id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1003.5627
|
Ashley Smith
|
Mahmoud I. Abdalla and Hanaa S. Ali
|
Wavelet-Based Mel-Frequency Cepstral Coefficients for Speaker
Identification using Hidden Markov Models
| null |
Journal of Telecommunications, Volume 1, Issue 2, pp16-21, March
2010
| null | null |
cs.SD cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To improve the performance of speaker identification systems, an effective
and robust method is proposed to extract speech features, capable of operating
in noisy environment. Based on the time-frequency multi-resolution property of
wavelet transform, the input speech signal is decomposed into various frequency
channels. For capturing the characteristic of the signal, the Mel-Frequency
Cepstral Coefficients (MFCCs) of the wavelet channels are calculated. Hidden
Markov Models (HMMs) were used for the recognition stage as they give better
recognition for the speaker's features than Dynamic Time Warping (DTW).
Comparison of the proposed approach with the MFCCs conventional feature
extraction method shows that the proposed method not only effectively reduces
the influence of noise, but also improves recognition. A recognition rate of
99.3% was obtained using the proposed feature extraction technique compared to
98.7% using the MFCCs. When the test patterns were corrupted by additive white
Gaussian noise with 20 dB S/N ratio, the recognition rate was 97.3% using the
proposed method compared to 93.3% using the MFCCs.
|
[
{
"version": "v1",
"created": "Mon, 29 Mar 2010 17:54:55 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Abdalla",
"Mahmoud I.",
""
],
[
"Ali",
"Hanaa S.",
""
]
] |
new_dataset
| 0.981374 |
1003.5749
|
Sylvie Billot
|
Iris Eshkol (CORAL), Isabelle Tellier (LIFO), Taalab Samer (LIFO),
Sylvie Billot (LIFO)
|
Etiqueter un corpus oral par apprentissage automatique \`a l'aide de
connaissances linguistiques
| null |
10\`emes Journ\'ees Internationales d'Analyse statistique des
Donn\'ees Textuelles JADT'2010, Rome : Italie (2010)
| null | null |
cs.LG cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Thanks to the Eslo1 ("Enqu\^ete sociolinguistique d'Orl\'eans", i.e.
"Sociolinguistic Inquiery of Orl\'eans") campain, a large oral corpus has been
gathered and transcribed in a textual format. The purpose of the work presented
here is to associate a morpho-syntactic label to each unit of this corpus. To
this aim, we have first studied the specificities of the necessary labels, and
their various possible levels of description. This study has led to a new
original hierarchical structuration of labels. Then, considering that our new
set of labels was different from the one used in every available software, and
that these softwares usually do not fit for oral data, we have built a new
labeling tool by a Machine Learning approach, from data labeled by Cordial and
corrected by hand. We have applied linear CRF (Conditional Random Fields)
trying to take the best possible advantage of the linguistic knowledge that was
used to define the set of labels. We obtain an accuracy between 85 and 90%,
depending of the parameters used.
|
[
{
"version": "v1",
"created": "Tue, 30 Mar 2010 07:04:46 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Eshkol",
"Iris",
"",
"CORAL"
],
[
"Tellier",
"Isabelle",
"",
"LIFO"
],
[
"Samer",
"Taalab",
"",
"LIFO"
],
[
"Billot",
"Sylvie",
"",
"LIFO"
]
] |
new_dataset
| 0.994178 |
1003.5782
|
Vahan Mkrtchyan
|
Vahan Mkrtchyan, Eckhard Steffen
|
Bricks and conjectures of Berge, Fulkerson and Seymour
|
4 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An $r$-graph is an $r$-regular graph where every odd set of vertices is
connected by at least $r$ edges to the rest of the graph. Seymour conjectured
that any $r$-graph is $r+1$-edge-colorable, and also that any $r$-graph
contains $2r$ perfect matchings such that each edge belongs to two of them. We
show that the minimum counter-example to either of these conjectures is a
brick. Furthermore we disprove a variant of a conjecture of Fan, Raspaud.
|
[
{
"version": "v1",
"created": "Tue, 30 Mar 2010 10:34:26 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Mkrtchyan",
"Vahan",
""
],
[
"Steffen",
"Eckhard",
""
]
] |
new_dataset
| 0.99514 |
1003.5891
|
Sandip Rakshit
|
Sandip Rakshit, Subhadip Basu
|
Recognition of Handwritten Roman Script Using Tesseract Open source OCR
Engine
|
Proc. National Conference on NAQC (2008) 141-145
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present work, we have used Tesseract 2.01 open source Optical
Character Recognition (OCR) Engine under Apache License 2.0 for recognition of
handwriting samples of lower case Roman script. Handwritten isolated and
free-flow text samples were collected from multiple users. Tesseract is trained
to recognize user-specific handwriting samples of both the categories of
document pages. On a single user model, the system is trained with 1844
isolated handwritten characters and the performance is tested on 1133
characters, taken form the test set. The overall character-level accuracy of
the system is observed as 83.5%. The system fails to segment 5.56% characters
and erroneously classifies 10.94% characters.
|
[
{
"version": "v1",
"created": "Tue, 30 Mar 2010 18:35:37 GMT"
}
] | 2010-03-31T00:00:00 |
[
[
"Rakshit",
"Sandip",
""
],
[
"Basu",
"Subhadip",
""
]
] |
new_dataset
| 0.998741 |
0804.0722
|
Daniel Karapetyan
|
Gregory Gutin, Daniel Karapetyan
|
A Memetic Algorithm for the Generalized Traveling Salesman Problem
|
15 pages, to appear in Natural Computing, Springer, available online:
http://www.springerlink.com/content/5v4568l492272865/?p=e1779dd02e4d4cbfa49d0d27b19b929f&pi=13
|
Natural Computing 9(1) (2010) 47-60
|
10.1007/s11047-009-9111-6
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The generalized traveling salesman problem (GTSP) is an extension of the
well-known traveling salesman problem. In GTSP, we are given a partition of
cities into groups and we are required to find a minimum length tour that
includes exactly one city from each group. The recent studies on this subject
consider different variations of a memetic algorithm approach to the GTSP. The
aim of this paper is to present a new memetic algorithm for GTSP with a
powerful local search procedure. The experiments show that the proposed
algorithm clearly outperforms all of the known heuristics with respect to both
solution quality and running time. While the other memetic algorithms were
designed only for the symmetric GTSP, our algorithm can solve both symmetric
and asymmetric instances.
|
[
{
"version": "v1",
"created": "Fri, 4 Apr 2008 13:21:40 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Nov 2008 23:58:20 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Mar 2009 22:13:27 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Gutin",
"Gregory",
""
],
[
"Karapetyan",
"Daniel",
""
]
] |
new_dataset
| 0.973285 |
0809.4839
|
Jean-Marie Vanherpe
|
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
|
M\'acajov\'a and \v{S}koviera Conjecture on Cubic Graphs
| null |
Discussionnes Mathematicae on Graph Theory 30, 2 (2010) xxx-yyy
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A conjecture of M\'a\u{c}ajov\'a and \u{S}koviera asserts that every
bridgeless cubic graph has two perfect matchings whose intersection does not
contain any odd edge cut. We prove this conjecture for graphs with few vertices
and we give a stronger result for traceable graphs.
|
[
{
"version": "v1",
"created": "Sun, 28 Sep 2008 11:31:20 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Nov 2009 18:41:37 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
] |
new_dataset
| 0.999643 |
1001.3497
|
William Jackson
|
Shahid Hussain, Sheikh Muhammad Saqib, Bashir Ahmad, Shakeel Ahmad
|
Mapping of SOA and RUP: DOA as Case Study
|
Journal of Computing, Vol. 2, Issue 1, January 2010,
https://sites.google.com/site/journalofcomputing/
|
Journal of Computing, Vol. 2, Issue 1, January 2010,
https://sites.google.com/site/journalofcomputing/
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SOA (Service Oriented Architecture) is a new trend towards increasing the
profit margins in an organization due to incorporating business services to
business practices. Rational Unified Process (RUP) is a unified method planning
form for large business applications that provides a language for describing
method content and processes. The well defined mapping of SOA and RUP leads to
successful completion of RUP software projects to provide services to their
users. DOA (Digital Office Assistant) is a multi user SOA type application that
provides appropriate viewer for each user to assist him through services. In
this paper authors proposed the mapping strategy of SOA with RUP by considering
DOA as case study.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2010 08:11:10 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Mar 2010 07:37:16 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Hussain",
"Shahid",
""
],
[
"Saqib",
"Sheikh Muhammad",
""
],
[
"Ahmad",
"Bashir",
""
],
[
"Ahmad",
"Shakeel",
""
]
] |
new_dataset
| 0.991255 |
1003.5320
|
Michael Bronstein
|
Alexander M. Bronstein, Michael M. Bronstein, Ron Kimmel
|
The Video Genome
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fast evolution of Internet technologies has led to an explosive growth of
video data available in the public domain and created unprecedented challenges
in the analysis, organization, management, and control of such content. The
problems encountered in video analysis such as identifying a video in a large
database (e.g. detecting pirated content in YouTube), putting together video
fragments, finding similarities and common ancestry between different versions
of a video, have analogous counterpart problems in genetic research and
analysis of DNA and protein sequences. In this paper, we exploit the analogy
between genetic sequences and videos and propose an approach to video analysis
motivated by genomic research. Representing video information as video DNA
sequences and applying bioinformatic algorithms allows to search, match, and
compare videos in large-scale databases. We show an application for
content-based metadata mapping between versions of annotated video.
|
[
{
"version": "v1",
"created": "Sat, 27 Mar 2010 20:57:47 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Bronstein",
"Alexander M.",
""
],
[
"Bronstein",
"Michael M.",
""
],
[
"Kimmel",
"Ron",
""
]
] |
new_dataset
| 0.951927 |
1003.5515
|
EPTCS
|
Maribel Fern\'andez, Nikolaos Siafakas
|
Labelled Lambda-calculi with Explicit Copy and Erase
| null |
EPTCS 22, 2010, pp. 49-64
|
10.4204/EPTCS.22.5
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present two rewriting systems that define labelled explicit substitution
lambda-calculi. Our work is motivated by the close correspondence between
Levy's labelled lambda-calculus and paths in proof-nets, which played an
important role in the understanding of the Geometry of Interaction. The
structure of the labels in Levy's labelled lambda-calculus relates to the
multiplicative information of paths; the novelty of our work is that we design
labelled explicit substitution calculi that also keep track of exponential
information present in call-by-value and call-by-name translations of the
lambda-calculus into linear logic proof-nets.
|
[
{
"version": "v1",
"created": "Mon, 29 Mar 2010 12:02:10 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Fernández",
"Maribel",
""
],
[
"Siafakas",
"Nikolaos",
""
]
] |
new_dataset
| 0.983033 |
1003.5173
|
Charles Robert
|
Charles A. B. Robert (LORIA)
|
LEXSYS: Architecture and Implication for Intelligent Agent systems
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LEXSYS, (Legume Expert System) was a project conceived at IITA (International
Institute of Tropical Agriculture) Ibadan Nigeria. It was initiated by the
COMBS (Collaborative Group on Maize-Based Systems Research in the 1990. It was
meant for a general framework for characterizing on-farm testing for technology
design for sustainable cereal-based cropping system. LEXSYS is not a true
expert system as the name would imply, but simply a user-friendly information
system. This work is an attempt to give a formal representation of the existing
system and then present areas where intelligent agent can be applied.
|
[
{
"version": "v1",
"created": "Fri, 26 Mar 2010 16:01:52 GMT"
}
] | 2010-03-29T00:00:00 |
[
[
"Robert",
"Charles A. B.",
"",
"LORIA"
]
] |
new_dataset
| 0.995202 |
1003.5192
|
Christoph Lange
|
Christoph Lange
|
wiki.openmath.org - how it works, how you can participate
|
OpenMath workshop 2009 (http://staff.bath.ac.uk/masjhd/OM2009.html)
| null | null | null |
cs.DL cs.MS math.HO
|
http://creativecommons.org/licenses/by/3.0/
|
At http://wiki.openmath.org, the OpenMath 2 and 3 Content Dictionaries are
accessible via a semantic wiki interface, powered by the SWiM system. We
shortly introduce the inner workings of the system, then describe how to use
it, and conclude with first experiences gained from OpenMath society members
working with the system and an outlook to further development plans.
|
[
{
"version": "v1",
"created": "Fri, 26 Mar 2010 17:32:10 GMT"
}
] | 2010-03-29T00:00:00 |
[
[
"Lange",
"Christoph",
""
]
] |
new_dataset
| 0.973515 |
1003.4879
|
Natalia Silberstein
|
Natalia Silberstein and Tuvi Etzion
|
Large Constant Dimension Codes and Lexicodes
|
submitted for ALCOMA10
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Constant dimension codes, with a prescribed minimum distance, have found
recently an application in network coding. All the codewords in such a code are
subspaces of $\F_q^n$ with a given dimension. A computer search for large
constant dimension codes is usually inefficient since the search space domain
is extremely large. Even so, we found that some constant dimension lexicodes
are larger than other known codes. We show how to make the computer search more
efficient. In this context we present a formula for the computation of the
distance between two subspaces, not necessarily of the same dimension.
|
[
{
"version": "v1",
"created": "Thu, 25 Mar 2010 12:59:03 GMT"
}
] | 2010-03-26T00:00:00 |
[
[
"Silberstein",
"Natalia",
""
],
[
"Etzion",
"Tuvi",
""
]
] |
new_dataset
| 0.999602 |
1001.3477
|
William Jackson
|
Y. Robiah, S. Siti Rahayu, S. Shahrin, M. A. Faizal, M. Mohd Zaki, R.
Marliza
|
New Multi-step Worm Attack Model
| null |
Journal of Computing, Vol. 2, Issue 1, January 2010
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The traditional worms such as Blaster, Code Red, Slammer and Sasser, are
still infecting vulnerable machines on the internet. They will remain as
significant threats due to their fast spreading nature on the internet. Various
traditional worms attack pattern has been analyzed from various logs at
different OSI layers such as victim logs, attacker logs and IDS alert log.
These worms attack pattern can be abstracted to form worms' attack model which
describes the process of worms' infection. For the purpose of this paper, only
Blaster variants were used during the experiment. This paper proposes a
multi-step worm attack model which can be extended into research areas in alert
correlation and computer forensic investigation.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2010 07:21:39 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Robiah",
"Y.",
""
],
[
"Rahayu",
"S. Siti",
""
],
[
"Shahrin",
"S.",
""
],
[
"Faizal",
"M. A.",
""
],
[
"Zaki",
"M. Mohd",
""
],
[
"Marliza",
"R.",
""
]
] |
new_dataset
| 0.995489 |
1001.3491
|
William Jackson
|
P.R.Sujin, T.Ruban Deva Prakash, M.Mary Linda
|
Particle Swarm Optimization Based Reactive Power Optimization
| null |
Journal of Computing, Vol. 2, Issue 1, January 2010
| null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reactive power plays an important role in supporting the real power transfer
by maintaining voltage stability and system reliability. It is a critical
element for a transmission operator to ensure the reliability of an electric
system while minimizing the cost associated with it. The traditional objectives
of reactive power dispatch are focused on the technical side of reactive
support such as minimization of transmission losses. Reactive power cost
compensation to a generator is based on the incurred cost of its reactive power
contribution less the cost of its obligation to support the active power
delivery. In this paper an efficient Particle Swarm Optimization (PSO) based
reactive power optimization approach is presented. The optimal reactive power
dispatch problem is a nonlinear optimization problem with several constraints.
The objective of the proposed PSO is to minimize the total support cost from
generators and reactive compensators. It is achieved by maintaining the whole
system power loss as minimum thereby reducing cost allocation. The purpose of
reactive power dispatch is to determine the proper amount and location of
reactive support. Reactive Optimal Power Flow (ROPF) formulation is developed
as an analysis tool and the validity of proposed method is examined using an
IEEE-14 bus system.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2010 07:57:02 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Sujin",
"P. R.",
""
],
[
"Prakash",
"T. Ruban Deva",
""
],
[
"Linda",
"M. Mary",
""
]
] |
new_dataset
| 0.966676 |
1002.3992
|
William Jackson
|
L. Bercea, G. Nemtoi, C. Ungureanu
|
The government of state's power bodies by means of the Internet
| null |
Journal of Computing, Volume 2, Issue 2, February 2010,
https://sites.google.com/site/journalofcomputing/
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The electronic government involves developing the informational society,
which refers to an economy and a society in which the access, acquisition,
memorizing, taking, transmitting, spreading and using the knowledge accede to a
decisive role. The informational society involves changes in the domains of
administration (e-Government), business (electronic commerce and e-business),
education (long distance education), culture (multimedia centers and virtual
libraries), mass- media (TV, video advertising panels), and in the labor manner
(tele-work and virtual commuting).The e-government refers to the interaction
between the Government, Parliament and other public institutions with the
citizens by the electronic means.
|
[
{
"version": "v1",
"created": "Sun, 21 Feb 2010 18:59:25 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Bercea",
"L.",
""
],
[
"Nemtoi",
"G.",
""
],
[
"Ungureanu",
"C.",
""
]
] |
new_dataset
| 0.996693 |
1002.4007
|
William Jackson
|
Ram Sarkar, Nibaran Das, Subhadip Basu, Mahantapas Kundu, Mita
Nasipuri, Dipak Kumar Basu
|
Word level Script Identification from Bangla and Devanagri Handwritten
Texts mixed with Roman Script
| null |
Journal of Computing, Volume 2, Issue 2, February 2010,
https://sites.google.com/site/journalofcomputing/
| null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
India is a multi-lingual country where Roman script is often used alongside
different Indic scripts in a text document. To develop a script specific
handwritten Optical Character Recognition (OCR) system, it is therefore
necessary to identify the scripts of handwritten text correctly. In this paper,
we present a system, which automatically separates the scripts of handwritten
words from a document, written in Bangla or Devanagri mixed with Roman scripts.
In this script separation technique, we first, extract the text lines and words
from document pages using a script independent Neighboring Component Analysis
technique. Then we have designed a Multi Layer Perceptron (MLP) based
classifier for script separation, trained with 8 different wordlevel holistic
features. Two equal sized datasets, one with Bangla and Roman scripts and the
other with Devanagri and Roman scripts, are prepared for the system evaluation.
On respective independent text samples, word-level script identification
accuracies of 99.29% and 98.43% are achieved.
|
[
{
"version": "v1",
"created": "Sun, 21 Feb 2010 19:48:16 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Sarkar",
"Ram",
""
],
[
"Das",
"Nibaran",
""
],
[
"Basu",
"Subhadip",
""
],
[
"Kundu",
"Mahantapas",
""
],
[
"Nasipuri",
"Mita",
""
],
[
"Basu",
"Dipak Kumar",
""
]
] |
new_dataset
| 0.999127 |
1002.4040
|
William Jackson
|
Nibaran Das, Bindaban Das, Ram Sarkar, Subhadip Basu, Mahantapas
Kundu, Mita Nasipuri
|
Handwritten Bangla Basic and Compound character recognition using MLP
and SVM classifier
| null |
Journal of Computing, Volume 2, Issue 2, February 2010,
https://sites.google.com/site/journalofcomputing/
| null | null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel approach for recognition of handwritten compound Bangla characters,
along with the Basic characters of Bangla alphabet, is presented here. Compared
to English like Roman script, one of the major stumbling blocks in Optical
Character Recognition (OCR) of handwritten Bangla script is the large number of
complex shaped character classes of Bangla alphabet. In addition to 50 basic
character classes, there are nearly 160 complex shaped compound character
classes in Bangla alphabet. Dealing with such a large varieties of handwritten
characters with a suitably designed feature set is a challenging problem.
Uncertainty and imprecision are inherent in handwritten script. Moreover, such
a large varieties of complex shaped characters, some of which have close
resemblance, makes the problem of OCR of handwritten Bangla characters more
difficult. Considering the complexity of the problem, the present approach
makes an attempt to identify compound character classes from most frequently to
less frequently occurred ones, i.e., in order of importance. This is to develop
a frame work for incrementally increasing the number of learned classes of
compound characters from more frequently occurred ones to less frequently
occurred ones along with Basic characters. On experimentation, the technique is
observed produce an average recognition rate of 79.25 after three fold cross
validation of data with future scope of improvement and extension.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2010 02:58:49 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Feb 2010 06:44:32 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Das",
"Nibaran",
""
],
[
"Das",
"Bindaban",
""
],
[
"Sarkar",
"Ram",
""
],
[
"Basu",
"Subhadip",
""
],
[
"Kundu",
"Mahantapas",
""
],
[
"Nasipuri",
"Mita",
""
]
] |
new_dataset
| 0.999541 |
1003.4610
|
Barbara Di Fabio
|
Barbara Di Fabio and Claudia Landi
|
Stability of Reeb graphs under function perturbations: the case of
closed curves
|
23 pages, 12 figures
| null | null |
2759
|
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reeb graphs provide a method for studying the shape of a manifold by encoding
the evolution and arrangement of level sets of a simple Morse function defined
on the manifold. Since their introduction in computer graphics they have been
gaining popularity as an effective tool for shape analysis and matching. In
this context one question deserving attention is whether Reeb graphs are robust
against function perturbations. Focusing on 1-dimensional manifolds, we define
an editing distance between Reeb graphs of curves, in terms of the cost
necessary to transform one graph into another. Our main result is that changes
in Morse functions induce smaller changes in the editing distance between Reeb
graphs of curves, implying stability of Reeb graphs under function
perturbations.
|
[
{
"version": "v1",
"created": "Wed, 24 Mar 2010 10:47:47 GMT"
}
] | 2010-03-25T00:00:00 |
[
[
"Di Fabio",
"Barbara",
""
],
[
"Landi",
"Claudia",
""
]
] |
new_dataset
| 0.989278 |
0905.4165
|
Murat Guzeltepe Mr
|
Murat Guzeltepe, Mehmet Ozen
|
Cyclic Codes over Some Finite Quaternion Integer Rings
| null | null |
10.1016/j.jfranklin.2010.02.008
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, cyclic codes are established over some finite quaternion
integer rings with respect to the quaternion Mannheim distance, and de- coding
algorithm for these codes is given.
|
[
{
"version": "v1",
"created": "Tue, 26 May 2009 11:11:34 GMT"
}
] | 2010-03-24T00:00:00 |
[
[
"Guzeltepe",
"Murat",
""
],
[
"Ozen",
"Mehmet",
""
]
] |
new_dataset
| 0.999713 |
1003.4369
|
Rachid Echahed
|
Ph. Balbiani, R. Echahed, A. Herzig
|
A Modal Logic for Termgraph Rewriting
| null | null | null | null |
cs.LO cs.PL cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a modal logic tailored to describe graph transformations and
discuss some of its properties. We focus on a particular class of graphs called
termgraphs. They are first-order terms augmented with sharing and cycles.
Termgraphs allow one to describe classical data-structures (possibly with
pointers) such as doubly-linked lists, circular lists etc. We show how the
proposed logic can faithfully describe (i) termgraphs as well as (ii) the
application of a termgraph rewrite rule (i.e. matching and replacement) and
(iii) the computation of normal forms with respect to a given rewrite system.
We also show how the proposed logic, which is more expressive than
propositional dynamic logic, can be used to specify shapes of classical
data-structures (e.g. binary trees, circular lists etc.).
|
[
{
"version": "v1",
"created": "Tue, 23 Mar 2010 10:34:14 GMT"
}
] | 2010-03-24T00:00:00 |
[
[
"Balbiani",
"Ph.",
""
],
[
"Echahed",
"R.",
""
],
[
"Herzig",
"A.",
""
]
] |
new_dataset
| 0.999298 |
1003.2616
|
Sugata Sanyal
|
Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal
|
Vcache: Caching Dynamic Documents
|
4 Pages, 3 Figures, 6th International Conference on Information
Technology (CIT-2003), India, Dec 2003, pp. 338-342
| null | null |
Proceedings of the 6th International Conference on Information
Technology (CIT-2003), India, Dec 2003, pp. 338-342.
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The traditional web caching is currently limited to static documents only. A
page generated on the fly from a server side script may have different contents
on different accesses and hence cannot be cached. A number of proposals for
attacking the problem have emerged based on the observation that different
instances of a dynamic document are usually quite similar in most cases, i.e.
they have a lot of common HTML code. In this paper, we first review these
related techniques and show their inadequacy for practical use. We then present
a general and fully automatic technique called Vcache based on the
decomposition of dynamic documents into a hierarchy of templates and bindings.
The technique is designed keeping in mind languages like Perl and C etc that
generate the documents using low-level print like statements. These languages
together, account for the largest number of dynamic documents on the web.
|
[
{
"version": "v1",
"created": "Fri, 12 Mar 2010 20:45:35 GMT"
}
] | 2010-03-23T00:00:00 |
[
[
"Goyal",
"Vipul",
""
],
[
"Sanyal",
"Sugata",
""
],
[
"Agrawal",
"Dharma P.",
""
]
] |
new_dataset
| 0.998649 |
1003.3908
|
Wei Zhang
|
Wei Zhang, Long Shi, and Xiang-Gen Xia
|
Full Diversity Space-Time Block Codes with Low-Complexity Partial
Interference Cancellation Group Decoding
|
10 pages, 3 figures.
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Partial interference cancellation (PIC) group decoding proposed by Guo and
Xia is an attractive low-complexity alternative to the optimal processing for
multiple-input multiple-output (MIMO) wireless communications. It can well deal
with the tradeoff among rate, diversity and complexity of space-time block
codes (STBC). In this paper, a systematic design of full-diversity STBC with
low-complexity PIC group decoding is proposed. The proposed code design is
featured as a group-orthogonal STBC by replacing every element of an Alamouti
code matrix with an elementary matrix composed of multiple diagonal layers of
coded symbols. With the PIC group decoding and a particular grouping scheme,
the proposed STBC can achieve full diversity, a rate of $(2M)/(M+2)$ and a
low-complexity decoding for $M$ transmit antennas. Simulation results show that
the proposed codes can achieve the full diversity with PIC group decoding while
requiring half decoding complexity of the existing codes.
|
[
{
"version": "v1",
"created": "Sat, 20 Mar 2010 05:43:31 GMT"
}
] | 2010-03-23T00:00:00 |
[
[
"Zhang",
"Wei",
""
],
[
"Shi",
"Long",
""
],
[
"Xia",
"Xiang-Gen",
""
]
] |
new_dataset
| 0.994456 |
1003.3996
|
Michael Neufeld
|
Michael Neufeld
|
DIP: Disruption-Tolerance for IP
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Disruption Tolerant Networks (DTN) have been a popular subject of recent
research and development. These networks are characterized by frequent, lengthy
outages and a lack of contemporaneous end-to-end paths. In this work we discuss
techniques for extending IP to operate more effectively in DTN scenarios. Our
scheme, Disruption Tolerant IP (DIP) uses existing IP packet headers, uses the
existing socket API for applications, is compatible with IPsec, and uses
familiar Policy-Based Routing techniques for network management.
|
[
{
"version": "v1",
"created": "Sun, 21 Mar 2010 13:44:48 GMT"
}
] | 2010-03-23T00:00:00 |
[
[
"Neufeld",
"Michael",
""
]
] |
new_dataset
| 0.999265 |
1003.4080
|
William Jackson
|
Nazleeni S. Haron, Nur S. Saleem, Mohd H. Hasan, Mazeyanti M. Ariffin,
Izzatdin A. Aziz
|
A RFID-based Campus Context-Aware Notification System
| null |
Journal of Computing, Volume 2, Issue 3, March 2010,
https://sites.google.com/site/journalofcomputing/
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the design and development of a context-aware
notification system for university students using RFID technology. This system
is leveraging on the student's matrix card as the RFID tag (sensor), RFID
reader and server as the processors and screen monitor at the various locations
in the campus as the actuator of the output. This system aims to deliver urgent
notifications to the intended students immediately at their respective
locations. In addition, the system is also able to display personalized
information based on the students' preferences and current location when
accessing the system. The background of the study, the design approaches for
this system and the preliminary evaluation of the prototype are presented in
this paper. The evaluation results have indicated that the the proposed system
is useful and easy to use.
|
[
{
"version": "v1",
"created": "Mon, 22 Mar 2010 06:34:08 GMT"
}
] | 2010-03-23T00:00:00 |
[
[
"Haron",
"Nazleeni S.",
""
],
[
"Saleem",
"Nur S.",
""
],
[
"Hasan",
"Mohd H.",
""
],
[
"Ariffin",
"Mazeyanti M.",
""
],
[
"Aziz",
"Izzatdin A.",
""
]
] |
new_dataset
| 0.975503 |
1003.3490
|
Ileana Streinu
|
Gaiane Panina and Ileana Streinu
|
Flattening single-vertex origami: the non-expansive case
|
Accepted, to appear in Computational Geometry: Theory and
applications.
| null | null | null |
cs.CG math.DG math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A single-vertex origami is a piece of paper with straight-line rays called
creases emanating from a fold vertex placed in its interior or on its boundary.
The Single-Vertex Origami Flattening problem asks whether it is always possible
to reconfigure the creased paper from any configuration compatible with the
metric, to a flat, non-overlapping position, in such a way that the paper is
not torn, stretched and, for rigid origami, not bent anywhere except along the
given creases.
Streinu and Whiteley showed how to reduce the problem to the carpenter's rule
problem for spherical polygons. Using spherical expansive motions, they solved
the cases of open < \pi and closed <= 2\pi spherical polygons. Here, we solve
the case of open polygons with total length between [\pi, 2\pi), which requires
non-expansive motions. Our motion planning algorithm works in a finite number
of discrete steps, for which we give precise bounds depending on both the
number of links and the angle deficit.
|
[
{
"version": "v1",
"created": "Wed, 17 Mar 2010 23:05:39 GMT"
}
] | 2010-03-19T00:00:00 |
[
[
"Panina",
"Gaiane",
""
],
[
"Streinu",
"Ileana",
""
]
] |
new_dataset
| 0.998892 |
1003.3370
|
Yeb Havinga
|
Yeb Havinga, Willem Dijkstra, Ander de Keijzer
|
Adding HL7 version 3 data types to PostgreSQL
|
12 pages, 9 figures, 6 tables
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The HL7 standard is widely used to exchange medical information
electronically. As a part of the standard, HL7 defines scalar communication
data types like physical quantity, point in time and concept descriptor but
also complex types such as interval types, collection types and probabilistic
types. Typical HL7 applications will store their communications in a database,
resulting in a translation from HL7 concepts and types into database types.
Since the data types were not designed to be implemented in a relational
database server, this transition is cumbersome and fraught with programmer
error. The purpose of this paper is two fold. First we analyze the HL7 version
3 data type definitions and define a number of conditions that must be met, for
the data type to be suitable for implementation in a relational database. As a
result of this analysis we describe a number of possible improvements in the
HL7 specification. Second we describe an implementation in the PostgreSQL
database server and show that the database server can effectively execute
scientific calculations with units of measure, supports a large number of
operations on time points and intervals, and can perform operations that are
akin to a medical terminology server. Experiments on synthetic data show that
the user defined types perform better than an implementation that uses only
standard data types from the database server.
|
[
{
"version": "v1",
"created": "Wed, 17 Mar 2010 14:01:19 GMT"
}
] | 2010-03-18T00:00:00 |
[
[
"Havinga",
"Yeb",
""
],
[
"Dijkstra",
"Willem",
""
],
[
"de Keijzer",
"Ander",
""
]
] |
new_dataset
| 0.964713 |
1003.2440
|
Kien Nguyen
|
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
|
Stochastic Games for Security in Networks with Interdependent Nodes
| null | null | null | null |
cs.CR cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies a stochastic game theoretic approach to security and
intrusion detection in communication and computer networks. Specifically, an
Attacker and a Defender take part in a two-player game over a network of nodes
whose security assets and vulnerabilities are correlated. Such a network can be
modeled using weighted directed graphs with the edges representing the
influence among the nodes. The game can be formulated as a non-cooperative
zero-sum or nonzero-sum stochastic game. However, due to correlation among the
nodes, if some nodes are compromised, the effective security assets and
vulnerabilities of the remaining ones will not stay the same in general, which
leads to complex system dynamics. We examine existence, uniqueness, and
structure of the solution and also provide numerical examples to illustrate our
model.
|
[
{
"version": "v1",
"created": "Thu, 11 Mar 2010 22:59:20 GMT"
}
] | 2010-03-15T00:00:00 |
[
[
"Nguyen",
"Kien C.",
""
],
[
"Alpcan",
"Tansu",
""
],
[
"Basar",
"Tamer",
""
]
] |
new_dataset
| 0.956404 |
1003.2547
|
Laurent Deniau
|
Laurent Deniau
|
The C Object System: Using C as a High-Level Object-Oriented Language
|
18p
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The C Object System (Cos) is a small C library which implements high-level
concepts available in Clos, Objc and other object-oriented programming
languages: uniform object model (class, meta-class and property-metaclass),
generic functions, multi-methods, delegation, properties, exceptions, contracts
and closures. Cos relies on the programmable capabilities of the C programming
language to extend its syntax and to implement the aforementioned concepts as
first-class objects. Cos aims at satisfying several general principles like
simplicity, extensibility, reusability, efficiency and portability which are
rarely met in a single programming language. Its design is tuned to provide
efficient and portable implementation of message multi-dispatch and message
multi-forwarding which are the heart of code extensibility and reusability.
With COS features in hand, software should become as flexible and extensible as
with scripting languages and as efficient and portable as expected with C
programming. Likewise, Cos concepts should significantly simplify adaptive and
aspect-oriented programming as well as distributed and service-oriented
computing
|
[
{
"version": "v1",
"created": "Fri, 12 Mar 2010 14:31:23 GMT"
}
] | 2010-03-15T00:00:00 |
[
[
"Deniau",
"Laurent",
""
]
] |
new_dataset
| 0.997943 |
1003.1336
|
Zolt\'an K\'asa
|
Peter Fornai, Antal Ivanyi
|
FIFO anomaly is unbounded
| null |
Acta Univ. Sapientiae, Informatica, 2,1 (2010) 80-89
| null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Virtual memory of computers is usually implemented by demand paging. For some
page replacement algorithms the number of page faults may increase as the
number of page frames increases. Belady, Nelson and Shedler constructed
reference strings for which page replacement algorithm FIFO produces near twice
more page faults in a larger memory than in a smaller one. They formulated the
conjecture that 2 is a general bound. We prove that this ratio can be
arbitrarily large.
|
[
{
"version": "v1",
"created": "Fri, 5 Mar 2010 20:34:44 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Mar 2010 13:02:01 GMT"
}
] | 2010-03-13T00:00:00 |
[
[
"Fornai",
"Peter",
""
],
[
"Ivanyi",
"Antal",
""
]
] |
new_dataset
| 0.996315 |
1003.1387
|
Zolt\'an K\'asa
|
Gy\"ongyv\'er M\'arton
|
Public-key cryptography in functional programming context
| null |
Acta Univ. Sapientiae, Informatica, 2, 1 (2010) 99-112
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Up to now, for efficiency reasons cryptographic algorithm has been written in
an imperative language. But to get acquaintance with a functional programming
language a question arises: functional programming offers some new for secure
communication or not? This article investigates this question giving an
overview on some cryptography algorithms and presents how the RSA encryption in
the functional language Clean can be implemented and how can be measured the
efficiency of a certain application.
|
[
{
"version": "v1",
"created": "Sat, 6 Mar 2010 14:23:09 GMT"
}
] | 2010-03-13T00:00:00 |
[
[
"Márton",
"Gyöngyvér",
""
]
] |
new_dataset
| 0.988367 |
1003.2142
|
Shuping Gong
|
Husheng Li and Weiyi Zhang
|
QoS Routing in Smart Grid
|
submitted to IEEE 2010'Globecom
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Smart grid is an emerging technology which is able to control the power load
via price signaling. The communication between the power supplier and power
customers is a key issue in smart grid. Performance degradation like delay or
outage may cause significant impact on the stability of the pricing based
control and thus the reward of smart grid. Therefore, a QoS mechanism is
proposed for the communication system in smart grid, which incorporates the
derivation of QoS requirement and applies QoS routing in the communication
network. For deriving the QoS requirement, the dynamics of power load and the
load-price mapping are studied. The corresponding impacts of different QoS
metrics like delay are analyzed. Then, the QoS is derived via an optimization
problem that maximizes the total revenue. Based on the derived QoS requirement,
a simple greedy QoS routing algorithm is proposed for the requirement of high
speed routing in smart grid. It is also proven that the proposed greedy
algorithm is a $K$-approximation. Numerical simulation shows that the proposed
mechanism and algorithm can effectively derive and secure the communication QoS
in smart grid.
|
[
{
"version": "v1",
"created": "Wed, 10 Mar 2010 16:10:49 GMT"
}
] | 2010-03-11T00:00:00 |
[
[
"Li",
"Husheng",
""
],
[
"Zhang",
"Weiyi",
""
]
] |
new_dataset
| 0.992259 |
0907.4068
|
Masud Hasan
|
Syed Ishtiaque Ahmed, Masud Hasan, and Md. Ariful Islam
|
Cutting a Convex Polyhedron Out of a Sphere
|
10 pages
| null | null | null |
cs.CG cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a convex polyhedron $P$ of $n$ vertices inside a sphere $Q$, we give an
$O(n^3)$-time algorithm that cuts $P$ out of $Q$ by using guillotine cuts and
has cutting cost $O((\log n)^2)$ times the optimal.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 14:11:59 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Mar 2010 17:26:51 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Ahmed",
"Syed Ishtiaque",
""
],
[
"Hasan",
"Masud",
""
],
[
"Islam",
"Md. Ariful",
""
]
] |
new_dataset
| 0.995742 |
1003.1775
|
Erik Wilde
|
Nick Doty and Deirdre K. Mulligan and Erik Wilde
|
Privacy Issues of the W3C Geolocation API
| null | null | null |
UC Berkeley School of Information Report 2010-038
|
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The W3C's Geolocation API may rapidly standardize the transmission of
location information on the Web, but, in dealing with such sensitive
information, it also raises serious privacy concerns. We analyze the manner and
extent to which the current W3C Geolocation API provides mechanisms to support
privacy. We propose a privacy framework for the consideration of location
information and use it to evaluate the W3C Geolocation API, both the
specification and its use in the wild, and recommend some modifications to the
API as a result of our analysis.
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 03:32:29 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Doty",
"Nick",
""
],
[
"Mulligan",
"Deirdre K.",
""
],
[
"Wilde",
"Erik",
""
]
] |
new_dataset
| 0.973618 |
1003.1796
|
Rdv Ijcsis
|
Zunera Jalil, Anwar M. Mirza, Maria Sabir
|
Content based Zero-Watermarking Algorithm for Authentication of Text
Documents
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Copyright protection and authentication of digital contents has become a
significant issue in the current digital epoch with efficient communication
mediums such as internet. Plain text is the rampantly used medium used over the
internet for information exchange and it is very crucial to verify the
authenticity of information. There are very limited techniques available for
plain text watermarking and authentication. This paper presents a novel
zero-watermarking algorithm for authentication of plain text. The algorithm
generates a watermark based on the text contents and this watermark can later
be extracted using extraction algorithm to prove the authenticity of text
document. Experimental results demonstrate the effectiveness of the algorithm
against tampering attacks identifying watermark accuracy and distortion rate on
10 different text samples of varying length and attacks.
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 06:49:43 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Jalil",
"Zunera",
""
],
[
"Mirza",
"Anwar M.",
""
],
[
"Sabir",
"Maria",
""
]
] |
new_dataset
| 0.977803 |
1003.1806
|
Rdv Ijcsis
|
Ms.A.Rathika, Ms. R.Saranya, Ms.R.Iswarya
|
Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced
Authentication Scheme And Plausible Exchange Algorithm
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
When Bluetooth devices come within the range of another, an electronic
conversation takes place to determine whether the devices in range are known or
whether one needs to control the other. Most Bluetooth devices do not require
any form of user interaction for this to occur. If devices within range are
known to one another, the devices automatically form a network known as a
pairing. Authentication addresses the identity of each communicating device.
The sender sends an encrypted authentication request frame to the receiver. The
receiver sends an encrypted challenge frame back to the sender. Both perform a
predefined algorithm. The sender sends its findings back to the receiver, which
in turn either allows or denies the connection. There are three different
functions for authentication in Bluetooth-E1, E2, and E3. E1 is used when
encrypting the authorization challenge-response values.E2 is for generating
different link keys.E3 is used when creating the encryption key.
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 07:09:11 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Rathika",
"Ms. A.",
""
],
[
"Saranya",
"Ms. R.",
""
],
[
"Iswarya",
"Ms. R.",
""
]
] |
new_dataset
| 0.996152 |
1003.1811
|
Rdv Ijcsis
|
Samir Elmougy, Ibrahim El-Henawy, Ahmed El-Azab
|
Model Based Ceramic tile inspection using Discrete Wavelet Transform and
Euclidean Distance
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Visual inspection of industrial products is used to determine the control
quality for these products. This paper deals with the problem of visual
inspection of ceramic tiles industry using Wavelet Transform. The third level
the coefficients of two dimensions Haar Discrete Wavelet Transform (HDWT) is
used in this paper to process the images and feature extraction. The proposed
algorithm consists of two main phases. The first phase is to compute the
wavelet transform for an image free of defects which known as reference image,
and the image to be inspected which known as test image. The second phase is
used to decide whether the tested image is defected or not using the Euclidean
distance similarity measure. The experimentation results of the proposed
algorithm give 97% for correct detection of ceramic defects.
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 07:23:58 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Elmougy",
"Samir",
""
],
[
"El-Henawy",
"Ibrahim",
""
],
[
"El-Azab",
"Ahmed",
""
]
] |
new_dataset
| 0.998234 |
1003.1891
|
Ayatullah Faruk Mollah
|
Nibaran Das, Ayatullah Faruk Mollah, Sudip Saha, Syed Sahidul Haque
|
Handwritten Arabic Numeral Recognition using a Multi Layer Perceptron
|
Proc. National Conference on Recent Trends in Information Systems
(ReTIS-06), July 14-15, 2006, Kolkata, India, pp 200-203
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Handwritten numeral recognition is in general a benchmark problem of Pattern
Recognition and Artificial Intelligence. Compared to the problem of printed
numeral recognition, the problem of handwritten numeral recognition is
compounded due to variations in shapes and sizes of handwritten characters.
Considering all these, the problem of handwritten numeral recognition is
addressed under the present work in respect to handwritten Arabic numerals.
Arabic is spoken throughout the Arab World and the fifth most popular language
in the world slightly before Portuguese and Bengali. For the present work, we
have developed a feature set of 88 features is designed to represent samples of
handwritten Arabic numerals for this work. It includes 72 shadow and 16 octant
features. A Multi Layer Perceptron (MLP) based classifier is used here for
recognition handwritten Arabic digits represented with the said feature set. On
experimentation with a database of 3000 samples, the technique yields an
average recognition rate of 94.93% evaluated after three-fold cross validation
of results. It is useful for applications related to OCR of handwritten Arabic
Digit and can also be extended to include OCR of handwritten characters of
Arabic alphabet.
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 14:56:00 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Das",
"Nibaran",
""
],
[
"Mollah",
"Ayatullah Faruk",
""
],
[
"Saha",
"Sudip",
""
],
[
"Haque",
"Syed Sahidul",
""
]
] |
new_dataset
| 0.99962 |
1003.1930
|
Achmad Benny Mutiara
|
D.K. Ningtyas and A.B. Mutiara
|
Simulating Grover's Quantum Search in a Classical Computer
|
24 pages, no figures
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The rapid progress of computer science has been accompanied by a
corresponding evolution of computation, from classical computation to quantum
computation. As quantum computing is on its way to becoming an established
discipline of computing science, much effort is being put into the development
of new quantum algorithms. One of quantum algorithms is Grover algorithm, which
is used for searching an element in an unstructured list of N elements with
quadratic speed-up over classical algorithms. In this work, Quantum Computer
Language (QCL) is used to make a Grover's quantum search simulation in a
classical computer
|
[
{
"version": "v1",
"created": "Tue, 9 Mar 2010 17:02:21 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Ningtyas",
"D. K.",
""
],
[
"Mutiara",
"A. B.",
""
]
] |
new_dataset
| 0.996622 |
1003.1343
|
Gregory Benford
|
David H. Wolpert and Gregory Benford
|
What does Newcomb's paradox teach us?
| null | null | null | null |
cs.GT cs.AI math.OC math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Newcomb's paradox you choose to receive either the contents of a
particular closed box, or the contents of both that closed box and another one.
Before you choose, a prediction algorithm deduces your choice, and fills the
two boxes based on that deduction. Newcomb's paradox is that game theory
appears to provide two conflicting recommendations for what choice you should
make in this scenario. We analyze Newcomb's paradox using a recent extension of
game theory in which the players set conditional probability distributions in a
Bayes net. We show that the two game theory recommendations in Newcomb's
scenario have different presumptions for what Bayes net relates your choice and
the algorithm's prediction. We resolve the paradox by proving that these two
Bayes nets are incompatible. We also show that the accuracy of the algorithm's
prediction, the focus of much previous work, is irrelevant. In addition we show
that Newcomb's scenario only provides a contradiction between game theory's
expected utility and dominance principles if one is sloppy in specifying the
underlying Bayes net. We also show that Newcomb's paradox is time-reversal
invariant; both the paradox and its resolution are unchanged if the algorithm
makes its `prediction' after you make your choice rather than before.
|
[
{
"version": "v1",
"created": "Sat, 6 Mar 2010 00:52:29 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Wolpert",
"David H.",
""
],
[
"Benford",
"Gregory",
""
]
] |
new_dataset
| 0.988147 |
1003.1401
|
Zolt\~An K\~Asa
|
Branislav Sobota, Milan Guzan
|
Macro and micro view on steady states in state space
| null |
Acta Univ. Sapientiae, Informatica, 2,1 (2010) 90-98
| null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes visualization of chaotic attractor and elements of the
singularities in 3D space. 3D view of these effects enables to create a
demonstrative projection about relations of chaos generated by physical
circuit, the Chua's circuit. Via macro views on chaotic attractor is obtained
not only visual space illustration of representative point motion in state
space, but also its relation to planes of singularity elements. Our created
program enables view on chaotic attractor both in 2D and 3D space together with
plane objects visualization -- elements of singularities.
|
[
{
"version": "v1",
"created": "Sat, 6 Mar 2010 16:42:53 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Sobota",
"Branislav",
""
],
[
"Guzan",
"Milan",
""
]
] |
new_dataset
| 0.997795 |
1003.1422
|
Onur Ozan Koyluoglu
|
O. Ozan Koyluoglu and Hesham El Gamal
|
Polar Coding for Secure Transmission and Key Agreement
|
Proceedings of the 21st Annual IEEE International Symposium on
Personal, Indoor, and Mobile Radio Communications (PIMRC 2010), Sept. 2010,
Istanbul, Turkey
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wyner's work on wiretap channels and the recent works on information
theoretic security are based on random codes. Achieving information theoretical
security with practical coding schemes is of definite interest. In this note,
the attempt is to overcome this elusive task by employing the polar coding
technique of Ar{\i}kan. It is shown that polar codes achieve non-trivial
perfect secrecy rates for binary-input degraded wiretap channels while enjoying
their low encoding-decoding complexity. In the special case of symmetric main
and eavesdropper channels, this coding technique achieves the secrecy capacity.
Next, fading erasure wiretap channels are considered and a secret key agreement
scheme is proposed, which requires only the statistical knowledge of the
eavesdropper channel state information (CSI). The enabling factor is the
creation of advantage over Eve, by blindly using the proposed scheme over each
fading block, which is then exploited with privacy amplification techniques to
generate secret keys.
|
[
{
"version": "v1",
"created": "Sat, 6 Mar 2010 23:52:30 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Koyluoglu",
"O. Ozan",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
new_dataset
| 0.974193 |
1003.1492
|
Rdv Ijcsis
|
Harshvardhan Tiwari, Dr. Krishna Asawa
|
A Secure Hash Function MD-192 With Modified Message Expansion
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Cryptographic hash functions play a central role in cryptography. Hash
functions were introduced in cryptology to provide message integrity and
authentication. MD5, SHA1 and RIPEMD are among the most commonly used message
digest algorithm. Recently proposed attacks on well known and widely used hash
functions motivate a design of new stronger hash function. In this paper a new
approach is presented that produces 192 bit message digest and uses a modified
message expansion mechanism which generates more bit difference in each working
variable to make the algorithm more secure. This hash function is collision
resistant and assures a good compression and preimage resistance.
|
[
{
"version": "v1",
"created": "Sun, 7 Mar 2010 17:03:10 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Tiwari",
"Harshvardhan",
""
],
[
"Asawa",
"Dr. Krishna",
""
]
] |
new_dataset
| 0.99535 |
1003.1497
|
Rdv Ijcsis
|
Bala Dhandayuthapani Veerasamy
|
Creating A Model HTTP Server Program Using java
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
HTTP Server is a computer programs that serves webpage content to clients. A
webpage is a document or resource of information that is suitable for the World
Wide Web and can be accessed through a web browser and displayed on a computer
screen. This information is usually in HTML format, and may provide navigation
to other webpage's via hypertext links. WebPages may be retrieved from a local
computer or from a remote HTTP Server. WebPages are requested and served from
HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of
files of static or dynamic text stored within the HTTP Server's file system.
Client-side scripting can make WebPages more responsive to user input once in
the client browser. This paper encompasses the creation of HTTP server program
using java language, which is basically supporting for HTML and JavaScript.
|
[
{
"version": "v1",
"created": "Sun, 7 Mar 2010 17:25:28 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Veerasamy",
"Bala Dhandayuthapani",
""
]
] |
new_dataset
| 0.999088 |
1003.1502
|
Rdv Ijcsis
|
Farhan Hassan Khan, Saba Bashir, M.Younus Javed, Aihab Khan, Malik
Sikandar Hayat Khiyal
|
QoS Based Dynamic Web Services Composition & Execution
|
Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis/
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The use of web services has dominated software industry. Existing
technologies of web services are extended to give value added customized
services to customers through composition. Automated web service composition is
a very challenging task. This paper proposed the solution of existing problems
and proposed a technique by combination of interface based and functionality
based rules. The proposed framework also solves the issues related to
unavailability of updated information and inaccessibility of web services from
repository/databases due to any fault/failure. It provides updated information
problem by adding aging factor in repository/WSDB (Web Services Database) and
inaccessibility is solved by replication of WSDB. We discussed data
distribution techniques and proposed our framework by using one of these
strategies by considering quality of service issues. Finally, our algorithm
eliminates the dynamic service composition and execution issues, supports web
service composition considering QoS (Quality of Service), efficient data
retrieval and updation, fast service distribution and fault tolerance.
|
[
{
"version": "v1",
"created": "Sun, 7 Mar 2010 17:52:14 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Khan",
"Farhan Hassan",
""
],
[
"Bashir",
"Saba",
""
],
[
"Javed",
"M. Younus",
""
],
[
"Khan",
"Aihab",
""
],
[
"Khiyal",
"Malik Sikandar Hayat",
""
]
] |
new_dataset
| 0.997976 |
1003.1572
|
Stephan Schroevers
|
Stephan Schroevers
|
Expressiveness and Extensions of an Instruction Sequence Semigroup
|
Master's thesis - Master of Logic - University of Amsterdam
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PGA, short for ProGram Algebra, describes sequential programs as finite or
infinite (repeating) sequences of instructions. The semigroup C of finite
instruction sequences was introduced as an equally expressive alternative to
PGA. PGA instructions are executed from left to right; most C instructions come
in a left-to-right as well as a right-to-left flavor. This thesis builds on C
by introducing an alternative semigroup Cg which employs label and goto
instructions instead of relative jump instructions as control structures. Cg
can be translated to C and vice versa (and is thus equally expressive). It is
shown that restricting the instruction sets of C and Cg to contain only
finitely many distinct jump, goto or label instructions in either or both
directions reduces their expressiveness. Instruction sets with an infinite
number of these instructions in both directions (not necessarily all such
instructions) do not suffer a loss of expressiveness.
|
[
{
"version": "v1",
"created": "Mon, 8 Mar 2010 08:56:17 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Schroevers",
"Stephan",
""
]
] |
new_dataset
| 0.970069 |
1002.4665
|
Jordan Boyd-Graber
|
Jordan Boyd-Graber, David M. Blei
|
Syntactic Topic Models
| null | null | null | null |
cs.CL cs.AI math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The syntactic topic model (STM) is a Bayesian nonparametric model of language
that discovers latent distributions of words (topics) that are both
semantically and syntactically coherent. The STM models dependency parsed
corpora where sentences are grouped into documents. It assumes that each word
is drawn from a latent topic chosen by combining document-level features and
the local syntactic context. Each document has a distribution over latent
topics, as in topic models, which provides the semantic consistency. Each
element in the dependency parse tree also has a distribution over the topics of
its children, as in latent-state syntax models, which provides the syntactic
consistency. These distributions are convolved so that the topic of each word
is likely under both its document and syntactic context. We derive a fast
posterior inference algorithm based on variational methods. We report
qualitative and quantitative studies on both synthetic data and hand-parsed
documents. We show that the STM is a more predictive model of language than
current models based only on syntax or only on topics.
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2010 00:00:47 GMT"
}
] | 2010-03-04T00:00:00 |
[
[
"Boyd-Graber",
"Jordan",
""
],
[
"Blei",
"David M.",
""
]
] |
new_dataset
| 0.987423 |
1003.0735
|
Lili Zhang
|
Lili Zhang, Jinhua Jiang, Shuguang Cui
|
Compress-and-Forward Performance in Low-SNR Relay Channels
|
13 pages, 5 figures, submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the Gaussian relay channels in the low
signal-to-noise ratio (SNR) regime with the time-sharing compress-and-forward
(CF) scheme, where at each time slot all the nodes keep silent at the first
fraction of time and then transmit with CF at a higher peak power in the second
fraction. Such a silent vs. active two-phase relay scheme is preferable in the
low-SNR regime. With this setup, the upper and lower bounds on the minimum
energy per bit required over the relay channel are established under both
full-duplex and half-duplex relaying modes. In particular, the lower bound is
derived by applying the max-flow min-cut capacity theorem; the upper bound is
established with the aforementioned time-sharing CF scheme, and is further
minimized by letting the active phase fraction decrease to zero at the same
rate as the SNR value. Numerical results are presented to validate the
theoretical results.
|
[
{
"version": "v1",
"created": "Wed, 3 Mar 2010 06:12:47 GMT"
}
] | 2010-03-04T00:00:00 |
[
[
"Zhang",
"Lili",
""
],
[
"Jiang",
"Jinhua",
""
],
[
"Cui",
"Shuguang",
""
]
] |
new_dataset
| 0.980876 |
1003.0662
|
Carla Selmi
|
Mustapha Arfi (LITIS), Bedine Ould M. Lemine (LITIS), Carla Selmi
(LITIS)
|
Strategical languages of infinite words
| null |
Information Processing Letters 109 (2009) 749-753
| null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We deal in this paper with strategical languages of infinite words, that is
those generated by a nondeterministic strategy in the sense of game theory. We
first show the existence of a minimal strategy for such languages, for which we
give an explicit expression. Then we characterize the family of strategical
languages as that of closed ones, in the topological space of infinite words.
Finally, we give a definition of a Nash equilibrium for such languages, that we
illustrate with a famous example.
|
[
{
"version": "v1",
"created": "Tue, 2 Mar 2010 19:47:21 GMT"
}
] | 2010-03-03T00:00:00 |
[
[
"Arfi",
"Mustapha",
"",
"LITIS"
],
[
"Lemine",
"Bedine Ould M.",
"",
"LITIS"
],
[
"Selmi",
"Carla",
"",
"LITIS"
]
] |
new_dataset
| 0.994797 |
1002.4996
|
Zhi Xu
|
Lila Kari, Shinnosuke Seki, Zhi Xu
|
Triangular Self-Assembly
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss the self-assembly system of triangular tiles instead of square
tiles, in particular right triangular tiles and equilateral triangular tiles.
We show that the triangular tile assembly system, either deterministic or
non-deterministic, has the same power to the square tile assembly system in
computation, which is Turing universal. By providing counter-examples, we show
that the triangular tile assembly system and the square tile assembly system
are not comparable in general. More precisely, there exists square tile
assembly system S such that no triangular tile assembly system is a division of
S and produces the same shape; there exists triangular tile assembly system T
such that no square tile assembly system produces the same compatible shape
with border glues. We also discuss the assembly of triangles by triangular
tiles and obtain results similar to the assembly of squares, that is to
assemble a triangular of size O(N^2), the minimal number of tiles required is
in O(log N/log log N).
|
[
{
"version": "v1",
"created": "Fri, 26 Feb 2010 14:27:20 GMT"
}
] | 2010-03-01T00:00:00 |
[
[
"Kari",
"Lila",
""
],
[
"Seki",
"Shinnosuke",
""
],
[
"Xu",
"Zhi",
""
]
] |
new_dataset
| 0.998984 |
1002.5026
|
Ersen Ekrem
|
Ersen Ekrem and Sennur Ulukus
|
Capacity Region of Gaussian MIMO Broadcast Channels with Common and
Confidential Messages
|
Submitted to IEEE Transactions on Information Theory, February 2010.
Conference version submitted to IEEE ISIT, January 2010
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the two-user Gaussian multiple-input multiple-output (MIMO)
broadcast channel with common and confidential messages. In this channel, the
transmitter sends a common message to both users, and a confidential message to
each user which needs to be kept perfectly secret from the other user. We
obtain the entire capacity region of this channel. We also explore the
connections between the capacity region we obtain for the Gaussian MIMO
broadcast channel with common and confidential messages and the capacity region
of its non-confidential counterpart, i.e., the Gaussian MIMO broadcast channel
with common and private messages, which is not known completely.
|
[
{
"version": "v1",
"created": "Fri, 26 Feb 2010 18:26:45 GMT"
}
] | 2010-03-01T00:00:00 |
[
[
"Ekrem",
"Ersen",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
new_dataset
| 0.994295 |
0912.4115
|
Swaminathan Sankararaman
|
Swaminathan Sankararaman, Alon Efrat, Srinivasan Ramasubramanian,
Pankaj K. Agarwal
|
On Channel-Discontinuity-Constraint Routing in Wireless Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multi-channel wireless networks are increasingly being employed as
infrastructure networks, e.g. in metro areas. Nodes in these networks
frequently employ directional antennas to improve spatial throughput. In such
networks, given a source and destination, it is of interest to compute an
optimal path and channel assignment on every link in the path such that the
path bandwidth is the same as that of the link bandwidth and such a path
satisfies the constraint that no two consecutive links on the path are assigned
the same channel, referred to as "Channel Discontinuity Constraint" (CDC).
CDC-paths are also quite useful for TDMA system, where preferably every
consecutive links along a path are assigned different time slots.
This paper contains several contributions. We first present an $O(N^{2})$
distributed algorithm for discovering the shortest CDC-path between given
source and destination. This improves the running time of the $O(N^{3})$
centralized algorithm of Ahuja et al. for finding the minimum-weight CDC-path.
Our second result is a generalized $t$-spanner for CDC-path; For any $\theta>0$
we show how to construct a sub-network containing only $O(\frac{N}{\theta})$
edges, such that that length of shortest CDC-paths between arbitrary sources
and destinations increases by only a factor of at most
$(1-2\sin{\tfrac{\theta}{2}})^{-2}$. We propose a novel algorithm to compute
the spanner in a distributed manner using only $O(n\log{n})$ messages. An
important conclusion of this scheme is in the case of directional antennas are
used. In this case, it is enough to consider only the two closest nodes in each
cone.
|
[
{
"version": "v1",
"created": "Mon, 21 Dec 2009 09:34:26 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 19:36:56 GMT"
}
] | 2010-02-26T00:00:00 |
[
[
"Sankararaman",
"Swaminathan",
""
],
[
"Efrat",
"Alon",
""
],
[
"Ramasubramanian",
"Srinivasan",
""
],
[
"Agarwal",
"Pankaj K.",
""
]
] |
new_dataset
| 0.999262 |
1002.4836
|
Ashley Smith
|
Prasun Ghosal, Malabika Biswas and Manish Biswas
|
Hardware Implementation of TDES Crypto System with On Chip Verification
in FPGA
|
Journal of Telecommunications,Volume 1, Issue 1, pp113-117, February
2010
|
P. Ghosal, M. Biswas and M. Biswas, "Hardware Implementation of
TDES Crypto System with On Chip Verification in FPGA", Journal of
Telecommunications, Volume 1, Issue 1, pp113-117, February 2010
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Security issues are playing dominant role in today's high speed communication
systems. A fast and compact FPGA based implementation of the Data Encryption
Standard (DES) and Triple DES algorithm is presented in this paper that is
widely used in cryptography for securing the Internet traffic in modern day
communication systems. The design of the digital cryptographic circuit was
implemented in a Vertex 5 series (XCVLX5110T) target device with the use of
VHDL as the hardware description language. In order to confirm the expected
behavior of these algorithms, the proposed design was extensively simulated,
synthesized for different FPGA devices both in Spartan and Virtex series from
Xilinx viz. Spartan 3, Spartan 3AN, Virtex 5, Virtex E device families. The
novelty and contribution of this work is in three folds: (i) Extensive
simulation and synthesis of the proposed design targeted for various FPGA
devices, (ii) Complete hardware implementation of encryption and decryption
algorithms onto Virtex 5 series device (XCVLX5110T) based FPGA boards and,
(iii) Generation of ICON and VIO core for the design and on chip verification
and analyzing using Chipscope Pro. The experimental as well as implementation
results compared to the implementations reported so far are quite encouraging.
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2010 17:24:25 GMT"
}
] | 2010-02-26T00:00:00 |
[
[
"Ghosal",
"Prasun",
""
],
[
"Biswas",
"Malabika",
""
],
[
"Biswas",
"Manish",
""
]
] |
new_dataset
| 0.960451 |
1001.4108
|
Justin Smith
|
Ben Lund, Justin W Smith
|
A Multi-Stage CUDA Kernel for Floyd-Warshall
|
9 pages, 7 figures, 1 table
| null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new implementation of the Floyd-Warshall All-Pairs Shortest
Paths algorithm on CUDA. Our algorithm runs approximately 5 times faster than
the previously best reported algorithm. In order to achieve this speedup, we
applied a new technique to reduce usage of on-chip shared memory and allow the
CUDA scheduler to more effectively hide instruction latency.
|
[
{
"version": "v1",
"created": "Sat, 23 Jan 2010 00:22:33 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 2010 02:01:14 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Lund",
"Ben",
""
],
[
"Smith",
"Justin W",
""
]
] |
new_dataset
| 0.999129 |
1002.4510
|
Joaquim Borges
|
Joaquim Borges, Josep Rifa, Victor Zinoviev
|
On linear $q$-ary completely regular codes with $\rho=2$ and dual
antipodal
| null | null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We characterize all linear $q$-ary completely regular codes with covering
radius $\rho=2$ when the dual codes are antipodal. These completely regular
codes are extensions of linear completely regular codes with covering radius 1,
which are all classified. For $\rho=2$, we give a list of all such codes known
to us. This also gives the characterization of two weight linear antipodal
codes.
|
[
{
"version": "v1",
"created": "Wed, 24 Feb 2010 10:15:57 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Borges",
"Joaquim",
""
],
[
"Rifa",
"Josep",
""
],
[
"Zinoviev",
"Victor",
""
]
] |
new_dataset
| 0.998111 |
cs/0611010
|
Diego Ruano
|
Diego Ruano
|
On the structure of generalized toric codes
| null |
The final version can be found in: Journal of Symbolic
Computation. Volume 44, Issue 5, May 2009, Pages 499-506
| null | null |
cs.IT math.IT
| null |
Toric codes are obtained by evaluating rational functions of a nonsingular
toric variety at the algebraic torus. One can extend toric codes to the so
called generalized toric codes. This extension consists on evaluating elements
of an arbitrary polynomial algebra at the algebraic torus instead of a linear
combination of monomials whose exponents are rational points of a convex
polytope. We study their multicyclic and metric structure, and we use them to
express their dual and to estimate their minimum distance.
|
[
{
"version": "v1",
"created": "Thu, 2 Nov 2006 14:18:07 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Ruano",
"Diego",
""
]
] |
new_dataset
| 0.996987 |
1002.4303
|
Wojciech Mazurczyk
|
Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski
|
What are suspicious VoIP delays?
|
17 pages, 12 figures
| null | null | null |
cs.CR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Voice over IP (VoIP) is unquestionably the most popular real-time service in
IP networks today. Recent studies have shown that it is also a suitable carrier
for information hiding. Hidden communication may pose security concerns as it
can lead to confidential information leakage. In VoIP, RTP (Real-time Transport
Protocol) in particular, which provides the means for the successful transport
of voice packets through IP networks, is suitable for steganographic purposes.
It is characterised by a high packet rate compared to other protocols used in
IP telephony, resulting in a potentially high steganographic bandwidth. The
modification of an RTP packet stream provides many opportunities for hidden
communication as the packets may be delayed, reordered or intentionally lost.
In this paper, to enable the detection of steganographic exchanges in VoIP, we
examined real RTP traffic traces to answer the questions, what do the "normal"
delays in RTP packet streams look like? and, is it possible to detect the use
of known RTP steganographic methods based on this knowledge?
|
[
{
"version": "v1",
"created": "Tue, 23 Feb 2010 11:22:50 GMT"
}
] | 2010-02-24T00:00:00 |
[
[
"Mazurczyk",
"Wojciech",
""
],
[
"Cabaj",
"Krzysztof",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
] |
new_dataset
| 0.986903 |
1002.3629
|
Jing ( Tiffany ) Li
|
Xingkai Bao, and Jing Li (Tiffany)
|
Generalized Adaptive Network Coded Cooperation (GANCC): A Unified
Framework for Network Coding and Channel Coding
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers distributed coding for multi-source single-sink data
collection wireless networks. A unified framework for network coding and
channel coding, termed "generalized adaptive network coded cooperation"
(GANCC), is proposed. Key ingredients of GANCC include: matching code graphs
with the dynamic network graphs on-the-fly, and integrating channel coding with
network coding through circulant low-density parity-check codes. Several code
constructing methods and several families of sparse-graph codes are proposed,
and information theoretical analysis is performed. It is shown that GANCC is
simple to operate, adaptive in real time, distributed in nature, and capable of
providing remarkable coding gains even with a very limited number of
cooperating users.
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2010 22:28:03 GMT"
}
] | 2010-02-22T00:00:00 |
[
[
"Bao",
"Xingkai",
"",
"Tiffany"
],
[
"Li",
"Jing",
"",
"Tiffany"
]
] |
new_dataset
| 0.956788 |
0910.3123
|
Johannes Fischer
|
Johannes Fischer
|
Wee LCP
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that longest common prefix (LCP) information can be stored in much
less space than previously known. More precisely, we show that in the presence
of the text and the suffix array, o(n) additional bits are sufficient to answer
LCP-queries asymptotically in the same time that is needed to retrieve an entry
from the suffix array. This yields the smallest compressed suffix tree with
sub-logarithmic navigation time.
|
[
{
"version": "v1",
"created": "Fri, 16 Oct 2009 13:50:12 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Feb 2010 09:19:42 GMT"
}
] | 2010-02-19T00:00:00 |
[
[
"Fischer",
"Johannes",
""
]
] |
new_dataset
| 0.973427 |
1002.3409
|
Subhash Kak
|
Subhash Kak
|
Aryabhata's Mathematics
|
Keynote Lecture at RSA Conference, San Jose, February 13-17, 2006
| null | null | null |
cs.CR math.HO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents certains aspects of the mathematics of Aryabhata that are
of interest to the cryptography community.
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2010 00:14:25 GMT"
}
] | 2010-02-19T00:00:00 |
[
[
"Kak",
"Subhash",
""
]
] |
new_dataset
| 0.999881 |
1002.3521
|
Ryuhei Mori
|
Ryuhei Mori
|
Properties and Construction of Polar Codes
|
Master thesis. The supervisor is Toshiyuki Tanaka. 24 pages, 3
figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, Ar{\i}kan introduced the method of channel polarization on which
one can construct efficient capacity-achieving codes, called polar codes, for
any binary discrete memoryless channel. In the thesis, we show that decoding
algorithm of polar codes, called successive cancellation decoding, can be
regarded as belief propagation decoding, which has been used for decoding of
low-density parity-check codes, on a tree graph. On the basis of the
observation, we show an efficient construction method of polar codes using
density evolution, which has been used for evaluation of the error probability
of belief propagation decoding on a tree graph. We further show that channel
polarization phenomenon and polar codes can be generalized to non-binary
discrete memoryless channels. Asymptotic performances of non-binary polar
codes, which use non-binary matrices called the Reed-Solomon matrices, are
better than asymptotic performances of the best explicitly known binary polar
code. We also find that the Reed-Solomon matrices are considered to be natural
generalization of the original binary channel polarization introduced by
Ar{\i}kan.
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2010 14:19:34 GMT"
}
] | 2010-02-19T00:00:00 |
[
[
"Mori",
"Ryuhei",
""
]
] |
new_dataset
| 0.977895 |
1002.3307
|
Yusuke Watanabe
|
Yusuke Watanabe and Kenji Fukumizu
|
Graph Zeta Function in the Bethe Free Energy and Loopy Belief
Propagation
|
19 pages, Annual Conference on Neural Information Processing Systems
(NIPS 2009), together with the supplementary material
|
Advances in Neural Information Processing Systems 22, pages
2017-2025
| null | null |
cs.AI cs.DM math-ph math.MP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new approach to the analysis of Loopy Belief Propagation (LBP)
by establishing a formula that connects the Hessian of the Bethe free energy
with the edge zeta function. The formula has a number of theoretical
implications on LBP. It is applied to give a sufficient condition that the
Hessian of the Bethe free energy is positive definite, which shows
non-convexity for graphs with multiple cycles. The formula clarifies the
relation between the local stability of a fixed point of LBP and local minima
of the Bethe free energy. We also propose a new approach to the uniqueness of
LBP fixed point, and show various conditions of uniqueness.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 17:55:58 GMT"
}
] | 2010-02-18T00:00:00 |
[
[
"Watanabe",
"Yusuke",
""
],
[
"Fukumizu",
"Kenji",
""
]
] |
new_dataset
| 0.990436 |
1002.3333
|
Ashley Smith
|
Ijaj Md. Laisuzzaman, Nahid Imran, Abdullah Al Nahid, Md. Ziaul and
Md. Abdul Alim
|
The Framework for Implementing ECommerce: The Role of Bank and Telecom
in Bangladesh
|
Journal of Telecommunications,Volume 1, Issue 1, pp57-62, February
2010
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe an effective framework for adapting electronic
commerce or e-commerce services in developing countries like Bangladesh. The
internet has opened up a new horizon for commerce, namely electronic commerce
(e-commerce). It entails the use of the internet in the marketing,
identification, payment and delivery of goods and services. At present internet
facilities are available in Bangladesh. Slowly, but steadily these facilities
are holding a strong position in every aspects of our life. E-commerce is one
of those sectors which need more attention if we want to be a part of global
business. Bangladesh is far-far away to adapt the main stream of e-commerce
application. Though government is shouting to take the challenges of
e-commerce, but they do not take the right step, that is why e-commerce dose
not make any real contribution in our socio-economic life. Here we propose a
model which may develop the e-commerce infrastructure of Bangladesh.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 18:04:15 GMT"
}
] | 2010-02-18T00:00:00 |
[
[
"Laisuzzaman",
"Ijaj Md.",
""
],
[
"Imran",
"Nahid",
""
],
[
"Nahid",
"Abdullah Al",
""
],
[
"Ziaul",
"Md.",
""
],
[
"Alim",
"Md. Abdul",
""
]
] |
new_dataset
| 0.983875 |
1002.3340
|
Ashley Smith
|
S. N. Singh and A. K. Singh
|
FPGA Based Sinusoidal Pulse Width Modulated Waveform Generation for
Solar (PV) Rural Home Power Inverter
|
Journal of Telecommunications,Volume 1, Issue 1, pp72-79, February
2010
|
S. N. Singh and A. K. Singh, "FPGA Based Sinusoidal Pulse Width
Modulated Waveform Generation for Solar (PV) Rural Home Power Inverter",
Journal of Telecommunications, Volume 1, Issue 1, pp72-79, February 2010
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increasing concern about global environmental protection and energy
demand due to rapid growth of population in developing countries and the
diminishing trend of resources of conventional grid supply, the need to produce
freely available pollution free natural energy such as solar/wind energy has
been drawing increasing interest in every corner of the world. In an effort to
utilize these energies effectively through Power converter, a great deal of
research is being carried out by different researchers / scientist and
engineers at different places in the world to meet the increasing demand of
load. The study presents methodology to integrate solar (PV) energy (which is
freely available in every corner of the world) with grid source and supplement
the existing grid power in rural houses during its cut off or restricted supply
period. In order to get consistency in supply a DG is also added as a standby
source in the proposed integration of network. The software using novel Direct
PWM modulation strategy and its soft control features extend the flexibility to
control converter (inverter) parameters like voltage, frequency, number of
samples of PWM pulses constituting sine-wave without changing any hardware
configuration in the circuit. The system simulation of PWM Pulse generation has
been done on a XILINX based FPGA Spartan 3E board using VHDL code. The test on
simulation of PWM generation program after synthesis and compilation were
recorded and verified on a prototype sample.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2010 18:16:57 GMT"
}
] | 2010-02-18T00:00:00 |
[
[
"Singh",
"S. N.",
""
],
[
"Singh",
"A. K.",
""
]
] |
new_dataset
| 0.99945 |
0909.3226
|
Stefano Buzzi
|
Stefano Buzzi, Luca Venturino, Alessio Zappone, Antonio De Maio
|
Blind user detection in doubly-dispersive DS/CDMA channels
|
Accepted for publication on IEEE Transactions on Signal Processing
|
IEEE Transactions on Signal Processing, Vol. 58, No. 3, pp. 1446 -
1451, March 2010
|
10.1109/TSP.2009.2033001
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we consider the problem of detecting the presence of a new user
in a direct-sequence/code-division-multiple-access (DS/CDMA) system with a
doubly-dispersive fading channel, and we propose a novel blind detection
strategy which only requires knowledge of the spreading code of the user to be
detected, but no prior information as to the time-varying channel impulse
response and the structure of the multiaccess interference. The proposed
detector has a bounded constant false alarm rate (CFAR) under the design
assumptions, while providing satisfactory detection performance even in the
presence of strong cochannel interference and high user mobility.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 14:10:09 GMT"
}
] | 2010-02-17T00:00:00 |
[
[
"Buzzi",
"Stefano",
""
],
[
"Venturino",
"Luca",
""
],
[
"Zappone",
"Alessio",
""
],
[
"De Maio",
"Antonio",
""
]
] |
new_dataset
| 0.959908 |
1002.2966
|
Salah A. Aly
|
Salah A. Aly, Alexei Ashikhmin
|
Nonbinary Quantum Cyclic and Subsystem Codes Over
Asymmetrically-decohered Quantum Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum computers theoretically are able to solve certain problems more
quickly than any deterministic or probabilistic computers. A quantum computer
exploits the rules of quantum mechanics to speed up computations. However, one
has to mitigate the resulting noise and decoherence effects to avoid
computational errors in order to successfully build quantum computers.
In this paper, we construct asymmetric quantum codes to protect quantum
information over asymmetric quantum channels, $\Pr Z \geq \Pr X$. Two generic
methods are presented to derive asymmetric quantum cyclic codes using the
generator polynomials and defining sets of classical cyclic codes.
Consequently, the methods allow us to construct several families of quantum
BCH, RS, and RM codes over asymmetric quantum channels. Finally, the methods
are used to construct families of asymmetric subsystem codes.
|
[
{
"version": "v1",
"created": "Mon, 15 Feb 2010 22:17:56 GMT"
}
] | 2010-02-17T00:00:00 |
[
[
"Aly",
"Salah A.",
""
],
[
"Ashikhmin",
"Alexei",
""
]
] |
new_dataset
| 0.998978 |
1002.3083
|
Rafael Caballero
|
Hai-Feng Guo, Wen Zheng, Mahadevan Subramaniam
|
L2C2: Logic-based LSC Consistency Checking
|
To be included in the on-line proceedings of WLPE'2009
|
WLPE 2009 proceedings
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Live sequence charts (LSCs) have been proposed as an inter-object
scenario-based specification and visual programming language for reactive
systems. In this paper, we introduce a logic-based framework to check the
consistency of an LSC specification. An LSC simulator has been implemented in
logic programming, utilizing a memoized depth-first search strategy, to show
how a reactive system in LSCs would response to a set of external event
sequences. A formal notation is defined to specify external event sequences,
extending the regular expression with a parallel operator and a testing
control. The parallel operator allows interleaved parallel external events to
be tested in LSCs simultaneously; while the testing control provides users to a
new approach to specify and test certain temporal properties (e.g., CTL
formula) in a form of LSC. Our framework further provides either a state
transition graph or a failure trace to justify the consistency checking
results.
|
[
{
"version": "v1",
"created": "Tue, 16 Feb 2010 14:09:43 GMT"
}
] | 2010-02-17T00:00:00 |
[
[
"Guo",
"Hai-Feng",
""
],
[
"Zheng",
"Wen",
""
],
[
"Subramaniam",
"Mahadevan",
""
]
] |
new_dataset
| 0.9985 |
1002.2867
|
EPTCS
|
Magnus Johansson (Uppsala University), Bj\"orn Victor (Uppsala
University), Joachim Parrow (Uppsala University)
|
A Fully Abstract Symbolic Semantics for Psi-Calculi
| null |
EPTCS 18, 2010, pp. 17-31
|
10.4204/EPTCS.18.2
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a symbolic transition system and bisimulation equivalence for
psi-calculi, and show that it is fully abstract with respect to bisimulation
congruence in the non-symbolic semantics.
A psi-calculus is an extension of the pi-calculus with nominal data types for
data structures and for logical assertions representing facts about data. These
can be transmitted between processes and their names can be statically scoped
using the standard pi-calculus mechanism to allow for scope migrations.
Psi-calculi can be more general than other proposed extensions of the
pi-calculus such as the applied pi-calculus, the spi-calculus, the fusion
calculus, or the concurrent constraint pi-calculus.
Symbolic semantics are necessary for an efficient implementation of the
calculus in automated tools exploring state spaces, and the full abstraction
property means the semantics of a process does not change from the original.
|
[
{
"version": "v1",
"created": "Mon, 15 Feb 2010 12:30:43 GMT"
}
] | 2010-02-16T00:00:00 |
[
[
"Johansson",
"Magnus",
"",
"Uppsala University"
],
[
"Victor",
"Björn",
"",
"Uppsala\n University"
],
[
"Parrow",
"Joachim",
"",
"Uppsala University"
]
] |
new_dataset
| 0.997666 |
1002.2872
|
EPTCS
|
Gilles Dowek (\'Ecole Polytechnique and INRIA), C\'esar Mu\~noz
(National Institute of Aerospace), Camilo Rocha (University of Illinois)
|
Rewriting Logic Semantics of a Plan Execution Language
| null |
EPTCS 18, 2010, pp. 77-91
|
10.4204/EPTCS.18.6
| null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Plan Execution Interchange Language (PLEXIL) is a synchronous language
developed by NASA to support autonomous spacecraft operations. In this paper,
we propose a rewriting logic semantics of PLEXIL in Maude, a high-performance
logical engine. The rewriting logic semantics is by itself a formal interpreter
of the language and can be used as a semantic benchmark for the implementation
of PLEXIL executives. The implementation in Maude has the additional benefit of
making available to PLEXIL designers and developers all the formal analysis and
verification tools provided by Maude. The formalization of the PLEXIL semantics
in rewriting logic poses an interesting challenge due to the synchronous nature
of the language and the prioritized rules defining its semantics. To overcome
this difficulty, we propose a general procedure for simulating synchronous set
relations in rewriting logic that is sound and, for deterministic relations,
complete. We also report on two issues at the design level of the original
PLEXIL semantics that were identified with the help of the executable
specification in Maude.
|
[
{
"version": "v1",
"created": "Mon, 15 Feb 2010 12:48:09 GMT"
}
] | 2010-02-16T00:00:00 |
[
[
"Dowek",
"Gilles",
"",
"École Polytechnique and INRIA"
],
[
"Muñoz",
"César",
"",
"National Institute of Aerospace"
],
[
"Rocha",
"Camilo",
"",
"University of Illinois"
]
] |
new_dataset
| 0.997475 |
0909.3790
|
Mikhail Berlinkov
|
M.V. Berlinkov
|
On Carpi and Alessandro conjecture
|
11 pages, 1 figure
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The well known open \v{C}ern\'y conjecture states that each \san with $n$
states has a \sw of length at most $(n-1)^2$. On the other hand, the best known
upper bound is cubic of $n$. Recently, in the paper \cite{CARPI1} of Alessandro
and Carpi, the authors introduced the new notion of strongly transitivity for
automata and conjectured that this property with a help of \emph{Extension}
method allows to get a quadratic upper bound for the length of the shortest
\sws. They also confirmed this conjecture for circular automata. We disprove
this conjecture and the long-standing \emph{Extension} conjecture too. We also
consider the widely used Extension method and its perspectives.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 14:43:15 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Feb 2010 12:09:32 GMT"
}
] | 2010-02-15T00:00:00 |
[
[
"Berlinkov",
"M. V.",
""
]
] |
new_dataset
| 0.956124 |
0910.4839
|
Patrick Erik Bradley
|
Patrick Erik Bradley
|
A $p$-adic RanSaC algorithm for stereo vision using Hensel lifting
|
15 pages; typos removed, abstract changed, computation error removed
|
p-Adic Numbers, Ultrametric Analysis, and Applications, Vol. 2,
No. 1 (2010), 55-67
|
10.1134/S2070046610010048
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $p$-adic variation of the Ran(dom) Sa(mple) C(onsensus) method for solving
the relative pose problem in stereo vision is developped. From two 2-adically
encoded images a random sample of five pairs of corresponding points is taken,
and the equations for the essential matrix are solved by lifting solutions
modulo 2 to the 2-adic integers. A recently devised $p$-adic hierarchical
classification algorithm imitating the known LBG quantisation method classifies
the solutions for all the samples after having determined the number of
clusters using the known intra-inter validity of clusterings. In the successful
case, a cluster ranking will determine the cluster containing a 2-adic
approximation to the "true" solution of the problem.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2009 09:34:29 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 17:24:27 GMT"
}
] | 2010-02-15T00:00:00 |
[
[
"Bradley",
"Patrick Erik",
""
]
] |
new_dataset
| 0.979336 |
1002.2353
|
Hamed Haddadi
|
Hamed Haddadi
|
Fighting Online Click-Fraud Using Bluff Ads
|
Draft
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Online advertising is currently the greatest source of revenue for many
Internet giants. The increased number of specialized websites and modern
profiling techniques, have all contributed to an explosion of the income of ad
brokers from online advertising. The single biggest threat to this growth, is
however, click-fraud. Trained botnets and even individuals are hired by
click-fraud specialists in order to maximize the revenue of certain users from
the ads they publish on their websites, or to launch an attack between
competing businesses.
In this note we wish to raise the awareness of the networking research
community on potential research areas within this emerging field. As an example
strategy, we present Bluff ads; a class of ads that join forces in order to
increase the effort level for click-fraud spammers. Bluff ads are either
targeted ads, with irrelevant display text, or highly relevant display text,
with irrelevant targeting information. They act as a litmus test for the
legitimacy of the individual clicking on the ads. Together with standard
threshold-based methods, fake ads help to decrease click-fraud levels.
|
[
{
"version": "v1",
"created": "Thu, 11 Feb 2010 14:59:22 GMT"
}
] | 2010-02-12T00:00:00 |
[
[
"Haddadi",
"Hamed",
""
]
] |
new_dataset
| 0.998813 |
1002.2408
|
Rdv Ijcsis
|
D. Jayanthi, N. Devi, S. SwarnaParvathi
|
Automatic diagnosis of retinal diseases from color retinal images
|
IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 234-238, January 2010, USA
| null |
Journal of Computer Science, ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Teleophthalmology holds a great potential to improve the quality, access, and
affordability in health care. For patients, it can reduce the need for travel
and provide the access to a superspecialist. Ophthalmology lends itself easily
to telemedicine as it is a largely image based diagnosis. The main goal of the
proposed system is to diagnose the type of disease in the retina and to
automatically detect and segment retinal diseases without human supervision or
interaction. The proposed system will diagnose the disease present in the
retina using a neural network based classifier.The extent of the disease spread
in the retina can be identified by extracting the textural features of the
retina. This system will diagnose the following type of diseases: Diabetic
Retinopathy and Drusen.
|
[
{
"version": "v1",
"created": "Thu, 11 Feb 2010 19:54:08 GMT"
}
] | 2010-02-12T00:00:00 |
[
[
"Jayanthi",
"D.",
""
],
[
"Devi",
"N.",
""
],
[
"SwarnaParvathi",
"S.",
""
]
] |
new_dataset
| 0.97624 |
1002.2423
|
Rdv Ijcsis
|
Jatinder Singh, Savita Gupta, Lakhwinder Kaur
|
A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ)
Attacks in Wireless LAN
|
IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 284-291, January 2010, USA
| null |
Journal of Computer Science, ISSN 1947 5500
|
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently an alternative of DDoS attacks called shrew attacks or Reduction of
Quality (RoQ) has been identified which is very much difficult to detect. The
RoQ attacks can use source and destination IP address spoofing, and they do not
have distinct periodicity, and may not filter the attack packets precisely. In
this paper, we propose to design the MAC layer based defense architecture for
RoQ attacks in Wireless LAN which includes the detection and response stages.
The attackers are detected by checking the RTS CTS packets from the MAC layer
and the corresponding attack flows are blocked or rejected. By our simulation
results, we show that our proposed technique achieves reduces the attack
throughput there by increasing the received bandwidth and reducing the packet
loss of legitimate users.
|
[
{
"version": "v1",
"created": "Thu, 11 Feb 2010 20:38:04 GMT"
}
] | 2010-02-12T00:00:00 |
[
[
"Singh",
"Jatinder",
""
],
[
"Gupta",
"Savita",
""
],
[
"Kaur",
"Lakhwinder",
""
]
] |
new_dataset
| 0.985359 |
1002.2184
|
Rdv Ijcsis
|
V. Ashok, T. Balakumaran, C. Gowrishankar, I.L.A. Vennila, A. Nirmal
kumar
|
The Fast Haar Wavelet Transform for Signal & Image Processing
|
IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 126-130, January 2010, USA
| null |
Journal of Computer Science, ISSN 19475500
|
cs.MM cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A method for the design of Fast Haar wavelet for signal processing and image
processing has been proposed. In the proposed work, the analysis bank and
synthesis bank of Haar wavelet is modified by using polyphase structure.
Finally, the Fast Haar wavelet was designed and it satisfies alias free and
perfect reconstruction condition. Computational time and computational
complexity is reduced in Fast Haar wavelet transform.
|
[
{
"version": "v1",
"created": "Wed, 10 Feb 2010 19:27:25 GMT"
}
] | 2010-02-11T00:00:00 |
[
[
"Ashok",
"V.",
""
],
[
"Balakumaran",
"T.",
""
],
[
"Gowrishankar",
"C.",
""
],
[
"Vennila",
"I. L. A.",
""
],
[
"kumar",
"A. Nirmal",
""
]
] |
new_dataset
| 0.978168 |
1002.1773
|
Philippe Wenger
|
Philippe Wenger (IRCCyN)
|
Cuspidal and Noncuspidal Robot Manipulators
| null |
Robotica 25, 6 (2007) 717-724
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article synthezises the most important results on the kinematics of
cuspidal manipulators i.e. nonredundant manipulators that can change posture
without meeting a singularity. The characteristic surfaces, the uniqueness
domains and the regions of feasible paths in the workspace are defined. Then,
several sufficient geometric conditions for a manipulator to be noncuspidal are
enumerated and a general necessary and sufficient condition for a manipulator
to be cuspidal is provided. An explicit DH-parameter-based condition for an
orthogonal manipulator to be cuspidal is derived. The full classification of 3R
orthogonal manipulators is provided and all types of cuspidal and noncuspidal
orthogonal manipulators are enumerated. Finally, some facts about cuspidal and
noncuspidal 6R manipulators are reported.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 2010 04:44:26 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
new_dataset
| 0.999573 |
1002.1828
|
Francesc Rossell\'o
|
Arnau Mir, Francesc Rossello
|
The median of the distance between two leaves in a phylogenetic tree
|
4 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish a limit formula for the median of the distance between two
leaves in a fully resolved unrooted phylogenetic tree with n leaves. More
precisely, we prove that this median is equal, in the limit, to the square root
of 4*ln(2)*n.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 2010 11:39:48 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Mir",
"Arnau",
""
],
[
"Rossello",
"Francesc",
""
]
] |
new_dataset
| 0.989329 |
1002.1953
|
Rdv Ijcsis
|
Dr. R. Shashikumar, C. N. Vijay Kumar, M. Nagendrakumar, C. S.
Hemanthkumar
|
Ahb Compatible DDR Sdram Controller Ip Core for Arm Based Soc
|
IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 77-85, January 2010, USA
| null |
Journal of Computer Science, ISSN 1947 5500
|
cs.AR cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
DDR SDRAM is similar in function to the regular SDRAM but doubles the
bandwidth of the memory by transferring data on both edges of the clock cycles.
DDR SDRAM most commonly used in various embedded application like networking,
image or video processing, Laptops ete. Now a days many applications needs more
and more cheap and fast memory. Especially in the field of signal processing,
requires significant amount of memory. The most used type of dynamic memory for
that purpose is DDR SDRAM. For FPGA design the IC manufacturers are providing
commercial memory controller IP cores working only on their products. Main
disadvantage is the lack of memory access optimization for random memory access
patterns. The data path part of those controllers can be used free of charge.
This work propose an architecture of a DDR SDRAM controller, which takes
advantage of those available and well tested data paths and can be used for any
FPGA device or ASIC design.(5). In most of the SOC design, DDR SDRAM is
commonly used. ARM processor is widely used in SOCs; so that we focused to
implement AHB compatible DDR SDRAM controller suitable for ARM based SOC
design.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 2010 19:47:34 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Shashikumar",
"Dr. R.",
""
],
[
"Kumar",
"C. N. Vijay",
""
],
[
"Nagendrakumar",
"M.",
""
],
[
"Hemanthkumar",
"C. S.",
""
]
] |
new_dataset
| 0.9964 |
1002.1954
|
Rdv Ijcsis
|
Hadj Zerrouki, Mohamed Feham
|
High Throughput of WiMAX MIMO OFDM Including Adaptive Modulation and
Coding
|
IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 86-91, January 2010, USA
| null |
Journal of Computer Science, ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WiMAX technology is based on the IEEE 802.16 specification of which IEEE
802.16-2004 and 802.16e amendment are Physical (PHY) layer specifications. IEEE
802.16-2004 currently supports several multiple-antenna options including
Space-Time Codes (STC), Multiple-Input Multiple-Output (MIMO) antenna systems
and Adaptive Antenna Systems (AAS). The most recent WiMAX standard (802.16e)
supports broadband applications to mobile terminals and laptops. Using Adaptive
Modulation and Coding (AMC) we analyze the performance of OFDM physical layer
in WiMAX based on the simulation results of Bit Error Rate (BER), and data
throughput. The performance analysis of OFDM PHY is done. In this paper, an
extension to the basic SISO mode, a number of 2 by 2 MIMO extensions are
analysed under different combinations of digital modulation (QPSK, 16QAM and
64QAM) and Convolutional Code (CC) with half, two-third and three quarter rated
codes. The intent of this paper is to provide an idea of the benefits of
multiple antenna systems over single antenna systems in WiMAX type deployments.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 2010 19:53:22 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Zerrouki",
"Hadj",
""
],
[
"Feham",
"Mohamed",
""
]
] |
new_dataset
| 0.998858 |
1002.1549
|
Andrey Breslav
|
Andrey Breslav
|
Extensible type checker for parser generation
| null | null | null | null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parser generators generate translators from language specifications. In many
cases, such specifications contain semantic actions written in the same
language as the generated code. Since these actions are subject to little
static checking, they are usually a source of errors which are discovered only
when generated code is compiled.
In this paper we propose a parser generator front-end which statically checks
semantic actions for typing errors and prevents such errors from appearing in
generated code. The type checking procedure is extensible to support many
implementation languages. An extension for Java is presented along with an
extension for declarative type system descriptions.
|
[
{
"version": "v1",
"created": "Mon, 8 Feb 2010 08:51:06 GMT"
}
] | 2010-02-09T00:00:00 |
[
[
"Breslav",
"Andrey",
""
]
] |
new_dataset
| 0.974415 |
1002.1687
|
Rdv Ijcsis
|
Mahendra kumar. S, Senthil Prakash. K
|
Wireless Congestion Control Protocol For Multihop Ad Hoc Networks
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS January 2010, ISSN 1947 5500,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 7, No. 1, pp. 25-31, January 2010, USA
| null |
Computer Science Volume 7 ISSN 19475500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The traditional TCP congestion control mechanism encounters a number of new
problems and suffers a poor performance when the IEEE 802.11 MAC protocol is
used in multihop ad hoc networks. Many of the problems result from medium
contention at the MAC layer. In this paper, I first illustrate that severe
medium contention and congestion are intimately coupled, and TCP s congestion
control algorithm becomes too coarse in its granularity, causing throughput
instability and excessively long delay. Further, we illustrate TCP s severe
unfairness problem due to the medium contention and the tradeoff between
aggregate throughput and fairness. Then, based on the novel use of channel
busyness ratio, a more accurate metric to characterize the network utilization
and congestion status, I propose a new wireless congestion control protocol
(WCCP) to efficiently and fairly support the transport service in multihop ad
hoc networks. In this protocol, each forwarding node along a traffic flow
exercises the internode and intranode fair resource allocation and determines
the MAC layer feedback accordingly. The endtoend feedback, which is ultimately
determined by the bottleneck node along the flow, is carried back to the source
to control its sending rate. Extensive simulations show that WCCP significantly
outperforms traditional TCP in terms of channel utilization, delay, and
fairness, and eliminates the starvation problem.
|
[
{
"version": "v1",
"created": "Mon, 8 Feb 2010 19:04:05 GMT"
}
] | 2010-02-09T00:00:00 |
[
[
"S",
"Mahendra kumar.",
""
],
[
"K",
"Senthil Prakash.",
""
]
] |
new_dataset
| 0.998813 |
0907.0877
|
Stephen Bloom
|
S.L. Bloom and Z. Esik
|
Algebraic Ordinals
|
30 pages
| null | null | null |
cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An algebraic tree T is one determined by a finite system of fixed point
equations. The frontier \Fr(T) of an algebraic tree t is linearly ordered by
the lexicographic order \lex. When (\Fr(T),\lex) is well-ordered, its order
type is an \textbf{algebraic ordinal}. We prove that the algebraic ordinals are
exactly the ordinals less than $\omega^{\omega^\omega}$.
|
[
{
"version": "v1",
"created": "Sun, 5 Jul 2009 18:24:28 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Feb 2010 14:49:46 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Feb 2010 14:49:21 GMT"
}
] | 2010-02-08T00:00:00 |
[
[
"Bloom",
"S. L.",
""
],
[
"Esik",
"Z.",
""
]
] |
new_dataset
| 0.984894 |
1002.1099
|
Ioannis Chatzigiannakis
|
Ioannis Chatzigiannakis, Georgios Mylonas, Orestis Akribopoulos,
Marios Logaras, Panagiotis Kokkinos, Paul Spirakis
|
The "Hot Potato" Case: Challenges in Multiplayer Pervasive Games Based
on Ad hoc Mobile Sensor Networks and the Experimental Evaluation of a
Prototype Game
| null | null | null | null |
cs.HC cs.DC cs.MA cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we discuss multiplayer pervasive games that rely on the use of
ad hoc mobile sensor networks. The unique feature in such games is that players
interact with each other and their surrounding environment by using movement
and presence as a means of performing game-related actions, utilizing sensor
devices. We discuss the fundamental issues and challenges related to these type
of games and the scenarios associated with them. We also present and evaluate
an example of such a game, called the "Hot Potato", developed using the Sun
SPOT hardware platform. We provide a set of experimental results, so as to both
evaluate our implementation and also to identify issues that arise in pervasive
games which utilize sensor network nodes, which show that there is great
potential in this type of games.
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2010 23:02:02 GMT"
}
] | 2010-02-08T00:00:00 |
[
[
"Chatzigiannakis",
"Ioannis",
""
],
[
"Mylonas",
"Georgios",
""
],
[
"Akribopoulos",
"Orestis",
""
],
[
"Logaras",
"Marios",
""
],
[
"Kokkinos",
"Panagiotis",
""
],
[
"Spirakis",
"Paul",
""
]
] |
new_dataset
| 0.968208 |
1002.1162
|
Vishal Goyal
|
Shuchita Upadhayaya, Charu Gandhi
|
Node Disjoint Multipath Routing Considering Link and Node Stability
protocol: A characteristic Evaluation
|
International Journal of Computer Science Issues, IJCSI, Vol. 7,
Issue 1, No. 2, January 2010,
http://ijcsi.org/articles/Node-Disjoint-Multipath-Routing-Considering-Link-and-Node-Stability-protocol-A-characteristic-Evaluation.php
|
International Journal of Computer Science Issues, IJCSI, Vol. 7,
Issue 1, No. 2, January 2010,
http://ijcsi.org/articles/Node-Disjoint-Multipath-Routing-Considering-Link-and-Node-Stability-protocol-A-characteristic-Evaluation.php
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS)
routing in such networks is usually limited by the network breakage due to
either node mobility or energy depletion of the mobile nodes. Also, to fulfill
certain quality parameters, presence of multiple node-disjoint paths becomes
essential. Such paths aid in the optimal traffic distribution and reliability
in case of path breakages. Thus, to cater various challenges in QoS routing in
Mobile Add hoc Networks, a Node Disjoint Multipath Routing Considering Link and
Node Stability (NDMLNR) protocol has been proposed by the authors. The metric
used to select the paths takes into account the stability of the nodes and the
corresponding links. This paper studies various challenges in the QoS routing
and presents the characteristic evaluation of NDMLNR w.r.t various existing
protocols in this area.
|
[
{
"version": "v1",
"created": "Fri, 5 Feb 2010 09:14:56 GMT"
}
] | 2010-02-08T00:00:00 |
[
[
"Upadhayaya",
"Shuchita",
""
],
[
"Gandhi",
"Charu",
""
]
] |
new_dataset
| 0.98542 |
1002.1193
|
Vishal Goyal
|
Dhirendra Sharma, Vikram Singh
|
ICT in Universities of the Western Himalayan Region of India II: A
Comparative SWOT Analysis
|
International Journal of Computer Science Issues, IJCSI, Vol. 7,
Issue 1, No. 3, January 2010,
http://ijcsi.org/articles/ICT-in-Universities-of-the-Western-Himalayan-Region-of-India-II-A-Comparative-SWOT-Analysis.php
|
International Journal of Computer Science Issues, IJCSI, Vol. 7,
Issue 1, No. 3, January 2010,
http://ijcsi.org/articles/ICT-in-Universities-of-the-Western-Himalayan-Region-of-India-II-A-Comparative-SWOT-Analysis.php
| null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study presents a comparative SWOT analysis to comprehend the pattern of
development of ICT within six universities of western Himalayan region of
India. With the objective of achieving quality and excellence in higher
education system in the region, this study provides a basis to decision makers
to exploit opportunities and minimize the external threats. The SWOT analysis
of different universities, placed under three categories, has been undertaken
within the four-tier framework used earlier by the authors. Guided by the
initiatives of National Mission on Education through ICT (NMEICT) for SWOT
analysis, findings of this paper reveal, relative consistency of these three
categories of universities, with the earlier study. A few suggestions, as
opportunities, with an emphasis on problem solving orientation in higher
education, have been made to strengthen the leadership of universities in the
field of ICT.
|
[
{
"version": "v1",
"created": "Fri, 5 Feb 2010 10:51:00 GMT"
}
] | 2010-02-08T00:00:00 |
[
[
"Sharma",
"Dhirendra",
""
],
[
"Singh",
"Vikram",
""
]
] |
new_dataset
| 0.972996 |
1002.0874
|
Fabio Vandin
|
Roberto Grossi, Andrea Pietracaprina, Nadia Pisanti, Geppino Pucci,
Eli Upfal, Fabio Vandin
|
MADMX: A Novel Strategy for Maximal Dense Motif Extraction
|
A preliminary version of this work was presented in WABI 2009. 10
pages, 0 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop, analyze and experiment with a new tool, called MADMX, which
extracts frequent motifs, possibly including don't care characters, from
biological sequences. We introduce density, a simple and flexible measure for
bounding the number of don't cares in a motif, defined as the ratio of solid
(i.e., different from don't care) characters to the total length of the motif.
By extracting only maximal dense motifs, MADMX reduces the output size and
improves performance, while enhancing the quality of the discoveries. The
efficiency of our approach relies on a newly defined combining operation,
dubbed fusion, which allows for the construction of maximal dense motifs in a
bottom-up fashion, while avoiding the generation of nonmaximal ones. We provide
experimental evidence of the efficiency and the quality of the motifs returned
by MADMX
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2010 01:20:12 GMT"
}
] | 2010-02-05T00:00:00 |
[
[
"Grossi",
"Roberto",
""
],
[
"Pietracaprina",
"Andrea",
""
],
[
"Pisanti",
"Nadia",
""
],
[
"Pucci",
"Geppino",
""
],
[
"Upfal",
"Eli",
""
],
[
"Vandin",
"Fabio",
""
]
] |
new_dataset
| 0.999161 |
1002.0936
|
EPTCS
|
Matthew Kehrt (University of Washington), Laura Effinger-Dean
(University of Washington), Michael Schmitz (University of Washington), Dan
Grossman (University of Washington)
|
Programming Idioms for Transactional Events
| null |
EPTCS 17, 2010, pp. 43-48
|
10.4204/EPTCS.17.4
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transactional events (TE) are an extension of Concurrent ML (CML), a
programming model for synchronous message-passing. Prior work has focused on
TE's formal semantics and its implementation. This paper considers programming
idioms, particularly those that vary unexpectedly from the corresponding CML
idioms. First, we solve a subtle problem with client-server protocols in TE.
Second, we argue that CML's wrap and guard primitives do not translate well to
TE, and we suggest useful workarounds. Finally, we discuss how to rewrite CML
protocols that use abort actions.
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2010 09:43:21 GMT"
}
] | 2010-02-05T00:00:00 |
[
[
"Kehrt",
"Matthew",
"",
"University of Washington"
],
[
"Effinger-Dean",
"Laura",
"",
"University of Washington"
],
[
"Schmitz",
"Michael",
"",
"University of Washington"
],
[
"Grossman",
"Dan",
"",
"University of Washington"
]
] |
new_dataset
| 0.957074 |
1002.0940
|
EPTCS
|
Prodromos Gerakios (National Technical University of Athens), Nikolaos
Papaspyrou (National Technical University of Athens), Konstantinos Sagonas
(National Technical University of Athens)
|
A Concurrent Language with a Uniform Treatment of Regions and Locks
| null |
EPTCS 17, 2010, pp. 79-93
|
10.4204/EPTCS.17.7
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A challenge for programming language research is to design and implement
multi-threaded low-level languages providing static guarantees for memory
safety and freedom from data races. Towards this goal, we present a concurrent
language employing safe region-based memory management and hierarchical locking
of regions. Both regions and locks are treated uniformly, and the language
supports ownership transfer, early deallocation of regions and early release of
locks in a safe manner.
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2010 09:51:04 GMT"
}
] | 2010-02-05T00:00:00 |
[
[
"Gerakios",
"Prodromos",
"",
"National Technical University of Athens"
],
[
"Papaspyrou",
"Nikolaos",
"",
"National Technical University of Athens"
],
[
"Sagonas",
"Konstantinos",
"",
"National Technical University of Athens"
]
] |
new_dataset
| 0.984169 |
1002.0971
|
Benjamin Nguyen
|
Benjamin Nguyen (PRISM), Fran\c{c}ois-Xavier Dudouet (LASP, IRISES),
Dario Colazzo (LRI), Antoine Vion (LEST), Ioana Manolescu (INRIA Saclay - Ile
de France), Pierre Senellart
|
The WebStand Project
| null |
WebSci'09: Society On-Line Conference, Greece (2009)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the state of advancement of the French ANR WebStand
project. The objective of this project is to construct a customizable XML based
warehouse platform to acquire, transform, analyze, store, query and export data
from the web, in particular mailing lists, with the final intension of using
this data to perform sociological studies focused on social groups of World
Wide Web, with a specific emphasis on the temporal aspects of this data. We are
currently using this system to analyze the standardization process of the W3C,
through its social network of standard setters.
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2010 12:09:15 GMT"
}
] | 2010-02-05T00:00:00 |
[
[
"Nguyen",
"Benjamin",
"",
"PRISM"
],
[
"Dudouet",
"François-Xavier",
"",
"LASP, IRISES"
],
[
"Colazzo",
"Dario",
"",
"LRI"
],
[
"Vion",
"Antoine",
"",
"LEST"
],
[
"Manolescu",
"Ioana",
"",
"INRIA Saclay - Ile\n de France"
],
[
"Senellart",
"Pierre",
""
]
] |
new_dataset
| 0.971915 |
1002.0678
|
Andreas Faatz Dr.
|
Andreas Faatz, Andreas Zinnen
|
FORMT: Form-based Mutation Testing of Logical Specifications
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The draft paper defines a system, which is capable of maintaining bases of
test cases for logical specifications. The specifications, which are subject to
this system are transformed from their original shape in first-order logic to
form-based expressions as originally introduced in logics of George
Spencer-Brown. The innovation comes from the operations the system provides
when injecting faults - so-called mutations - to the specifications. The system
presented here applies to logical specifications from areas as different as
programming, ontologies or hardware specifications.
|
[
{
"version": "v1",
"created": "Wed, 3 Feb 2010 09:35:21 GMT"
}
] | 2010-02-04T00:00:00 |
[
[
"Faatz",
"Andreas",
""
],
[
"Zinnen",
"Andreas",
""
]
] |
new_dataset
| 0.999854 |
0912.2815
|
Liam Roditty
|
David Peleg, Liam Roditty
|
Relaxed spanners for directed disk graphs
| null | null | null | null |
cs.DS cs.CG
|
http://creativecommons.org/licenses/by/3.0/
|
Let $(V,\delta)$ be a finite metric space, where $V$ is a set of $n$ points
and $\delta$ is a distance function defined for these points. Assume that
$(V,\delta)$ has a constant doubling dimension $d$ and assume that each point
$p\in V$ has a disk of radius $r(p)$ around it. The disk graph that corresponds
to $V$ and $r(\cdot)$ is a \emph{directed} graph $I(V,E,r)$, whose vertices are
the points of $V$ and whose edge set includes a directed edge from $p$ to $q$
if $\delta(p,q)\leq r(p)$. In \cite{PeRo08} we presented an algorithm for
constructing a $(1+\eps)$-spanner of size $O(n/\eps^d \log M)$, where $M$ is
the maximal radius $r(p)$. The current paper presents two results. The first
shows that the spanner of \cite{PeRo08} is essentially optimal, i.e., for
metrics of constant doubling dimension it is not possible to guarantee a
spanner whose size is independent of $M$. The second result shows that by
slightly relaxing the requirements and allowing a small perturbation of the
radius assignment, considerably better spanners can be constructed. In
particular, we show that if it is allowed to use edges of the disk graph
$I(V,E,r_{1+\eps})$, where $r_{1+\eps}(p) = (1+\eps)\cdot r(p)$ for every $p\in
V$, then it is possible to get a $(1+\eps)$-spanner of size $O(n/\eps^d)$ for
$I(V,E,r)$. Our algorithm is simple and can be implemented efficiently.
|
[
{
"version": "v1",
"created": "Tue, 15 Dec 2009 07:31:51 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Feb 2010 13:45:25 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Peleg",
"David",
""
],
[
"Roditty",
"Liam",
""
]
] |
new_dataset
| 0.988207 |
0912.3188
|
Shiri Chechik
|
Shiri Chechik and David Peleg
|
Robust Fault Tolerant uncapacitated facility location
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the uncapacitated facility location problem, given a graph, a set of
demands and opening costs, it is required to find a set of facilities R, so as
to minimize the sum of the cost of opening the facilities in R and the cost of
assigning all node demands to open facilities. This paper concerns the robust
fault-tolerant version of the uncapacitated facility location problem (RFTFL).
In this problem, one or more facilities might fail, and each demand should be
supplied by the closest open facility that did not fail. It is required to find
a set of facilities R, so as to minimize the sum of the cost of opening the
facilities in R and the cost of assigning all node demands to open facilities
that did not fail, after the failure of up to \alpha facilities. We present a
polynomial time algorithm that yields a 6.5-approximation for this problem with
at most one failure and a 1.5 + 7.5\alpha-approximation for the problem with at
most \alpha > 1 failures. We also show that the RFTFL problem is NP-hard even
on trees, and even in the case of a single failure.
|
[
{
"version": "v1",
"created": "Wed, 16 Dec 2009 16:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Feb 2010 11:13:09 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Chechik",
"Shiri",
""
],
[
"Peleg",
"David",
""
]
] |
new_dataset
| 0.96466 |
1002.0412
|
Dakshina Ranjan Kisku
|
Dakshina Ranjan Kisku, Hunny Mehrotra, Phalguni Gupta, and Jamuna
Kanta Sing
|
SIFT-based Ear Recognition by Fusion of Detected Keypoints from Color
Similarity Slice Regions
|
6 pages, 4 figures, ACTEA 2009
| null | null | null |
cs.CV cs.AI
|
http://creativecommons.org/licenses/by/3.0/
|
Ear biometric is considered as one of the most reliable and invariant
biometrics characteristics in line with iris and fingerprint characteristics.
In many cases, ear biometrics can be compared with face biometrics regarding
many physiological and texture characteristics. In this paper, a robust and
efficient ear recognition system is presented, which uses Scale Invariant
Feature Transform (SIFT) as feature descriptor for structural representation of
ear images. In order to make it more robust to user authentication, only the
regions having color probabilities in a certain ranges are considered for
invariant SIFT feature extraction, where the K-L divergence is used for keeping
color consistency. Ear skin color model is formed by Gaussian mixture model and
clustering the ear color pattern using vector quantization. Finally, K-L
divergence is applied to the GMM framework for recording the color similarity
in the specified ranges by comparing color similarity between a pair of
reference model and probe ear images. After segmentation of ear images in some
color slice regions, SIFT keypoints are extracted and an augmented vector of
extracted SIFT features are created for matching, which is accomplished between
a pair of reference model and probe ear images. The proposed technique has been
tested on the IITK Ear database and the experimental results show improvements
in recognition accuracy while invariant features are extracted from color slice
regions to maintain the robustness of the system.
|
[
{
"version": "v1",
"created": "Tue, 2 Feb 2010 08:06:04 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Kisku",
"Dakshina Ranjan",
""
],
[
"Mehrotra",
"Hunny",
""
],
[
"Gupta",
"Phalguni",
""
],
[
"Sing",
"Jamuna Kanta",
""
]
] |
new_dataset
| 0.957454 |
1002.0479
|
Odile Piton
|
Odile Piton (SAMM), H\'el\`ene Pignot (SAMM)
|
"Mind your p's and q's": or the peregrinations of an apostrophe in 17th
Century English
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
If the use of the apostrophe in contemporary English often marks the Saxon
genitive, it may also indicate the omission of one or more let-ters. Some
writers (wrongly?) use it to mark the plural in symbols or abbreviations,
visual-ised thanks to the isolation of the morpheme "s". This punctuation mark
was imported from the Continent in the 16th century. During the 19th century
its use was standardised. However the rules of its usage still seem problematic
to many, including literate speakers of English. "All too often, the apostrophe
is misplaced", or "errant apostrophes are springing up every-where" is a
complaint that Internet users fre-quently come across when visiting grammar
websites. Many of them detail its various uses and misuses, and attempt to
correct the most common mistakes about it, especially its mis-use in the
plural, called greengrocers' apostro-phes and humorously misspelled
"greengro-cers apostrophe's". While studying English travel accounts published
in the seventeenth century, we noticed that the different uses of this symbol
may accompany various models of metaplasms. We were able to highlight the
linguistic variations of some lexemes, and trace the origin of modern grammar
rules gov-erning its usage.
|
[
{
"version": "v1",
"created": "Tue, 2 Feb 2010 13:24:20 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Piton",
"Odile",
"",
"SAMM"
],
[
"Pignot",
"Hélène",
"",
"SAMM"
]
] |
new_dataset
| 0.96996 |
1002.0573
|
Aubin Lecointre
|
Abdoulaye Berthe (LAAS), Aubin Lecointre (LAAS), Daniela Dragomirescu
(LAAS), Robert Plana (LAAS)
|
Medium Access Control for Wireless Sensor Networks based on Impulse
Radio Ultra Wideband
| null |
International Conference on Electronics Computers and Artificial
Intelligence, ECAI Romania (2009)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a detailed performance evaluation of distributed Medium
Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse
Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium
Access Control protocol have been considered: Slotted and UnSlotted with
reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The
performance evaluation is performed using a complete Wireless Sensor Networks
(WSN) simulator built on the Global Mobile Information System Simulator
(GloMoSim). The optimal operating parameters are first discussed for IR-UWB in
terms of slot size, retransmission delay and the number of retransmission, then
a comparison between IR-UWB and other transmission techniques in terms of
reliability latency and power efficiency.
|
[
{
"version": "v1",
"created": "Tue, 2 Feb 2010 20:05:45 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Berthe",
"Abdoulaye",
"",
"LAAS"
],
[
"Lecointre",
"Aubin",
"",
"LAAS"
],
[
"Dragomirescu",
"Daniela",
"",
"LAAS"
],
[
"Plana",
"Robert",
"",
"LAAS"
]
] |
new_dataset
| 0.99 |
1002.0154
|
Pierre Humbert
|
Pierre Humbert (LORIA)
|
Usages et conception des TIC : Proposition d'un mod\`ele d'aide \`a la
repr\'esentation de probl\`eme de conception
| null |
Colloque International Enjeux et Usages des TIC : Strat\'egies du
changement dans les syst\`emes et les territoires, Bordeaux : France (2009)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers economic intelligence contribution to exploit individual
and collective images of change, in ICT design decision-making. Technical
devices meeting with real use situations often gives the opportunity to emerge
mental images, that a innovation process, through its unprecedented nature, can
not anticipate. Although methodologies exists for quality and design project
management, the survey we conduct among small ICT publishers, show how they are
not very suitable for small firms. This elements taken into account, we try to
build a proposition of exploration ? analyze ? sum up process, adapted to this
type of actors decisional process.
|
[
{
"version": "v1",
"created": "Sun, 31 Jan 2010 20:23:01 GMT"
}
] | 2010-02-02T00:00:00 |
[
[
"Humbert",
"Pierre",
"",
"LORIA"
]
] |
new_dataset
| 0.959546 |
1002.0298
|
Jayanthkumar Kannan
|
Jayanthkumar Kannan, Petros Maniatis, Byung-Gon Chun
|
A Data Capsule Framework For Web Services: Providing Flexible Data
Access Control To Users
| null | null | null | null |
cs.CR cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces the notion of a secure data capsule, which refers to an
encapsulation of sensitive user information (such as a credit card number)
along with code that implements an interface suitable for the use of such
information (such as charging for purchases) by a service (such as an online
merchant). In our capsule framework, users provide their data in the form of
such capsules to web services rather than raw data. Capsules can be deployed in
a variety of ways, either on a trusted third party or the user's own computer
or at the service itself, through the use of a variety of hardware or software
modules, such as a virtual machine monitor or trusted platform module: the only
requirement is that the deployment mechanism must ensure that the user's data
is only accessed via the interface sanctioned by the user. The framework
further allows an user to specify policies regarding which services or machines
may host her capsule, what parties are allowed to access the interface, and
with what parameters. The combination of interface restrictions and policy
control lets us bound the impact of an attacker who compromises the service to
gain access to the user's capsule or a malicious insider at the service itself.
|
[
{
"version": "v1",
"created": "Mon, 1 Feb 2010 18:31:06 GMT"
}
] | 2010-02-02T00:00:00 |
[
[
"Kannan",
"Jayanthkumar",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Chun",
"Byung-Gon",
""
]
] |
new_dataset
| 0.960968 |
1001.2811
|
Krishnendu Chatterjee
|
Yashdeep Godhal and Krishnendu Chatterjee and Thomas A. Henzinger
|
Synthesis of AMBA AHB from Formal Specification
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The standard procedure for hardware design consists of describing circuit in
a hardware description language at logic level followed by extensive
verification and logic-synthesis. However, this process consumes significant
time and needs a lot of effort. An alternative is to use formal specification
language as a high-level hardware description language and synthesize hardware
from formal specification. Bloem et.al. gave formal specifications and
synthesize the AMBA AHB Arbiter. Our contributions are as follows:(1) We
present more complete and compact formal specifications for the AMBA AHB
Arbiter, and obtain significant (order of magnitude) improvement in synthesis
results (both with respect to time and the number of gates of the synthesize
circuit); (2) we present formal specification and synthesize to generate
compact circuits for the remaining two components of the AMBA AHB protocol,
namely, the AMBA AHB Master and AMBA AHB Slave; and (3) from the lessons learnt
we present few principles for writing formal specifications for efficient
hardware synthesis. Thus with intelligently written complete formal
specifications we are able to automatically synthesize an important and widely
used industrial protocol.
|
[
{
"version": "v1",
"created": "Sat, 16 Jan 2010 08:32:17 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Feb 2010 21:18:51 GMT"
}
] | 2010-02-01T00:00:00 |
[
[
"Godhal",
"Yashdeep",
""
],
[
"Chatterjee",
"Krishnendu",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] |
new_dataset
| 0.998942 |
1001.5074
|
Edgar Martinez-Moro
|
M. Borges-Quintana, M.A.Borges-Trenard, E.Martinez-Moro
|
Computing coset leaders of binary codes
|
Submitted to Designs, Codes and Cryptography
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algorithm for computing the set of all coset leaders of a
binary code $\mathcal C \subset \mathbb{F}_2^n$. The method is adapted from
some of the techniques related to the computation of Gr\"obner representations
associated with codes. The algorithm provides a Gr\"obner representation of the
binary code and the set of coset leaders $\mathrm{CL}(\mathcal C)$. Its
efficiency stands of the fact that its complexity is linear on the number of
elements of $\mathrm{CL}(\mathcal C)$, which is smaller than exhaustive search
in $\mathbb{F}_2^n$.
|
[
{
"version": "v1",
"created": "Thu, 28 Jan 2010 00:30:23 GMT"
}
] | 2010-01-29T00:00:00 |
[
[
"Borges-Quintana",
"M.",
""
],
[
"Borges-Trenard",
"M. A.",
""
],
[
"Martinez-Moro",
"E.",
""
]
] |
new_dataset
| 0.995186 |
1001.4880
|
Benjamin Nguyen
|
Benjamin Nguyen and Spyros Zoupanos
|
The WebContent XML Store
|
Must be compiled with pdflatex
|
RFIA 2010 Workshop "Sources Ouvertes et Services"
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, we describe the XML storage system used in the WebContent
project. We begin by advocating the use of an XML database in order to store
WebContent documents, and we present two different ways of storing and querying
these documents : the use of a centralized XML database and the use of a P2P
XML database.
|
[
{
"version": "v1",
"created": "Wed, 27 Jan 2010 09:33:54 GMT"
}
] | 2010-01-28T00:00:00 |
[
[
"Nguyen",
"Benjamin",
""
],
[
"Zoupanos",
"Spyros",
""
]
] |
new_dataset
| 0.999783 |
0802.2432
|
Andrei Romashchenko
|
Bruno Durand (LIF), Andrei Romashchenko (LIP), Alexander Shen (LIF)
|
Fixed Point and Aperiodic Tilings
|
v5: technical revision (positions of figures are shifted)
|
12th International Conference on Developments in Language Theory,
Kyoto : Japan (2008)
|
10.1007/978-3-540-85780-8_22
| null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An aperiodic tile set was first constructed by R.Berger while proving the
undecidability of the domino problem. It turned out that aperiodic tile sets
appear in many topics ranging from logic (the Entscheidungsproblem) to physics
(quasicrystals) We present a new construction of an aperiodic tile set that is
based on Kleene's fixed-point construction instead of geometric arguments. This
construction is similar to J. von Neumann self-reproducing automata; similar
ideas were also used by P. Gacs in the context of error-correcting
computations. The flexibility of this construction allows us to construct a
"robust" aperiodic tile set that does not have periodic (or close to periodic)
tilings even if we allow some (sparse enough) tiling errors. This property was
not known for any of the existing aperiodic tile sets.
|
[
{
"version": "v1",
"created": "Mon, 18 Feb 2008 07:50:13 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Feb 2008 15:43:21 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Jul 2008 11:16:24 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Jan 2010 13:50:04 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Jan 2010 14:15:07 GMT"
}
] | 2010-01-27T00:00:00 |
[
[
"Durand",
"Bruno",
"",
"LIF"
],
[
"Romashchenko",
"Andrei",
"",
"LIP"
],
[
"Shen",
"Alexander",
"",
"LIF"
]
] |
new_dataset
| 0.986027 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.