id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1203.6686
|
Jean-Pierre Tillich
|
Val\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich
|
A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying
on Reed-Solomon Codes
|
11 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bogdanov and Lee suggested a homomorphic public-key encryption scheme based
on error correcting codes. The underlying public code is a modified
Reed-Solomon code obtained from inserting a zero submatrix in the Vandermonde
generating matrix defining it. The columns that define this submatrix are kept
secret and form a set $L$. We give here a distinguisher that detects if one or
several columns belong to $L$ or not. This distinguisher is obtained by
considering the code generated by component-wise products of codewords of the
public code (the so called "square code"). This operation is applied to
punctured versions of this square code obtained by picking a subset
$I$ of the whole set of columns. It turns out that the dimension of the
punctured square code is directly related to the cardinality of the
intersection of $I$ with $L$. This allows an attack which recovers the full set
$L$ and which can then decrypt any ciphertext.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2012 23:31:16 GMT"
}
] | 2012-04-02T00:00:00 |
[
[
"Gauthier",
"Valérie",
""
],
[
"Otmani",
"Ayoub",
""
],
[
"Tillich",
"Jean-Pierre",
""
]
] |
new_dataset
| 0.992437 |
1108.0901
|
Richard Formato
|
Richard A. Formato
|
UWB Array Design Using Variable Zo Technology and Central Force
Optimization
|
Rev. 2 (added discussion, citation). arXiv admin note: substantial
text overlap with arXiv:1107.1437, arXiv:1003.0221, arXiv:1103.5629,
arXiv:1003.1039, arXiv:1002.2798, arXiv:1001.0317
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This note applies Variable Zo technology to the design of an Ultra Wideband
(UWB) Yagi-Uda array optimized using Central Force Optimization. Variable Zo is
a novel and proprietary approach to antenna design and optimization that treats
the feed system characteristic impedance, Zo, as a design variable instead of a
fixed design parameter as is traditionally done. Variable Zo is applicable to
any antenna design or optimization methodology, and using it will generally
produce better antenna designs across any user-specified set of performance
objectives.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2011 14:47:49 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Aug 2011 12:17:01 GMT"
}
] | 2012-04-01T00:00:00 |
[
[
"Formato",
"Richard A.",
""
]
] |
new_dataset
| 0.99978 |
1203.6400
|
Nodira Khoussainova
|
Nodira Khoussainova, Magdalena Balazinska, Dan Suciu
|
PerfXplain: Debugging MapReduce Job Performance
|
VLDB2012
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 7, pp.
598-609 (2012)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While users today have access to many tools that assist in performing large
scale data analysis tasks, understanding the performance characteristics of
their parallel computations, such as MapReduce jobs, remains difficult. We
present PerfXplain, a system that enables users to ask questions about the
relative performances (i.e., runtimes) of pairs of MapReduce jobs. PerfXplain
provides a new query language for articulating performance queries and an
algorithm for generating explanations from a log of past MapReduce job
executions. We formally define the notion of an explanation together with three
metrics, relevance, precision, and generality, that measure explanation
quality. We present the explanation-generation algorithm based on techniques
related to decision-tree building. We evaluate the approach on a log of past
executions on Amazon EC2, and show that our approach can generate quality
explanations, outperforming two naive explanation-generation methods.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2012 00:04:35 GMT"
}
] | 2012-03-30T00:00:00 |
[
[
"Khoussainova",
"Nodira",
""
],
[
"Balazinska",
"Magdalena",
""
],
[
"Suciu",
"Dan",
""
]
] |
new_dataset
| 0.993927 |
1203.5778
|
Krit Salah-Ddine
|
Krit Salah-ddine, Zared Kamal, Qjidaa Hassan and Zouak Mohcine
|
A 100 mA Low Voltage Linear Regulators for Systems on Chip Applications
Using 0.18 {\mu}m CMOS Technology
|
7 pages
|
IJCSI International Journal of Computer Science Issues, Vol. 9,
Issue 1, No 3, January 2012
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel design for a low dropout (LDO) voltage regulator is presented and
dedicated to power many sections of a typical cellular handset. However, these
baseband, RF, and audio sections have different requirements that influence
which LDO is most appropriate. After discussion of the specific requirements,
different LDOs are recommended. Also, some LDO design techniques are briefly
discussed to demonstrate how an LDO may be optimized for a specific level of
performance. Cellular phone designs require linear regulators with lowdropout,
low-noise, high PSRR, low quiescent current (Iq), and low-cost. They need to
deliver a stable output and use smallvalue output capacitors. Ideally, one
device would have all these characteristics and one low-dropout linear
regulator (LDO) could be used anywhere in the phone without worry. But in
practice, the various cell phone blocks are best powered by LDOs with different
performance characteristics. This paper provides a new design methodology to
choosing the right LDO to power each cell phone and especially for the Voltage
Phase-Locked loops (VPLLs) blocks. Fabricated in a 0.18 {\mu}m CMOS process,
the measured results show the adopted topology achieves a better phase noise
than the conventional saturation current source. and the spread of the current
limitation (without matching) is 100mA, the VPLLs system demonstrates a phase
noise of 782 nv/sqrtHz at 100-kHz, and 33 nv/sqrtHz at 1 MHz, while quiescent
current 33 {\mu}A from a 2.6 V supply voltage.
|
[
{
"version": "v1",
"created": "Sun, 25 Mar 2012 01:55:15 GMT"
}
] | 2012-03-28T00:00:00 |
[
[
"Salah-ddine",
"Krit",
""
],
[
"Kamal",
"Zared",
""
],
[
"Hassan",
"Qjidaa",
""
],
[
"Mohcine",
"Zouak",
""
]
] |
new_dataset
| 0.991587 |
1203.5944
|
Sergio Cabello
|
Sergio Cabello, Bojan Mohar
|
Adding one edge to planar graphs makes crossing number and 1-planarity
hard
|
27 pages, 10 figures. Part of the results appeared in Proceedings of
the 26th Annual Symposium on Computational Geometry (SoCG), 68-76, 2010
| null | null | null |
cs.CG cs.CC math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph is near-planar if it can be obtained from a planar graph by adding an
edge. We show the surprising fact that it is NP-hard to compute the crossing
number of near-planar graphs. A graph is 1-planar if it has a drawing where
every edge is crossed by at most one other edge. We show that it is NP-hard to
decide whether a given near-planar graph is 1-planar. The main idea in both
reductions is to consider the problem of simultaneously drawing two planar
graphs inside a disk, with some of its vertices fixed at the boundary of the
disk. This leads to the concept of anchored embedding, which is of independent
interest. As an interesting consequence we obtain a new, geometric proof of
NP-completeness of the crossing number problem, even when restricted to cubic
graphs. This resolves a question of Hlin\v{e}n\'y.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2012 12:03:12 GMT"
}
] | 2012-03-28T00:00:00 |
[
[
"Cabello",
"Sergio",
""
],
[
"Mohar",
"Bojan",
""
]
] |
new_dataset
| 0.984584 |
1203.0290
|
Krishna Kaipa
|
K. V. Kaipa, H. Pillai
|
Weight spectrum of codes associated with the Grassmannian G(3,7)
|
concluding remarks added
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider the problem of determining the weight spectrum of
q-ary codes C(3,m) associated with Grassmann varieties G(3,m). For m=6 this was
done by Nogin. We derive a formula for the weight of a codeword of C(3,m), in
terms of certain varieties associated with alternating trilinear forms on
(F_q)^m. The classification of such forms under the action of the general
linear group GL(m,F_q) is the other component that is required to calculate the
spectrum of C(3,m). For m=7, we explicitly determine the varieties mentioned
above. The classification problem for alternating 3-forms on (F_q)^7 was solved
by Cohen and Helminck, which we then use to determine the spectrum of C(3,7).
|
[
{
"version": "v1",
"created": "Thu, 1 Mar 2012 20:45:13 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2012 06:45:43 GMT"
}
] | 2012-03-27T00:00:00 |
[
[
"Kaipa",
"K. V.",
""
],
[
"Pillai",
"H.",
""
]
] |
new_dataset
| 0.993602 |
1006.4700
|
Pascal Koiran
|
Pascal Koiran (LIP)
|
Arithmetic circuits: the chasm at depth four gets wider
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In their paper on the "chasm at depth four", Agrawal and Vinay have shown
that polynomials in m variables of degree O(m) which admit arithmetic circuits
of size 2^o(m) also admit arithmetic circuits of depth four and size 2^o(m).
This theorem shows that for problems such as arithmetic circuit lower bounds or
black-box derandomization of identity testing, the case of depth four circuits
is in a certain sense the general case. In this paper we show that smaller
depth four circuits can be obtained if we start from polynomial size arithmetic
circuits. For instance, we show that if the permanent of n*n matrices has
circuits of size polynomial in n, then it also has depth 4 circuits of size
n^O(sqrt(n)*log(n)). Our depth four circuits use integer constants of
polynomial size. These results have potential applications to lower bounds and
deterministic identity testing, in particular for sums of products of sparse
univariate polynomials. We also give an application to boolean circuit
complexity, and a simple (but suboptimal) reduction to polylogarithmic depth
for arithmetic circuits of polynomial size and polynomially bounded degree.
|
[
{
"version": "v1",
"created": "Thu, 24 Jun 2010 07:22:19 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jul 2010 18:50:37 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jul 2010 19:17:39 GMT"
},
{
"version": "v4",
"created": "Fri, 23 Mar 2012 07:11:30 GMT"
}
] | 2012-03-26T00:00:00 |
[
[
"Koiran",
"Pascal",
"",
"LIP"
]
] |
new_dataset
| 0.996031 |
1203.5218
|
Robert J. Mokken
|
Robert J. Mokken
|
Coteries, Social Circles and Hamlets Close Communities: A Study of
Acquaintance Networks
|
Keywords: Social networks, acquaintance networks, close communities,
cliques, k-clubs, 2-clubs, diameter 2, shortest spanning trees, girth
| null | null | null |
cs.SI cs.DM math.CO physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the analysis of social networks many relatively loose and heuristic
definitions of 'community' abound. In this paper the concept of closely knit
communities is studied as defined by the property that every pair of its
members are neighbors or has at least one common neighbor, where the
neighboring relationship is based on some more or less durable and stable
acquaintance or contact relation. In this paper these are studied in the form
of graphs or networks of diameter two (2-clubs). Their structure can be
characterized by investigating shortest spanning trees and girth leading to a
typology containing just three or, in combination, six types of close
communities.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2012 11:50:45 GMT"
}
] | 2012-03-26T00:00:00 |
[
[
"Mokken",
"Robert J.",
""
]
] |
new_dataset
| 0.98908 |
1203.5262
|
Youssef Bassil
|
Youssef Bassil, Paul Semaan
|
ASR Context-Sensitive Error Correction Based on Microsoft N-Gram Dataset
|
LACSC - Lebanese Association for Computational Sciences -
http://www.lacsc.org
|
Journal of Computing, Vol.4, No.1, January 2012
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
At the present time, computers are employed to solve complex tasks and
problems ranging from simple calculations to intensive digital image processing
and intricate algorithmic optimization problems to computationally-demanding
weather forecasting problems. ASR short for Automatic Speech Recognition is yet
another type of computational problem whose purpose is to recognize human
spoken speech and convert it into text that can be processed by a computer.
Despite that ASR has many versatile and pervasive real-world applications,it is
still relatively erroneous and not perfectly solved as it is prone to produce
spelling errors in the recognized text, especially if the ASR system is
operating in a noisy environment, its vocabulary size is limited, and its input
speech is of bad or low quality. This paper proposes a post-editing ASR error
correction method based on MicrosoftN-Gram dataset for detecting and correcting
spelling errors generated by ASR systems. The proposed method comprises an
error detection algorithm for detecting word errors; a candidate corrections
generation algorithm for generating correction suggestions for the detected
word errors; and a context-sensitive error correction algorithm for selecting
the best candidate for correction. The virtue of using the Microsoft N-Gram
dataset is that it contains real-world data and word sequences extracted from
the web which canmimica comprehensive dictionary of words having a large and
all-inclusive vocabulary. Experiments conducted on numerous speeches, performed
by different speakers, showed a remarkable reduction in ASR errors. Future
research can improve upon the proposed algorithm so much so that it can be
parallelized to take advantage of multiprocessor and distributed systems.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2012 14:51:05 GMT"
}
] | 2012-03-26T00:00:00 |
[
[
"Bassil",
"Youssef",
""
],
[
"Semaan",
"Paul",
""
]
] |
new_dataset
| 0.994886 |
1203.4874
|
Feng Li
|
Christopher Thorpe, Feng Li, Zijia Li, Zhan Yu, David Saunders, Jingyi
Yu
|
A Co-Prime Blur Scheme for Data Security in Video Surveillance
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel Coprime Blurred Pair (CBP) model for visual
data-hiding for security in camera surveillance. While most previous approaches
have focused on completely encrypting the video stream, we introduce a spatial
encryption scheme by blurring the image/video contents to create a CBP. Our
goal is to obscure detail in public video streams by blurring while allowing
behavior to be recognized and to quickly deblur the stream so that details are
available if behavior is recognized as suspicious. We create a CBP by blurring
the same latent image with two unknown kernels. The two kernels are coprime
when mapped to bivariate polynomials in the z domain. To deblur the CBP we
first use the coprime constraint to approximate the kernels and sample the
bivariate CBP polynomials in one dimension on the unit circle. At each sample
point, we factor the 1D polynomial pair and compose the results into a 2D
kernel matrix. Finally, we compute the inverse Fast Fourier Transform (FFT) of
the kernel matrices to recover the coprime kernels and then the latent video
stream. It is therefore only possible to deblur the video stream if a user has
access to both streams. To improve the practicability of our algorithm, we
implement our algorithm using a graphics processing unit (GPU) to decrypt the
blurred video streams in real-time, and extensive experimental results
demonstrate that our new scheme can effectively protect sensitive identity
information in surveillance videos and faithfully reconstruct the unblurred
video stream when two blurred sequences are available.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2012 02:57:53 GMT"
}
] | 2012-03-23T00:00:00 |
[
[
"Thorpe",
"Christopher",
""
],
[
"Li",
"Feng",
""
],
[
"Li",
"Zijia",
""
],
[
"Yu",
"Zhan",
""
],
[
"Saunders",
"David",
""
],
[
"Yu",
"Jingyi",
""
]
] |
new_dataset
| 0.994141 |
1203.4966
|
Amelia Carolina Sparavigna
|
A.C. Sparavigna and R. Marazzato
|
A tour about Isaac Newton's life
|
Georeferencing, Satellite Maps, KML, XML, Acme Mapper, History of
Physics
| null | null | null |
cs.OH physics.hist-ph physics.pop-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Here we propose a tour about the life of Isaac Newton, using a georeferenced
method, based on the free satellite maps. Our tour is modelled on the time-line
of the great scientist's life, as an ancient "itinerarium" was modelled on the
Roman roads, providing a listing of places and intervening distances, sometimes
with short description or symbols concerning the places. KML language and
Google Earth, with its Street View and 3D images are powerful tools to create
this virtual tour.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2012 11:54:52 GMT"
}
] | 2012-03-23T00:00:00 |
[
[
"Sparavigna",
"A. C.",
""
],
[
"Marazzato",
"R.",
""
]
] |
new_dataset
| 0.996072 |
1203.5062
|
Leon Derczynski
|
Leon Derczynski and Robert Gaizauskas
|
An Annotation Scheme for Reichenbach's Verbal Tense Structure
| null |
Proc. 6th Joint ACL-ISO Workshop on Interoperable Semantic
Annotation (2011) 10-17
| null | null |
cs.CL
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper we present RTMML, a markup language for the tenses of verbs and
temporal relations between verbs. There is a richness to tense in language that
is not fully captured by existing temporal annotation schemata. Following
Reichenbach we present an analysis of tense in terms of abstract time points,
with the aim of supporting automated processing of tense and temporal relations
in language. This allows for precise reasoning about tense in documents, and
the deduction of temporal relations between the times and verbal events in a
discourse. We define the syntax of RTMML, and demonstrate the markup in a range
of situations.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2012 18:05:26 GMT"
}
] | 2012-03-23T00:00:00 |
[
[
"Derczynski",
"Leon",
""
],
[
"Gaizauskas",
"Robert",
""
]
] |
new_dataset
| 0.99952 |
1203.5073
|
Leon Derczynski
|
Amev Burman, Arun Jayapal, Sathish Kannan, Madhu Kavilikatta, Ayman
Alhelbawy, Leon Derczynski, Robert Gaizauskas
|
USFD at KBP 2011: Entity Linking, Slot Filling and Temporal Bounding
|
Proc. Text Analysis Conference (2011)
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/3.0/
|
This paper describes the University of Sheffield's entry in the 2011 TAC KBP
entity linking and slot filling tasks. We chose to participate in the
monolingual entity linking task, the monolingual slot filling task and the
temporal slot filling tasks. We set out to build a framework for
experimentation with knowledge base population. This framework was created, and
applied to multiple KBP tasks. We demonstrated that our proposed framework is
effective and suitable for collaborative development efforts, as well as useful
in a teaching environment. Finally we present results that, while very modest,
provide improvements an order of magnitude greater than our 2010 attempt.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2012 18:34:19 GMT"
}
] | 2012-03-23T00:00:00 |
[
[
"Burman",
"Amev",
""
],
[
"Jayapal",
"Arun",
""
],
[
"Kannan",
"Sathish",
""
],
[
"Kavilikatta",
"Madhu",
""
],
[
"Alhelbawy",
"Ayman",
""
],
[
"Derczynski",
"Leon",
""
],
[
"Gaizauskas",
"Robert",
""
]
] |
new_dataset
| 0.967595 |
1108.2115
|
Hans van Ditmarsch
|
Hans van Ditmarsch
|
The Ditmarsch Tale of Wonders - The Dynamics of Lying
| null | null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a dynamic logic of lying, wherein a 'lie that phi' (where phi is a
formula in the logic) is an action in the sense of dynamic modal logic, that is
interpreted as a state transformer relative to the formula phi. The states that
are being transformed are pointed Kripke models encoding the uncertainty of
agents about their beliefs. Lies can be about factual propositions but also
about modal formulas, such as the beliefs of other agents or the belief
consequences of the lies of other agents. We distinguish (i) an outside
observer who is lying to an agent that is modelled in the system, from (ii) one
agent who is lying to another agent, and where both are modelled in the system.
For either case, we further distinguish (iii) the agent who believes everything
that it is told (even at the price of inconsistency), from (iv) the agent who
only believes what it is told if that is consistent with its current beliefs,
and from (v) the agent who believes everything that it is told by consistently
revising its current beliefs. The logics have complete axiomatizations, which
can most elegantly be shown by way of their embedding in what is known as
action model logic or the extension of that logic to belief revision.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2011 07:55:15 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2012 16:08:53 GMT"
}
] | 2012-03-22T00:00:00 |
[
[
"van Ditmarsch",
"Hans",
""
]
] |
new_dataset
| 0.999511 |
1203.4605
|
Tarek El-Shishtawy Ahmed
|
Tarek El-shishtawy and Abdulwahab Al-sammak
|
Arabic Keyphrase Extraction using Linguistic knowledge and Machine
Learning Techniques
|
Proceedings of the Second International Conference on Arabic Language
Resources and Tools, 2009
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a supervised learning technique for extracting keyphrases of
Arabic documents is presented. The extractor is supplied with linguistic
knowledge to enhance its efficiency instead of relying only on statistical
information such as term frequency and distance. During analysis, an annotated
Arabic corpus is used to extract the required lexical features of the document
words. The knowledge also includes syntactic rules based on part of speech tags
and allowed word sequences to extract the candidate keyphrases. In this work,
the abstract form of Arabic words is used instead of its stem form to represent
the candidate terms. The Abstract form hides most of the inflections found in
Arabic words. The paper introduces new features of keyphrases based on
linguistic knowledge, to capture titles and subtitles of a document. A simple
ANOVA test is used to evaluate the validity of selected features. Then, the
learning model is built using the LDA - Linear Discriminant Analysis - and
training documents. Although, the presented system is trained using documents
in the IT domain, experiments carried out show that it has a significantly
better performance than the existing Arabic extractor systems, where precision
and recall values reach double their corresponding values in the other systems
especially for lengthy and non-scientific articles.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2012 21:52:35 GMT"
}
] | 2012-03-22T00:00:00 |
[
[
"El-shishtawy",
"Tarek",
""
],
[
"Al-sammak",
"Abdulwahab",
""
]
] |
new_dataset
| 0.978315 |
1203.4649
|
Saravanan Kumarasamy
|
K. Saravanan, L. Vijayanand and R. K. Negesh
|
A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB
Association model
| null | null | null |
EMICS12
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As an interconnection technology, Bluetooth has to address all traditional
security problems, well known from the distributed networks. Moreover, as
Bluetooth networks are formed by the radio links, there are also additional
security aspects whose impact is yet not well understood. In this paper, we
propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled
mobile phone that support Simple Secure Pairing(SSP). From the literature it
was proved that the SSP association models such as Numeric comparison, Just
works and passkey Entry are not more secure. Here we propose the Out Of Band
(OOB) channeling with enhanced security than the previous methods.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2012 04:20:00 GMT"
}
] | 2012-03-22T00:00:00 |
[
[
"Saravanan",
"K.",
""
],
[
"Vijayanand",
"L.",
""
],
[
"Negesh",
"R. K.",
""
]
] |
new_dataset
| 0.999145 |
1203.4697
|
Devesh Jinwala PhD
|
Devesh Jinwala, Dhiren Patel, Kankar Dasgupta
|
FlexiSec: A Configurable Link Layer Security Architecture for Wireless
Sensor Networks
|
22 pages
|
Journal of Information Assurance and Security 4 (2009) pp. 582-603
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ensuring communications security in Wireless Sensor Networks (WSNs) indeed is
critical; due to the criticality of the resources in the sensor nodes as well
as due to their ubiquitous and pervasive deployment, with varying attributes
and degrees of security required. The proliferation of the next generation
sensor nodes, has not solved this problem, because of the greater emphasis on
low-cost deployment. In addition, the WSNs use data-centric multi-hop
communication that in turn, necessitates the security support to be devised at
the link layer (increasing the cost of security related operations), instead of
being at the application layer, as in general networks. Therefore, an
energy-efficient link layer security framework is necessitated. There do exists
a number of link layer security architectures that offer some combinations of
the security attributes desired by different WSN applications. However, as we
show in this paper, none of them is responsive to the actual security demands
of the applications. Therefore, we believe that there is a need for
investigating the feasibility of a configurable software-based link layer
security architecture wherein an application can be compiled flexibly, with
respect to its actual security demands. In this paper, we analyze, propose and
experiment with the basic design of such configurable link layer security
architecture for WSNs. We also experimentally evaluate various aspects related
to our scheme viz. configurable block ciphers, configurable block cipher modes
of operations, configurable MAC sizes and configurable replay protection. The
architecture proposed is aimed to offer the optimal level of security at the
minimal overhead, thus saving the precious resources in the WSNs.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2012 10:06:00 GMT"
}
] | 2012-03-22T00:00:00 |
[
[
"Jinwala",
"Devesh",
""
],
[
"Patel",
"Dhiren",
""
],
[
"Dasgupta",
"Kankar",
""
]
] |
new_dataset
| 0.98963 |
1203.4473
|
Niraj Shakhakarmi
|
Niraj Shakhakarmi and Dhadesugoor R. Vaman
|
Dynamic PL&T using Two Reference Nodes Equipped with Steered Directional
Antenna for Significant PL&T Accuracy
|
7 pages, 12 figures
|
Wireless Telecommunications Symposium,UK London,April 16-18, 2012
| null | null |
cs.NI
|
http://creativecommons.org/licenses/publicdomain/
|
Dynamic Position Location and Tracking (PL&T) is proposed deploying the
integrated approach of zone finding and triangulation using two friendly nodes
equipped with Steered Directional Antenna (DA) in Mobile Ad hoc Networks
(MANET). This approach allows the system to use only two references instead of
a typical 3 references for a straight triangulation. Moreover, the performance
of the proposed algorithm with references using directional antennas shows
significant improvement over triangulation using references with
Omnidirectional antennas as the beam power is concentrated. However, dynamic
switching of reference nodes is frequently required as the target moves outside
the predicted zone. This paper presents a better tracking accuracy in using
proposed dynamic PL&T as compared to other PL&T techniques. The multipath
fading is also addressed with the use of KV transform coding technique which
uses forward error correction and sample interleaving achieves greater than 90%
tracking accuracy with BERs of 10-6 or better.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2012 04:24:59 GMT"
}
] | 2012-03-21T00:00:00 |
[
[
"Shakhakarmi",
"Niraj",
""
],
[
"Vaman",
"Dhadesugoor R.",
""
]
] |
new_dataset
| 0.992692 |
1203.4519
|
Niraj Shakhakarmi
|
Niraj Shakhakarmi, Dhadesugoor R. Vaman
|
Secured Position Location and Tracking (SPL&T) for Detection of Multiple
Malicious Nodes Maintaining Two Friendly References in Mobile Ad hoc Networks
|
8 pages, 11 figures
|
International Journal of Computer Science Issues (IJCSI), Volume
9, Issue 2, March 2012)
| null | null |
cs.NI
|
http://creativecommons.org/licenses/publicdomain/
|
Secured Position Location and Tracking (PL&T) scheme is developed for
multiple malicious radios or nodes detection using integrated key based strict
friendly scheme and position location and tracking by multi-sectored based
multiple target's PL&T. The friendly and malicious nodes detection is based on
the integrated key consisting of symmetric keys, geographic location and round
trip response time. Two strictly friend references dynamically form the
tracking zone over the detected multiple malicious nodes using the
multi-sectored adaptive beam forming. This PL&T technique is robust, precise,
scalable, and faster than using the single reference, two reference and three
reference nodes based PL&T method in the battlefield oriented Mobile Ad hoc
Networks. The simulation results show that the lower relative speed bound of
any participating node increased the switching overhead, the decreasing
received energy with increasing number of the multi-sectored beams reduced
tracking accuracy and the strict friendly authentication overhead depends upon
the time period between two latest periodic authentication failures.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2012 05:01:50 GMT"
}
] | 2012-03-21T00:00:00 |
[
[
"Shakhakarmi",
"Niraj",
""
],
[
"Vaman",
"Dhadesugoor R.",
""
]
] |
new_dataset
| 0.999216 |
1002.3171
|
Mohsen Toorani
|
M. Toorani, A. A. Beheshti
|
SSMS - A Secure SMS Messaging Protocol for the M-payment Systems
|
6 Pages, 5 Figures
|
Proceedings of the 13th IEEE Symposium on Computers and
Communications (ISCC'08), pp.700-705, July 2008
|
10.1109/ISCC.2008.4625610
| null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The GSM network with the greatest worldwide number of users, succumbs to
several security vulnerabilities. The short message service (SMS) is one of its
superior and well-tried services with a global availability in the GSM
networks. The main contribution of this paper is to introduce a new secure
application layer protocol, called SSMS, to efficiently embed the desired
security attributes in the SMS messages to be used as a secure bearer in the
m-payment systems. SSMS efficiently embeds the confidentiality, integrity,
authentication, and non-repudiation in the SMS messages. It provides an
elliptic curve-based public key solution that uses public keys for the secret
key establishment of a symmetric encryption. It also provides the attributes of
public verification and forward secrecy. It efficiently makes the SMS messaging
suitable for the m-payment applications where the security is the great
concern.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 10:27:29 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 20:12:29 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 14:04:01 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Mar 2012 21:19:22 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Toorani",
"M.",
""
],
[
"Beheshti",
"A. A.",
""
]
] |
new_dataset
| 0.997738 |
1002.3176
|
Mohsen Toorani
|
M. Toorani
|
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
|
6 Pages, 5 Figures
|
Proceedings of the Australian Telecommunications Networks and
Applications Conference (ATNAC'08), pp.39-44, Adelaide, Australia, Dec. 2008
|
10.1109/ATNAC.2008.4783292
| null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The electronic mail plays an unavoidable role in the humankind
communications. With the great interest for the connection via mobile
platforms, and the growing number of vulnerabilities and attacks, it is
essential to provide suitable security solutions regarding the limitations of
resource restricted platforms. Although some solutions such as PGP and S/MIME
are currently available for the secure e-mail over the Internet, they are based
on traditional public key cryptography that involves huge computational costs.
In this paper, a new secure application-layer protocol, called SMEmail, is
introduced that provides several security attributes such as confidentiality,
integrity, authentication, non-repudiation, and forward secrecy of message
confidentiality for the electronic mails. SMEmail offers an elliptic
curve-based public key solution that uses public keys for the secure key
establishment of a symmetric encryption, and is so suitable for the resource
restricted platforms such as mobile phones.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 10:45:38 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2011 13:51:34 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Mar 2012 21:20:23 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Toorani",
"M.",
""
]
] |
new_dataset
| 0.998976 |
1002.3299
|
Mohsen Toorani
|
M. Toorani, A. A. Beheshti
|
LPKI - A Lightweight Public Key Infrastructure for the Mobile
Environments
|
6 Pages, 6 Figures
|
Proceedings of the 11th IEEE International Conference on
Communication Systems (IEEE ICCS'08), pp.162-166, Guangzhou, China, Nov. 2008
|
10.1109/ICCS.2008.4737164
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The non-repudiation as an essential requirement of many applications can be
provided by the asymmetric key model. With the evolution of new applications
such as mobile commerce, it is essential to provide secure and efficient
solutions for the mobile environments. The traditional public key cryptography
involves huge computational costs and is not so suitable for the
resource-constrained platforms. The elliptic curve-based approaches as the
newer solutions require certain considerations that are not taken into account
in the traditional public key infrastructures. The main contribution of this
paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the
constrained platforms such as mobile phones. It takes advantages of elliptic
curve cryptography and signcryption to decrease the computational costs and
communication overheads, and adapting to the constraints. All the computational
costs of required validations can be eliminated from end-entities by
introduction of a validation authority to the introduced infrastructure and
delegating validations to such a component. LPKI is so suitable for mobile
environments and for applications such as mobile commerce where the security is
the great concern.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 16:12:49 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 20:23:32 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 13:50:44 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Mar 2012 21:18:11 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Toorani",
"M.",
""
],
[
"Beheshti",
"A. A.",
""
]
] |
new_dataset
| 0.981069 |
1002.3316
|
Mohsen Toorani
|
M. Toorani, A. A. Beheshti
|
A Directly Public Verifiable Signcryption Scheme based on Elliptic
Curves
|
4 Pages, 2 Figures, 2 Tables
|
Proceedings of the 14th IEEE Symposium on Computers and
Communications (ISCC'09), pp.713-716, July 2009
|
10.1109/ISCC.2009.5202242
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A directly public verifiable signcryption scheme is introduced in this paper
that provides the security attributes of message confidentiality,
authentication, integrity, non-repudiation, unforgeability, and forward secrecy
of message confidentiality. It provides the attribute of direct public
verifiability so anyone can verify the signcryption without any need for any
secret information from the corresponding participants. The proposed scheme is
based on elliptic curve cryptography and is so suitable for environments with
resource constraints.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 17:18:28 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2010 08:00:19 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 13:48:35 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Mar 2012 21:17:08 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Toorani",
"M.",
""
],
[
"Beheshti",
"A. A.",
""
]
] |
new_dataset
| 0.955866 |
1002.3567
|
Mohsen Toorani
|
M. Toorani, A. Falahati
|
A Secure Variant of the Hill Cipher
|
4 Pages, 4 Figures
|
Proceedings of the 14th IEEE Symposium on Computers and
Communications (ISCC'09), pp.313-316, July 2009
|
10.1109/ISCC.2009.5202241
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Hill cipher is a classical symmetric encryption algorithm that succumbs
to the know-plaintext attack. Although its vulnerability to cryptanalysis has
rendered it unusable in practice, it still serves an important pedagogical role
in cryptology and linear algebra. In this paper, a variant of the Hill cipher
is introduced that makes the Hill cipher secure while it retains the
efficiency. The proposed scheme includes a ciphering core for which a
cryptographic protocol is introduced.
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2010 16:41:18 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 20:30:25 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Jul 2011 13:46:17 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Mar 2012 21:20:04 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Toorani",
"M.",
""
],
[
"Falahati",
"A.",
""
]
] |
new_dataset
| 0.99762 |
1102.4034
|
Jayita Das
|
Jayita Das, Syed M. Alam, Srinath Rajaram, Sanjukta Bhanja
|
Hybrid CMOS-MQCA Logic Architectures using Multi-Layer Spintronic
Devices
|
The paper has been withdrawn
| null | null | null |
cs.ET cond-mat.mes-hall
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel hybrid CMOS-MQCA architecture using multi-layer Spintronic
devices as computing elements. A feasibility study is presented with 22nm CMOS
where new approaches for spin transfer torque induced clocking and read-out
scheme for variability-tolerance are introduced. A first-of-its-kind Spintronic
device model enables circuit simulation using existing CAD infrastructure.
Approximately 70% reduction in energy consumption is observed when compared
against conventional field-induced clocking scheme.
|
[
{
"version": "v1",
"created": "Sun, 20 Feb 2011 00:27:17 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Mar 2012 05:09:18 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Das",
"Jayita",
""
],
[
"Alam",
"Syed M.",
""
],
[
"Rajaram",
"Srinath",
""
],
[
"Bhanja",
"Sanjukta",
""
]
] |
new_dataset
| 0.971515 |
1202.0864
|
Aria Ghasemian Sahebi
|
Aria G. Sahebi and S. Sandeep Pradhan
|
Nested Lattice Codes for Arbitrary Continuous Sources and Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we show that nested lattice codes achieve the capacity of
arbitrary channels with or without non-casual state information at the
transmitter. We also show that nested lattice codes are optimal for source
coding with or without non-causal side information at the receiver for
arbitrary continuous sources.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2012 03:04:03 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Mar 2012 05:38:07 GMT"
},
{
"version": "v3",
"created": "Sat, 17 Mar 2012 06:02:45 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Sahebi",
"Aria G.",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
new_dataset
| 0.987195 |
1202.1896
|
Ton Kloks
|
Ton Kloks, Sheung-Hung Poon and Yue-Li Wang
|
The black-and-white coloring problem on circle graphs
|
This paper has been withdrawn by the author due to a critical mistake
in the circle graph algorithm
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a graph G and integers b and w. The black-and-white coloring problem
asks if there exist disjoint sets of vertices B and W with |B|=b and |W|=w such
that no two vertices x in B and y in W are adjacent. In this paper we show that
the problem is polynomial when restricted to permutation graphs and, more
generally, to circle graphs.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2012 06:36:08 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Mar 2012 23:43:53 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Kloks",
"Ton",
""
],
[
"Poon",
"Sheung-Hung",
""
],
[
"Wang",
"Yue-Li",
""
]
] |
new_dataset
| 0.999098 |
1203.0088
|
Panigrahy Rina
|
Rina Panigrahy, Li Zhang
|
The Mind Grows Circuits
| null | null | null | null |
cs.AI cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a vast supply of prior art that study models for mental processes.
Some studies in psychology and philosophy approach it from an inner perspective
in terms of experiences and percepts. Others such as neurobiology or
connectionist-machines approach it externally by viewing the mind as complex
circuit of neurons where each neuron is a primitive binary circuit. In this
paper, we also model the mind as a place where a circuit grows, starting as a
collection of primitive components at birth and then builds up incrementally in
a bottom up fashion. A new node is formed by a simple composition of prior
nodes when we undergo a repeated experience that can be described by that
composition. Unlike neural networks, however, these circuits take "concepts" or
"percepts" as inputs and outputs. Thus the growing circuits can be likened to a
growing collection of lambda expressions that are built on top of one another
in an attempt to compress the sensory input as a heuristic to bound its
Kolmogorov Complexity.
|
[
{
"version": "v1",
"created": "Thu, 1 Mar 2012 04:20:03 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Mar 2012 19:32:10 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Panigrahy",
"Rina",
""
],
[
"Zhang",
"Li",
""
]
] |
new_dataset
| 0.986893 |
1203.4043
|
Shah Mahmood Mr.
|
Shah Mahmood and Yvo Desmedt
|
Your Facebook Deactivated Friend or a Cloaked Spy (Extended Abstract)
|
Full paper is presented at IEEE International Workshop on Security
and Social Networking SESOC 2012, Lugano, Switzerland
| null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With over 750 million active users, Facebook is the most famous social
networking website. One particular aspect of Facebook widely discussed in the
news and heavily researched in academic circles is the privacy of its users. In
this paper we introduce a zero day privacy loophole in Facebook. We call this
the deactivated friend attack. The concept of the attack is very similar to
cloaking in Star Trek while its seriousness could be estimated from the fact
that once the attacker is a friend of the victim, it is highly probable the
attacker has indefinite access to the victims private information in a cloaked
way. We demonstrate the impact of the attack by showing the ease of gaining
trust of Facebook users and being befriended online. With targeted friend
requests we were able to add over 4300 users and maintain access to their
Facebook profile information for at least 261 days. No user was able to
unfriend us during this time due to cloaking and short de-cloaking sessions.
The short de-cloaking sessions were enough to get updates about the victims. We
also provide several solutions for the loophole, which range from mitigation to
a permanent solution
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2012 06:33:44 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Mahmood",
"Shah",
""
],
[
"Desmedt",
"Yvo",
""
]
] |
new_dataset
| 0.995578 |
1203.4154
|
Marios Karagiannis
|
Marios Karagiannis, Laetitia Dallinge, Jose Rolim
|
Irida: A real-time Wireless Sensor Network visualization feedback
protocol
|
7 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe the implementation of a real time visualization
and feedback system for Wireless Sensor Network algorithms. The system is based
on a fixed hardware testbed, which is deployed on a vertical flat surface and a
feedback loop system that takes information about the current state of the
network and projects this state, in a visual way, on the surface itself using a
video projector. The protocol used is open and simple to use, and can be easily
adapted for different hardware configurations. We call our system Irida.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2012 16:28:00 GMT"
}
] | 2012-03-20T00:00:00 |
[
[
"Karagiannis",
"Marios",
""
],
[
"Dallinge",
"Laetitia",
""
],
[
"Rolim",
"Jose",
""
]
] |
new_dataset
| 0.999251 |
1203.0369
|
Ak Rs
|
Abhijit Chowdhury (NSHM College of Management & Technology, Durgapur
West Bengal, INDIA), Angshu Kumar Sinha (NSHM College of Management &
Technology, Durgapur West Bengal, INDIA) Saurabh Dutta (Dr. B.C Roy
Engineering College West Bengal, INDIA)
|
Introduction of a Triple Prime Symmetric Key Block Cipher
| null |
International Journal of Computer Applications (0975 - 8887)
Volume 39 - No.7, February 2012
|
10.5120/4831-7089
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes to put forward an innovative algorithm for symmetric key
block cipher named as "Triple Prime Symmetric Key Block Cipher with Variable
Key-Spaces (TPSKBCVK)" that employs triple prime integers as private key-spaces
of varying lengths to encrypt data files. Principles of modular arithmetic have
been elegantly used in the proposed idea of the cipher. Depending on
observations of the results of implementation of the proposed cipher on a set
of real data files of several types, all results are registered and analyzed.
The strength of the underlying design of the cipher and the liberty of using a
long key-space expectedly makes it reasonably non-susceptible against possible
cryptanalytic intrusions. As a future scope of the work, it is intended to
formulate and employ an improved scheme that will use a carrier media (image or
multimedia data file) for a secure transmission of the private keys.
|
[
{
"version": "v1",
"created": "Fri, 2 Mar 2012 04:50:35 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Chowdhury",
"Abhijit",
"",
"NSHM College of Management & Technology, Durgapur\n West Bengal, INDIA"
],
[
"Sinha",
"Angshu Kumar",
"",
"NSHM College of Management &\n Technology, Durgapur West Bengal, INDIA"
],
[
"Dutta",
"Saurabh",
"",
"Dr. B.C Roy\n Engineering College West Bengal, INDIA"
]
] |
new_dataset
| 0.98857 |
1203.3574
|
Ingmar Steiner
|
Ingmar Steiner (INRIA Lorraine - LORIA), Slim Ouni (INRIA Lorraine -
LORIA)
|
Artimate: an articulatory animation framework for audiovisual speech
synthesis
|
Workshop on Innovation and Applications in Speech Technology (2012)
| null | null | null |
cs.HC cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a modular framework for articulatory animation synthesis using
speech motion capture data obtained with electromagnetic articulography (EMA).
Adapting a skeletal animation approach, the articulatory motion data is applied
to a three-dimensional (3D) model of the vocal tract, creating a portable
resource that can be integrated in an audiovisual (AV) speech synthesis
platform to provide realistic animation of the tongue and teeth for a virtual
character. The framework also provides an interface to articulatory animation
synthesis, as well as an example application to illustrate its use with a 3D
game engine. We rely on cross-platform, open-source software and open standards
to provide a lightweight, accessible, and portable workflow.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2012 21:23:45 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Steiner",
"Ingmar",
"",
"INRIA Lorraine - LORIA"
],
[
"Ouni",
"Slim",
"",
"INRIA Lorraine -\n LORIA"
]
] |
new_dataset
| 0.972385 |
1203.3593
|
Erik Vee
|
Peiji Chen, Wenjing Ma, Srinath Mandalapu, Chandrashekhar Nagarajan,
Jayavel Shanmugasundaram, Sergei Vassilvitskii, Erik Vee, Manfai Yu, Jason
Zien
|
Ad Serving Using a Compact Allocation Plan
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A large fraction of online display advertising is sold via guaranteed
contracts: a publisher guarantees to the advertiser a certain number of user
visits satisfying the targeting predicates of the contract. The publisher is
then tasked with solving the ad serving problem - given a user visit, which of
the thousands of matching contracts should be displayed, so that by the
expiration time every contract has obtained the requisite number of user
visits. The challenges of the problem come from (1) the sheer size of the
problem being solved, with tens of thousands of contracts and billions of user
visits, (2) the unpredictability of user behavior, since these contracts are
sold months ahead of time, when only a forecast of user visits is available and
(3) the minute amount of resources available online, as an ad server must
respond with a matching contract in a fraction of a second.
We present a solution to the guaranteed delivery ad serving problem using
{\em compact allocation plans}. These plans, computed offline, can be
efficiently queried by the ad server during an ad call; they are small, using
only O(1) space for contract; and are stateless, allowing for distributed
serving without any central coordination. We evaluate this approach on a real
set of user visits and guaranteed contracts and show that the compact
allocation plans are an effective way of solving the guaranteed delivery ad
serving problem.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2012 00:31:18 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Chen",
"Peiji",
""
],
[
"Ma",
"Wenjing",
""
],
[
"Mandalapu",
"Srinath",
""
],
[
"Nagarajan",
"Chandrashekhar",
""
],
[
"Shanmugasundaram",
"Jayavel",
""
],
[
"Vassilvitskii",
"Sergei",
""
],
[
"Vee",
"Erik",
""
],
[
"Yu",
"Manfai",
""
],
[
"Zien",
"Jason",
""
]
] |
new_dataset
| 0.972856 |
1203.3613
|
K.S.Kuppusamy
|
K.S. Kuppusamy and G. Aghila
|
Morpes: A Model for Personalized Rendering of Web Content on Mobile
Devices
|
10 Pages, 2 Figures
|
International Journal in Foundations of Computer Science &
Technology (IJFCST),Vol. 2, No.2, March 2012
|
10.5121/ijfcst.2012.2204
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the tremendous growth in the information communication sector, the
mobile phones have become the prime information communication devices. The
convergence of traditional telephony with the modern web enabled communication
in the mobile devices has made the communication much effective and simpler. As
mobile phones are becoming the crucial source of accessing the contents of the
World Wide Web which was originally designed for personal computers, has opened
up a new challenge of accommodating the web contents in to the smaller mobile
devices. This paper proposes an approach towards building a model for rendering
the web pages in mobile devices. The proposed model is based on a
multi-dimensional web page segment evaluation model. The incorporation of
personalization in the proposed model makes the rendering user-centric. The
proposed model is validated with a prototype implementation.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2012 04:28:00 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Kuppusamy",
"K. S.",
""
],
[
"Aghila",
"G.",
""
]
] |
new_dataset
| 0.962986 |
1203.3323
|
Al-Sakib Khan Pathan
|
Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan
|
IDPS: An Integrated Intrusion Handling Model for Cloud
|
18 pages. Accepted paper and to be published in International Journal
of Computing & Information Technology
| null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today, many organizations are moving their computing services towards the
Cloud. This makes their computer processing available much more conveniently to
users. However, it also brings new security threats and challenges about safety
and reliability. In fact, Cloud Computing is an attractive and cost-saving
service for buyers as it provides accessibility and reliability options for
users and scalable sales for providers. In spite of being attractive, Cloud
feature poses various new security threats and challenges when it comes to
deploying Intrusion Detection System (IDS) in Cloud environments. Most
Intrusion Detection Systems (IDSs) are designed to handle specific types of
attacks. It is evident that no single technique can guarantee protection
against future attacks. Hence, there is a need for an integrated scheme which
can provide robust protection against a complete spectrum of threats. On the
other hand, there is great need for technology that enables the network and its
hosts to defend themselves with some level of intelligence in order to
accurately identify and block malicious traffic and activities. In this case,
it is called Intrusion prevention system (IPS). Therefore, in this paper, we
emphasize on recent implementations of IDS on Cloud Computing environments in
terms of security and privacy. We propose an effective and efficient model
termed as the Integrated Intrusion Detection and Prevention System (IDPS) which
combines both IDS and IPS in a single mechanism. Our mechanism also integrates
two techniques namely, Anomaly Detection (AD) and Signature Detection (SD) that
can work in cooperation to detect various numbers of attacks and stop them
through the capability of IPS.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2012 11:12:08 GMT"
}
] | 2012-03-16T00:00:00 |
[
[
"Alsafi",
"Hassen Mohammed",
""
],
[
"Abduallah",
"Wafaa Mustafa",
""
],
[
"Pathan",
"Al-Sakib Khan",
""
]
] |
new_dataset
| 0.998273 |
1203.2999
|
Neeraj Chasta
|
Neeraj K. Chasta
|
High Speed, Low Power Current Comparators with Hysteresis
| null |
International Journal of VLSI design & Communication Systems
(VLSICS) Vol.3, No.1, February 2012, 85-96
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper, presents a novel idea for analog current comparison which
compares input signal current and reference currents with high speed, low power
and well controlled hysteresis. Proposed circuit is based on current mirror and
voltage latching techniques which produces rail to rail output voltage as a
result of current comparison. The same design can be extended to a simple
current comparator without hysteresis (or very less hysteresis), where
comparator gives high accuracy (less than 50nA) and speed at the cost of
moderate power consumption. The comparators are designed optimally and studied
at 180nm CMOS process technology for a supply voltage of 3V.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2012 04:40:07 GMT"
}
] | 2012-03-15T00:00:00 |
[
[
"Chasta",
"Neeraj K.",
""
]
] |
new_dataset
| 0.988901 |
1203.3098
|
Ahmet Husainov A.
|
Ahmet A. Husainov, Ekaterina S. Kudryashova
|
Generalized Asynchronous Systems
|
8 pages
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper is devoted to a mathematical model of concurrency the special case
of which is asynchronous system. Distributed asynchronous automata are
introduced here. It is proved that the Petri nets and transition systems with
independence can be considered like the distributed asynchronous automata. Time
distributed asynchronous automata are defined in standard way by the map which
assigns time intervals to events. It is proved that the time distributed
asynchronous automata are generalized the time Petri nets and asynchronous
systems.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2012 14:37:25 GMT"
}
] | 2012-03-15T00:00:00 |
[
[
"Husainov",
"Ahmet A.",
""
],
[
"Kudryashova",
"Ekaterina S.",
""
]
] |
new_dataset
| 0.986748 |
1203.3178
|
Ashish Mani Mr.
|
Ashish Mani and C. Patvardhan
|
A Fast fixed-point Quantum Search Algorithm by using Disentanglement and
Measurement
|
arXiv admin note: substantial text overlap with arXiv:1102.2332
| null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generic quantum search algorithm searches for target entity in an unsorted
database by repeatedly applying canonical Grover's quantum rotation transform
to reach near the vicinity of the target entity. Thus, upon measurement, there
is a high probability of finding the target entity. However, the number of
times quantum rotation transform is to be applied for reaching near the
vicinity of the target is a function of the number of target entities present
in an unsorted database, which is generally unknown. A wrong estimate of the
number of target entities can lead to overshooting or undershooting the
targets, thus reducing the success probability. Some proposals have been made
to overcome this limitation. These proposals either employ quantum counting to
estimate the number of solutions or fixed-point schemes. This paper proposes a
new scheme for stopping the application of quantum rotation transformation on
reaching near the targets by disentanglement, measurement and subsequent
processing to estimate the distance of the state vector from the target states.
It ensures a success probability, which is greater than half for all
practically significant ratios of the number of target entities to the total
number of entities in a database. The search problem is trivial for remaining
possible ratios. The proposed scheme is simpler than quantum counting and more
efficient than the known fixed-point schemes. It has same order of
computational complexity as canonical Grover`s search algorithm but is slow by
a factor of two and requires two additional ancilla qubits.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2012 19:05:22 GMT"
}
] | 2012-03-15T00:00:00 |
[
[
"Mani",
"Ashish",
""
],
[
"Patvardhan",
"C.",
""
]
] |
new_dataset
| 0.972238 |
1203.2668
|
Qiyan Wang
|
Qiyan Wang, Nikita Borisov
|
Octopus: A Secure and Anonymous DHT Lookup
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed Hash Table (DHT) lookup is a core technique in structured
peer-to-peer (P2P) networks. Its decentralized nature introduces security and
privacy vulnerabilities for applications built on top of them; we thus set out
to design a lookup mechanism achieving both security and anonymity, heretofore
an open problem. We present Octopus, a novel DHT lookup which provides strong
guarantees for both security and anonymity. Octopus uses attacker
identification mechanisms to discover and remove malicious nodes, severely
limiting an adversary's ability to carry out active attacks, and splits lookup
queries over separate anonymous paths and introduces dummy queries to achieve
high levels of anonymity. We analyze the security of Octopus by developing an
event-based simulator to show that the attacker discovery mechanisms can
rapidly identify malicious nodes with low error rate. We calculate the
anonymity of Octopus using probabilistic modeling and show that Octopus can
achieve near-optimal anonymity. We evaluate Octopus's efficiency on Planetlab
with 207 nodes and show that Octopus has reasonable lookup latency and
manageable communication overhead.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2012 22:50:58 GMT"
}
] | 2012-03-14T00:00:00 |
[
[
"Wang",
"Qiyan",
""
],
[
"Borisov",
"Nikita",
""
]
] |
new_dataset
| 0.999392 |
1203.2778
|
Inder Jeet Taneja
|
Inder Jeet Tameja
|
Seven Means, Generalized Triangular Discrimination, and Generating
Divergence Measures
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From geometrical point of view, Eve (2003) studied seven means. These means
are Harmonic, Geometric, Arithmetic, Heronian, Contra-harmonic, Root-mean
square and Centroidal mean. We have considered for the first time a new measure
calling generalized triangular discrimination. Inequalities among non-negative
differences arising due to seven means and particular cases of generalized
triangular discrimination are considered. Some new generating measures and
their exponential representations are also presented.
|
[
{
"version": "v1",
"created": "Tue, 13 Mar 2012 11:38:28 GMT"
}
] | 2012-03-14T00:00:00 |
[
[
"Tameja",
"Inder Jeet",
""
]
] |
new_dataset
| 0.958616 |
1203.2809
|
Mounira Kourjieh
|
Yannick Chevalier (IRIT), Mounira Kourjieh (INRIA Lorraine - LORIA /
LIFC)
|
Automated Synthesis of a Finite Complexity Ordering for Saturation
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper a new procedure to saturate a set of clauses with
respect to a well-founded ordering on ground atoms such that A < B implies
Var(A) {\subseteq} Var(B) for every atoms A and B. This condition is satisfied
by any atom ordering compatible with a lexicographic, recursive, or multiset
path ordering on terms. Our saturation procedure is based on a priori ordered
resolution and its main novelty is the on-the-fly construction of a finite
complexity atom ordering. In contrast with the usual redundancy, we give a new
redundancy notion and we prove that during the saturation a non-redundant
inference by a priori ordered resolution is also an inference by a posteriori
ordered resolution. We also prove that if a set S of clauses is saturated with
respect to an atom ordering as described above then the problem of whether a
clause C is entailed from S is decidable.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2012 19:36:46 GMT"
}
] | 2012-03-14T00:00:00 |
[
[
"Chevalier",
"Yannick",
"",
"IRIT"
],
[
"Kourjieh",
"Mounira",
"",
"INRIA Lorraine - LORIA /\n LIFC"
]
] |
new_dataset
| 0.998667 |
1111.2102
|
Lawrence Ong
|
Lawrence Ong and Sarah J. Johnson
|
The Capacity Region of the Restricted Two-Way Relay Channel with Any
Deterministic Uplink
|
author's final version (accepted and to appear in IEEE Communications
Letters)
|
IEEE Communications Letters, Vol. 16, No. 3, pp. 396-399, Mar.
2012
|
10.1109/LCOMM.2012.011312.112198
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the two-way relay channel (TWRC) where two users
communicate via a relay. For the restricted TWRC where the uplink from the
users to the relay is any deterministic function and the downlink from the
relay to the users is any arbitrary channel, the capacity region is obtained.
The TWRC considered is restricted in the sense that each user can only transmit
a function of its message.
|
[
{
"version": "v1",
"created": "Wed, 9 Nov 2011 04:30:22 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jan 2012 03:59:01 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Ong",
"Lawrence",
""
],
[
"Johnson",
"Sarah J.",
""
]
] |
new_dataset
| 0.992945 |
1203.2299
|
Maxim Makatchev
|
Maxim Makatchev, Reid Simmons, Majd Sakr
|
A Cross-cultural Corpus of Annotated Verbal and Nonverbal Behaviors in
Receptionist Encounters
|
7 pages, 3 figures, presented at the Workshop on Gaze in HRI: From
Modeling to Communication (a Workshop of International Conference on
Human-Robot Interaction), March 5, 2012
| null | null | null |
cs.CL cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the first annotated corpus of nonverbal behaviors in receptionist
interactions, and the first nonverbal corpus (excluding the original video and
audio data) of service encounters freely available online. Native speakers of
American English and Arabic participated in a naturalistic role play at
reception desks of university buildings in Doha, Qatar and Pittsburgh, USA.
Their manually annotated nonverbal behaviors include gaze direction, hand and
head gestures, torso positions, and facial expressions. We discuss possible
uses of the corpus and envision it to become a useful tool for the human-robot
interaction community.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2012 00:45:01 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Makatchev",
"Maxim",
""
],
[
"Simmons",
"Reid",
""
],
[
"Sakr",
"Majd",
""
]
] |
new_dataset
| 0.997713 |
1203.2366
|
Johan Montagnat
|
Franck Michel, Johan Montagnat, Tristan Glatard (CREATIS)
|
Technical support for Life Sciences communities on a production grid
infrastructure
|
HealthGrid'12, Amsterdam : Netherlands (2012)
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Production operation of large distributed computing infrastructures (DCI)
still requires a lot of human intervention to reach acceptable quality of
service. This may be achievable for scientific communities with solid IT
support, but it remains a show-stopper for others. Some application execution
environments are used to hide runtime technical issues from end users. But they
mostly aim at fault-tolerance rather than incident resolution, and their
operation still requires substantial manpower. A longer-term support activity
is thus needed to ensure sustained quality of service for Virtual Organisations
(VO). This paper describes how the biomed VO has addressed this challenge by
setting up a technical support team. Its organisation, tooling, daily tasks,
and procedures are described. Results are shown in terms of resource usage by
end users, amount of reported incidents, and developed software tools. Based on
our experience, we suggest ways to measure the impact of the technical support,
perspectives to decrease its human cost and make it more community-specific.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2012 19:22:51 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Michel",
"Franck",
"",
"CREATIS"
],
[
"Montagnat",
"Johan",
"",
"CREATIS"
],
[
"Glatard",
"Tristan",
"",
"CREATIS"
]
] |
new_dataset
| 0.988522 |
1203.2384
|
Syed Jafar
|
Syed A. Jafar
|
Elements of Cellular Blind Interference Alignment --- Aligned Frequency
Reuse, Wireless Index Coding and Interference Diversity
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore degrees of freedom (DoF) characterizations of partially connected
wireless networks, especially cellular networks, with no channel state
information at the transmitters. Specifically, we introduce three fundamental
elements --- aligned frequency reuse, wireless index coding and interference
diversity --- through a series of examples, focusing first on infinite regular
arrays, then on finite clusters with arbitrary connectivity and message sets,
and finally on heterogeneous settings with asymmetric multiple antenna
configurations. Aligned frequency reuse refers to the optimality of orthogonal
resource allocations in many cases, but according to unconventional reuse
patterns that are guided by interference alignment principles. Wireless index
coding highlights both the intimate connection between the index coding problem
and cellular blind interference alignment, as well as the added complexity
inherent to wireless settings. Interference diversity refers to the observation
that in a wireless network each receiver experiences a different set of
interferers, and depending on the actions of its own set of interferers, the
interference-free signal space at each receiver fluctuates differently from
other receivers, creating opportunities for robust applications of blind
interference alignment principles.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2012 22:59:58 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
]
] |
new_dataset
| 0.972127 |
1203.2400
|
Dr Brij Gupta
|
B. B. Gupta, Manoj Misra and R. C. Joshi
|
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical
Based Approach
| null |
International Journal of Information Assurance and Security
(JIAS), vol. 3, no. 2, pp. 102-110, 2008
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Disruption from service caused by DDoS attacks is an immense threat to
Internet today. These attacks can disrupt the availability of Internet services
completely, by eating either computational or communication resources through
sheer volume of packets sent from distributed locations in a coordinated manner
or graceful degradation of network performance by sending attack traffic at low
rate. In this paper, we describe a novel framework that deals with the
detection of variety of DDoS attacks by monitoring propagation of abrupt
traffic changes inside ISP Domain and then characterizes flows that carry
attack traffic. Two statistical metrics namely, Volume and Flow are used as
parameters to detect DDoS attacks. Effectiveness of an anomaly based detection
and characterization system highly depends on accuracy of threshold value
settings. Inaccurate threshold values cause a large number of false positives
and negatives. Therefore, in our scheme, Six-Sigma and varying tolerance factor
methods are used to identify threshold values accurately and dynamically for
various statistical metrics. NS-2 network simulator on Linux platform is used
as simulation testbed to validate effectiveness of proposed approach. Different
attack scenarios are implemented by varying total number of zombie machines and
at different attack strengths. The comparison with volume-based approach
clearly indicates the supremacy of our proposed system.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2012 04:18:11 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Gupta",
"B. B.",
""
],
[
"Misra",
"Manoj",
""
],
[
"Joshi",
"R. C.",
""
]
] |
new_dataset
| 0.981971 |
1203.2506
|
Balasubramanian Karuppanan
|
Akin Cellatoglu and Balasubramanian Karuppanan
|
Vibrating Cantilever Transducer Incorporated in Dual Diaphragms
Structure for Sensing Differential Pneumatic Pressure
|
15 pages 11 figures AIAA conference Tirunelveli, 2011
|
International Journal on Soft Computing ( IJSC ) Vol.2, No.4,
November 2011, 95-109
|
10.5121/ijsc.2011.2409
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pneumatic pressure cells with thin metallic spherical diaphragm of shallow
spherical shell configuration linked with vibrating wire pickup or vibrating
cantilever pickup were reported in the past. In order to enhance the
sensitivity of the pressure cell this work considers dual diaphragm structure
fitted with cantilever pickup. The design and development of the pressure cell
with this dual diaphragm structure having cantilever pickup is presented here.
The geometrical design is optimally made as to sense either mono pressure or
differential pressure resources. The cantilevers of the two diaphragms are
excited to produce vibrations and the frequencies of vibrations are determined
by picking up signals from orthogonally arranged opto-coupler links. With the
computed frequency a lookup table is referred to obtain the pressure acting on
the concerned diaphragm. In the external circuits, the average pressure and the
differential pressure acting on two diaphragms are computed. Furthermore
transmitting circuits taking the average pressure and differential pressure in
digital form and analogue form to remote area are presented. Performance
analysis of the proposed mechatronic pressure cell is made and its improved
performance over other pressure cells is presented.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2012 14:46:58 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Cellatoglu",
"Akin",
""
],
[
"Karuppanan",
"Balasubramanian",
""
]
] |
new_dataset
| 0.998392 |
1203.2508
|
Balasubramanian Karuppanan
|
A. Cellatoglu and K. Balasubramanian
|
Pneumatic Pressure Cell with Twin Diaphragms Embedding Spherical
Corrugations in a Dual Diaphragm Structure
|
6 pages 9 figures; IJCSI International Journal of Computer Science
Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011 ISSN
(Online): 1694-0814
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Thin metallic shallow spherical diaphragms are being used for measuring
pneumatic pressure in process industries. The drift in vertex realized due to
application of pressure is transformed into electrical signal and this is
calibrated for pressure. We now propose a modified structure for the pressure
cell by having double ended shallow spherical shells embedded with spherical
corrugations as to enhance the sensitivity to a greater extent. By having dual
such installation in the structure of the pressure cell it concedes further
increase in sensitivity. The construction details of the diaphragm structure,
theory and analysis to assess the performance are presented.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2012 14:52:03 GMT"
}
] | 2012-03-13T00:00:00 |
[
[
"Cellatoglu",
"A.",
""
],
[
"Balasubramanian",
"K.",
""
]
] |
new_dataset
| 0.998523 |
1201.0043
|
Mathew Francis
|
Mathew C. Francis, Daniel Gon\c{c}alves, Pascal Ochem
|
The Maximum Clique Problem in Multiple Interval Graphs
|
22 pages
| null | null | null |
cs.DM cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple interval graphs are variants of interval graphs where instead of a
single interval, each vertex is assigned a set of intervals on the real line.
We study the complexity of the MAXIMUM CLIQUE problem in several classes of
multiple interval graphs. The MAXIMUM CLIQUE problem, or the problem of finding
the size of the maximum clique, is known to be NP-complete for $t$-interval
graphs when $t\geq 3$ and polynomial-time solvable when $t=1$. The problem is
also known to be NP-complete in $t$-track graphs when $t\geq 4$ and
polynomial-time solvable when $t\leq 2$. We show that MAXIMUM CLIQUE is already
NP-complete for unit 2-interval graphs and unit 3-track graphs. Further, we
show that the problem is APX-complete for 2-interval graphs, 3-track graphs,
unit 3-interval graphs and unit 4-track graphs. We also introduce two new
classes of graphs called $t$-circular interval graphs and $t$-circular track
graphs and study the complexity of the MAXIMUM CLIQUE problem in them. On the
positive side, we present a polynomial time $t$-approximation algorithm for
WEIGHTED MAXIMUM CLIQUE on $t$-interval graphs, improving earlier work with
approximation ratio $4t$.
|
[
{
"version": "v1",
"created": "Fri, 30 Dec 2011 00:38:07 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Mar 2012 10:03:51 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Francis",
"Mathew C.",
""
],
[
"Gonçalves",
"Daniel",
""
],
[
"Ochem",
"Pascal",
""
]
] |
new_dataset
| 0.997868 |
1201.2107
|
Naagesh Bhat S
|
Naagesh S. Bhat
|
Design and ASIC implementation of DUC/DDC for communication systems
| null |
International Journal of VLSI design & Communication Systems
(VLSICS) Vol.2, No.4, December 2011
|
10.5121/vlsic.2011.2410
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Communication systems use the concept of transmitting information using the
electrical distribution network as a communication channel. To enable the
transmission data signal modulated on a carrier signal is superimposed on the
electrical wires. Typical power lines are designed to handle 50/60 Hz of AC
power signal; however they can carry the signals up to 500 KHz frequency. This
work aims to aid transmission/reception of an audio signal in the spectrum from
300 Hz to 4000 Hz using PLCC on a tunable carrier frequency in the spectrum
from 200 KHz to 500 KHz. For digital amplitude modulation the sampling rate of
the carrier and the audio signal has to be matched. Tunable carrier generation
can be achieved with Direct Digital Synthesizers at a desired sampling rate.
DSP Sample rate conversion techniques are very useful to make the sampling
circuits to work on their own sampling rates which are fine for the
data/modulated-carrier signal's bandwidth. This also simplifies the complexity
of the sampling circuits. Digital Up Conversion (DUC) and Digital Down
Conversion (DDC) are DSP sample rate conversion techniques which refer to
increasing and decreasing the sampling rate of a signal respectively.
|
[
{
"version": "v1",
"created": "Tue, 10 Jan 2012 16:46:57 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Bhat",
"Naagesh S.",
""
]
] |
new_dataset
| 0.978053 |
1203.1964
|
Jean Maitem
|
Jean Maitem, Rosmina Joy Cabauatan, Lorena Rabago, Bartolome Tanguilig
III
|
Math world: A game-based 3D Virtual Learning Environment (3D VLE) for
second graders
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper intends to introduce a game-based 3D Virtual Learning Environment
(VLE) to second graders. The impetus arose from the need to make learning in
mathematics more effective and interesting through multimedia. Applied in a
game, the basic mathematical operations such as addition, subtraction,
multiplication, and division are expected to performed by learners as they
represent themselves as avatars while they immerse in a quest of digital
objects in the VLE called Math World. Educational attributes such as mentality
change, emotional fulfillment, knowledge enhancement, thinking skills
development, and bodily coordination are evaluated to ensure learning
effectiveness. Also, game playability measured in terms of game plays, story,
mechanics and interface usability are examined for its educative design. With
an aggregate of these enhanced indices, results attest that objectives were met
while making mathematics an interesting, motivating and enjoyable subject,
hence VLE a significant tool to complement the conventional approaches of
teaching.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2012 00:08:43 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Maitem",
"Jean",
""
],
[
"Cabauatan",
"Rosmina Joy",
""
],
[
"Rabago",
"Lorena",
""
],
[
"Tanguilig",
"Bartolome",
"III"
]
] |
new_dataset
| 0.999606 |
1203.1971
|
Naagesh Bhat S
|
Naagesh S. Bhat
|
Design and modelling of different SRAM's based on CNTFET 32nm technology
|
15 Pages
|
International Journal of VLSI design & Communication Systems
(VLSICS) Vol.3, No.1, February 2012
|
10.5121/vlsic.2012.3106
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Carbon nanotube field-effect transistor (CNTFET) refers to a field-effect
transistor that utilizes a single carbon nanotube or an array of carbon
nanotubes as the channel material instead of bulk silicon in the traditional
MOSFET structure. Since it was first demonstrated in 1998, there have been
tremendous developments in CNTFETs, which promise for an alternative material
to replace silicon in future electronics. Carbon nanotubes are promising
materials for the nano-scale electron devices such as nanotube FETs for
ultra-high density integrated circuits and quantum-effect devices for novel
intelligent circuits, which are expected to bring a breakthrough in the present
silicon technology.
A Static Random Access Memory (SRAM) is designed to plug two needs: i) The
SRAM provides as cache memory, communicating between central processing unit
and Dynamic Random Access Memory (DRAM). ii) The SRAM technology act as driving
force for low power application since SRAM is portable compared to DRAM, and
SRAM doesn't require any refresh current. On the basis of acquired knowledge,
we present different SRAM's designed for the conventional CNTFET. HSPICE
simulations of this circuit using Stanford CNTFET model shows a great
improvement in power saving.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2012 01:59:33 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Bhat",
"Naagesh S.",
""
]
] |
new_dataset
| 0.999754 |
1203.2044
|
Haboub Rachid
|
Rachid Haboub and Mohammed Ouzzif
|
Secure and reliable routing in mobile adhoc networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The growing diffusion of wireless-enabled portable devices and the recent
advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can
benefit from anywhere and at any time for impromptu collaboration. However,
energy constrained nodes, low channel bandwidth, node mobility, high channel
error rates, channel variability and packet loss are some of the limitations of
MANETs. MANETs presents also security challenges. These networks are prone to
malicious users attack, because any device within the frequency range can get
access to the MANET. There is a need for security mechanisms aware of these
challenges. Thus, this work aims to provide a secure MANET by changing the
frequency of data transmission. This security approach was tested, and the
results shows an interesting decreased of throughput from malicious node when
the number of frequency used is increased, that way the MANET will not waste
it's resources treating malicious packets. The other contribution of this work
is a mobility aware routing approach, which aims to provide a more reliable
routing by handling effectively the nodes mobility.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2012 11:20:03 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Haboub",
"Rachid",
""
],
[
"Ouzzif",
"Mohammed",
""
]
] |
new_dataset
| 0.995883 |
1203.2147
|
Sudheer Gopinathan Dr
|
G.Sudheer and B.V.S.Renuka Devi
|
A Hybrid Image Cryptosystem Based On OMFLIP Permutation Cipher
|
8 pages
|
Signal & Image Processing : An International Journal (SIPIJ)
Vol.3, No.1, February 2012
| null | null |
cs.MM cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The protection of confidential image data from unauthorized access is an
important area of research in network communication. This paper presents a
high-level security encryption scheme for gray scale images. The gray level
image is first decomposed into binary images using bit scale decomposition.
Each binary image is then compressed by selecting a good scanning path that
minimizes the total number of bits needed to encode the bit sequence along the
scanning path using two dimensional run encoding. The compressed bit string is
then scrambled iteratively using a pseudo-random number generator and finally
encrypted using a bit level permutation OMFLIP. The performance is tested,
illustrated and discussed.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2012 17:43:28 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Sudheer",
"G.",
""
],
[
"Devi",
"B. V. S. Renuka",
""
]
] |
new_dataset
| 0.977275 |
1203.2167
|
Naagesh Bhat S
|
Naagesh S. Bhat
|
Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA
|
5 Pages, 11 Figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The IEEE 802.15.4 is a wireless standard introduced for low power, low cost
wireless communication with moderate data rates. In the next few years, it is
expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used
in a wide variety of embedded applications, including home automation,
industrial sensing and control, environmental monitoring and sensing. In these
applications, numerous embedded devices running on batteries are distributed in
an area communicating via wireless radios. This work presents a method which
can be used for comparing current consumption of wireless data transfer
embedded systems. This paper implements a small subset of the IEEE 802.15.4
protocol to achieve a point to point communication. The implemented protocol
uses 802.15.4 MAC compliant data and acknowledgment packets. Current
consumption is measured while doing one data packet transmission. Measurements
are compared with existing work. IEEE 802.15.4 protocol implementation is done
using Verilog language. Code implementation is done in such a manner so that it
can be ported to any platform with minimal changes. It can also be modified to
suit any special experimental setup requirements.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2012 20:01:37 GMT"
}
] | 2012-03-12T00:00:00 |
[
[
"Bhat",
"Naagesh S.",
""
]
] |
new_dataset
| 0.969041 |
1203.1448
|
Barak Pearlmutter
|
Alexey Radul and Barak A. Pearlmutter and Jeffrey Mark Siskind
|
AD in Fortran, Part 1: Design
| null | null | null | null |
cs.PL cs.MS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose extensions to Fortran which integrate forward and reverse
Automatic Differentiation (AD) directly into the programming model.
Irrespective of implementation technology, embedding AD constructs directly
into the language extends the reach and convenience of AD while allowing
abstraction of concepts of interest to scientific-computing practice, such as
root finding, optimization, and finding equilibria of continuous games.
Multiple different subprograms for these tasks can share common interfaces,
regardless of whether and how they use AD internally. A programmer can maximize
a function F by calling a library maximizer, XSTAR=ARGMAX(F,X0), which
internally constructs derivatives of F by AD, without having to learn how to
use any particular AD tool. We illustrate the utility of these extensions by
example: programs become much more concise and closer to traditional
mathematical notation. A companion paper describes how these extensions can be
implemented by a program that generates input to existing Fortran-based AD
tools.
|
[
{
"version": "v1",
"created": "Wed, 7 Mar 2012 12:04:05 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Mar 2012 09:51:03 GMT"
}
] | 2012-03-09T00:00:00 |
[
[
"Radul",
"Alexey",
""
],
[
"Pearlmutter",
"Barak A.",
""
],
[
"Siskind",
"Jeffrey Mark",
""
]
] |
new_dataset
| 0.971983 |
1203.1513
|
Joan Bruna
|
Joan Bruna and St\'ephane Mallat
|
Invariant Scattering Convolution Networks
|
15 pages double column, 9 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A wavelet scattering network computes a translation invariant image
representation, which is stable to deformations and preserves high frequency
information for classification. It cascades wavelet transform convolutions with
non-linear modulus and averaging operators. The first network layer outputs
SIFT-type descriptors whereas the next layers provide complementary invariant
information which improves classification. The mathematical analysis of wavelet
scattering networks explains important properties of deep convolution networks
for classification.
A scattering representation of stationary processes incorporates higher order
moments and can thus discriminate textures having the same Fourier power
spectrum. State of the art classification results are obtained for handwritten
digits and texture discrimination, using a Gaussian kernel SVM and a generative
PCA classifier.
|
[
{
"version": "v1",
"created": "Mon, 5 Mar 2012 17:12:42 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Mar 2012 10:29:32 GMT"
}
] | 2012-03-09T00:00:00 |
[
[
"Bruna",
"Joan",
""
],
[
"Mallat",
"Stéphane",
""
]
] |
new_dataset
| 0.974745 |
1203.1633
|
Nathaniel Johnston
|
Nathaniel Johnston
|
The Complexity of the Puzzles of Final Fantasy XIII-2
|
16 pages, 9 figures
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the computational complexity of solving the three "temporal rift"
puzzles in the recent popular video game Final Fantasy XIII-2. We show that the
Tile Trial puzzle is NP-hard and we provide an efficient algorithm for solving
the Crystal Bonds puzzle. We also show that slight generalizations of the
Crystal Bonds and Hands of Time puzzles are NP-hard.
|
[
{
"version": "v1",
"created": "Wed, 7 Mar 2012 21:05:24 GMT"
}
] | 2012-03-09T00:00:00 |
[
[
"Johnston",
"Nathaniel",
""
]
] |
new_dataset
| 0.988956 |
1112.1186
|
Olivier Finkel
|
Olivier Finkel (ELM)
|
The Determinacy of Context-Free Games
|
To appear in the Proceedings of the 29 th International Symposium on
Theoretical Aspects of Computer Science, STACS 2012
| null |
10.4230/LIPIcs.STACS.2012.555
| null |
cs.GT cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that the determinacy of Gale-Stewart games whose winning sets are
accepted by real-time 1-counter B\"uchi automata is equivalent to the
determinacy of (effective) analytic Gale-Stewart games which is known to be a
large cardinal assumption. We show also that the determinacy of Wadge games
between two players in charge of omega-languages accepted by 1-counter B\"uchi
automata is equivalent to the (effective) analytic Wadge determinacy. Using
some results of set theory we prove that one can effectively construct a
1-counter B\"uchi automaton A and a B\"uchi automaton B such that: (1) There
exists a model of ZFC in which Player 2 has a winning strategy in the Wadge
game W(L(A), L(B)); (2) There exists a model of ZFC in which the Wadge game
W(L(A), L(B)) is not determined. Moreover these are the only two possibilities,
i.e. there are no models of ZFC in which Player 1 has a winning strategy in the
Wadge game W(L(A), L(B)).
|
[
{
"version": "v1",
"created": "Tue, 6 Dec 2011 07:58:59 GMT"
}
] | 2012-03-08T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
]
] |
new_dataset
| 0.992471 |
1203.1466
|
Riccardo Murri
|
Riccardo Murri and Sergio Maffioletti
|
Batch-oriented software appliances
|
11 pages, no figures. Submitted to VTDC'12
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents AppPot, a system for creating Linux software appliances.
AppPot can be run as a regular batch or grid job and executed in user space,
and requires no special virtualization support in the infrastructure.
The main design goal of AppPot is to bring the benefits of a
virtualization-based IaaS cloud to existing batch-oriented computing
infrastructures.
In particular, AppPot addresses the application deployment and configuration
on large heterogeneous computing infrastructures: users are enabled to prepare
their own customized virtual appliance for providing a safe execution
environment for their applications. These appliances can then be executed on
virtually any computing infrastructure being in a private or public cloud as
well as any batch-controlled computing clusters the user may have access to.
We give an overview of AppPot and its features, the technology that makes it
possible, and report on experiences running it in production use within the
Swiss National Grid infrastructure SMSCG.
|
[
{
"version": "v1",
"created": "Wed, 7 Mar 2012 13:45:24 GMT"
}
] | 2012-03-08T00:00:00 |
[
[
"Murri",
"Riccardo",
""
],
[
"Maffioletti",
"Sergio",
""
]
] |
new_dataset
| 0.994053 |
1103.3641
|
Jens Zumbr\"agel
|
Jens Zumbr\"agel, Vitaly Skachek, and Mark F. Flanagan
|
On the Pseudocodeword Redundancy of Binary Linear Codes
|
14 pages. arXiv admin note: substantial text overlap with
arXiv:1005.3486
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The AWGNC, BSC, and max-fractional pseudocodeword redundancies of a binary
linear code are defined to be the smallest number of rows in a parity-check
matrix such that the corresponding minimum pseudoweight is equal to the minimum
Hamming distance of the code. It is shown that most codes do not have a finite
pseudocodeword redundancy. Also, upper bounds on the pseudocodeword redundancy
for some families of codes, including codes based on designs, are provided. The
pseudocodeword redundancies for all codes of small length (at most 9) are
computed. Furthermore, comprehensive results are provided on the cases of
cyclic codes of length at most 250 for which the eigenvalue bound of Vontobel
and Koetter is sharp.
|
[
{
"version": "v1",
"created": "Fri, 18 Mar 2011 14:57:28 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Mar 2012 13:33:00 GMT"
}
] | 2012-03-07T00:00:00 |
[
[
"Zumbrägel",
"Jens",
""
],
[
"Skachek",
"Vitaly",
""
],
[
"Flanagan",
"Mark F.",
""
]
] |
new_dataset
| 0.988114 |
1203.1097
|
Abhijeet Bhorkar
|
Abhijeet Bhorkar, Mohammad Naghshwar, Tara Javidi
|
Opportunistic Routing with Congestion Diversity in Wireless Ad-hoc
Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of routing packets across a multi-hop network
consisting of multiple sources of traffic and wireless links while ensuring
bounded expected delay. Each packet transmission can be overheard by a random
subset of receiver nodes among which the next relay is selected
opportunistically.
The main challenge in the design of minimum-delay routing policies is
balancing the trade-off between routing the packets along the shortest paths to
the destination and distributing traffic according to the maximum backpressure.
Combining important aspects of shortest path and backpressure routing, this
paper provides a systematic development of a distributed opportunistic routing
policy with congestion diversity ({D-ORCD}).
{D-ORCD} uses a measure of draining time to opportunistically identify and
route packets along the paths with an expected low overall congestion. {D-ORCD}
is proved to ensure a bounded expected delay for all networks and under any
admissible traffic. Furthermore, this paper proposes a practical implementation
which empirically optimizes critical algorithm parameters and their effects on
delay as well as protocol overhead. Realistic Qualnet simulations for
802.11-based networks demonstrate a significant improvement in the average
delay over comparative solutions in the literature. %Finally, various practical
modifications to {D-ORCD} are proposed and their performance are evaluated.
|
[
{
"version": "v1",
"created": "Tue, 6 Mar 2012 04:30:05 GMT"
}
] | 2012-03-07T00:00:00 |
[
[
"Bhorkar",
"Abhijeet",
""
],
[
"Naghshwar",
"Mohammad",
""
],
[
"Javidi",
"Tara",
""
]
] |
new_dataset
| 0.99721 |
0907.3208
|
Serge Gaspers
|
Fedor V. Fomin, Serge Gaspers, Saket Saurabh, and St\'ephan Thomass\'e
|
A Linear Vertex Kernel for Maximum Internal Spanning Tree
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a polynomial time algorithm that for any graph G and integer k >=
0, either finds a spanning tree with at least k internal vertices, or outputs a
new graph G' on at most 3k vertices and an integer k' such that G has a
spanning tree with at least k internal vertices if and only if G' has a
spanning tree with at least k' internal vertices. In other words, we show that
the Maximum Internal Spanning Tree problem parameterized by the number of
internal vertices k, has a 3k-vertex kernel. Our result is based on an
innovative application of a classical min-max result about hypertrees in
hypergraphs which states that "a hypergraph H contains a hypertree if and only
if H is partition connected."
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 18:50:55 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Mar 2012 18:23:27 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Fomin",
"Fedor V.",
""
],
[
"Gaspers",
"Serge",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Thomassé",
"Stéphan",
""
]
] |
new_dataset
| 0.999377 |
1112.1308
|
Alexey Pospelov
|
Markus Bl\"aser, Jean-S\'ebastien Coron, Alexey Pospelov
|
Small Private Circuits
|
Withdrawing while fixing a flaw in the proof
| null | null | null |
cs.CR cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ishai, Sahai, and Wagner initiated in 2003 the theoretical study of securing
a circuit against an adversary who can probe its wires. They presented a
universal way of transforming an arbitrary boolean circuit of size s into a
circuit of size linear in s and quadratic in t, with perfect security against
an adversary who can read up to t wires of the circuit. We present a new method
for securing circuits against such an adversary with circuit size linear in s
and polylogarithmic in t, while meeting the original privacy requirements from
Ishai et al.
Our solution works for arithmetic circuits over arbitrary fields of positive
characteristic. The improvement from quadratic to quasilinear complexity (in t)
comes from using the DFT instead of naive multiplication.
|
[
{
"version": "v1",
"created": "Tue, 6 Dec 2011 15:15:37 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Mar 2012 21:19:37 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Bläser",
"Markus",
""
],
[
"Coron",
"Jean-Sébastien",
""
],
[
"Pospelov",
"Alexey",
""
]
] |
new_dataset
| 0.981126 |
1203.0640
|
Florentina Pintea
|
Qasim Siddique
|
Kerberos Authentication in Wireless Sensor Networks
|
14 pages
|
Ann. Univ. Tibiscus Comp. Sci. Series VIII / 1 (2010), 67-80
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We proposed an authentication mechanism in the wireless sensor network.
Sensor network uses the Kerberos authentication scheme for the authentication
of bases station in the network. Kerberos provides a centralized authentication
server whose function is to authenticate user by providing him the ticket to
grant request to the base station. In this paper we have provided architecture
for the authentication of base station in the wireless sensor network based on
the Kerberos server authentication scheme.
|
[
{
"version": "v1",
"created": "Sat, 3 Mar 2012 10:34:12 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Siddique",
"Qasim",
""
]
] |
new_dataset
| 0.999386 |
1203.0728
|
Patrick Sol\'e
|
A. Alahmadi, R. E. L. Aldred, R. dela Cruz, P. Sol\'e, C. Thomassen
|
The maximum number of minimal codewords in an $[n,k]-$code
|
6 pp. Submitted
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Upper and lower bounds are derived for the quantity in the title, which is
tabulated for modest values of $n$ and $k.$ An application to graphs with many
cycles is given.
|
[
{
"version": "v1",
"created": "Sun, 4 Mar 2012 11:06:54 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Alahmadi",
"A.",
""
],
[
"Aldred",
"R. E. L.",
""
],
[
"Cruz",
"R. dela",
""
],
[
"Solé",
"P.",
""
],
[
"Thomassen",
"C.",
""
]
] |
new_dataset
| 0.991884 |
1203.0744
|
Shu Kong
|
Shu Kong and Donghui Wang
|
A Report on Multilinear PCA Plus Multilinear LDA to Deal with Tensorial
Data: Visual Classification as An Example
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In practical applications, we often have to deal with high order data, such
as a grayscale image and a video sequence are intrinsically 2nd-order tensor
and 3rd-order tensor, respectively. For doing clustering or classification of
these high order data, it is a conventional way to vectorize these data before
hand, as PCA or FDA does, which often induce the curse of dimensionality
problem. For this reason, experts have developed many methods to deal with the
tensorial data, such as multilinear PCA, multilinear LDA, and so on. In this
paper, we still address the problem of high order data representation and
recognition, and propose to study the result of merging multilinear PCA and
multilinear LDA into one scenario, we name it \textbf{GDA} for the abbreviation
of Generalized Discriminant Analysis. To evaluate GDA, we perform a series of
experiments, and the experimental results demonstrate our GDA outperforms a
selection of competing methods such (2D)$^2$PCA, (2D)$^2$LDA, and MDA.
|
[
{
"version": "v1",
"created": "Sun, 4 Mar 2012 15:00:16 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Kong",
"Shu",
""
],
[
"Wang",
"Donghui",
""
]
] |
new_dataset
| 0.983799 |
1203.0882
|
Subhadip Basu
|
Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita
Nasipuri, Dipak Kumar Basu
|
Handwritten Bangla Alphabet Recognition using an MLP Based Classifier
| null |
Proc. of the 2nd National Conf. on Computer Processing of Bangla,
pp. 285-291, Feb-2005, Dhaka
| null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The work presented here involves the design of a Multi Layer Perceptron (MLP)
based classifier for recognition of handwritten Bangla alphabet using a 76
element feature set Bangla is the second most popular script and language in
the Indian subcontinent and the fifth most popular language in the world. The
feature set developed for representing handwritten characters of Bangla
alphabet includes 24 shadow features, 16 centroid features and 36 longest-run
features. Recognition performances of the MLP designed to work with this
feature set are experimentally observed as 86.46% and 75.05% on the samples of
the training and the test sets respectively. The work has useful application in
the development of a complete OCR system for handwritten Bangla text.
|
[
{
"version": "v1",
"created": "Mon, 5 Mar 2012 12:22:23 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Basu",
"Subhadip",
""
],
[
"Das",
"Nibaran",
""
],
[
"Sarkar",
"Ram",
""
],
[
"Kundu",
"Mahantapas",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
]
] |
new_dataset
| 0.991374 |
1203.0964
|
Fernando Brito e Abreu
|
Fernando Brito e Abreu
|
The cloud paradigm: Are you tuned for the lyrics?
|
Position paper to introduce a keynote, proceedings of WAMPS'2011 - VI
Annual MPS.BR Workshop, pp. 20-25, Campinas, Brazil, October 2011
| null | null | null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Major players, business angels and opinion-makers are broadcasting beguiled
lyrics on the most recent IT hype: your software should ascend to the clouds.
There are many clouds and the stake is high. Distractedly, many of us became
assiduous users of the cloud, but perhaps due to the legacy systems and legacy
knowledge, IT professionals, mainly those many that work in business
information systems for the long tail, are not as much plunged into producing
cloud-based systems for their clients.
This keynote will delve into several aspects of this cloud paradigm, from
more generic concerns regarding security and value for money, to more specific
worries that reach software engineers in general. Do we need a different
software development process? Are development techniques and tools mature
enough? What about the role of open-source in the cloud? How do we assess the
quality in cloud-based development? Please stay tuned for more!
|
[
{
"version": "v1",
"created": "Sun, 12 Feb 2012 09:50:28 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Abreu",
"Fernando Brito e",
""
]
] |
new_dataset
| 0.959753 |
1203.0500
|
Amelia Carolina Sparavigna
|
A.C. Sparavigna and R. Marazzato
|
Georeferenced lives
|
GIS, Satellite Maps, Google Earth, KML, XML, Acme Mapper
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To give a georeference means to give a reference as existing in the physical
space of Earth. This procedure is widely used for the location of
archaeological, historical and other sites when geographic information systems
(GIS) are used. Here we are proposing to georeference the lives of famous
people (in the paper, Newton and Schiaparelli) for teaching purposes, to
increase the appeal of some scientific disciplines.
|
[
{
"version": "v1",
"created": "Fri, 2 Mar 2012 15:51:17 GMT"
}
] | 2012-03-05T00:00:00 |
[
[
"Sparavigna",
"A. C.",
""
],
[
"Marazzato",
"R.",
""
]
] |
new_dataset
| 0.999557 |
1203.0511
|
Dmitry Ageyev
|
Dmitry Ageyev, Haidara Abdalla
|
Multiservice Telecommunication Systems Parametrical Synthesis by using
of Multilayer Graph Mathematical Model
|
9 pages, 2 figures, 14 references. In russian
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This study is devoted to the problem of parametric synthesis of multi-service
telecommunication sys-tems. The main characteristics of telecommunication
systems, which are brought to account in an article, are multilayer structure
formed by the overlayed networks and presence flows with self-similarity
effect. For accounting these features of modern telecommunications systems is
proposed to use a multi-layered graph for describing the system structure, and
self-similar processes model for modeling flows in a network. Solution of
parametric synthesis problem is reduced to a nonlinear programming problem
which is solved by using gradient descent method.
|
[
{
"version": "v1",
"created": "Fri, 2 Mar 2012 16:23:01 GMT"
}
] | 2012-03-05T00:00:00 |
[
[
"Ageyev",
"Dmitry",
""
],
[
"Abdalla",
"Haidara",
""
]
] |
new_dataset
| 0.976238 |
1202.6548
|
Davide Albanese
|
Davide Albanese and Roberto Visintainer and Stefano Merler and
Samantha Riccadonna and Giuseppe Jurman and Cesare Furlanello
|
mlpy: Machine Learning Python
|
Corrected a few typos; rephrased two sentences in the Overview
section
| null | null | null |
cs.MS cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
mlpy is a Python Open Source Machine Learning library built on top of
NumPy/SciPy and the GNU Scientific Libraries. mlpy provides a wide range of
state-of-the-art machine learning methods for supervised and unsupervised
problems and it is aimed at finding a reasonable compromise among modularity,
maintainability, reproducibility, usability and efficiency. mlpy is
multiplatform, it works with Python 2 and 3 and it is distributed under GPL3 at
the website http://mlpy.fbk.eu.
|
[
{
"version": "v1",
"created": "Wed, 29 Feb 2012 13:49:10 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2012 13:31:54 GMT"
}
] | 2012-03-02T00:00:00 |
[
[
"Albanese",
"Davide",
""
],
[
"Visintainer",
"Roberto",
""
],
[
"Merler",
"Stefano",
""
],
[
"Riccadonna",
"Samantha",
""
],
[
"Jurman",
"Giuseppe",
""
],
[
"Furlanello",
"Cesare",
""
]
] |
new_dataset
| 0.999159 |
1203.0231
|
Tapalina Bhattasali
|
Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal
|
Sleep Deprivation Attack Detection in Wireless Sensor Network
|
7 pages,4 figures, IJCA Journal February 2012
|
International Journal of Computer Applications 40(15):19-25,
February 2012. Published by Foundation of Computer Science, New York, USA
|
10.5120/5056-7374 10.5120/5056-7374 10.5120/5056-7374 10.5120/5056-7374
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deployment of sensor network in hostile environment makes it mainly
vulnerable to battery drainage attacks because it is impossible to recharge or
replace the battery power of sensor nodes. Among different types of security
threats, low power sensor nodes are immensely affected by the attacks which
cause random drainage of the energy level of sensors, leading to death of the
nodes. The most dangerous type of attack in this category is sleep deprivation,
where target of the intruder is to maximize the power consumption of sensor
nodes, so that their lifetime is minimized. Most of the existing works on sleep
deprivation attack detection involve a lot of overhead, leading to poor
throughput. The need of the day is to design a model for detecting intrusions
accurately in an energy efficient manner. This paper proposes a hierarchical
framework based on distributed collaborative mechanism for detecting sleep
deprivation torture in wireless sensor network efficiently. Proposed model uses
anomaly detection technique in two steps to reduce the probability of false
intrusion.
|
[
{
"version": "v1",
"created": "Thu, 1 Mar 2012 16:19:43 GMT"
}
] | 2012-03-02T00:00:00 |
[
[
"Bhattasali",
"Tapalina",
""
],
[
"Chaki",
"Rituparna",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.99391 |
1009.0088
|
David Eppstein
|
Erin W. Chambers, David Eppstein, Michael T. Goodrich, Maarten
L\"offler
|
Drawing Graphs in the Plane with a Prescribed Outer Face and Polynomial
Area
|
13 pages, 5 figures. This is an extended version of a paper to appear
in Proc. 18th Int. Symp. Graph Drawing, 2010
|
J. Graph Algorithms and Applications 16(2):243-259, 2012
| null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the classic graph drawing problem of drawing a planar graph using
straight-line edges with a prescribed convex polygon as the outer face. Unlike
previous algorithms for this problem, which may produce drawings with
exponential area, our method produces drawings with polynomial area. In
addition, we allow for collinear points on the boundary, provided such vertices
do not create overlapping edges. Thus, we solve an open problem of Duncan et
al., which, when combined with their work, implies that we can produce a planar
straight-line drawing of a combinatorially-embedded genus-g graph with the
graph's canonical polygonal schema drawn as a convex polygonal external face.
|
[
{
"version": "v1",
"created": "Wed, 1 Sep 2010 04:43:43 GMT"
}
] | 2012-03-01T00:00:00 |
[
[
"Chambers",
"Erin W.",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Löffler",
"Maarten",
""
]
] |
new_dataset
| 0.999164 |
1202.6438
|
Yushi Uno
|
Fumika Kino and Yushi Uno
|
Solving Tantrix via Integer Programming
|
14 pages + 1 page appendix, 15 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tantrix is a puzzle to make a loop by connecting lines drawn on hexagonal
tiles, and the objective of this research is to solve it by a computer. For
this purpose, we give a problem setting of solving Tantrix as arranging tiles
in an appropriate shape and making a loop at the same time within a given
hexagonal lattice board. We then formulate it as an integer program by
expressing the rules of Tantrix as its constraints, and solve it by a
mathematical programming solver to have a solution. As a result, we establish a
formulation that solves Tantrix of moderate sizes, and even when the solutions
are invalid only by elementary constraints, we achieved it by introducing
additional constraints and an artificial objective function to avoid flaws in
invalid solutions. By this approach we are successful in solving Tantrix of
size up to 50.
|
[
{
"version": "v1",
"created": "Wed, 29 Feb 2012 04:56:28 GMT"
}
] | 2012-03-01T00:00:00 |
[
[
"Kino",
"Fumika",
""
],
[
"Uno",
"Yushi",
""
]
] |
new_dataset
| 0.999472 |
1202.6591
|
Olivia Saierli
|
A.T. Akinwale and F.T. Ibharalu
|
Password Authentication Scheme with Secured Login Interface
|
9 pages
|
Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 77-85
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel solution to the age long problem of password
security at input level. In our solution, each of the various characters from
which a password could be composed is encoded with a random single digit
integer and presented to the user via an input interface form. A legitimate
user entering his password only needs to carefully study the sequence of code
that describe his password, and then enter these code in place of his actual
password characters. This approach does not require the input code to be hidden
from anyone or converted to placeholder characters for security reasons. Our
solution engine regenerates new code for each character each time the carriage
return key is struck, producing a hardened password that is convincingly more
secure than conventional password entry system against both online and offline
attackers. Using empirical data and a prototype implementation of our scheme,
we give evidence that our approach is viable in practice, in terms of ease of
use, improved security, and performance.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 14:55:01 GMT"
}
] | 2012-03-01T00:00:00 |
[
[
"Akinwale",
"A. T.",
""
],
[
"Ibharalu",
"F. T.",
""
]
] |
new_dataset
| 0.998058 |
1011.1917
|
Zoran Sunic
|
Zoran Sunic
|
Normal art galleries: wall in - all in
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the notion of a normal gallery, a gallery in which any
configuration of guards that visually covers the walls covers the entire
gallery. We show that any star gallery is normal and any gallery with at most
two reflex corners is normal. A polynomial time algorithm is provided deciding
if, for a given polygon and a finite set of positions, there exists a
configuration of guards in some of these positions that visually covers the
walls but not the entire gallery.
|
[
{
"version": "v1",
"created": "Mon, 8 Nov 2010 21:11:38 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Feb 2012 04:08:09 GMT"
}
] | 2012-02-29T00:00:00 |
[
[
"Sunic",
"Zoran",
""
]
] |
new_dataset
| 0.998853 |
1202.5921
|
Olivia Saierli
|
Nicolae Constantinescu
|
Estimators in Cryptography
|
7 pages
|
Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 23-29
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the main problems in cryptography is to give criteria to provide good
comparators of cipher systems. The security of a cipher system must include the
security of the algorithm, the security of the key generator and management
module (see [BM94], [CM97],[Mau92a]) and the security of the cryptographic key
agreement protocol (see [Mau93a],[MC94],[Mau93b],[Mau92b]). This paper gives
show the necessary mathematical background to estimate the most important
cryptographic measures of the key generators and of the unconditionally key
agreement protocols. These cryptographic measures are the Shannon entropy (for
the key generator module) and Renyi entropy of order alpha for the key
agreement protocol.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 13:13:17 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Feb 2012 05:46:23 GMT"
}
] | 2012-02-29T00:00:00 |
[
[
"Constantinescu",
"Nicolae",
""
]
] |
new_dataset
| 0.99315 |
1202.6124
|
EPTCS
|
Gerjan Stokkink (University of Twente), Mark Timmer (University of
Twente), Mari\"elle Stoelinga (University of Twente)
|
Talking quiescence: a rigorous theory that supports parallel
composition, action hiding and determinisation
|
In Proceedings MBT 2012, arXiv:1202.5826
|
EPTCS 80, 2012, pp. 73-87
|
10.4204/EPTCS.80.6
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The notion of quiescence - the absence of outputs - is vital in both
behavioural modelling and testing theory. Although the need for quiescence was
already recognised in the 90s, it has only been treated as a second-class
citizen thus far. This paper moves quiescence into the foreground and
introduces the notion of quiescent transition systems (QTSs): an extension of
regular input-output transition systems (IOTSs) in which quiescence is
represented explicitly, via quiescent transitions. Four carefully crafted rules
on the use of quiescent transitions ensure that our QTSs naturally capture
quiescent behaviour.
We present the building blocks for a comprehensive theory on QTSs supporting
parallel composition, action hiding and determinisation. In particular, we
prove that these operations preserve all the aforementioned rules.
Additionally, we provide a way to transform existing IOTSs into QTSs, allowing
even IOTSs as input that already contain some quiescent transitions. As an
important application, we show how our QTS framework simplifies the fundamental
model-based testing theory formalised around ioco.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2012 05:33:49 GMT"
}
] | 2012-02-29T00:00:00 |
[
[
"Stokkink",
"Gerjan",
"",
"University of Twente"
],
[
"Timmer",
"Mark",
"",
"University of\n Twente"
],
[
"Stoelinga",
"Mariëlle",
"",
"University of Twente"
]
] |
new_dataset
| 0.974849 |
1202.6266
|
Florentina Pintea
|
Ali Sadiqui, Noureddine Chenfour
|
Realisation d'un systeme de reconnaissance automatique de la parole
arabe base sur CMU Sphinx
| null |
Ann. Univ. Tibiscus Comp. Sci. Series VIII / 1 (2010), 27-40
| null |
14 pages
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the continuation of the work completed by Satori and all.
[SCH07] by the realization of an automatic speech recognition system (ASR) for
Arabic language based SPHINX 4 system. The previous work was limited to the
recognition of the first ten digits, whereas the present work is a remarkable
projection consisting in continuous Arabic speech recognition with a rate of
recognition of surroundings 96%.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2012 16:04:36 GMT"
}
] | 2012-02-29T00:00:00 |
[
[
"Sadiqui",
"Ali",
""
],
[
"Chenfour",
"Noureddine",
""
]
] |
new_dataset
| 0.996221 |
1103.3076
|
Anil Hirani
|
Nathan Bell and Anil N. Hirani
|
PyDEC: Software and Algorithms for Discretization of Exterior Calculus
|
Revised as per referee reports. Added information on scalability,
removed redundant text, emphasized the role of matrix based algorithms,
shortened length of paper
| null | null | null |
cs.NA cs.CG cs.MS math.DG math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the algorithms, features and implementation of PyDEC, a
Python library for computations related to the discretization of exterior
calculus. PyDEC facilitates inquiry into both physical problems on manifolds as
well as purely topological problems on abstract complexes. We describe
efficient algorithms for constructing the operators and objects that arise in
discrete exterior calculus, lowest order finite element exterior calculus and
in related topological problems. Our algorithms are formulated in terms of
high-level matrix operations which extend to arbitrary dimension. As a result,
our implementations map well to the facilities of numerical libraries such as
NumPy and SciPy. The availability of such libraries makes Python suitable for
prototyping numerical methods. We demonstrate how PyDEC is used to solve
physical and topological problems through several concise examples.
|
[
{
"version": "v1",
"created": "Wed, 16 Mar 2011 01:50:33 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Feb 2012 19:57:51 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Bell",
"Nathan",
""
],
[
"Hirani",
"Anil N.",
""
]
] |
new_dataset
| 0.997492 |
1112.4236
|
Ravi Teja Sukhavasi
|
Ravi Teja Sukhavasi and Babak Hassibi
|
Error Correcting Codes for Distributed Control
|
39 pages
| null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of stabilizing an unstable plant over a noisy communication link
is an increasingly important one that arises in applications of networked
control systems. Although the work of Schulman and Sahai over the past two
decades, and their development of the notions of "tree codes"\phantom{} and
"anytime capacity", provides the theoretical framework for studying such
problems, there has been scant practical progress in this area because explicit
constructions of tree codes with efficient encoding and decoding did not exist.
To stabilize an unstable plant driven by bounded noise over a noisy channel one
needs real-time encoding and real-time decoding and a reliability which
increases exponentially with decoding delay, which is what tree codes
guarantee. We prove that linear tree codes occur with high probability and, for
erasure channels, give an explicit construction with an expected decoding
complexity that is constant per time instant. We give novel sufficient
conditions on the rate and reliability required of the tree codes to stabilize
vector plants and argue that they are asymptotically tight. This work takes an
important step towards controlling plants over noisy channels, and we
demonstrate the efficacy of the method through several examples.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2011 04:43:47 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Feb 2012 02:29:26 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Sukhavasi",
"Ravi Teja",
""
],
[
"Hassibi",
"Babak",
""
]
] |
new_dataset
| 0.995804 |
1202.5680
|
Saptarshi Das
|
Saptarshi Das, Indranil Pan, Shantanu Das and Amitava Gupta
|
A Novel Fractional Order Fuzzy PID Controller and Its Optimal Time
Domain Tuning Based on Integral Performance Indices
|
30 pages, 20 figures
|
Engineering Applications of Artificial Intelligence, vol. 25, no.
2, pp. 430-442, March 2012
|
10.1016/j.engappai.2011.10.004
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel fractional order (FO) fuzzy Proportional-Integral-Derivative (PID)
controller has been proposed in this paper which works on the closed loop error
and its fractional derivative as the input and has a fractional integrator in
its output. The fractional order differ-integrations in the proposed fuzzy
logic controller (FLC) are kept as design variables along with the input-output
scaling factors (SF) and are optimized with Genetic Algorithm (GA) while
minimizing several integral error indices along with the control signal as the
objective function. Simulations studies are carried out to control a delayed
nonlinear process and an open loop unstable process with time delay. The closed
loop performances and controller efforts in each case are compared with
conventional PID, fuzzy PID and PI{\lambda}D{\mu} controller subjected to
different integral performance indices. Simulation results show that the
proposed fractional order fuzzy PID controller outperforms the others in most
cases.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2012 18:25:57 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Das",
"Saptarshi",
""
],
[
"Pan",
"Indranil",
""
],
[
"Das",
"Shantanu",
""
],
[
"Gupta",
"Amitava",
""
]
] |
new_dataset
| 0.965126 |
1202.5857
|
Camilla Hollanti
|
Camilla Hollanti and Nadya Markin
|
Algebraic Fast-Decodable Relay Codes for Distributed Communications
|
5 pages
| null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, fast-decodable lattice code constructions are designed for the
nonorthogonal amplify-and-forward (NAF) multiple-input multiple-output (MIMO)
channel. The constructions are based on different types of algebraic
structures, e.g. quaternion division algebras. When satisfying certain
properties, these algebras provide us with codes whose structure naturally
reduces the decoding complexity. The complexity can be further reduced by
shortening the block length, i.e., by considering rectangular codes called less
than minimum delay (LMD) codes.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 08:44:28 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Hollanti",
"Camilla",
""
],
[
"Markin",
"Nadya",
""
]
] |
new_dataset
| 0.967351 |
1202.5938
|
Olivia Saierli
|
Qasim Siddique
|
Intelligent Car System
|
12 pages
|
Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 113-124
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In modern life the road safety has becomes the core issue. One single move of
a driver can cause horrifying accident. The main goal of intelligent car system
is to make communication with other cars on the road. The system is able to
control to speed, direction and the distance between the cars the intelligent
car system is able to recognize traffic light and is able to take decision
according to it. This paper presents a framework of the intelligent car system.
I validate several aspect of our system using simulation.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 14:04:55 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Siddique",
"Qasim",
""
]
] |
new_dataset
| 0.952098 |
1202.5941
|
Olivia Saierli
|
P. Chenna Reddy
|
TCP over IEEE 802.11
|
11 pages
|
Ann. Univ. Tibiscus Comp. Sci. Series VII/2 (2009), 173-183
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IEEE 802.11 is a widely used wireless LAN standard for medium access control.
TCP is a prominent transport protocol originally designed for wired networks.
TCP treats packet loss as congestion and reduces the data rate. In wireless
networks packets are lost not only due to congestion but also due to various
other reasons. Hence there is need for making TCP adaptable to wireless
networks. Various parameters of TCP and IEEE 802.11 can be set to appropriate
values to achieve optimum performance results. In this paper optimum values for
various parameters of IEEE 802.11 are determined. Network simulator NS2 is used
for simulation.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 14:11:23 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Reddy",
"P. Chenna",
""
]
] |
new_dataset
| 0.999559 |
1202.5967
|
Deniz Gunduz
|
Deniz Gunduz, Elza Erkip, Andrea Goldsmith, H. Vincent Poor
|
Joint Source-Channel Cooperative Transmission over Relay-Broadcast
Networks
|
Submitted to IEEE Transactions on Information Theory, 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reliable transmission of a discrete memoryless source over a multiple-relay
relay-broadcast network is considered. Motivated by sensor network
applications, it is assumed that the relays and the destinations all have
access to side information correlated with the underlying source signal. Joint
source-channel cooperative transmission is studied in which the relays help the
transmission of the source signal to the destinations by using both their
overheard signals, as in the classical channel cooperation scenario, as well as
the available correlated side information. Decode-and-forward (DF) based
cooperative transmission is considered in a network of multiple relay terminals
and two different achievability schemes are proposed: i) a regular encoding and
sliding-window decoding scheme without explicit source binning at the encoder,
and ii) a semi-regular encoding and backward decoding scheme with binning based
on the side information statistics. It is shown that both of these schemes lead
to the same source-channel code rate, which is shown to be the "source-channel
capacity" in the case of i) a physically degraded relay network in which the
side information signals are also degraded in the same order as the channel;
and ii) a relay-broadcast network in which all the terminals want to
reconstruct the source reliably, while at most one of them can act as a relay.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2012 15:11:05 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Gunduz",
"Deniz",
""
],
[
"Erkip",
"Elza",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.997852 |
1202.5516
|
Richard McClatchey
|
Ashiq Anjum, Peter Bloodsworth, Irfan Habib, Tom Lansdale, Richard
McClatchey, Yasir Mehmood and the neuGRID Consortium
|
Reusable Services from the neuGRID Project for Grid-Based Health
Applications
|
6 pages; 3 figures.Proceedings the 7th HealthGrid Int. Conference
(HG'09). Berlin, Germany. June 2009
|
Studies in Health Technology & Informatics Vol 147, pp 283-288
ISBN 978-1-60750-027-8 IOS Press. 2009
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By abstracting Grid middleware specific considerations from clinical research
applications, re-usable services should be developed that will provide generic
functionality aimed specifically at medical applications. In the scope of the
neuGRID project, generic services are being designed and developed which will
be applied to satisfy the requirements of neuroscientists. These services will
bring together sources of data and computing elements into a single view as far
as applications are concerned, making it possible to cope with centralised,
distributed or hybrid data and provide native support for common medical file
formats. Services will include querying, provenance, portal, anonymization and
pipeline services together with a 'glueing' service for connection to Grid
services. Thus lower-level services will hide the peculiarities of any specific
Grid technology from upper layers, provide application independence and will
enable the selection of 'fit-for-purpose' infrastructures. This paper outlines
the design strategy being followed in neuGRID using the glueing and pipeline
services as examples.
|
[
{
"version": "v1",
"created": "Fri, 24 Feb 2012 18:02:14 GMT"
}
] | 2012-02-27T00:00:00 |
[
[
"Anjum",
"Ashiq",
""
],
[
"Bloodsworth",
"Peter",
""
],
[
"Habib",
"Irfan",
""
],
[
"Lansdale",
"Tom",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Mehmood",
"Yasir",
""
],
[
"Consortium",
"the neuGRID",
""
]
] |
new_dataset
| 0.965163 |
0710.1976
|
Yukitaka Ishimoto
|
Yukitaka Ishimoto
|
Solving Infinite Kolam in Knot Theory
|
13 pages, 2 figures, the final version for FORMA with typo fixed
|
Forma 22 (2007) 15-30
| null |
OIQP-06-15
|
cs.DM cond-mat.stat-mech
| null |
In south India, there are traditional patterns of line-drawings encircling
dots, called ``Kolam'', among which one-line drawings or the ``infinite Kolam''
provide very interesting questions in mathematics. For example, we address the
following simple question: how many patterns of infinite Kolam can we draw for
a given grid pattern of dots? The simplest way is to draw possible patterns of
Kolam while judging if it is infinite Kolam. Such a search problem seems to be
NP complete. However, it is certainly not. In this paper, we focus on
diamond-shaped grid patterns of dots, (1-3-5-3-1) and (1-3-5-7-5-3-1) in
particular. By using the knot-theory description of the infinite Kolam, we show
how to find the solution, which inevitably gives a sketch of the proof for the
statement ``infinite Kolam is not NP complete.'' Its further discussion will be
given in the final section.
|
[
{
"version": "v1",
"created": "Wed, 10 Oct 2007 11:46:53 GMT"
}
] | 2012-02-23T00:00:00 |
[
[
"Ishimoto",
"Yukitaka",
""
]
] |
new_dataset
| 0.99841 |
1202.4830
|
EPTCS
|
Francisco Botana, Miguel A. Ab\'anades
|
Automatic Deduction in Dynamic Geometry using Sage
|
In Proceedings THedu'11, arXiv:1202.4535
|
EPTCS 79, 2012, pp. 49-62
|
10.4204/EPTCS.79.3
| null |
cs.MS cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a symbolic tool that provides robust algebraic methods to handle
automatic deduction tasks for a dynamic geometry construction. The main
prototype has been developed as two different worksheets for the open source
computer algebra system Sage, corresponding to two different ways of coding a
geometric construction. In one worksheet, diagrams constructed with the open
source dynamic geometry system GeoGebra are accepted. In this worksheet,
Groebner bases are used to either compute the equation of a geometric locus in
the case of a locus construction or to determine the truth of a general
geometric statement included in the GeoGebra construction as a boolean
variable. In the second worksheet, locus constructions coded using the common
file format for dynamic geometry developed by the Intergeo project are accepted
for computation. The prototype and several examples are provided for testing.
Moreover, a third Sage worksheet is presented in which a novel algorithm to
eliminate extraneous parts in symbolically computed loci has been implemented.
The algorithm, based on a recent work on the Groebner cover of parametric
systems, identifies degenerate components and extraneous adherence points in
loci, both natural byproducts of general polynomial algebraic methods. Detailed
examples are discussed.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2012 06:41:37 GMT"
}
] | 2012-02-23T00:00:00 |
[
[
"Botana",
"Francisco",
""
],
[
"Abánades",
"Miguel A.",
""
]
] |
new_dataset
| 0.997039 |
1202.4837
|
EPTCS
|
Jordi Saludes (UPC), Sebastian Xamb\'o (UPC)
|
The GF Mathematics Library
|
In Proceedings THedu'11, arXiv:1202.4535
|
EPTCS 79, 2012, pp. 102-110
|
10.4204/EPTCS.79.6
| null |
cs.MS cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is devoted to present the Mathematics Grammar Library, a system
for multilingual mathematical text processing. We explain the context in which
it originated, its current design and functionality and the current development
goals. We also present two prototype services and comment on possible future
applications in the area of artificial mathematics assistants.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2012 06:43:11 GMT"
}
] | 2012-02-23T00:00:00 |
[
[
"Saludes",
"Jordi",
"",
"UPC"
],
[
"Xambó",
"Sebastian",
"",
"UPC"
]
] |
new_dataset
| 0.999651 |
1202.4865
|
Carlo Alberto Boano
|
Carlo Alberto Boano, Kay R\"omer, Marco Antonio Z\'u\~niga, and Thiemo
Voigt
|
Jam-X: Wireless Agreement under Interference
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless low-power transceivers used in sensor networks such as IEEE 802.15.4
typically operate in unlicensed frequency bands that are subject to external
interference from devices transmitting at much higher power. Communication
protocols should therefore be designed to be robust against such interference.
A critical building block of many protocols at all layers is agreement on a
piece of information among a set of nodes. At the MAC layer, nodes may need to
agree on a new time slot or frequency channel; at the application layer nodes
may need to agree on handing over a leader role from one node to another.
Message loss caused by interference may break agreement in two different ways:
none of the nodes use the new information (time slot, channel, leader) and
stick with the previous assignment, or - even worse - some nodes use the new
information and some do not. This may lead to reduced performance or failures.
In this paper we investigate the problem of agreement under interference and
point out the limitations of the traditional message-based n-way handshake
approach. We propose novel protocols that use jamming instead of message
transmissions and show that they outperform the n-way handshake in terms of
agreement probability, energy consumption, and time-to-completion both in the
unicast case (two neighboring nodes agree) as well as in the broadcast case
(any number of neighboring nodes agree).
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2012 09:21:29 GMT"
}
] | 2012-02-23T00:00:00 |
[
[
"Boano",
"Carlo Alberto",
""
],
[
"Römer",
"Kay",
""
],
[
"Zúñiga",
"Marco Antonio",
""
],
[
"Voigt",
"Thiemo",
""
]
] |
new_dataset
| 0.997168 |
1202.4941
|
Shankar G MR
|
G. Shankar
|
Innovative SQA Service Maturity Model using CMMI and ITIL
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This Journal details a maturity model for SQA services which has been
developed during QMS implementation in the IT division of a large multinational
organization. The scope of the engagement was to establish a standard set of
processes based on CMMI\textregistered and ITIL\textregistered Framework across
four business verticals scattered in Europe, United States and Asia. The
services of Software Quality Analyst (SQA) from different vendors were
leveraged to facilitate implementation of processes which was referred to as
the Quality Management System (QMS). To co-ordinate and support QMS
implementation, a Software Quality Assurance Group (SQAG) was established at
the organizational level. Considering the large number of applications, the
business verticals proposed that process implementation should be owned and
managed by practitioners themselves so that the mass deployment of QMS can be
achieved at a faster rate with the same SQA capacity. This called for a need to
devise an innovative implementation solution before moving to a process
implementation model which proposed Project Managers implementing processes
themself. While there are process models and frameworks available in the market
for establishing processes in an organization, there is no model that
elaborates activities to be performed by the SQA for effective implementation
of processes. SQA service maturity model was proposed as a solution based on
CMMI\textregistered and developed to eventually proceed towards a 'Process
Implementation Model proposing Project Managers implementing processes
themself'.
SQA Service Maturity Model is a Software Quality Assurance implementation
framework that enables organisations to increase Efficiencies in Software
Quality Assurance, reduce the Cost of Defects and ultimately Increasing Return
on Investment in IT.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2012 15:41:27 GMT"
}
] | 2012-02-23T00:00:00 |
[
[
"Shankar",
"G.",
""
]
] |
new_dataset
| 0.999524 |
1202.0863
|
Aria Ghasemian Sahebi
|
Aria G. Sahebi and S. Sandeep Pradhan
|
Asymptotically Good Codes Over Non-Abelian Groups
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It has been shown that good structured codes over non-Abelian groups do
exist. Specifically, we construct codes over the smallest non-Abelian group
$\mathds{D}_6$ and show that the performance of these codes is superior to the
performance of Abelian group codes of the same alphabet size. This promises the
possibility of using non-Abelian codes for multi-terminal settings where the
structure of the code can be exploited to gain performance.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2012 02:50:45 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Feb 2012 08:31:23 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Sahebi",
"Aria G.",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
new_dataset
| 0.989962 |
1202.4451
|
Michael Neely
|
Michael J. Neely
|
Wireless Peer-to-Peer Scheduling in Mobile Networks
|
This material will be presented in part at the 46th Annual Conference
on Information Sciences and Systems (CISS), Princeton, NJ, March 2012
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers peer-to-peer scheduling for a network with multiple
wireless devices. A subset of the devices are mobile users that desire specific
files. Each user may already have certain popular files in its cache. The
remaining devices are access points that typically have access to a larger set
of files. Users can download packets of their requested file from an access
point or from a nearby user. Our prior work optimizes peer scheduling in a
general setting, but the resulting delay can be large when applied to mobile
networks. This paper focuses on the mobile case, and develops a new algorithm
that reduces delay by opportunistically grabbing packets from current
neighbors. However, it treats a simpler model where each user desires a single
file with infinite length. An algorithm that provably optimizes throughput
utility while incentivizing participation is developed for this case. The
algorithm extends as a simple heuristic in more general cases with finite file
sizes and random active and idle periods.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2012 01:22:36 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Neely",
"Michael J.",
""
]
] |
new_dataset
| 0.989171 |
1202.4631
|
Blerina Sinaimeri
|
Tiziana Calamoneri, Dario Frascaria and Blerina Sinaimeri
|
All graphs with at most seven vertices are Pairwise Compatibility Graphs
|
8 pages, 2 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph $G$ is called a pairwise compatibility graph (PCG) if there exists an
edge-weighted tree $T$ and two non-negative real numbers $d_{min}$ and
$d_{max}$ such that each leaf $l_u$ of $T$ corresponds to a vertex $u \in V$
and there is an edge $(u,v) \in E$ if and only if $d_{min} \leq d_{T,w} (l_u,
l_v) \leq d_{max}$ where $d_{T,w} (l_u, l_v)$ is the sum of the weights of the
edges on the unique path from $l_u$ to $l_v$ in $T$.
In this note, we show that all the graphs with at most seven vertices are
PCGs. In particular all these graphs except for the wheel on 7 vertices $W_7$
are PCGs of a particular structure of a tree: a centipede.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2012 13:26:38 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Calamoneri",
"Tiziana",
""
],
[
"Frascaria",
"Dario",
""
],
[
"Sinaimeri",
"Blerina",
""
]
] |
new_dataset
| 0.993586 |
1202.4663
|
Mohammad Reza Sohizadeh Abyaneh
|
Mohammad Reza Sohizadeh Abyaneh
|
On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the privacy of two recent RFID tag ownership transfer
protocols are investigated against the tag owners as adversaries. The first
protocol called ROTIV is a scheme which provides a privacy-preserving ownership
transfer by using an HMAC-based authentication with public key encryption.
However, our passive attack on this protocol shows that any legitimate owner
which has been the owner of a specific tag is able to trace it either in the
past or in the future. Tracing the tag is also possible via an active attack
for any adversary who is able to tamper the tag and extract its information.
The second protocol called, Chen et al.'s protocol, is an ownership transfer
protocol for passive RFID tags which conforms EPC Class1 Generation2 standard.
Our attack on this protocol shows that the previous owners of a particular tag
are able to trace it in future. Furthermore, they are able even to obtain the
tag's secret information at any time in the future which makes them capable of
impersonating the tag.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2012 14:55:38 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Abyaneh",
"Mohammad Reza Sohizadeh",
""
]
] |
new_dataset
| 0.995833 |
1202.4675
|
Venkata krishnan Sowrirajan
|
S.Venkata Krishnan, R.Sriram and N.Senthil Kumar
|
Adaptive and Dynamic Wireless Routers with Smart Antenna for Power
Management
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the recent evolution of wireless technologies, the power management has
been a worrying factor. In order to overcome the power shortage, steps are
taken to find new kind of energy harvesting methods, power attenuation
reduction methods and power saving techniques. Wireless routers even though
consume not much of power, battery powered devices require a lot. Omni
directional antenna embedded with multiple antennae focusing the beam of radio
wave signals in the direction of nodes with least transmission angle can be a
solution for this problem which is called as "Smart Antenna". To reduce power
maceration we are going for adaptive and dynamic transmission wherein the
transmission angle of antennae is varied in accordance with the movement of
nodes. Apart from saving the power considerably, it also improves the signal
strength
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2012 15:36:22 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Krishnan",
"S. Venkata",
""
],
[
"Sriram",
"R.",
""
],
[
"Kumar",
"N. Senthil",
""
]
] |
new_dataset
| 0.960603 |
0912.1424
|
Jose Ignacio Alvarez-Hamelin
|
Jos\'e Ignacio Alvarez-Hamelin (FIUBA), Beir\'o Mariano Gast\'on
(FIUBA), Jorge Rodolfo Busch (FIUBA)
|
Understanding edge-connectivity in the Internet through
core-decomposition
| null |
Internet Mathematics 7, 1 (2011) 45-66
|
10.1080/15427951.2011.560786
| null |
cs.DM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet is a complex network composed by several networks: the Autonomous
Systems, each one designed to transport information efficiently. Routing
protocols aim to find paths between nodes whenever it is possible (i.e., the
network is not partitioned), or to find paths verifying specific constraints
(e.g., a certain QoS is required). As connectivity is a measure related to both
of them (partitions and selected paths) this work provides a formal lower bound
to it based on core-decomposition, under certain conditions, and low complexity
algorithms to find it. We apply them to analyze maps obtained from the
prominent Internet mapping projects, using the LaNet-vi open-source software
for its visualization.
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2009 07:34:27 GMT"
}
] | 2012-02-21T00:00:00 |
[
[
"Alvarez-Hamelin",
"José Ignacio",
"",
"FIUBA"
],
[
"Gastón",
"Beiró Mariano",
"",
"FIUBA"
],
[
"Busch",
"Jorge Rodolfo",
"",
"FIUBA"
]
] |
new_dataset
| 0.950401 |
1110.5355
|
Jos\'e Ignacio Alvarez-Hamelin Phd.
|
Jos\'e Ignacio Alvarez-Hamelin
|
Is it possible to find the maximum clique in general graphs?
|
http://hal.archives-ouvertes.fr/hal-00625917/en
| null | null | null |
cs.DS cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finding the maximum clique is a known NP-Complete problem and it is also hard
to approximate. This work proposes two efficient algorithms to obtain it.
Nevertheless, the first one is able to fins the maximum for some special cases,
while the second one has its execution time bounded by the number of cliques
that each vertex belongs to.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2011 21:12:43 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Oct 2011 20:20:36 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Feb 2012 21:35:05 GMT"
}
] | 2012-02-21T00:00:00 |
[
[
"Alvarez-Hamelin",
"José Ignacio",
""
]
] |
new_dataset
| 0.954544 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.