id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1605.05362
Nabiha Asghar
Nabiha Asghar
Yelp Dataset Challenge: Review Rating Prediction
null
null
null
null
cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Review websites, such as TripAdvisor and Yelp, allow users to post online reviews for various businesses, products and services, and have been recently shown to have a significant influence on consumer shopping behaviour. An online review typically consists of free-form text and a star rating out of 5. The problem of predicting a user's star rating for a product, given the user's text review for that product, is called Review Rating Prediction and has lately become a popular, albeit hard, problem in machine learning. In this paper, we treat Review Rating Prediction as a multi-class classification problem, and build sixteen different prediction models by combining four feature extraction methods, (i) unigrams, (ii) bigrams, (iii) trigrams and (iv) Latent Semantic Indexing, with four machine learning algorithms, (i) logistic regression, (ii) Naive Bayes classification, (iii) perceptrons, and (iv) linear Support Vector Classification. We analyse the performance of each of these sixteen models to come up with the best model for predicting the ratings from reviews. We use the dataset provided by Yelp for training and testing the models.
[ { "version": "v1", "created": "Tue, 17 May 2016 20:52:33 GMT" } ]
2016-05-19T00:00:00
[ [ "Asghar", "Nabiha", "" ] ]
new_dataset
0.967881
1605.05384
Xingqin Lin
Xingqin Lin, Ansuman Adhikary, and Y.-P. Eric Wang
Random Access Preamble Design and Detection for 3GPP Narrowband IoT Systems
4 pages, 2 figures, submitted for publication
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Narrowband internet of things (NB-IoT) is an emerging cellular technology that will provide improved coverage for massive number of low-throughput low-cost devices with low device power consumption in delay-tolerant applications. A new single tone signal with frequency hopping has been designed for NB-IoT physical random access channel (NPRACH). In this letter we describe this new NPRACH design and explain in detail the design rationale. We further propose possible receiver algorithms for NPRACH detection and time-of-arrival estimation. Simulation results on NPRACH performance including detection rate, false alarm rate, and time-of-arrival estimation accuracy are presented to shed light on the overall potential of NB-IoT systems.
[ { "version": "v1", "created": "Tue, 17 May 2016 22:22:06 GMT" } ]
2016-05-19T00:00:00
[ [ "Lin", "Xingqin", "" ], [ "Adhikary", "Ansuman", "" ], [ "Wang", "Y. -P. Eric", "" ] ]
new_dataset
0.977791
1605.05401
Yu Wang
Yu Wang, Yang Feng, Yuncheng Li, Xiyang Zhang, Richard Niemi, Jiebo Luo
Pricing the Woman Card: Gender Politics between Hillary Clinton and Donald Trump
4 pages, 6 figures, 7 tables, under review
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a data-driven method to measure the impact of the 'woman card' exchange between Hillary Clinton and Donald Trump. Building from a unique dataset of the two candidates' Twitter followers, we first examine the transition dynamics of the two candidates' Twitter followers one week before the exchange and one week after. Then we train a convolutional neural network to classify the gender of the followers and unfollowers, and study how women in particular are reacting to the 'woman card' exchange. Our study suggests that the 'woman card' comment has made women more likely to follow Hillary Clinton, less likely to unfollow her and that it has apparently not affected the gender composition of Trump followers.
[ { "version": "v1", "created": "Wed, 18 May 2016 00:00:44 GMT" } ]
2016-05-19T00:00:00
[ [ "Wang", "Yu", "" ], [ "Feng", "Yang", "" ], [ "Li", "Yuncheng", "" ], [ "Zhang", "Xiyang", "" ], [ "Niemi", "Richard", "" ], [ "Luo", "Jiebo", "" ] ]
new_dataset
0.995669
1605.05448
Aish Fenton
Aish Fenton
The Bees Algorithm for the Vehicle Routing Problem
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis we present a new algorithm for the Vehicle Routing Problem called the Enhanced Bees Algorithm. It is adapted from a fairly recent algorithm, the Bees Algorithm, which was developed for continuous optimisation problems. We show that the results obtained by the Enhanced Bees Algorithm are competitive with the best meta-heuristics available for the Vehicle Routing Problem (within 0.5% of the optimal solution for common benchmark problems). We show that the algorithm has good runtime performance, producing results within 2% of the optimal solution within 60 seconds, making it suitable for use within real world dispatch scenarios.
[ { "version": "v1", "created": "Wed, 18 May 2016 05:53:44 GMT" } ]
2016-05-19T00:00:00
[ [ "Fenton", "Aish", "" ] ]
new_dataset
0.957249
1605.05566
Joseph M. Hellerstein
Joseph M. Hellerstein
Naughton's Wisconsin Bibliography: A Brief Guide
Presented at the Wisconsin Database Group 40 Year Event, on the occasion of Jeff Naughton's retirement from the University of Wisconsin
null
null
null
cs.GL cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over nearly three decades at the University of Wisconsin, Jeff Naughton has left an indelible mark on computer science. He has been a global leader of the database research field, deepening its core and pushing its boundaries. Many of Naughton's ideas were translated directly into practice in commercial and open-source systems. But software comes and goes. In the end, it is the ideas themselves that have had impact, ideas written down in papers. Naughton has been a prolific scholar over the last thirty years, with over 175 publications in his bibliography, covering a wide range of topics. This document does not attempt to enumerate or even summarize the wealth of ideas that Naughton has published over the course of his academic career--the task is too daunting. Instead, the best this short note aims to do is to serve as a rough map of the territory: something to help other researchers navigate the wide spaces of Naughton's work.
[ { "version": "v1", "created": "Tue, 17 May 2016 05:54:01 GMT" } ]
2016-05-19T00:00:00
[ [ "Hellerstein", "Joseph M.", "" ] ]
new_dataset
0.999742
1605.05629
Michael Deakin
Michael Deakin, Jack Snoeyink
On the Precision to Sort Line-Quadric Intersections
CCCG 2016 submission, 6 pages, 2 figures, 1 table
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To support exactly tracking a neutron moving along a given line segment through a CAD model with quadric surfaces, this paper considers the arithmetic precision required to compute the order of intersection points of two quadrics along the line segment. When the orders of all but one pair of intersections are known, we show that a resultant can resolve the order of the remaining pair using only half the precision that may be required to eliminate radicals by repeated squaring. We compare the time and accuracy of our technique with converting to extended precision to calculate roots.
[ { "version": "v1", "created": "Wed, 18 May 2016 15:51:22 GMT" } ]
2016-05-19T00:00:00
[ [ "Deakin", "Michael", "" ], [ "Snoeyink", "Jack", "" ] ]
new_dataset
0.988809
1605.05633
Chen-Feng Liu
Marco Maso and Chen-Feng Liu and Chia-Han Lee and Tony Q. S. Quek and Leonardo S. Cardoso
Energy-Recycling Full-Duplex Radios for Next-Generation Networks
null
IEEE Journal on Selected Areas in Communications, vol. 33, no. 12, pp. 2948-2962, Dec. 2015
10.1109/JSAC.2015.2482058
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a novel energy-recycling single-antenna full-duplex (FD) radio is designed, in which a new 3-port element including a power divider and an energy harvester is added between the circulator and the receiver (RX) chain. The presence of this new element brings advantages over the state of the art in terms of both spectral efficiency and energy consumption. In particular, it provides the means of performing both an arbitrary attenuation of the incoming signal, which in turn increases the effectiveness of the state-of-the-art self-interference cancellation strategies subsequently adopted in the RX chain, and the recycling of a non-negligible portion of the energy leaked through the non-ideal circulator. The performance of this architecture is analyzed in a practically relevant 4-node scenario in which 2 nodes operate in FD and 2 nodes in half-duplex (HD). Analytical approximations are derived for both the achievable rates of the transmissions performed by the FD and HD radios and the energy recycled by the FD radios. The accuracy of these derivations is confirmed by numerical simulations. Quantitatively, achievable rate gains up to 40% over the state-of-the-art alternatives, in the considered scenario, are highlighted. Furthermore, up to 50% of the leaked energy at the circulator, i.e., 5% of the energy of the transmitted signal, can be recycled.
[ { "version": "v1", "created": "Wed, 18 May 2016 15:54:30 GMT" } ]
2016-05-19T00:00:00
[ [ "Maso", "Marco", "" ], [ "Liu", "Chen-Feng", "" ], [ "Lee", "Chia-Han", "" ], [ "Quek", "Tony Q. S.", "" ], [ "Cardoso", "Leonardo S.", "" ] ]
new_dataset
0.993553
1509.05100
Arjun Guha
Rian Shambaugh, Aaron Weiss and Arjun Guha
Rehearsal: A Configuration Verification Tool for Puppet
In proceedings of ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) 2016
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale data centers and cloud computing have turned system configuration into a challenging problem. Several widely-publicized outages have been blamed not on software bugs, but on configuration bugs. To cope, thousands of organizations use system configuration languages to manage their computing infrastructure. Of these, Puppet is the most widely used with thousands of paying customers and many more open-source users. The heart of Puppet is a domain-specific language that describes the state of a system. Puppet already performs some basic static checks, but they only prevent a narrow range of errors. Furthermore, testing is ineffective because many errors are only triggered under specific machine states that are difficult to predict and reproduce. With several examples, we show that a key problem with Puppet is that configurations can be non-deterministic. This paper presents Rehearsal, a verification tool for Puppet configurations. Rehearsal implements a sound, complete, and scalable determinacy analysis for Puppet. To develop it, we (1) present a formal semantics for Puppet, (2) use several analyses to shrink our models to a tractable size, and (3) frame determinism-checking as decidable formulas for an SMT solver. Rehearsal then leverages the determinacy analysis to check other important properties, such as idempotency. Finally, we apply Rehearsal to several real-world Puppet configurations.
[ { "version": "v1", "created": "Thu, 17 Sep 2015 01:53:49 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2015 18:35:19 GMT" }, { "version": "v3", "created": "Tue, 17 May 2016 14:30:48 GMT" } ]
2016-05-18T00:00:00
[ [ "Shambaugh", "Rian", "" ], [ "Weiss", "Aaron", "" ], [ "Guha", "Arjun", "" ] ]
new_dataset
0.995184
1605.03481
Bhuwan Dhingra
Bhuwan Dhingra, Zhong Zhou, Dylan Fitzpatrick, Michael Muehl, William W. Cohen
Tweet2Vec: Character-Based Distributed Representations for Social Media
6 pages, 2 figures, 4 tables, accepted as conference paper at ACL 2016
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text from social media provides a set of challenges that can cause traditional NLP approaches to fail. Informal language, spelling errors, abbreviations, and special characters are all commonplace in these posts, leading to a prohibitively large vocabulary size for word-level approaches. We propose a character composition model, tweet2vec, which finds vector-space representations of whole tweets by learning complex, non-local dependencies in character sequences. The proposed model outperforms a word-level baseline at predicting user-annotated hashtags associated with the posts, doing significantly better when the input contains many out-of-vocabulary words or unusual character sequences. Our tweet2vec encoder is publicly available.
[ { "version": "v1", "created": "Wed, 11 May 2016 15:30:09 GMT" }, { "version": "v2", "created": "Tue, 17 May 2016 15:00:38 GMT" } ]
2016-05-18T00:00:00
[ [ "Dhingra", "Bhuwan", "" ], [ "Zhou", "Zhong", "" ], [ "Fitzpatrick", "Dylan", "" ], [ "Muehl", "Michael", "" ], [ "Cohen", "William W.", "" ] ]
new_dataset
0.999557
1605.04930
Jean-Marc Valin
Jean-Marc Valin, Nathan E. Egge, Thomas Daede, Timothy B. Terriberry, Christopher Montgomery
Daala: A Perceptually-Driven Still Picture Codec
Accepted for ICIP 2016, 5 pages
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Daala is a new royalty-free video codec based on perceptually-driven coding techniques. We explore using its keyframe format for still picture coding and show how it has improved over the past year. We believe the technology used in Daala could be the basis of an excellent, royalty-free image format.
[ { "version": "v1", "created": "Mon, 16 May 2016 20:12:02 GMT" } ]
2016-05-18T00:00:00
[ [ "Valin", "Jean-Marc", "" ], [ "Egge", "Nathan E.", "" ], [ "Daede", "Thomas", "" ], [ "Terriberry", "Timothy B.", "" ], [ "Montgomery", "Christopher", "" ] ]
new_dataset
0.989464
1605.04971
Rasha Abu Samra
R. Z. Abu Samra, H. A. Bany salameh
A Dynamic Multi-cast Routing Algorithm for Opportunistic Networks: Implementing the Expected Transmission Count Metric
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio (CR) technology enables an intelligent wireless communication system. CR provides an efficient solution for the inefficient spectrum utilization by allowing dynamic and opportunistic spectrum access. In designing CR networks, the main challenge is how to increase network throughput while protecting the performance of licensed primary radio networks (PRNs) and keeping the interference between primary users (PUs) and cognitive users (CUs) within a prescribed threshold. In this work, we develop a multi-cast routing algorithm that based on the expected transmission count metric (ETX), which implemented as a metric combined with minimum spanning tree (MST) and shortest path tree (SPT) schemes according to the various traffic loads in CRN to determine the path selection method and used the probability of Success (POS) metric for the channel assignment that used the required transmission time and the channel availability time in choosing unified channel. The main objective of our algorithm is to reduce the total number of the expected packet transmissions (with retransmissions) needed for successfully forwarding a data packet to a specific group of destinations and provide guarantees on the chances of a successful transmission over a given channel. This metric is capable to capture the CRNs environment, in which the channel availabilities are diversity and dynamically changing due to the dynamic and uncertainty activity of PUs. Our proposed protocol achieves high-throughput and packet delivery rate (PDR) through a joint channel assignment and path selection to the specific destinations. Simulation results is used to demonstrate the effectiveness of our proposed algorithm in terms of throughput and packet delivery rate compared to other existing multi-cast routing protocols over different network conditions by using matlab as a simulations.
[ { "version": "v1", "created": "Mon, 16 May 2016 22:22:45 GMT" } ]
2016-05-18T00:00:00
[ [ "Samra", "R. Z. Abu", "" ], [ "salameh", "H. A. Bany", "" ] ]
new_dataset
0.95324
1605.05024
Swati Rawal
Swati Rawal
Multi-Prime RSA Over Galois Approach
4 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many variants of RSA cryptosystem exist in the literature. One of them is RSA over polynomials based on Galois approach. In standard RSA modulus is product of two large primes whereas in the Galois approach author considered the modulus as a product of two irriduciable polynomials. We use this idea and extend Multi-prime RSA over polynomials.
[ { "version": "v1", "created": "Tue, 17 May 2016 05:53:16 GMT" } ]
2016-05-18T00:00:00
[ [ "Rawal", "Swati", "" ] ]
new_dataset
0.952265
1605.05054
Minseok Park
Minseok Park, Hanxiang Li, Junmo Kim
HARRISON: A Benchmark on HAshtag Recommendation for Real-world Images in Social Networks
null
null
null
null
cs.CV cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simple, short, and compact hashtags cover a wide range of information on social networks. Although many works in the field of natural language processing (NLP) have demonstrated the importance of hashtag recommendation, hashtag recommendation for images has barely been studied. In this paper, we introduce the HARRISON dataset, a benchmark on hashtag recommendation for real world images in social networks. The HARRISON dataset is a realistic dataset, composed of 57,383 photos from Instagram and an average of 4.5 associated hashtags for each photo. To evaluate our dataset, we design a baseline framework consisting of visual feature extractor based on convolutional neural network (CNN) and multi-label classifier based on neural network. Based on this framework, two single feature-based models, object-based and scene-based model, and an integrated model of them are evaluated on the HARRISON dataset. Our dataset shows that hashtag recommendation task requires a wide and contextual understanding of the situation conveyed in the image. As far as we know, this work is the first vision-only attempt at hashtag recommendation for real world images in social networks. We expect this benchmark to accelerate the advancement of hashtag recommendation.
[ { "version": "v1", "created": "Tue, 17 May 2016 08:21:07 GMT" } ]
2016-05-18T00:00:00
[ [ "Park", "Minseok", "" ], [ "Li", "Hanxiang", "" ], [ "Kim", "Junmo", "" ] ]
new_dataset
0.999839
1605.05057
Simon Hampe
Ewgenij Gawrilow, Simon Hampe, Michael Joswig
The polymake XML file format
8 pages. Extended abstract for the 5th International Congress on Mathematical Software (ICMS), Berlin 2016
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an XML file format for storing data from computations in algebra and geometry. We also present a formal specification based on a RELAX-NG schema.
[ { "version": "v1", "created": "Tue, 17 May 2016 08:40:14 GMT" } ]
2016-05-18T00:00:00
[ [ "Gawrilow", "Ewgenij", "" ], [ "Hampe", "Simon", "" ], [ "Joswig", "Michael", "" ] ]
new_dataset
0.99975
1605.05067
Simone Faro
Simone Faro
Exact Online String Matching Bibliography
23 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short note we present a comprehensive bibliography for the online exact string matching problem. The problem consists in finding all occurrences of a given pattern in a text. It is an extensively studied problem in computer science, mainly due to its direct applications to such diverse areas as text, image and signal processing, speech analysis and recognition, data compression, information retrieval, computational biology and chemistry. Since 1970 more than 120 string matching algorithms have been proposed. In this note we present a comprehensive list of (almost) all string matching algorithms. The list is updated to May 2016.
[ { "version": "v1", "created": "Tue, 17 May 2016 09:14:50 GMT" } ]
2016-05-18T00:00:00
[ [ "Faro", "Simone", "" ] ]
new_dataset
0.98869
1605.05122
Kursad Agpak
Kursad Agpak, Huseyin Karateke, Suleyman Mete
Two-Finger Keyboard Layout Problem: An Application On Turkish Language
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart phone and tablet usage has sharply increased for the last decade. While entering test on these devices, virtual keyboards are generally used instead of conventional hardware keyboards. In this study, a new problem which is two-finger keyboard layout problem and solution approach is presented for increasing user test entrance performance, especially on virtual keyboards. Defined two-finger keyboard layout problem is modeled as Quadratic Assignment Problem. Because of combinatorial structure of the problem a genetic algorithm is developed. Its result is given to mathematical model as initial solution for finding better solutions with mathematical model. Proposed approach is applied on Turkish language. The new two finger keyboard layout for Turkish language is compared with F and QWERTY keyboard layouts based on certain performance measurement techniques.
[ { "version": "v1", "created": "Tue, 17 May 2016 11:55:38 GMT" } ]
2016-05-18T00:00:00
[ [ "Agpak", "Kursad", "" ], [ "Karateke", "Huseyin", "" ], [ "Mete", "Suleyman", "" ] ]
new_dataset
0.99868
1605.05281
Evyatar Hemo
Evyatar Hemo and Yuval Cassuto
$d$-imbalance WOM Codes for Reduced Inter-Cell Interference in Multi-Level NVMs
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, due to the spread of multi-level non-volatile memories (NVM), $q$-ary write-once memories (WOM) codes have been extensively studied. By using WOM codes, it is possible to rewrite NVMs $t$ times before erasing the cells. The use of WOM codes enables to improve the performance of the storage device, however, it may also increase errors caused by inter-cell interference (ICI). This work presents WOM codes that restrict the imbalance between code symbols throughout the write sequence, hence decreasing ICI. We first specify the imbalance model as a bound $d$ on the difference between codeword levels. Then a $2$-cell code construction for general $q$ and input size is proposed. An upper bound on the write count is also derived, showing the optimality of the proposed construction. In addition to direct WOM constructions, we derive closed-form optimal write regions for codes constructed with continuous lattices. On the coding side, the proposed codes are shown to be competitive with known codes not adhering to the bounded imbalance constraint. On the memory side, we show how the codes can be deployed within flash wordlines, and quantify their BER advantage using accepted ICI models.
[ { "version": "v1", "created": "Tue, 17 May 2016 18:37:41 GMT" } ]
2016-05-18T00:00:00
[ [ "Hemo", "Evyatar", "" ], [ "Cassuto", "Yuval", "" ] ]
new_dataset
0.955858
1410.3191
Dani Korpi
Dani Korpi, Joose Tamminen, Matias Turunen, Timo Huusari, Yang-Seok Choi, Lauri Anttila, Shilpa Talwar, and Mikko Valkama
Full-Duplex Mobile Device - Pushing the Limits
18 pages, submitted for review
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we address the challenges of transmitter-receiver isolation in \emph{mobile full-duplex devices}, building on shared-antenna based transceiver architecture. Firstly, self-adaptive analog RF cancellation circuitry is required, since the capability to track time-varying self-interference coupling characteristics is of utmost importance in mobile devices. In addition, novel adaptive nonlinear DSP methods are also required for final self-interference suppression at digital baseband, since mobile-scale devices typically operate under highly nonlinear low-cost RF components. In addition to describing above kind of advanced circuit and signal processing solutions, comprehensive RF measurement results from a complete demonstrator implementation are also provided, evidencing beyond 40~dB of active RF cancellation over an 80 MHz waveform bandwidth with a highly nonlinear transmitter power amplifier. Measured examples also demonstrate the good self-healing characteristics of the developed control loop against fast changes in the coupling channel. Furthermore, when complemented with nonlinear digital cancellation processing, the residual self-interference level is pushed down to the noise floor of the demonstration system, despite the harsh nonlinear nature of the self-interference. These findings indicate that deploying the full-duplex principle can indeed be feasible also in mobile devices, and thus be one potential technology in, e.g., 5G and beyond radio systems.
[ { "version": "v1", "created": "Mon, 13 Oct 2014 05:34:14 GMT" }, { "version": "v2", "created": "Fri, 5 Feb 2016 14:34:49 GMT" }, { "version": "v3", "created": "Mon, 16 May 2016 08:41:49 GMT" } ]
2016-05-17T00:00:00
[ [ "Korpi", "Dani", "" ], [ "Tamminen", "Joose", "" ], [ "Turunen", "Matias", "" ], [ "Huusari", "Timo", "" ], [ "Choi", "Yang-Seok", "" ], [ "Anttila", "Lauri", "" ], [ "Talwar", "Shilpa", "" ], [ "Valkama", "Mikko", "" ] ]
new_dataset
0.990934
1510.08943
Scott Ruoti
Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent Seamons
MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes MessageGuard, a browser-based platform for research into usable content-based encryption. MessageGuard is designed to enable collaboration between security and usability researchers on long-standing research questions in this area. It significantly simplifies the effort required to work in this space and provides a place for research results to be shared, replicated, and compared with minimal confounding factors. MessageGuard provides ubiquitous encryption and secure cryptographic operations, enabling research on any existing web application, with realistic usability studies on a secure platform. We validate MessageGuard's compatibility and performance, and we illustrate its utility with case studies for Gmail and Facebook Chat.
[ { "version": "v1", "created": "Fri, 30 Oct 2015 00:33:52 GMT" }, { "version": "v2", "created": "Mon, 16 May 2016 17:30:28 GMT" } ]
2016-05-17T00:00:00
[ [ "Ruoti", "Scott", "" ], [ "Andersen", "Jeff", "" ], [ "Monson", "Tyler", "" ], [ "Zappala", "Daniel", "" ], [ "Seamons", "Kent", "" ] ]
new_dataset
0.999302
1605.02142
Jonathan Sterling
Jonathan Sterling
Nominal LCF: A Language for Generic Proof
Accepted to TFP 2016, the paper has been withdrawn by the author because he has found a serious flaw in the denotational semantics given in section 5
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The syntax and semantics of user-supplied hypothesis names in tactic languages is a thorny problem, because the binding structure of a proof is a function of the goal at which a tactic script is executed. We contribute a new language to deal with the dynamic and interactive character of names in tactic scripts called Nominal LCF, and endow it with a denotational semantics in dI-domains. A large fragment of Nominal LCF has already been implemented and used to great effect in the new RedPRL proof assistant.
[ { "version": "v1", "created": "Sat, 7 May 2016 05:05:40 GMT" }, { "version": "v2", "created": "Sat, 14 May 2016 01:24:06 GMT" } ]
2016-05-17T00:00:00
[ [ "Sterling", "Jonathan", "" ] ]
new_dataset
0.999393
1605.04343
Adam Yedidia
Adam Yedidia and Scott Aaronson
A Relatively Small Turing Machine Whose Behavior Is Independent of Set Theory
31 pages, 6 figures, with the last 10 pages devoted to bibliography and appendices. Submitted to Complex Systems
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the definition of the Busy Beaver function by Rado in 1962, an interesting open question has been the smallest value of n for which BB(n) is independent of ZFC set theory. Is this n approximately 10, or closer to 1,000,000, or is it even larger? In this paper, we show that it is at most 7,910 by presenting an explicit description of a 7,910-state Turing machine Z with 1 tape and a 2-symbol alphabet that cannot be proved to run forever in ZFC (even though it presumably does), assuming ZFC is consistent. The machine is based on the work of Harvey Friedman on independent statements involving order-invariant graphs. In doing so, we give the first known upper bound on the highest provable Busy Beaver number in ZFC. To create Z, we develop and use a higher-level language, Laconic, which is much more convenient than direct state manipulation. We also use Laconic to design two Turing machines, G and R, that halt if and only if there are counterexamples to Goldbach's Conjecture and the Riemann Hypothesis, respectively.
[ { "version": "v1", "created": "Fri, 13 May 2016 22:05:58 GMT" } ]
2016-05-17T00:00:00
[ [ "Yedidia", "Adam", "" ], [ "Aaronson", "Scott", "" ] ]
new_dataset
0.998321
1605.04421
Travis Gagie
Anthony J. Cox, Andrea Farruggia, Travis Gagie, Simon J. Puglisi and Jouni Sir\'en
RLZAP: Relative Lempel-Ziv with Adaptive Pointers
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relative Lempel-Ziv (RLZ) is a popular algorithm for compressing databases of genomes from individuals of the same species when fast random access is desired. With Kuruppu et al.'s (SPIRE 2010) original implementation, a reference genome is selected and then the other genomes are greedily parsed into phrases exactly matching substrings of the reference. Deorowicz and Grabowski (Bioinformatics, 2011) pointed out that letting each phrase end with a mismatch character usually gives better compression because many of the differences between individuals' genomes are single-nucleotide substitutions. Ferrada et al. (SPIRE 2014) then pointed out that also using relative pointers and run-length compressing them usually gives even better compression. In this paper we generalize Ferrada et al.'s idea to handle well also short insertions, deletions and multi-character substitutions. We show experimentally that our generalization achieves better compression than Ferrada et al.'s implementation with comparable random-access times.
[ { "version": "v1", "created": "Sat, 14 May 2016 13:49:27 GMT" } ]
2016-05-17T00:00:00
[ [ "Cox", "Anthony J.", "" ], [ "Farruggia", "Andrea", "" ], [ "Gagie", "Travis", "" ], [ "Puglisi", "Simon J.", "" ], [ "Sirén", "Jouni", "" ] ]
new_dataset
0.971863
1605.04538
Ofer Neiman
Michael Elkin and Ofer Neiman
Hopsets with Constant Hopbound, and Applications to Approximate Shortest Paths
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $(\beta,\epsilon)$-hopset for a weighted undirected $n$-vertex graph $G=(V,E)$ is a set of edges, whose addition to the graph guarantees that every pair of vertices has a path between them that contains at most $\beta$ edges, whose length is within $1+\epsilon$ of the shortest path. In her seminal paper, Cohen \cite[JACM 2000]{C00} introduced the notion of hopsets in the context of parallel computation of approximate shortest paths, and since then it has found numerous applications in various other settings, such as dynamic graph algorithms, distributed computing, and the streaming model. Cohen \cite{C00} devised efficient algorithms for constructing hopsets with {\em polylogarithmic} in $n$ number of hops. Her constructions remain the state-of-the--art since the publication of her paper in STOC'94, i.e., for more than two decades. In this paper we exhibit the first construction of sparse hopsets with a {\em constant number of hops}. We also find efficient algorithms for hopsets in various computational settings, improving the best known constructions. Generally, our hopsets strictly outperform the hopsets of \cite{C00}, both in terms of their parameters, and in terms of the resources required to construct them. We demonstrate the applicability of our results for the fundamental problem of computing approximate shortest paths from $s$ sources. Our results improve the running time for this problem in the parallel, distributed and streaming models, for a vast range of $s$.
[ { "version": "v1", "created": "Sun, 15 May 2016 12:56:42 GMT" } ]
2016-05-17T00:00:00
[ [ "Elkin", "Michael", "" ], [ "Neiman", "Ofer", "" ] ]
new_dataset
0.999192
1605.04611
Ray Li
Venkatesan Guruswami, Ray Li
Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes
null
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work constructs codes that are efficiently decodable from a constant fraction of \emph{worst-case} insertion and deletion errors in three parameter settings: (i) Binary codes with rate approaching 1; (ii) Codes with constant rate for error fraction approaching 1 over fixed alphabet size; and (iii) Constant rate codes over an alphabet of size $k$ for error fraction approaching $(k-1)/(k+1)$. When errors are constrained to deletions alone, efficiently decodable codes in each of these regimes were constructed recently. We complete the picture by constructing similar codes that are efficiently decodable in the insertion/deletion regime.
[ { "version": "v1", "created": "Sun, 15 May 2016 22:30:28 GMT" } ]
2016-05-17T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Li", "Ray", "" ] ]
new_dataset
0.9943
1605.04696
Ayman Abdel-Hamid
Ahmed H. Salem, Ayman Abdel-Hamid, Mohamad Abou El-Nasr
The Case for Dynamic Key Distribution for PKI-Based VANETs
null
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.1, pp. 61-78, January 2014
10.5121/ijcnc.2014.6105
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular Ad hoc Networks (VANETs) are becoming a reality where secure communication is a prerequisite. Public key infrastructure (PKI) can be used to secure VANETs where an onboard tamper proof device (TPD) stores a number of encryption keys which are renewed upon visiting a certificate authority (CA). We previously proposed a dynamic key distribution protocol for PKI-based VANETs [1] to reduce the role of the TPD. A vehicle dynamically requests a key from its nearest road side unit. This request is propagated through network infrastructure to reach a CA cloud and a key is securely returned. A proposed key revocation mechanism reduced the number of messages needed for revocation through Certificate Revocation List (CRL) distribution. In this paper, performance evaluation and security of the proposed dynamic key distribution is investigated analytically and through network simulation. Furthermore, extensive analysis is performed to demonstrate how the proposed protocol can dynamically support efficient and cost-reduced key distribution. Analysis and performance evaluation results clearly make the case for dynamic key distribution for PKI-based VANETS.
[ { "version": "v1", "created": "Mon, 16 May 2016 09:35:16 GMT" } ]
2016-05-17T00:00:00
[ [ "Salem", "Ahmed H.", "" ], [ "Abdel-Hamid", "Ayman", "" ], [ "El-Nasr", "Mohamad Abou", "" ] ]
new_dataset
0.965795
1605.04814
Giulio Giaconi
Giulio Giaconi and Deniz Gunduz
Smart Meter Privacy with Renewable Energy and a Finite Capacity Battery
To appear in IEEE SPAWC 2016
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the smart meter (SM) privacy problem by considering the availability of a renewable energy source (RES) and a battery which can be exploited by a consumer to partially hide the consumption pattern from the utility provider (UP). Privacy is measured by the mutual information rate between the consumer's energy consumption and the renewable energy generation process, and the energy received from the grid, where the latter is known by the UP through the SM readings, and the former two are to be kept private. By expressing the information leakage as an additive quantity, we cast the problem as a stochastic control problem, and formulate the corresponding Bellman equations.
[ { "version": "v1", "created": "Mon, 16 May 2016 15:53:32 GMT" } ]
2016-05-17T00:00:00
[ [ "Giaconi", "Giulio", "" ], [ "Gunduz", "Deniz", "" ] ]
new_dataset
0.979954
1603.00898
Emanuele Natale
Luciano Gual\`a, Stefano Leucci, Emanuele Natale, Roberto Tauraso
Large Peg-Army Maneuvers
Conference version
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite its long history, the classical game of peg solitaire continues to attract the attention of the scientific community. In this paper, we consider two problems with an algorithmic flavour which are related with this game, namely Solitaire-Reachability and Solitaire-Army. In the first one, we show that deciding whether there is a sequence of jumps which allows a given initial configuration of pegs to reach a target position is NP-complete. Regarding Solitaire-Army, the aim is to successfully deploy an army of pegs in a given region of the board in order to reach a target position. By solving an auxiliary problem with relaxed constraints, we are able to answer some open questions raised by Cs\'ak\'any and Juh\'asz (Mathematics Magazine, 2000). To appreciate the combinatorial beauty of our solutions, we recommend to visit the gallery of animations provided at http://solitairearmy.isnphard.com.
[ { "version": "v1", "created": "Wed, 2 Mar 2016 21:31:54 GMT" }, { "version": "v2", "created": "Fri, 13 May 2016 00:50:38 GMT" } ]
2016-05-16T00:00:00
[ [ "Gualà", "Luciano", "" ], [ "Leucci", "Stefano", "" ], [ "Natale", "Emanuele", "" ], [ "Tauraso", "Roberto", "" ] ]
new_dataset
0.999402
1605.01032
Gaye Deegan
Frada Burstein, Helana Scheepers, Gaye Deegan
Australasian Conference on Information Systems (ACIS) 2015 Proceedings
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
These proceedings include full papers and research-in-progress papers presented at the ACIS 2015 Conference in Adelaide, Australia from November 30th to December 4th, 2015.
[ { "version": "v1", "created": "Sun, 1 May 2016 23:47:57 GMT" } ]
2016-05-16T00:00:00
[ [ "Burstein", "Frada", "" ], [ "Scheepers", "Helana", "" ], [ "Deegan", "Gaye", "" ] ]
new_dataset
0.995817
1605.04098
Giovanna Rosone
Anthony J. Cox, Fabio Garofalo, Giovanna Rosone, Marinella Sciortino
Lightweight LCP Construction for Very Large Collections of Strings
This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ The final version of this manuscript is in press in Journal of Discrete Algorithms
null
10.1016/j.jda.2016.03.003
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The longest common prefix array is a very advantageous data structure that, combined with the suffix array and the Burrows-Wheeler transform, allows to efficiently compute some combinatorial properties of a string useful in several applications, especially in biological contexts. Nowadays, the input data for many problems are big collections of strings, for instance the data coming from "next-generation" DNA sequencing (NGS) technologies. In this paper we present the first lightweight algorithm (called extLCP) for the simultaneous computation of the longest common prefix array and the Burrows-Wheeler transform of a very large collection of strings having any length. The computation is realized by performing disk data accesses only via sequential scans, and the total disk space usage never needs more than twice the output size, excluding the disk space required for the input. Moreover, extLCP allows to compute also the suffix array of the strings of the collection, without any other further data structure is needed. Finally, we test our algorithm on real data and compare our results with another tool capable to work in external memory on large collections of strings.
[ { "version": "v1", "created": "Fri, 13 May 2016 09:42:10 GMT" } ]
2016-05-16T00:00:00
[ [ "Cox", "Anthony J.", "" ], [ "Garofalo", "Fabio", "" ], [ "Rosone", "Giovanna", "" ], [ "Sciortino", "Marinella", "" ] ]
new_dataset
0.968869
1509.06693
Vishesh Vikas
Vishesh Vikas, Eliad Cohen, Rob Grassi, Canberk Sozer and Barry Trimmer
Design and locomotion control of soft robot using friction manipulation and motor-tendon actuation
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robots built from soft materials can alter their shape and size in a particular profile. This shape-changing ability could be extremely helpful for rescue robots and those operating in unknown terrains and environments. In changing shape, soft materials also store and release elastic energy, a feature that can be exploited for effective robot movement. However, design and control of these moving soft robots are non-trivial. The research presents design methodology for a 3D-printed, motor-tendon actuated soft robot capable of locomotion. In addition to shape change, the robot uses friction manipulation mechanisms to effect locomotion. The motor-tendon actuators comprise of nylon tendons embedded inside the soft body structure along a given path with one end fixed on the body and the other attached to a motor. These actuators directly control the deformation of the soft body which influences the robot locomotion behavior. Static stress analysis is used as a tool for designing the shape of the paths of these tendons embedded inside the body. The research also presents a novel model-free learning-based control approach for soft robots which interact with the environment at discrete contact points. This approach involves discretization of factors dominating robot-environment interactions as states, learning of the results as robot transitions between these robot states and evaluation of desired periodic state control sequences optimizing a cost function corresponding to a locomotion task (rotation or translation). The clever discretization allows the framework to exist in robot's task space, hence, facilitating calculation of control sequences without modeling the actuator, body material or details of the friction mechanisms. The flexibility of the framework is experimentally explored by applying it to robots with different friction mechanisms and different shapes of tendon paths.
[ { "version": "v1", "created": "Tue, 22 Sep 2015 17:22:07 GMT" }, { "version": "v2", "created": "Thu, 12 May 2016 17:31:08 GMT" } ]
2016-05-13T00:00:00
[ [ "Vikas", "Vishesh", "" ], [ "Cohen", "Eliad", "" ], [ "Grassi", "Rob", "" ], [ "Sozer", "Canberk", "" ], [ "Trimmer", "Barry", "" ] ]
new_dataset
0.997685
1603.06850
Przemys{\l}aw Daca
Przemys{\l}aw Daca, Thomas A. Henzinger, Andrey Kupriyanov
Array Folds Logic
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an extension to the quantifier-free theory of integer arrays which allows us to express counting. The properties expressible in Array Folds Logic (AFL) include statements such as "the first array cell contains the array length," and "the array contains equally many minimal and maximal elements." These properties cannot be expressed in quantified fragments of the theory of arrays, nor in the theory of concatenation. Using reduction to counter machines, we show that the satisfiability problem of AFL is PSPACE-complete, and with a natural restriction the complexity decreases to NP. We also show that adding either universal quantifiers or concatenation leads to undecidability. AFL contains terms that fold a function over an array. We demonstrate that folding, a well-known concept from functional languages, allows us to concisely summarize loops that count over arrays, which occurs frequently in real-life programs. We provide a tool that can discharge proof obligations in AFL, and we demonstrate on practical examples that our decision procedure can solve a broad range of problems in symbolic testing and program verification.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 16:10:47 GMT" }, { "version": "v2", "created": "Thu, 24 Mar 2016 19:49:04 GMT" }, { "version": "v3", "created": "Thu, 12 May 2016 14:41:29 GMT" } ]
2016-05-13T00:00:00
[ [ "Daca", "Przemysław", "" ], [ "Henzinger", "Thomas A.", "" ], [ "Kupriyanov", "Andrey", "" ] ]
new_dataset
0.999837
1605.03705
Marcus Rohrbach
Anna Rohrbach, Atousa Torabi, Marcus Rohrbach, Niket Tandon, Christopher Pal, Hugo Larochelle, Aaron Courville, Bernt Schiele
Movie Description
null
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Audio Description (AD) provides linguistic descriptions of movies and allows visually impaired people to follow a movie along with their peers. Such descriptions are by design mainly visual and thus naturally form an interesting data source for computer vision and computational linguistics. In this work we propose a novel dataset which contains transcribed ADs, which are temporally aligned to full length movies. In addition we also collected and aligned movie scripts used in prior work and compare the two sources of descriptions. In total the Large Scale Movie Description Challenge (LSMDC) contains a parallel corpus of 118,114 sentences and video clips from 202 movies. First we characterize the dataset by benchmarking different approaches for generating video descriptions. Comparing ADs to scripts, we find that ADs are indeed more visual and describe precisely what is shown rather than what should happen according to the scripts created prior to movie production. Furthermore, we present and compare the results of several teams who participated in a challenge organized in the context of the workshop "Describing and Understanding Video & The Large Scale Movie Description Challenge (LSMDC)", at ICCV 2015.
[ { "version": "v1", "created": "Thu, 12 May 2016 07:34:08 GMT" } ]
2016-05-13T00:00:00
[ [ "Rohrbach", "Anna", "" ], [ "Torabi", "Atousa", "" ], [ "Rohrbach", "Marcus", "" ], [ "Tandon", "Niket", "" ], [ "Pal", "Christopher", "" ], [ "Larochelle", "Hugo", "" ], [ "Courville", "Aaron", "" ], [ "Schiele", "Bernt", "" ] ]
new_dataset
0.999895
1605.03779
Borzoo Rassouli
Borzoo Rassouli and Bruno Clerckx
Constant Envelope Signaling in MIMO Channels
Submitted to IEEE Trans. on Information Theory July 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of the point-to-point vector Gaussian channel under the peak power constraint is not known in general. This paper considers a simpler scenario in which the input signal vector is forced to have a constant envelope (or norm). The capacity-achieving distribution for the non-identity $2\times 2$ MIMO channel when the input vector lies on a circle in $\mathbb{R}^2$ is obtained and is shown to have a finite number of mass points on the circle. Subsequently, it is shown that the degrees of freedom (DoF) of a full-rank $n$ by $n$ channel with constant envelope signaling is $n-1$ and it can be achieved by a uniform distribution over the surface of the hypersphere whose radius is defined by the constant envelope. Finally, for the 2 by 2 channel, the power allocation scheme of the constant envelope signaling is compared with that of the conventional case, in which the constraint is on the average transmitted power. It is observed that when the condition number of the channel is close to one, both schemes have a similar trend while this is not the case as the condition number grows.
[ { "version": "v1", "created": "Thu, 12 May 2016 12:23:23 GMT" } ]
2016-05-13T00:00:00
[ [ "Rassouli", "Borzoo", "" ], [ "Clerckx", "Bruno", "" ] ]
new_dataset
0.956411
1605.03785
Stefano Bilotta
Stefano Bilotta
Variable-length Non-overlapping Codes
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a variable-length code having the property that no (non-empty) prefix of each its codeword is a suffix of any other one, and vice versa. This kind of code can be seen as an extension of two well-known codes in literature, called respectively fix-free code and non-overlapping code. In this paper, some constructive algorithms for such codes are presented as well as numerical results about their cardinality.
[ { "version": "v1", "created": "Thu, 12 May 2016 12:44:26 GMT" } ]
2016-05-13T00:00:00
[ [ "Bilotta", "Stefano", "" ] ]
new_dataset
0.99921
1604.00648
Stefano Buzzi
Stefano Buzzi and Carmen D'Andrea
On Clustered Statistical MIMO Millimeter Wave Channel Simulation
4 double-column pages; submitted to IEEE Wireless Communications Letters, version 2
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of mmWave frequencies is one of the key strategies to achieve the fascinating 1000x increase in the capacity of future 5G wireless systems. While for traditional sub-6 GHz cellular frequencies several well-developed statistical channel models are available for system simulation, similar tools are not available for mmWave frequencies, thus preventing a fair comparison of independently developed transmission and reception schemes. In this paper we provide a simple albeit accurate statistical procedure for the generation of a clustered MIMO channel model operating at mmWaves, for both the cases of slowly and rapidly time-varying channels. Matlab scripts for channel generation are also provided, along with an example of their use.
[ { "version": "v1", "created": "Sun, 3 Apr 2016 16:03:34 GMT" }, { "version": "v2", "created": "Wed, 11 May 2016 13:34:46 GMT" } ]
2016-05-12T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "D'Andrea", "Carmen", "" ] ]
new_dataset
0.998674
1604.05966
Tharindu Rathnayake
Tharindu Rathnayake, Reza Hoseinnezhad, Ruwan Tennakoon and Alireza Bab-Hadiashar
Labeled Multi-Bernoulli Tracking for Industrial Mobile Platform Safety
The conference which this paper was submitted, has rejected this paper. Thus, we are in the process of enhancing the content of the paper and submit it to another conference/journal
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a track-before-detect labeled multi-Bernoulli filter tailored for industrial mobile platform safety applications. We derive two application specific separable likelihood functions that capture the geometric shape and colour information of the human targets who are wearing a high visible vest. These likelihoods are then used in a labeled multi-Bernoulli filter with a novel two step Bayesian update. Preliminary simulation results show that the proposed solution can successfully track human workers wearing a luminous yellow colour vest in an industrial environment.
[ { "version": "v1", "created": "Wed, 20 Apr 2016 14:00:09 GMT" }, { "version": "v2", "created": "Wed, 11 May 2016 00:00:09 GMT" } ]
2016-05-12T00:00:00
[ [ "Rathnayake", "Tharindu", "" ], [ "Hoseinnezhad", "Reza", "" ], [ "Tennakoon", "Ruwan", "" ], [ "Bab-Hadiashar", "Alireza", "" ] ]
new_dataset
0.98055
1605.03236
Kairan Sun
Kairan Sun, Huazi Zhang, Dapeng Wu
Delay-aware Fountain Codes for Video Streaming with Optimal Sampling Strategy
12 pages, 15 figures
null
null
null
cs.MM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The explosive demand of on-line video from smart mobile devices poses unprecedented challenges to delivering high quality of experience (QoE) over wireless networks. Streaming high-definition video with low delay is difficult mainly due to (i) the stochastic nature of wireless channels and (ii) the fluctuating videos bit rate. To address this, we propose a novel delay-aware fountain coding (DAF) technique that integrates channel coding and video coding. In this paper, we reveal that the fluctuation of video bit rate can also be exploited to further improve fountain codes for wireless video streaming. Specifically, we develop two coding techniques: the time-based sliding window and the optimal window-wise sampling strategy. By adaptively selecting the window length and optimally adjusting the sampling pattern according to the ongoing video bit rate, the proposed schemes deliver significantly higher video quality than existing schemes, with low delay and constant data rate. To validate our design, we implement the protocols of DAF, DAF-L (a low-complexity version) and the existing delay-aware video streaming schemes by streaming H.264/AVC standard videos over an 802.11b network on CORE emulation platform. The results show that the decoding ratio of our scheme is 15% to 100% higher than the state of the art techniques.
[ { "version": "v1", "created": "Tue, 10 May 2016 22:55:04 GMT" } ]
2016-05-12T00:00:00
[ [ "Sun", "Kairan", "" ], [ "Zhang", "Huazi", "" ], [ "Wu", "Dapeng", "" ] ]
new_dataset
0.980824
1605.03261
Junpei Zhong
Junpei Zhong and Martin Peniak and Jun Tani and Tetsuya Ogata and Angelo Cangelosi
Sensorimotor Input as a Language Generalisation Tool: A Neurorobotics Model for Generation and Generalisation of Noun-Verb Combinations with Sensorimotor Inputs
Submitted to Autonomous Robots
null
null
null
cs.RO cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a neurorobotics cognitive model to explain the understanding and generalisation of nouns and verbs combinations when a vocal command consisting of a verb-noun sentence is provided to a humanoid robot. This generalisation process is done via the grounding process: different objects are being interacted, and associated, with different motor behaviours, following a learning approach inspired by developmental language acquisition in infants. This cognitive model is based on Multiple Time-scale Recurrent Neural Networks (MTRNN).With the data obtained from object manipulation tasks with a humanoid robot platform, the robotic agent implemented with this model can ground the primitive embodied structure of verbs through training with verb-noun combination samples. Moreover, we show that a functional hierarchical architecture, based on MTRNN, is able to generalise and produce novel combinations of noun-verb sentences. Further analyses of the learned network dynamics and representations also demonstrate how the generalisation is possible via the exploitation of this functional hierarchical recurrent network.
[ { "version": "v1", "created": "Wed, 11 May 2016 02:31:21 GMT" } ]
2016-05-12T00:00:00
[ [ "Zhong", "Junpei", "" ], [ "Peniak", "Martin", "" ], [ "Tani", "Jun", "" ], [ "Ogata", "Tetsuya", "" ], [ "Cangelosi", "Angelo", "" ] ]
new_dataset
0.998342
1605.03353
Sarbajit Manna
Sarbajit Manna, Saurabh Dutta
Proposing A Symmetric Key Bit-Level Block Cipher
arXiv admin note: substantial text overlap with arXiv:1605.02954
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research paper. Entire plain text file is read one character at a time and according to the binary representation of ASCII value of the characters, entire plain text file is divided into n number of 16 bit blocks. Then an agreed-upon symmetric key file is formed by dividing each 16 bit block into two 8 bit sub blocks and by using Greatest Common Divisor (G.C.D) operation among them. The key size is 40 times the number of 16 bit blocks present in the plain text file as each block produces a key of size 40 bits. The character corresponding to the G.C.D value for each block is stored in the cipher text file which is sent by the sender to the receiver along with the symmetric key file. From the symmetric key file and the cipher text file, the receiver by applying reverse procedure, gets back the original plain text file. This technique has several merits, some of them are formation of symmetric key file dynamically, achievement of 50% compression rate in the cipher text file, better security in terms of brute force attack and applicability of the technique for a large number of files of different size and type.
[ { "version": "v1", "created": "Wed, 11 May 2016 09:44:10 GMT" } ]
2016-05-12T00:00:00
[ [ "Manna", "Sarbajit", "" ], [ "Dutta", "Saurabh", "" ] ]
new_dataset
0.981595
1605.03460
Bocong Chen
Bocong Chen, Liren Lin and Hongwei Liu
Constacyclic symbol-pair codes: lower bounds and optimal constructions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symbol-pair codes introduced by Cassuto and Blaum (2010) are designed to protect against pair errors in symbol-pair read channels. The higher the minimum pair distance, the more pair errors the code can correct. MDS symbol-pair codes are optimal in the sense that pair distance cannot be improved for given length and code size. The contribution of this paper is twofold. First we present three lower bounds for the minimum pair distance of constacyclic codes, the first two of which generalize the previously known results due to Cassuto and Blaum (2011) and Kai {\it et al.} (2015). The third one exhibits a lower bound for the minimum pair distance of repeated-root cyclic codes. Second we obtain new MDS symbol-pair codes with minimum pair distance seven and eight through repeated-root cyclic codes.
[ { "version": "v1", "created": "Wed, 11 May 2016 14:38:47 GMT" } ]
2016-05-12T00:00:00
[ [ "Chen", "Bocong", "" ], [ "Lin", "Liren", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.999827
1605.03560
Nikolaus Hansen
Nikolaus Hansen, Anne Auger, Dimo Brockhoff, Dejan Tu\v{s}ar, Tea Tu\v{s}ar
COCO: Performance Assessment
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an any-time performance assessment for benchmarking numerical optimization algorithms in a black-box scenario, applied within the COCO benchmarking platform. The performance assessment is based on runtimes measured in number of objective function evaluations to reach one or several quality indicator target values. We argue that runtime is the only available measure with a generic, meaningful, and quantitative interpretation. We discuss the choice of the target values, runlength-based targets, and the aggregation of results by using simulated restarts, averages, and empirical distribution functions.
[ { "version": "v1", "created": "Wed, 11 May 2016 19:49:43 GMT" } ]
2016-05-12T00:00:00
[ [ "Hansen", "Nikolaus", "" ], [ "Auger", "Anne", "" ], [ "Brockhoff", "Dimo", "" ], [ "Tušar", "Dejan", "" ], [ "Tušar", "Tea", "" ] ]
new_dataset
0.998233
1605.02304
Dr. Zubair Asghar
Muhammad Zubair Asghar, Ammara Habib, Anam Habib, Syeda Rabail Zahra, Sadia Ismail
AndorEstimator: Android based Software Cost Estimation Application
11 pages, 22 figures, International Journal of Computer Science and Information Security (IJCSIS),Vol. 14, No. 4, April 2016
International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 4, April 2016
null
null
cs.CY cs.SE
http://creativecommons.org/licenses/by/4.0/
The main aim of the proposed system is to assist the software development team to estimate the cost, effort and maintenance of the project under development. Android-based platform, namely MIT App Inventor is used for the development of application, which contains visual block programming language. The current study has following uniqueness of (1)Accuracy of results,(2)user friendly environment(3)no such application is available on android platform to the best of our knowledge. Questionnaire regarding CoCoMo model is developed and circulated by using objective qualitative method. Findings: The estimation module of our application is quite important with respect to facilitating the students of software engineering for performing CoCoMo-based cost estimation easily, and enabling the software developers for performing software cost estimation easily. The cost estimator based on CoCoMo model is developed on android platform however, to the best of our knowledge no such application is available. This system can be used by business and educational stakeholders, such as students, software developers, and business organizations
[ { "version": "v1", "created": "Sun, 8 May 2016 10:15:48 GMT" } ]
2016-05-11T00:00:00
[ [ "Asghar", "Muhammad Zubair", "" ], [ "Habib", "Ammara", "" ], [ "Habib", "Anam", "" ], [ "Zahra", "Syeda Rabail", "" ], [ "Ismail", "Sadia", "" ] ]
new_dataset
0.98959
1605.02815
Youming Qiao
Joshua A. Grochow, Ketan D. Mulmuley, Youming Qiao
Boundaries of VP and VNP
31 pages. A preliminary version of this paper appears in ICALP 2016
null
null
null
cs.CC math.AG math.CO math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One fundamental question in the context of the geometric complexity theory approach to the VP vs. VNP conjecture is whether VP = $\overline{\textrm{VP}}$, where VP is the class of families of polynomials that are of polynomial degree and can be computed by arithmetic circuits of polynomial size, and $\overline{\textrm{VP}}$ is the class of families of polynomials that are of polynomial degree and can be approximated infinitesimally closely by arithmetic circuits of polynomial size. The goal of this article is to study the conjecture in (Mulmuley, FOCS 2012) that $\overline{\textrm{VP}}$ is not contained in VP. Towards that end, we introduce three degenerations of VP (i.e., sets of points in $\overline{\textrm{VP}}$), namely the stable degeneration Stable-VP, the Newton degeneration Newton-VP, and the p-definable one-parameter degeneration VP*. We also introduce analogous degenerations of VNP. We show that Stable-VP $\subseteq$ Newton-VP $\subseteq$ VP* $\subseteq$ VNP, and Stable-VNP = Newton-VNP = VNP* = VNP. The three notions of degenerations and the proof of this result shed light on the problem of separating $\overline{\textrm{VP}}$ from VP. Although we do not yet construct explicit candidates for the polynomial families in $\overline{\textrm{VP}}\setminus$VP, we prove results which tell us where not to look for such families. Specifically, we demonstrate that the families in Newton-VP $\setminus$ VP based on semi-invariants of quivers would have to be non-generic by showing that, for many finite quivers (including some wild ones), any Newton degeneration of a generic semi-invariant can be computed by a circuit of polynomial size. We also show that the Newton degenerations of perfect matching Pfaffians, monotone arithmetic circuits over the reals, and Schur polynomials have polynomial-size circuits.
[ { "version": "v1", "created": "Tue, 10 May 2016 01:06:40 GMT" } ]
2016-05-11T00:00:00
[ [ "Grochow", "Joshua A.", "" ], [ "Mulmuley", "Ketan D.", "" ], [ "Qiao", "Youming", "" ] ]
new_dataset
0.995645
1605.02860
Fahmida Aseez
Fahmida Aseez and Sheena Mathew
Hierarchical Partition-Based Anonymous Routing Protocol(HPAR) in Manet for Efficient and Secure Transmission
8 pages, 5 figues
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anonymous routing protocols are used in MANET's to hide the nodes from outsiders in order to protect from various attacks. HPAR partitions the network area dynamically into zones and chooses nodes in zones randomly as intermediate relay nodes .This relay nodes help in secure routing. In HPAR anonymity protection is given to source, destination and route. HPAR have low cost and provide high level of protection. It has techniques to counter various attacks.
[ { "version": "v1", "created": "Tue, 10 May 2016 05:40:35 GMT" } ]
2016-05-11T00:00:00
[ [ "Aseez", "Fahmida", "" ], [ "Mathew", "Sheena", "" ] ]
new_dataset
0.99726
1605.02892
Marco Bertini
Simone Ercoli, Marco Bertini and Alberto Del Bimbo
Compact Hash Codes for Efficient Visual Descriptors Retrieval in Large Scale Databases
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an efficient method for visual descriptors retrieval based on compact hash codes computed using a multiple k-means assignment. The method has been applied to the problem of approximate nearest neighbor (ANN) search of local and global visual content descriptors, and it has been tested on different datasets: three large scale public datasets of up to one billion descriptors (BIGANN) and, supported by recent progress in convolutional neural networks (CNNs), also on the CIFAR-10 and MNIST datasets. Experimental results show that, despite its simplicity, the proposed method obtains a very high performance that makes it superior to more complex state-of-the-art methods.
[ { "version": "v1", "created": "Tue, 10 May 2016 08:53:04 GMT" } ]
2016-05-11T00:00:00
[ [ "Ercoli", "Simone", "" ], [ "Bertini", "Marco", "" ], [ "Del Bimbo", "Alberto", "" ] ]
new_dataset
0.999233
1605.03012
Fang Lu
Fang Lu and Fa Wu and Peijun Hu and Zhiyi Peng and Dexing Kong
Automatic 3D liver location and segmentation via convolutional neural networks and graph cut
12 pages, 12 figures, 4 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Purpose Segmentation of the liver from abdominal computed tomography (CT) image is an essential step in some computer assisted clinical interventions, such as surgery planning for living donor liver transplant (LDLT), radiotherapy and volume measurement. In this work, we develop a deep learning algorithm with graph cut refinement to automatically segment liver in CT scans. Methods The proposed method consists of two main steps: (i) simultaneously liver detection and probabilistic segmentation using 3D convolutional neural networks (CNNs); (ii) accuracy refinement of initial segmentation with graph cut and the previously learned probability map. Results The proposed approach was validated on forty CT volumes taken from two public databases MICCAI-Sliver07 and 3Dircadb. For the MICCAI-Sliver07 test set, the calculated mean ratios of volumetric overlap error (VOE), relative volume difference (RVD), average symmetric surface distance (ASD), root mean square symmetric surface distance (RMSD) and maximum symmetric surface distance (MSD) are 5.9%, 2.7%, 0.91%, 1.88 mm, and 18.94 mm, respectively. In the case of 20 3Dircadb data, the calculated mean ratios of VOE, RVD, ASD, RMSD and MSD are 9.36%, 0.97%, 1.89%, 4.15 mm and 33.14 mm, respectively. Conclusion The proposed method is fully automatic without any user interaction. Quantitative results reveal that the proposed approach is efficient and accurate for hepatic volume estimation in a clinical setup. The high correlation between the automatic and manual references shows that the proposed method can be good enough to replace the time-consuming and non-reproducible manual segmentation method.
[ { "version": "v1", "created": "Tue, 10 May 2016 13:42:51 GMT" } ]
2016-05-11T00:00:00
[ [ "Lu", "Fang", "" ], [ "Wu", "Fa", "" ], [ "Hu", "Peijun", "" ], [ "Peng", "Zhiyi", "" ], [ "Kong", "Dexing", "" ] ]
new_dataset
0.967088
1605.03036
Salman Faraji
Salman Faraji and Auke J. Ijspeert
3LP: a linear 3D-walking model including torso and swing dynamics
Journal paper under review
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new model of biped locomotion which is composed of three linear pendulums (one per leg and one for the whole upper body) to describe stance, swing and torso dynamics. In addition to double support, this model has different actuation possibilities in the swing hip and stance ankle which could be widely used to produce different walking gaits. Without the need for numerical time-integration, closed-form solutions help finding periodic gaits which could be simply scaled in certain dimensions to modulate the motion online. Thanks to linearity properties, the proposed model can provide a computationally fast platform for model predictive controllers to predict the future and consider meaningful inequality constraints to ensure feasibility of the motion. Such property is coming from describing dynamics with joint torques directly and therefore, reflecting hardware limitations more precisely, even in the very abstract high level template space. The proposed model produces human-like torque and ground reaction force profiles and thus, compared to point-mass models, it is more promising for precise control of humanoid robots. Despite being linear and lacking many other features of human walking like CoM excursion, knee flexion and ground clearance, we show that the proposed model can predict one of the main optimality trends in human walking, i.e. nonlinear speed-frequency relationship. In this paper, we mainly focus on describing the model and its capabilities, comparing it with human data and calculating optimal human gait variables. Setting up control problems and advanced biomechanical analysis still remain for future works.
[ { "version": "v1", "created": "Tue, 10 May 2016 14:38:53 GMT" } ]
2016-05-11T00:00:00
[ [ "Faraji", "Salman", "" ], [ "Ijspeert", "Auke J.", "" ] ]
new_dataset
0.998381
1605.03039
Salman Faraji
Salman Faraji and Auke J. Ijspeert
A new time-projecting controller based on 3LP model to recover intermittent pushes
Journal paper under review
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a new walking controller based on 3LP model. Taking advantage of linear equations and closed-form solutions of 3LP, the proposed controller can project the state of the robot at any time during the phase back to a certain event for which, a discrete LQR controller is designed. After the projection, a proper control policy is generated by the expert discrete controller and used online. This projecting architecture reacts to disturbances with minimal delay and compared to discrete controllers, it provides superior performance in recovering intermittent external pushes. Further analysis of closed-loop eigenvalues and disturbance rejection shows that the proposed time-projecting controller has strong stabilization properties. Controllable regions also show that the projecting architecture covers most of the maximal controllable set of states. It is computationally much faster than model predictive controllers, but still optimal.
[ { "version": "v1", "created": "Tue, 10 May 2016 14:55:12 GMT" } ]
2016-05-11T00:00:00
[ [ "Faraji", "Salman", "" ], [ "Ijspeert", "Auke J.", "" ] ]
new_dataset
0.988688
1605.03096
Xuezhi Yang
Xuezhi Yang
On the Capacity Region of Multiple Access Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity region of a multiple access channel is discussed. It was found that orthogonal multiple access and non orthogonal multiple access have the same capacity region under the constraint of same sum power.
[ { "version": "v1", "created": "Sat, 7 May 2016 03:01:13 GMT" } ]
2016-05-11T00:00:00
[ [ "Yang", "Xuezhi", "" ] ]
new_dataset
0.966166
1605.03116
Ethan Rudd
Ethan M. Rudd and Terrance E. Boult
CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition
Accepted to CVPR 2016 Biometrics Workshop
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Architectures relying on continuous authentication require a secure way to challenge the user's identity without trusting that the Continuous Authentication Subsystem (CAS) has not been compromised, i.e., that the response to the layer which manages service/application access is not fake. In this paper, we introduce the CALIPER protocol, in which a separate Continuous Access Verification Entity (CAVE) directly challenges the user's identity in a continuous authentication regime. Instead of simply returning authentication probabilities or confidence scores, CALIPER's CAS uses live hard and soft biometric samples from the user to extract a cryptographic private key embedded in a challenge posed by the CAVE. The CAS then uses this key to sign a response to the CAVE. CALIPER supports multiple modalities, key lengths, and security levels and can be applied in two scenarios: One where the CAS must authenticate its user to a CAVE running on a remote server (device-server) for access to remote application data, and another where the CAS must authenticate its user to a locally running trusted computing module (TCM) for access to local application data (device-TCM). We further demonstrate that CALIPER can leverage device hardware resources to enable privacy and security even when the device's kernel is compromised, and we show how this authentication protocol can even be expanded to obfuscate direct kernel object manipulation (DKOM) malwares.
[ { "version": "v1", "created": "Tue, 10 May 2016 17:33:02 GMT" } ]
2016-05-11T00:00:00
[ [ "Rudd", "Ethan M.", "" ], [ "Boult", "Terrance E.", "" ] ]
new_dataset
0.981314
1605.03150
Yasamin Alkhorshid
Yasamin Alkhorshid, Kamelia Aryafar, Sven Bauer, and Gerd Wanielik
Road Detection through Supervised Classification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous driving is a rapidly evolving technology. Autonomous vehicles are capable of sensing their environment and navigating without human input through sensory information such as radar, lidar, GNSS, vehicle odometry, and computer vision. This sensory input provides a rich dataset that can be used in combination with machine learning models to tackle multiple problems in supervised settings. In this paper we focus on road detection through gray-scale images as the sole sensory input. Our contributions are twofold: first, we introduce an annotated dataset of urban roads for machine learning tasks; second, we introduce a road detection framework on this dataset through supervised classification and hand-crafted feature vectors.
[ { "version": "v1", "created": "Tue, 10 May 2016 18:53:09 GMT" } ]
2016-05-11T00:00:00
[ [ "Alkhorshid", "Yasamin", "" ], [ "Aryafar", "Kamelia", "" ], [ "Bauer", "Sven", "" ], [ "Wanielik", "Gerd", "" ] ]
new_dataset
0.998785
1408.6927
Olli Pottonen
Denis S. Krotov, Patric R. J. \"Osterg{\aa}rd, Olli Pottonen
Non-existence of a ternary constant weight $(16, 5, 15; 2048)$ diameter perfect code
9 pages. Submitted for publication
Adv. Math. Commun. 10(2) 2016, 393-399
10.3934/amc.2016013
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ternary constant weight codes of length $n=2^m$, weight $n-1$, cardinality $2^n$ and distance $5$ are known to exist for every $m$ for which there exists an APN permutation of order $2^m$, that is, at least for all odd $m \geq 3$ and for $m=6$. We show the non-existence of such codes for $m=4$ and prove that any codes with the parameters above are diameter perfect.
[ { "version": "v1", "created": "Fri, 29 Aug 2014 06:06:30 GMT" } ]
2016-05-10T00:00:00
[ [ "Krotov", "Denis S.", "" ], [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ] ]
new_dataset
0.995561
1511.04285
Fredrik Jansson
Fredrik Jansson, Matthew Hartley, Martin Hinsch, Ivica Slavkov, Noem\'i Carranza, Tjelvar S. G. Olsson, Roland M. Dries, Johanna H. Gr\"onqvist, Athanasius F. M. Mar\'ee, James Sharpe, Jaap A. Kaandorp, Ver\^onica A. Grieneisen
Kilombo: a Kilobot simulator to enable effective research in swarm robotics
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kilobot is a widely used platform for investigation of swarm robotics. Physical Kilobots are slow moving and require frequent recalibration and charging, which significantly slows down the development cycle. Simulators can speed up the process of testing, exploring and hypothesis generation, but usually require time consuming and error-prone translation of code between simulator and robot. Moreover, code of different nature often obfuscates direct comparison, as well as determination of the cause of deviation, between simulator and actual robot swarm behaviour. To tackle these issues we have developed a C-based simulator that allows those working with Kilobots to use the same programme code in both the simulator and the physical robots. Use of our simulator, coined Kilombo, significantly simplifies and speeds up development, given that a simulation of 1000 robots can be run at a speed 100 times faster than real time on a desktop computer, making high-throughput pre-screening possible of potential algorithms that could lead to desired emergent behaviour. We argue that this strategy, here specifically developed for Kilobots, is of general importance for effective robot swarm research. The source code is freely available under the MIT license.
[ { "version": "v1", "created": "Fri, 13 Nov 2015 14:11:31 GMT" }, { "version": "v2", "created": "Mon, 9 May 2016 12:38:44 GMT" } ]
2016-05-10T00:00:00
[ [ "Jansson", "Fredrik", "" ], [ "Hartley", "Matthew", "" ], [ "Hinsch", "Martin", "" ], [ "Slavkov", "Ivica", "" ], [ "Carranza", "Noemí", "" ], [ "Olsson", "Tjelvar S. G.", "" ], [ "Dries", "Roland M.", "" ], [ "Grönqvist", "Johanna H.", "" ], [ "Marée", "Athanasius F. M.", "" ], [ "Sharpe", "James", "" ], [ "Kaandorp", "Jaap A.", "" ], [ "Grieneisen", "Verônica A.", "" ] ]
new_dataset
0.998088
1605.00176
Pranav Sakulkar
Pranav Sakulkar and Bhaskar Krishnamachari
Stochastic Contextual Bandits with Known Reward Functions
A version of this technical report is under submission in IEEE/ACM Transactions on Networking
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many sequential decision-making problems in communication networks can be modeled as contextual bandit problems, which are natural extensions of the well-known multi-armed bandit problem. In contextual bandit problems, at each time, an agent observes some side information or context, pulls one arm and receives the reward for that arm. We consider a stochastic formulation where the context-reward tuples are independently drawn from an unknown distribution in each trial. Motivated by networking applications, we analyze a setting where the reward is a known non-linear function of the context and the chosen arm's current state. We first consider the case of discrete and finite context-spaces and propose DCB($\epsilon$), an algorithm that we prove, through a careful analysis, yields regret (cumulative reward gap compared to a distribution-aware genie) scaling logarithmically in time and linearly in the number of arms that are not optimal for any context, improving over existing algorithms where the regret scales linearly in the total number of arms. We then study continuous context-spaces with Lipschitz reward functions and propose CCB($\epsilon, \delta$), an algorithm that uses DCB($\epsilon$) as a subroutine. CCB($\epsilon, \delta$) reveals a novel regret-storage trade-off that is parametrized by $\delta$. Tuning $\delta$ to the time horizon allows us to obtain sub-linear regret bounds, while requiring sub-linear storage. By exploiting joint learning for all contexts we get regret bounds for CCB($\epsilon, \delta$) that are unachievable by any existing contextual bandit algorithm for continuous context-spaces. We also show similar performance bounds for the unknown horizon case.
[ { "version": "v1", "created": "Sat, 30 Apr 2016 22:16:22 GMT" }, { "version": "v2", "created": "Fri, 6 May 2016 20:32:36 GMT" } ]
2016-05-10T00:00:00
[ [ "Sakulkar", "Pranav", "" ], [ "Krishnamachari", "Bhaskar", "" ] ]
new_dataset
0.998524
1605.02175
Yonglong Li
Yonglong Li and Guangyue Han
Asymptotics of Input-Constrained Erasure Channel Capacity
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we examine an input-constrained erasure channel and we characterize the asymptotics of its capacity when the erasure rate is low. More specifically, for a general memoryless erasure channel with its input supported on an irreducible finite-type constraint, we derive partial asymptotics of its capacity, using some series expansion type formulas of its mutual information rate; and for a binary erasure channel with its first-order Markovian input supported on the $(1, \infty)$-RLL constraint, based on the concavity of its mutual information rate with respect to some parameterization of the input, we numerically evaluate its first-order Markov capacity and further derive its full asymptotics. The asymptotics obtained in this paper, when compared with the recently derived feedback capacity for a binary erasure channel with the same input constraint, enable us to draw the conclusion that feedback may increase the capacity of an input-constrained channel, even if the channel is memoryless.
[ { "version": "v1", "created": "Sat, 7 May 2016 11:42:26 GMT" } ]
2016-05-10T00:00:00
[ [ "Li", "Yonglong", "" ], [ "Han", "Guangyue", "" ] ]
new_dataset
0.995333
1605.02196
Peter Radecki
Peter Radecki, Mark Campbell and Kevin Matzen
All Weather Perception: Joint Data Association, Tracking, and Classification for Autonomous Ground Vehicles
35 pages, 21 figures, 14 tables
null
null
null
cs.SY cs.CV cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel probabilistic perception algorithm is presented as a real-time joint solution to data association, object tracking, and object classification for an autonomous ground vehicle in all-weather conditions. The presented algorithm extends a Rao-Blackwellized Particle Filter originally built with a particle filter for data association and a Kalman filter for multi-object tracking (Miller et al. 2011a) to now also include multiple model tracking for classification. Additionally a state-of-the-art vision detection algorithm that includes heading information for autonomous ground vehicle (AGV) applications was implemented. Cornell's AGV from the DARPA Urban Challenge was upgraded and used to experimentally examine if and how state-of-the-art vision algorithms can complement or replace lidar and radar sensors. Sensor and algorithm performance in adverse weather and lighting conditions is tested. Experimental evaluation demonstrates robust all-weather data association, tracking, and classification where camera, lidar, and radar sensors complement each other inside the joint probabilistic perception algorithm.
[ { "version": "v1", "created": "Sat, 7 May 2016 14:36:34 GMT" } ]
2016-05-10T00:00:00
[ [ "Radecki", "Peter", "" ], [ "Campbell", "Mark", "" ], [ "Matzen", "Kevin", "" ] ]
new_dataset
0.970211
1605.02317
Shirin Saeedi Bidokhti
Shirin Saeedi Bidokhti and Mich\`ele Wigger and Roy Timo
Noisy Broadcast Networks with Receiver Caching
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study noisy broadcast networks with local cache memories at the receivers, where the transmitter can pre-store information even before learning the receivers' requests. We mostly focus on packet-erasure broadcast networks with two disjoint sets of receivers: a set of weak receivers with all-equal erasure probabilities and equal cache sizes and a set of strong receivers with all-equal erasure probabilities and no cache memories. We present lower and upper bounds on the capacity-memory tradeoff of this network. The lower bound is achieved by a new joint cache-channel coding idea and significantly improves on schemes that are based on separate cache-channel coding. We discuss how this coding idea could be extended to more general discrete memoryless broadcast channels and to unequal cache sizes. Our upper bound holds for all stochastically degraded broadcast channels. For the described packet-erasure broadcast network, our lower and upper bounds are tight when there is a single weak receiver (and any number of strong receivers) and the cache memory size does not exceed a given threshold. When there are a single weak receiver, a single strong receiver, and two files, then we can strengthen our upper and lower bounds so as they coincide over a wide regime of cache sizes. Finally, we completely characterise the rate-memory tradeoff for general discrete-memoryless broadcast channels with arbitrary cache memory sizes and arbitrary (asymmetric) rates when all receivers always demand exactly the same file.
[ { "version": "v1", "created": "Sun, 8 May 2016 12:44:21 GMT" } ]
2016-05-10T00:00:00
[ [ "Bidokhti", "Shirin Saeedi", "" ], [ "Wigger", "Michèle", "" ], [ "Timo", "Roy", "" ] ]
new_dataset
0.958593
1605.02457
Tobias Kuhn
Tobias Kuhn
The Controlled Natural Language of Randall Munroe's Thing Explainer
null
Proceedings of the Fifth Workshop on Controlled Natural Language (CNL 2016), Springer 2016
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
It is rare that texts or entire books written in a Controlled Natural Language (CNL) become very popular, but exactly this has happened with a book that has been published last year. Randall Munroe's Thing Explainer uses only the 1'000 most often used words of the English language together with drawn pictures to explain complicated things such as nuclear reactors, jet engines, the solar system, and dishwashers. This restricted language is a very interesting new case for the CNL community. I describe here its place in the context of existing approaches on Controlled Natural Languages, and I provide a first analysis from a scientific perspective, covering the word production rules and word distributions.
[ { "version": "v1", "created": "Mon, 9 May 2016 07:48:40 GMT" } ]
2016-05-10T00:00:00
[ [ "Kuhn", "Tobias", "" ] ]
new_dataset
0.999189
1605.02559
Olivier Colliot
Linda Marrakchi-Kacem (ARAMIS), Alexandre Vignaud (NEUROSPIN), Julien Sein (CRMBM), Johanne Germain (ARAMIS), Thomas R Henry (CMRR), Cyril Poupon (NEUROSPIN), Lucie Hertz-Pannier, St\'ephane Leh\'ericy (CENIR, ICM), Olivier Colliot (ARAMIS, ICM), Pierre-Fran\c{c}ois Van de Moortele (CMRR), Marie Chupin (ARAMIS, ICM)
Robust imaging of hippocampal inner structure at 7T: in vivo acquisition protocol and methodological choices
null
Magnetic Resonance Materials in Physics, Biology and Medicine, Springer Verlag, 2016
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OBJECTIVE:Motion-robust multi-slab imaging of hippocampal inner structure in vivo at 7T.MATERIALS AND METHODS:Motion is a crucial issue for ultra-high resolution imaging, such as can be achieved with 7T MRI. An acquisition protocol was designed for imaging hippocampal inner structure at 7T. It relies on a compromise between anatomical details visibility and robustness to motion. In order to reduce acquisition time and motion artifacts, the full slab covering the hippocampus was split into separate slabs with lower acquisition time. A robust registration approach was implemented to combine the acquired slabs within a final 3D-consistent high-resolution slab covering the whole hippocampus. Evaluation was performed on 50 subjects overall, made of three groups of subjects acquired using three acquisition settings; it focused on three issues: visibility of hippocampal inner structure, robustness to motion artifacts and registration procedure performance.RESULTS:Overall, T2-weighted acquisitions with interleaved slabs proved robust. Multi-slab registration yielded high quality datasets in 96 % of the subjects, thus compatible with further analyses of hippocampal inner structure.CONCLUSION:Multi-slab acquisition and registration setting is efficient for reducing acquisition time and consequently motion artifacts for ultra-high resolution imaging of the inner structure of the hippocampus.
[ { "version": "v1", "created": "Mon, 9 May 2016 12:38:44 GMT" } ]
2016-05-10T00:00:00
[ [ "Marrakchi-Kacem", "Linda", "", "ARAMIS" ], [ "Vignaud", "Alexandre", "", "NEUROSPIN" ], [ "Sein", "Julien", "", "CRMBM" ], [ "Germain", "Johanne", "", "ARAMIS" ], [ "Henry", "Thomas R", "", "CMRR" ], [ "Poupon", "Cyril", "", "NEUROSPIN" ], [ "Hertz-Pannier", "Lucie", "", "CENIR, ICM" ], [ "Lehéricy", "Stéphane", "", "CENIR, ICM" ], [ "Colliot", "Olivier", "", "ARAMIS, ICM" ], [ "Van de Moortele", "Pierre-François", "", "CMRR" ], [ "Chupin", "Marie", "", "ARAMIS, ICM" ] ]
new_dataset
0.994519
1605.02628
Fenix Huang
Fenix W.D. Huang and Christian M. Reidys
Topological language for RNA
29 pages, 13 figures, 1 table
null
null
null
cs.FL q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a novel, context-free grammar, {\it RNAFeatures$^*$}, capable of generating any RNA structure including pseudoknot structures (pk-structure). We represent pk-structures as orientable fatgraphs, which naturally leads to a filtration by their topological genus. Within this framework, RNA secondary structures correspond to pk-structures of genus zero. {\it RNAFeatures$^*$} acts on formal, arc-labeled RNA secondary structures, called $\lambda$-structures. $\lambda$-structures correspond one-to-one to pk-structures together with some additional information. This information consists of the specific rearrangement of the backbone, by which a pk-structure can be made cross-free. {\it RNAFeatures$^*$} is an extension of the grammar for secondary structures and employs an enhancement by labelings of the symbols as well as the production rules. We discuss how to use {\it RNAFeatures$^*$} to obtain a stochastic context-free grammar for pk-structures, using data of RNA sequences and structures. The induced grammar facilitates fast Boltzmann sampling and statistical analysis. As a first application, we present an $O(n log(n))$ runtime algorithm which samples pk-structures based on ninety tRNA sequences and structures from the Nucleic Acid Database (NDB).
[ { "version": "v1", "created": "Mon, 9 May 2016 15:44:59 GMT" } ]
2016-05-10T00:00:00
[ [ "Huang", "Fenix W. D.", "" ], [ "Reidys", "Christian M.", "" ] ]
new_dataset
0.998205
1605.02677
Quanzeng You
Quanzeng You, Jiebo Luo, Hailin Jin, Jianchao Yang
Building a Large Scale Dataset for Image Emotion Recognition: The Fine Print and The Benchmark
7 pages, 7 figures, AAAI 2016
null
null
null
cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Psychological research results have confirmed that people can have different emotional reactions to different visual stimuli. Several papers have been published on the problem of visual emotion analysis. In particular, attempts have been made to analyze and predict people's emotional reaction towards images. To this end, different kinds of hand-tuned features are proposed. The results reported on several carefully selected and labeled small image data sets have confirmed the promise of such features. While the recent successes of many computer vision related tasks are due to the adoption of Convolutional Neural Networks (CNNs), visual emotion analysis has not achieved the same level of success. This may be primarily due to the unavailability of confidently labeled and relatively large image data sets for visual emotion analysis. In this work, we introduce a new data set, which started from 3+ million weakly labeled images of different emotions and ended up 30 times as large as the current largest publicly available visual emotion data set. We hope that this data set encourages further research on visual emotion analysis. We also perform extensive benchmarking analyses on this large data set using the state of the art methods including CNNs.
[ { "version": "v1", "created": "Mon, 9 May 2016 18:14:52 GMT" } ]
2016-05-10T00:00:00
[ [ "You", "Quanzeng", "" ], [ "Luo", "Jiebo", "" ], [ "Jin", "Hailin", "" ], [ "Yang", "Jianchao", "" ] ]
new_dataset
0.999672
1605.02688
Simon Lefrancois
The Theano Development Team: Rami Al-Rfou, Guillaume Alain, Amjad Almahairi, Christof Angermueller, Dzmitry Bahdanau, Nicolas Ballas, Fr\'ed\'eric Bastien, Justin Bayer, Anatoly Belikov, Alexander Belopolsky, Yoshua Bengio, Arnaud Bergeron, James Bergstra, Valentin Bisson, Josh Bleecher Snyder, Nicolas Bouchard, Nicolas Boulanger-Lewandowski, Xavier Bouthillier, Alexandre de Br\'ebisson, Olivier Breuleux, Pierre-Luc Carrier, Kyunghyun Cho, Jan Chorowski, Paul Christiano, Tim Cooijmans, Marc-Alexandre C\^ot\'e, Myriam C\^ot\'e, Aaron Courville, Yann N. Dauphin, Olivier Delalleau, Julien Demouth, Guillaume Desjardins, Sander Dieleman, Laurent Dinh, M\'elanie Ducoffe, Vincent Dumoulin, Samira Ebrahimi Kahou, Dumitru Erhan, Ziye Fan, Orhan Firat, Mathieu Germain, Xavier Glorot, Ian Goodfellow, Matt Graham, Caglar Gulcehre, Philippe Hamel, Iban Harlouchet, Jean-Philippe Heng, Bal\'azs Hidasi, Sina Honari, Arjun Jain, S\'ebastien Jean, Kai Jia, Mikhail Korobov, Vivek Kulkarni, Alex Lamb, Pascal Lamblin, Eric Larsen, C\'esar Laurent, Sean Lee, Simon Lefrancois, Simon Lemieux, Nicholas L\'eonard, Zhouhan Lin, Jesse A. Livezey, Cory Lorenz, Jeremiah Lowin, Qianli Ma, Pierre-Antoine Manzagol, Olivier Mastropietro, Robert T. McGibbon, Roland Memisevic, Bart van Merri\"enboer, Vincent Michalski, Mehdi Mirza, Alberto Orlandi, Christopher Pal, Razvan Pascanu, Mohammad Pezeshki, Colin Raffel, Daniel Renshaw, Matthew Rocklin, Adriana Romero, Markus Roth, Peter Sadowski, John Salvatier, Fran\c{c}ois Savard, Jan Schl\"uter, John Schulman, Gabriel Schwartz, Iulian Vlad Serban, Dmitriy Serdyuk, Samira Shabanian, \'Etienne Simon, Sigurd Spieckermann, S. Ramana Subramanyam, Jakub Sygnowski, J\'er\'emie Tanguay, Gijs van Tulder, Joseph Turian, Sebastian Urban, Pascal Vincent, Francesco Visin, Harm de Vries, David Warde-Farley, Dustin J. Webb, Matthew Willson, Kelvin Xu, Lijun Xue, Li Yao, Saizheng Zhang, Ying Zhang
Theano: A Python framework for fast computation of mathematical expressions
19 pages, 5 figures
null
null
null
cs.SC cs.LG cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theano is a Python library that allows to define, optimize, and evaluate mathematical expressions involving multi-dimensional arrays efficiently. Since its introduction, it has been one of the most used CPU and GPU mathematical compilers - especially in the machine learning community - and has shown steady performance improvements. Theano is being actively and continuously developed since 2008, multiple frameworks have been built on top of it and it has been used to produce many state-of-the-art machine learning models. The present article is structured as follows. Section I provides an overview of the Theano software and its community. Section II presents the principal features of Theano and how to use them, and compares them with other similar projects. Section III focuses on recently-introduced functionalities and improvements. Section IV compares the performance of Theano against Torch7 and TensorFlow on several machine learning models. Section V discusses current limitations of Theano and potential ways of improving it.
[ { "version": "v1", "created": "Mon, 9 May 2016 18:32:34 GMT" } ]
2016-05-10T00:00:00
[ [ "The Theano Development Team", "", "" ], [ "Al-Rfou", "Rami", "" ], [ "Alain", "Guillaume", "" ], [ "Almahairi", "Amjad", "" ], [ "Angermueller", "Christof", "" ], [ "Bahdanau", "Dzmitry", "" ], [ "Ballas", "Nicolas", "" ], [ "Bastien", "Frédéric", "" ], [ "Bayer", "Justin", "" ], [ "Belikov", "Anatoly", "" ], [ "Belopolsky", "Alexander", "" ], [ "Bengio", "Yoshua", "" ], [ "Bergeron", "Arnaud", "" ], [ "Bergstra", "James", "" ], [ "Bisson", "Valentin", "" ], [ "Snyder", "Josh Bleecher", "" ], [ "Bouchard", "Nicolas", "" ], [ "Boulanger-Lewandowski", "Nicolas", "" ], [ "Bouthillier", "Xavier", "" ], [ "de Brébisson", "Alexandre", "" ], [ "Breuleux", "Olivier", "" ], [ "Carrier", "Pierre-Luc", "" ], [ "Cho", "Kyunghyun", "" ], [ "Chorowski", "Jan", "" ], [ "Christiano", "Paul", "" ], [ "Cooijmans", "Tim", "" ], [ "Côté", "Marc-Alexandre", "" ], [ "Côté", "Myriam", "" ], [ "Courville", "Aaron", "" ], [ "Dauphin", "Yann N.", "" ], [ "Delalleau", "Olivier", "" ], [ "Demouth", "Julien", "" ], [ "Desjardins", "Guillaume", "" ], [ "Dieleman", "Sander", "" ], [ "Dinh", "Laurent", "" ], [ "Ducoffe", "Mélanie", "" ], [ "Dumoulin", "Vincent", "" ], [ "Kahou", "Samira Ebrahimi", "" ], [ "Erhan", "Dumitru", "" ], [ "Fan", "Ziye", "" ], [ "Firat", "Orhan", "" ], [ "Germain", "Mathieu", "" ], [ "Glorot", "Xavier", "" ], [ "Goodfellow", "Ian", "" ], [ "Graham", "Matt", "" ], [ "Gulcehre", "Caglar", "" ], [ "Hamel", "Philippe", "" ], [ "Harlouchet", "Iban", "" ], [ "Heng", "Jean-Philippe", "" ], [ "Hidasi", "Balázs", "" ], [ "Honari", "Sina", "" ], [ "Jain", "Arjun", "" ], [ "Jean", "Sébastien", "" ], [ "Jia", "Kai", "" ], [ "Korobov", "Mikhail", "" ], [ "Kulkarni", "Vivek", "" ], [ "Lamb", "Alex", "" ], [ "Lamblin", "Pascal", "" ], [ "Larsen", "Eric", "" ], [ "Laurent", "César", "" ], [ "Lee", "Sean", "" ], [ "Lefrancois", "Simon", "" ], [ "Lemieux", "Simon", "" ], [ "Léonard", "Nicholas", "" ], [ "Lin", "Zhouhan", "" ], [ "Livezey", "Jesse A.", "" ], [ "Lorenz", "Cory", "" ], [ "Lowin", "Jeremiah", "" ], [ "Ma", "Qianli", "" ], [ "Manzagol", "Pierre-Antoine", "" ], [ "Mastropietro", "Olivier", "" ], [ "McGibbon", "Robert T.", "" ], [ "Memisevic", "Roland", "" ], [ "van Merriënboer", "Bart", "" ], [ "Michalski", "Vincent", "" ], [ "Mirza", "Mehdi", "" ], [ "Orlandi", "Alberto", "" ], [ "Pal", "Christopher", "" ], [ "Pascanu", "Razvan", "" ], [ "Pezeshki", "Mohammad", "" ], [ "Raffel", "Colin", "" ], [ "Renshaw", "Daniel", "" ], [ "Rocklin", "Matthew", "" ], [ "Romero", "Adriana", "" ], [ "Roth", "Markus", "" ], [ "Sadowski", "Peter", "" ], [ "Salvatier", "John", "" ], [ "Savard", "François", "" ], [ "Schlüter", "Jan", "" ], [ "Schulman", "John", "" ], [ "Schwartz", "Gabriel", "" ], [ "Serban", "Iulian Vlad", "" ], [ "Serdyuk", "Dmitriy", "" ], [ "Shabanian", "Samira", "" ], [ "Simon", "Étienne", "" ], [ "Spieckermann", "Sigurd", "" ], [ "Subramanyam", "S. Ramana", "" ], [ "Sygnowski", "Jakub", "" ], [ "Tanguay", "Jérémie", "" ], [ "van Tulder", "Gijs", "" ], [ "Turian", "Joseph", "" ], [ "Urban", "Sebastian", "" ], [ "Vincent", "Pascal", "" ], [ "Visin", "Francesco", "" ], [ "de Vries", "Harm", "" ], [ "Warde-Farley", "David", "" ], [ "Webb", "Dustin J.", "" ], [ "Willson", "Matthew", "" ], [ "Xu", "Kelvin", "" ], [ "Xue", "Lijun", "" ], [ "Yao", "Li", "" ], [ "Zhang", "Saizheng", "" ], [ "Zhang", "Ying", "" ] ]
new_dataset
0.971338
1605.01744
David Cinciruk
Mengke Hu, David Cinciruk, and John MacLaren Walsh
Improving Automated Patent Claim Parsing: Dataset, System, and Experiments
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Off-the-shelf natural language processing software performs poorly when parsing patent claims owing to their use of irregular language relative to the corpora built from news articles and the web typically utilized to train this software. Stopping short of the extensive and expensive process of accumulating a large enough dataset to completely retrain parsers for patent claims, a method of adapting existing natural language processing software towards patent claims via forced part of speech tag correction is proposed. An Amazon Mechanical Turk collection campaign organized to generate a public corpus to train such an improved claim parsing system is discussed, identifying lessons learned during the campaign that can be of use in future NLP dataset collection campaigns with AMT. Experiments utilizing this corpus and other patent claim sets measure the parsing performance improvement garnered via the claim parsing system. Finally, the utility of the improved claim parsing system within other patent processing applications is demonstrated via experiments showing improved automated patent subject classification when the new claim parsing system is utilized to generate the features.
[ { "version": "v1", "created": "Thu, 5 May 2016 20:11:57 GMT" } ]
2016-05-09T00:00:00
[ [ "Hu", "Mengke", "" ], [ "Cinciruk", "David", "" ], [ "Walsh", "John MacLaren", "" ] ]
new_dataset
0.998339
1605.01755
Yin Xian
Yin Xian, Andrew Thompson, Xiaobai Sun, Douglas Nowacek, and Loren Nolte
DCTNet and PCANet for acoustic signal feature extraction
22 figures
null
null
null
cs.SD cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the use of DCTNet, an efficient approximation and alternative to PCANet, for acoustic signal classification. In PCANet, the eigenfunctions of the local sample covariance matrix (PCA) are used as filterbanks for convolution and feature extraction. When the eigenfunctions are well approximated by the Discrete Cosine Transform (DCT) functions, each layer of of PCANet and DCTNet is essentially a time-frequency representation. We relate DCTNet to spectral feature representation methods, such as the the short time Fourier transform (STFT), spectrogram and linear frequency spectral coefficients (LFSC). Experimental results on whale vocalization data show that DCTNet improves classification rate, demonstrating DCTNet's applicability to signal processing problems such as underwater acoustics.
[ { "version": "v1", "created": "Thu, 28 Apr 2016 22:21:01 GMT" } ]
2016-05-09T00:00:00
[ [ "Xian", "Yin", "" ], [ "Thompson", "Andrew", "" ], [ "Sun", "Xiaobai", "" ], [ "Nowacek", "Douglas", "" ], [ "Nolte", "Loren", "" ] ]
new_dataset
0.994886
1605.01821
Snehanshu Saha
Gouri Ginde, Snehanshu Saha, Archana Mathur, Sukrit Venkatagiri, Sujith Vadakkepat, Anand Narasimhamurthy, B. S. Daya Sagar
ScientoBASE: A Framework and Model for Computing Scholastic Indicators of non-local influence of Journals via Native Data Acquisition algorithms
Journal Influence Score; Journal Internationality modeling index (JIMI); web scraping; feature extraction; Cobb-Douglas Production Function; convex optimization; supervised learning; Non-Local Influence Quotient (NLIQ), Source-Normalized Impact per Paper (SNIP). arXiv admin note: text overlap with arXiv:1407.2037 by other authors without attribution
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Defining and measuring internationality as a function of influence diffusion of scientific journals is an open problem. There exists no metric to rank journals based on the extent or scale of internationality. Measuring internationality is qualitative, vague, open to interpretation and is limited by vested interests. With the tremendous increase in the number of journals in various fields and the unflinching desire of academics across the globe to publish in "international" journals, it has become an absolute necessity to evaluate, rank and categorize journals based on internationality. Authors, in the current work have defined internationality as a measure of influence that transcends across geographic boundaries. There are concerns raised by the authors about unethical practices reflected in the process of journal publication whereby scholarly influence of a select few are artificially boosted, primarily by resorting to editorial maneuvres. To counter the impact of such tactics, authors have come up with a new method that defines and measures internationality by eliminating such local effects when computing the influence of journals. A new metric, Non-Local Influence Quotient(NLIQ) is proposed as one such parameter for internationality computation along with another novel metric, Other-Citation Quotient as the complement of the ratio of self-citation and total citation. In addition, SNIP and International Collaboration Ratio are used as two other parameters.
[ { "version": "v1", "created": "Fri, 6 May 2016 04:52:18 GMT" } ]
2016-05-09T00:00:00
[ [ "Ginde", "Gouri", "" ], [ "Saha", "Snehanshu", "" ], [ "Mathur", "Archana", "" ], [ "Venkatagiri", "Sukrit", "" ], [ "Vadakkepat", "Sujith", "" ], [ "Narasimhamurthy", "Anand", "" ], [ "Sagar", "B. S. Daya", "" ] ]
new_dataset
0.989234
1605.01829
Kasper Fl{\o}e Trillingsgaard
Kasper Fl{\o}e Trillingsgaard and Petar Popovski
Downlink Transmission of Short Packets: Framing and Control Information Revisited
10 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular wireless systems rely on frame-based transmissions. The frame design is conventionally based on heuristics, consisting of a frame header and a data part. The frame header contains control information that provides pointers to the messages within the data part. In this paper, we revisit the principles of frame design and show the impact of the new design in scenarios that feature short data packets which are central to various 5G and Internet of Things applications. We treat framing for downlink transmission in an AWGN broadcast channel with K users, where the sizes of the messages to the users are random variables. Using approximations from finite blocklength information theory, we establish a framework in which a message to a given user is not necessarily encoded as a single packet, but may be grouped with the messages to other users and benefit from the improved efficiency of longer codes. This requires changes in the way control information is sent, and it requires that the users need to spend power decoding other messages, thereby increasing the average power consumption. We show that the common heuristic design is only one point on a curve that represents the trade-off between latency and power consumption.
[ { "version": "v1", "created": "Fri, 6 May 2016 05:53:56 GMT" } ]
2016-05-09T00:00:00
[ [ "Trillingsgaard", "Kasper Fløe", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.995906
1605.01878
Radhakrishna Vangipuram
Vangipuram Radhakrishna
Design and Analysis of Novel Kernel Measure for Software Fault Localization
ICEMIS '15: Proceedings of the The International Conference on Engineering & MIS 2015
null
10.1145/2832987.2833042
null
cs.SE
http://creativecommons.org/licenses/by-nc-sa/4.0/
The problem of software fault localization may be viewed as an approach for finding hidden faults or bugs in the existing program codes which are syntactically correct and give fault free output for some input instances but fail for all other input instances. Some of the reasons include logical errors, wrong interpretation of specification, coding errors. Finding such faults is not possible sometimes with the help of compilers. This is where the necessity and significance of software fault localization stems out. The main contribution for this work is to first introduce the block hit-miss function which relates block vectors of execution sequences of software code over sample runs performed and the decision vector which denotes fault or error free output. The similarity measure is applied to the block vector and decision vectors as input and the pair with maximum similarity is considered as faulty block.
[ { "version": "v1", "created": "Fri, 6 May 2016 10:11:30 GMT" } ]
2016-05-09T00:00:00
[ [ "Radhakrishna", "Vangipuram", "" ] ]
new_dataset
0.995921
1605.01886
Fritz M\"uller
Fritz M\"uller
From Sazonov's Non-Dcpo Natural Domains to Closed Directed-Lub Partial Orders
35 pages, 4 figures
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Normann proved that the domains of the game model of PCF (the domains of sequential functionals) need not be dcpos. Sazonov has defined natural domains for a theory of such incomplete domains. This paper further develops that theory. It defines lub-rules that infer natural lubs from existing natural lubs, and lub-rule classes that describe axiom systems like that of natural domains. There is a canonical proper subcategory of the natural domains, the closed directed lub partial orders (cdlubpo), that corresponds to the complete lub-rule class of all valid lub-rules. Cdlubpos can be completed to restricted dcpos, which are dcpos that retain the data of the incomplete cdlubpo as a subset.
[ { "version": "v1", "created": "Fri, 6 May 2016 10:50:35 GMT" } ]
2016-05-09T00:00:00
[ [ "Müller", "Fritz", "" ] ]
new_dataset
0.960555
1605.01977
Davide Sanvito
Giuseppe Bianchi, Marco Bonola, Salvatore Pontarelli, Davide Sanvito, Antonio Capone, Carmelo Cascone
Open Packet Processor: a programmable architecture for wire speed platform-independent stateful in-network processing
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims at contributing to the ongoing debate on how to bring programmability of stateful packet processing tasks inside the network switches, while retaining platform independency. Our proposed approach, named "Open Packet Processor" (OPP), shows the viability (via an hardware prototype relying on commodity HW technologies and operating in a strictly bounded number of clock cycles) of eXtended Finite State Machines (XFSM) as low-level data plane programming abstraction. With the help of examples, including a token bucket and a C4.5 traffic classifier based on a binary tree, we show the ability of OPP to support stateful operation and flow-level feature tracking. Platform independence is accomplished by decoupling the implementation of hardware primitives (registries, conditions, update instructions, forwarding actions, matching facilities) from their usage by an application formally described via an abstract XFSM. We finally discuss limitations and extensions.
[ { "version": "v1", "created": "Fri, 6 May 2016 15:39:44 GMT" } ]
2016-05-09T00:00:00
[ [ "Bianchi", "Giuseppe", "" ], [ "Bonola", "Marco", "" ], [ "Pontarelli", "Salvatore", "" ], [ "Sanvito", "Davide", "" ], [ "Capone", "Antonio", "" ], [ "Cascone", "Carmelo", "" ] ]
new_dataset
0.967846
1605.01987
Luke Hsiao
Kevin Miller, Luke W. Hsiao
TCPTuner: Congestion Control Your Way
6 pages, 9 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TCPTuner is a TCP (transmission control protocol) congestion control kernel module and GUI (graphical user interface) for Linux that allows real-time modification of the congestion control parameters of TCP CUBIC, the current default algorithm in Linux. Specifically, the tool provides access to alpha, the rate at which a sender's congestion window grows; beta, the multiplicative factor to decrease the congestion window on a loss event; as well as CUBIC's fast convergence and tcp friendliness parameters. Additionally, the interface provides access to ip-route parameters for the minimum retransmission time and initial congestion window size. In this paper, we describe the implementation of TCPTuner and show experimental data of the effects of adjusting congestion control parameters.
[ { "version": "v1", "created": "Fri, 6 May 2016 16:07:08 GMT" } ]
2016-05-09T00:00:00
[ [ "Miller", "Kevin", "" ], [ "Hsiao", "Luke W.", "" ] ]
new_dataset
0.999792
1605.01993
Mohammad Mohammadi Amiri Mr.
Mohammad Mohammadi Amiri, Qianqian Yang, and Deniz Gunduz
Coded Caching for a Large Number Of Users
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information theoretic analysis of a coded caching system is considered, in which a server with a database of N equal-size files, each F bits long, serves K users. Each user is assumed to have a local cache that can store M files, i.e., capacity of MF bits. Proactive caching to user terminals is considered, in which the caches are filled by the server in advance during the placement phase, without knowing the user requests. Each user requests a single file, and all the requests are satisfied simultaneously through a shared error-free link during the delivery phase. First, centralized coded caching is studied assuming both the number and the identity of the active users in the delivery phase are known by the server during the placement phase. A novel group-based centralized coded caching (GBC) scheme is proposed for a cache capacity of M = N/K. It is shown that this scheme achieves a smaller delivery rate than all the known schemes in the literature. The improvement is then extended to a wider range of cache capacities through memory-sharing between the proposed scheme and other known schemes in the literature. Next, the proposed centralized coded caching idea is exploited in the decentralized setting, in which the identities of the users that participate in the delivery phase are assumed to be unknown during the placement phase. It is shown that the proposed decentralized caching scheme also achieves a delivery rate smaller than the state-of-the-art. Numerical simulations are also presented to corroborate our theoretical results.
[ { "version": "v1", "created": "Fri, 6 May 2016 16:17:19 GMT" } ]
2016-05-09T00:00:00
[ [ "Amiri", "Mohammad Mohammadi", "" ], [ "Yang", "Qianqian", "" ], [ "Gunduz", "Deniz", "" ] ]
new_dataset
0.993948
1402.5835
J\'er\^ome Kunegis
J\'er\^ome Kunegis
Polcovar: Software for Computing the Mean and Variance of Subgraph Counts in Random Graphs
5 pages; fixed some wording; added link to Github
null
null
null
cs.MS
http://creativecommons.org/licenses/by-sa/4.0/
The mean and variance of the number of appearances of a given subgraph $H$ in an Erd\H{o}s--R\'enyi random graph over $n$ nodes are rational polynomials in $n$. We present a piece of software named Polcovar (from "polynomial" and "covariance") that computes the exact rational coefficients of these polynomials in function of $H$.
[ { "version": "v1", "created": "Mon, 24 Feb 2014 14:26:08 GMT" }, { "version": "v2", "created": "Wed, 4 May 2016 20:34:48 GMT" } ]
2016-05-06T00:00:00
[ [ "Kunegis", "Jérôme", "" ] ]
new_dataset
0.982565
1412.4564
Karel Lenc
Andrea Vedaldi, Karel Lenc
MatConvNet - Convolutional Neural Networks for MATLAB
Updated for release v1.0-beta20
null
null
null
cs.CV cs.LG cs.MS cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MatConvNet is an implementation of Convolutional Neural Networks (CNNs) for MATLAB. The toolbox is designed with an emphasis on simplicity and flexibility. It exposes the building blocks of CNNs as easy-to-use MATLAB functions, providing routines for computing linear convolutions with filter banks, feature pooling, and many more. In this manner, MatConvNet allows fast prototyping of new CNN architectures; at the same time, it supports efficient computation on CPU and GPU allowing to train complex models on large datasets such as ImageNet ILSVRC. This document provides an overview of CNNs and how they are implemented in MatConvNet and gives the technical details of each computational block in the toolbox.
[ { "version": "v1", "created": "Mon, 15 Dec 2014 12:23:35 GMT" }, { "version": "v2", "created": "Sun, 21 Jun 2015 15:35:25 GMT" }, { "version": "v3", "created": "Thu, 5 May 2016 14:31:06 GMT" } ]
2016-05-06T00:00:00
[ [ "Vedaldi", "Andrea", "" ], [ "Lenc", "Karel", "" ] ]
new_dataset
0.994323
1505.05124
Imad Ahmad
Imad Ahmad and Chih-Chun Wang
Locally Repairable Regenerating Codes: Node Unavailability and the Insufficiency of Stationary Local Repair
21 pages, 5 figures, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Locally repairable codes (LRCs) are ingeniously designed distributed storage codes with a (usually small) fixed set of helper nodes participating in repair. Since most existing LRCs assume exact repair and allow full exchange of the stored data ($\beta=\alpha$) from the helper nodes, they can be viewed as a generalization of the traditional erasure codes (ECs) with a much desired feature of local repairability via predetermined sets of helpers. However, it also means that they lack the features of (i) functional repair, and (ii) partial information-exchange ($\beta<\alpha$) in the original regenerating codes (RCs), which could further reduce the repair bandwidth. Motivated by the significant bandwidth reduction of RCs over ECs, existing works by Ahmad et al and by Hollmann studied the concept of "locally repairable regenerating codes (LRRCs)" that successfully combine functional repair and partial information exchange of regenerating codes with the much-desired local repairability feature of LRC. The resulting LRRCs demonstrate significant bandwidth reduction. One important issue that needs to be addressed by any local repair schemes (including both LRCs and LRRCs) is that sometimes designated helper nodes may be temporarily unavailable, the result of multiple failures, degraded reads, or other network dynamics. Under the setting of LRRCs with temporary node unavailability, this work studies the impact of different helper selection methods. It proves that with node unavailability, all existing methods of helper selection, including those used in RCs and LRCs, can be insufficient in terms of achieving the optimal repair-bandwidth. For some scenarios, it is necessary to combine LRRCs with a new helper selection method, termed dynamic helper selection, to achieve optimal repair bandwidth. This work also compares the performance of different helper selection methods and answers...
[ { "version": "v1", "created": "Tue, 19 May 2015 19:30:24 GMT" }, { "version": "v2", "created": "Wed, 4 May 2016 21:36:49 GMT" } ]
2016-05-06T00:00:00
[ [ "Ahmad", "Imad", "" ], [ "Wang", "Chih-Chun", "" ] ]
new_dataset
0.985799
1602.02481
Sungjoon Choi
Sungjoon Choi, Qian-Yi Zhou, Stephen Miller, and Vladlen Koltun
A Large Dataset of Object Scans
Technical report
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have created a dataset of more than ten thousand 3D scans of real objects. To create the dataset, we recruited 70 operators, equipped them with consumer-grade mobile 3D scanning setups, and paid them to scan objects in their environments. The operators scanned objects of their choosing, outside the laboratory and without direct supervision by computer vision professionals. The result is a large and diverse collection of object scans: from shoes, mugs, and toys to grand pianos, construction vehicles, and large outdoor sculptures. We worked with an attorney to ensure that data acquisition did not violate privacy constraints. The acquired data was irrevocably placed in the public domain and is available freely at http://redwood-data.org/3dscan .
[ { "version": "v1", "created": "Mon, 8 Feb 2016 07:20:52 GMT" }, { "version": "v2", "created": "Tue, 9 Feb 2016 17:21:24 GMT" }, { "version": "v3", "created": "Thu, 5 May 2016 05:35:48 GMT" } ]
2016-05-06T00:00:00
[ [ "Choi", "Sungjoon", "" ], [ "Zhou", "Qian-Yi", "" ], [ "Miller", "Stephen", "" ], [ "Koltun", "Vladlen", "" ] ]
new_dataset
0.999799
1602.03573
Pedro Roque
Pedro Roque and Rodrigo Ventura
Space CoBot: a collaborative aerial robot for indoor microgravity environments
21 pages, 13 figures. Previously at arXiv:1603.07545
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a first contribution to the design of a small aerial robot for inhabited microgravity environments, such as orbiting space stations. In particular, we target a fleet of robots for collaborative tasks with humans, such as telepresence and cooperative mobile manipulation. We explore a propeller based propulsion system, arranged in such a way that the translational and the rotational components can be decoupled, resulting in an holonomic hexarotor. Since propellers have limited thrust, we employ an optimization approach to select the geometric configuration given a criteria of uniform maximum thrust across all directions in the body reference frame. We also tackle the problem of motion control: due to the decoupling of translational and rotational modes we use separate converging controllers for each one of these modes. In addition, we present preliminary simulation results in a realistic simulator, in closed loop with the proposed controller, thus providing a first validation of the followed methodology.
[ { "version": "v1", "created": "Wed, 10 Feb 2016 23:36:14 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2016 23:15:58 GMT" } ]
2016-05-06T00:00:00
[ [ "Roque", "Pedro", "" ], [ "Ventura", "Rodrigo", "" ] ]
new_dataset
0.999164
1605.00971
Peter Dugan Dr
Peter J. Dugan, Christopher W. Clark, Yann Andr\'e LeCun, Sofie M. Van Parijs
Phase 1: DCL System Research Using Advanced Approaches for Land-based or Ship-based Real-Time Recognition and Localization of Marine Mammals - HPC System Implementation
Year 1 National Oceanic Partnership Program Report, sponsored ONR, NFWF. N000141210585
null
null
N000141210585
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We aim to investigate advancing the state of the art of detection, classification and localization (DCL) in the field of bioacoustics. The two primary goals are to develop transferable technologies for detection and classification in: (1) the area of advanced algorithms, such as deep learning and other methods; and (2) advanced systems, capable of real-time and archival and processing. This project will focus on long-term, continuous datasets to provide automatic recognition, minimizing human time to annotate the signals. Effort will begin by focusing on several years of multi-channel acoustic data collected in the Stellwagen Bank National Marine Sanctuary (SBNMS) between 2006 and 2010. Our efforts will incorporate existing technologies in the bioacoustics signal processing community, advanced high performance computing (HPC) systems, and new approaches aimed at automatically detecting-classifying and measuring features for species-specific marine mammal sounds within passive acoustic data.
[ { "version": "v1", "created": "Tue, 3 May 2016 16:35:35 GMT" }, { "version": "v2", "created": "Thu, 5 May 2016 18:27:35 GMT" } ]
2016-05-06T00:00:00
[ [ "Dugan", "Peter J.", "" ], [ "Clark", "Christopher W.", "" ], [ "LeCun", "Yann André", "" ], [ "Van Parijs", "Sofie M.", "" ] ]
new_dataset
0.953213
1605.01530
Akim Demaille
Akim Demaille
Derived-term Automata for Extended Weighted Rational Expressions
21 pages
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm to build an automaton from a rational expression. This approach introduces support for extended weighted expressions. Inspired by derived-term based algorithms, its core relies on a different construct, rational expansions. We introduce an inductive algorithm to compute the expansion of an expression from which the automaton follows. This algorithm is independent of the size of the alphabet, and actually even supports infinite alphabets. It can easily be accommodated to generate deterministic (weighted) automata. These constructs are implemented in Vcsn, a free-software platform dedicated to weighted automata and rational expressions.
[ { "version": "v1", "created": "Thu, 5 May 2016 08:50:48 GMT" } ]
2016-05-06T00:00:00
[ [ "Demaille", "Akim", "" ] ]
new_dataset
0.991709
1605.01576
Tao Zhou
Tao Zhou, Brian Johnson, Rui Li
Patch-based Texture Synthesis for Image Inpainting
in Computer Science and Applications, 2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image inpaiting is an important task in image processing and vision. In this paper, we develop a general method for patch-based image inpainting by synthesizing new textures from existing one. A novel framework is introduced to find several optimal candidate patches and generate a new texture patch in the process. We form it as an optimization problem that identifies the potential patches for synthesis from an coarse-to-fine manner. We use the texture descriptor as a clue in searching for matching patches from the known region. To ensure the structure faithful to the original image, a geometric constraint metric is formally defined that is applied directly to the patch synthesis procedure. We extensively conducted our experiments on a wide range of testing images on various scenarios and contents by arbitrarily specifying the target the regions for inference followed by using existing evaluation metrics to verify its texture coherency and structural consistency. Our results demonstrate the high accuracy and desirable output that can be potentially used for numerous applications: object removal, background subtraction, and image retrieval.
[ { "version": "v1", "created": "Thu, 5 May 2016 13:04:09 GMT" } ]
2016-05-06T00:00:00
[ [ "Zhou", "Tao", "" ], [ "Johnson", "Brian", "" ], [ "Li", "Rui", "" ] ]
new_dataset
0.999676
1605.01655
Saif Mohammad Dr.
Saif M. Mohammad, Parinaz Sobhani, and Svetlana Kiritchenko
Stance and Sentiment in Tweets
22 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We can often detect from a person's utterances whether he/she is in favor of or against a given target entity -- their stance towards the target. However, a person may express the same stance towards a target by using negative or positive language. Here for the first time we present a dataset of tweet--target pairs annotated for both stance and sentiment. The targets may or may not be referred to in the tweets, and they may or may not be the target of opinion in the tweets. Partitions of this dataset were used as training and test sets in a SemEval-2016 shared task competition. We propose a simple stance detection system that outperforms submissions from all 19 teams that participated in the shared task. Additionally, access to both stance and sentiment annotations allows us to explore several research questions. We show that while knowing the sentiment expressed by a tweet is beneficial for stance classification, it alone is not sufficient. Finally, we use additional unlabeled data through distant supervision techniques and word embeddings to further improve stance classification.
[ { "version": "v1", "created": "Thu, 5 May 2016 17:07:54 GMT" } ]
2016-05-06T00:00:00
[ [ "Mohammad", "Saif M.", "" ], [ "Sobhani", "Parinaz", "" ], [ "Kiritchenko", "Svetlana", "" ] ]
new_dataset
0.99968
1605.01696
Jeremy Thorpe
Philip Gossett, Jeremy Thorpe, Bob Nuckolls, Brett Coon, Dan McCloskey, David Chang, Greg Steuck, Paul Rodman, Sasha Levitskiy, Yuan Yuan
A Many Antenna High Rate Wireless System
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a TDD MIMO wireless system designed to operate at high bandwidth and low SNR. Signals are transmitted as a direct sequence. In the uplink (Multiple Access Channel), signal detection is done by a space-time whitening filter followed by a matched filter. In the downlink (Broadcast Channel), precoding is done by the transpose of these filters. We further describe an implementation of this system that uses an array of 32 antennas to communicate with 32 single-antenna clients simultaneously on the same frequencies between 512-608 and 614-698 MHz. At close range, all 32 links achieve the full PHY data rate, both uplink and downlink, with less than 1\% Block Error Rate on each link. The total system rate is 3.8 Gb/s. The system spectral efficiency is 21.7 b/s/Hz for both uplink and downlink. We close with some projections to the not-to-distant future.
[ { "version": "v1", "created": "Thu, 5 May 2016 19:17:13 GMT" } ]
2016-05-06T00:00:00
[ [ "Gossett", "Philip", "" ], [ "Thorpe", "Jeremy", "" ], [ "Nuckolls", "Bob", "" ], [ "Coon", "Brett", "" ], [ "McCloskey", "Dan", "" ], [ "Chang", "David", "" ], [ "Steuck", "Greg", "" ], [ "Rodman", "Paul", "" ], [ "Levitskiy", "Sasha", "" ], [ "Yuan", "Yuan", "" ] ]
new_dataset
0.998512
1603.00831
Anton Milan
Anton Milan, Laura Leal-Taixe, Ian Reid, Stefan Roth, Konrad Schindler
MOT16: A Benchmark for Multi-Object Tracking
arXiv admin note: substantial text overlap with arXiv:1504.01942
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Standardized benchmarks are crucial for the majority of computer vision applications. Although leaderboards and ranking tables should not be over-claimed, benchmarks often provide the most objective measure of performance and are therefore important guides for reseach. Recently, a new benchmark for Multiple Object Tracking, MOTChallenge, was launched with the goal of collecting existing and new data and creating a framework for the standardized evaluation of multiple object tracking methods. The first release of the benchmark focuses on multiple people tracking, since pedestrians are by far the most studied object in the tracking community. This paper accompanies a new release of the MOTChallenge benchmark. Unlike the initial release, all videos of MOT16 have been carefully annotated following a consistent protocol. Moreover, it not only offers a significant increase in the number of labeled boxes, but also provides multiple object classes beside pedestrians and the level of visibility for every single object of interest.
[ { "version": "v1", "created": "Wed, 2 Mar 2016 19:07:56 GMT" }, { "version": "v2", "created": "Tue, 3 May 2016 23:55:38 GMT" } ]
2016-05-05T00:00:00
[ [ "Milan", "Anton", "" ], [ "Leal-Taixe", "Laura", "" ], [ "Reid", "Ian", "" ], [ "Roth", "Stefan", "" ], [ "Schindler", "Konrad", "" ] ]
new_dataset
0.999305
1605.01072
Max Wolotsky
Max Wolotsky, Mohammad Husain, Elisha Choe
Chill-Pass: Using Neuro-Physiological Responses to Chill Music to Defeat Coercion Attacks
14 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current alphanumeric and biometric authentication systems cannot withstand situations where a user is coerced into releasing their authentication materials under hostile circumstances. Existing approaches of coercion resistant authentication systems (CRAS) propose authentication factors such as implicit learning tasks, which are non-transferable, but still have the drawback that an attacker can force the victim (causing stress) to perform the task in order to gain unauthorized access. Alternatively, there could be cases where the user could claim that they were coerced into giving up the authentication materials, whereas in reality they acted as an insider attacker. Therefore, being able to detect stress during authentication also helps to achieve non-repudiation in such cases. To address these concerns, we need CRAS that have both the non-transferable property as well as a mechanism to detect stress related to coercion. In this paper, we study the feasibility of using Chill (intensely pleasurable) music as a stimulus to elicit unique neuro-physiological responses that can be used as an authenticating factor for CRAS. Chill music and stress are both stimuli for a neuro-chemical called Dopamine. However, they release the Dopamine at different parts of the brain, resulting in different neuro-physiological responses, which gives us both the non-transferable and stress-detection properties necessary for CRAS. We have experimentally validated our proposed Chill music based CRAS using human subjects and measuring their neuro-physiological responses on our prototype system. Based on the 100 samples collected from the subjects, we were able to successfully authenticate the subjects with an accuracy of over 90\%. Our work not only demonstrates the potential of Chill music as a unique stimulus for CRAS, but also paves the path of wider adoption of CRAS in general.
[ { "version": "v1", "created": "Tue, 3 May 2016 20:09:27 GMT" } ]
2016-05-05T00:00:00
[ [ "Wolotsky", "Max", "" ], [ "Husain", "Mohammad", "" ], [ "Choe", "Elisha", "" ] ]
new_dataset
0.999031
1605.01120
John Kieffer
John C. Kieffer
Information Sources on a Bratteli diagram
null
null
null
null
cs.IT math.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Bratteli diagram is a type of graph in which the vertices are split into finite subsets occupying an infinite sequence of levels, starting with a bottom level and moving to successively higher levels along edges connecting consecutive levels. An information source on a Bratteli diagram consists of a sequence of PMFs on the vertex sets at each level that are compatible under edge transport. By imposing a regularity condition on the Bratteli diagram, we obtain various results for its information sources including ergodic and entropy rate decomposition theorems, a Shannon-Mcmillan-Breiman theorem, and lossless and lossy source coding theorems. Proof methodology exploits the Vershik transformation on the path space of a Bratteli diagram. Some results for finite alphabet stationary sequential information sources are seen to be a special case of the results of this paper.
[ { "version": "v1", "created": "Wed, 4 May 2016 00:27:19 GMT" } ]
2016-05-05T00:00:00
[ [ "Kieffer", "John C.", "" ] ]
new_dataset
0.991042
1605.01194
Sharmistha Jat
Lavanya Sita Tekumalla and Sharmistha
IISCNLP at SemEval-2016 Task 2: Interpretable STS with ILP based Multiple Chunk Aligner
SEMEVAL Workshop @ NAACL 2016
null
null
null
cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interpretable semantic textual similarity (iSTS) task adds a crucial explanatory layer to pairwise sentence similarity. We address various components of this task: chunk level semantic alignment along with assignment of similarity type and score for aligned chunks with a novel system presented in this paper. We propose an algorithm, iMATCH, for the alignment of multiple non-contiguous chunks based on Integer Linear Programming (ILP). Similarity type and score assignment for pairs of chunks is done using a supervised multiclass classification technique based on Random Forrest Classifier. Results show that our algorithm iMATCH has low execution time and outperforms most other participating systems in terms of alignment score. Of the three datasets, we are top ranked for answer- students dataset in terms of overall score and have top alignment score for headlines dataset in the gold chunks track.
[ { "version": "v1", "created": "Wed, 4 May 2016 09:36:49 GMT" } ]
2016-05-05T00:00:00
[ [ "Tekumalla", "Lavanya Sita", "" ], [ "Sharmistha", "", "" ] ]
new_dataset
0.998907
1605.01198
Kord Eickmeyer
Kord Eickmeyer and Ken-ichi Kawarabayashi
Successor-Invariant First-Order Logic on Graphs with Excluded Topological Subgraphs
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the model-checking problem for successor-invariant first-order logic is fixed-parameter tractable on graphs with excluded topological subgraphs when parameterised by both the size of the input formula and the size of the exluded topological subgraph. Furthermore, we show that model-checking for order-invariant first-order logic is tractable on coloured posets of bounded width, parameterised by both the size of the input formula and the width of the poset. Our result for successor-invariant FO extends previous results for this logic on planar graphs (Engelmann et al., LICS 2012) and graphs with excluded minors (Eickmeyer et al., LICS 2013), further narrowing the gap between what is known for FO and what is known for successor-invariant FO. The proof uses Grohe and Marx's structure theorem for graphs with excluded topological subgraphs. For order-invariant FO we show that Gajarsk\'y et al.'s recent result for FO carries over to order-invariant FO.
[ { "version": "v1", "created": "Wed, 4 May 2016 09:44:03 GMT" } ]
2016-05-05T00:00:00
[ [ "Eickmeyer", "Kord", "" ], [ "Kawarabayashi", "Ken-ichi", "" ] ]
new_dataset
0.996748
1605.01401
Zheng Wang
Zheng Wang
Combating Malicious DNS Tunnel
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a defense scheme against malicious use of DNS tunnel. A tunnel validator is designed to provide trustworthy tunnel-aware defensive recursive service. In addition to the detection algorithm of malicious tunnel domains, the tunnel validation relies on registered tunnel domains as whitelist and identified malicious tunnel domains as blacklist. A benign tunnel user is thus motivated to register its tunnel domain before using it. Through the tunnel validation, the secure domains are allowed to the recursive service provided by the tunnel validator and the insecure domains are blocked. All inbound suspicious DNS queries are recorded and stored for forensics and future malicious tunnel detection by the tunnel validator.
[ { "version": "v1", "created": "Wed, 4 May 2016 19:54:57 GMT" } ]
2016-05-05T00:00:00
[ [ "Wang", "Zheng", "" ] ]
new_dataset
0.994622
1503.06882
Deli Qiao
Deli Qiao, Haifeng Qian, and Geoffrey Ye Li
Broadbeam for Massive MIMO Systems
null
null
10.1109/TSP.2016.2521609
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive MIMO has been identified as one of the promising disruptive air interface techniques to address the huge capacity requirement demanded by 5G wireless communications. For practical deployment of such systems, the control message need to be broadcast to all users reliably in the cell using broadbeam. A broadbeam is expected to have the same radiated power in all directions to cover users in any place in a cell. In this paper, we will show that there is no perfect broadbeam. Therefore, we develop a method for generating broadbeam that can allow tiny fluctuations in radiated power. Overall, this can serve as an ingredient for practical deployment of the massive MIMO systems.
[ { "version": "v1", "created": "Tue, 24 Mar 2015 00:53:48 GMT" } ]
2016-05-04T00:00:00
[ [ "Qiao", "Deli", "" ], [ "Qian", "Haifeng", "" ], [ "Li", "Geoffrey Ye", "" ] ]
new_dataset
0.990372
1504.00126
Maximilian Matthe
Maximilian Matth\'e, Gerhard Fettweis
Conjugate-Root Offset-QAM for Orthogonal Multicarrier Transmission
4pages, revised version submitted to IEEE WCL
null
10.1186/s13634-016-0342-2
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current implementations of OFDM/OQAM are restricted to band-limited symmetric filters. To circumvent this, non-symmetric conjugate root (CR) filters are proposed for OQAM modulation. The system is applied to Generalized Frequency Division Multiplexing (GFDM) and a method for achieving transmit diversity with OQAM modulation is presented. The proposal reduces implementation complexity compared to existing works and provides a more regular phase space. GFDM/CR-OQAM outperforms conventional GFDM in terms of symbol error rate in fading multipath channels and provides a more localized spectrum compared to conventional OQAM.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 07:17:12 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2015 11:29:27 GMT" } ]
2016-05-04T00:00:00
[ [ "Matthé", "Maximilian", "" ], [ "Fettweis", "Gerhard", "" ] ]
new_dataset
0.962449
1505.07487
Joshua Joy
Joshua Joy, Eric Chung, Zengwen Yuan, Leqi Zou, Jiayao Li, Mario Gerla
DiscoverFriends: Secure Social Network Communication in Mobile Ad Hoc Networks
Eric and Joshua contributed equally to this work
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a secure communication application called DiscoverFriends. Its purpose is to securely communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide authentication. Additionally, DiscoverFriends enables anonymous location check-ins by utilizing a new cryptographic primitive called Function Secret Sharing. Finally, to the best of our knowledge, DiscoverFriends implements and evaluates the first Android multi-hop WiFi direct protocol using IPv6.
[ { "version": "v1", "created": "Wed, 27 May 2015 20:42:57 GMT" }, { "version": "v2", "created": "Mon, 2 May 2016 20:40:09 GMT" } ]
2016-05-04T00:00:00
[ [ "Joy", "Joshua", "" ], [ "Chung", "Eric", "" ], [ "Yuan", "Zengwen", "" ], [ "Zou", "Leqi", "" ], [ "Li", "Jiayao", "" ], [ "Gerla", "Mario", "" ] ]
new_dataset
0.991655
1506.02160
Jie Ding
Jie Ding, Mohammad Noshad, and Vahid Tarokh
Complementary Lattice Arrays for Coded Aperture Imaging
null
null
10.1364/JOSAA.33.000863
null
cs.IT astro-ph.IM math.CO math.IT physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider complementary lattice arrays in order to enable a broader range of designs for coded aperture imaging systems. We provide a general framework and methods that generate richer and more flexible designs than existing ones. Besides this, we review and interpret the state-of-the-art uniformly redundant arrays (URA) designs, broaden the related concepts, and further propose some new design methods.
[ { "version": "v1", "created": "Sat, 6 Jun 2015 14:57:12 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2015 14:40:55 GMT" } ]
2016-05-04T00:00:00
[ [ "Ding", "Jie", "" ], [ "Noshad", "Mohammad", "" ], [ "Tarokh", "Vahid", "" ] ]
new_dataset
0.987348
1506.05367
Dinesh Ramasamy
Zhinus Marzi, Dinesh Ramasamy and Upamanyu Madhow
Compressive channel estimation and tracking for large arrays in mm wave picocells
null
null
10.1109/JSTSP.2016.2520899
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose and investigate a compressive architecture for estimation and tracking of sparse spatial channels in millimeter (mm) wave picocellular networks. The base stations are equipped with antenna arrays with a large number of elements (which can fit within compact form factors because of the small carrier wavelength) and employ radio frequency (RF) beamforming, so that standard least squares adaptation techniques (which require access to individual antenna elements) are not applicable. We focus on the downlink, and show that "compressive beacons," transmitted using pseudorandom phase settings at the base station array, and compressively processed using pseudorandom phase settings at the mobile array, provide information sufficient for accurate estimation of the two-dimensional (2D) spatial frequencies associated with the directions of departure of the dominant rays from the base station, and the associated complex gains. This compressive approach is compatible with coarse phase-only control, and is based on a near-optimal sequential algorithm for frequency estimation which can exploit the geometric continuity of the channel across successive beaconing intervals to reduce the overhead to less than 1% even for very large (32 x 32) arrays. Compressive beaconing is essentially omnidirectional, and hence does not enjoy the SNR and spatial reuse benefits of beamforming obtained during data transmission. We therefore discuss system level design considerations for ensuring that the beacon SNR is sufficient for accurate channel estimation, and that inter-cell beacon interference is controlled by an appropriate reuse scheme.
[ { "version": "v1", "created": "Wed, 17 Jun 2015 15:27:37 GMT" } ]
2016-05-04T00:00:00
[ [ "Marzi", "Zhinus", "" ], [ "Ramasamy", "Dinesh", "" ], [ "Madhow", "Upamanyu", "" ] ]
new_dataset
0.993839
1509.02604
Tsung-Hui Chang
Tsung-Hui Chang, Wei-Cheng Liao, Mingyi Hong and Xiangfeng Wang
Asynchronous Distributed ADMM for Large-Scale Optimization- Part II: Linear Convergence Analysis and Numerical Performance
submitted for publication, 28 pages
null
10.1109/TSP.2016.2537261
null
cs.DC cs.LG cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The alternating direction method of multipliers (ADMM) has been recognized as a versatile approach for solving modern large-scale machine learning and signal processing problems efficiently. When the data size and/or the problem dimension is large, a distributed version of ADMM can be used, which is capable of distributing the computation load and the data set to a network of computing nodes. Unfortunately, a direct synchronous implementation of such algorithm does not scale well with the problem size, as the algorithm speed is limited by the slowest computing nodes. To address this issue, in a companion paper, we have proposed an asynchronous distributed ADMM (AD-ADMM) and studied its worst-case convergence conditions. In this paper, we further the study by characterizing the conditions under which the AD-ADMM achieves linear convergence. Our conditions as well as the resulting linear rates reveal the impact that various algorithm parameters, network delay and network size have on the algorithm performance. To demonstrate the superior time efficiency of the proposed AD-ADMM, we test the AD-ADMM on a high-performance computer cluster by solving a large-scale logistic regression problem.
[ { "version": "v1", "created": "Wed, 9 Sep 2015 02:07:27 GMT" } ]
2016-05-04T00:00:00
[ [ "Chang", "Tsung-Hui", "" ], [ "Liao", "Wei-Cheng", "" ], [ "Hong", "Mingyi", "" ], [ "Wang", "Xiangfeng", "" ] ]
new_dataset
0.990335
1602.03638
Mikael Mortensen
Mikael Mortensen and Hans Petter Langtangen
High performance Python for direct numerical simulations of turbulent flows
null
null
10.1016/j.cpc.2016.02.005
null
cs.MS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Direct Numerical Simulations (DNS) of the Navier Stokes equations is an invaluable research tool in fluid dynamics. Still, there are few publicly available research codes and, due to the heavy number crunching implied, available codes are usually written in low-level languages such as C/C++ or Fortran. In this paper we describe a pure scientific Python pseudo-spectral DNS code that nearly matches the performance of C++ for thousands of processors and billions of unknowns. We also describe a version optimized through Cython, that is found to match the speed of C++. The solvers are written from scratch in Python, both the mesh, the MPI domain decomposition, and the temporal integrators. The solvers have been verified and benchmarked on the Shaheen supercomputer at the KAUST supercomputing laboratory, and we are able to show very good scaling up to several thousand cores. A very important part of the implementation is the mesh decomposition (we implement both slab and pencil decompositions) and 3D parallel Fast Fourier Transforms (FFT). The mesh decomposition and FFT routines have been implemented in Python using serial FFT routines (either NumPy, pyFFTW or any other serial FFT module), NumPy array manipulations and with MPI communications handled by MPI for Python (mpi4py). We show how we are able to execute a 3D parallel FFT in Python for a slab mesh decomposition using 4 lines of compact Python code, for which the parallel performance on Shaheen is found to be slightly better than similar routines provided through the FFTW library. For a pencil mesh decomposition 7 lines of code is required to execute a transform.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 08:12:37 GMT" } ]
2016-05-04T00:00:00
[ [ "Mortensen", "Mikael", "" ], [ "Langtangen", "Hans Petter", "" ] ]
new_dataset
0.966064
1602.04115
Maryam Mehrnezhad
Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript
null
null
10.1016/j.jisa.2015.11.007
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's permission. The associated risks to user security and privacy are however not considered in W3C specifications. In this work, for the first time, we show how user security can be compromised using these sensor data via browser, despite that the data rate is 3 to 5 times slower than what is available in app. We examine multiple popular browsers on Android and iOS platforms and study their policies in granting permissions to JavaScript code with respect to access to motion and orientation sensor data. Based on our observations, we identify multiple vulnerabilities, and propose TouchSignatures which implements an attack where malicious JavaScript code on an attack tab listens to such sensor data measurements. Based on these streams, TouchSignatures is able to distinguish the user's touch actions (i.e., tap, scroll, hold, and zoom) and her PINs, allowing a remote website to learn the client-side user activities. We demonstrate the practicality of this attack by collecting data from real users and reporting high success rates using our proof-of-concept implementations. We also present a set of potential solutions to address the vulnerabilities. The W3C community and major mobile browser vendors including Mozilla, Google, Apple and Opera have acknowledge our work and are implementing some of our proposed countermeasures.
[ { "version": "v1", "created": "Fri, 12 Feb 2016 16:44:55 GMT" } ]
2016-05-04T00:00:00
[ [ "Mehrnezhad", "Maryam", "" ], [ "Toreini", "Ehsan", "" ], [ "Shahandashti", "Siamak F.", "" ], [ "Hao", "Feng", "" ] ]
new_dataset
0.998813
1603.05335
Delu Zeng
Tong Zhao, Lin Li, Xinghao Ding, Yue Huang and Delu Zeng
Saliency Detection with Spaces of Background-based Distribution
5 pages, 6 figures, Accepted by IEEE Signal Processing Letters in March 2016
null
10.1109/LSP.2016.2544781
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, an effective image saliency detection method is proposed by constructing some novel spaces to model the background and redefine the distance of the salient patches away from the background. Concretely, given the backgroundness prior, eigendecomposition is utilized to create four spaces of background-based distribution (SBD) to model the background, in which a more appropriate metric (Mahalanobis distance) is quoted to delicately measure the saliency of every image patch away from the background. After that, a coarse saliency map is obtained by integrating the four adjusted Mahalanobis distance maps, each of which is formed by the distances between all the patches and background in the corresponding SBD. To be more discriminative, the coarse saliency map is further enhanced into the posterior probability map within Bayesian perspective. Finally, the final saliency map is generated by properly refining the posterior probability map with geodesic distance. Experimental results on two usual datasets show that the proposed method is effective compared with the state-of-the-art algorithms.
[ { "version": "v1", "created": "Thu, 17 Mar 2016 02:18:30 GMT" } ]
2016-05-04T00:00:00
[ [ "Zhao", "Tong", "" ], [ "Li", "Lin", "" ], [ "Ding", "Xinghao", "" ], [ "Huang", "Yue", "" ], [ "Zeng", "Delu", "" ] ]
new_dataset
0.999601
1604.00515
Honggang Hu
Honggang Hu, Qingsheng Zhang, and Shuai Shao
On the Dual of the Coulter-Matthews Bent Functions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For any bent function, it is very interesting to determine its dual function because the dual function is also bent in certain cases. For $k$ odd and $\gcd(n, k)=1$, it is known that the Coulter-Matthews bent function $f(x)=Tr(ax^{\frac{3^k+1}{2}})$ is weakly regular bent over $\mathbb{F}_{3^n}$, where $a\in\mathbb{F}_{3^n}^{*}$, and $Tr(\cdot):\mathbb{F}_{3^n}\rightarrow\mathbb{F}_3$ is the trace function. In this paper, we investigate the dual function of $f(x)$, and dig out an universal formula. In particular, for two cases, we determine the formula explicitly: for the case of $n=3t+1$ and $k=2t+1$ with $t\geq 2$, the dual function is given by $$Tr\left(-\frac{x^{3^{2t+1}+3^{t+1}+2}}{a^{3^{2t+1}+3^{t+1}+1}}-\frac{x^{3^{2t}+1}}{a^{-3^{2t}+3^{t}+1}}+\frac{x^{2}}{a^{-3^{2t+1}+3^{t+1}+1}}\right);$$ and for the case of $n=3t+2$ and $k=2t+1$ with $t\geq 2$, the dual function is given by $$Tr\left(-\frac{x^{3^{2t+2}+1}}{a^{3^{2t+2}-3^{t+1}+3}}-\frac{x^{2\cdot3^{2t+1}+3^{t+1}+1}}{a^{3^{2t+2}+3^{t+1}+1}}+\frac{x^2}{a^{-3^{2t+2}+3^{t+1}+3}}\right).$$ As a byproduct, we find two new classes of ternary bent functions with only three terms. Moreover, we also prove that in certain cases $f(x)$ is regular bent.
[ { "version": "v1", "created": "Sat, 2 Apr 2016 15:14:16 GMT" }, { "version": "v2", "created": "Sat, 30 Apr 2016 10:44:26 GMT" }, { "version": "v3", "created": "Tue, 3 May 2016 14:41:39 GMT" } ]
2016-05-04T00:00:00
[ [ "Hu", "Honggang", "" ], [ "Zhang", "Qingsheng", "" ], [ "Shao", "Shuai", "" ] ]
new_dataset
0.99765
1605.00017
Seunghyun Park
Seunghyun Park, Seonwoo Min, Hyunsoo Choi, and Sungroh Yoon
deepMiRGene: Deep Neural Network based Precursor microRNA Prediction
null
null
null
null
cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since microRNAs (miRNAs) play a crucial role in post-transcriptional gene regulation, miRNA identification is one of the most essential problems in computational biology. miRNAs are usually short in length ranging between 20 and 23 base pairs. It is thus often difficult to distinguish miRNA-encoding sequences from other non-coding RNAs and pseudo miRNAs that have a similar length, and most previous studies have recommended using precursor miRNAs instead of mature miRNAs for robust detection. A great number of conventional machine-learning-based classification methods have been proposed, but they often have the serious disadvantage of requiring manual feature engineering, and their performance is limited as well. In this paper, we propose a novel miRNA precursor prediction algorithm, deepMiRGene, based on recurrent neural networks, specifically long short-term memory networks. deepMiRGene automatically learns suitable features from the data themselves without manual feature engineering and constructs a model that can successfully reflect structural characteristics of precursor miRNAs. For the performance evaluation of our approach, we have employed several widely used evaluation metrics on three recent benchmark datasets and verified that deepMiRGene delivered comparable performance among the current state-of-the-art tools.
[ { "version": "v1", "created": "Fri, 29 Apr 2016 20:12:04 GMT" } ]
2016-05-04T00:00:00
[ [ "Park", "Seunghyun", "" ], [ "Min", "Seonwoo", "" ], [ "Choi", "Hyunsoo", "" ], [ "Yoon", "Sungroh", "" ] ]
new_dataset
0.998633
1605.00082
Ahmad Abboud Dr.
Ahmad Abboud, Jean-Pierre Cances, Ali H. Jaber, Vahid Meghdadi
Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map
7 pages,7 figures, Conference paper
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive MIMO brings both motivations and challenges to develop the 5th generation Mobile wireless technology. The promising number of users and the high bitrate offered per unit area are challenged by uplink pilot contamination due to pilot reuse and a limited number of orthogonal pilot sequences. This paper proposes a solution to mitigate uplink pilot contamination in an indoor scenario where multi-cell share the same pool of pilot sequences, that are supposed to be less than the number of users. This can be done by reducing uplink pilots using Channel State Information (CSI) prediction. The proposed method is based on machine learning approach, where a quantized version of Channel State Information (QCSI) is learned during estimation session and stored at the Base Station (BS) to be exploited for future CSI prediction. The learned QCSI are represented by a weighted directed graph, which is responsible to monitor and predict the CSI of User Terminals (UTs) in the local cell. We introduce an online learning algorithm to create and update this graph which we call CSI map. Simulation results show an increase in the downlink sum-rate and a significant feedback reduction.
[ { "version": "v1", "created": "Sat, 30 Apr 2016 09:23:51 GMT" } ]
2016-05-04T00:00:00
[ [ "Abboud", "Ahmad", "" ], [ "Cances", "Jean-Pierre", "" ], [ "Jaber", "Ali H.", "" ], [ "Meghdadi", "Vahid", "" ] ]
new_dataset
0.992193
1605.00681
Lu Zhang
Lu Zhang, Luis Vega, Michael Taylor
Power Side Channels in Security ICs: Hardware Countermeasures
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Power side-channel attacks are a very effective cryptanalysis technique that can infer secret keys of security ICs by monitoring the power consumption. Since the emergence of practical attacks in the late 90s, they have been a major threat to many cryptographic-equipped devices including smart cards, encrypted FPGA designs, and mobile phones. Designers and manufacturers of cryptographic devices have in response developed various countermeasures for protection. Attacking methods have also evolved to counteract resistant implementations. This paper reviews foundational power analysis attack techniques and examines a variety of hardware design mitigations. The aim is to highlight exposed vulnerabilities in hardware-based countermeasures for future more secure implementations.
[ { "version": "v1", "created": "Mon, 2 May 2016 20:41:50 GMT" } ]
2016-05-04T00:00:00
[ [ "Zhang", "Lu", "" ], [ "Vega", "Luis", "" ], [ "Taylor", "Michael", "" ] ]
new_dataset
0.99353