": "Mon, 16 Apr 2012 13:43:51 GMT" } ]
2012-04-17T00:00:00
[ [ "Ruozzi", "Nicholas", "" ] ]
new_dataset
0.997031
1204.3113
\'Alvaro Franco
Carlos Eduardo Ferreira, \'Alvaro Junio Pereira Franco
Algorithms for Junctions in Directed Acyclic Graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a pair of distinct vertices u, v in a graph G, we say that s is a junction of u, v if there are in G internally vertex disjoint directed paths from s to u and from s to v. We show how to characterize junctions in directed acyclic graphs. We also consider the two problems in the following and derive efficient algorithms to solve them. Given a directed acyclic graph G and a vertex s in G, how can we find all pairs of vertices of G such that s is a junction of them? And given a directed acyclic graph G and k pairs of vertices of G, how can we preprocess G such that all junctions of k given pairs of vertices could be listed quickly? All junctions of k pairs problem arises in an application in Anthropology and we apply our algorithm to find such junctions on kinship networks of some brazilian indian ethnic groups.
[ { "version": "v1", "created": "Fri, 13 Apr 2012 21:43:31 GMT" } ]
2012-04-17T00:00:00
[ [ "Ferreira", "Carlos Eduardo", "" ], [ "Franco", "Álvaro Junio Pereira", "" ] ]
new_dataset
0.999741
1204.3410
Famantanantsoa Randimbivololona
Famantanantsoa Randimbivololona, Abderrahmane Brahmi, Philippe Le Meur
Airborne software tests on a fully virtual platform
EDCC 2012
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the early deployment of a fully virtual platform to perform the tests of certified airborne software. This is an alternative to the current approach based on the use of dedicated hardware platforms.
[ { "version": "v1", "created": "Mon, 16 Apr 2012 09:02:33 GMT" } ]
2012-04-17T00:00:00
[ [ "Randimbivololona", "Famantanantsoa", "" ], [ "Brahmi", "Abderrahmane", "" ], [ "Meur", "Philippe Le", "" ] ]
new_dataset
0.982819
1204.3581
Giuseppe Ottaviano
Roberto Grossi, Giuseppe Ottaviano
The Wavelet Trie: Maintaining an Indexed Sequence of Strings in Compressed Space
null
null
null
null
cs.DS cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An indexed sequence of strings is a data structure for storing a string sequence that supports random access, searching, range counting and analytics operations, both for exact matches and prefix search. String sequences lie at the core of column-oriented databases, log processing, and other storage and query tasks. In these applications each string can appear several times and the order of the strings in the sequence is relevant. The prefix structure of the strings is relevant as well: common prefixes are sought in strings to extract interesting features from the sequence. Moreover, space-efficiency is highly desirable as it translates directly into higher performance, since more data can fit in fast memory. We introduce and study the problem of compressed indexed sequence of strings, representing indexed sequences of strings in nearly-optimal compressed space, both in the static and dynamic settings, while preserving provably good performance for the supported operations. We present a new data structure for this problem, the Wavelet Trie, which combines the classical Patricia Trie with the Wavelet Tree, a succinct data structure for storing a compressed sequence. The resulting Wavelet Trie smoothly adapts to a sequence of strings that changes over time. It improves on the state-of-the-art compressed data structures by supporting a dynamic alphabet (i.e. the set of distinct strings) and prefix queries, both crucial requirements in the aforementioned applications, and on traditional indexes by reducing space occupancy to close to the entropy of the sequence.
[ { "version": "v1", "created": "Mon, 16 Apr 2012 17:50:35 GMT" } ]
2012-04-17T00:00:00
[ [ "Grossi", "Roberto", "" ], [ "Ottaviano", "Giuseppe", "" ] ]
new_dataset
0.999678
1204.2837
Fernand Meyer
Fernand Meyer
Watersheds, waterfalls, on edge or node weighted graphs
null
null
null
null
cs.CV cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algebraic approach to the watershed adapted to edge or node weighted graphs. Starting with the flooding adjunction, we introduce the flooding graphs, for which node and edge weights may be deduced one from the other. Each node weighted or edge weighted graph may be transformed in a flooding graph, showing that there is no superiority in using one or the other, both being equivalent. We then introduce pruning operators extract subgraphs of increasing steepness. For an increasing steepness, the number of never ascending paths becomes smaller and smaller. This reduces the watershed zone, where catchment basins overlap. A last pruning operator called scissor associates to each node outside the regional minima one and only one edge. The catchment basins of this new graph do not overlap and form a watershed partition. Again, with an increasing steepness, the number of distinct watershed partitions contained in a graph becomes smaller and smaller. Ultimately, for natural image, an infinite steepness leads to a unique solution, as it is not likely that two absolutely identical non ascending paths of infinite steepness connect a node with two distinct minima. It happens that non ascending paths of a given steepness are the geodesics of lexicographic distance functions of a given depth. This permits to extract the watershed partitions as skeletons by zone of influence of the minima for such lexicographic distances. The waterfall hierarchy is obtained by a sequence of operations. The first constructs the minimum spanning forest which spans an initial watershed partition. The contraction of the trees into one node produces a reduced graph which may be submitted to the same treatment. The process is iterated until only one region remains. The union of the edges of all forests produced constitutes a minimum spanning tree of the initial graph.
[ { "version": "v1", "created": "Thu, 12 Apr 2012 20:18:53 GMT" } ]
2012-04-16T00:00:00
[ [ "Meyer", "Fernand", "" ] ]
new_dataset
0.993259
1204.2880
Subhabrata Mukherjee
Subhabrata Mukherjee, Amrita Saha, Mrinal K. Naskar and Amitava Mukherjee
Multisource Adaptive Data Distribution and Routing in Wireless Sensor Networks
Accepted in The Second International Conference on Networks & Communications (NetCoM - 2.0), 2010, Bangalore, India
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
The wireless sensor network is a collection of energy-constrained nodes. Their objective is to sense, collect and process information for some ad-hoc purpose. Typically the nodes are deployed in geographically inaccessible regions. Thus the most challenging task is to design a network with minimal power consumption. As the nodes have to collect and process data very fast, minimizing data delivery time is another objective. In addition to this, when multiple sources transmit data simultaneously, the network load gradually increases and it may lead to congestion. In this paper we have proposed an adaptive framework in which multiple sources transmit data simultaneously with minimal end-to-end data delivery time and minimal energy consumption besides ensuring that congestion remains at an optimum low so that minimal number of data packets are dropped. This paper presents an adaptive framework to achieve the above-mentioned objectives. This framework has been used over Mac 802.11 and extensive simulations have been carried out in NS2 to prove the effectiveness of the framework over traditional Mac as well as few other existing protocols.
[ { "version": "v1", "created": "Fri, 13 Apr 2012 05:00:20 GMT" } ]
2012-04-16T00:00:00
[ [ "Mukherjee", "Subhabrata", "" ], [ "Saha", "Amrita", "" ], [ "Naskar", "Mrinal K.", "" ], [ "Mukherjee", "Amitava", "" ] ]
new_dataset
0.998006
1109.3428
Alberto Pepe
Alberto Pepe, Spencer Wolff, Karen Van Godtsenhoven
One, None and One Hundred Thousand Profiles: Re-imagining the Pirandellian Identity Dilemma in the Era of Online Social Networks
An abridged version of this paper will be presented/performed under the title "Identity dilemmas on Facebook" at the Symposium on the Dynamics of the Internet and Society "A Decade in Internet Time" to be held Wednesday 21 - Saturday 24 September 2011 at the Oxford Internet Institute, University of Oxford, UK
One, None, One Hundred Thousand Profiles. Alberto Pepe, Spencer Wolff, Karen Van Godtsenhoven. First Monday. Volume 17, Number 4 - 2 April 2012
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Uno, Nessuno, Centomila ("One, No One and One Hundred Thousand") is a classic novel by Italian playwright Luigi Pirandello. Published in 1925, it recounts the tragedy of Vitangelo Moscarda, a man who struggles to reclaim a coherent and unitary identity for himself in the face of an inherently social and multi-faceted world. What would Moscarda identity tragedy look like today? In this article we transplant Moscarda's identity play from its offline setting to the contemporary arena of social media and online social networks. With reference to established theories on identity construction, performance, and self-presentation, we re-imagine how Moscarda would go about defending the integrity of his selfhood in the face of the discountenancing influences of the online world.
[ { "version": "v1", "created": "Thu, 15 Sep 2011 19:01:31 GMT" } ]
2012-04-13T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Wolff", "Spencer", "" ], [ "Van Godtsenhoven", "Karen", "" ] ]
new_dataset
0.993002
1204.2692
Xiaochen Xia
Xiaochen Xia, Kui Xu, Youyun Xu
Asynchronous Physical-layer Network Coding Scheme for Two-way OFDM Relay
6 pages, 7 figures, Submitted to GLOBECOM 2012
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
In two-way OFDM relay, carrier frequency offsets (CFOs) between relay and terminal nodes introduce severe intercarrier interference (ICI) which degrades the performance of traditional physical-layer network coding (PLNC). Moreover, traditional algorithm to compute the posteriori probability in the presence of ICI would incur prohibitive computational complexity at the relay node. In this paper, we proposed a two-step asynchronous PLNC scheme at the relay to mitigate the effect of CFOs. In the first step, we intend to reconstruct the ICI component, in which space-alternating generalized expectationmaximization (SAGE) algorithm is used to jointly estimate the needed parameters. In the second step, a channel-decoding and network-coding scheme is proposed to transform the received signal into the XOR of two terminals' transmitted information using the reconstructed ICI. It is shown that the proposed scheme greatly mitigates the impact of CFOs with a relatively lower computational complexity in two-way OFDM relay.
[ { "version": "v1", "created": "Thu, 12 Apr 2012 11:48:30 GMT" } ]
2012-04-13T00:00:00
[ [ "Xia", "Xiaochen", "" ], [ "Xu", "Kui", "" ], [ "Xu", "Youyun", "" ] ]
new_dataset
0.994181
1110.0864
Kazutaka Kurihara
Kazutaka Kurihara
CinemaGazer: a System for Watching Video at Very High Speed
8 pages, 9 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a technology that enables the watching of videos at very high speed. Subtitles are widely used in DVD movies, and provide useful supplemental information for understanding video contents. We propose a "two-level fast-forwarding" scheme for videos with subtitles, which controls the speed of playback depending on the context: very fast during segments without language, such as subtitles or speech, and "understandably fast" during segments with such language. This makes it possible to watch videos at a higher speed than usual while preserving the entertainment values of the contents. We also propose "centering" and "fading" features for the display of subtitles to reduce fatigue when watching high-speed video. We implement a versatile video encoder that enables movie viewing with two-level fast-forwarding on any mobile device by specifying the speed of playback, the reading rate, or the overall viewing time. The effectiveness of our proposed method was demonstrated in an evaluation study.
[ { "version": "v1", "created": "Tue, 4 Oct 2011 22:42:03 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2012 00:10:13 GMT" } ]
2012-04-12T00:00:00
[ [ "Kurihara", "Kazutaka", "" ] ]
new_dataset
0.996934
1204.2294
Wan Mohd Yaakob Wan Bejuri B.Sc. Dip
Wan Mohd Yaakob Wan Bejuri, Mohd Murtadha Mohamad, Maimunah Sapri and Mohd Adly Rosly
Ubiquitous WLAN/Camera Positioning using Inverse Intensity Chromaticity Space-based Feature Detection and Matching: A Preliminary Result
International Conference on Man-Machine Systems 2012 (ICOMMS 2012)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper present our new intensity chromaticity space-based feature detection and matching algorithm. This approach utilizes hybridization of wireless local area network and camera internal sensor which to receive signal strength from a access point and the same time retrieve interest point information from hallways. This information is combined by model fitting approach in order to find the absolute of user target position. No conventional searching algorithm is required, thus it is expected reducing the computational complexity. Finally we present pre-experimental results to illustrate the performance of the localization system for an indoor environment set-up.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 22:05:34 GMT" } ]
2012-04-12T00:00:00
[ [ "Bejuri", "Wan Mohd Yaakob Wan", "" ], [ "Mohamad", "Mohd Murtadha", "" ], [ "Sapri", "Maimunah", "" ], [ "Rosly", "Mohd Adly", "" ] ]
new_dataset
0.979274
1204.2516
Mostafa Zolfaghari-Nejad
Ali Sadr, Mostafa Zolfaghari-Nejad
Physical Unclonable Function (PUF) Based Random Number Generator
7 pages, 7 figures
Advanced Computing: An International Journal (ACIJ), Vol.3, No.2, March 2012, 139-145
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physical Unclonable Functions (PUFs) are widely used to generate random Numbers. In this paper we propose a new architecture in which an Arbiter Based PUF has been employed as a nonlinear function in Nonlinear Feedback Shift Register (NFSR) to generate true random numbers. The rate of producing the output bit streams is 10 million bits per second. The proposed RNG is able to pass all NIST tests and the entropy of the output stream is 7.999837 bits per byte. The proposed circuit has very low resource usage of 193 Slices that makes it suitable for lightweight applications.
[ { "version": "v1", "created": "Wed, 11 Apr 2012 18:29:48 GMT" } ]
2012-04-12T00:00:00
[ [ "Sadr", "Ali", "" ], [ "Zolfaghari-Nejad", "Mostafa", "" ] ]
new_dataset
0.98822
1204.2536
Hans P. Reiser
Benedikt H\"ofling, Hans P. Reiser
SecureSMART: A Security Architecture for BFT Replication Libraries
2 pages, EDCC 2012 fast abstract
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several research projects have shown that Byzantine fault tolerance (BFT) is practical today in terms of performance. Deficiencies in other aspects might still be an obstacle to a more wide-spread deployment in real-world applications. One of these aspects is an over-all security architecture beyond the low-level protocol. This paper proposes the security architecture SecureSMART, which provides dynamic key distribution, internal and external integrity and confidentiality measures, as well as mechanisms for availability and access control. For this purpose, it implements security mechanism among clients, nodes and an external trust center.
[ { "version": "v1", "created": "Wed, 11 Apr 2012 19:54:30 GMT" } ]
2012-04-12T00:00:00
[ [ "Höfling", "Benedikt", "" ], [ "Reiser", "Hans P.", "" ] ]
new_dataset
0.997895
1204.2134
Fernand Meyer
Fernand Meyer
The steepest watershed: from graphs to images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The watershed is a powerful tool for segmenting objects whose contours appear as crest lines on a gradient image. The watershed transform associates to a topographic surface a partition into catchment basins, defined as attraction zones of a drop of water falling on the relief and following a line of steepest descent. Unfortunately, catchment basins may overlap and do not form a partition. Moreover, current watershed algorithms, being shortsighted, do not correctly estimate the steepness of the downwards trajectories and overestimate the overlapping zones of catchment basins. An arbitrary division of these zones between adjacent catchment basin results in a poor localization of the contours. We propose an algorithm without myopia, which considers the total length of a trajectory for estimating its steepness. We first consider topographic surfaces defined on node weighted graphs. The graphs are pruned in order to eliminate all downwards trajectories which are not the steepest. An iterative algorithm with simple neighborhood operations performs the pruning and constructs the catchment basins. The algorithm is then adapted to gray tone images. The graph structure itself is encoded as an image thanks to the fixed neighborhood structure of grids. A pair of adaptative erosions and dilations prune the graph and extend the catchment basins. As a result one obtains a precise detection of the catchment basins and a graph of the steepest trajectories. A last iterative algorithm allows to follow selected downwards trajectories in order to detect particular structures such as rivers or thalweg lines of the topographic surface.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 13:08:34 GMT" } ]
2012-04-11T00:00:00
[ [ "Meyer", "Fernand", "" ] ]
new_dataset
0.999108
1204.2202
Minghui Jiang
Minghui Jiang
Clique in 3-track interval graphs is APX-hard
null
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Butman, Hermelin, Lewenstein, and Rawitz proved that Clique in t-interval graphs is NP-hard for t >= 3. We strengthen this result to show that Clique in 3-track interval graphs is APX-hard.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 16:00:48 GMT" } ]
2012-04-11T00:00:00
[ [ "Jiang", "Minghui", "" ] ]
new_dataset
0.999414
1204.2218
Nolmar Melo
Nolmar Melo and Douglas F.G. Santiago and Renato Portugal
Decoder for Nonbinary CWS Quantum Codes
null
null
null
null
cs.IT math.IT quant-ph
http://creativecommons.org/licenses/publicdomain/
We present a decoder for nonbinary CWS quantum codes using the structure of union codes. The decoder runs in two steps: first we use a union of stabilizer codes to detect a sequence of errors, and second we build a new code, called union code, that allows to correct the errors.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 17:03:56 GMT" } ]
2012-04-11T00:00:00
[ [ "Melo", "Nolmar", "" ], [ "Santiago", "Douglas F. G.", "" ], [ "Portugal", "Renato", "" ] ]
new_dataset
0.998413
1204.2250
Manel Khelifi
Manel Khelifi, Assia Djabelkhir
LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks
The 31st Annual IEEE International Conference on Computer Communications: INFOCOM'2012 Student Posters, Orlando, USA
IEEE INFOCOM'2012 Student Posters
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 19:11:33 GMT" } ]
2012-04-11T00:00:00
[ [ "Khelifi", "Manel", "" ], [ "Djabelkhir", "Assia", "" ] ]
new_dataset
0.970236
1203.5960
Rajdeep Borgohain
Rajdeep Borgohain, Moirangthem Tiken Singh, Chandrakant Sakharwade and Sugata Sanyal
TSET: Token based Secure Electronic Transaction
7 pages, 3 figures, 2 tables
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.
[ { "version": "v1", "created": "Tue, 27 Mar 2012 12:57:52 GMT" }, { "version": "v2", "created": "Sun, 1 Apr 2012 18:20:41 GMT" }, { "version": "v3", "created": "Sat, 7 Apr 2012 11:44:00 GMT" } ]
2012-04-10T00:00:00
[ [ "Borgohain", "Rajdeep", "" ], [ "Singh", "Moirangthem Tiken", "" ], [ "Sakharwade", "Chandrakant", "" ], [ "Sanyal", "Sugata", "" ] ]
new_dataset
0.968543
1204.1559
Nolmar Melo
Nolmar Melo
Goppa goemetry codes via elementary methods (In Portuguese)
null
null
null
null
cs.IT math.AG math.IT
http://creativecommons.org/licenses/by/3.0/
The central objective of this dissertation was to present the Goppa Geometry Codes via elementary methods which were introduced by J.H. van Lint ,R.Pellikaan and T. Hohold about 1998. On the first part of such dissertation are presented the fundamental concepts about bodies of rational functions of an algebraic curve in the direction as to define the Goppa Codes on a classical manner. In this study we based ourselves mainly on the book ? Algebraic Function Fields and Codes? of H. Stichtenoth. The second part is initiated with an introduction about the functions weight, degree and order which are fundamental for the study of the Goppa Codes through elementary methods of linear algebra and of semigroups and such study was based on ? Algebraic Geometry Codes ? of J.H. van Lint,R.Pellikaan and T. Hohold.
[ { "version": "v1", "created": "Fri, 6 Apr 2012 20:35:19 GMT" } ]
2012-04-10T00:00:00
[ [ "Melo", "Nolmar", "" ] ]
new_dataset
0.977432
1204.1595
Negin Golrezaei
Negin Golrezaei, Andreas F. Molisch, Alexandros G. Dimakis, Giuseppe Caire
Femtocaching and Device-to-Device Collaboration: A New Architecture for Wireless Video Distribution
7 pages, 7 figures
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new architecture to handle the ongoing explosive increase in the demand for video content in wireless networks. It is based on distributed caching of the content in femto-basestations with small or non-existing backhaul capacity but with considerable storage space, called helper nodes. We also consider using the mobile terminals themselves as caching helpers, which can distribute video through device-to-device communications. This approach allows an improvement in the video throughput without deployment of any additional infrastructure. The new architecture can improve video throughput by one to two orders-of-magnitude.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 05:30:26 GMT" } ]
2012-04-10T00:00:00
[ [ "Golrezaei", "Negin", "" ], [ "Molisch", "Andreas F.", "" ], [ "Dimakis", "Alexandros G.", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.99951
1204.1614
Prasun Chowdhury
Prasun Chowdhury, Iti Saha Misra, Salil K Sanyal
Cross Layer QoS Support Architecture with Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks
17 pages, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 1, 2012. arXiv admin note: text overlap with arXiv:1012.2518 and arXiv:1110.0147 by other authors
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 1, 2012
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the PHY layer for WiMAX Broadband Wireless Access (BWA) networks. The QoS information parameter includes New Connection Blocking Probability (NCBP), Hand off Connection Dropping Probability (HCDP) and Connection Outage Probability (COP). In addition, a Signal to Interference plus Noise Ratio (SINR) based Call Admission Control (CAC) algorithm and Queue based Scheduling algorithm are integrated for the cross layer design. An analytical model using the Continuous Time Markov Chain (CTMC) is developed for performance evaluation of the algorithms under various MCS. The effect of Eb/No is observed for QoS information parameters in order to determine its optimum range. Simulation results show that the integrated CAC and packet Scheduling model maximizes the bandwidth utilization and fair allocation of the system resources for all types of MCS and guarantees the QoS to the connections.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 08:37:08 GMT" } ]
2012-04-10T00:00:00
[ [ "Chowdhury", "Prasun", "" ], [ "Misra", "Iti Saha", "" ], [ "Sanyal", "Salil K", "" ] ]
new_dataset
0.990108
1204.1651
Ali Elouafiq Mr.
Ali Elouafiq
Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms
12 pages, reference for 3G/2G telecommunications cryptography
null
null
null
cs.CR cs.NI
http://creativecommons.org/licenses/publicdomain/
Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 15:35:56 GMT" } ]
2012-04-10T00:00:00
[ [ "Elouafiq", "Ali", "" ] ]
new_dataset
0.999152
1204.1658
Anshul Verma Mr.
Anshul Verma, Dr. Anurag Srivastava
Integrated Routing Protocol for Opportunistic Networks
8 pages, 12 figures, (IJACSA) International Journal of Advanced Computer Science and Applications
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011, pp. 85-92
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and context aware routing protocols. Our results show that integrated routing protocol is able to provide better result in term of message delivery probability and message delay in both cases when context information about users is available or not.
[ { "version": "v1", "created": "Sat, 7 Apr 2012 17:10:38 GMT" } ]
2012-04-10T00:00:00
[ [ "Verma", "Anshul", "" ], [ "Srivastava", "Dr. Anurag", "" ] ]
new_dataset
0.997381
1204.1749
Andrew Adamatzky
Yukio-Pegio Gunji, Yuta Nishiyama, Andrew Adamatzky
Robust Soldier Crab Ball Gate
null
Complex Systems 20 (2011) 2
null
null
cs.ET nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Soldier crabs Mictyris guinotae exhibit pronounced swarming behaviour. The swarms of the crabs tolerant of perturbations. In computer models and laboratory experiments we demonstrate that swarms of soldier crabs can implement logical gates when placed in a geometrically constrained environment.
[ { "version": "v1", "created": "Sun, 8 Apr 2012 17:45:52 GMT" } ]
2012-04-10T00:00:00
[ [ "Gunji", "Yukio-Pegio", "" ], [ "Nishiyama", "Yuta", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999397
1204.1808
Rehan Khan
Asad Maqsood and Rehanullah Khan
Vehicular Ad-hoc Networks
International Journal of Computer Science Issues (IJCSI), Volume 9, Issue 1, No 3, January 2012
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern day's vehicles require advanced communication system on board to enable passengers benefit the most from available services. IEEE 802.11p is the new extension of IEEE 802.11 standards; especially proposed for the high vehicular environment. The WAVE documentation represents enhancements to the Media Access Control (MAC) and Physical (PHY) layer of IEEE 802.11 standards to work efficiently in high vehicular environment. In this research work, the main emphasis is on the new IEEE 802.11p enhancement of MAC and PHY layers. More specifically, the target of this research is to setup a simulation environment which will allow us to investigate the use of real time voice application, using IEEE 802.11p (WAVE) enhance setting, in a single hop and multi-hop environment where nodes are not directly connected. Also, the evaluation of transmission between moving nodes are tested by simply sending and receiving FTP file between them with varying speed of the moving nodes.
[ { "version": "v1", "created": "Mon, 9 Apr 2012 06:37:09 GMT" } ]
2012-04-10T00:00:00
[ [ "Maqsood", "Asad", "" ], [ "Khan", "Rehanullah", "" ] ]
new_dataset
0.999241
1204.1881
Jan Bergstra
Jan A. Bergstra
Four Conceptions of Instruction Sequence Faults
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of an instruction sequence fault is considered from various perspectives. Four different viewpoints on what constitutes a fault, or how to use the notion of a fault, are formulated. An integration of these views is proposed.
[ { "version": "v1", "created": "Mon, 9 Apr 2012 14:05:02 GMT" } ]
2012-04-10T00:00:00
[ [ "Bergstra", "Jan A.", "" ] ]
new_dataset
0.987009
1203.1569
Olaf Hartig
Olaf Hartig
SPARQL for a Web of Linked Data: Semantics and Computability (Extended Version)
v2: 55 pages, added Appendix D about constant reachability criteria, aligned with the final version published in ESWC 2012; v1: 52 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The World Wide Web currently evolves into a Web of Linked Data where content providers publish and link data as they have done with hypertext for the last 20 years. While the declarative query language SPARQL is the de facto for querying a-priory defined sets of data from the Web, no language exists for querying the Web of Linked Data itself. However, it seems natural to ask whether SPARQL is also suitable for such a purpose. In this paper we formally investigate the applicability of SPARQL as a query language for Linked Data on the Web. In particular, we study two query models: 1) a full-Web semantics where the scope of a query is the complete set of Linked Data on the Web and 2) a family of reachability-based semantics which restrict the scope to data that is reachable by traversing certain data links. For both models we discuss properties such as monotonicity and computability as well as the implications of querying a Web that is infinitely large due to data generating servers.
[ { "version": "v1", "created": "Wed, 7 Mar 2012 18:53:35 GMT" }, { "version": "v2", "created": "Fri, 6 Apr 2012 18:36:54 GMT" } ]
2012-04-09T00:00:00
[ [ "Hartig", "Olaf", "" ] ]
new_dataset
0.952221
1204.1417
Christophe Paul
Eun Jung Kim and Christophe Paul and Geevarghese Philip
A single-exponential FPT algorithm for the $K_4$-minor cover problem
null
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an input graph G and an integer k, the parameterized K_4-minor cover problem asks whether there is a set S of at most k vertices whose deletion results in a K_4-minor-free graph, or equivalently in a graph of treewidth at most 2. This problem is inspired by two well-studied parameterized vertex deletion problems, Vertex Cover and Feedback Vertex Set, which can also be expressed as Treewidth-t Vertex Deletion problems: t=0 for Vertex Cover and t=1 for Feedback Vertex Set. While a single-exponential FPT algorithm has been known for a long time for \textsc{Vertex Cover}, such an algorithm for Feedback Vertex Set was devised comparatively recently. While it is known to be unlikely that Treewidth-t Vertex Deletion can be solved in time c^{o(k)}.n^{O(1)}, it was open whether the K_4-minor cover problem could be solved in single-exponential FPT time, i.e. in c^k.n^{O(1)} time. This paper answers this question in the affirmative.
[ { "version": "v1", "created": "Fri, 6 Apr 2012 06:37:59 GMT" } ]
2012-04-09T00:00:00
[ [ "Kim", "Eun Jung", "" ], [ "Paul", "Christophe", "" ], [ "Philip", "Geevarghese", "" ] ]
new_dataset
0.950539
1204.1428
Tuan Tran Thai
Tuan Tran Thai (DMIA), Emmanuel Lochin (DMIA), Jerome Lacan (DMIA)
Online multipath convolutional coding for real-time transmission
Online multipath convolutional coding for real-time transmission (2012)
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of multipath multimedia streaming proposals use Forward Error Correction (FEC) approach to protect from packet losses. However, FEC does not sustain well burst of losses even when packets from a given FEC block are spread over multiple paths. In this article, we propose an online multipath convolutional coding for real-time multipath streaming based on an on-the-fly coding scheme called Tetrys. We evaluate the benefits brought out by this coding scheme inside an existing FEC multipath load splitting proposal known as Encoded Multipath Streaming (EMS). We demonstrate that Tetrys consistently outperforms FEC in both uniform and burst losses with EMS scheme. We also propose a modification of the standard EMS algorithm that greatly improves the performance in terms of packet recovery. Finally, we analyze different spreading policies of the Tetrys redundancy traffic between available paths and observe that the longer propagation delay path should be preferably used to carry repair packets.
[ { "version": "v1", "created": "Fri, 6 Apr 2012 07:59:27 GMT" } ]
2012-04-09T00:00:00
[ [ "Thai", "Tuan Tran", "", "DMIA" ], [ "Lochin", "Emmanuel", "", "DMIA" ], [ "Lacan", "Jerome", "", "DMIA" ] ]
new_dataset
0.989734
1101.5227
Abuzer Yakaryilmaz
Abuzer Yakaryilmaz and A. C. Cem Say
NP has log-space verifiers with fixed-size public quantum registers
9 pages. A revised version
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In classical Arthur-Merlin games, the class of languages whose membership proofs can be verified by Arthur using logarithmic space (AM(log-space)) coincides with the class P \cite{Co89}. In this note, we show that if Arthur has a fixed-size quantum register (the size of the register does not depend on the length of the input) instead of another source of random bits, membership in any language in NP can be verified with any desired error bound.
[ { "version": "v1", "created": "Thu, 27 Jan 2011 09:02:25 GMT" }, { "version": "v2", "created": "Tue, 18 Oct 2011 06:33:59 GMT" }, { "version": "v3", "created": "Thu, 5 Apr 2012 11:49:00 GMT" } ]
2012-04-06T00:00:00
[ [ "Yakaryilmaz", "Abuzer", "" ], [ "Say", "A. C. Cem", "" ] ]
new_dataset
0.999431
1204.1096
Amitav Mukherjee
Amitav Mukherjee, Minyan Pei, and A. Lee Swindlehurst
MIMO Precoding in Underlay Cognitive Radio Systems with Completely Unknown Primary CSI
11 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a novel underlay MIMO cognitive radio (CR) system, where the instantaneous or statistical channel state information (CSI) of the interfering channels to the primary receivers (PRs) is completely unknown to the CR. For the single underlay receiver scenario, we assume a minimum information rate must be guaranteed on the CR main channel whose CSI is known at the CR transmitter. We first show that low-rank CR interference is preferable for improving the throughput of the PRs compared with spreading less power over more transmit dimensions. Based on this observation, we then propose a rank minimization CR transmission strategy assuming a minimum information rate must be guaranteed on the CR main channel. We propose a simple solution referred to as frugal waterfilling (FWF) that uses the least amount of power required to achieve the rate constraint with a minimum-rank transmit covariance matrix. We also present two heuristic approaches that have been used in prior work to transform rank minimization problems into convex optimization problems. The proposed schemes are then generalized to an underlay MIMO CR downlink network with multiple receivers. Finally, a theoretical analysis of the interference temperature and leakage rate outage probabilities at the PR is presented for Rayleigh fading channels.We demonstrate that the direct FWF solution leads to higher PR throughput even though it has higher interference "temperature (IT) compared with the heuristic methods and classic waterfilling, which calls into question the use of IT as a metric for CR interference.
[ { "version": "v1", "created": "Thu, 5 Apr 2012 00:10:44 GMT" } ]
2012-04-06T00:00:00
[ [ "Mukherjee", "Amitav", "" ], [ "Pei", "Minyan", "" ], [ "Swindlehurst", "A. Lee", "" ] ]
new_dataset
0.96908
1204.1201
Md. Abu Naser Bikas
Bijan Paul, Md. Ibrahim and Md. Abu Naser Bikas
VANET Routing Protocols: Pros and Cons
null
International Journal of Computer Applications, Volume 20, No.3, April 2011
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.
[ { "version": "v1", "created": "Thu, 5 Apr 2012 12:32:23 GMT" } ]
2012-04-06T00:00:00
[ [ "Paul", "Bijan", "" ], [ "Ibrahim", "Md.", "" ], [ "Bikas", "Md. Abu Naser", "" ] ]
new_dataset
0.998774
1201.6043
Patrick Sol\'e
Adel Alahmadi, R. E. L. Aldred, Romar dela Cruz, Patrick Sol\'e, Carsten Thomassen
The maximum number of minimal codewords in long codes
9 pages, submitted to Discrete Applied Math
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Upper bounds on the maximum number of minimal codewords in a binary code follow from the theory of matroids. Random coding provide lower bounds. In this paper we compare these bounds with analogous bounds for the cycle code of graphs. This problem (in the graphic case) was considered in 1981 by Entringer and Slater who asked if a connected graph with $p$ vertices and $q$ edges can have only slightly more that $2^{q-p}$ cycles. The bounds in this note answer this in the affirmative for all graphs except possibly some that have fewer than $2p+3\log_2(3p)$ edges. We also conclude that an Eulerian (even) graph has at most $2^{q-p}$ cycles unless the graph is a subdivision of a 4-regular graph that is the edge-disjoint union of two Hamiltonian cycles, in which case it may have as many as $2^{q-p}+p$ cycles.
[ { "version": "v1", "created": "Sun, 29 Jan 2012 15:00:44 GMT" }, { "version": "v2", "created": "Wed, 4 Apr 2012 10:22:36 GMT" } ]
2012-04-05T00:00:00
[ [ "Alahmadi", "Adel", "" ], [ "Aldred", "R. E. L.", "" ], [ "Cruz", "Romar dela", "" ], [ "Solé", "Patrick", "" ], [ "Thomassen", "Carsten", "" ] ]
new_dataset
0.996535
1203.6559
Michiel de Bondt
Michiel de Bondt
Solving Mahjong Solitaire boards with peeking
10 pages
null
null
null
cs.CC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We first prove that solving Mahjong Solitaire boards with peeking is NP-complete, even if one only allows isolated stacks of the forms /aab/ and /abb/. We subsequently show that layouts of isolated stacks of heights one and two can always be solved with peeking, and that doing so is in P, as well as finding an optimal algorithm for such layouts without peeking. Next, we describe a practical algorithm for solving Mahjong Solitaire boards with peeking, which is simple and fast. The algorithm uses an effective pruning criterion and a heuristic to find and prioritize critical groups. The ideas of the algorithm can also be applied to solving Shisen-Sho with peeking.
[ { "version": "v1", "created": "Thu, 29 Mar 2012 15:34:39 GMT" } ]
2012-04-04T00:00:00
[ [ "de Bondt", "Michiel", "" ] ]
new_dataset
0.994634
1204.0535
S Muthukrishnan
Yishay Mansour, S. Muthukrishnan and Noam Nisan
Doubleclick Ad Exchange Auction
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Display advertisements on the web are sold via ad exchanges that use real time auction. We describe the challenges of designing a suitable auction, and present a simple auction called the Optional Second Price (OSP) auction that is currently used in Doubleclick Ad Exchange.
[ { "version": "v1", "created": "Mon, 2 Apr 2012 20:56:53 GMT" } ]
2012-04-04T00:00:00
[ [ "Mansour", "Yishay", "" ], [ "Muthukrishnan", "S.", "" ], [ "Nisan", "Noam", "" ] ]
new_dataset
0.999793
0910.4455
Emmanuel Lochin
Remi Diana and Emmanuel Lochin
ECN verbose mode: a statistical method for network path congestion estimation
null
null
10.1016/j.comnet.2011.04.001
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces a simple and effective methodology to determine the level of congestion in a network with an ECN-like marking scheme. The purpose of the ECN bit is to notify TCP sources of an imminent congestion in order to react before losses occur. However, ECN is a binary indicator which does not reflect the congestion level (i.e. the percentage of queued packets) of the bottleneck, thus preventing any adapted reaction. In this study, we use a counter in place of the traditional ECN marking scheme to assess the number of times a packet has crossed a congested router. Thanks to this simple counter, we drive a statistical analysis to accurately estimate the congestion level of each router on a network path. We detail in this paper an analytical method validated by some preliminary simulations which demonstrate the feasibility and the accuracy of the concept proposed. We conclude this paper with possible applications and expected future work.
[ { "version": "v1", "created": "Fri, 23 Oct 2009 07:49:05 GMT" }, { "version": "v2", "created": "Mon, 15 Feb 2010 08:27:50 GMT" } ]
2012-04-03T00:00:00
[ [ "Diana", "Remi", "" ], [ "Lochin", "Emmanuel", "" ] ]
new_dataset
0.985854
1204.0029
Alexandros Manolakos
Alexandros Manolakos, Yair Noam and Andrea J. Goldsmith
Blind Null-space Tracking for MIMO Underlay Cognitive Radio Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blind Null Space Learning (BNSL) has recently been proposed for fast and accurate learning of the null-space associated with the channel matrix between a secondary transmitter and a primary receiver. In this paper we propose a channel tracking enhancement of the algorithm, namely the Blind Null Space Tracking (BNST) algorithm that allows transmission of information to the Secondary Receiver (SR) while simultaneously learning the null-space of the time-varying target channel. Specifically, the enhanced algorithm initially performs a BNSL sweep in order to acquire the null space. Then, it performs modified Jacobi rotations such that the induced interference to the primary receiver is kept lower than a given threshold $P_{Th}$ with probability $p$ while information is transmitted to the SR simultaneously. We present simulation results indicating that the proposed approach has strictly better performance over the BNSL algorithm for channels with independent Rayleigh fading with a small Doppler frequency.
[ { "version": "v1", "created": "Fri, 30 Mar 2012 21:28:47 GMT" } ]
2012-04-03T00:00:00
[ [ "Manolakos", "Alexandros", "" ], [ "Noam", "Yair", "" ], [ "Goldsmith", "Andrea J.", "" ] ]
new_dataset
0.991137
1204.0056
Heru Susanto
Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan, Mehmet Sabih Aksoy
I-SolFramework: An Integrated Solution Framework Six Layers Assessment on Multimedia Information Security Architecture Policy Compliance
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 12 No: 01 (126501-9494 IJECS-IJENS \c{opyright} February 2012 IJENS)
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multimedia Information security becomes a important part for the organization's intangible assets. Level of confidence and stakeholder trusted are performance indicator as successes organization, it is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their multimedia information assets. The main objective of this paper is to Provide a novel practical framework approach to the development of ISMS, Called by the I-SolFramework, implemented in multimedia information security architecture (MISA), it divides a problem into six object domains or six layers, namely organization,stakeholders, tool & technology, policy, knowledge, and culture. In addition, this framework also introduced novelty algorithm and mathematic models as measurement and assessment tools of MISA parameters.
[ { "version": "v1", "created": "Sat, 31 Mar 2012 02:06:00 GMT" } ]
2012-04-03T00:00:00
[ [ "Susanto", "Heru", "" ], [ "Almunawar", "Mohammad Nabil", "" ], [ "Tuan", "Yong Chee", "" ], [ "Aksoy", "Mehmet Sabih", "" ] ]
new_dataset
0.982002
1204.0065
Ian Lim
Ian Lim
MIMO Z Channel Interference Management
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MIMO Z Channel is investigated in this paper. We focus on how to tackle the interference when different users try to send their codewords to their corresponding receivers while only one user will cause interference to the other. We assume there are two transmitters and two receivers each with two antennas. We propose a strategy to remove the interference while allowing different users transmit at the same time. Our strategy is low-complexity while the performance is good. Mathematical analysis is provided and simulations are given based on our system.
[ { "version": "v1", "created": "Sat, 31 Mar 2012 03:08:17 GMT" } ]
2012-04-03T00:00:00
[ [ "Lim", "Ian", "" ] ]
new_dataset
0.988209
1204.0094
Nikzad Babaii-Rizvandi
Thava Iyer, Robert Hsieh, Nikzad Babaii Rizvandi, Benoy Varghese, Roksana Boreli
Mobile P2P Trusted On-Demand Video Streaming
Published as demo in Local Computer Network conference (LCN 2011)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to demonstrate a mobile server assisted P2P system for on-demand video streaming. Our proposed solution uses a combination of 3G and ad-hoc Wi-Fi connections, to enable mobile devices to download content from a centralised server in a way that minimises the 3G bandwidth use and cost. On the customised GUI, we show the corresponding reduction in 3G bandwidth achieved by increasing the number of participating mobile devices in the combined P2P and ad-hoc Wi- Fi network, while demonstrating the good video playout quality on each of the mobiles. We also demonstrate the implemented trust mechanism which enables mobiles to only use trusted adhoc connections. The system has been implemented on Android based smartphones.
[ { "version": "v1", "created": "Sat, 31 Mar 2012 12:27:33 GMT" } ]
2012-04-03T00:00:00
[ [ "Iyer", "Thava", "" ], [ "Hsieh", "Robert", "" ], [ "Rizvandi", "Nikzad Babaii", "" ], [ "Varghese", "Benoy", "" ], [ "Boreli", "Roksana", "" ] ]
new_dataset
0.997777
1204.0140
Mario Jarmasz
Mario Jarmasz
Roget's Thesaurus as a Lexical Resource for Natural Language Processing
Thesis submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements for the degree of Master of Computer Science July, 2003. Ottawa-Carleton Institute for Computer Science, School of Information Technology and Engineering, University of Ottawa, Ottawa, Ontario, Canada
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WordNet proved that it is possible to construct a large-scale electronic lexical database on the principles of lexical semantics. It has been accepted and used extensively by computational linguists ever since it was released. Inspired by WordNet's success, we propose as an alternative a similar resource, based on the 1987 Penguin edition of Roget's Thesaurus of English Words and Phrases. Peter Mark Roget published his first Thesaurus over 150 years ago. Countless writers, orators and students of the English language have used it. Computational linguists have employed Roget's for almost 50 years in Natural Language Processing, however hesitated in accepting Roget's Thesaurus because a proper machine tractable version was not available. This dissertation presents an implementation of a machine-tractable version of the 1987 Penguin edition of Roget's Thesaurus - the first implementation of its kind to use an entire current edition. It explains the steps necessary for taking a machine-readable file and transforming it into a tractable system. This involves converting the lexical material into a format that can be more easily exploited, identifying data structures and designing classes to computerize the Thesaurus. Roget's organization is studied in detail and contrasted with WordNet's. We show two applications of the computerized Thesaurus: computing semantic similarity between words and phrases, and building lexical chains in a text. The experiments are performed using well-known benchmarks and the results are compared to those of other systems that use Roget's, WordNet and statistical techniques. Roget's has turned out to be an excellent resource for measuring semantic similarity; lexical chains are easily built but more difficult to evaluate. We also explain ways in which Roget's Thesaurus and WordNet can be combined.
[ { "version": "v1", "created": "Sat, 31 Mar 2012 21:53:56 GMT" } ]
2012-04-03T00:00:00
[ [ "Jarmasz", "Mario", "" ] ]
new_dataset
0.997279
1204.0173
Hamid G. Bafghi G.
Hamid G. Bafghi, Babak Seyfe, Mahtab Mirmohseni, M. Reza Aref
On The Achievable Rate Region of a New Wiretap Channel With Side Information
null
null
null
Rep. No. 1, March 22, 2012
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new applicable wiretap channel with separated side information is considered here which consist of a sender, a legitimate receiver and a wiretapper. In the considered scenario, the links from the transmitter to the legitimate receiver and the eavesdropper experience different conditions or channel states. So, the legitimate receiver and the wiretapper listen to the transmitted signal through the channels with different channel states which may have some correlation to each other. It is assumed that the transmitter knows the state of the main channel non-causally and uses this knowledge to encode its message. The state of the wiretap channel is not known anywhere. An achievable equivocation rate region is derived for this model and is compared to the existing works. In some special cases, the results are extended to the Gaussian wiretap channel.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 07:27:17 GMT" } ]
2012-04-03T00:00:00
[ [ "Bafghi", "Hamid G.", "" ], [ "Seyfe", "Babak", "" ], [ "Mirmohseni", "Mahtab", "" ], [ "Aref", "M. Reza", "" ] ]
new_dataset
0.956813
1204.0183
Youssef Bassil
Youssef Bassil
Neural Network Model for Path-Planning of Robotic Rover Systems
LACSC - Lebanese Association for Computational Sciences, http://www.lacsc.org/; International Journal of Science and Technology (IJST), Vol. 2, No. 2, February 2012
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, robotics is an auspicious and fast-growing branch of technology that involves the manufacturing, design, and maintenance of robot machines that can operate in an autonomous fashion and can be used in a wide variety of applications including space exploration, weaponry, household, and transportation. More particularly, in space applications, a common type of robots has been of widespread use in the recent years. It is called planetary rover which is a robot vehicle that moves across the surface of a planet and conducts detailed geological studies pertaining to the properties of the landing cosmic environment. However, rovers are always impeded by obstacles along the traveling path which can destabilize the rover's body and prevent it from reaching its goal destination. This paper proposes an ANN model that allows rover systems to carry out autonomous path-planning to successfully navigate through challenging planetary terrains and follow their goal location while avoiding dangerous obstacles. The proposed ANN is a multilayer network made out of three layers: an input, a hidden, and an output layer. The network is trained in offline mode using back-propagation supervised learning algorithm. A software-simulated rover was experimented and it revealed that it was able to follow the safest trajectory despite existing obstacles. As future work, the proposed ANN is to be parallelized so as to speed-up the execution time of the training process.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 09:24:19 GMT" } ]
2012-04-03T00:00:00
[ [ "Bassil", "Youssef", "" ] ]
new_dataset
0.980317
1204.0184
Youssef Bassil
Youssef Bassil
Parallel Spell-Checking Algorithm Based on Yahoo! N-Grams Dataset
LACSC - Lebanese Association for Computational Sciences, http://www.lacsc.org/; International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 3, No. 1, February 2012
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spell-checking is the process of detecting and sometimes providing suggestions for incorrectly spelled words in a text. Basically, the larger the dictionary of a spell-checker is, the higher is the error detection rate; otherwise, misspellings would pass undetected. Unfortunately, traditional dictionaries suffer from out-of-vocabulary and data sparseness problems as they do not encompass large vocabulary of words indispensable to cover proper names, domain-specific terms, technical jargons, special acronyms, and terminologies. As a result, spell-checkers will incur low error detection and correction rate and will fail to flag all errors in the text. This paper proposes a new parallel shared-memory spell-checking algorithm that uses rich real-world word statistics from Yahoo! N-Grams Dataset to correct non-word and real-word errors in computer text. Essentially, the proposed algorithm can be divided into three sub-algorithms that run in a parallel fashion: The error detection algorithm that detects misspellings, the candidates generation algorithm that generates correction suggestions, and the error correction algorithm that performs contextual error correction. Experiments conducted on a set of text articles containing misspellings, showed a remarkable spelling error correction rate that resulted in a radical reduction of both non-word and real-word errors in electronic text. In a further study, the proposed algorithm is to be optimized for message-passing systems so as to become more flexible and less costly to scale over distributed machines.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 09:28:20 GMT" } ]
2012-04-03T00:00:00
[ [ "Bassil", "Youssef", "" ] ]
new_dataset
0.999542
1204.0188
Youssef Bassil
Youssef Bassil, Mohammad Alwani
OCR Context-Sensitive Error Correction Based on Google Web 1T 5-Gram Data Set
LACSC - Lebanese Association for Computational Sciences, http://www.lacsc.org/; American Journal of Scientific Research, Issue. 50, February 2012
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the dawn of the computing era, information has been represented digitally so that it can be processed by electronic computers. Paper books and documents were abundant and widely being published at that time; and hence, there was a need to convert them into digital format. OCR, short for Optical Character Recognition was conceived to translate paper-based books into digital e-books. Regrettably, OCR systems are still erroneous and inaccurate as they produce misspellings in the recognized text, especially when the source document is of low printing quality. This paper proposes a post-processing OCR context-sensitive error correction method for detecting and correcting non-word and real-word OCR errors. The cornerstone of this proposed approach is the use of Google Web 1T 5-gram data set as a dictionary of words to spell-check OCR text. The Google data set incorporates a very large vocabulary and word statistics entirely reaped from the Internet, making it a reliable source to perform dictionary-based error correction. The core of the proposed solution is a combination of three algorithms: The error detection, candidate spellings generator, and error correction algorithms, which all exploit information extracted from Google Web 1T 5-gram data set. Experiments conducted on scanned images written in different languages showed a substantial improvement in the OCR error correction rate. As future developments, the proposed algorithm is to be parallelised so as to support parallel and distributed computing architectures.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 10:06:55 GMT" } ]
2012-04-03T00:00:00
[ [ "Bassil", "Youssef", "" ], [ "Alwani", "Mohammad", "" ] ]
new_dataset
0.977582
1204.0221
Youssef Bassil
Youssef Bassil, Aziz Barbar
MyProLang - My Programming Language: A Template-Driven Automatic Natural Programming Language
WCECS 2008, October 22-24, 2008, San Francisco, USA
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern computer programming languages are governed by complex syntactic rules. They are unlike natural languages; they require extensive manual work and a significant amount of learning and practicing for an individual to become skilled at and to write correct programs. Computer programming is a difficult, complicated, unfamiliar, non-automated, and a challenging discipline for everyone; especially, for students, new programmers and end-users. This paper proposes a new programming language and an environment for writing computer applications based on source-code generation. It is mainly a template-driven automatic natural imperative programming language called MyProLang. It harnesses GUI templates to generate proprietary natural language source-code, instead of having computer programmers write the code manually. MyProLang is a blend of five elements. A proprietary natural programming language with unsophisticated grammatical rules and expressive syntax; automation templates that automate the generation of instructions and thereby minimizing the learning and training time; an NLG engine to generate natural instructions; a source-to-source compiler that analyzes, parses, and build executables; and an ergonomic IDE that houses diverse functions whose role is to simplify the software development process. MyProLang is expected to make programming open to everyone including students, programmers and end-users. In that sense, anyone can start programming systematically, in an automated manner and in natural language; without wasting time in learning how to formulate instructions and arrange expressions, without putting up with unfamiliar structures and symbols, and without being annoyed by syntax errors. In the long run, this increases the productivity, quality and time-to-market in software development.
[ { "version": "v1", "created": "Sun, 1 Apr 2012 15:35:11 GMT" } ]
2012-04-03T00:00:00
[ [ "Bassil", "Youssef", "" ], [ "Barbar", "Aziz", "" ] ]
new_dataset
0.999334
1204.0459
Zhenghao Zhang
Zhenghao Zhang, Shuping Gong, Aleksandar D. Dimitrovski, and Husheng Li
Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.
[ { "version": "v1", "created": "Mon, 2 Apr 2012 16:31:42 GMT" } ]
2012-04-03T00:00:00
[ [ "Zhang", "Zhenghao", "" ], [ "Gong", "Shuping", "" ], [ "Dimitrovski", "Aleksandar D.", "" ], [ "Li", "Husheng", "" ] ]
new_dataset
0.950219
cs/0611079
Emmanuel Lochin
Emmanuel Lochin and Bruno Talavera
Managing network congestion with a Kohonen-based RED queue
8 pages, 9 figures
null
10.1016/j.engappai.2010.10.012
null
cs.NI cs.NE
null
The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, end-to-end applications experience large delay jitter. Many studies have proposed efficient Active Queue Management (AQM) mechanisms in order to reduce queue oscillations and stabilize the queue length. These AQM are mostly improvements of the Random Early Detection (RED) model. Unfortunately, these enhancements do not react in a similar manner for various network conditions and are strongly sensitive to their initial setting parameters. Although this paper proposes a solution to overcome the difficulties of setting these parameters by using a Kohonen neural network model, another goal of this study is to investigate whether cognitive intelligence could be placed in the core network to solve such stability problem. In our context, we use results from the neural network area to demonstrate that our proposal, named Kohonen-RED (KRED), enables a stable queue length without complex parameters setting and passive measurements.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 11:26:22 GMT" }, { "version": "v2", "created": "Fri, 17 Nov 2006 06:20:37 GMT" }, { "version": "v3", "created": "Fri, 24 Nov 2006 06:39:29 GMT" }, { "version": "v4", "created": "Thu, 13 Dec 2007 16:08:25 GMT" } ]
2012-04-03T00:00:00
[ [ "Lochin", "Emmanuel", "" ], [ "Talavera", "Bruno", "" ] ]
new_dataset
0.973866
1203.6005
Benjamin Piwowarski
Benjamin Piwowarski
The Kernel Quantum Probabilities (KQP) Library
Describes the library available at http://kqp.bpiwowar.net/
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this document, we show how the different quantities necessary to compute kernel quantum probabilities can be computed. This document form the basis of the implementation of the Kernel Quantum Probability (KQP) open source project
[ { "version": "v1", "created": "Tue, 27 Mar 2012 15:57:59 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2012 18:49:36 GMT" } ]
2012-04-02T00:00:00
[ [ "Piwowarski", "Benjamin", "" ] ]
new_dataset
0.988777