id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0709.0099
|
Avraham Trahtman N
|
A. N. Trahtman
|
The road coloring problem
|
9 pages, correct typos
| null | null | null |
cs.DM
| null |
The synchronizing word of deterministic automaton is a word in the alphabet
of colors (considered as letters) of its edges that maps the automaton to a
single state. A coloring of edges of a directed graph is synchronizing if the
coloring turns the graph into deterministic finite automaton possessing a
synchronizing word.
The road coloring problem is a problem of synchronizing coloring of directed
finite strongly connected graph with constant outdegree of all its vertices if
the greatest common divisor of lengths of all its cycles is one. The problem
was posed by Adler, Goodwyn and Weiss over 30 years ago and evoked a noticeable
interest among the specialists in theory of graphs, deterministic automata and
symbolic dynamics. The problem is described even in "Wikipedia" - the popular
Internet Encyclopedia. The positive solution of the road coloring problem is
presented.
|
[
{
"version": "v1",
"created": "Sun, 2 Sep 2007 10:08:46 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Sep 2007 16:15:52 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Oct 2007 16:52:54 GMT"
},
{
"version": "v4",
"created": "Fri, 21 Dec 2007 08:07:18 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Trahtman",
"A. N.",
""
]
] |
new_dataset
| 0.99848 |
0911.1226
|
Gwendal Simon
|
Yaning Liu and Gwendal Simon
|
Large-Scale Time-Shifted Streaming Delivery
| null | null | null | null |
cs.NI cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An attractive new feature of connected TV systems consists in allowing users
to access past portions of the TV channel. This feature, called time-shifted
streaming, is now used by millions of TV viewers. We address in this paper the
design of a large-scale delivery system for time-shifted streaming. We
highlight the characteristics of time-shifted streaming that prevent known
video delivery systems to be used. Then, we present two proposals that meet the
demand for two radically different types of TV operator. First, the
Peer-Assisted Catch-Up Streaming system, namely PACUS, aims at reducing the
load on the server of a large TV broadcasters without losing the control of the
TV delivery. Second, the turntable structure, is an overlay of nodes that allow
an independent content delivery network or a small independent TV broadcaster
to ensure that all past TV programs are stored and as available as possible. We
show through extensive simulations that our objectives are reached, with a
reduction of up to three quarters of the traffic for PACUS and a 100\%
guaranteed availability for the turntable structure. We also compare our
proposals to the main previous works in the area.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2009 11:10:43 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Nov 2011 19:01:04 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Liu",
"Yaning",
""
],
[
"Simon",
"Gwendal",
""
]
] |
new_dataset
| 0.997039 |
1001.4898
|
Ccsd
|
Sylvie Boldo (INRIA Saclay - Ile de France, LRI), Fran\c{c}ois
Cl\'ement (INRIA Rocquencourt), Jean-Christophe Filli\^atre (INRIA Saclay -
Ile de France, LRI), Micaela Mayero (LIPN, INRIA Rh\^one-Alpes / LIP
Laboratoire de l'Informatique du Parall\'elisme), Guillaume Melquiond (INRIA
Saclay - Ile de France, LRI), Pierre Weis (INRIA Rocquencourt)
|
Formal Proof of a Wave Equation Resolution Scheme: the Method Error
|
This paper has been withdrawn by the authors. Please refere to
arXiv:1005.0824
| null | null |
RR-7181
|
cs.LO math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Popular finite difference numerical schemes for the resolution of the
one-dimensional acoustic wave equation are well-known to be convergent. We
present a comprehensive formalization of the simplest one and formally prove
its convergence in Coq. The main difficulties lie in the proper definition of
asymptotic behaviors and the implicit way they are handled in the mathematical
pen-and-paper proofs. To our knowledge, this is the first time such kind of
mathematical proof is machine-checked.
|
[
{
"version": "v1",
"created": "Wed, 27 Jan 2010 10:33:52 GMT"
},
{
"version": "v2",
"created": "Fri, 7 May 2010 09:16:40 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Nov 2011 10:17:06 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Boldo",
"Sylvie",
"",
"INRIA Saclay - Ile de France, LRI"
],
[
"Clément",
"François",
"",
"INRIA Rocquencourt"
],
[
"Filliâtre",
"Jean-Christophe",
"",
"INRIA Saclay -\n Ile de France, LRI"
],
[
"Mayero",
"Micaela",
"",
"LIPN, INRIA Rhône-Alpes / LIP\n Laboratoire de l'Informatique du Parallélisme"
],
[
"Melquiond",
"Guillaume",
"",
"INRIA\n Saclay - Ile de France, LRI"
],
[
"Weis",
"Pierre",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.99393 |
1009.1013
|
M. Emre Celebi
|
M. Emre Celebi, Hitoshi Iyatomi, William V. Stoecker, Randy H. Moss,
Harold S. Rabinovitz, Giuseppe Argenziano, H. Peter Soyer
|
Automatic Detection of Blue-White Veil and Related Structures in
Dermoscopy Images
| null |
Computerized Medical Imaging and Graphics 32 (2008) 670-677
|
10.1016/j.compmedimag.2008.08.003
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dermoscopy is a non-invasive skin imaging technique, which permits
visualization of features of pigmented melanocytic neoplasms that are not
discernable by examination with the naked eye. One of the most important
features for the diagnosis of melanoma in dermoscopy images is the blue-white
veil (irregular, structureless areas of confluent blue pigmentation with an
overlying white "ground-glass" film). In this article, we present a machine
learning approach to the detection of blue-white veil and related structures in
dermoscopy images. The method involves contextual pixel classification using a
decision tree classifier. The percentage of blue-white areas detected in a
lesion combined with a simple shape descriptor yielded a sensitivity of 69.35%
and a specificity of 89.97% on a set of 545 dermoscopy images. The sensitivity
rises to 78.20% for detection of blue veil in those cases where it is a primary
feature for melanoma recognition.
|
[
{
"version": "v1",
"created": "Mon, 6 Sep 2010 10:29:18 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Celebi",
"M. Emre",
""
],
[
"Iyatomi",
"Hitoshi",
""
],
[
"Stoecker",
"William V.",
""
],
[
"Moss",
"Randy H.",
""
],
[
"Rabinovitz",
"Harold S.",
""
],
[
"Argenziano",
"Giuseppe",
""
],
[
"Soyer",
"H. Peter",
""
]
] |
new_dataset
| 0.961672 |
1106.1228
|
EPTCS
|
Yoad Lustig (Rice University), Moshe Vardi (Rice University)
|
Synthesis from Recursive-Components Libraries
|
In Proceedings GandALF 2011, arXiv:1106.0814
|
EPTCS 54, 2011, pp. 1-16
|
10.4204/EPTCS.54.1
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Synthesis is the automatic construction of a system from its specification.
In classical synthesis algorithms it is always assumed that the system is
"constructed from scratch" rather than composed from reusable components. This,
of course, rarely happens in real life. In real life, almost every non-trivial
commercial software system relies heavily on using libraries of reusable
components. Furthermore, other contexts, such as web-service orchestration, can
be modeled as synthesis of a system from a library of components.
In 2009 we introduced LTL synthesis from libraries of reusable components.
Here, we extend the work and study synthesis from component libraries with
"call and return"' control flow structure. Such control-flow structure is very
common in software systems. We define the problem of Nested-Words Temporal
Logic (NWTL) synthesis from recursive component libraries, where NWTL is a
specification formalism, richer than LTL, that is suitable for "call and
return" computations. We solve the problem, providing a synthesis algorithm,
and show the problem is 2EXPTIME-complete, as standard synthesis.
|
[
{
"version": "v1",
"created": "Tue, 7 Jun 2011 01:05:37 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Lustig",
"Yoad",
"",
"Rice University"
],
[
"Vardi",
"Moshe",
"",
"Rice University"
]
] |
new_dataset
| 0.998063 |
1109.1251
|
Xu Chu Ding
|
Yushan Chen, Xu Chu Ding, Calin Belta
|
Synthesis of Distributed Control and Communication Schemes from Global
LTL Specifications
|
Technical Report accompanying an accepted paper for CDC2011
| null | null | null |
cs.RO cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a technique for synthesis of control and communication
strategies for a team of agents from a global task specification given as a
Linear Temporal Logic (LTL) formula over a set of properties that can be
satisfied by the agents. We consider a purely discrete scenario, in which the
dynamics of each agent is modeled as a finite transition system. The proposed
computational framework consists of two main steps. First, we extend results
from concurrency theory to check whether the specification is distributable
among the agents. Second, we generate individual control and communication
strategies by using ideas from LTL model checking. We apply the method to
automatically deploy a team of miniature cars in our Robotic Urban-Like
Environment.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2011 18:05:36 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Chen",
"Yushan",
""
],
[
"Ding",
"Xu Chu",
""
],
[
"Belta",
"Calin",
""
]
] |
new_dataset
| 0.993975 |
1111.2097
|
Preetha K G
|
Preetha K. G
|
A Novel Solution to the Short Range Bluetooth Communication
|
10 pages; IJANS-2011 October Issue
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bluetooth is developed for short range communication. Bluetooth Devices are
normally having low power and low cost. This is a wireless communication
technology designed to connect phones, laptops and PDAs. The greater
availability of portable devices with Bluetooth connectivity imposes wireless
connection between enabled devices. On an average the range of Bluetooth
devices is about 10 meters. The basic limitation of the Bluetooth communication
is this range limitation. In this paper I have studied the limitations of
Bluetooth communication and consider range constraint as the major limitation.
I propose a new expanded Blue tooth network to overcome the range constraint of
Bluetooth device. This creates a network of Bluetooth enabled devices that will
include laptops, set top devices and also mobile phones. The main purpose of
this proposal is to establish a network will enable the users to communicate
outside the range without any range constraint.
|
[
{
"version": "v1",
"created": "Wed, 9 Nov 2011 04:11:57 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"G",
"Preetha K.",
""
]
] |
new_dataset
| 0.985886 |
1111.2208
|
Ruchi Tuli Dr.
|
Ruchi Tuli, Parveen Kumar
|
Minimum Process Coordinated Checkpointing Scheme for Ad Hoc Networks
| null | null | null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The wireless mobile ad hoc network (MANET) architecture is one consisting of
a set of mobile hosts capable of communicating with each other without the
assistance of base stations. This has made possible creating a mobile
distributed computing environment and has also brought several new challenges
in distributed protocol design. In this paper, we study a very fundamental
problem, the fault tolerance problem, in a MANET environment and propose a
minimum process coordinated checkpointing scheme. Since potential problems of
this new environment are insufficient power and limited storage capacity, the
proposed scheme tries to reduce the amount of information saved for recovery.
The MANET structure used in our algorithm is hierarchical based. The scheme is
based for Cluster Based Routing Protocol (CBRP) which belongs to a class of
Hierarchical Reactive routing protocols. The protocol proposed by us is
nonblocking coordinated checkpointing algorithm suitable for ad hoc
environments. It produces a consistent set of checkpoints; the algorithm makes
sure that only minimum number of nodes in the cluster are required to take
checkpoints; it uses very few control messages. Performance analysis shows that
our algorithm outperforms the existing related works and is a novel idea in the
field. Firstly, we describe an organization of the cluster. Then we propose a
minimum process coordinated checkpointing scheme for cluster based ad hoc
routing protocols.
|
[
{
"version": "v1",
"created": "Wed, 9 Nov 2011 14:01:07 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Tuli",
"Ruchi",
""
],
[
"Kumar",
"Parveen",
""
]
] |
new_dataset
| 0.988499 |
0710.4630
|
EDA Publishing Association
|
Trent Mcconaghy, Tom Eeckelaert, Georges Gielen
|
CAFFEINE: Template-Free Symbolic Model Generation of Analog Circuits via
Canonical Form Functions and Genetic Programming
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This paper presents a method to automatically generate compact symbolic
performance models of analog circuits with no prior specification of an
equation template. The approach takes SPICE simulation data as input, which
enables modeling of any nonlinear circuits and circuit characteristics. Genetic
programming is applied as a means of traversing the space of possible symbolic
expressions. A grammar is specially designed to constrain the search to a
canonical form for functions. Novel evolutionary search operators are designed
to exploit the structure of the grammar. The approach generates a set of
symbolic models which collectively provide a tradeoff between error and model
complexity. Experimental results show that the symbolic models generated are
compact and easy to understand, making this an effective method for aiding
understanding in analog design. The models also demonstrate better prediction
quality than posynomials.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:07:11 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mcconaghy",
"Trent",
""
],
[
"Eeckelaert",
"Tom",
""
],
[
"Gielen",
"Georges",
""
]
] |
new_dataset
| 0.972935 |
0710.4633
|
EDA Publishing Association
|
Bharat Sukhwani, Uday Padmanabhan, Janet M. Wang
|
Nano-Sim: A Step Wise Equivalent Conductance based Statistical Simulator
for Nanotechnology Circuit Design
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
|
10.1109/DATE.2005.221
| null |
cs.PF
| null |
New nanotechnology based devices are replacing CMOS devices to overcome CMOS
technology's scaling limitations. However, many such devices exhibit
non-monotonic I-V characteristics and uncertain properties which lead to the
negative differential resistance (NDR) problem and the chaotic performance.
This paper proposes a new circuit simulation approach that can effectively
simulate nanotechnology devices with uncertain input sources and negative
differential resistance (NDR) problem. The experimental results show a 20-30
times speedup comparing with existing simulators.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:07:46 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Sukhwani",
"Bharat",
""
],
[
"Padmanabhan",
"Uday",
""
],
[
"Wang",
"Janet M.",
""
]
] |
new_dataset
| 0.974844 |
0710.4637
|
EDA Publishing Association
|
Irith Pomeranz, Sudhakar M. Reddy
|
The Accidental Detection Index as a Fault Ordering Heuristic for
Full-Scan Circuits
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.OH
| null |
We investigate a new fault ordering heuristic for test generation in
full-scan circuits. The heuristic is referred to as the accidental detection
index. It associates a value ADI (f) with every circuit fault f. The heuristic
estimates the number of faults that will be detected by a test generated for f.
Fault ordering is done such that a fault with a higher accidental detection
index appears earlier in the ordered fault set and targeted earlier during test
generation. This order is effective for generating compact test sets, and for
obtaining a test set with a steep fault coverage curve. Such a test set has
several applications. We present experimental results to demonstrate the
effectiveness of the heuristic.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:09:39 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Pomeranz",
"Irith",
""
],
[
"Reddy",
"Sudhakar M.",
""
]
] |
new_dataset
| 0.999523 |
0710.4645
|
EDA Publishing Association
|
B. Cheon, E. Lee, L.-T. Wang, X. Wen, P. Hsu, J. Cho, J. Park, H.
Chao, S. Wu
|
At-Speed Logic BIST for IP Cores
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This paper describes a flexible logic BIST scheme that features high fault
coverage achieved by fault-simulation guided test point insertion, real
at-speed test capability for multi-clock designs without clock frequency
manipulation, and easy physical implementation due to the use of a low-speed SE
signal. Application results of this scheme to two widely used IP cores are also
reported.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 08:19:34 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Cheon",
"B.",
""
],
[
"Lee",
"E.",
""
],
[
"Wang",
"L. -T.",
""
],
[
"Wen",
"X.",
""
],
[
"Hsu",
"P.",
""
],
[
"Cho",
"J.",
""
],
[
"Park",
"J.",
""
],
[
"Chao",
"H.",
""
],
[
"Wu",
"S.",
""
]
] |
new_dataset
| 0.99965 |
0710.4678
|
EDA Publishing Association
|
R. Thewes, C. Paulus, M. Schienle, F. Hofmann, A. Frey, R. Brederlow,
M. Augustyniak, M. Jenkner, B. Eversmann, P. Schindler-Bauer, M. Atzesberger,
B. Holzapfl, G. Beer, T. Haneder, H.-C. Hanke
|
CMOS-Based Biosensor Arrays
| null |
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
CMOS-based sensor array chips provide new and attractive features as compared
to today's standard tools for medical, diagnostic, and biotechnical
applications. Examples for molecule- and cell-based approaches and related
circuit design issues are discussed.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:02:53 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Thewes",
"R.",
""
],
[
"Paulus",
"C.",
""
],
[
"Schienle",
"M.",
""
],
[
"Hofmann",
"F.",
""
],
[
"Frey",
"A.",
""
],
[
"Brederlow",
"R.",
""
],
[
"Augustyniak",
"M.",
""
],
[
"Jenkner",
"M.",
""
],
[
"Eversmann",
"B.",
""
],
[
"Schindler-Bauer",
"P.",
""
],
[
"Atzesberger",
"M.",
""
],
[
"Holzapfl",
"B.",
""
],
[
"Beer",
"G.",
""
],
[
"Haneder",
"T.",
""
],
[
"Hanke",
"H. -C.",
""
]
] |
new_dataset
| 0.999334 |
0710.4684
|
EDA Publishing Association
|
S. Tosun, N. Mansouri, E. Arvas, M. Kandemir, Yuan Xie
|
Reliability-Centric High-Level Synthesis
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
Importance of addressing soft errors in both safety critical applications and
commercial consumer products is increasing, mainly due to ever shrinking
geometries, higher-density circuits, and employment of power-saving techniques
such as voltage scaling and component shut-down. As a result, it is becoming
necessary to treat reliability as a first-class citizen in system design. In
particular, reliability decisions taken early in system design can have
significant benefits in terms of design quality. Motivated by this observation,
this paper presents a reliability-centric high-level synthesis approach that
addresses the soft error problem. The proposed approach tries to maximize
reliability of the design while observing the bounds on area and performance,
and makes use of our reliability characterization of hardware components such
as adders and multipliers. We implemented the proposed approach, performed
experiments with several designs, and compared the results with those obtained
by a prior proposal.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:07:44 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Tosun",
"S.",
""
],
[
"Mansouri",
"N.",
""
],
[
"Arvas",
"E.",
""
],
[
"Kandemir",
"M.",
""
],
[
"Xie",
"Yuan",
""
]
] |
new_dataset
| 0.963519 |
0710.4691
|
EDA Publishing Association
|
Zhuo Li, Weiping Shi
|
An O(bn^2) Time Algorithm for Optimal Buffer Insertion with b Buffer
Types
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
Buffer insertion is a popular technique to reduce the interconnect delay. The
classic buffer insertion algorithm of van Ginneken has time complexity O(n^2),
where n is the number of buffer positions. Lillis, Cheng and Lin extended van
Ginneken's algorithm to allow b buffer types in time O (b^2 n^2). For modern
design libraries that contain hundreds of buffers, it is a serious challenge to
balance the speed and performance of the buffer insertion algorithm. In this
paper, we present a new algorithm that computes the optimal buffer insertion in
O (bn^2) time. The reduction is achieved by the observation that the (Q, C)
pairs of the candidates that generate the new candidates must form a convex
hull. On industrial test cases, the new algorithm is faster than the previous
best buffer insertion algorithms by orders of magnitude.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:11:11 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Li",
"Zhuo",
""
],
[
"Shi",
"Weiping",
""
]
] |
new_dataset
| 0.998028 |
0710.4709
|
EDA Publishing Association
|
Georges Gielen, Wim Dehaene, Phillip Christie, Dieter Draxelmayr,
Edmond Janssens, Karen Maex, Ted Vucurevich
|
Analog and Digital Circuit Design in 65 nm CMOS: End of the Road?
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This special session adresses the problems that designers face when
implementing analog and digital circuits in nanometer technologies. An
introductory embedded tutorial will give an overview of the design problems at
hand : the leakage power and process variability and their implications for
digital circuits and memories, and the reducing supply voltages, the design
productivity and signal integrity problems for embedded analog blocks. Next, a
panel of experts from both industrial semiconductor houses and design
companies, EDA vendors and research institutes will present and discuss with
the audience their opinions on whether the design road ends at marker "65nm" or
not.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:30:46 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Gielen",
"Georges",
""
],
[
"Dehaene",
"Wim",
""
],
[
"Christie",
"Phillip",
""
],
[
"Draxelmayr",
"Dieter",
""
],
[
"Janssens",
"Edmond",
""
],
[
"Maex",
"Karen",
""
],
[
"Vucurevich",
"Ted",
""
]
] |
new_dataset
| 0.999331 |
0710.4711
|
EDA Publishing Association
|
N. Huot (TIMA), H. Dubreuil (TIMA), L. Fesquet (TIMA), M. Renaudin
(TIMA)
|
FPGA Architecture for Multi-Style Asynchronous Logic
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This paper presents a novel FPGA architecture for implementing various styles
of asynchronous logic. The main objective is to break the dependency between
the FPGA architecture dedicated to asynchronous logic and the logic style. The
innovative aspects of the architecture are described. Moreover the structure is
well suited to be rebuilt and adapted to fit with further asynchronous logic
evolutions thanks to the architecture genericity. A full-adder was implemented
in different styles of logic to show the architecture flexibility.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:32:43 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Huot",
"N.",
"",
"TIMA"
],
[
"Dubreuil",
"H.",
"",
"TIMA"
],
[
"Fesquet",
"L.",
"",
"TIMA"
],
[
"Renaudin",
"M.",
"",
"TIMA"
]
] |
new_dataset
| 0.997865 |
0710.4715
|
EDA Publishing Association
|
Jonathan R. Carter, Sule Ozev, Daniel J. Sorin
|
Circuit-Level Modeling for Concurrent Testing of Operational Defects due
to Gate Oxide Breakdown
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
As device sizes shrink and current densities increase, the probability of
device failures due to gate oxide breakdown (OBD) also increases. To provide
designs that are tolerant to such failures, we must investigate and understand
the manifestations of this physical phenomenon at the circuit and system level.
In this paper, we develop a model for operational OBD defects, and we explore
how to test for faults due to OBD. For a NAND gate, we derive the necessary
input conditions that excite and detect errors due to OBD defects at the gate
level. We show that traditional pattern generators fail to exercise all of
these defects. Finally, we show that these test patterns can be propagated and
justified for a combinational circuit in a manner similar to traditional ATPG.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:34:11 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Carter",
"Jonathan R.",
""
],
[
"Ozev",
"Sule",
""
],
[
"Sorin",
"Daniel J.",
""
]
] |
new_dataset
| 0.965705 |
0710.4720
|
EDA Publishing Association
|
Yuvraj Singh Dhillon, Abdulkadir Utku Diril, Abhijit Chatterjee
|
Soft-Error Tolerance Analysis and Optimization of Nanometer Circuits
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
Nanometer circuits are becoming increasingly susceptible to soft-errors due
to alpha-particle and atmospheric neutron strikes as device scaling reduces
node capacitances and supply/threshold voltage scaling reduces noise margins.
It is becoming crucial to add soft-error tolerance estimation and optimization
to the design flow to handle the increasing susceptibility. The first part of
this paper presents a tool for accurate soft-error tolerance analysis of
nanometer circuits (ASERTA) that can be used to estimate the soft-error
tolerance of nanometer circuits consisting of millions of gates. The tolerance
estimates generated by the tool match SPICE generated estimates closely while
taking orders of magnitude less computation time. The second part of the paper
presents a tool for soft-error tolerance optimization of nanometer circuits
(SERTOPT) using the tolerance estimates generated by ASERTA. The tool finds
optimal sizes, channel lengths, supply voltages and threshold voltages to be
assigned to gates in a combinational circuit such that the soft-error tolerance
is increased while meeting the timing constraint. Experiments on ISCAS'85
benchmark circuits showed that soft-error rate of the optimized circuit
decreased by as much as 47% with marginal increase in circuit delay.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:36:27 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Dhillon",
"Yuvraj Singh",
""
],
[
"Diril",
"Abdulkadir Utku",
""
],
[
"Chatterjee",
"Abhijit",
""
]
] |
new_dataset
| 0.980817 |
0710.4721
|
EDA Publishing Association
|
Pekka Syri, Juha Hakkinen, Markku Moilanen
|
IEEE 1149.4 Compatible ABMs for Basic RF Measurements
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
An analogue testing standard IEEE 1149.4 is mainly targeted for low-frequency
testing. The problem studied in this paper is extending the standard also for
radio frequency testing. IEEE 1149.4 compatible measurement structures (ABMs)
developed in this study extract the information one is measuring from the radio
frequency signal and represent the result as a DC voltage level. The ABMs
presented in this paper are targeted for power and frequency measurements
operating in frequencies from 1 GHz to 2 GHz. The power measurement error
caused by temperature, supply voltage and process variations is roughly 2 dB
and the frequency measurement error is 0.1 GHz, respectively.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:36:53 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Syri",
"Pekka",
""
],
[
"Hakkinen",
"Juha",
""
],
[
"Moilanen",
"Markku",
""
]
] |
new_dataset
| 0.990666 |
0710.4746
|
EDA Publishing Association
|
M. Abdelsalam Hassan, Keishi Sakanushi, Yoshinori Takeuchi, Masaharu
Imai
|
RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in
SystemC
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.OS
| null |
This paper presents the methodology and the modeling constructs we have
developed to capture the real time aspects of RTOS simulation models in a
System Level Design Language (SLDL) like SystemC. We describe these constructs
and show how they are used to build a simulation model of an RTOS kernel
targeting the $\mu$-ITRON OS specification standard.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:47:35 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Hassan",
"M. Abdelsalam",
""
],
[
"Sakanushi",
"Keishi",
""
],
[
"Takeuchi",
"Yoshinori",
""
],
[
"Imai",
"Masaharu",
""
]
] |
new_dataset
| 0.959301 |
0710.4761
|
EDA Publishing Association
|
D. C. Keezer, C. Gray, A. Majid, N. Taher
|
Low-Cost Multi-Gigahertz Test Systems Using CMOS FPGAs and PECL
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This paper describes two research projects that develop new low-cost
techniques for testing devices with multiple high-speed (2 to 5 Gbps) signals.
Each project uses commercially available components to keep costs low, yet
achieves performance characteristics comparable to (and in some ways exceeding)
more expensive ATE. A common CMOS FPGA-based logic core provides flexibility,
adaptability, and communication with controlling computers while customized
positive emitter-coupled logic (PECL) achieves multi-gigahertz data rates with
about $\pm$25ps timing accuracy.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:55:04 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Keezer",
"D. C.",
""
],
[
"Gray",
"C.",
""
],
[
"Majid",
"A.",
""
],
[
"Taher",
"N.",
""
]
] |
new_dataset
| 0.997603 |
0710.4763
|
EDA Publishing Association
|
Matthias Beck, Olivier Barondeau, Martin Kaibel, Frank Poehl, Xijiang
Lin, Ron Press
|
Logic Design for On-Chip Test Clock Generation - Implementation Details
and Impact on Delay Test Quality
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
This paper addresses delay test for SOC devices with high frequency clock
domains. A logic design for on-chip high-speed clock generation, implemented to
avoid expensive test equipment, is described in detail. Techniques for on-chip
clock generation, meant to reduce test vector count and to increase test
quality, are discussed. ATPG results for the proposed techniques are given.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:55:27 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Beck",
"Matthias",
""
],
[
"Barondeau",
"Olivier",
""
],
[
"Kaibel",
"Martin",
""
],
[
"Poehl",
"Frank",
""
],
[
"Lin",
"Xijiang",
""
],
[
"Press",
"Ron",
""
]
] |
new_dataset
| 0.996117 |
0710.4764
|
EDA Publishing Association
|
G. M. Link, N. Vijaykrishnan
|
Hotspot Prevention Through Runtime Reconfiguration in Network-On-Chip
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe - DATE'05, Munich :
Allemagne (2005)
| null | null |
cs.AR
| null |
Many existing thermal management techniques focus on reducing the overall
power consumption of the chip, and do not address location-specific temperature
problems referred to as hotspots. We propose the use of dynamic runtime
reconfiguration to shift the hotspot-inducing computation periodically and make
the thermal profile more uniform. Our analysis shows that dynamic
reconfiguration is an effective technique in reducing hotspots for NoCs.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 09:55:48 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Link",
"G. M.",
""
],
[
"Vijaykrishnan",
"N.",
""
]
] |
new_dataset
| 0.98658 |
0710.4806
|
EDA Publishing Association
|
Kris Tiri, Ingrid Verbauwhede
|
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.AR
| null |
This paper presents a digital VLSI design flow to create secure, side-channel
attack (SCA) resistant integrated circuits. The design flow starts from a
normal design in a hardware description language such as VHDL or Verilog and
provides a direct path to a SCA resistant layout. Instead of a full custom
layout or an iterative design process with extensive simulations, a few key
modifications are incorporated in a regular synchronous CMOS standard cell
design flow. We discuss the basis for side-channel attack resistance and adjust
the library databases and constraints files of the synthesis and place & route
procedures accordingly. Experimental results show that a DPA attack on a
regular single ended CMOS standard cell implementation of a module of the DES
algorithm discloses the secret key after 200 measurements. The same attack on a
secure version still does not disclose the secret key after more than 2000
measurements.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:57:56 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Tiri",
"Kris",
""
],
[
"Verbauwhede",
"Ingrid",
""
]
] |
new_dataset
| 0.999472 |
0710.4809
|
EDA Publishing Association
|
Andres Takach, Bryan Bowyer, Thomas Bollaert
|
C Based Hardware Design for Wireless Applications
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.AR
| null |
The algorithms used in wireless applications are increasingly more
sophisticated and consequently more challenging to implement in hardware.
Traditional design flows require developing the micro architecture, coding the
RTL, and verifying the generated RTL against the original functional C or
MATLAB specification. This paper describes a C-based design flow that is well
suited for the hardware implementation of DSP algorithms commonly found in
wireless applications. The C design flow relies on guided synthesis to generate
the RTL directly from the untimed C algorithm. The specifics of the C-based
design flow are described using a simple DSP filtering algorithm consisting of
a forward adaptive equalizer, a 64-QAM slicer and an adaptive decision feedback
equalizer. The example illustrates some of the capabilities and advantages
offered by this flow.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 11:59:48 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Takach",
"Andres",
""
],
[
"Bowyer",
"Bryan",
""
],
[
"Bollaert",
"Thomas",
""
]
] |
new_dataset
| 0.998905 |
0710.4815
|
EDA Publishing Association
|
Raul Blazquez, Fred Lee, David Wentzloff, Brian Ginsburg, Johnna
Powell, Anantha Chandrakasan
|
Direct Conversion Pulsed UWB Transceiver Architecture
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.NI
| null |
Ultra-wideband (UWB) communication is an emerging wireless technology that
promises high data rates over short distances and precise locationing. The
large available bandwidth and the constraint of a maximum power spectral
density drives a unique set of system challenges. This paper addresses these
challenges using two UWB transceivers and a discrete prototype platform.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:01:54 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Blazquez",
"Raul",
""
],
[
"Lee",
"Fred",
""
],
[
"Wentzloff",
"David",
""
],
[
"Ginsburg",
"Brian",
""
],
[
"Powell",
"Johnna",
""
],
[
"Chandrakasan",
"Anantha",
""
]
] |
new_dataset
| 0.990502 |
0710.4824
|
EDA Publishing Association
|
R. Pradeep, S. Vinay, Sanjay Burman, V. Kamakoti
|
FPGA based Agile Algorithm-On-Demand Co-Processor
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.AR
| null |
With growing computational needs of many real-world applications, frequently
changing specifications of standards, and the high design and NRE costs of
ASICs, an algorithm-agile FPGA based co-processor has become a viable
alternative. In this article, we report about the general design of an
algorith-agile co-processor and the proof-of-concept implementation.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:04:43 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Pradeep",
"R.",
""
],
[
"Vinay",
"S.",
""
],
[
"Burman",
"Sanjay",
""
],
[
"Kamakoti",
"V.",
""
]
] |
new_dataset
| 0.983698 |
0710.4835
|
EDA Publishing Association
|
K.-U. Kirstein, J. Sedivy, T. Salo, C. Hagleitner, T. Vancura, A.
Hierlemann
|
A CMOS-Based Tactile Sensor for Continuous Blood Pressure Monitoring
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.OH
| null |
A monolithic integrated tactile sensor array is presented, which is used to
perform non-invasive blood pressure monitoring of a patient. The advantage of
this device compared to a hand cuff based approach is the capability of
recording continuous blood pressure data. The capacitive, membrane-based sensor
device is fabricated in an industrial CMOS-technology combined with post-CMOS
micromachining. The capacitance change is detected by a S?-modulator. The
modulator is operated at a sampling rate of 128kS/s and achieves a resolution
of 12bit with an external decimation filter and an OSR of 128.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:13:35 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Kirstein",
"K. -U.",
""
],
[
"Sedivy",
"J.",
""
],
[
"Salo",
"T.",
""
],
[
"Hagleitner",
"C.",
""
],
[
"Vancura",
"T.",
""
],
[
"Hierlemann",
"A.",
""
]
] |
new_dataset
| 0.999066 |
0710.4842
|
EDA Publishing Association
|
Dan Hillman
|
Using Mobilize Power Management IP for Dynamic & Static Power Reduction
in SoC at 130 nm
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.AR
| null |
At 130 nm and 90 nm, power consumption (both dynamic and static) has become a
barrier in the roadmap for SoC designs targeting battery powered, mobile
applications. This paper presents the results of dynamic and static power
reduction achieved implementing Tensilica's 32-bit Xtensa microprocessor core,
using Virtual Silicon's Power Management IP. Independent voltage islands are
created using Virtual Silicon's VIP PowerSaver standard cells by using voltage
level shifting cells and voltage isolation cells to implement power islands.
The VIP PowerSaver standard cells are characterized at 1.2V, 1.0V and 0.8V, to
accommodate voltage scaling. Power islands can also be turned off completely.
Designers can significantly lower both the dynamic power and the quiescent or
leakage power of their SoC designs, with very little impact on speed or area
using Virtual Silicon's VIP Gate Bias standard cells.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:18:38 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Hillman",
"Dan",
""
]
] |
new_dataset
| 0.985772 |
0710.4851
|
EDA Publishing Association
|
Giuseppe Falconeri, Walid Naifer, Nizar Romdhane
|
Common Reusable Verification Environment for BCA and RTL Models
|
Submitted on behalf of EDAA (http://www.edaa.com/)
|
Dans Design, Automation and Test in Europe | Designers'Forum -
DATE'05, Munich : Allemagne (2005)
| null | null |
cs.LO
| null |
This paper deals with a common verification methodology and environment for
SystemC BCA and RTL models. The aim is to save effort by avoiding the same work
done twice by different people and to reuse the same environment for the two
design views. Applying this methodology the verification task starts as soon as
the functional specification is signed off and it runs in parallel to the
models and design development. The verification environment is modeled with the
aid of dedicated verification languages and it is applied to both the models.
The test suite is exactly the same and thus it's possible to verify the
alignment between the two models. In fact the final step is to check the
cycle-by-cycle match of the interface behavior. A regression tool and a bus
analyzer have been developed to help the verification and the alignment
process. The former is used to automate the testbench generation and to run the
two test suites. The latter is used to verify the alignment between the two
models comparing the waveforms obtained in each run. The quality metrics used
to validate the flow are full functional coverage and full alignment at each IP
port.
|
[
{
"version": "v1",
"created": "Thu, 25 Oct 2007 12:25:32 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Falconeri",
"Giuseppe",
""
],
[
"Naifer",
"Walid",
""
],
[
"Romdhane",
"Nizar",
""
]
] |
new_dataset
| 0.982841 |
1111.1842
|
Laurent George
|
Laurent George (INRIA - IRISA), Laurent Bonnet (INRIA - IRISA),
Anatole L\'ecuyer (INRIA - IRISA)
|
Freeze the BCI until the user is ready: a pilot study of a BCI inhibitor
|
5th International Brain-Computer Interface Workshop (2011)
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce the concept of Brain-Computer Interface (BCI)
inhibitor, which is meant to standby the BCI until the user is ready, in order
to improve the overall performance and usability of the system. BCI inhibitor
can be defined as a system that monitors user's state and inhibits BCI
interaction until specific requirements (e.g. brain activity pattern, user
attention level) are met. In this pilot study, a hybrid BCI is designed and
composed of a classic synchronous BCI system based on motor imagery and a BCI
inhibitor. The BCI inhibitor initiates the control period of the BCI when
requirements in terms of brain activity are reached (i.e. stability in the beta
band). Preliminary results with four participants suggest that BCI inhibitor
system can improve BCI performance.
|
[
{
"version": "v1",
"created": "Tue, 8 Nov 2011 09:47:39 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"George",
"Laurent",
"",
"INRIA - IRISA"
],
[
"Bonnet",
"Laurent",
"",
"INRIA - IRISA"
],
[
"Lécuyer",
"Anatole",
"",
"INRIA - IRISA"
]
] |
new_dataset
| 0.98918 |
1111.1854
|
Aphirak Jansang
|
Aphirak Jansang and Anan Phonphoem
|
Framework Architecture for WLAN Testbed
|
5 pages, 6 figures, 3rd Asian International Mobile Computing
Conference (AMOC 2004), May 26-28, 2004, Thailand pp. 96-100 ISBN:
974-537-487-3
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
There has been a tremendous effort in improving wireless LAN for supporting
the demanding multimedia application. Many new protocols or ideas have been
proposed and proved by using a mathematical model or running a simulation
program. That is satisfactory but these proposed designs might not work in the
real world situation. Testbed is an option to alleviate this gap and present
the opportunity to see the real problem and ensure that the design works. A
framework architecture for building a testbed to test a new concept or design
is presented in this paper. The framework is designed in the modularity style
in such a way that can be easily exchanged or modified. A testbed based on the
framework that implements the polling based mechanism has been created and the
results have shown that the QoS of the real time traffic can be maintained in
the presence of the high non-real time traffic.
|
[
{
"version": "v1",
"created": "Tue, 8 Nov 2011 10:22:23 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Jansang",
"Aphirak",
""
],
[
"Phonphoem",
"Anan",
""
]
] |
new_dataset
| 0.998578 |
1111.1930
|
Boudhir Anouar Abdelhakim
|
A. A. Boudhir, M. Bouhorma, M. Ben Ahmed and Elbrak Said
|
The UWB Solution for Multimedia Traffic in Wireless Sensor Networks
|
8 pages, 11 figures, IJWMN Journal
|
International Journal of Wireless & Mobile Networks October Issue
2011
|
10.5121/ijwmn
| null |
cs.NI cs.MM cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several researches are focused on the QoS (Quality of Service) and Energy
consumption in wireless Multimedia Sensor Networks. Those research projects
invest in theory and practice in order to extend the spectrum of use of norms,
standards and technologies which are emerged in wireless communications. The
performance of these technologies is strongly related to domains of use and
limitations of their characteristics. In this paper, we give a comparison of
ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide
Band) which presents itself as competitor that present in these work better
results for audiovisual applications with medium-range and high throughput.
|
[
{
"version": "v1",
"created": "Tue, 8 Nov 2011 15:03:26 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Boudhir",
"A. A.",
""
],
[
"Bouhorma",
"M.",
""
],
[
"Ahmed",
"M. Ben",
""
],
[
"Said",
"Elbrak",
""
]
] |
new_dataset
| 0.999286 |
cs/0407052
|
Reinhold Kainhofer
|
Reinhold Kainhofer and Reinhard V. Simonovits
|
M@th Desktop and MD Tools - Mathematics and Mathematica Made Easy for
Students
|
13 pages, 16 figures. Paper presented at the PrimMath[2003]
conference in Zagreb, Croatia, on September 26, 2003. Published in the
Proceedings of PrimMath[2003]
| null | null | null |
cs.MS
| null |
We present two add-ons for Mathematica for teaching mathematics to
undergraduate and high school students. These two applications, M@th Desktop
(MD) and M@th Desktop Tools (MDTools), include several palettes and notebooks
covering almost every field. The underlying didactic concept is so-called
"blended learning", in which these tools are meant to be used as a complement
to the professor or teacher rather than as a replacement, which other
e-learning applications do. They enable students to avoid the usual problem of
computer-based learning, namely that too large an amount of time is wasted
struggling with computer and program errors instead of actually learning the
mathematical concepts.
M@th Desktop Tools is palette-based and provides easily accessible and
user-friendly templates for the most important functions in the fields of
Analysis, Algebra, Linear Algebra and Statistics. M@th Desktop, in contrast, is
a modern, interactive teaching and learning software package for mathematics
classes. It is comprised of modules for Differentiation, Integration, and
Statistics, and each module presents its topic with a combination of
interactive notebooks and palettes.
Both packages can be obtained from Deltasoft's homepage at
http://www.deltasoft.at/ .
|
[
{
"version": "v1",
"created": "Tue, 20 Jul 2004 13:46:09 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Kainhofer",
"Reinhold",
""
],
[
"Simonovits",
"Reinhard V.",
""
]
] |
new_dataset
| 0.99681 |
cs/0511077
|
Frank McCown
|
Frank McCown, Sheffan Chan, Michael L. Nelson, Johan Bollen
|
The Availability and Persistence of Web References in D-Lib Magazine
|
11 pages, 7 figures, 3 tables
|
5th International Web Archiving Workshop (IWAW05), Vienna,
Austria, 2005
| null | null |
cs.DL
| null |
We explore the availability and persistence of URLs cited in articles
published in D-Lib Magazine. We extracted 4387 unique URLs referenced in 453
articles published from July 1995 to August 2004. The availability was checked
three times a week for 25 weeks from September 2004 to February 2005. We found
that approximately 28% of those URLs failed to resolve initially, and 30%
failed to resolve at the last check. A majority of the unresolved URLs were due
to 404 (page not found) and 500 (internal server error) errors. The content
pointed to by the URLs was relatively stable; only 16% of the content
registered more than a 1 KB change during the testing period. We explore
possible factors which may cause a URL to fail by examining its age, path
depth, top-level domain and file extension. Based on the data collected, we
found the half-life of a URL referenced in a D-Lib Magazine article is
approximately 10 years. We also found that URLs were more likely to be
unavailable if they pointed to resources in the .net, .edu or country-specific
top-level domain, used non-standard ports (i.e., not port 80), or pointed to
resources with uncommon or deprecated extensions (e.g., .shtml, .ps, .txt).
|
[
{
"version": "v1",
"created": "Mon, 21 Nov 2005 15:56:17 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"McCown",
"Frank",
""
],
[
"Chan",
"Sheffan",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Bollen",
"Johan",
""
]
] |
new_dataset
| 0.997357 |
cs/0604041
|
R.N.Mohan Professor
|
R.N.Mohan, Moon Ho Lee, and Subash Pokreal
|
On Orthogonality of Latin Squares
|
29 pages
| null | null | null |
cs.DM
| null |
An arrangement of s elements in s rows and s columns, such that no element
repeats more than once in each row and each column is called a Latin square of
order s. If two Latin squares of the same order superimposed one on the other
and in the resultant array if each ordered pair occurs once and only once then
they are called othogonal Latin Squares. A frequency square is an nxn matrix,
such that each element from the list of n elements, occurs t times in each row
and in each column. These two concepts lead to a new third concept called as t
orthogonal latin squares, where from a set of m orthogonal Latin squares, if t
orthogonal Latin squares are superimposed and each ordered t tuple in the
resultant array occurs once and only once then it is t othogonal Latin square.
In this paper it is proposed to construct such t othogonal latin squares
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 02:54:04 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 09:25:59 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Pokreal",
"Subash",
""
]
] |
new_dataset
| 0.952292 |
cs/0604050
|
R.N.Mohan Professor
|
R.N.Mohan
|
On Hadamard Conjecture
| null | null | null | null |
cs.DM
| null |
In this note, while giving an overview of the state of art of the well known
Hadamard conjecture, which is more than a century old and now it has been
established by using the methods given in the two papers by Mohan et al [6,7].
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 01:34:56 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mohan",
"R. N.",
""
]
] |
new_dataset
| 0.991194 |
cs/0701077
|
Karl Obermeyer
|
Karl J. Obermeyer, Anurag Ganguli, Francesco Bullo
|
Asynchronous Distributed Searchlight Scheduling
|
Tech. report contains proofs corresponding to a paper to appear in
Conference on Decision and Control 2007. In this version, minor typos have
been fixed and some notation changed for clarity
| null | null | null |
cs.MA cs.RO
| null |
This paper develops and compares two simple asynchronous distributed
searchlight scheduling algorithms for multiple robotic agents in nonconvex
polygonal environments. A searchlight is a ray emitted by an agent which cannot
penetrate the boundary of the environment. A point is detected by a searchlight
if and only if the point is on the ray at some instant. Targets are points
which can move continuously with unbounded speed. The objective of the proposed
algorithms is for the agents to coordinate the slewing (rotation about a point)
of their searchlights in a distributed manner, i.e., using only local sensing
and limited communication, such that any target will necessarily be detected in
finite time. The first algorithm we develop, called the DOWSS (Distributed One
Way Sweep Strategy), is a distributed version of a known algorithm described
originally in 1990 by Sugihara et al \cite{KS-IS-MY:90}, but it can be very
slow in clearing the entire environment because only one searchlight may slew
at a time. In an effort to reduce the time to clear the environment, we develop
a second algorithm, called the PTSS (Parallel Tree Sweep Strategy), in which
searchlights sweep in parallel if guards are placed according to an environment
partition belonging to a class we call PTSS partitions. Finally, we discuss how
DOWSS and PTSS could be combined with with deployment, or extended to
environments with holes.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2007 20:55:17 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jan 2007 19:18:22 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Aug 2007 03:41:45 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Obermeyer",
"Karl J.",
""
],
[
"Ganguli",
"Anurag",
""
],
[
"Bullo",
"Francesco",
""
]
] |
new_dataset
| 0.995317 |
1104.1905
|
Carsten Lemmen
|
Carsten Lemmen and Detlef Gronenborn and Kai W. Wirtz
|
A simulation of the Neolithic transition in Western Eurasia
|
Accepted Author Manuscript version accepted for publication in
Journal of Archaeological Science. A definitive version will be subsequently
published in the Journal of Archaological Science
|
Journal of Archaeological Science Vol 38 (12), pp. 3459-3470, 2011
|
10.1016/j.jas.2011.08.008
| null |
cs.MA q-bio.PE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Farming and herding were introduced to Europe from the Near East and
Anatolia; there are, however, considerable arguments about the mechanisms of
this transition. Were it people who moved and outplaced the indigenous hunter-
gatherer groups or admixed with them? Or was it just material and information
that moved-the Neolithic Package-consisting of domesticated plants and animals
and the knowledge of its use? The latter process is commonly referred to as
cultural diffusion and the former as demic diffusion. Despite continuous and
partly combined efforts by archaeologists, anthropologists, linguists,
paleontologists and geneticists a final resolution of the debate has not yet
been reached. In the present contribution we interpret results from the Global
Land Use and technological Evolution Simulator (GLUES), a mathematical model
for regional sociocultural development embedded in the western Eurasian
geoenvironmental context during the Holocene. We demonstrate that the model is
able to realistically hindcast the expansion speed and the inhomogeneous
space-time evolution of the transition to agropastoralism in Europe. GLUES, in
contrast to models that do not resolve endogenous sociocultural dynamics, also
describes and explains how and why the Neolithic advanced in stages. In the
model analysis, we uncouple the mechanisms of migration and information
exchange. We find that (1) an indigenous form of agropastoralism could well
have arisen in certain Mediterranean landscapes, but not in Northern and
Central Europe, where it depended on imported technology and material, (2) both
demic diffusion by migration or cultural diffusion by trade may explain the
western European transition equally well, (3) [...]
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2011 11:15:04 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Aug 2011 08:14:41 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Lemmen",
"Carsten",
""
],
[
"Gronenborn",
"Detlef",
""
],
[
"Wirtz",
"Kai W.",
""
]
] |
new_dataset
| 0.997915 |
1107.2221
|
Fedor Fomin
|
Fedor V. Fomin and Daniel Lokshtanov and Saket Saurabh
|
Bidimensionality and Geometric Graphs
| null | null | null | null |
cs.DS cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we use several of the key ideas from Bidimensionality to give a
new generic approach to design EPTASs and subexponential time parameterized
algorithms for problems on classes of graphs which are not minor closed, but
instead exhibit a geometric structure. In particular we present EPTASs and
subexponential time parameterized algorithms for Feedback Vertex Set, Vertex
Cover, Connected Vertex Cover, Diamond Hitting Set, on map graphs and unit disk
graphs, and for Cycle Packing and Minimum-Vertex Feedback Edge Set on unit disk
graphs. Our results are based on the recent decomposition theorems proved by
Fomin et al [SODA 2011], and our algorithms work directly on the input graph.
Thus it is not necessary to compute the geometric representations of the input
graph. To the best of our knowledge, these results are previously unknown, with
the exception of the EPTAS and a subexponential time parameterized algorithm on
unit disk graphs for Vertex Cover, which were obtained by Marx [ESA 2005] and
Alber and Fiala [J. Algorithms 2004], respectively.
We proceed to show that our approach can not be extended in its full
generality to more general classes of geometric graphs, such as intersection
graphs of unit balls in R^d, d >= 3. Specifically we prove that Feedback Vertex
Set on unit-ball graphs in R^3 neither admits PTASs unless P=NP, nor
subexponential time algorithms unless the Exponential Time Hypothesis fails.
Additionally, we show that the decomposition theorems which our approach is
based on fail for disk graphs and that therefore any extension of our results
to disk graphs would require new algorithmic ideas. On the other hand, we prove
that our EPTASs and subexponential time algorithms for Vertex Cover and
Connected Vertex Cover carry over both to disk graphs and to unit-ball graphs
in R^d for every fixed d.
|
[
{
"version": "v1",
"created": "Tue, 12 Jul 2011 09:16:54 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Nov 2011 18:03:50 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Fomin",
"Fedor V.",
""
],
[
"Lokshtanov",
"Daniel",
""
],
[
"Saurabh",
"Saket",
""
]
] |
new_dataset
| 0.996645 |
1110.1716
|
Luis Quesada
|
Luis Quesada and Fernando Berzal and Francisco J. Cortijo
|
Treating Insomnia, Amnesia, and Acalculia in Regular Expression Matching
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regular expressions provide a flexible means for matching strings and they
are often used in data-intensive applications. They are formally equivalent to
either deterministic finite automata (DFAs) or nondeterministic finite automata
(NFAs). Both DFAs and NFAs are affected by two problems known as amnesia and
acalculia, and DFAs are also affected by a problem known as insomnia. Existing
techniques require an automata conversion and compaction step that prevents the
use of existing automaton databases and hinders the maintenance of the
resulting compact automata. In this paper, we propose Parallel Finite State
Machines (PFSMs), which are able to run any DFA- or NFA-like state machines
without a previous conversion or compaction step. PFSMs report, online, all the
matches found within an input string and they solve the three aforementioned
problems. Parallel Finite State Machines require quadratic time and linear
memory and they are distributable. Parallel Finite State Machines make very
fast distributed regular expression matching in data-intensive applications
feasible.
|
[
{
"version": "v1",
"created": "Sat, 8 Oct 2011 09:43:59 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Nov 2011 20:12:04 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Quesada",
"Luis",
""
],
[
"Berzal",
"Fernando",
""
],
[
"Cortijo",
"Francisco J.",
""
]
] |
new_dataset
| 0.961777 |
1111.1598
|
Ashwin Tumma Mr
|
Jagannath Aghav and Ashwin Tumma
|
Design and Validation of Safety Cruise Control System for Automobiles
| null | null | null | null |
cs.SE
|
http://creativecommons.org/licenses/by/3.0/
|
In light of the recent humongous growth of the human population worldwide,
there has also been a voluminous and uncontrolled growth of vehicles, which has
consequently increased the number of road accidents to a large extent. In lieu
of a solution to the above mentioned issue, our system is an attempt to
mitigate the same using synchronous programming language. The aim is to develop
a safety crash warning system that will address the rear end crashes and also
take over the controlling of the vehicle when the threat is at a very high
level. Adapting according to the environmental conditions is also a prominent
feature of the system. Safety System provides warnings to drivers to assist in
avoiding rear-end crashes with other vehicles. Initially the system provides a
low level alarm and as the severity of the threat increases the level of
warnings or alerts also rises. At the highest level of threat, the system
enters in a Cruise Control Mode, wherein the system controls the speed of the
vehicle by controlling the engine throttle and if permitted, the brake system
of the vehicle. We focus on this crash area as it has a very high percentage of
the crash-related fatalities. To prove the feasibility, robustness and
reliability of the system, we have also proved some of the properties of the
system using temporal logic along with a reference implementation in ESTEREL.
To bolster the same, we have formally verified various properties of the system
along with their proofs.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2011 14:45:06 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Aghav",
"Jagannath",
""
],
[
"Tumma",
"Ashwin",
""
]
] |
new_dataset
| 0.994849 |
1111.1644
|
Philippe Gaborit
|
Carlos Aguilar, Philippe Gaborit, Julien Schrek
|
A new zero-knowledge code based identification scheme with reduced
communication
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present a new 5-pass identification scheme with asymptotic
cheating probability 1/2 based on the syndrome decoding problem. Our protocol
is related to the Stern identification scheme but has a reduced communication
cost compared to previous code-based zero-knowledge schemes, moreover our
scheme permits to obtain a very low size of public key and secret key. The
contribution of this paper is twofold, first we propose a variation on the
Stern authentication scheme which permits to decrease asymptotically the
cheating probability to 1/2 rather than 2/3 (and very close to 1/2 in practice)
but with less communication. Our solution is based on deriving new challenges
from the secret key through cyclic shifts of the initial public key syndrome; a
new proof of soundness for this case is given Secondly we propose a new way to
deal with hashed commitments in zero-knowledge schemes based on Stern's scheme,
so that in terms of communication, on the average, only one hash value is sent
rather than two or three. Overall our new scheme has the good features of
having a zero-knowledge security proof based on well known hard problem of
coding theory, a small size of secret and public key (a few hundred bits), a
small calculation complexity, for an overall communication cost of 19kb for
authentication (for a $2^{16}$ security) and a signature of size of 93kb
(11.5kB) (for security $2^{80}$), an improvement of 40% compared to previous
schemes based on coding theory.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2011 17:02:04 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Aguilar",
"Carlos",
""
],
[
"Gaborit",
"Philippe",
""
],
[
"Schrek",
"Julien",
""
]
] |
new_dataset
| 0.995739 |
1110.6200
|
Jacob Eisenstein
|
Jacob Eisenstein, Duen Horng "Polo" Chau, Aniket Kittur, Eric P. Xing
|
TopicViz: Semantic Navigation of Document Collections
| null | null | null | null |
cs.HC cs.AI cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When people explore and manage information, they think in terms of topics and
themes. However, the software that supports information exploration sees text
at only the surface level. In this paper we show how topic modeling -- a
technique for identifying latent themes across large collections of documents
-- can support semantic exploration. We present TopicViz, an interactive
environment for information exploration. TopicViz combines traditional search
and citation-graph functionality with a range of novel interactive
visualizations, centered around a force-directed layout that links documents to
the latent themes discovered by the topic model. We describe several use
scenarios in which TopicViz supports rapid sensemaking on large document
collections.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2011 21:37:24 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Nov 2011 03:47:30 GMT"
}
] | 2011-11-07T00:00:00 |
[
[
"Eisenstein",
"Jacob",
""
],
[
"Chau",
"Duen Horng \"Polo\"",
""
],
[
"Kittur",
"Aniket",
""
],
[
"Xing",
"Eric P.",
""
]
] |
new_dataset
| 0.993509 |
1111.0705
|
Chuan Zhang
|
Chuan Zhang, Bo Yuan, and Keshab K. Parhi
|
Low-Latency SC Decoder Architectures for Polar Codes
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays polar codes are becoming one of the most favorable capacity
achieving error correction codes for their low encoding and decoding
complexity. However, due to the large code length required by practical
applications, the few existing successive cancellation (SC) decoder
implementations still suffer from not only the high hardware cost but also the
long decoding latency. This paper presents novel several approaches to design
low-latency decoders for polar codes based on look-ahead techniques. Look-ahead
techniques can be employed to reschedule the decoding process of polar decoder
in numerous approaches. However, among those approaches, only well-arranged
ones can achieve good performance in terms of both latency and hardware
complexity. By revealing the recurrence property of SC decoding chart, the
authors succeed in reducing the decoding latency by 50% with look-ahead
techniques. With the help of VLSI-DSP design techniques such as pipelining,
folding, unfolding, and parallel processing, methodologies for four different
polar decoder architectures have been proposed to meet various application
demands. Sub-structure sharing scheme has been adopted to design the merged
processing element (PE) for further hardware reduction. In addition, systematic
methods for construction refined pipelining decoder (2nd design) and the input
generating circuits (ICG) block have been given. Detailed gate-level analysis
has demonstrated that the proposed designs show latency advantages over
conventional ones with similar hardware cost.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2011 01:15:58 GMT"
}
] | 2011-11-04T00:00:00 |
[
[
"Zhang",
"Chuan",
""
],
[
"Yuan",
"Bo",
""
],
[
"Parhi",
"Keshab K.",
""
]
] |
new_dataset
| 0.951639 |
1111.0855
|
Ichrak Amdouni
|
Ichrak Amdouni (INRIA Rocquencourt), Minet Pascale (INRIA
Rocquencourt), C\'edric Adjih (INRIA Rocquencourt)
|
OSERENA, an Optimized Coloring Algorithm for Dense or Large Scale
Wireless Networks
|
No. RR-7785 (2011)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of this research report is to present OSERENA "Optimized SchEduling
RoutEr Node Activity", a distributed coloring algorithm optimized for dense
wireless networks. Network density has an extremely reduced impact on the size
of the messages exchanged to color the network. Furthermore, the number of
colors used to color the network is not impacted by this optimization. We
describe in this research report the properties of the algorithm and prove its
correctness and termination. Simulation results point out the considerable
gains in bandwidth.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2011 14:39:36 GMT"
}
] | 2011-11-04T00:00:00 |
[
[
"Amdouni",
"Ichrak",
"",
"INRIA Rocquencourt"
],
[
"Pascale",
"Minet",
"",
"INRIA\n Rocquencourt"
],
[
"Adjih",
"Cédric",
"",
"INRIA Rocquencourt"
]
] |
new_dataset
| 0.998997 |
1110.4573
|
Francis Lazarus
|
Francis Lazarus and Julien Rivaud
|
On the homotopy test on surfaces
|
33 pages, 11 figures
| null | null | null |
cs.CG cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let G be a graph cellularly embedded in a surface S. Given two closed walks c
and d in G, we take advantage of the RAM model to describe linear time
algorithms to decide if c and d are homotopic in S, either freely or with fixed
basepoint. We restrict S to be orientable for the free homotopy test, but allow
non-orientable surfaces when the basepoint is fixed. After O(|G|) time
preprocessing independent of c and d, our algorithms answer the homotopy test
in O(|c|+|d|) time, where |G|, |c| and |d| are the respective numbers of edges
of G, c and d. As a byproduct we obtain linear time algorithms for the word
problem and the conjugacy problem in surface groups. We present a geometric
approach based on previous works by Colin de Verdi\`ere and Erickson.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2011 16:30:22 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Nov 2011 09:22:42 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Lazarus",
"Francis",
""
],
[
"Rivaud",
"Julien",
""
]
] |
new_dataset
| 0.998058 |
1111.0372
|
EPTCS
|
Temesghen Kahsai (The University of Iowa), Cesare Tinelli (The
University of Iowa)
|
PKind: A parallel k-induction based model checker
|
In Proceedings PDMC 2011, arXiv:1111.0064
|
EPTCS 72, 2011, pp. 55-62
|
10.4204/EPTCS.72.6
| null |
cs.LO cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PKind is a novel parallel k-induction-based model checker of invariant
properties for finite- or infinite-state Lustre programs. Its architecture,
which is strictly message-based, is designed to minimize synchronization delays
and easily accommodate the incorporation of incremental invariant generators to
enhance basic k-induction. We describe PKind's functionality and main features,
and present experimental evidence that PKind significantly speeds up the
verification of safety properties and, due to incremental invariant generation,
also considerably increases the number of provable ones.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2011 03:04:34 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Kahsai",
"Temesghen",
"",
"The University of Iowa"
],
[
"Tinelli",
"Cesare",
"",
"The\n University of Iowa"
]
] |
new_dataset
| 0.987859 |
1111.0373
|
EPTCS
|
Nikola Bene\v{s} (FI MU), Ivana \v{C}ern\'a (FI MU), Milan
K\v{r}iv\'anek
|
CoInDiVinE: Parallel Distributed Model Checker for Component-Based
Systems
|
In Proceedings PDMC 2011, arXiv:1111.0064
|
EPTCS 72, 2011, pp. 63-67
|
10.4204/EPTCS.72.7
| null |
cs.SE cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CoInDiVinE is a tool for parallel distributed model checking of interactions
among components in hierarchical component-based systems. The tool extends the
DiVinE framework with a new input language (component-interaction automata) and
a property specification logic (CI-LTL). As the language differs from the input
language of DiVinE, our tool employs a new state space generation algorithm
that also supports partial order reduction. Experiments indicate that the tool
has good scaling properties when run in parallel setting.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2011 03:04:40 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Beneš",
"Nikola",
"",
"FI MU"
],
[
"Černá",
"Ivana",
"",
"FI MU"
],
[
"Křivánek",
"Milan",
""
]
] |
new_dataset
| 0.997009 |
1111.0374
|
EPTCS
|
Stefan Vijzelaar (VU University Amsterdam), Kees Verstoep (VU
University Amsterdam), Wan Fokkink (VU University Amsterdam), Henri Bal (VU
University Amsterdam)
|
Distributed MAP in the SpinJa Model Checker
|
In Proceedings PDMC 2011, arXiv:1111.0064
|
EPTCS 72, 2011, pp. 84-90
|
10.4204/EPTCS.72.9
| null |
cs.SE cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spin in Java (SpinJa) is an explicit state model checker for the Promela
modelling language also used by the SPIN model checker. Designed to be
extensible and reusable, the implementation of SpinJa follows a layered
approach in which each new layer extends the functionality of the previous one.
While SpinJa has preliminary support for shared-memory model checking, it did
not yet support distributed-memory model checking. This tool paper presents a
distributed implementation of a maximal accepting predecessors (MAP) search
algorithm on top of SpinJa.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2011 03:04:55 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Vijzelaar",
"Stefan",
"",
"VU University Amsterdam"
],
[
"Verstoep",
"Kees",
"",
"VU\n University Amsterdam"
],
[
"Fokkink",
"Wan",
"",
"VU University Amsterdam"
],
[
"Bal",
"Henri",
"",
"VU\n University Amsterdam"
]
] |
new_dataset
| 0.992706 |
1111.0385
|
Jaydip Sen
|
Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G.,
Harish Reddy
|
A Distributed Protocol for Detection of Packet Dropping Attack in Mobile
Ad Hoc Networks
|
7 pages, 9 figures, 1 table. In Proceedings of the International
Conference on Telecommunications and Malaysian International Conference on
Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74,
Track: 3: Ad Hoc Routing and Protocols. ISBN: 1-4244-1094-0
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each
other without using any infrastructure such as access points or base stations.
Security remains a major challenge for these networks due to their features of
open medium, dynamically changing topologies, reliance on cooperative
algorithms, absence of centralized monitoring points, and lack of clear lines
of defense. Among the various attacks to which MANETs are vulnerable, malicious
packet dropping attack is very common where a malicious node can partially
degrade or completely disrupt communication in the network by consistently
dropping packets. In this paper, a mechanism for detection of packet dropping
attack is presented based on cooperative participation of the nodes in a MANET.
The redundancy of routing information in an ad hoc network is utilized to make
the scheme robust so that it works effectively even in presence of transient
network partitioning and Byzantine failure of nodes. The proposed scheme is
fully cooperative and thus more secure as the vulnerabilities of any election
algorithm used for choosing a subset of nodes for cooperation are absent.
Simulation results show the effectiveness of the protocol.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2011 04:45:53 GMT"
}
] | 2011-11-03T00:00:00 |
[
[
"Sen",
"Jaydip",
""
],
[
"Chandra",
"M. Girish",
""
],
[
"Balamuralidhar",
"P.",
""
],
[
"G.",
"Harihara S.",
""
],
[
"Reddy",
"Harish",
""
]
] |
new_dataset
| 0.997187 |
1111.0088
|
EPTCS
|
Ranald Clouston
|
Nominal Logic with Equations Only
|
In Proceedings LFMTP 2011, arXiv:1110.6685
|
EPTCS 71, 2011, pp. 44-57
|
10.4204/EPTCS.71.4
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many formal systems, particularly in computer science, may be captured by
equations modulated by side conditions asserting the "freshness of names";
these can be reasoned about with Nominal Equational Logic (NEL). Like most
logics of this sort NEL employs this notion of freshness as a first class
logical connective. However, this can become inconvenient when attempting to
translate results from standard equational logic to the nominal setting. This
paper presents proof rules for a logic whose only connectives are equations,
which we call Nominal Equation-only Logic (NEoL). We prove that NEoL is just as
expressive as NEL. We then give a simple description of equality in the empty
NEoL-theory, then extend that result to describe freshness in the empty
NEL-theory.
|
[
{
"version": "v1",
"created": "Tue, 1 Nov 2011 00:18:17 GMT"
}
] | 2011-11-02T00:00:00 |
[
[
"Clouston",
"Ranald",
""
]
] |
new_dataset
| 0.99905 |
1109.2641
|
Christian Sommer
|
Christian Sommer
|
More Compact Oracles for Approximate Distances in Planar Graphs
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distance oracles are data structures that provide fast (possibly approximate)
answers to shortest-path and distance queries in graphs. The tradeoff between
the space requirements and the query time of distance oracles is of particular
interest and the main focus of this paper.
In FOCS'01, Thorup introduced approximate distance oracles for planar graphs.
He proved that, for any eps>0 and for any planar graph on n nodes, there exists
a (1+eps)-approximate distance oracle using space O(n eps^{-1} log n) such that
approximate distance queries can be answered in time O(1/eps).
Ten years later, we give the first improvements on the space-querytime
tradeoff for planar graphs.
* We give the first oracle having a space-time product with subquadratic
dependency on 1/eps. For space ~O(n log n) we obtain query time ~O(1/eps)
(assuming polynomial edge weights). The space shows a doubly logarithmic
dependency on 1/eps only. We believe that the dependency on eps may be almost
optimal.
* For the case of moderate edge weights (average bounded by polylog(n), which
appears to be the case for many real-world road networks), we hit a "sweet
spot," improving upon Thorup's oracle both in terms of eps and n. Our oracle
uses space ~O(n log log n) and it has query time ~O(log log log n + 1/eps).
(Asymptotic notation in this abstract hides low-degree polynomials in
log(1/eps) and log*(n).)
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2011 22:17:33 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Oct 2011 22:38:46 GMT"
}
] | 2011-11-01T00:00:00 |
[
[
"Sommer",
"Christian",
""
]
] |
new_dataset
| 0.976035 |
1109.5779
|
Chinmay Vaze
|
Chinmay S. Vaze and Mahesh K. Varanasi
|
The Degrees of Freedom Region of the MIMO Interference Channel with
Shannon Feedback
|
30 pages, 3 tables, 9 figures. This paper was submitted to the IEEE
Trans. Inform. Th. Oct. 2011. It was presented in part at the 49th Annual
Allerton Conference on Communications, Control and Computing in Sept. 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The two-user multiple-input multiple-output (MIMO) fast-fading interference
channel (IC) with an arbitrary number of antennas at each of the four terminals
is studied under the settings of Shannon feedback, limited Shannon feedback,
and output feedback, wherein all or certain channel matrices and outputs, or
just the channel outputs, respectively, are available to the transmitters with
a finite delay. While for most numbers of antennas at the four terminals, it is
shown that the DoF regions with Shannon feedback and for the limited Shannon
feedback settings considered here are identical, and equal to the DoF region
with just delayed channel state information (CSIT), it is shown that this is
not always the case. For a specific class of MIMO ICs characterized by a
certain relationship between the numbers of antennas at the four nodes, the DoF
regions with Shannon and the limited Shannon feedback settings, while again
being identical, are strictly bigger than the DoF region with just delayed
CSIT. To realize these DoF gains with Shannon or limited Shannon feedback, a
new retrospective interference alignment scheme is developed wherein
transmitter cooperation made possible by output feedback in addition to delayed
CSIT is employed to effect a more efficient form of interference alignment than
is feasible with previously known schemes that use just delayed CSIT. The DoF
region for just output feedback, in which each transmitter has delayed
knowledge of only the receivers' outputs, is also obtained for all but a class
of MIMO ICs that satisfy one of two inequalities involving the numbers of
antennas.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2011 05:58:27 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Oct 2011 18:43:54 GMT"
}
] | 2011-11-01T00:00:00 |
[
[
"Vaze",
"Chinmay S.",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
] |
new_dataset
| 0.986352 |
1110.6590
|
Amir Shpilka
|
Amir Shpilka
|
New constructions of WOM codes using the Wozencraft ensemble
|
19 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we give several new constructions of WOM codes. The novelty in
our constructions is the use of the so called Wozencraft ensemble of linear
codes. Specifically, we obtain the following results.
We give an explicit construction of a two-write Write-Once-Memory (WOM for
short) code that approaches capacity, over the binary alphabet. More formally,
for every \epsilon>0, 0<p<1 and n =(1/\epsilon)^{O(1/p\epsilon)} we give a
construction of a two-write WOM code of length n and capacity
H(p)+1-p-\epsilon. Since the capacity of a two-write WOM code is max_p
(H(p)+1-p), we get a code that is \epsilon-close to capacity. Furthermore,
encoding and decoding can be done in time O(n^2.poly(log n)) and time
O(n.poly(log n)), respectively, and in logarithmic space.
We obtain a new encoding scheme for 3-write WOM codes over the binary
alphabet. Our scheme achieves rate 1.809-\epsilon, when the block length is
exp(1/\epsilon). This gives a better rate than what could be achieved using
previous techniques.
We highlight a connection to linear seeded extractors for bit-fixing sources.
In particular we show that obtaining such an extractor with seed length O(log
n) can lead to improved parameters for 2-write WOM codes. We then give an
application of existing constructions of extractors to the problem of designing
encoding schemes for memory with defects.
|
[
{
"version": "v1",
"created": "Sun, 30 Oct 2011 09:40:26 GMT"
}
] | 2011-11-01T00:00:00 |
[
[
"Shpilka",
"Amir",
""
]
] |
new_dataset
| 0.98348 |
1110.6010
|
Rafayel Kamalian
|
Rafayel Kamalian, Arpine Khachatryan
|
On a property of the $n$-dimensional cube
|
2 pages, no figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that in any subset of the vertices of $n$-dimensional cube that
contains at least $2^{n-1}+1$ vertices ($n\geq 4$), there are four vertices
that induce a claw, or there are eight vertices that induce the cycle of length
eight.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2011 08:31:27 GMT"
}
] | 2011-10-28T00:00:00 |
[
[
"Kamalian",
"Rafayel",
""
],
[
"Khachatryan",
"Arpine",
""
]
] |
new_dataset
| 0.999005 |
1110.6143
|
Louis D'Alotto
|
Louis D'Alotto
|
Cellular Automata Using Infinite Computations
|
Paper Accepted for Publication in Applied Mathematics and
Computation, Elsevier
| null | null | null |
cs.DM math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an application of the Infinite Unit Axiom, introduced by
Yaroslav Sergeyev, (see [11] - [14]) to the development of one-dimensional
cellular automata. This application allows the establishment of a new and more
precise metric on the space of definition for one-dimensional cellular
automata, whereby accuracy of computations is increased. Using this new metric,
open disks are defined and the number of points in each disk is computed. The
forward dynamics of a cellular automaton map are also studied via defined
equivalence classes. Using the Infinite Unit Axiom, the number of
configurations that stay close to a given configuration under the shift
automaton map can now be computed.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2011 17:37:32 GMT"
}
] | 2011-10-28T00:00:00 |
[
[
"D'Alotto",
"Louis",
""
]
] |
new_dataset
| 0.970449 |
1107.4057
|
Nick Mehrdad Loghmani
|
Nick Mehrdad Loghmani
|
The Harmonic Theory; A mathematical framework to build intelligent
contextual and adaptive computing, cognition and sensory system
|
16 pages, 8 figures
| null | null | null |
cs.AI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Harmonic theory provides a mathematical framework to describe the structure,
behavior, evolution and emergence of harmonic systems. A harmonic system is
context aware, contains elements that manifest characteristics either
collaboratively or independently according to system's expression and can
interact with its environment. This theory provides a fresh way to analyze
emergence and collaboration of "ad-hoc" and complex systems.
|
[
{
"version": "v1",
"created": "Wed, 20 Jul 2011 18:25:55 GMT"
}
] | 2011-10-27T00:00:00 |
[
[
"Loghmani",
"Nick Mehrdad",
""
]
] |
new_dataset
| 0.997118 |
1110.5762
|
Serge Kernbach
|
Serge Kernbach
|
Swarmrobot.org - Open-hardware Microrobotic Project for Large-scale
Artificial Swarms
| null | null | null | null |
cs.RO cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The purpose of this paper is to give an overview of the open-hardware
microrobotic project swarmrobot.org and the platform Jasmine for building
large-scale artificial swarms. The project targets an open development of
cost-effective hardware and software for a quick implementation of swarm
behavior with real robots. Detailed instructions for making the robot,
open-source simulator, software libraries and multiple publications about
performed experiments are ready for download and intend to facilitate
exploration of collective and emergent phenomena, guided self-organization and
swarm robotics in experimental way.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2011 10:37:09 GMT"
}
] | 2011-10-27T00:00:00 |
[
[
"Kernbach",
"Serge",
""
]
] |
new_dataset
| 0.998891 |
1110.5832
|
Ringo Baumann
|
Ringo Baumann and Heinrich Herre
|
The Axiomatic Foundation of Space in GFO
|
36 pages, 18 figures, submitted to "Applied Ontology"
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Space and time are basic categories of any top-level ontology. They are
fundamental assumptions for the mode of existence of those individuals which
are said to be in space and time. In the present paper the ontology of space in
the General Formal Ontology (GFO) is expounded. This ontology is represented as
a theory BT (Brentano Theory), which is specified by a set of axioms formalized
in first-order logic. This theory uses four primitive relations: SReg(x) (x is
space region), spart(x, y) (x is spatial part of y), sb(x, y) (x is spatial
boundary of y), and scoinc(x, y) (x and y spatially coincide). This ontology is
inspired by ideas of Franz Brentano. The investigation and exploration of Franz
Brentano's ideas on space and time began about twenty years ago by work of R.M.
Chisholm, B. Smith and A. Varzi. The present paper takes up this line of
research and makes a further step in establishing an ontology of space which is
based on rigorous logical methods and on principles of the new philosophical
approach of integrative realism.
|
[
{
"version": "v1",
"created": "Fri, 23 Sep 2011 07:22:16 GMT"
}
] | 2011-10-27T00:00:00 |
[
[
"Baumann",
"Ringo",
""
],
[
"Herre",
"Heinrich",
""
]
] |
new_dataset
| 0.961643 |
1110.5867
|
Nachum Dershowitz
|
Nachum Dershowitz and Alexander Nadel
|
From Total Assignment Enumeration to Modern SAT Solver
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new framework for presenting and analyzing the functionality of a modern
DLL-based SAT solver is proposed. Our approach exploits the inherent relation
between backtracking and resolution. We show how to derive the algorithm of a
modern SAT solver from DLL step-by-step. We analyze the inference power of
Boolean Constraint Propagation, Non-Chronological Backtracking and 1UIP-based
Conflict-Directed Backjumping. Our work can serve as an introduction to a
modern SAT solver functionality and as a basis for future work on the inference
power of a modern SAT solver and on practical SAT solver design.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2011 18:23:56 GMT"
}
] | 2011-10-27T00:00:00 |
[
[
"Dershowitz",
"Nachum",
""
],
[
"Nadel",
"Alexander",
""
]
] |
new_dataset
| 0.989379 |
1009.5037
|
Ashwinkumar B. V.
|
B.V. Ashwinkumar
|
Buyback Problem - Approximate matroid intersection with cancellation
costs
| null |
ICALP'11 Lecture Notes in Computer Science, 2011, Volume
6755/2011, 379-390
|
10.1007/978-3-642-22006-7_32
| null |
cs.GT cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the buyback problem, an algorithm observes a sequence of bids and must
decide whether to accept each bid at the moment it arrives, subject to some
constraints on the set of accepted bids. Decisions to reject bids are
irrevocable, whereas decisions to accept bids may be canceled at a cost that is
a fixed fraction of the bid value. Previous to our work, deterministic and
randomized algorithms were known when the constraint is a matroid constraint.
We extend this and give a deterministic algorithm for the case when the
constraint is an intersection of $k$ matroid constraints. We further prove a
matching lower bound on the competitive ratio for this problem and extend our
results to arbitrary downward closed set systems. This problem has applications
to banner advertisement, semi-streaming, routing, load balancing and other
problems where preemption or cancellation of previous allocations is allowed.
|
[
{
"version": "v1",
"created": "Sat, 25 Sep 2010 22:05:09 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Sep 2010 05:59:45 GMT"
}
] | 2011-10-26T00:00:00 |
[
[
"Ashwinkumar",
"B. V.",
""
]
] |
new_dataset
| 0.999543 |
1106.2886
|
Lawrence Ong
|
Lawrence Ong, Roy Timo, Gottfried Lechner, Sarah J. Johnson, and
Christopher M. Kellett
|
The Finite Field Multi-Way Relay Channel with Correlated Sources: The
Three-User Case
|
to be presented at ISIT 2011
|
Proceedings of the 2011 IEEE International Symposium on
Information Theory (ISIT 2011), Saint Petersburg, Russia, pp. 2238-2242, July
31-Aug. 5, 2011
|
10.1109/ISIT.2011.6033958
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The three-user finite field multi-way relay channel with correlated sources
is considered. The three users generate possibly correlated messages, and each
user is to transmit its message to the two other users reliably in the Shannon
sense. As there is no direct link among the users, communication is carried out
via a relay, and the link from the users to the relay and those from the relay
to the users are finite field adder channels with additive noise of arbitrary
distribution. The problem is to determine the set of all possible achievable
rates, defined as channel uses per source symbol for reliable communication.
For two classes of source/channel combinations, the solution is obtained using
Slepian-Wolf source coding combined with functional-decode-forward channel
coding.
|
[
{
"version": "v1",
"created": "Wed, 15 Jun 2011 06:32:28 GMT"
}
] | 2011-10-26T00:00:00 |
[
[
"Ong",
"Lawrence",
""
],
[
"Timo",
"Roy",
""
],
[
"Lechner",
"Gottfried",
""
],
[
"Johnson",
"Sarah J.",
""
],
[
"Kellett",
"Christopher M.",
""
]
] |
new_dataset
| 0.993348 |
1110.5015
|
Alex Bronstein
|
Alexander M. Bronstein
|
Spectral descriptors for deformable shapes
|
Preprint
| null | null | null |
cs.CV cs.CG cs.GR math.DG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Informative and discriminative feature descriptors play a fundamental role in
deformable shape analysis. For example, they have been successfully employed in
correspondence, registration, and retrieval tasks. In the recent years,
significant attention has been devoted to descriptors obtained from the
spectral decomposition of the Laplace-Beltrami operator associated with the
shape. Notable examples in this family are the heat kernel signature (HKS) and
the wave kernel signature (WKS). Laplacian-based descriptors achieve
state-of-the-art performance in numerous shape analysis tasks; they are
computationally efficient, isometry-invariant by construction, and can
gracefully cope with a variety of transformations. In this paper, we formulate
a generic family of parametric spectral descriptors. We argue that in order to
be optimal for a specific task, the descriptor should take into account the
statistics of the corpus of shapes to which it is applied (the "signal") and
those of the class of transformations to which it is made insensitive (the
"noise"). While such statistics are hard to model axiomatically, they can be
learned from examples. Following the spirit of the Wiener filter in signal
processing, we show a learning scheme for the construction of optimal spectral
descriptors and relate it to Mahalanobis metric learning. The superiority of
the proposed approach is demonstrated on the SHREC'10 benchmark.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2011 04:26:03 GMT"
}
] | 2011-10-25T00:00:00 |
[
[
"Bronstein",
"Alexander M.",
""
]
] |
new_dataset
| 0.969888 |
1109.6442
|
Ankit Chaudhary
|
Ankit Chaudhary, Jagdish L. Raheja
|
ABHIVYAKTI: A Vision Based Intelligent System for Elder and Sick Persons
|
Proceedings of 3rd IEEE International Conference on Machine Vision,
Hong Kong, ICMV 2010
(http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=18047),
28-30 Dec, 2010, pp. 361-364
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes an intelligent system ABHIVYAKTI, which would be
pervasive in nature and based on the Computer Vision. It would be very easy in
use and deployment. Elder and sick people who are not able to talk or walk,
they are dependent on other human beings and need continuous monitoring, while
our system provides flexibility to the sick or elder person to announce his or
her need to their caretaker by just showing a particular gesture with the
developed system, if the caretaker is not nearby. This system will use
fingertip detection techniques for acquiring gesture and Artificial Neural
Networks (ANNs) will be used for gesture recognition.
|
[
{
"version": "v1",
"created": "Thu, 29 Sep 2011 08:59:29 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Oct 2011 08:32:23 GMT"
}
] | 2011-10-24T00:00:00 |
[
[
"Chaudhary",
"Ankit",
""
],
[
"Raheja",
"Jagdish L.",
""
]
] |
new_dataset
| 0.976026 |
1110.4671
|
EPTCS
|
John R. Cowles (University of Wyoming), Ruben Gamboa (University of
Wyoming)
|
Verifying Sierpi\'nski and Riesel Numbers in ACL2
|
In Proceedings ACL2 2011, arXiv:1110.4473
|
EPTCS 70, 2011, pp. 20-27
|
10.4204/EPTCS.70.2
| null |
cs.DM cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Sierpinski number is an odd positive integer, k, such that no positive
integer of the form k * 2^n + 1 is prime. Similar to a Sierpinski number, a
Riesel number is an odd positive integer, k, such that no positive integer of
the form k * 2^n + 1 is prime. A cover for such a k is a finite list of
positive integers such that each integer j of the appropriate form has a
factor, d, in the cover, with 1 < d < j. Given a k and its cover, ACL2 is used
to systematically verify that each integer of the given form has a non-trivial
factor in the cover.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2011 00:45:23 GMT"
}
] | 2011-10-24T00:00:00 |
[
[
"Cowles",
"John R.",
"",
"University of Wyoming"
],
[
"Gamboa",
"Ruben",
"",
"University of\n Wyoming"
]
] |
new_dataset
| 0.999672 |
1110.4473
|
EPTCS
|
David Hardin (Rockwell Collins), Julien Schmaltz (Open University of
the Netherlands)
|
Proceedings 10th International Workshop on the ACL2 Theorem Prover and
its Applications
| null |
EPTCS 70, 2011
|
10.4204/EPTCS.70
| null |
cs.LO cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of ACL2 2011, the International Workshop
on the ACL2 Theorem Prover and its Applications. The workshop was held in
Austin, Texas, USA, on November 3-4 2011. ACL2 2011 is the tenth in a series of
workshops on the ACL2 Theorem Prover and its Applications. The workshop was
co-located with the eleventh Conference on Formal Methods in Computer Aided
Design (FMCAD'11). The ACL2 Workshop series provide a major technical forum for
researchers to present and discuss improvements and extensions to the theorem
prover, comparisons of ACL2 with other systems, and applications of ACL2 in
formal verification or formalized mathematics. Workshops have been held at
approxiamately 18 month intervals since 1999. ACL2 is the most recent
incarnation of the Boyer-Moore family of theorem provers, for which, Robert
Boyer, Matt Kaufmann and J Strother Moore received the 2005 ACM Software System
Award. It is state-of-the-art automated reasoning system that has been
successfully used in academia, government and industry for specification and
verification of computing systems. More details can be found in the proceedings
and on the workshop web page (www.cs.ru.nl/~julien/acl2-11/).
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2011 08:48:32 GMT"
}
] | 2011-10-21T00:00:00 |
[
[
"Hardin",
"David",
"",
"Rockwell Collins"
],
[
"Schmaltz",
"Julien",
"",
"Open University of\n the Netherlands"
]
] |
new_dataset
| 0.989619 |
1110.4136
|
Shuo Tan M.A.
|
Shuo Tan
|
The non-abelian squares are not context-free
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Answering a recent question of Crochemore, we prove that the language of
words that are not abelian squares is not context-free.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2011 22:18:45 GMT"
}
] | 2011-10-20T00:00:00 |
[
[
"Tan",
"Shuo",
""
]
] |
new_dataset
| 0.99896 |
1110.4159
|
EPTCS
|
Marco Carbone (IT University of Copenhagen), Davide Grohmann (IT
University of Copenhagen), Thomas T. Hildebrandt (IT University of
Copenhagen), Hugo A. L\'opez (IT University of Copenhagen)
|
A Logic for Choreographies
|
In Proceedings PLACES 2010, arXiv:1110.3853
|
EPTCS 69, 2011, pp. 29-43
|
10.4204/EPTCS.69.3
| null |
cs.PL cs.DC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore logical reasoning for the global calculus, a coordination model
based on the notion of choreography, with the aim to provide a methodology for
specification and verification of structured communications. Starting with an
extension of Hennessy-Milner logic, we present the global logic (GL), a modal
logic describing possible interactions among participants in a choreography. We
illustrate its use by giving examples of properties on service specifications.
Finally, we show that, despite GL is undecidable, there is a significant
decidable fragment which we provide with a sound and complete proof system for
checking validity of formulae.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2011 02:25:48 GMT"
}
] | 2011-10-20T00:00:00 |
[
[
"Carbone",
"Marco",
"",
"IT University of Copenhagen"
],
[
"Grohmann",
"Davide",
"",
"IT\n University of Copenhagen"
],
[
"Hildebrandt",
"Thomas T.",
"",
"IT University of\n Copenhagen"
],
[
"López",
"Hugo A.",
"",
"IT University of Copenhagen"
]
] |
new_dataset
| 0.99879 |
1110.4248
|
Luojie Xiang
|
Luojie Xiang
|
Ideogram Based Chinese Sentiment Word Orientation Computation
|
4 pages, 3 figures, accepted by CET 2011
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper presents a novel algorithm to compute sentiment orientation of
Chinese sentiment word. The algorithm uses ideograms which are a distinguishing
feature of Chinese language. The proposed algorithm can be applied to any
sentiment classification scheme. To compute a word's sentiment orientation
using the proposed algorithm, only the word itself and a precomputed character
ontology is required, rather than a corpus. The influence of three parameters
over the algorithm performance is analyzed and verified by experiment.
Experiment also shows that proposed algorithm achieves an F Measure of 85.02%
outperforming existing ideogram based algorithm.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2011 11:45:16 GMT"
}
] | 2011-10-20T00:00:00 |
[
[
"Xiang",
"Luojie",
""
]
] |
new_dataset
| 0.991941 |
1110.3844
|
Wazir Zada Khan
|
Wazir Zada Khan, Mohammed Y. Aalsalem and Yang Xiang
|
A Graphical Password Based System for Small Mobile Devices
|
10 Pages, 7 figures, 1 Table
|
IJCSI International Journal of Computer Science Issues, Vol. 8,
Issue 5, No 2, 2011, 145-154
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Passwords provide security mechanism for authentication and protection
services against unwanted access to resources. A graphical based password is
one promising alternatives of textual passwords. According to human psychology,
humans are able to remember pictures easily. In this paper, we have proposed a
new hybrid graphical password based system, which is a combination of
recognition and recall based techniques that offers many advantages over the
existing systems and may be more convenient for the user. Our scheme is
resistant to shoulder surfing attack and many other attacks on graphical
passwords. This scheme is proposed for smart mobile devices (like smart phones
i.e. ipod, iphone, PDAs etc) which are more handy and convenient to use than
traditional desktop computer systems.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2011 22:56:08 GMT"
}
] | 2011-10-19T00:00:00 |
[
[
"Khan",
"Wazir Zada",
""
],
[
"Aalsalem",
"Mohammed Y.",
""
],
[
"Xiang",
"Yang",
""
]
] |
new_dataset
| 0.998304 |
1110.3197
|
Zhang Shengli
|
Shengli Zhang, Soung-Chang Liew, Qingfeng Zhou, Lu Lu, Hui Wang
|
Non-memoryless Analog Network Coding in Two-Way Relay Channel
|
ICC 2011
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Physical-layer Network Coding (PNC) can significantly improve the throughput
of two-way relay channels. An interesting variant of PNC is Analog Network
Coding (ANC). Almost all ANC schemes proposed to date, however, operate in a
symbol by symbol manner (memoryless) and cannot exploit the redundant
information in channel-coded packets to enhance performance. This paper
proposes a non-memoryless ANC scheme. In particular, we design a soft-input
soft-output decoder for the relay node to process the superimposed packets from
the two end nodes to yield an estimated MMSE packet for forwarding back to the
end nodes. Our decoder takes into account the correlation among different
symbols in the packets due to channel coding, and provides significantly
improved MSE performance. Our analysis shows that the SNR improvement at the
relay node is lower bounded by 1/R (R is the code rate) with the simplest LDPC
code (repeat code). The SNR improvement is also verified by numerical
simulation with LDPC code. Our results indicate that LDPC codes of different
degrees are preferred in different SNR regions. Generally speaking, smaller
degrees are preferred for lower SNRs.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2011 13:10:39 GMT"
}
] | 2011-10-17T00:00:00 |
[
[
"Zhang",
"Shengli",
""
],
[
"Liew",
"Soung-Chang",
""
],
[
"Zhou",
"Qingfeng",
""
],
[
"Lu",
"Lu",
""
],
[
"Wang",
"Hui",
""
]
] |
new_dataset
| 0.999156 |
1110.2849
|
Karthick Jayaraman
|
Karthick Jayaraman, Vijay Ganesh, Mahesh Tripunitara, Martin C Rinard,
Steve J. Chapin
|
ARBAC Policy for a Large Multi-National Bank
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Administrative role-based access control (ARBAC) is the first comprehensive
administrative model proposed for role-based access control (RBAC). ARBAC has
several features for designing highly expressive policies, but current work has
not highlighted the utility of these expressive policies. In this report, we
present a case study of designing an ARBAC policy for a bank comprising 18
branches. Using this case study we provide an assessment about the features of
ARBAC that are likely to be used in realistic policies.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2011 07:13:11 GMT"
}
] | 2011-10-14T00:00:00 |
[
[
"Jayaraman",
"Karthick",
""
],
[
"Ganesh",
"Vijay",
""
],
[
"Tripunitara",
"Mahesh",
""
],
[
"Rinard",
"Martin C",
""
],
[
"Chapin",
"Steve J.",
""
]
] |
new_dataset
| 0.991992 |
1110.2646
|
Jose Texier
|
Jose Texier
|
Notas metodol\'ogicas para cubrir la etapa de documentar una
investigaci\'on
|
Trabajo final del curso.
http://sedici.unlp.edu.ar/search/request.php?id_document=ARG-UNLP-PAC-0000000043
| null | null | null |
cs.DL
|
http://creativecommons.org/licenses/by/3.0/
|
The search process of scientific articles (papers) and review articles
(reviews) is one of the pillars of the scientific world, and is performed by
people in the research as well as for people who want to keep abreast specific
topics. Scopus (there are other databases) or Google Scholar are proposed
options to find articles, but is recommended by Scopus its extensive database
and its versatility in the search options it offers. This paper proposes is a
plan that allows a systematic search and keep the items in an orderly,
consistent and coherent within own repository for cataloging and consultation,
which will serve for many tasks to establish the state of the art of a topic,
staff training in an area and/or writing articles, among others.
|
[
{
"version": "v1",
"created": "Wed, 12 Oct 2011 13:03:44 GMT"
}
] | 2011-10-13T00:00:00 |
[
[
"Texier",
"Jose",
""
]
] |
new_dataset
| 0.984664 |
1109.3989
|
J\"org P\"uhrer
|
Johannes Oetsch and J\"org P\"uhrer and Hans Tompits
|
The SeaLion has Landed: An IDE for Answer-Set Programming---Preliminary
Report
|
Proceedings of the 19th International Conference on Applications of
Declarative Programming and Knowledge Management (INAP 2011) and 25th
Workshop on Logic Programming (WLP 2011)
| null | null | null |
cs.PL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report about the current state and designated features of the tool
SeaLion, aimed to serve as an integrated development environment (IDE) for
answer-set programming (ASP). A main goal of SeaLion is to provide a
user-friendly environment for supporting a developer to write, evaluate, debug,
and test answer-set programs. To this end, new support techniques have to be
developed that suit the requirements of the answer-set semantics and meet the
constraints of practical applicability. In this respect, SeaLion benefits from
the research results of a project on methods and methodologies for answer-set
program development in whose context SeaLion is realised. Currently, the tool
provides source-code editors for the languages of Gringo and DLV that offer
syntax highlighting, syntax checking, and a visual program outline. Further
implemented features are support for external solvers and visualisation as well
as visual editing of answer sets. SeaLion comes as a plugin of the popular
Eclipse platform and provides itself interfaces for future extensions of the
IDE.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2011 10:24:28 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Oct 2011 10:03:44 GMT"
}
] | 2011-10-12T00:00:00 |
[
[
"Oetsch",
"Johannes",
""
],
[
"Pührer",
"Jörg",
""
],
[
"Tompits",
"Hans",
""
]
] |
new_dataset
| 0.975858 |
1110.2215
|
R. J. Evans
|
R. J. Evans, C. Orasan
|
NP Animacy Identification for Anaphora Resolution
| null |
Journal Of Artificial Intelligence Research, Volume 29, pages
79-103, 2007
|
10.1613/jair.2179
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In anaphora resolution for English, animacy identification can play an
integral role in the application of agreement restrictions between pronouns and
candidates, and as a result, can improve the accuracy of anaphora resolution
systems. In this paper, two methods for animacy identification are proposed and
evaluated using intrinsic and extrinsic measures. The first method is a
rule-based one which uses information about the unique beginners in WordNet to
classify NPs on the basis of their animacy. The second method relies on a
machine learning algorithm which exploits a WordNet enriched with animacy
information for each sense. The effect of word sense disambiguation on the two
methods is also assessed. The intrinsic evaluation reveals that the machine
learning method reaches human levels of performance. The extrinsic evaluation
demonstrates that animacy identification can be beneficial in anaphora
resolution, especially in the cases where animate entities are identified with
high precision.
|
[
{
"version": "v1",
"created": "Mon, 10 Oct 2011 22:13:24 GMT"
}
] | 2011-10-12T00:00:00 |
[
[
"Evans",
"R. J.",
""
],
[
"Orasan",
"C.",
""
]
] |
new_dataset
| 0.996814 |
1110.2317
|
Ian Pratt-Hartmann
|
Ian Pratt-Hartmann
|
The Syllogistic with Unity
| null | null | null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We extend the language of the classical syllogisms with the sentence-forms
"At most 1 p is a q" and "More than 1 p is a q". We show that the resulting
logic does not admit a finite set of syllogism-like rules whose associated
derivation relation is sound and complete, even when reductio ad absurdum is
allowed.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2011 10:10:21 GMT"
}
] | 2011-10-12T00:00:00 |
[
[
"Pratt-Hartmann",
"Ian",
""
]
] |
new_dataset
| 0.995095 |
1110.1767
|
Samira Mesmoudi Mrs
|
Samira Mesmoudi and Mohammed Feham
|
BSK-WBSN: Biometric Symmetric Keys to Secure Wireless Body Sensors
Networks
|
12 pages; International Journal of Network Security & Its
Applications (IJNSA), Vol.3, No.5, Sep 2011
| null |
10.5121/ijnsa.2011.3512
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Wireless Sensors Network (WSN) is an emergent technology resulting from
progress of various fields. Many applications of networks WSN are born. One of
the applications which have an operational effectiveness relates to the field
of health and allows a medical remote support. Miniature wireless sensors,
strategically placed on the human body, create a Wireless Body Sensor Network
(WBSN) which allows supervising various essential biological signals (rate of
heartbeat, pressure, etc). The sensitivity of medical information requires
mechanisms of safety. This performance constitutes a challenge for WBSN because
of their limitation in resources energy and data-processing. In this paper we
propose a new approach to symmetric cryptographic key establishment, based on
biometrics physiology. This approach takes into account WBSN constraints and
its topology.
|
[
{
"version": "v1",
"created": "Sat, 8 Oct 2011 21:02:32 GMT"
}
] | 2011-10-11T00:00:00 |
[
[
"Mesmoudi",
"Samira",
""
],
[
"Feham",
"Mohammed",
""
]
] |
new_dataset
| 0.999239 |
1110.1488
|
A S N Chakravarthy ASN CHAKRAVARTHY
|
A. S. N. Chakravarthy, Penmetsa V. Krishna Raja, P. S. Avadhani
|
Handwritten Text Image Authentication using Back Propagation
|
10 pages pdf file
|
International Journal of Network Security & Its Applications
(IJNSA), Vol.3, No.5, Sep 2011
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Authentication is the act of confirming the truth of an attribute of a datum
or entity. This might involve confirming the identity of a person, tracing the
origins of an artefact, ensuring that a product is what it's packaging and
labelling claims to be, or assuring that a computer program is a trusted one.
The authentication of information can pose special problems (especially
man-in-the-middle attacks), and is often wrapped up with authenticating
identity. Literary can involve imitating the style of a famous author. If an
original manuscript, typewritten text, or recording is available, then the
medium itself (or its packaging - anything from a box to e-mail headers) can
help prove or disprove the authenticity of the document. The use of digital
images of handwritten historical documents has become more popular in recent
years. Volunteers around the world now read thousands of these images as part
of their indexing process. Handwritten text images of old documents are
sometimes difficult to read or noisy due to the preservation of the document
and quality of the image [1]. Handwritten text offers challenges that are
rarely encountered in machine-printed text. In addition, most problems faced in
reading machine- printed text (e.g., character recognition, word segmentation,
letter segmentation, etc.) are more severe, in handwritten text. In this paper
we Here in this paper we proposed a method for authenticating hand written text
images using back propagation algorithm..
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 11:40:18 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Chakravarthy",
"A. S. N.",
""
],
[
"Raja",
"Penmetsa V. Krishna",
""
],
[
"Avadhani",
"P. S.",
""
]
] |
new_dataset
| 0.972185 |
1110.1498
|
A S N Chakravarthy ASN CHAKRAVARTHY
|
Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani
|
A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode
|
six pages; International Journal of Mathematics Trends and
Technology- July to Aug Issue 2011
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across
insecure networks so that it cannot be read by anyone except the intended
recipient. While cryptography is the science of securing data, cryptanalysis is
the science of analyzing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical reasoning,
application of mathematical tools and pattern finding. The objectives of the
proposed work are to propose a new cryptographic method based on the special
matrix called the Hilbert matrix for authentication and confidentiality and to
propose a model for confidentiality and authentication using a combination of
symmetric and public cryptosystems. Further, it is extended to shared key
cryptosystems with the concept of digital enveloping using a session key. In
the present work an algorithm for shared key encryption is developed using
Hilbert matrix cryptosystem. In this the block chaining modes of operation have
been used to tackle the issues of confusion and diffusion.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 11:59:43 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Raja",
"Penmetsa V. Krishna",
""
],
[
"Chakravarthy",
"A. S. N.",
""
],
[
"Avadhani",
"P. S.",
""
]
] |
new_dataset
| 0.996335 |
1110.1502
|
A S N Chakravarthy ASN CHAKRAVARTHY
|
Penmetsa V. Krishna Raja, A. S. N. Chakravarthy, P. S. Avadhani
|
Hilbert Matrix Based Cryptosystem using a Session Key
|
five pages
|
International Journal of Engineering Research and Applications
(IJERA) Vol. 1, Issue 3, 2011, pp.711-715
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cryptography protects users by providing functionality for the encryption of
data and authentication of other users. This technology lets the receiver of an
electronic message verify the sender, ensures that a message can be read only
by the intended person, and assures the recipient that a message has not be
altered in transit. Classical cryptanalysis involves an interesting combination
of analytical reasoning, application of mathematical tools and pattern finding.
The objectives of the proposed work are to propose a new cryptographic method
based on the special matrix called the Hilbert matrix for authentication and
confidentiality and to propose a model for confidentiality and authentication
using shared key cryptosystems with the concept of digital enveloping using a
session key. In the present work various algorithms are presented for
encryption and authentication based on Hilbert matrix using a session key.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 12:04:05 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Raja",
"Penmetsa V. Krishna",
""
],
[
"Chakravarthy",
"A. S. N.",
""
],
[
"Avadhani",
"P. S.",
""
]
] |
new_dataset
| 0.999378 |
1110.1513
|
Abdul Kadir
|
Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa
|
Foliage Plant Retrieval using Polar Fourier Transform, Color Moments and
Vein Features
|
13 pages; Signal & Image Processing : An International Journal
(SIPIJ) Vol.2, No.3, September 2011
| null |
10.5121/sipij.2011.2301
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposed a method that combines Polar Fourier Transform, color
moments, and vein features to retrieve leaf images based on a leaf image. The
method is very useful to help people in recognizing foliage plants. Foliage
plants are plants that have various colors and unique patterns in the leaf.
Therefore, the colors and its patterns are information that should be counted
on in the processing of plant identification. To compare the performance of
retrieving system to other result, the experiments used Flavia dataset, which
is very popular in recognizing plants. The result shows that the method gave
better performance than PNN, SVM, and Fourier Transform. The method was also
tested using foliage plants with various colors. The accuracy was 90.80% for 50
kinds of plants.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 13:00:03 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Kadir",
"Abdul",
""
],
[
"Nugroho",
"Lukito Edi",
""
],
[
"Susanto",
"Adhi",
""
],
[
"Santosa",
"Paulus Insap",
""
]
] |
new_dataset
| 0.998497 |
1110.1563
|
Khaled Day
|
Khaled Day, Abderezak Touzene, Bassel Arafeh, Nasser Alzeidi
|
Parallel routing in Mobile Ad-Hoc Networks
|
18 pages, 13 figures, 6 tables
|
International Journal of Computer Networks & Communications
(IJCNC) Vol.3, No.5, Sep 2011
|
10.5121/ijcnc.2011.3506
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes and evaluates a new position-based Parallel Routing
Protocol (PRP) for simultaneously routing multiple data packets over disjoint
paths in a mobile ad-hoc network (MANET) for higher reliability and reduced
communication delays. PRP views the geographical region where the MANET is
located as a virtual 2-dimensional grid of cells. Cell-disjoint (parallel)
paths between grid cells are constructed and used for building pre-computed
routing tables. A single gateway node in each grid cell handles routing through
that grid cell reducing routing overheads. Each node maintains updated
information about its own location in the virtual grid using GPS. Nodes also
keep track of the location of other nodes using a new proposed cell-based
broadcasting algorithm. Nodes exchange energy level information with neighbors
allowing energy-aware selection of the gateway nodes. Performance evaluation
results have been derived showing the attractiveness of the proposed parallel
routing protocol from different respects including low communication delays,
high packet delivery ratios, high routing path stability, and low routing
overheads.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 15:16:07 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Day",
"Khaled",
""
],
[
"Touzene",
"Abderezak",
""
],
[
"Arafeh",
"Bassel",
""
],
[
"Alzeidi",
"Nasser",
""
]
] |
new_dataset
| 0.965781 |
1110.1569
|
Yang Zhao
|
Yang Zhao and Neal Patwari
|
Robust Estimators for Variance-Based Device-Free Localization and
Tracking
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human motion in the vicinity of a wireless link causes variations in the link
received signal strength (RSS). Device-free localization (DFL) systems, such as
variance-based radio tomographic imaging (VRTI), use these RSS variations in a
static wireless network to detect, locate and track people in the area of the
network, even through walls. However, intrinsic motion, such as branches moving
in the wind and rotating or vibrating machinery, also causes RSS variations
which degrade the performance of a DFL system. In this paper, we propose and
evaluate two estimators to reduce the impact of the variations caused by
intrinsic motion. One estimator uses subspace decomposition, and the other
estimator uses a least squares formulation. Experimental results show that both
estimators reduce localization root mean squared error by about 40% compared to
VRTI. In addition, the Kalman filter tracking results from both estimators have
97% of errors less than 1.3 m, more than 60% improvement compared to tracking
results from VRTI.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2011 17:21:57 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Zhao",
"Yang",
""
],
[
"Patwari",
"Neal",
""
]
] |
new_dataset
| 0.98969 |
1110.1590
|
Chaiyut Jandaeng Chaiyut Jandaeng
|
C. Jandaeng, W. Suntiamontut, N. Elz
|
PSA: The Packet Scheduling Algorithm for Wireless Sensor Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main cause of wasted energy consumption in wireless sensor networks is
packet collision. The packet scheduling algorithm is therefore introduced to
solve this problem. Some packet scheduling algorithms can also influence and
delay the data transmitting in the real-time wireless sensor networks. This
paper presents the packet scheduling algorithm (PSA) in order to reduce the
packet congestion in MAC layer leading to reduce the overall of packet
collision in the system The PSA is compared with the simple CSMA/CA and other
approaches using network topology benchmarks in mathematical method. The
performances of our PSA are better than the standard (CSMA/CA). The PSA
produces better throughput than other algorithms. On other hand, the average
delay of PSA is higher than previous works. However, the PSA utilizes the
channel better than all algorithms.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2011 17:19:47 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Jandaeng",
"C.",
""
],
[
"Suntiamontut",
"W.",
""
],
[
"Elz",
"N.",
""
]
] |
new_dataset
| 0.999537 |
1110.1161
|
Petros Petrosyan
|
Petros A. Petrosyan
|
Interval edge-colorings of cubic graphs
|
3 pages
|
Proceedings of the CSIT Conference, Yerevan, 2011, pp. 86-88
| null | null |
cs.DM math.CO
|
http://creativecommons.org/licenses/by/3.0/
|
An edge-coloring of a multigraph G with colors 1,2,...,t is called an
interval t-coloring if all colors are used, and the colors of edges incident to
any vertex of G are distinct and form an interval of integers. In this paper we
prove that if G is a connected cubic multigraph (a connected cubic graph) that
admits an interval t-coloring, then t\leq |V(G)| +1 (t\leq |V(G)|), where V(G)
is the set of vertices of G. Moreover, if G is a connected cubic graph, G\neq
K_{4}, and G has an interval t-coloring, then t\leq |V(G)| -1. We also show
that these upper bounds are sharp. Finally, we prove that if G is a bipartite
subcubic multigraph, then G has an interval edge-coloring with no more than
four colors.
|
[
{
"version": "v1",
"created": "Thu, 6 Oct 2011 07:08:00 GMT"
}
] | 2011-10-07T00:00:00 |
[
[
"Petrosyan",
"Petros A.",
""
]
] |
new_dataset
| 0.997266 |
1110.1349
|
Fergal Reid
|
Derek Greene, Fergal Reid, Gavin Sheridan, Padraig Cunningham
|
Supporting the Curation of Twitter User Lists
|
8 pages, 5 figures
| null | null | null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Twitter introduced lists in late 2009 as a means of curating tweets into
meaningful themes. Lists were quickly adopted by media companies as a means of
organising content around news stories. Thus the curation of these lists is
important, they should contain the key information gatekeepers and present a
balanced perspective on the story. Identifying members to add to a list on an
emerging topic is a delicate process. From a network analysis perspective there
are a number of views on the Twitter network that can be explored, e.g.
followers, retweets mentions etc. We present a process for integrating these
views in order to recommend authoritative commentators to include on a list.
This process is evaluated on manually curated lists about unrest in Bahrain and
the Iowa caucuses for the 2012 US election.
|
[
{
"version": "v1",
"created": "Thu, 6 Oct 2011 18:47:49 GMT"
}
] | 2011-10-07T00:00:00 |
[
[
"Greene",
"Derek",
""
],
[
"Reid",
"Fergal",
""
],
[
"Sheridan",
"Gavin",
""
],
[
"Cunningham",
"Padraig",
""
]
] |
new_dataset
| 0.987278 |
1110.1052
|
Jesse Stern A
|
Jesse Stern
|
Spider Solitaire is NP-Complete
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This project investigates the potential of computers to solve complex tasks
such as games. The paper proves that the complexity of a generalized version of
spider solitaire is NP-Complete and uses much of structure of the proof that
FreeCell is NP-Hard in the paper Helmert, M. "Complexity Results for Standard
Benchmark Domains in Planning." Artificial Intelligence 143.2 (2003): 219-62.
Print. A given decision problem falls in to the class NP-Complete if it is
proven to be both in NP and in NP-Hard. To prove that this is the case the
paper shows that, not only do the kinds of possible moves that can be reversed
prove this, but it is also shown that no spider solitaire game of size n will
take more than a polynomial number of moves to complete if such a completion is
possible. The paper reduces 3-SAT to SpiderSolitaire (the name used throughout
the proof when referring to the generalized version of popular solitaire
variant "Spider Solitaire") by showing that any 3-SAT instance can be
replicated using an appropriately arranged initial tableau. The example
provided reinforces the proof of NP-Hardness and helps to make the proof easier
to understand, but the definitive proof lies in the equations providing
instruction on how to set up any 3-SAT instance of clause size C as a instance
of SpiderSolitaire.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2011 17:32:00 GMT"
}
] | 2011-10-06T00:00:00 |
[
[
"Stern",
"Jesse",
""
]
] |
new_dataset
| 0.988619 |
1007.3568
|
Alexander Vardy
|
Hessam Mahdavifar and Alexander Vardy
|
Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes
|
16 pages, 5 figures, published in the IEEE Transactions on
Information Theory, vol. 57, no. 10, October 2011. arXiv admin note:
substantial text overlap with arXiv:1001.0210
|
IEEE Transactions on Information Theory, vol. 57, no. 10, October
2011
|
10.1109/TIT.2011.2162275
| null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose Alice wishes to send messages to Bob through a communication channel
C_1, but her transmissions also reach an eavesdropper Eve through another
channel C_2. The goal is to design a coding scheme that makes it possible for
Alice to communicate both reliably and securely. Reliability is measured in
terms of Bob's probability of error in recovering the message, while security
is measured in terms of the mutual information between the message and Eve's
observations. Wyner showed that the situation is characterized by a single
constant C_s, called the secrecy capacity, which has the following meaning: for
all $\epsilon > 0$, there exist coding schemes of rate $R \ge C_s - \epsilon$
that asymptotically achieve both the reliability and the security objectives.
However, his proof of this result is based upon a nonconstructive random-coding
argument. To date, despite a considerable research effort, the only case where
we know how to construct coding schemes that achieve secrecy capacity is when
Eve's channel C_2 is an erasure channel, or a combinatorial variation thereof.
Polar codes were recently invented by Arikan; they approach the capacity of
symmetric binary-input discrete memoryless channels with low encoding and
decoding complexity. Herein, we use polar codes to construct a coding scheme
that achieves the secrecy capacity of general wiretap channels. Our
construction works for any instantiation of the wiretap channel model, as
originally defined by Wyner, as long as both C_1 and C_2 are symmetric and
binary-input. Moreover, we show how to modify our construction in order to
achieve strong security, as defined by Maurer, while still operating at a rate
that approaches the secrecy capacity. In this case, we cannot guarantee that
the reliability condition will be satisfied unless the main channel C_1 is
noiseless, although we believe it can be always satisfied in practice.
|
[
{
"version": "v1",
"created": "Wed, 21 Jul 2010 06:49:42 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Sep 2011 04:01:18 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Mahdavifar",
"Hessam",
""
],
[
"Vardy",
"Alexander",
""
]
] |
new_dataset
| 0.958949 |
1007.4106
|
Nicholas Loulloudes
|
Nicholas Loulloudes, George Pallis, Marios D. Dikaiakos
|
The Dynamics of Vehicular Networks in Urban Environments
|
Revised our testbed with even more realistic mobility traces. Used
the location of real Wi-Fi hotspots to simulate RSUs in our study. Used a
larger, real mobility trace set, from taxis in Shanghai. Examine the
implications of our findings in the design of VANET routing protocols by
implementing in ns-3 two routing protocols (GPCR & VADD). Updated the
bibliography section with new research works
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Vehicular Ad hoc NETworks (VANETs) have emerged as a platform to support
intelligent inter-vehicle communication and improve traffic safety and
performance. The road-constrained, high mobility of vehicles, their unbounded
power source, and the emergence of roadside wireless infrastructures make
VANETs a challenging research topic. A key to the development of protocols for
inter-vehicle communication and services lies in the knowledge of the
topological characteristics of the VANET communication graph. This paper
explores the dynamics of VANETs in urban environments and investigates the
impact of these findings in the design of VANET routing protocols. Using both
real and realistic mobility traces, we study the networking shape of VANETs
under different transmission and market penetration ranges. Given that a number
of RSUs have to be deployed for disseminating information to vehicles in an
urban area, we also study their impact on vehicular connectivity. Through
extensive simulations we investigate the performance of VANET routing protocols
by exploiting the knowledge of VANET graphs analysis.
|
[
{
"version": "v1",
"created": "Fri, 23 Jul 2010 11:25:54 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Oct 2011 07:05:47 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Loulloudes",
"Nicholas",
""
],
[
"Pallis",
"George",
""
],
[
"Dikaiakos",
"Marios D.",
""
]
] |
new_dataset
| 0.984185 |
1110.0569
|
Ronald Caplan
|
R.M. Caplan and R. Carretero-Gonz\'alez
|
A Modulus-Squared Dirichlet Boundary Condition for Time-Dependent
Complex Partial Differential Equations and its Application to the Nonlinear
Schr\"odinger Equation
|
19 pages, 7 figures
| null | null | null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An easy to implement modulus-squared Dirichlet (MSD) boundary condition is
formulated for numerical simulations of time-dependent complex partial
differential equations in multidimensional settings. The MSD boundary condition
approximates a constant modulus-square value of the solution at the boundaries.
Application of the MSD boundary condition to the nonlinear Schr\"odinger
equation is shown, and numerical simulations are performed to demonstrate its
usefulness and advantages over other simple boundary conditions.
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2011 03:17:21 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Caplan",
"R. M.",
""
],
[
"Carretero-González",
"R.",
""
]
] |
new_dataset
| 0.995125 |
1110.0578
|
Pavel Vasev
|
Pavel Vasev
|
Open Input: A New Way for Websites to Grow
|
4 pages, 1 figure
| null | null | null |
cs.HC cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regardless of current web 2.0 and 3.0 trends, there are still a lot of
websites made in web 1.0 style. These websites have fixed pages which are
editable only by owner and not by community. It is normal for a lot of cases,
but looks like not modern and engaging approach. Are there any ways to make
these sites closer to life? This paper is devoted to open input technique, a
way for websites of web 1.0 era to grow and evolve community. The idea of open
input, in general, means that anybody from the web can add information to any
section of the website even without registration on that website. People can
add news, billboard announcements, testimonials, questions, pictures, videos
etc - whatever site owner permitted. We have tested this idea in practice and
have positive results approving that open input is a vital approach for
collaboration on the web.
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2011 04:50:00 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Vasev",
"Pavel",
""
]
] |
new_dataset
| 0.963536 |
1110.0624
|
Agostino Dovier
|
Agostino Dovier and Andrea Formisano and Enrico Pontelli
|
Autonomous Agents Coordination: Action Languages meet CLP(FD) and Linda
| null | null | null | null |
cs.LO cs.AI cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents a knowledge representation formalism, in the form of a
high-level Action Description Language for multi-agent systems, where
autonomous agents reason and act in a shared environment. Agents are
autonomously pursuing individual goals, but are capable of interacting through
a shared knowledge repository. In their interactions through shared portions of
the world, the agents deal with problems of synchronization and concurrency;
the action language allows the description of strategies to ensure a consistent
global execution of the agents' autonomously derived plans. A distributed
planning problem is formalized by providing the declarative specifications of
the portion of the problem pertaining a single agent. Each of these
specifications is executable by a stand-alone CLP-based planner. The
coordination among agents exploits a Linda infrastructure. The proposal is
validated in a prototype implementation developed in SICStus Prolog.
To appear in Theory and Practice of Logic Programming (TPLP).
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2011 09:55:41 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Dovier",
"Agostino",
""
],
[
"Formisano",
"Andrea",
""
],
[
"Pontelli",
"Enrico",
""
]
] |
new_dataset
| 0.999239 |
cs/0406024
|
David Wood
|
Vida Dujmovic, Pat Morin, David R. Wood
|
Layout of Graphs with Bounded Tree-Width
|
This is a revised version of a journal paper submitted in October
2002. This paper incorporates the following conference papers: (1) Dujmovic',
Morin & Wood. Path-width and three-dimensional straight-line grid drawings of
graphs (GD'02), LNCS 2528:42-53, Springer, 2002. (2) Wood. Queue layouts,
tree-width, and three-dimensional graph drawing (FSTTCS'02), LNCS
2556:348--359, Springer, 2002. (3) Dujmovic' & Wood. Tree-partitions of
$k$-trees with applications in graph layout (WG '03), LNCS 2880:205-217, 2003
|
SIAM J. Computing 34.3:553-579, 2005
|
10.1137/S0097539702416141
| null |
cs.DM cs.CG
| null |
A \emph{queue layout} of a graph consists of a total order of the vertices,
and a partition of the edges into \emph{queues}, such that no two edges in the
same queue are nested. The minimum number of queues in a queue layout of a
graph is its \emph{queue-number}. A \emph{three-dimensional (straight-line
grid) drawing} of a graph represents the vertices by points in $\mathbb{Z}^3$
and the edges by non-crossing line-segments. This paper contributes three main
results:
(1) It is proved that the minimum volume of a certain type of
three-dimensional drawing of a graph $G$ is closely related to the queue-number
of $G$. In particular, if $G$ is an $n$-vertex member of a proper minor-closed
family of graphs (such as a planar graph), then $G$ has a $O(1)\times
O(1)\times O(n)$ drawing if and only if $G$ has O(1) queue-number.
(2) It is proved that queue-number is bounded by tree-width, thus resolving
an open problem due to Ganley and Heath (2001), and disproving a conjecture of
Pemmaraju (1992). This result provides renewed hope for the positive resolution
of a number of open problems in the theory of queue layouts.
(3) It is proved that graphs of bounded tree-width have three-dimensional
drawings with O(n) volume. This is the most general family of graphs known to
admit three-dimensional drawings with O(n) volume.
The proofs depend upon our results regarding \emph{track layouts} and
\emph{tree-partitions} of graphs, which may be of independent interest.
|
[
{
"version": "v1",
"created": "Wed, 16 Jun 2004 15:29:07 GMT"
}
] | 2011-10-05T00:00:00 |
[
[
"Dujmovic",
"Vida",
""
],
[
"Morin",
"Pat",
""
],
[
"Wood",
"David R.",
""
]
] |
new_dataset
| 0.996837 |
1106.6254
|
Menelaos Karavelas
|
Menelaos I. Karavelas and Eleni Tzanaki
|
The maximum number of faces of the Minkowski sum of two convex polytopes
|
37 pages, 8 figures, conference version to appear at SODA 2012; v2:
fixed typos, made stylistic changes, added figures
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We derive tight expressions for the maximum number of $k$-faces,
$0\le{}k\le{}d-1$, of the Minkowski sum, $P_1\oplus{}P_2$, of two
$d$-dimensional convex polytopes $P_1$ and $P_2$, as a function of the number
of vertices of the polytopes.
For even dimensions $d\ge{}2$, the maximum values are attained when $P_1$ and
$P_2$ are cyclic $d$-polytopes with disjoint vertex sets. For odd dimensions
$d\ge{}3$, the maximum values are attained when $P_1$ and $P_2$ are
$\lfloor\frac{d}{2}\rfloor$-neighborly $d$-polytopes, whose vertex sets are
chosen appropriately from two distinct $d$-dimensional moment-like curves.
|
[
{
"version": "v1",
"created": "Thu, 30 Jun 2011 14:59:45 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Oct 2011 08:33:52 GMT"
}
] | 2011-10-04T00:00:00 |
[
[
"Karavelas",
"Menelaos I.",
""
],
[
"Tzanaki",
"Eleni",
""
]
] |
new_dataset
| 0.985515 |
cs/0009023
|
Alex Brodsky
|
Alex Brodsky, Stephane Durocher, Ellen Gethner
|
The Rectilinear Crossing Number of K_10 is 62
|
17 Pages, colour figures
|
Electronic Journal of Combinatorics. 8(1):R23 1-30. 2001
| null | null |
cs.DM math.CO
| null |
A drawing of a graph G in the plane is said to be a rectilinear drawing of G
if the edges are required to be line segments (as opposed to Jordan curves). We
assume no three vertices are collinear. The rectilinear crossing number of G is
the fewest number of edge crossings attainable over all rectilinear drawings of
G. Thanks to Richard Guy, exact values of the rectilinear crossing number of
K_n, the complete graph on n vertices, for n = 3,...,9, are known (Guy 1972,
White and Beinke 1978, Finch 2000, Sloanes A014540). Since 1971, thanks to the
work of David Singer (1971, Gardiner 1986), the rectilinear crossing number of
K_10 has been known to be either 61 or 62, a deceptively innocent and
tantalizing statement. The difficulty of determining the correct value is
evidenced by the fact that Singer's result has withstood the test of time. In
this paper we use a purely combinatorial argument to show that the rectilinear
crossing number of K_10 is 62. Moreover, using this result, we improve an
asymptotic lower bound for a related problem. Finally, we close with some new
and old open questions that were provoked, in part, by the results of this
paper, and by the tangled history of the problem itself.
|
[
{
"version": "v1",
"created": "Fri, 22 Sep 2000 19:16:48 GMT"
}
] | 2011-10-04T00:00:00 |
[
[
"Brodsky",
"Alex",
""
],
[
"Durocher",
"Stephane",
""
],
[
"Gethner",
"Ellen",
""
]
] |
new_dataset
| 0.96899 |
1109.6646
|
Abbas Kiani
|
Abbas Kiani, Soroush Akhlaghi
|
A Non-MDS Erasure Code Scheme For Storage Applications
|
6 pages, 2 figures
| null | null | null |
cs.IT cs.DC cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates the use of redundancy and self repairing against node
failures in distributed storage systems, using various strategies. In
replication method, access to one replication node is sufficient to reconstruct
a lost node, while in MDS erasure coded systems which are optimal in terms of
redundancy-reliability tradeoff, a single node failure is repaired after
recovering the entire stored data. Moreover, regenerating codes yield a
tradeoff curve between storage capacity and repair bandwidth. The current paper
aims at investigating a new storage code. Specifically, we propose a non-MDS
(2k, k) code that tolerates any three node failures and more importantly, it is
shown using our code a single node failure can be repaired through access to
only three nodes.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2011 08:02:18 GMT"
}
] | 2011-10-03T00:00:00 |
[
[
"Kiani",
"Abbas",
""
],
[
"Akhlaghi",
"Soroush",
""
]
] |
new_dataset
| 0.962409 |
1109.6714
|
Nan Zhao
|
Nan Zhao
|
A Novel Two-stage Entropy-based Robust Cooperative Spectrum Sensing
Scheme with Two-bit Decision in Cognitive Radio
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spectrum sensing is a key problem in cognitive radio. However, traditional
detectors become ineffective when noise uncertainty is severe. It is shown that
the entropy of Gauss white noise is constant in the frequency domain, and a
robust detector based on the entropy of spectrum amplitude was proposed. In
this paper a novel detector is proposed based on the entropy of spectrum power
density, and its performance is better than the previous scheme with less
computational complexity. Furthermore, to improve the reliability of the
detection, a two-stage entropy-based cooperative spectrum sensing scheme using
two-bit decision is proposed, and simulation results show its superior
performance with relatively low computational complexity.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2011 04:48:37 GMT"
}
] | 2011-10-03T00:00:00 |
[
[
"Zhao",
"Nan",
""
]
] |
new_dataset
| 0.972931 |
1109.6838
|
Sarvesh Nikumbh
|
Sarvesh Nikumbh, Joeprakash Nathaman and Rahul Vartak
|
Distributed Air Traffic Control : A Human Safety Perspective
|
Extended Abstract, 3 pages, Accepted at IBM Collaborative Academia
Research Exchange (I-CARE)-2011, uses ACM-Proceeding style file
| null | null | null |
cs.MA cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The issues in air traffic control have so far been addressed with the intent
to improve resource utilization and achieve an optimized solution with respect
to fuel comsumption of aircrafts, efficient usage of the available airspace
with minimal congestion related losses under various dynamic constraints. So
the focus has almost always been more on smarter management of traffic to
increase profits while human safety, though achieved in the process, we
believe, has remained less seriously attended. This has become all the more
important given that we have overburdened and overstressed air traffic
controllers managing hundreds of airports and thousands of aircrafts per day.
We propose a multiagent system based distributed approach to handle air
traffic ensuring complete human (passenger) safety without removing any humans
(ground controllers) from the loop thereby also retaining the earlier
advantages in the new solution. The detailed design of the agent system, which
will be easily interfacable with the existing environment, is described. Based
on our initial findings from simulations, we strongly believe the system to be
capable of handling the nuances involved, to be extendable and customizable at
any later point in time.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2011 14:42:14 GMT"
}
] | 2011-10-03T00:00:00 |
[
[
"Nikumbh",
"Sarvesh",
""
],
[
"Nathaman",
"Joeprakash",
""
],
[
"Vartak",
"Rahul",
""
]
] |
new_dataset
| 0.998654 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.