id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1201.0219
|
Feng Xia
|
Feng Xia, Wei Zhang, Fangwei Ding, Ruonan Hao
|
A-GPS Assisted Wi-Fi Access Point Discovery on Mobile Devices for Energy
Saving
|
IEEE Global Information Infrastructure Symposium (GIIS 2011), August
2011, Da Nang, Vietnam
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile devices have been shipped with multiple wireless network interfaces in
order to meet their diverse communication and networking demands. In this
paper, we propose an A-GPS assisted scheme that discovers the nearest Wi-Fi
network access points (APs) by using user's location information. This allows
the user to switch to the Wi-Fi interface in an intelligent manner when she/he
arrives at the nearest Wi-Fi network AP. Therefore, it avoids the long periods
in idle state and greatly reduces the number of unnecessary Wi-Fi scans on the
mobile device. The experimental results demonstrate that our scheme effectively
saves energy for mobile devices integrated with Wi-Fi and cellular interfaces.
|
[
{
"version": "v1",
"created": "Sat, 31 Dec 2011 03:53:04 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Xia",
"Feng",
""
],
[
"Zhang",
"Wei",
""
],
[
"Ding",
"Fangwei",
""
],
[
"Hao",
"Ruonan",
""
]
] |
new_dataset
| 0.994715 |
1201.0394
|
Catalin Boja
|
Elena Purcaru, Cristian Toma
|
2D Barcode for DNA Encoding
|
12 pages, 3 figures, 15 tables
|
Purcaru, E. and Toma, C. (2011). 2D Barcode for DNA Encoding.
Journal Of Mobile, Embedded And Distributed Systems, 3(3), 142-153. Retrieved
from
http://www.jmeds.eu/index.php/jmeds/article/view/2D-Barcode-for-DNA-Encoding
| null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
The paper presents a solution for endcoding/decoding DNA information in 2D
barcodes. First part focuses on the existing techniques and symbologies in 2D
barcodes field. The 2D barcode PDF417 is presented as starting point. The
adaptations and optimizations on PDF417 and on DataMatrix lead to the solution
- DNA2DBC - DeoxyriboNucleic Acid Two Dimensional Barcode. The second part
shows the DNA2DBC encoding/decoding process step by step. In conclusions are
enumerated the most important features of 2D barcode implementation for DNA.
|
[
{
"version": "v1",
"created": "Sun, 1 Jan 2012 22:30:34 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Purcaru",
"Elena",
""
],
[
"Toma",
"Cristian",
""
]
] |
new_dataset
| 0.986827 |
1201.0398
|
Catalin Boja
|
Adrian Marius Chiuta
|
AES Encryption and Decryption Using Direct3D 10 API
|
7 pages, 4 figures
|
Chiuta, A. (2011). AES Encryption and Decryption Using Direct3D 10
API. Journal Of Mobile, Embedded And Distributed Systems, 3(2), 54-60.
Retrieved from http://www.jmeds.eu
| null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Current video cards (GPUs - Graphics Processing Units) are very programmable,
have become much more powerful than the CPUs and they are very affordable. In
this paper, we present an implementation for the AES algorithm using Direct3D
10 certified GPUs. The graphics API Direct3D 10 is the first version that
allows the use of integer operations, making from the traditional GPUs (that
works only with floating point numbers), General Purpose GPUs that can be used
for a large number of algorithms, including encryption. We present the
performance of the symmetric key encryption algorithm - AES, on a middle range
GPU and on a middle range quad core CPU. On the testing system, the developed
solution is almost 3 times faster on the GPU than on one single core CPU,
showing that the GPU can perform as an efficient cryptographic accelerator.
|
[
{
"version": "v1",
"created": "Sun, 1 Jan 2012 23:03:10 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Chiuta",
"Adrian Marius",
""
]
] |
new_dataset
| 0.994007 |
1201.0428
|
Praveen Likhar
|
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M
|
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
| null |
International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.6, November 2011, 97-113
|
10.5121/ijnsa.2011.3607
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Like most advances, wireless LAN poses both opportunities and risks. The
evolution of wireless networking in recent years has raised many serious
security issues. These security issues are of great concern for this technology
as it is being subjected to numerous attacks. Because of the free-space radio
transmission in wireless networks, eavesdropping becomes easy and consequently
a security breach may result in unauthorized access, information theft,
interference and service degradation. Virtual Private Networks (VPNs) have
emerged as an important solution to security threats surrounding the use of
public networks for private communications. While VPNs for wired line networks
have matured in both research and commercial environments, the design and
deployment of VPNs for WLAN is still an evolving field. This paper presents an
approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN
solution and its impact on performance of IEEE 802.11g WLAN.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2012 05:56:03 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Likhar",
"Praveen",
""
],
[
"Yadav",
"Ravi Shankar",
""
],
[
"M",
"Keshava Rao",
""
]
] |
new_dataset
| 0.998053 |
1201.0540
|
Steven Obua
|
Steven Obua
|
ProofPeer - A Cloud-based Interactive Theorem Proving System
| null | null | null | null |
cs.MS cs.DL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ProofPeer strives to be a system for cloud-based interactive theorem proving.
After illustrating why such a system is needed, the paper presents some of the
design challenges that ProofPeer needs to meet to succeed. Contexts are
presented as a solution to the problem of sharing proof state among the users
of ProofPeer. Chronicles are introduced as a way to organize and version
contexts.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2012 21:48:33 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Obua",
"Steven",
""
]
] |
new_dataset
| 0.983757 |
1201.0598
|
Thomas Maugey
|
Thomas Maugey and Pascal Frossard
|
Interactive multiview video system with non-complex navigation at the
decoder
| null | null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiview video with interactive and smooth view switching at the receiver is
a challenging application with several issues in terms of effective use of
storage and bandwidth resources, reactivity of the system, quality of the
viewing experience and system complexity. The classical decoding system for
generating virtual views first projects a reference or encoded frame to a given
viewpoint and then fills in the holes due to potential occlusions. This last
step still constitutes a complex operation with specific software or hardware
at the receiver and requires a certain quantity of information from the
neighboring frames for insuring consistency between the virtual images. In this
work we propose a new approach that shifts most of the burden due to
interactivity from the decoder to the encoder, by anticipating the navigation
of the decoder and sending auxiliary information that guarantees temporal and
interview consistency. This leads to an additional cost in terms of
transmission rate and storage, which we minimize by using optimization
techniques based on the user behavior modeling. We show by experiments that the
proposed system represents a valid solution for interactive multiview systems
with classical decoders.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2012 09:19:58 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Maugey",
"Thomas",
""
],
[
"Frossard",
"Pascal",
""
]
] |
new_dataset
| 0.956878 |
1201.0662
|
Steven Weber
|
Steven Weber and Jeffrey G. Andrews
|
Transmission capacity of wireless networks
|
173 pages; Foundations and Trends in Networking, vol. 5, no. 2-3,
2012
| null | null | null |
cs.IT cs.NI cs.PF math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transmission capacity (TC) is a performance metric for wireless networks that
measures the spatial intensity of successful transmissions per unit area,
subject to a constraint on the permissible outage probability (where outage
occurs when the SINR at a receiver is below a threshold). This volume gives a
unified treatment of the TC framework that has been developed by the authors
and their collaborators over the past decade. The mathematical framework
underlying the analysis (reviewed in Ch. 2) is stochastic geometry: Poisson
point processes model the locations of interferers, and (stable) shot noise
processes represent the aggregate interference seen at a receiver. Ch. 3
presents TC results (exact, asymptotic, and bounds) on a simple model in order
to illustrate a key strength of the framework: analytical tractability yields
explicit performance dependence upon key model parameters. Ch. 4 presents
enhancements to this basic model --- channel fading, variable link distances,
and multi-hop. Ch. 5 presents four network design case studies well-suited to
TC: i) spectrum management, ii) interference cancellation, iii) signal
threshold transmission scheduling, and iv) power control. Ch. 6 studies the TC
when nodes have multiple antennas, which provides a contrast vs. classical
results that ignore interference.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2012 15:21:48 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Weber",
"Steven",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
new_dataset
| 0.966385 |
0909.3185
|
Lorena Ronquillo
|
J. Pujol, J. Rif\`a, L. Ronquillo
|
Construction of Additive Reed-Muller Codes
|
7 pages, Part of the material in this paper was presented without
proofs at the 18-th Symposium on Applied algebra, Algebraic algorithms, and
Error Correcting Codes (AAECC 2009), Tarragona, Spain, June 8-12, 2009
|
J. Pujol, J. Rifa and L. Ronquillo. Construction of Additive
Reed-Muller Codes. Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, LNCS 5527 (June 2009), pages 223-226
|
10.1007/978-3-642-02181-7
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The well known Plotkin construction is, in the current paper, generalized and
used to yield new families of Z2Z4-additive codes, whose length, dimension as
well as minimum distance are studied. These new constructions enable us to
obtain families of Z2Z4-additive codes such that, under the Gray map, the
corresponding binary codes have the same parameters and properties as the usual
binary linear Reed-Muller codes. Moreover, the first family is the usual binary
linear Reed-Muller family.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 11:13:02 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2011 11:52:08 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Pujol",
"J.",
""
],
[
"Rifà",
"J.",
""
],
[
"Ronquillo",
"L.",
""
]
] |
new_dataset
| 0.998602 |
1112.5728
|
M. Tariq Banday
|
Jameel A. Qadri and M. Tariq Banday
|
Web Accessibility - A timely recognized challenge
|
6 Pages
|
Qadri, J.A., Banday, M.T. (2009). "Web Accessibility - A timely
recognized challenge," The Business Review, ISSN: 0972-8384, 14(1&2), pp.
99-102
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web Accessibility for disabled people has posed a challenge to the civilized
societies that claim to uphold the principles of equal opportunity and
nondiscrimination. Certain concrete measures have been taken to narrow down the
digital divide between normal and disabled users of Internet technology. The
efforts have resulted in enactment of legislations and laws and mass awareness
about the discriminatory nature of the accessibility issue, besides the efforts
have resulted in the development of commensurate technological tools to develop
and test the Web accessibility. World Wide Web consortium's (W3C) Web
Accessibility Initiative (WAI) has framed a comprehensive document comprising
of set of guidelines to make the Web sites accessible to the users with
disabilities. This paper is about the issues and aspects surrounding Web
Accessibility. The details and scope are kept limited to comply with the aim of
the paper which is to create awareness and to provide basis for in-depth
investigation.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2011 14:31:36 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Qadri",
"Jameel A.",
""
],
[
"Banday",
"M. Tariq",
""
]
] |
new_dataset
| 0.998344 |
1112.5732
|
M. Tariq Banday
|
M. Tariq Banday and Jameel A. Qadri
|
Phishing - A Growing Threat to E-Commerce
|
8 Pages
|
Banday, M.T., Qadri, J.A. (2007). "Phishing - A Growing Threat to
E-Commerce," The Business Review, ISSN: 0972-8384, 12(2), pp. 76-83
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In today's business environment, it is difficult to imagine a workplace
without access to the web, yet a variety of email born viruses, spyware,
adware, Trojan horses, phishing attacks, directory harvest attacks, DoS
attacks, and other threats combine to attack businesses and customers. This
paper is an attempt to review phishing - a constantly growing and evolving
threat to Internet based commercial transactions. Various phishing approaches
that include vishing, spear phishng, pharming, keyloggers, malware, web
Trojans, and others will be discussed. This paper also highlights the latest
phishing analysis made by Anti-Phishing Working Group (APWG) and Korean
Internet Security Center.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2011 15:12:23 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Banday",
"M. Tariq",
""
],
[
"Qadri",
"Jameel A.",
""
]
] |
new_dataset
| 0.998237 |
1112.5947
|
Sergey Verlan
|
Sergiu Ivanov, Sergey Verlan
|
Random Context and Semi-Conditional Insertion-Deletion Systems
| null | null | null | null |
cs.FL cs.CC cs.CL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we introduce the operations of insertion and deletion working
in a random-context and semi-conditional manner. We show that the conditional
use of rules strictly increase the computational power. In the case of
semi-conditional insertion-deletion systems context-free insertion and deletion
rules of one symbol are sufficient to get the computational completeness. In
the random context case our results expose an asymmetry between the
computational power of insertion and deletion rules: systems of size $(2,0,0;
1,1,0)$ are computationally complete, while systems of size $(1,1,0;2,0,0)$
(and more generally of size $(1,1,0;p,1,1)$) are not. This is particularly
interesting because other control mechanisms like graph-control or matrix
control used together with insertion-deletion systems do not present such
asymmetry.
|
[
{
"version": "v1",
"created": "Tue, 27 Dec 2011 10:16:35 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Ivanov",
"Sergiu",
""
],
[
"Verlan",
"Sergey",
""
]
] |
new_dataset
| 0.97025 |
1112.5959
|
Pere J Ferrer Mr
|
M. A. Jaume, J. Paradells
|
Disseny d'un prototipus de xarxa MESH sense fils multir\'adio i
multicanal sobre OLSR modificat amb canal de senyalitzaci\'o dedicat
|
pages 243
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless mesh cubes are used to improve the channel signaling.
|
[
{
"version": "v1",
"created": "Tue, 27 Dec 2011 13:35:38 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Jaume",
"M. A.",
""
],
[
"Paradells",
"J.",
""
]
] |
new_dataset
| 0.984593 |
1112.6096
|
Jacopo Mauro
|
Massimo Morara, Jacopo Mauro and Maurizio Gabbrielli
|
Solving XCSP problems by using Gecode
|
5 pages, http://ceur-ws.org/Vol-810 CILC 2011
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gecode is one of the most efficient libraries that can be used for constraint
solving. However, using it requires dealing with C++ programming details. On
the other hand several formats for representing constraint networks have been
proposed. Among them, XCSP has been proposed as a format based on XML which
allows us to represent constraints defined either extensionally or
intensionally, permits global constraints and has been the standard format of
the international competition of constraint satisfaction problems solvers. In
this paper we present a plug-in for solving problems specified in XCSP by
exploiting the Gecode solver. This is done by dynamically translating
constraints into Gecode library calls, thus avoiding the need to interact with
C++.
|
[
{
"version": "v1",
"created": "Wed, 28 Dec 2011 10:49:18 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Morara",
"Massimo",
""
],
[
"Mauro",
"Jacopo",
""
],
[
"Gabbrielli",
"Maurizio",
""
]
] |
new_dataset
| 0.966346 |
1112.5424
|
Ofer Shir
|
Ofer M. Shir, Jonathan Roslund, Zaki Leghtas and Herschel Rabitz
|
Quantum Control Experiments as a Testbed for Evolutionary
Multi-Objective Algorithms
| null | null | null | null |
cs.NE math-ph math.MP quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Experimental multi-objective Quantum Control is an emerging topic within the
broad physics and chemistry applications domain of controlling quantum
phenomena. This realm offers cutting edge ultrafast laser laboratory
applications, which pose multiple objectives, noise, and possibly constraints
on the high-dimensional search. In this study we introduce the topic of
Multi-Observable Quantum Control (MOQC), and consider specific systems to be
Pareto optimized subject to uncertainty, either experimentally or by means of
simulated systems. The latter include a family of mathematical test-functions
with a practical link to MOQC experiments, which are introduced here for the
first time. We investigate the behavior of the multi-objective version of the
Covariance Matrix Adaptation Evolution Strategy (MO-CMA-ES) and assess its
performance on computer simulations as well as on laboratory closed-loop
experiments. Overall, we propose a comprehensive study on experimental
evolutionary Pareto optimization in high-dimensional continuous domains, draw
some practical conclusions concerning the impact of fitness disturbance on
algorithmic behavior, and raise several theoretical issues in the broad
evolutionary multi-objective context.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2011 19:32:21 GMT"
}
] | 2011-12-23T00:00:00 |
[
[
"Shir",
"Ofer M.",
""
],
[
"Roslund",
"Jonathan",
""
],
[
"Leghtas",
"Zaki",
""
],
[
"Rabitz",
"Herschel",
""
]
] |
new_dataset
| 0.9798 |
1112.4604
|
Jose Gracia
|
Steffen Brinkmann, Jos\'e Gracia, Christoph Niethammer, Rainer Keller
|
TEMANEJO - a debugger for task based parallel programming models
|
8 pages, presented at ParCO 2011, Ghent, Belgium
| null | null | null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the program Temanejo, a debugger for task based parallelisation
models such as StarSs. The challenge in debugging StarSs applications lies in
the fact that tasks are scheduled at runtime, i.e dynamically in accordance to
the data dependencies between them. Our tool assists the programmer in the
debugging process by visualising the task dependency graph and allowing to
control the scheduling of tasks. The toolset consists of the library Ayudame
which communicates with the StarSs runtime on one side and of the debugger
Temanejo on the other side which communicates with Ayudame. Temanejo provides a
graphical user interface with which the application can be analysed and
controlled.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2011 08:41:56 GMT"
}
] | 2011-12-22T00:00:00 |
[
[
"Brinkmann",
"Steffen",
""
],
[
"Gracia",
"José",
""
],
[
"Niethammer",
"Christoph",
""
],
[
"Keller",
"Rainer",
""
]
] |
new_dataset
| 0.999406 |
1112.4915
|
Jeremy Blackburn
|
Jeremy Blackburn and Ramanuja Simha and Nicolas Kourtellis and Xiang
Zuo and Clayton Long and Matei Ripeanu and John Skvoretz and Adriana
Iamnitchi
|
Cheaters in the Steam Community Gaming Social Network
| null | null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online gaming is a multi-billion dollar industry that entertains a large,
global population. One unfortunate phenomenon, however, poisons the competition
and the fun: cheating. The costs of cheating span from industry-supported
expenditures to detect and limit cheating, to victims' monetary losses due to
cyber crime.
This paper studies cheaters in the Steam Community, an online social network
built on top of the world's dominant digital game delivery platform. We
collected information about more than 12 million gamers connected in a global
social network, of which more than 700 thousand have their profiles flagged as
cheaters. We also collected in-game interaction data of over 10 thousand
players from a popular multiplayer gaming server. We show that cheaters are
well embedded in the social and interaction networks: their network position is
largely undistinguishable from that of fair players. We observe that the
cheating behavior appears to spread through a social mechanism: the presence
and the number of cheater friends of a fair player is correlated with the
likelihood of her becoming a cheater in the future. Also, we observe that there
is a social penalty involved with being labeled as a cheater: cheaters are
likely to switch to more restrictive privacy settings once they are tagged and
they lose more friends than fair players. Finally, we observe that the number
of cheaters is not correlated with the geographical, real-world population
density, or with the local popularity of the Steam Community.
This analysis can ultimately inform the design of mechanisms to deal with
anti-social behavior (e.g., spamming, automated collection of data) in generic
online social networks.
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2011 03:12:35 GMT"
}
] | 2011-12-22T00:00:00 |
[
[
"Blackburn",
"Jeremy",
""
],
[
"Simha",
"Ramanuja",
""
],
[
"Kourtellis",
"Nicolas",
""
],
[
"Zuo",
"Xiang",
""
],
[
"Long",
"Clayton",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Skvoretz",
"John",
""
],
[
"Iamnitchi",
"Adriana",
""
]
] |
new_dataset
| 0.997977 |
1112.5136
|
Richard West
|
Ye Li, Matthew Danish and Richard West
|
Quest-V: A Virtualized Multikernel for High-Confidence Systems
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper outlines the design of `Quest-V', which is implemented as a
collection of separate kernels operating together as a distributed system on a
chip. Quest-V uses virtualization techniques to isolate kernels and prevent
local faults from affecting remote kernels. This leads to a high-confidence
multikernel approach, where failures of system subcomponents do not render the
entire system inoperable. A virtual machine monitor for each kernel keeps track
of shadow page table mappings that control immutable memory access
capabilities. This ensures a level of security and fault tolerance in
situations where a service in one kernel fails, or is corrupted by a malicious
attack. Communication is supported between kernels using shared memory regions
for message passing. Similarly, device driver data structures are shareable
between kernels to avoid the need for complex I/O virtualization, or
communication with a dedicated kernel responsible for I/O. In Quest-V, device
interrupts are delivered directly to a kernel, rather than via a monitor that
determines the destination. Apart from bootstrapping each kernel, handling
faults and managing shadow page tables, the monitors are not needed. This
differs from conventional virtual machine systems in which a central monitor,
or hypervisor, is responsible for scheduling and management of host resources
amongst a set of guest kernels. In this paper we show how Quest-V can implement
novel fault isolation and recovery techniques that are not possible with
conventional systems. We also show how the costs of using virtualization for
isolation of system services does not add undue overheads to the overall system
performance.
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2011 19:02:12 GMT"
}
] | 2011-12-22T00:00:00 |
[
[
"Li",
"Ye",
""
],
[
"Danish",
"Matthew",
""
],
[
"West",
"Richard",
""
]
] |
new_dataset
| 0.991106 |
1112.4775
|
Yasir Malik
|
Usman Tariq, Yasir Malik, Man-Pyo Hong
|
NACS: non-overlapping AP's caching scheme to reduce handoff in 802.11
wireless LAN
|
6 Pages, 6 Figures, Conference Pager
| null |
10.1109/ICON.2005.1635434
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the escalation of the IEEE 802.11 based wireless networks, voice over IP
and analogous applications are also used over wireless networks. Recently, the
wireless LAN systems are spaciously deployed for public Internet services. In
public wireless LAN systems, reliable user authentication and mobility support
are indispensable issues. When a mobile device budges out the range of one
access point (AP) and endeavor to connect to new AP, it performs handoff.
Contemporarily, PNC and SNC were proposed to propagate the MN context to the
entire neighboring AP's on the wireless network with the help of neighbor
graph. In this paper, we proposed a non-overlapping AP's caching scheme (NACS),
which propagates the mobile node context to those AP's which do not overlap
with the current AP. To capture the topology of non-overlapping AP's in the
wireless network, non-overlapping graph (NOG) is generated at each AP.
Simulation results shows that NACS reduces the signaling cost of propagating
the MN context to the neighbor AP's in the wireless network.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2011 17:18:50 GMT"
}
] | 2011-12-21T00:00:00 |
[
[
"Tariq",
"Usman",
""
],
[
"Malik",
"Yasir",
""
],
[
"Hong",
"Man-Pyo",
""
]
] |
new_dataset
| 0.978162 |
1112.4791
|
Mirela Damian
|
Mirela Damian, Erik Demaine and Robin Flatland
|
Unfolding Orthogonal Polyhedra with Quadratic Refinement: The
Delta-Unfolding Algorithm
|
15 pages, 10 figures
| null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that every orthogonal polyhedron homeomorphic to a sphere can be
unfolded without overlap while using only polynomially many (orthogonal) cuts.
By contrast, the best previous such result used exponentially many cuts. More
precisely, given an orthogonal polyhedron with n vertices, the algorithm cuts
the polyhedron only where it is met by the grid of coordinate planes passing
through the vertices, together with Theta(n^2) additional coordinate planes
between every two such grid planes.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2011 18:26:24 GMT"
}
] | 2011-12-21T00:00:00 |
[
[
"Damian",
"Mirela",
""
],
[
"Demaine",
"Erik",
""
],
[
"Flatland",
"Robin",
""
]
] |
new_dataset
| 0.995449 |
1009.0579
|
Christian Duncan
|
Christian A. Duncan and David Eppstein and Michael T. Goodrich and
Stephen G. Kobourov and Martin N\"ollenburg
|
Lombardi Drawings of Graphs
|
Expanded version of paper appearing in the 18th International
Symposium on Graph Drawing (GD 2010). 13 pages, 7 figures
|
J. Graph Algorithms and Applications 16(1):85-108, 2012 (special
issue for GD 2010)
| null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the notion of Lombardi graph drawings, named after the American
abstract artist Mark Lombardi. In these drawings, edges are represented as
circular arcs rather than as line segments or polylines, and the vertices have
perfect angular resolution: the edges are equally spaced around each vertex. We
describe algorithms for finding Lombardi drawings of regular graphs, graphs of
bounded degeneracy, and certain families of planar graphs.
|
[
{
"version": "v1",
"created": "Fri, 3 Sep 2010 03:36:03 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Duncan",
"Christian A.",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Kobourov",
"Stephen G.",
""
],
[
"Nöllenburg",
"Martin",
""
]
] |
new_dataset
| 0.999388 |
1105.1071
|
Yunlei Zhao
|
Andrew C. Yao, Yunlei Zhao
|
A New Family of Practical Non-Malleable Diffie-Hellman Protocols
| null | null | null | null |
cs.CR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cryptography algorithm standards play a key role both to the practice of
information security and to cryptography theory research. Among them, the MQV
and HMQV protocols ((H)MQV, in short) are a family of (implicitly
authenticated) Diffie-Hellman key-exchange (DHKE) protocols that are widely
standardized and deployed. In this work, from some new perspectives and
approaches and under some new design rationales and insights, we develop a new
family of practical implicitly authenticated DHKE protocols, which enjoy
notable performance among security, privacy, efficiency and easy deployment. We
make detailed comparisons between our new DHKE protocols and (H)MQV, showing
that the newly developed protocols outperform HMQV in most aspects. Along the
way, guided by our new design rationales, we also identify a new vulnerability
(H)MQV, which brings some new perspectives (e.g., computational fairness) to
the literature.
|
[
{
"version": "v1",
"created": "Thu, 5 May 2011 13:39:18 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Jul 2011 06:46:35 GMT"
},
{
"version": "v3",
"created": "Sat, 16 Jul 2011 14:38:10 GMT"
},
{
"version": "v4",
"created": "Wed, 9 Nov 2011 03:33:45 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Dec 2011 02:14:48 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Yao",
"Andrew C.",
""
],
[
"Zhao",
"Yunlei",
""
]
] |
new_dataset
| 0.995262 |
1111.3602
|
Davide Schipani
|
Michele Elia, Davide Schipani
|
On the Rabin signature
|
General revision; new section on blind signatures
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some Rabin signature schemes may be exposed to forgery; several variants are
here described to counter this vulnerability. Blind Rabin signatures are also
discussed.
|
[
{
"version": "v1",
"created": "Thu, 10 Nov 2011 23:50:06 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2011 17:04:16 GMT"
},
{
"version": "v3",
"created": "Sat, 17 Dec 2011 18:11:00 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Elia",
"Michele",
""
],
[
"Schipani",
"Davide",
""
]
] |
new_dataset
| 0.999276 |
1112.4018
|
Phuc V. Nguyen Mr.
|
Phuc V. Nguyen
|
Mobile IP and protocol authentication extension
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile IP is an open standard, defined by the Internet Engineering Task Force
(IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay
connected, and maintain ongoing applications while roaming between IP networks.
Mobile IP is scalable for the Internet because it is based on IP - any media
that can support IP can support Mobile IP.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2011 03:40:35 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Nguyen",
"Phuc V.",
""
]
] |
new_dataset
| 0.999226 |
1112.4019
|
Phuc V. Nguyen Mr.
|
Phuc V. Nguyen
|
Legal Resources Information System for Information Agencies of
Specialized Libraries
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, the rapid development of information technology and
communication has a strong impact to industry information - the library. The
mission of the industry when in fact the great social place to see the library
as knowledge management. Vietnam is in the process of building the rule of law
socialist orientation and improves the legal system. So in the current
development process, the law library plays an important role in the retention,
dissemination and provision of legal information service of legislative,
executive and judiciary, particularly especially research, teaching and
learning of law school. But the response of the legal information library
information agencies remains limited compared to the increasing demand of
users.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2011 03:48:36 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Nguyen",
"Phuc V.",
""
]
] |
new_dataset
| 0.962506 |
1112.4060
|
Bartlomiej Placzek
|
Bart{\l}omiej P{\l}aczek
|
A real time vehicles detection algorithm for vision based sensors
|
The final publication is available at http://www.springerlink.com
|
P{\l}aczek B., A real time vehicles detection algorithm for vision
based sensors, Lecture Notes in Computer Science 6375, Springer-Verlag,
Berlin Heidelberg, 2010, pp. 211-218
|
10.1007/978-3-642-15907-7_26
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A vehicle detection plays an important role in the traffic control at
signalised intersections. This paper introduces a vision-based algorithm for
vehicles presence recognition in detection zones. The algorithm uses linguistic
variables to evaluate local attributes of an input image. The image attributes
are categorised as vehicle, background or unknown features. Experimental
results on complex traffic scenes show that the proposed algorithm is effective
for a real-time vehicles detection.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2011 14:50:50 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Płaczek",
"Bartłomiej",
""
]
] |
new_dataset
| 0.997143 |
1112.4238
|
Praveen Chandrashekar
|
Praveen Chandrashekar and Ashish Garg
|
Vertex-centroid finite volume scheme on tetrahedral grids for
conservation laws
| null | null | null | null |
cs.NA cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vertex-centroid schemes are cell-centered finite volume schemes for
conservation laws which make use of vertex values to construct high resolution
schemes. The vertex values must be obtained through a consistent averaging
(interpolation) procedure. A modified interpolation scheme is proposed which is
better than existing schemes in giving positive weights in the interpolation
formula. A simplified reconstruction scheme is also proposed which is also more
accurate and efficient. For scalar conservation laws, we develop limited
versions of the schemes which are stable in maximum norm by constructing
suitable limiters. The schemes are applied to compressible flows governed by
the Euler equations of inviscid gas dynamics.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2011 04:54:47 GMT"
}
] | 2011-12-20T00:00:00 |
[
[
"Chandrashekar",
"Praveen",
""
],
[
"Garg",
"Ashish",
""
]
] |
new_dataset
| 0.999308 |
0912.1746
|
Pierre Lescanne
|
Pierre Lescanne (LIP), Perrinel Matthieu (LIP)
|
On the Rationality of Escalation
|
19 p. This paper is a duplicate of arXiv:1004.5257
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Escalation is a typical feature of infinite games. Therefore tools conceived
for studying infinite mathematical structures, namely those deriving from
coinduction are essential. Here we use coinduction, or backward coinduction (to
show its connection with the same concept for finite games) to study carefully
and formally the infinite games especially those called dollar auctions, which
are considered as the paradigm of escalation. Unlike what is commonly admitted,
we show that, provided one assumes that the other agent will always stop,
bidding is rational, because it results in a subgame perfect equilibrium. We
show that this is not the only rational strategy profile (the only subgame
perfect equilibrium). Indeed if an agent stops and will stop at every step, we
claim that he is rational as well, if one admits that his opponent will never
stop, because this corresponds to a subgame perfect equilibrium. Amazingly, in
the infinite dollar auction game, the behavior in which both agents stop at
each step is not a Nash equilibrium, hence is not a subgame perfect
equilibrium, hence is not rational.
|
[
{
"version": "v1",
"created": "Wed, 9 Dec 2009 13:52:49 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Dec 2011 10:03:53 GMT"
}
] | 2011-12-16T00:00:00 |
[
[
"Lescanne",
"Pierre",
"",
"LIP"
],
[
"Matthieu",
"Perrinel",
"",
"LIP"
]
] |
new_dataset
| 0.985187 |
1112.2187
|
Chih-Yu Wang
|
Chih-Yu Wang and Yan Chen and K. J. Ray Liu
|
Chinese Restaurant Game - Part II: Applications to Wireless Networking,
Cloud Computing, and Online Social Networking
| null | null | null | null |
cs.SI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Part I of this two-part paper [1], we proposed a new game, called Chinese
restaurant game, to analyze the social learning problem with negative network
externality. The best responses of agents in the Chinese restaurant game with
imperfect signals are constructed through a recursive method, and the influence
of both learning and network externality on the utilities of agents is studied.
In Part II of this two-part paper, we illustrate three applications of Chinese
restaurant game in wireless networking, cloud computing, and online social
networking. For each application, we formulate the corresponding problem as a
Chinese restaurant game and analyze how agents learn and make strategic
decisions in the problem. The proposed method is compared with four
common-sense methods in terms of agents' utilities and the overall system
performance through simulations. We find that the proposed Chinese restaurant
game theoretic approach indeed helps agents make better decisions and improves
the overall system performance. Furthermore, agents with different decision
orders have different advantages in terms of their utilities, which also
verifies the conclusions drawn in Part I of this two-part paper.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2011 19:31:28 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Dec 2011 00:22:51 GMT"
}
] | 2011-12-16T00:00:00 |
[
[
"Wang",
"Chih-Yu",
""
],
[
"Chen",
"Yan",
""
],
[
"Liu",
"K. J. Ray",
""
]
] |
new_dataset
| 0.998963 |
1112.3307
|
Oliver Kosut
|
Oliver Kosut, Lang Tong, David Tse
|
Polytope Codes Against Adversaries in Networks
|
63 pages. Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network coding is studied when an adversary controls a subset of nodes in the
network of limited quantity but unknown location. This problem is shown to be
more difficult than when the adversary controls a given number of edges in the
network, in that linear codes are insufficient. To solve the node problem, the
class of Polytope Codes is introduced. Polytope Codes are constant composition
codes operating over bounded polytopes in integer vector fields. The polytope
structure creates additional complexity, but it induces properties on marginal
distributions of code vectors so that validities of codewords can be checked by
internal nodes of the network. It is shown that Polytope Codes achieve a
cut-set bound for a class of planar networks. It is also shown that this
cut-set bound is not always tight, and a tighter bound is given for an example
network.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2011 19:10:39 GMT"
}
] | 2011-12-15T00:00:00 |
[
[
"Kosut",
"Oliver",
""
],
[
"Tong",
"Lang",
""
],
[
"Tse",
"David",
""
]
] |
new_dataset
| 0.998775 |
1112.0057
|
Yi Hong Dr
|
Nirmal Fernando, Yi Hong and Emanuele Viterbo
|
Flip-OFDM for Unipolar Communication Systems
|
19 pages, 8 pages (re-uploaded with corrected Fig 2a)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Unipolar communications systems can transmit information using only real and
positive signals. This includes a variety of physical channels ranging from
optical (fiber or free-space), to RF wireless using amplitude modulation with
non-coherent reception, to baseband single wire communications. Unipolar OFDM
techniques enable to efficiently compensate frequency selective distortion in
the unipolar communication systems. One of the leading examples of unipolar
OFDM is asymmetric clipped optical OFDM (ACO-OFDM) originally proposed for
optical communications. Flip-OFDM is an alternative approach that was proposed
in a patent, but its performance and full potentials have never been
investigated in the literature. In this paper, we first compare Flip-OFDM and
ACO-OFDM, and show that both techniques have the same performance but different
complexities (Flip-OFDM offers 50% saving). We then propose a new detection
scheme, which enables to reduce the noise at the Flip-OFDM receiver by almost
3dB. The analytical performance of the noise filtering schemes is supported by
the simulation results.
|
[
{
"version": "v1",
"created": "Thu, 1 Dec 2011 00:36:34 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Dec 2011 12:25:25 GMT"
}
] | 2011-12-14T00:00:00 |
[
[
"Fernando",
"Nirmal",
""
],
[
"Hong",
"Yi",
""
],
[
"Viterbo",
"Emanuele",
""
]
] |
new_dataset
| 0.991477 |
1104.4081
|
Shayan Oveis Gharan
|
Shayan Oveis Gharan, Jan Vondr\'ak
|
On Variants of the Matroid Secretary Problem
| null | null | null | null |
cs.DS cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a number of positive and negative results for variants of the
matroid secretary problem. Most notably, we design a constant-factor
competitive algorithm for the "random assignment" model where the weights are
assigned randomly to the elements of a matroid, and then the elements arrive
on-line in an adversarial order (extending a result of Soto \cite{Soto11}).
This is under the assumption that the matroid is known in advance. If the
matroid is unknown in advance, we present an $O(\log r \log n)$-approximation,
and prove that a better than $O(\log n / \log \log n)$ approximation is
impossible. This resolves an open question posed by Babaioff et al.
\cite{BIK07}.
As a natural special case, we also consider the classical secretary problem
where the number of candidates $n$ is unknown in advance. If $n$ is chosen by
an adversary from $\{1,...,N\}$, we provide a nearly tight answer, by providing
an algorithm that chooses the best candidate with probability at least
$1/(H_{N-1}+1)$ and prove that a probability better than $1/H_N$ cannot be
achieved (where $H_N$ is the $N$-th harmonic number).
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2011 17:38:01 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Dec 2011 20:16:51 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Gharan",
"Shayan Oveis",
""
],
[
"Vondrák",
"Jan",
""
]
] |
new_dataset
| 0.979844 |
1106.0342
|
Giordano Pola
|
Giordano Pola, Maria D. Di Benedetto and Elena De Santis
|
Arenas of Finite State Machines
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finite state machines are widely used as a sound mathematical formalism that
appropriately describes large scale, distributed and complex systems. Multiple
interactions of finite state machines in complex systems are well captured by
the notion of non-flat systems. Non--flat systems are "finite state machines"
where each "state" can be either a basic state or an aggregate of finite state
machines. By expanding a non-flat system, a flat system is obtained which is an
ordinary finite state machine. In this paper we introduce a novel class of
non--flat systems called Arena of Finite State Machines (AFSM). AFSMs are
collections of finite state machines that interact concurrently through a
communication network. We propose a notion of compositional bisimulation that
allows checking bisimulation equivalence of AFSMs by directly exploiting their
communication networks and hence, without the need of expanding the AFSMs to
finite state machines. Compositional bisimulation allows a computational
complexity reduction when checking bisimulation equivalence of AFSMs, as
formally quantified in the paper. An application of the proposed framework to
the regulation of gene expression in the bacterium Escherichia coli is also
presented.
|
[
{
"version": "v1",
"created": "Wed, 1 Jun 2011 23:57:42 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Dec 2011 16:01:49 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Pola",
"Giordano",
""
],
[
"Di Benedetto",
"Maria D.",
""
],
[
"De Santis",
"Elena",
""
]
] |
new_dataset
| 0.988988 |
1112.0896
|
Tuvi Etzion
|
Sarit Buzaglo and Tuvi Etzion
|
On the Existence of Perfect Codes for Asymmetric Limited-Magnitude
Errors
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Block codes, which correct asymmetric errors with limited-magnitude, are
studied. These codes have been applied recently for error correction in flash
memories. The codes will be represented by lattices and the constructions will
be based on a generalization of Sidon sequences. In particular we will consider
perfect codes for these type of errors.
|
[
{
"version": "v1",
"created": "Mon, 5 Dec 2011 11:55:08 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Dec 2011 08:49:53 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Buzaglo",
"Sarit",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.995576 |
1112.2230
|
Travis Denny
|
Travis Denny
|
Faked states attack and quantum cryptography protocols
|
9 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Leveraging quantum mechanics, cryptographers have devised provably secure key
sharing protocols. Despite proving the security in theory, real-world
application falls short of the ideal. Last year, cryptanalysts completed an
experiment demonstrating a successful eavesdropping attack on commercial
quantum key distribution (QKD) systems. This attack exploits a weakness in the
typical real-world implementation of quantum cryptosystems. Cryptanalysts have
successfully attacked several protocols. In this paper, we examine the Kak
quantum cryptography protocol and how it may perform under such attacks.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2011 22:52:43 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Denny",
"Travis",
""
]
] |
new_dataset
| 0.997239 |
1112.2254
|
Abedelaziz Mohaisen
|
Abedelaziz Mohaisen and Huy Tran and Abhishek Chandra and Yongdae Kim
|
SocialCloud: Using Social Networks for Building Distributed Computing
Services
|
15 pages, 8 figures, 2 tables
| null | null | null |
cs.DC cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate a new computing paradigm, called SocialCloud, in
which computing nodes are governed by social ties driven from a bootstrapping
trust-possessing social graph. We investigate how this paradigm differs from
existing computing paradigms, such as grid computing and the conventional cloud
computing paradigms. We show that incentives to adopt this paradigm are
intuitive and natural, and security and trust guarantees provided by it are
solid. We propose metrics for measuring the utility and advantage of this
computing paradigm, and using real-world social graphs and structures of social
traces; we investigate the potential of this paradigm for ordinary users. We
study several design options and trade-offs, such as scheduling algorithms,
centralization, and straggler handling, and show how they affect the utility of
the paradigm. Interestingly, we conclude that whereas graphs known in the
literature for high trust properties do not serve distributed trusted computing
algorithms, such as Sybil defenses---for their weak algorithmic properties,
such graphs are good candidates for our paradigm for their self-load-balancing
features.
|
[
{
"version": "v1",
"created": "Sat, 10 Dec 2011 05:52:58 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Tran",
"Huy",
""
],
[
"Chandra",
"Abhishek",
""
],
[
"Kim",
"Yongdae",
""
]
] |
new_dataset
| 0.994398 |
1112.2610
|
Asterios Katsifodimos
|
Konstantinos Karanasos (INRIA Saclay - Ile de France, LRI), Asterios
Katsifodimos (INRIA Saclay - Ile de France, LRI), Ioana Manolescu (INRIA
Saclay - Ile de France, LRI), Spyros Zoupanos (INRIA Saclay - Ile de France,
LRI, MPII)
|
The ViP2P Platform: XML Views in P2P
|
RR-7812 (2011)
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The growing volumes of XML data sources on the Web or produced by
enterprises, organizations etc. raise many performance challenges for data
management applications. In this work, we are concerned with the distributed,
peer-to-peer management of large corpora of XML documents, based on distributed
hash table (or DHT, in short) overlay networks. We present ViP2P (standing for
Views in Peer-to-Peer), a distributed platform for sharing XML documents based
on a structured P2P network infrastructure (DHT). At the core of ViP2P stand
distributed materialized XML views, defined by arbitrary XML queries, filled in
with data published anywhere in the network, and exploited to efficiently
answer queries issued by any network peer. ViP2P allows user queries to be
evaluated over XML documents published by peers in two modes. First, a
long-running subscription mode, when a query can be registered in the system
and receive answers incrementally when and if published data matches the query.
Second, queries can also be asked in an ad-hoc, snapshot mode, where results
are required immediately and must be computed based on the results of other
long-running, subscription queries. ViP2P innovates over other similar
DHT-based XML sharing platforms by using a very expressive structured XML query
language. This expressivity leads to a very flexible distribution of XML
content in the ViP2P network, and to efficient snapshot query execution. ViP2P
has been tested in real deployments of hundreds of computers. We present the
platform architecture, its internal algorithms, and demonstrate its efficiency
and scalability through a set of experiments. Our experimental results outgrow
by orders of magnitude similar competitor systems in terms of data volumes,
network size and data dissemination throughput.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2011 16:29:25 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Karanasos",
"Konstantinos",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Katsifodimos",
"Asterios",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Manolescu",
"Ioana",
"",
"INRIA\n Saclay - Ile de France, LRI"
],
[
"Zoupanos",
"Spyros",
"",
"INRIA Saclay - Ile de France,\n LRI, MPII"
]
] |
new_dataset
| 0.998437 |
1112.2649
|
Sebastian Gerling
|
Julian Backes, Michael Backes, Markus D\"urmuth, Sebastian Gerling,
Stefan Lorenz
|
X-pire! - A digital expiration date for images in social networks
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Internet and its current information culture of preserving all kinds of
data cause severe problems with privacy. Most of today's Internet users,
especially teenagers, publish various kinds of sensitive information, yet
without recognizing that revealing this information might be detrimental to
their future life and career. Unflattering images that can be openly accessed
now and in the future, e.g., by potential employers, constitute a particularly
important such privacy concern. We have developed a novel, fast, and scalable
system called X-pire! that allows users to set an expiration date for images in
social networks (e.g., Facebook and Flickr) and on static websites, without
requiring any form of additional interaction with these web pages. Once the
expiration date is reached, the images become unavailable. Moreover, the
publishing user can dynamically prolong or shorten the expiration dates of his
images later, and even enforce instantaneous expiration. Rendering the approach
possible for social networks crucially required us to develop a novel technique
for embedding encrypted information within JPEG files in a way that survives
JPEG compression, even for highly optimized implementations of JPEG
post-processing with their various idiosyncrasies as commonly used in such
networks. We have implemented our system and conducted performance measurements
to demonstrate its robustness and efficiency.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2011 18:24:21 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Backes",
"Julian",
""
],
[
"Backes",
"Michael",
""
],
[
"Dürmuth",
"Markus",
""
],
[
"Gerling",
"Sebastian",
""
],
[
"Lorenz",
"Stefan",
""
]
] |
new_dataset
| 0.994981 |
1112.2661
|
Jong Yoon
|
Jong P. Yoon
|
Location- and Time-Dependent VPD for Privacy-Preserving Wireless
Accesses to Cloud Services
|
16 pages, 8 figures, International Journal on Cloud Computing:
Services and Architecture (IJCCSA)
| null | null | null |
cs.CR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of smartphones in recent years has changed the wireless landscape.
Smartphones have become a platform for online user interface to cloud
databases. Cloud databases may provide a large set of user-private and
sensitive data (i.e., objects), while smartphone users (i.e., subjects) provide
location-sensitive information. Secure and private services in wireless
accessing to cloud databases have been discussed actively for the past recent
years. However, the previous techniques are unsatisfactory for dynamism of
moving subjects' wireless accesses. In this paper, we propose a novel technique
to dynamically generate virtual private databases (VPD) for each access by
taking subjects' location and time information into account. The contribution
of this paper includes a privacy-preserving access control mechanism for
dynamism of wireless access.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2011 19:22:24 GMT"
}
] | 2011-12-13T00:00:00 |
[
[
"Yoon",
"Jong P.",
""
]
] |
new_dataset
| 0.963994 |
1009.4517
|
Krishnam Raju Jampani
|
Bernhard Haeupler and Krishnam Raju Jampani and Anna Lubiw
|
Testing Simultaneous Planarity when the Common Graph is 2-Connected
|
Appeared in ISAAC 2010, 15 pages, 3 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two planar graphs G1 and G2 sharing some vertices and edges are
`simultaneously planar' if they have planar drawings such that a shared vertex
[edge] is represented by the same point [curve] in both drawings. It is an open
problem whether simultaneous planarity can be tested efficiently. We give a
linear-time algorithm to test simultaneous planarity when the two graphs share
a 2-connected subgraph. Our algorithm extends to the case of k planar graphs
where each vertex [edge] is either common to all graphs or belongs to exactly
one of them.
|
[
{
"version": "v1",
"created": "Thu, 23 Sep 2010 04:24:51 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Dec 2011 05:21:49 GMT"
}
] | 2011-12-12T00:00:00 |
[
[
"Haeupler",
"Bernhard",
""
],
[
"Jampani",
"Krishnam Raju",
""
],
[
"Lubiw",
"Anna",
""
]
] |
new_dataset
| 0.995242 |
1112.2021
|
Debasis Das
|
Debasis Das and Rajiv Misra
|
Programmable Cellular Automata Based Efficient Parallel AES Encryption
Algorithm
| null | null | null | null |
cs.DC cs.NI nlin.CG
|
http://creativecommons.org/licenses/by/3.0/
|
Cellular Automata(CA) is a discrete computing model which provides simple,
flexible and efficient platform for simulating complicated systems and
performing complex computation based on the neighborhoods information. CA
consists of two components 1) a set of cells and 2) a set of rules .
Programmable Cellular Automata(PCA) employs some control signals on a Cellular
Automata(CA) structure. Programmable Cellular Automata were successfully
applied for simulation of biological systems, physical systems and recently to
design parallel and distributed algorithms for solving task density and
synchronization problems. In this paper PCA is applied to develop cryptography
algorithms. This paper deals with the cryptography for a parallel AES
encryption algorithm based on programmable cellular automata. This proposed
algorithm based on symmetric key systems.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2011 05:47:31 GMT"
}
] | 2011-12-12T00:00:00 |
[
[
"Das",
"Debasis",
""
],
[
"Misra",
"Rajiv",
""
]
] |
new_dataset
| 0.993312 |
1112.2039
|
Mahmoud Elkhouly Prof
|
Mahmoud Mohamed El-Khouly
|
ECAKP: Encrypt Collect Authenticate Kill Play
|
8 pages, 1 figure, 2 tables
|
The International Journal of Multimedia & Its Applications (IJMA)
ISSN: 0975-5578 (online), 0975-5934 (print). 2011
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are taught from a young age that plagiarism (copying other's work) is
wrong. However, the problem of Illegal copies of multimedia data is exacerbated
by the widespread availability of circumvention devices, which enable people to
make infringing copies of multimedia data. Recently, Joint Video Compression
and Encryption (JVCE) has gained increased attention to reduce the
computational complexity of video compression, as well as provide encryption of
multimedia data. In this paper, a novel protection method for multimedia data
(ECAKP) is proposed. It combines encryption process and compression with
authenticating process. The method had been implemented and the results are
discussed in detail.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2011 08:14:50 GMT"
}
] | 2011-12-12T00:00:00 |
[
[
"El-Khouly",
"Mahmoud Mohamed",
""
]
] |
new_dataset
| 0.996611 |
1112.2046
|
Purvang Dalal
|
Purvang Dalal, Nikhil Kothari and K. S. Dasgupta
|
Improving TCP Performance over Wireless Network with Frequent
Disconnections
|
16 Pages, 11 Figures; International Journal of Computer Networks &
Communications (IJCNC) Vol.3, No.6, November 2011
| null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Presented in this paper is the solution to the problem that arises when the
TCP/IP protocol suite is used to provide Internet connectivity through mobile
terminals over emerging 802.11 wireless links. Taking into consideration the
strong drive towards wireless Internet access through mobile terminals, the
problem of frequent disconnections causing serial timeouts is examined and
analyzed, with the help of extensive simulations. After a detailed review of
wireless link loss recovery mechanism and identification of related problems, a
new scheme with modifications at link layer and transport layer is proposed.
The proposed modifications which depend on interaction between two layers (i)
reduce the idle time before transmission at TCP by preventing timeout
occurrences and (ii) decouple the congestion control from recovery of the
losses due to link failure. Results of simulation based experiments demonstrate
considerable performance improvement with the proposed modifications over the
conventional TCP, when a wireless sender is experiencing frequent link
failures.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2011 08:36:34 GMT"
}
] | 2011-12-12T00:00:00 |
[
[
"Dalal",
"Purvang",
""
],
[
"Kothari",
"Nikhil",
""
],
[
"Dasgupta",
"K. S.",
""
]
] |
new_dataset
| 0.997492 |
1112.1742
|
Weidong Huang
|
Weidong Huang and Leila Alem and Jalal Albasri
|
HandsInAir: A Wearable System for Remote Collaboration
| null | null | null | null |
cs.HC
|
http://creativecommons.org/licenses/by/3.0/
|
We present HandsInAir, a real-time collaborative wearable system for remote
collaboration. The system is developed to support real world scenarios in which
a remote mobile helper guides a local mobile worker performing a physical task.
HandsInAir implements a novel approach to support mobility of remote
collaborators. This approach allows the helper to perform gestures without
having to touch tangible objects, requiring little environment support. The
system consists of two parts: the helper part and the worker part. The two
parts are connected via a wireless network and the collaboration partners
communicate with each other via audio and visual links. In this paper, we
review related work, describe technical implementation of the system and
envision future work for further improvements.
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2011 00:45:06 GMT"
}
] | 2011-12-09T00:00:00 |
[
[
"Huang",
"Weidong",
""
],
[
"Alem",
"Leila",
""
],
[
"Albasri",
"Jalal",
""
]
] |
new_dataset
| 0.999779 |
1112.1770
|
Rajai Nasser
|
Rajai Nasser
|
Polar codes for the m-user multiple access channels
|
21 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are constructed for m-user multiple access channels (MAC) whose
input alphabet size is a prime number. The block error probability under
successive cancelation decoding decays exponentially with the square root of
the block length. Although the sum capacity is achieved by this coding scheme,
some points in the symmetric capacity region may not be achieved. In the case
where the channel is a combination of linear channels, we provide a necessary
and sufficient condition characterizing the channels whose symmetric capacity
region is preserved upon the polarization process. We also provide a sufficient
condition for having a total loss in the dominant face.
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2011 07:01:08 GMT"
}
] | 2011-12-09T00:00:00 |
[
[
"Nasser",
"Rajai",
""
]
] |
new_dataset
| 0.999844 |
1112.1848
|
Tristan Crolard
|
Tristan Crolard
|
A Formally Specified Program Logic for Higher-Order Procedural Variables
and non-local Jumps
| null | null | null |
TR-LACL-2011-5
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We formally specified a program logic for higher-order procedural variables
and non-local jumps with Ott and Twelf. Moreover, the dependent type systems
and the translation are both executable specifications thanks to Twelf's logic
programming engine. In particular, relying on Filinski's encoding of
shift/reset using callcc/throw and a global meta-continuation (simulated in
state passing style), we have mechanically checked the correctness of a few
examples (all source files are available on request).
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2011 14:36:59 GMT"
}
] | 2011-12-09T00:00:00 |
[
[
"Crolard",
"Tristan",
""
]
] |
new_dataset
| 0.954868 |
1112.1932
|
Bachir Chihani
|
Bachir Chihani, Collange Denis
|
A Multipath TCP model for ns-3 simulator
|
Accepted Paper; Workshop on ns-3 held in conjunction with SIMUTools
2011, Barcelona : Spain (2011)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an implementation of Multipath TCP (MPTCP) under the NS-3 open
source network simulator. MPTCP is a promising extension of TCP currently
considered by the recent eponymous IETF working group, with the objective of
improving the performance of TCP, especially its robustness to variable network
conditions. We describe this new protocol, its main functions and our
implementation in NS-3. Besides this implementation compliant to the current
versions of the IETF drafts, we have also added and compared various packet
reordering mechanisms. We indeed notice that such mechanisms highly improve the
performance of MPTCP. We believe that our implementation could be useful for
future works in MPTCP performance evaluation, especially to compare packet
reordering algorithms or coupling congestion control mechanisms between
subfows.
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2011 20:13:43 GMT"
}
] | 2011-12-09T00:00:00 |
[
[
"Chihani",
"Bachir",
""
],
[
"Denis",
"Collange",
""
]
] |
new_dataset
| 0.997722 |
1112.1484
|
Sudam Sekhar panda
|
S.S. Panda, M.S.R.S Prasad, G. Jena
|
POCS Based Super-Resolution Image Reconstruction Using an Adaptive
Regularization Parameter
|
4 pages,2 fig,2 tables,Published in IJCSI International Journal of
Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011 ISSN (Online):
1694-0814
|
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 5, No 2, September 2011 ISSN (Online): 1694-0814
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Crucial information barely visible to the human eye is often embedded in a
series of low-resolution images taken of the same scene. Super-resolution
enables the extraction of this information by reconstructing a single image, at
a high resolution than is present in any of the individual images. This is
particularly useful in forensic imaging, where the extraction of minute details
in an image can help to solve a crime. Super-resolution image restoration has
been one of the most important research areas in recent years which goals to
obtain a high resolution (HR) image from several low resolutions (LR) blurred,
noisy, under sampled and displaced images. Relation of the HR image and LR
images can be modeled by a linear system using a transformation matrix and
additive noise. However, a unique solution may not be available because of the
singularity of transformation matrix. To overcome this problem, POCS method has
been used. However, their performance is not good because the effect of noise
energy has been ignored. In this paper, we propose an adaptive regularization
approach based on the fact that the regularization parameter should be a linear
function of noise variance. The performance of the proposed approach has been
tested on several images and the obtained results demonstrate the superiority
of our approach compared with existing methods.
|
[
{
"version": "v1",
"created": "Wed, 7 Dec 2011 06:29:07 GMT"
}
] | 2011-12-08T00:00:00 |
[
[
"Panda",
"S. S.",
""
],
[
"Prasad",
"M. S. R. S",
""
],
[
"Jena",
"G.",
""
]
] |
new_dataset
| 0.960425 |
1112.1316
|
Emmanuel Polonowski
|
Emmanuel Polonowski
|
Generic Environments in Coq
|
6 pages; The Third Coq Workshop (Coq'3), 2011
| null | null |
TR--LACL--2011--3
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a library which provides an abstract data type of environments,
as a functor parameterized by a module defining variables, and a function which
builds environments for such variables with any Type of type. Usual operations
over environments are defined, along with an extensive set of basic and more
advanced properties. Moreover, we give an implementation using lists satisfying
all the required properties.
|
[
{
"version": "v1",
"created": "Tue, 6 Dec 2011 15:39:48 GMT"
}
] | 2011-12-07T00:00:00 |
[
[
"Polonowski",
"Emmanuel",
""
]
] |
new_dataset
| 0.998738 |
1012.3531
|
Laszlo Kish
|
Ferdinand Peper, Laszlo B. Kish
|
Instantaneous, non-squeezed, noise-based logic
|
6 pages
|
Fluctuation and Noise Letters 10 (2011) 231-237
|
10.1142/S0219477511000521
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Noise-based logic, by utilizing its multidimensional logic hyperspace, has
significant potential for low-power parallel operations in beyond-Moore-chips.
However universal gates for Boolean logic thus far had to rely on either time
averaging to distinguish signals from each other or, alternatively, on squeezed
logic signals, where the logic-high was represented by a random process and the
logic-low was a zero signal. A major setback is that squeezed logic variables
are unable to work in the hyperspace, because the logic-low zero value sets the
hyperspace product vector to zero. This paper proposes Boolean universal logic
gates that alleviate such shortcomings. They are able to work with non-squeezed
logic values where both the high and low values are encoded into nonzero,
bipolar, independent random telegraph waves. Non-squeezed universal Boolean
logic gates for spike-based brain logic are also shown. The advantages vs.
disadvantages of the two logic types are compared.
|
[
{
"version": "v1",
"created": "Thu, 16 Dec 2010 08:42:35 GMT"
}
] | 2011-12-06T00:00:00 |
[
[
"Peper",
"Ferdinand",
""
],
[
"Kish",
"Laszlo B.",
""
]
] |
new_dataset
| 0.962406 |
1105.1824
|
Haris Aziz
|
Haris Aziz and Paul Harrenstein and Evangelia Pyrga
|
Individual-based stability in hedonic games depending on the best or
worst players
|
16 pages
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider coalition formation games in which each player has preferences
over the other players and his preferences over coalitions are based on the
best player ($\mathcal{B}$-/B-hedonic games) or the worst player
($\mathcal{W}$/W-hedonic games) in the coalition. We show that for
$\mathcal{B}$-hedonic games, an individually stable partition is guaranteed to
exist and can be computed efficiently. Similarly, there exists a
polynomial-time algorithm which returns a Nash stable partition (if one exists)
for $\mathcal{B}$-hedonic games with strict preferences. Both $\mathcal{W}$-
and W-hedonic games are equivalent if individual rationality is assumed. It is
also shown that for B- or $\mathcal{W}$-hedonic games, checking whether a Nash
stable partition or an individually stable partition exists is NP-complete even
in some cases for strict preferences. We identify a key source of
intractability in compact coalition formation games in which preferences over
players are extended to preferences over coalitions.
|
[
{
"version": "v1",
"created": "Mon, 9 May 2011 23:51:47 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Dec 2011 08:20:21 GMT"
}
] | 2011-12-06T00:00:00 |
[
[
"Aziz",
"Haris",
""
],
[
"Harrenstein",
"Paul",
""
],
[
"Pyrga",
"Evangelia",
""
]
] |
new_dataset
| 0.97672 |
1112.0992
|
Michalis Vafopoulos n
|
Michalis Vafopoulos
|
The Web economy: goods, users, models and policies
| null | null | null | null |
cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web emerged as an antidote to the rapidly increasing quantity of accumulated
knowledge and become successful because it facilitates massive participation
and communication with minimum costs. Today, its enormous impact, scale and
dynamism in time and space make very difficult (and sometimes impossible) to
measure and anticipate the effects in human society. In addition to that, we
demand from the Web to be fast, secure, reliable, all-inclusive and trustworthy
in any transaction. The scope of the present article is to review a part of the
Web economy literature that will help us to identify its major participants and
their functions. The goal is to understand how the Web economy differs from the
traditional setting and what implications have these differences. Secondarily,
we attempt to establish a minimal common understanding about the incentives and
properties of the Web economy. In this direction the concept of Web Goods and a
new classification of Web Users are introduced and analyzed This article, is
not, by any means, a thorough review of the economic literature related to the
Web. We focus only on its relevant part that models the Web as a standalone
economic artifact with native functionality and processes.
|
[
{
"version": "v1",
"created": "Mon, 5 Dec 2011 16:53:51 GMT"
}
] | 2011-12-06T00:00:00 |
[
[
"Vafopoulos",
"Michalis",
""
]
] |
new_dataset
| 0.982704 |
1112.1038
|
James Fowler
|
Jason J. Jones, Robert M. Bond, Christopher J. Fariss, Jaime E.
Settle, Adam Kramer, Cameron Marlow, James H. Fowler
|
Yahtzee: An Anonymized Group Level Matching Procedure
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Researchers often face the problem of needing to protect the privacy of
subjects while also needing to integrate data that contains personal
information from diverse data sources in order to conduct their research. The
advent of computational social science and the enormous amount of data about
people that is being collected makes protecting the privacy of research
subjects evermore important. However, strict privacy procedures can make
joining diverse sources of data that contain information about specific
individual behaviors difficult. In this paper we present a procedure to keep
information about specific individuals from being "leaked" or shared in either
direction between two sources of data. To achieve this goal, we randomly assign
individuals to anonymous groups before combining the anonymized information
between the two sources of data. We refer to this method as the Yahtzee
procedure, and show that it performs as expected theoretically when we apply it
to data from Facebook and public voter records.
|
[
{
"version": "v1",
"created": "Mon, 5 Dec 2011 19:49:00 GMT"
}
] | 2011-12-06T00:00:00 |
[
[
"Jones",
"Jason J.",
""
],
[
"Bond",
"Robert M.",
""
],
[
"Fariss",
"Christopher J.",
""
],
[
"Settle",
"Jaime E.",
""
],
[
"Kramer",
"Adam",
""
],
[
"Marlow",
"Cameron",
""
],
[
"Fowler",
"James H.",
""
]
] |
new_dataset
| 0.985394 |
1112.0393
|
Shahram Babaie
|
Saeid Bahanfar, Ladan Darougaran, Helia Kousha and Shahram Babaie
|
Reliable Communication in Wireless Body Area Sensor Network for Health
Monitoring
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Now days, interests in the application of Wireless Body Area Network (WBAN)
have grown considerably. A number of tiny wireless sensors, strategically
placed on the human body, create a wireless body area network that can monitor
various vital signs, providing real-time feedback to the user and medical
personnel. This communication needs to be energy efficient and highly reliable
while keeping delays low. In this paper we present hardware and software
architecture for BAN and also we offer reliable communication and data
aggregation.
|
[
{
"version": "v1",
"created": "Fri, 2 Dec 2011 06:13:01 GMT"
}
] | 2011-12-05T00:00:00 |
[
[
"Bahanfar",
"Saeid",
""
],
[
"Darougaran",
"Ladan",
""
],
[
"Kousha",
"Helia",
""
],
[
"Babaie",
"Shahram",
""
]
] |
new_dataset
| 0.991003 |
1006.3167
|
Frederic Mazoit
|
Fr\'ed\'eric Mazoit (LaBRI)
|
Tree-width of hypergraphs and surface duality
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Graph Minors III, Robertson and Seymour write: "It seems that the
tree-width of a planar graph and the tree-width of its geometric dual are
approximately equal - indeed, we have convinced ourselves that they differ by
at most one". They never gave a proof of this. In this paper, we prove a
generalisation of this statement to embedding of hypergraphs on general
surfaces, and we prove that our bound is tight.
|
[
{
"version": "v1",
"created": "Wed, 16 Jun 2010 09:00:16 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Dec 2011 14:15:58 GMT"
}
] | 2011-12-02T00:00:00 |
[
[
"Mazoit",
"Frédéric",
"",
"LaBRI"
]
] |
new_dataset
| 0.994783 |
1012.2835
|
Anil Hirani
|
Anil N. Hirani, Kaushik Kalyanaraman, Han Wang, and Seth Watts
|
Cohomologous Harmonic Cochains
|
Language improvements to version 7. Content is otherwise the same as
version 7
| null | null | null |
cs.CG math.GT math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe algorithms for finding harmonic cochains, an essential ingredient
for solving elliptic partial differential equations in exterior calculus.
Harmonic cochains are also useful in computational topology and computer
graphics. We focus on finding harmonic cochains cohomologous to a given
cocycle. Amongst other things, this allows localization near topological
features of interest. We derive a weighted least squares method by proving a
discrete Hodge-deRham theorem on the isomorphism between the space of harmonic
cochains and cohomology. The solution obtained either satisfies the Whitney
form finite element exterior calculus equations or the discrete exterior
calculus equations for harmonic cochains, depending on the discrete Hodge star
used.
|
[
{
"version": "v1",
"created": "Mon, 13 Dec 2010 19:22:41 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Jun 2011 19:58:18 GMT"
},
{
"version": "v3",
"created": "Sat, 11 Jun 2011 13:55:56 GMT"
},
{
"version": "v4",
"created": "Thu, 7 Jul 2011 19:47:22 GMT"
},
{
"version": "v5",
"created": "Thu, 14 Jul 2011 19:44:02 GMT"
},
{
"version": "v6",
"created": "Mon, 15 Aug 2011 12:42:25 GMT"
},
{
"version": "v7",
"created": "Tue, 22 Nov 2011 20:26:36 GMT"
},
{
"version": "v8",
"created": "Thu, 1 Dec 2011 20:01:46 GMT"
}
] | 2011-12-02T00:00:00 |
[
[
"Hirani",
"Anil N.",
""
],
[
"Kalyanaraman",
"Kaushik",
""
],
[
"Wang",
"Han",
""
],
[
"Watts",
"Seth",
""
]
] |
new_dataset
| 0.971408 |
1112.0168
|
Achraf Othman
|
Achraf Othman, and Mohamed Jemni
|
Statistical Sign Language Machine Translation: from English written text
to American Sign Language Gloss
|
9 pages
|
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 5, No 3, 2011, 65-73
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This works aims to design a statistical machine translation from English text
to American Sign Language (ASL). The system is based on Moses tool with some
modifications and the results are synthesized through a 3D avatar for
interpretation. First, we translate the input text to gloss, a written form of
ASL. Second, we pass the output to the WebSign Plug-in to play the sign.
Contributions of this work are the use of a new couple of language English/ASL
and an improvement of statistical machine translation based on string matching
thanks to Jaro-distance.
|
[
{
"version": "v1",
"created": "Thu, 1 Dec 2011 12:52:22 GMT"
}
] | 2011-12-02T00:00:00 |
[
[
"Othman",
"Achraf",
""
],
[
"Jemni",
"Mohamed",
""
]
] |
new_dataset
| 0.980252 |
1111.7051
|
Arup Pal
|
Arup Kumar Pal, G.P. Biswas and S. Mukhopadhyay
|
Design of Image Cryptosystem by Simultaneous VQ-Compression and
Shuffling of Codebook and Index Matrix
| null |
The International journal of Multimedia & Its Applications (IJMA),
Vol.1, No.1, November 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The popularity of Internet usage although increases exponentially, it is
incapable of providing the security for exchange of confidential data between
the users. As a result, several cryptosystems for encryption of data and images
have been developed for secured transmission over Internet. In this work, a
scheme for Image encryption/decryption based on Vector Quantization (VQ) has
been proposed that concurrently encodes the images for compression and shuffles
the codebook and the index matrix using pseudorandom sequences for encryption.
The processing time of the proposed scheme is much less than the other
cryptosystems, because it does not use any traditional cryptographic
operations, and instead it performs swapping between the contents of the
codebook with respect to a random sequence, which resulted an indirect
shuffling of the contents of the index matrix. It may be noted that the
security of the proposed cryptosystem depends on the generation and the
exchange of the random sequences used. Since the generation of truly random
sequences are not practically feasible, we simulate the proposed scheme using
MATLAB, where its operators like rand(method, seed), randperm(n) has been used
to generate pseudorandom sequences and it has been seen that the proposed
cryptosystem shows the expected performance.
|
[
{
"version": "v1",
"created": "Wed, 30 Nov 2011 05:36:51 GMT"
}
] | 2011-12-01T00:00:00 |
[
[
"Pal",
"Arup Kumar",
""
],
[
"Biswas",
"G. P.",
""
],
[
"Mukhopadhyay",
"S.",
""
]
] |
new_dataset
| 0.9919 |
1111.7166
|
Michael Armbrust
|
Michael Armbrust, Kristal Curtis, Tim Kraska, Armando Fox, Michael J.
Franklin, David A. Patterson
|
PIQL: Success-Tolerant Query Processing in the Cloud
|
VLDB2012
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 3, pp.
181-192 (2011)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Newly-released web applications often succumb to a "Success Disaster," where
overloaded database machines and resulting high response times destroy a
previously good user experience. Unfortunately, the data independence provided
by a traditional relational database system, while useful for agile
development, only exacerbates the problem by hiding potentially expensive
queries under simple declarative expressions. As a result, developers of these
applications are increasingly abandoning relational databases in favor of
imperative code written against distributed key/value stores, losing the many
benefits of data independence in the process. Instead, we propose PIQL, a
declarative language that also provides scale independence by calculating an
upper bound on the number of key/value store operations that will be performed
for any query. Coupled with a service level objective (SLO) compliance
prediction model and PIQL's scalable database architecture, these bounds make
it easy for developers to write success-tolerant applications that support an
arbitrarily large number of users while still providing acceptable performance.
In this paper, we present the PIQL query processing system and evaluate its
scale independence on hundreds of machines using two benchmarks, TPC-W and
SCADr.
|
[
{
"version": "v1",
"created": "Wed, 30 Nov 2011 14:09:39 GMT"
}
] | 2011-12-01T00:00:00 |
[
[
"Armbrust",
"Michael",
""
],
[
"Curtis",
"Kristal",
""
],
[
"Kraska",
"Tim",
""
],
[
"Fox",
"Armando",
""
],
[
"Franklin",
"Michael J.",
""
],
[
"Patterson",
"David A.",
""
]
] |
new_dataset
| 0.996101 |
1111.7167
|
Peixiang Zhao
|
Peixiang Zhao, Charu C. Aggarwal, Min Wang
|
gSketch: On Query Estimation in Graph Streams
|
VLDB2012
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 3, pp.
193-204 (2011)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many dynamic applications are built upon large network infrastructures, such
as social networks, communication networks, biological networks and the Web.
Such applications create data that can be naturally modeled as graph streams,
in which edges of the underlying graph are received and updated sequentially in
a form of a stream. It is often necessary and important to summarize the
behavior of graph streams in order to enable effective query processing.
However, the sheer size and dynamic nature of graph streams present an enormous
challenge to existing graph management techniques. In this paper, we propose a
new graph sketch method, gSketch, which combines well studied synopses for
traditional data streams with a sketch partitioning technique, to estimate and
optimize the responses to basic queries on graph streams. We consider two
different scenarios for query estimation: (1) A graph stream sample is
available; (2) Both a graph stream sample and a query workload sample are
available. Algorithms for different scenarios are designed respectively by
partitioning a global sketch to a group of localized sketches in order to
optimize the query estimation accuracy. We perform extensive experimental
studies on both real and synthetic data sets and demonstrate the power and
robustness of gSketch in comparison with the state-of-the-art global sketch
method.
|
[
{
"version": "v1",
"created": "Wed, 30 Nov 2011 14:10:01 GMT"
}
] | 2011-12-01T00:00:00 |
[
[
"Zhao",
"Peixiang",
""
],
[
"Aggarwal",
"Charu C.",
""
],
[
"Wang",
"Min",
""
]
] |
new_dataset
| 0.994428 |
1111.6866
|
Grenville Croll
|
Kevin McDaid, Ronan MacRuairi, Neil Clynch, Kevin Logue, Cian Clancy,
Shane Hayes
|
Spreadsheets in Financial Departments: An Automated Analysis of 65,000
Spreadsheets using the Luminous Technology
|
14 Pages, 6 Tables, 4 Colour Figures; Proc. European Spreadsheet
Risks Int. Grp. (EuSpRIG) 2011 ISBN 978-0-9566256-9-4
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spreadsheet technology is a cornerstone of IT systems in most organisations.
It is often the glue that binds more structured transaction-based systems
together. Financial operations are a case in point where spreadsheets fill the
gaps left by dedicated accounting systems, particularly covering reporting and
business process operations. However, little is understood as to the nature of
spreadsheet usage in organisations and the contents and structure of these
spreadsheets as they relate to key business functions with few, if any,
comprehensive analyses of spreadsheet repositories in real organisations. As
such this paper represents an important attempt at profiling real and
substantial spreadsheet repositories.
Using the Luminous technology an analysis of 65,000 spreadsheets for the
financial departments of both a government and a private commercial
organisation was conducted. This provides an important insight into the nature
and structure of these spreadsheets, the links between them, the existence and
nature of macros and the level of repetitive processes performed through the
spreadsheets. Furthermore it highlights the organisational dependence on
spreadsheets and the range and number of spreadsheets dealt with by individuals
on a daily basis. In so doing, this paper prompts important questions that can
frame future research in the domain.
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2011 15:59:44 GMT"
}
] | 2011-11-30T00:00:00 |
[
[
"McDaid",
"Kevin",
""
],
[
"MacRuairi",
"Ronan",
""
],
[
"Clynch",
"Neil",
""
],
[
"Logue",
"Kevin",
""
],
[
"Clancy",
"Cian",
""
],
[
"Hayes",
"Shane",
""
]
] |
new_dataset
| 0.994619 |
1111.6870
|
Grenville Croll
|
Gordon Guthrie, Stephen McCrory
|
Beyond The Desktop Spreadsheet
|
11 Pages; Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2011
ISBN 978-0-9566256-9-4
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hypernumbers is a new commercial web-based spreadsheet. It addresses several
risk factors in deploying spreadsheets.
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2011 16:06:26 GMT"
}
] | 2011-11-30T00:00:00 |
[
[
"Guthrie",
"Gordon",
""
],
[
"McCrory",
"Stephen",
""
]
] |
new_dataset
| 0.968002 |
1111.6900
|
Martin Albrecht
|
Martin R. Albrecht
|
The M4RIE library for dense linear algebra over small fields with even
characteristic
| null | null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we present the M4RIE library which implements efficient
algorithms for linear algebra with dense matrices over GF(2^e) for 2 <= 2 <=
10. As the name of the library indicates, it makes heavy use of the M4RI
library both directly (i.e., by calling it) and indirectly (i.e., by using its
concepts). We provide an open-source GPLv2+ C library for efficient linear
algebra over GF(2^e) for e small. In this library we implemented an idea due to
Bradshaw and Boothby which reduces matrix multiplication over GF(p^k) to a
series of matrix multiplications over GF(p). Furthermore, we propose a caching
technique - Newton-John tables - to avoid finite field multiplications which is
inspired by Kronrod's method ("M4RM") for matrix multiplication over GF(2).
Using these two techniques we provide asymptotically fast triangular solving
with matrices (TRSM) and PLE-based Gaussian elimination. As a result, we are
able to significantly improve upon the state of the art in dense linear algebra
over GF(2^e) with 2 <= e <= 10.
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2011 17:05:00 GMT"
}
] | 2011-11-30T00:00:00 |
[
[
"Albrecht",
"Martin R.",
""
]
] |
new_dataset
| 0.982483 |
1111.6911
|
Zacchaeus Omogbadegun
|
Zacchaeus Omogbadegun, Charles Uwadia, Charles Ayo, Victor Mbarika,
Nicholas Omoregbe, Efe Otofia, and Frank Chieze
|
Multimedia-based Medicinal Plants Sustainability Management System
|
12 pages, 9 figures, 6 tables, 37 references
|
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 5, No 3, September 2011; ISSN (Online): 1694-0814
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Medicinal plants are increasingly recognized worldwide as an alternative
source of efficacious and inexpensive medications to synthetic
chemo-therapeutic compound. Rapid declining wild stocks of medicinal plants
accompanied by adulteration and species substitutions reduce their efficacy,
quality and safety. Consequently, the low accessibility to and
non-affordability of orthodox medicine costs by rural dwellers to be healthy
and economically productive further threaten their life expectancy. Finding
comprehensive information on medicinal plants of conservation concern at a
global level has been difficult. This has created a gap between computing
technologies' promises and expectations in the healing process under
complementary and alternative medicine. This paper presents the design and
implementation of a Multimedia-based Medicinal Plants Sustainability Management
System addressing these concerns. Medicinal plants' details for designing the
system were collected through semi-structured interviews and databases. Unified
Modelling Language, Microsoft-Visual-Studio.Net, C#3.0,
Microsoft-Jet-Engine4.0, MySQL, Loquendo Multilingual Text-to-Speech Software,
YouTube, and VLC Media Player were used. Keywords: Complementary and
Alternative Medicine, conservation, extinction, medicinal plant, multimedia,
phytoconstituents, rural dwellers
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2011 17:33:20 GMT"
}
] | 2011-11-30T00:00:00 |
[
[
"Omogbadegun",
"Zacchaeus",
""
],
[
"Uwadia",
"Charles",
""
],
[
"Ayo",
"Charles",
""
],
[
"Mbarika",
"Victor",
""
],
[
"Omoregbe",
"Nicholas",
""
],
[
"Otofia",
"Efe",
""
],
[
"Chieze",
"Frank",
""
]
] |
new_dataset
| 0.996637 |
1111.5038
|
Takashi Yokomori
|
Fumiya Okubo, Satoshi Kobayashi, Takashi Yokomori
|
Reaction Automata
|
19 pages, 6 figures
| null | null |
EMTR-11-02
|
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reaction systems are a formal model that has been introduced to investigate
the interactive behaviors of biochemical reactions. Based on the formal
framework of reaction systems, we propose new computing models called reaction
automata that feature (string) language acceptors with multiset manipulation as
a computing mechanism, and show that reaction automata are computationally
Turing universal. Further, some subclasses of reaction automata with space
complexity are investigated and their language classes are compared to the ones
in the Chomsky hierarchy.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 21:40:07 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Nov 2011 07:22:22 GMT"
}
] | 2011-11-29T00:00:00 |
[
[
"Okubo",
"Fumiya",
""
],
[
"Kobayashi",
"Satoshi",
""
],
[
"Yokomori",
"Takashi",
""
]
] |
new_dataset
| 0.999428 |
1111.6321
|
Kamen Lozev
|
Kamen Lozev
|
Shape and Trajectory Tracking of Moving Obstacles
|
22 pages, 2 figures, 2 tables
| null | null | null |
cs.GR cs.DS math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents new methods and algorithms for tracking the shape and
trajectory of moving reflecting obstacles with broken rays, or rays reflecting
at an obstacle. While in tomography the focus of the reconstruction method is
to recover the velocity structure of the domain, the shape and trajectory
reconstruction procedure directly finds the shape and trajectory of the
obstacle. The physical signal carrier for this innovative method are ultrasonic
beams. When the speed of sound is constant, the rays are straight line segments
and the shape and trajectory of moving objects will be reconstructed with
methods based on the travel time equation and ellipsoid geometry. For variable
speed of sound, we start with the eikonal equation and a system of differential
equations that has its origins in acoustics and seismology. In this case, the
rays are curves that are not necessarily straight line segments and we develop
algorithms for shape and trajectory tracking based on the numerical solution of
these equations. We present methods and algorithms for shape and trajectory
tracking of moving obstacles with reflected rays when the location of the
receiver of the reflected ray is not known in advance. The shape and trajectory
tracking method is very efficient because it is not necessary for the reflected
signal to traverse the whole domain or the same path back to the transmitter.
It could be received close to the point of reflection or far away from the
transmitter. This optimizes the energy spent by transmitters for tracking the
object, reduces signal attenuation and improves image resolution. It is a safe
and secure method. We also present algorithms for tracking the shape and
trajectory of absorbing obstacles. The new methods and algorithms for shape and
trajectory tracking enable new applications and an application to one-hop
Internet routing is presented.
|
[
{
"version": "v1",
"created": "Mon, 28 Nov 2011 00:10:06 GMT"
}
] | 2011-11-29T00:00:00 |
[
[
"Lozev",
"Kamen",
""
]
] |
new_dataset
| 0.980471 |
1111.6539
|
Mehdi Sookhak Mehdi Sookhak
|
Mehdi sookhak, Ramin Karimi, Mahboobeh Haghparast, Ismail Fauzi ISnin
|
Secure Geographic Routing Protocols: Issues and Approaches
|
8 pages
|
International Journal of Computer Science Issues 8(4): 382-389
(2011)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the years, routing protocols in wireless sensor networks (WSN) have been
substantially investigated by researches. Most state-of-the-art surveys have
focused on reviewing of wireless sensor network .In this paper we review the
existing secure geographic routing protocols for wireless sensor network (WSN)
and also provide a qualitative comparison of them.
|
[
{
"version": "v1",
"created": "Mon, 28 Nov 2011 18:37:19 GMT"
}
] | 2011-11-29T00:00:00 |
[
[
"sookhak",
"Mehdi",
""
],
[
"Karimi",
"Ramin",
""
],
[
"Haghparast",
"Mahboobeh",
""
],
[
"ISnin",
"Ismail Fauzi",
""
]
] |
new_dataset
| 0.984063 |
1102.3503
|
Takashi Yokomori
|
Fumiya Okubo, Takashi Yokomori
|
On the Hairpin Incompletion
|
17 pages, 2 figures
|
Fundamenta Informaticae 110 (2011) 255--269
|
10.3233/FI-2011-542
|
EMTR-11-01
|
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hairpin completion and its variant called bounded hairpin completion are
operations on formal languages, inspired by a hairpin formation in molecular
biology. Another variant called hairpin lengthening has been recently
introduced and studied on the closure properties and algorithmic problems
concerning several families of languages. In this paper, we introduce a new
operation of this kind, called hairpin incompletion which is not only an
extension of bounded hairpin completion, but also a restricted (bounded)
variant of hairpin lengthening. Further, the hairpin incompletion operation
provides a formal language theoretic framework that models a bio-molecular
technique nowadays known as Whiplash PCR. We study the closure properties of
language families under both the operation and its iterated version. We show
that a family of languages closed under intersection with regular sets,
concatenation with regular sets, and finite union is closed under one-sided
iterated hairpin incompletion, and that a family of languages containing all
linear languages and closed under circular permutation, left derivative and
substitution is also closed under iterated hairpin incompletion.
|
[
{
"version": "v1",
"created": "Thu, 17 Feb 2011 06:13:41 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Feb 2011 04:56:00 GMT"
}
] | 2011-11-28T00:00:00 |
[
[
"Okubo",
"Fumiya",
""
],
[
"Yokomori",
"Takashi",
""
]
] |
new_dataset
| 0.993582 |
1111.5687
|
Mehdi Kaytoue
|
Baptiste Ducatel (INRIA Lorraine - LORIA), Mehdi Kaytoue (INRIA
Lorraine - LORIA), Florent Marcuola (INRIA Lorraine - LORIA), Amedeo Napoli
(INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
|
Coron : Plate-forme d'extraction de connaissances dans les bases de
donn\'ees
| null |
17\`eme conf\'erence en Reconnaissance des Formes et Intelligence
Artificielle (2010) 883-884
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coron is a domain and platform independent, multi-purposed data mining
toolkit, which incorporates not only a rich collection of data mining
algorithms, but also allows a number of auxiliary operations. To the best of
our knowledge, a data mining toolkit designed specifically for itemset
extraction and association rule generation like Coron does not exist elsewhere.
Coron also provides support for preparing and filtering data, and for
interpreting the extracted units of knowledge.
|
[
{
"version": "v1",
"created": "Thu, 24 Nov 2011 07:52:59 GMT"
}
] | 2011-11-28T00:00:00 |
[
[
"Ducatel",
"Baptiste",
"",
"INRIA Lorraine - LORIA"
],
[
"Kaytoue",
"Mehdi",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Marcuola",
"Florent",
"",
"INRIA Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.995191 |
1111.5690
|
Mehdi Kaytoue
|
Mehdi Kaytoue (INRIA Lorraine - LORIA), Florent Marcuola (INRIA
Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary
(INRIA Lorraine - LORIA), Jean Villerd (INRIA Lorraine - LORIA)
|
The Coron System
| null |
8th International Conference on Formal Concept Analsis (ICFCA)
(2010) 55--58
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coron is a domain and platform independent, multi-purposed data mining
toolkit, which incorporates not only a rich collection of data mining
algorithms, but also allows a number of auxiliary operations. To the best of
our knowledge, a data mining toolkit designed specifically for itemset
extraction and association rule generation like Coron does not exist elsewhere.
Coron also provides support for preparing and filtering data, and for
interpreting the extracted units of knowledge.
|
[
{
"version": "v1",
"created": "Thu, 24 Nov 2011 07:56:18 GMT"
}
] | 2011-11-28T00:00:00 |
[
[
"Kaytoue",
"Mehdi",
"",
"INRIA Lorraine - LORIA"
],
[
"Marcuola",
"Florent",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine - LORIA"
],
[
"Villerd",
"Jean",
"",
"INRIA Lorraine - LORIA"
]
] |
new_dataset
| 0.962505 |
1111.5767
|
Charles Morisset
|
Jason Crampton, Charles Morisset
|
PTaCL: A Language for Attribute-Based Access Control in Open Systems
|
26 pages, submitted to Principles of Security and Trust (POST)
| null | null | null |
cs.CR cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many languages and algebras have been proposed in recent years for the
specification of authorization policies. For some proposals, such as XACML, the
main motivation is to address real-world requirements, typically by providing a
complex policy language with somewhat informal evaluation methods; others try
to provide a greater degree of formality (particularly with respect to policy
evaluation) but support far fewer features. In short, there are very few
proposals that combine a rich set of language features with a well-defined
semantics, and even fewer that do this for authorization policies for
attribute-based access control in open environments. In this paper, we
decompose the problem of policy specification into two distinct sub-languages:
the policy target language (PTL) for target specification, which determines
when a policy should be evaluated; and the policy composition language (PCL)
for building more complex policies from existing ones. We define syntax and
semantics for two such languages and demonstrate that they can be both simple
and expressive. PTaCL, the language obtained by combining the features of these
two sub-languages, supports the specification of a wide range of policies.
However, the power of PTaCL means that it is possible to define policies that
could produce unexpected results. We provide an analysis of how PTL should be
restricted and how policies written in PCL should be evaluated to minimize the
likelihood of undesirable results.
|
[
{
"version": "v1",
"created": "Thu, 24 Nov 2011 14:01:47 GMT"
}
] | 2011-11-28T00:00:00 |
[
[
"Crampton",
"Jason",
""
],
[
"Morisset",
"Charles",
""
]
] |
new_dataset
| 0.998859 |
1111.5986
|
Jean Cardinal
|
Sergio Cabello, Jean Cardinal, Stefan Langerman
|
The Clique Problem in Ray Intersection Graphs
|
12 pages, 7 figures
| null | null | null |
cs.CG cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ray intersection graphs are intersection graphs of rays, or halflines, in the
plane. We show that any planar graph has an even subdivision whose complement
is a ray intersection graph. The construction can be done in polynomial time
and implies that finding a maximum clique in a segment intersection graph is
NP-hard. This solves a 21-year old open problem posed by Kratochv\'il and
Ne\v{s}et\v{r}il.
|
[
{
"version": "v1",
"created": "Fri, 25 Nov 2011 13:48:12 GMT"
}
] | 2011-11-28T00:00:00 |
[
[
"Cabello",
"Sergio",
""
],
[
"Cardinal",
"Jean",
""
],
[
"Langerman",
"Stefan",
""
]
] |
new_dataset
| 0.999803 |
1111.4937
|
Xin He
|
Bryan Dawei He
|
A Simple Optimal Binary Representation of Mosaic Floorplans and Baxter
Permutations
|
11 pages, 7 figures
| null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A "floorplan" is a rectangle subdivided into smaller rectangular sections by
horizontal and vertical line segments. Each section in the floorplan is called
a "block". Two floorplans are considered equivalent if and only if there is a
one-to-one correspondence between the blocks in the two floorplans such that
the relative position relationship of the blocks in one floorplan is the same
as the relative position relationship of the corresponding blocks in another
floorplan. The objects of "Mosaic floorplans" are the same as floorplans, but
an alternative definition of equivalence is used. Two mosaic floorplans are
considered equivalent if and only if they can be converted to each other by
sliding the line segments that divide the blocks.
Mosaic floorplans are widely used in VLSI circuit design. An important
problem in this area is to find short binary string representations of the set
of n-block mosaic floorplans. The best known representation is the
"Quarter-State Sequence" which uses 4n bits. This paper introduces a simple
binary representation of n-block mosaic floorplan using 3n-3 bits. It has been
shown that any binary representation of n-block mosaic floorplans must use at
least (3n-o(n)) bits. Therefore, the representation presented in this paper is
optimal (up to an additive lower order term).
"Baxter permutations" are a set of permutations defined by prohibited
subsequences. Baxter permutations have been shown to have one-to-one
correspondences to many interesting objects in the so-called "Baxter
combinatorial family". In particular, there exists a simple one-to-one
correspondence between mosaic floorplans and Baxter permutations. As a result,
the methods introduced in this paper also lead to an optimal binary
representation of Baxter permutations and all objects in the Baxter
combinatorial family.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 17:11:39 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Nov 2011 20:14:16 GMT"
}
] | 2011-11-23T00:00:00 |
[
[
"He",
"Bryan Dawei",
""
]
] |
new_dataset
| 0.951853 |
1111.5207
|
Serge Kernbach
|
Serge Kernbach
|
Robot Companions: Technology for Humans
|
Jeremy Pitt (Edt.) This Pervasive Day: The Potential and Perils of
Pervasive Computing, Imperial College Press, 2012
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Creation of devices and mechanisms which help people has a long history.
Their inventors always targeted practical goals such as irrigation, harvesting,
devices for construction sites, measurement, and, last but not least, military
tasks for different mechanical and later mechatronic systems. Development of
such assisting mechanisms counts back to Greek engineering, came through Middle
Ages and led finally in XIX and XX centuries to autonomous devices, which we
call today "Robots". This chapter provides overview of several robotic
technologies, introduces bio-/chemo- hybrid and collective systems and discuss
their applications in service areas.
|
[
{
"version": "v1",
"created": "Tue, 22 Nov 2011 14:57:10 GMT"
}
] | 2011-11-23T00:00:00 |
[
[
"Kernbach",
"Serge",
""
]
] |
new_dataset
| 0.999628 |
1110.0200
|
Koji Kobayashi
|
Koji Kobayashi
|
NP is not AL and P is not NC is not NL is not L
|
7 pages, in English and Japanese
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper talk about that NP is not AL and P, P is not NC, NC is not NL, and
NL is not L. The point about this paper is the depend relation of the problem
that need other problem's result to compute it. I show the structure of depend
relation that could divide each complexity classes.
|
[
{
"version": "v1",
"created": "Sun, 2 Oct 2011 16:28:44 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Oct 2011 14:08:23 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Oct 2011 14:36:16 GMT"
},
{
"version": "v4",
"created": "Mon, 24 Oct 2011 18:02:30 GMT"
},
{
"version": "v5",
"created": "Mon, 21 Nov 2011 17:55:48 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Kobayashi",
"Koji",
""
]
] |
new_dataset
| 0.979775 |
1111.4499
|
Somayeh Kafaie
|
Somayeh Kafaie, Omid Kashefi and Mohsen Sharifi
|
A Low-Energy Fast Cyber Foraging Mechanism for Mobile Devices
|
12 pages, 7 figures, International Journal of Wireless & Mobile
Networks (IJWMN)
|
International Journal of Wireless & Mobile Networks (IJWMN) Vol.
3, No. 5, October 2011
|
10.5121/ijwmn.2011.3516
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ever increasing demands for using resource-constrained mobile devices for
running more resource intensive applications nowadays has initiated the
development of cyber foraging solutions that offload parts or whole
computational intensive tasks to more powerful surrogate stationary computers
and run them on behalf of mobile devices as required. The choice of proper mix
of mobile devices and surrogates has remained an unresolved challenge though.
In this paper, we propose a new decision-making mechanism for cyber foraging
systems to select the best locations to run an application, based on context
metrics such as the specifications of surrogates, the specifications of mobile
devices, application specification, and communication network specification.
Experimental results show faster response time and lower energy consumption of
benched applications compared to when applications run wholly on mobile devices
and when applications are offloaded to surrogates blindly for execution.
|
[
{
"version": "v1",
"created": "Fri, 18 Nov 2011 21:37:36 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Kafaie",
"Somayeh",
""
],
[
"Kashefi",
"Omid",
""
],
[
"Sharifi",
"Mohsen",
""
]
] |
new_dataset
| 0.981043 |
1111.4654
|
Amelia Carolina Sparavigna
|
Amelia Carolina Sparavigna
|
A self-portrait of young Leonardo
|
Image processing, digital restoration, Leonardo da Vinci
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most famous drawings by Leonardo da Vinci is a self-portrait in
red chalk, where he looks quite old. In fact, there is a sketch in one of his
notebooks, partially covered by written notes, that can be a self-portrait of
the artist when he was young. The use of image processing, to remove the
handwritten text and improve the image, allows a comparison of the two
portraits.
|
[
{
"version": "v1",
"created": "Sun, 20 Nov 2011 17:41:01 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Sparavigna",
"Amelia Carolina",
""
]
] |
new_dataset
| 0.999729 |
1111.4744
|
EPTCS
|
Markus Lepper, Baltasar Tranc\'on y Widemann
|
Solving the TTC 2011 Compiler Optimization Task with metatools
|
In Proceedings TTC 2011, arXiv:1111.4407
|
EPTCS 74, 2011, pp. 70-115
|
10.4204/EPTCS.74.9
| null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The authors' "metatools" are a collection of tools for generic programming.
This includes generating Java sources from mathematically well-founded
specifications, as well as the creation of strictly typed document object
models for XML encoded texts. In this context, almost every computer-internal
structure is treated as a "model", and every computation is a kind of model
transformation.
This concept differs significantly from "classical model transformation"
executed by specialized tools and languages. Therefore it seemed promising to
the organizers of the TTC 2011, as well as to the authors, to apply metatools
to one of the challenges, namely to the "compiler optimization task". This is a
report on the resulting experiences.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 05:25:16 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Lepper",
"Markus",
""
],
[
"Widemann",
"Baltasar Trancón y",
""
]
] |
new_dataset
| 0.983736 |
1111.4746
|
EPTCS
|
Arend Rensink (University of Twente, NL), Eduardo Zambon (University
of Twente, NL)
|
Solving the TTC 2011 Compiler Optimization Case with GROOVE
|
In Proceedings TTC 2011, arXiv:1111.4407
|
EPTCS 74, 2011, pp. 126-130
|
10.4204/EPTCS.74.11
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents a partial solution to the Compiler Optimization case
study using GROOVE. We explain how the input graphs provided with the case
study were adapted into a GROOVE representation and we describe an initial
solution for Task 1. This solution allows us to automatically reproduce the
steps of the constant folding example given in the case description. We did not
solve Task 2.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 05:25:30 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Rensink",
"Arend",
"",
"University of Twente, NL"
],
[
"Zambon",
"Eduardo",
"",
"University\n of Twente, NL"
]
] |
new_dataset
| 0.960221 |
1111.4750
|
EPTCS
|
Agris Sostaks, Elina Kalnina, Audris Kalnins, Edgars Celms, Janis
Iraids
|
Solving the TTC 2011 Reengineering Case with MOLA and Higher-Order
Transformations
|
In Proceedings TTC 2011, arXiv:1111.4407
|
EPTCS 74, 2011, pp. 159-167
|
10.4204/EPTCS.74.15
| null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Reengineering Case of the Transformation Tool Contest 2011 deals with
automatic extraction of state machine from Java source code. The transformation
task involves complex, non-local matching of model elements. This paper
contains the solution of the task using model transformation language MOLA. The
MOLA solution uses higher-order transformations (HOT-s) to generate a part of
the required MOLA program. The described HOT approach allows creating reusable,
complex model transformation libraries for generic tasks without modifying an
implementation of a model transformation language. Thus model transformation
users who are not the developers of the language can achieve the desired
functionality more easily.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 05:26:06 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Sostaks",
"Agris",
""
],
[
"Kalnina",
"Elina",
""
],
[
"Kalnins",
"Audris",
""
],
[
"Celms",
"Edgars",
""
],
[
"Iraids",
"Janis",
""
]
] |
new_dataset
| 0.978541 |
1111.4755
|
EPTCS
|
Elina Kalnina (Institute of Mathematics and Computer Science,
University of Latvia), Audris Kalnins (Institute of Mathematics and Computer
Science, University of Latvia), Agris Sostaks (Institute of Mathematics and
Computer Science, University of Latvia), Janis Iraids (Institute of
Mathematics and Computer Science, University of Latvia), Edgars Celms
(Institute of Mathematics and Computer Science, University of Latvia)
|
Saying Hello World with MOLA - A Solution to the TTC 2011 Instructive
Case
|
In Proceedings TTC 2011, arXiv:1111.4407
|
EPTCS 74, 2011, pp. 237-252
|
10.4204/EPTCS.74.21
| null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the solution of Hello World transformations in MOLA
transformation language. Transformations implementing the task are relatively
straightforward and easily inferable from the task specification. The required
additional steps related to model import and export are also described.
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2011 05:26:57 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Kalnina",
"Elina",
"",
"Institute of Mathematics and Computer Science,\n University of Latvia"
],
[
"Kalnins",
"Audris",
"",
"Institute of Mathematics and Computer\n Science, University of Latvia"
],
[
"Sostaks",
"Agris",
"",
"Institute of Mathematics and\n Computer Science, University of Latvia"
],
[
"Iraids",
"Janis",
"",
"Institute of\n Mathematics and Computer Science, University of Latvia"
],
[
"Celms",
"Edgars",
"",
"Institute of Mathematics and Computer Science, University of Latvia"
]
] |
new_dataset
| 0.996024 |
1111.4301
|
Andrej Bogdanov
|
Andrej Bogdanov and Chin Ho Lee
|
Homomorphic encryption from codes
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new homomorphic encryption scheme based on the hardness of
decoding under independent random noise from certain affine families of codes.
Unlike in previous lattice-based homomorphic encryption schemes, where the
message is hidden in the noisy part of the ciphertext, our scheme carries the
message in the affine part of the transformation and applies noise only to
achieve security. Our scheme can tolerate noise of arbitrary magnitude, as long
as the noise vector has sufficiently small hamming weight (and its entries are
independent).
Our design achieves "proto-homomorphic" properties in an elementary manner:
message addition and multiplication are emulated by pointwise addition and
multiplication of the ciphertext vectors. Moreover, the extremely simple nature
of our decryption makes the scheme easily amenable to bootstrapping. However,
some complications are caused by the inherent presence of noticeable encryption
error. Our main technical contribution is the development of two new techniques
for handling this error in the homomorphic evaluation process.
We also provide a definitional framework for homomorphic encryption that may
be useful elsewhere.
|
[
{
"version": "v1",
"created": "Fri, 18 Nov 2011 08:41:15 GMT"
}
] | 2011-11-21T00:00:00 |
[
[
"Bogdanov",
"Andrej",
""
],
[
"Lee",
"Chin Ho",
""
]
] |
new_dataset
| 0.967509 |
1111.3673
|
Zolt\'an K\'asa
|
N. Pataki
|
C++ Standard Template Library by template specialized containers
| null |
Acta Univ. Sapientiae, Inform. 3,2 (2011) 141--157
| null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The C++ Standard Template Library is the flagship example for libraries based
on the generic programming paradigm. The usage of this library is intended to
minimize the number of classical C/C++ errors, but does not warrant bug-free
programs. Furthermore, many new kinds of errors may arise from the inaccurate
use of the generic programming paradigm, like dereferencing invalid iterators
or misunderstanding remove-like algorithms. In this paper we present some
typical scenarios that may cause runtime or portability problems. We emit
warnings and errors while these risky constructs are used. We also present a
general approach to emit "customized" warnings. We support the so-called
"believe-me marks" to disable warnings. We present another typical usage of our
technique, when classes become deprecated during the software lifecycle.
|
[
{
"version": "v1",
"created": "Tue, 15 Nov 2011 22:00:48 GMT"
}
] | 2011-11-17T00:00:00 |
[
[
"Pataki",
"N.",
""
]
] |
new_dataset
| 0.991837 |
1111.3715
|
Tao Ye
|
Wenqi Huang, Tao Ye, Duanbing Chen
|
Corner Occupying Theorem for the Two-dimensional Integral Rectangle
Packing Problem
|
11 pages, 10 figures. arXiv admin note: substantial text overlap with
arXiv:1107.4463
| null | null | null |
cs.DM math.CO math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proves a corner occupying theorem for the two-dimensional integral
rectangle packing problem, stating that if it is possible to orthogonally place
n arbitrarily given integral rectangles into an integral rectangular container
without overlapping, then we can achieve a feasible packing by successively
placing an integral rectangle onto a bottom-left corner in the container. Based
on this theorem, we might develop efficient heuristic algorithms for solving
the integral rectangle packing problem. In fact, as a vague conjecture, this
theorem has been implicitly mentioned with different appearances by many people
for a long time.
|
[
{
"version": "v1",
"created": "Wed, 16 Nov 2011 04:13:52 GMT"
}
] | 2011-11-17T00:00:00 |
[
[
"Huang",
"Wenqi",
""
],
[
"Ye",
"Tao",
""
],
[
"Chen",
"Duanbing",
""
]
] |
new_dataset
| 0.998218 |
1111.3753
|
Sugata Sanyal
|
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata
Sanyal
|
CompChall: Addressing Password Guessing Attacks
|
6 Pages, 1 Figure; International Conference on Information
Technology: Coding and Computing, 2005. ITCC 2005
| null |
10.1109/ITCC.2005.107
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Even though passwords are the most convenient means of authentication, they
bring along themselves the threat of dictionary attacks. Dictionary attacks may
be of two kinds: online and offline. While offline dictionary attacks are
possible only if the adversary is able to collect data for a successful
protocol execution by eavesdropping on the communication channel and can be
successfully countered using public key cryptography, online dictionary attacks
can be performed by anyone and there is no satisfactory solution to counter
them. This paper presents a new authentication protocol which is called
CompChall (computational challenge). The proposed protocol uses only one way
hash functions as the building blocks and attempts to eliminate online
dictionary attacks by implementing a challenge-response system. This
challenge-response system is designed in a fashion that it does not pose any
difficulty to a genuine user but is time consuming and computationally
intensive for an adversary trying to launch a large number of login requests
per unit time as in the case of an online dictionary attack. The protocol is
stateless and thus less vulnerable to DoS (Denial of Service) attacks.
|
[
{
"version": "v1",
"created": "Wed, 16 Nov 2011 10:20:46 GMT"
}
] | 2011-11-17T00:00:00 |
[
[
"Goyal",
"Vipul",
""
],
[
"Kumar",
"Virendra",
""
],
[
"Singh",
"Mayank",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.998077 |
1111.3933
|
Smorodinsky Rann
|
Sergey Kuniavsky, Rann Smorodinsky
|
Equilibrium and Potential in Coalitional Congestion Games
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The model of congestion games is widely used to analyze games related to
traffic and communication. A central property of these games is that they are
potential games and hence posses a pure Nash equilibrium. In reality it is
often the case that some players cooperatively decide on their joint action in
order to maximize the coalition's total utility. This is by modeled by
Coalitional Congestion Games. Typical settings include truck drivers who work
for the same shipping company, or routers that belong to the same ISP. The
formation of coalitions will typically imply that the resulting coalitional
congestion game will no longer posses a pure Nash equilibrium. In this paper we
provide conditions under which such games are potential games and posses a pure
Nash equilibrium.
|
[
{
"version": "v1",
"created": "Wed, 16 Nov 2011 20:09:13 GMT"
}
] | 2011-11-17T00:00:00 |
[
[
"Kuniavsky",
"Sergey",
""
],
[
"Smorodinsky",
"Rann",
""
]
] |
new_dataset
| 0.998948 |
1005.0824
|
Francois Clement
|
Sylvie Boldo (INRIA Saclay - Ile de France, LRI), Fran\c{c}ois
Cl\'ement (INRIA Rocquencourt), Jean-Christophe Filli\^atre (INRIA Saclay -
Ile de France, LRI), Micaela Mayero (LIPN, Inria Grenoble Rh\^one-Alpes / LIP
Laboratoire de l'Informatique du Parall\'elisme), Guillaume Melquiond (INRIA
Saclay - Ile de France, LRI), Pierre Weis (INRIA Rocquencourt)
|
Formal Proof of a Wave Equation Resolution Scheme: the Method Error
|
replaces arXiv:1001.4898
|
Interactive Theorem Proving 6172 (2010) 147-162
|
10.1007/978-3-642-14052-5_12
|
arXiv:1005.0824
|
cs.LO math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Popular finite difference numerical schemes for the resolution of the
one-dimensional acoustic wave equation are well-known to be convergent. We
present a comprehensive formalization of the simplest one and formally prove
its convergence in Coq. The main difficulties lie in the proper definition of
asymptotic behaviors and the implicit way they are handled in the mathematical
pen-and-paper proofs. To our knowledge, this is the first time such kind of
mathematical proof is machine-checked.
|
[
{
"version": "v1",
"created": "Wed, 5 May 2010 19:38:02 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2011 16:19:46 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Boldo",
"Sylvie",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Clément",
"François",
"",
"INRIA Rocquencourt"
],
[
"Filliâtre",
"Jean-Christophe",
"",
"INRIA Saclay -\n Ile de France, LRI"
],
[
"Mayero",
"Micaela",
"",
"LIPN, Inria Grenoble Rhône-Alpes / LIP\n Laboratoire de l'Informatique du Parallélisme"
],
[
"Melquiond",
"Guillaume",
"",
"INRIA\n Saclay - Ile de France, LRI"
],
[
"Weis",
"Pierre",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.99393 |
1007.3108
|
Shengtian Yang
|
Shengtian Yang
|
Second-Order Weight Distributions
|
10 pages, accepted for publication in IEEE Transactions on
Information Theory, May 2011
|
IEEE Trans. Inf. Theory 57 (2011) 6068-6077
|
10.1109/TIT.2011.2162272
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A fundamental property of codes, the second-order weight distribution, is
proposed to solve the problems such as computing second moments of weight
distributions of linear code ensembles. A series of results, parallel to those
for weight distributions, is established for second-order weight distributions.
In particular, an analogue of MacWilliams identities is proved. The
second-order weight distributions of regular LDPC code ensembles are then
computed. As easy consequences, the second moments of weight distributions of
regular LDPC code ensembles are obtained. Furthermore, the application of
second-order weight distributions in random coding approach is discussed. The
second-order weight distributions of the ensembles generated by a so-called
2-good random generator or parity-check matrix are computed, where a 2-good
random matrix is a kind of generalization of the uniformly distributed random
matrix over a finite filed and is very useful for solving problems that involve
pairwise or triple-wise properties of sequences. It is shown that the 2-good
property is reflected in the second-order weight distribution, which thus plays
a fundamental role in some well-known problems in coding theory and
combinatorics. An example of linear intersecting codes is finally provided to
illustrate this fact.
|
[
{
"version": "v1",
"created": "Mon, 19 Jul 2010 10:14:17 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Feb 2011 01:07:41 GMT"
},
{
"version": "v3",
"created": "Wed, 11 May 2011 10:34:21 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Yang",
"Shengtian",
""
]
] |
new_dataset
| 0.997223 |
1009.3448
|
Kapil Vhatkar kapil vhatkar
|
Kapil N. Vhatkar, G. P. Bhole
|
Internal Location Based System for Mobile Devices Using Passive RFID
|
7 pages IEEE format. The original authors of this paper Lect. kapil
N. Vhatkar & Prof. G. P. Bhole claim for the ownership of the said paper so
IJCSIS modified authors of the said paper.
http://sites.google.com/site/ijcsis/vol-6-no-3-december-2009. arXiv admin
note: this article was plagiarized by arXiv:1001.2258
|
International Journal of Computer Science and Information
Security, IJCSIS December 2009, ISSN 1947 5500
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have explored our own innovative work about the design & development of
internal location-identification system for mobile devices based on integration
of RFID and wireless technology. The function of our system is based on
strategically located passive RFID tags placed on objects around building which
are identified using an RFID reader attached to a mobile device. The mobile
device reads the RFID tag and through the wireless network, sends the request
to the server. The server resolves the request and sends the desired
location-based information back to the mobile device. We had addressed that we
can go through the RFID technology for internal location identification
(indoor), which provides us better location accuracy because of no contact
between the tag and the reader, and the system requires no line of sight. In
this paper we had also focused on the issues of RFID technologies i.e.
Non-line-of-sight & High inventory speeds.
|
[
{
"version": "v1",
"created": "Thu, 16 Sep 2010 06:50:56 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Vhatkar",
"Kapil N.",
""
],
[
"Bhole",
"G. P.",
""
]
] |
new_dataset
| 0.971506 |
1110.3147
|
Xueliang Li
|
Xiaolong Huang, Xueliang Li, Yongtang Shi
|
Rainbow connections for planar graphs and line graphs
|
13 pages
| null | null | null |
cs.CC math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An edge-colored graph $G$ is rainbow connected if any two vertices are
connected by a path whose edges have distinct colors. The rainbow connection
number of a connected graph $G$, denoted by $rc(G)$, is the smallest number of
colors that are needed in order to make $G$ rainbow connected. It was proved
that computing $rc(G)$ is an NP-Hard problem, as well as that even deciding
whether a graph has $rc(G)=2$ is NP-Complete. It is known that deciding whether
a given edge-colored graph is rainbow connected is NP-Complete. We will prove
that it is still NP-Complete even when the edge-colored graph is a planar
bipartite graph. We also give upper bounds of the rainbow connection number of
outerplanar graphs with small diameters. A vertex-colored graph is rainbow
vertex-connected if any two vertices are connected by a path whose internal
vertices have distinct colors. The rainbow vertex-connection number of a
connected graph $G$, denoted by $rvc(G)$, is the smallest number of colors that
are needed in order to make $G$ rainbow vertex-connected. It is known that
deciding whether a given vertex-colored graph is rainbow vertex-connected is
NP-Complete. We will prove that it is still NP-Complete even when the
vertex-colored graph is a line graph.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2011 08:53:50 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2011 09:18:47 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Huang",
"Xiaolong",
""
],
[
"Li",
"Xueliang",
""
],
[
"Shi",
"Yongtang",
""
]
] |
new_dataset
| 0.99749 |
1111.2991
|
Cunsheng Ding
|
Cunsheng Ding
|
Cyclotomic Constructions of Cyclic Codes with Length Being the Product
of Two Primes
|
19 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyclic codes are an interesting type of linear codes and have applications in
communication and storage systems due to their efficient encoding and decoding
algorithms. They have been studied for decades and a lot of progress has been
made. In this paper, three types of generalized cyclotomy of order two and
three classes of cyclic codes of length $n_1n_2$ and dimension $(n_1n_2+1)/2$
are presented and analysed, where $n_1$ and $n_2$ are two distinct primes.
Bounds on their minimum odd-like weight are also proved. The three
constructions produce the best cyclic codes in certain cases.
|
[
{
"version": "v1",
"created": "Sun, 13 Nov 2011 06:35:49 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Ding",
"Cunsheng",
""
]
] |
new_dataset
| 0.999542 |
1111.3010
|
Sugata Sanyal
|
Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata
Sanyal
|
A Multi-Factor Security Protocol for Wireless Payment - Secure Web
Authentication using Mobile Devices
|
8 Pages, 3 Figures; IADIS International Conference on Applied
Computing Proceedings of the IADIS International Conference on Applied
Computing, Salamanca, Spain, 18-20 February 2007
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous Web access authentication systems often use either the Web or the
Mobile channel individually to confirm the claimed identity of the remote user.
This paper proposes a new protocol using multifactor authentication system that
is both secure and highly usable. It uses a novel approach based on Transaction
Identification Code and SMS to enforce extra security level with the
traditional Login/password system. The system provides a highly secure
environment that is simple to use and deploy, that does not require any change
in infrastructure or protocol of wireless networks. This Protocol for Wireless
Payment is extended to provide two way authentications.
|
[
{
"version": "v1",
"created": "Sun, 13 Nov 2011 13:29:00 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Tiwari",
"Ayu",
""
],
[
"Sanyal",
"Sudip",
""
],
[
"Abraham",
"Ajith",
""
],
[
"Knapskog",
"Svein Johan",
""
],
[
"Sanyal",
"Sugata",
""
]
] |
new_dataset
| 0.999214 |
1111.3096
|
Kamal Ahmat
|
Hassan Gobjuka and Kamal Ahmat
|
vFlow: A GUI-Based Tool for Building Batch Applications for Cloud
Computing
|
IEEE INFOCOM 2011 Demo Session, 2 Pages, 2 Figures
| null | null | null |
cs.SE cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce vFlow - A framework for rapid designing of batch
processing applications for Cloud Computing environment. vFlow batch processing
system extracts tasks from the vPlans diagrams, systematically captures the
dynamics in batch application management tasks, and translates them to Cloud
environment API, named vDocuments, that can be used to execute batch processing
applications. vDocuments do not only enable the complete execution of low-level
configuration management tasks, but also allow the construction of more
sophisticated tasks, while imposing additional reasoning logic to realize batch
application management objectives in Cloud environments. We present the design
of the vFlow framework and illustrate its utility by presenting the
implementation of several sophisticated operational tasks.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 05:05:11 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Gobjuka",
"Hassan",
""
],
[
"Ahmat",
"Kamal",
""
]
] |
new_dataset
| 0.999742 |
1111.3106
|
EPTCS
|
Doron Peled (Bar Ilan University), Sven Schewe (University of
Liverpool)
|
Practical Distributed Control Synthesis
|
In Proceedings INFINITY 2011, arXiv:1111.2678
|
EPTCS 73, 2011, pp. 2-17
|
10.4204/EPTCS.73.2
| null |
cs.LO cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Classic distributed control problems have an interesting dichotomy: they are
either trivial or undecidable. If we allow the controllers to fully
synchronize, then synthesis is trivial. In this case, controllers can
effectively act as a single controller with complete information, resulting in
a trivial control problem. But when we eliminate communication and restrict the
supervisors to locally available information, the problem becomes undecidable.
In this paper we argue in favor of a middle way. Communication is, in most
applications, expensive, and should hence be minimized. We therefore study a
solution that tries to communicate only scarcely and, while allowing
communication in order to make joint decision, favors local decisions over
joint decisions that require communication.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 06:35:08 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Peled",
"Doron",
"",
"Bar Ilan University"
],
[
"Schewe",
"Sven",
"",
"University of\n Liverpool"
]
] |
new_dataset
| 0.9918 |
1111.3122
|
Iris Eshkol
|
Iris Eshkol (LLL), D. Maurel (LI), Nathalie Friburger (LI)
|
ESLO: from transcription to speakers' personal information annotation
|
LREC2010, Malta (2010)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the preliminary works to put online a French oral corpus
and its transcription. This corpus is the Socio-Linguistic Survey in Orleans,
realized in 1968. First, we numerized the corpus, then we handwritten
transcribed it with the Transcriber software adding different tags about
speakers, time, noise, etc. Each document (audio file and XML file of the
transcription) was described by a set of metadata stored in an XML format to
allow an easy consultation. Second, we added different levels of annotations,
recognition of named entities and annotation of personal information about
speakers. This two annotation tasks used the CasSys system of transducer
cascades. We used and modified a first cascade to recognize named entities.
Then we built a second cascade to annote the designating entities, i.e.
information about the speaker. These second cascade parsed the named entity
annotated corpus. The objective is to locate information about the speaker and,
also, what kind of information can designate him/her. These two cascades was
evaluated with precision and recall measures.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 07:41:42 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Eshkol",
"Iris",
"",
"LLL"
],
[
"Maurel",
"D.",
"",
"LI"
],
[
"Friburger",
"Nathalie",
"",
"LI"
]
] |
new_dataset
| 0.999481 |
1111.3166
|
Francisco Lazaro Blasco
|
Francisco Lazaro Blasco, Gianluigi Liva
|
On the Concatenation of Non-Binary Random Linear Fountain Codes with
Maximum Distance Separable Codes
|
IEEE International Conference on Communications 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel fountain coding scheme has been introduced. The scheme consists of a
parallel concatenation of a MDS block code with a LRFC code, both constructed
over the same field, $F_q$. The performance of the concatenated fountain coding
scheme has been analyzed through derivation of tight bounds on the probability
of decoding failure as a function of the overhead. It has been shown how the
concatenated scheme performs as well as LRFC codes in channels characterized by
high erasure probabilities, whereas they provide failure probabilities lower by
several orders of magnitude at moderate/low erasure probabilities.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 10:35:34 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Blasco",
"Francisco Lazaro",
""
],
[
"Liva",
"Gianluigi",
""
]
] |
new_dataset
| 0.967969 |
1111.3282
|
Zolt\'an K\'asa
|
A. Iv\'anyi, L. Lucz, T. F. M\'ori, P. S\'ot\'er
|
On Erd\H{o}s-Gallai and Havel-Hakimi algorithms
| null |
Acta Univ. Sapientiae, Inform. 3, 2 (2011) 230--268
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Havel in 1955, Erd\H{o}s and Gallai in 1960, Hakimi in 1962, Ruskey, Cohen,
Eades and Scott in 1994, Barnes and Savage in 1997, Kohnert in 2004, Tripathi,
Venugopalan and West in 2010 proposed a method to decide, whether a sequence of
nonnegative integers can be the degree sequence of a simple graph. The running
time of their algorithms is $\Omega(n^2)$ in worst case. In this paper we
propose a new algorithm called EGL (Erd\H{o}s-Gallai Linear algorithm), whose
worst running time is $\Theta(n).$ As an application of this quick algorithm we
computed the number of the different degree sequences of simple graphs for $24,
...,29$ vertices.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2011 17:04:39 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Iványi",
"A.",
""
],
[
"Lucz",
"L.",
""
],
[
"Móri",
"T. F.",
""
],
[
"Sótér",
"P.",
""
]
] |
new_dataset
| 0.983534 |
1107.4939
|
Can Ba\c{s}kent
|
Can Baskent
|
Paraconsistency and Topological Semantics
|
arXiv admin note: substantial text overlap with arXiv:1107.4932
| null | null | null |
cs.LO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The well-studied notion of deductive explosion describes the situation where
any formula can be deduced from an inconsistent set of formulas. Paraconsistent
logic, on the other hand, is the umbrella term for logical systems where the
logical consequence relation is not explosive. In this work, we investigate the
relationship between some different topological spaces and paraconsistency.
|
[
{
"version": "v1",
"created": "Mon, 25 Jul 2011 13:15:07 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Nov 2011 22:17:02 GMT"
}
] | 2011-11-14T00:00:00 |
[
[
"Baskent",
"Can",
""
]
] |
new_dataset
| 0.99858 |
0706.3546
|
Samer Al Kiswany
|
Samer Al Kiswany, Matei Ripeanu, Sudharshan S. Vazhkudai, Abdullah
Gharaibeh
|
stdchk: A Checkpoint Storage System for Desktop Grid Computing
|
13 pages, 8 figures
| null | null | null |
cs.DC
| null |
Checkpointing is an indispensable technique to provide fault tolerance for
long-running high-throughput applications like those running on desktop grids.
This paper argues that a dedicated checkpoint storage system, optimized to
operate in these environments, can offer multiple benefits: reduce the load on
a traditional file system, offer high-performance through specialization, and,
finally, optimize data management by taking into account checkpoint application
semantics. Such a storage system can present a unifying abstraction to
checkpoint operations, while hiding the fact that there are no dedicated
resources to store the checkpoint data. We prototype stdchk, a checkpoint
storage system that uses scavenged disk space from participating desktops to
build a low-cost storage system, offering a traditional file system interface
for easy integration with applications. This paper presents the stdchk
architecture, key performance optimizations, support for incremental
checkpointing, and increased data availability. Our evaluation confirms that
the stdchk approach is viable in a desktop grid setting and offers a low cost
storage system with desirable performance characteristics: high write
throughput and reduced storage space and network effort to save checkpoint
images.
|
[
{
"version": "v1",
"created": "Mon, 25 Jun 2007 01:24:46 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Nov 2007 20:51:06 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Kiswany",
"Samer Al",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Vazhkudai",
"Sudharshan S.",
""
],
[
"Gharaibeh",
"Abdullah",
""
]
] |
new_dataset
| 0.999433 |
0707.3236
|
Vladimir Tskhvaradze
|
Vladimir Tskhvaradze
|
RS-232 Led Board
| null | null | null | null |
cs.OH
| null |
This article demonstrates how to develop a Microchip PIC16F84 based device
that supports RS-232 interface with PC. Circuit (LED Board) design and software
development will be discussed. PicBasic Pro Compiler from microEngineering
Labs, Inc. is used for PIC programming. Development of LED Board Control
Console using C/C++ is also briefly discussed. The project requires basic work
experience with Microchip PICs, serial communication and programming.
|
[
{
"version": "v1",
"created": "Sun, 22 Jul 2007 02:31:09 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Tskhvaradze",
"Vladimir",
""
]
] |
new_dataset
| 0.997954 |
0708.4407
|
G.Susinder Rajan
|
G. Susinder Rajan and B. Sundar Rajan
|
Algebraic Distributed Differential Space-Time Codes with Low Decoding
Complexity
|
To appear in IEEE Transactions on Wireless Communications. 10 pages,
5 figures
| null | null | null |
cs.IT cs.DM math.IT math.RA
| null |
The differential encoding/decoding setup introduced by Kiran et al,
Oggier-Hassibi and Jing-Jafarkhani for wireless relay networks that use
codebooks consisting of unitary matrices is extended to allow codebooks
consisting of scaled unitary matrices. For such codebooks to be usable in the
Jing-Hassibi protocol for cooperative diversity, the conditions involving the
relay matrices and the codebook that need to be satisfied are identified. Using
the algebraic framework of extended Clifford algebras, a new class of
Distributed Differential Space-Time Codes satisfying these conditions for power
of two number of relays and also achieving full cooperative diversity with a
low complexity sub-optimal receiver is proposed. Simulation results indicate
that the proposed codes outperform both the cyclic codes as well as the
circulant codes. Furthermore, these codes can also be applied as Differential
Space-Time codes for non-coherent communication in classical point to point
multiple antenna systems.
|
[
{
"version": "v1",
"created": "Fri, 31 Aug 2007 18:49:54 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Nov 2007 21:49:58 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Rajan",
"G. Susinder",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.953995 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.