id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1505.03329
Jelena Milosevic
Jelena Milosevic, Alberto Ferrante, Miroslaw Malek
A general practitioner or a specialist for your infected smartphone?
2 pages poster, IEEE Symposium on Security and Privacy, San Jose, USA, May 2015
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With explosive growth in the number of mobile devices, the mobile malware is rapidly spreading as well, and the number of encountered malware families is increasing. Existing solutions, which are mainly based on one malware detector running on the phone or in the cloud, are no longer effective. Main problem lies in the fact that it might be impossible to create a unique mobile malware detector that would be able to detect different malware families with high accuracy, being at the same time lightweight enough not to drain battery quickly and fast enough to give results of detection promptly. The proposed approach to mobile malware detection is analogous to general practitioner versus specialist approach to dealing with a medical problem. Similarly to a general practitioner that, based on indicative symptoms identifies potential illnesses and sends the patient to an appropriate specialist, our detection system distinguishes among symptoms representing different malware families and, once the symptoms are detected, it triggers specific analyses. A system monitoring application operates in the same way as a general practitioner. It is able to distinguish between different symptoms and trigger appropriate detection mechanisms. As an analogy to different specialists, an ensemble of detectors, each of which specifically trained for a particular malware family, is used. The main challenge of the approach is to define representative symptoms of different malware families and train detectors accordingly to them. The main goal of the poster is to foster discussion on the most representative symptoms of different malware families and to discuss initial results in this area obtained by using Malware Genome project dataset.
[ { "version": "v1", "created": "Wed, 13 May 2015 11:09:52 GMT" } ]
2015-05-14T00:00:00
[ [ "Milosevic", "Jelena", "" ], [ "Ferrante", "Alberto", "" ], [ "Malek", "Miroslaw", "" ] ]
new_dataset
0.99252
1505.03406
Tsvetan Asamov
Nuh Aydin and Tsvetan Asamov
A Database of $\mathbb{Z}_4$ Codes
null
Journal of Combinatorics, Information and System Sciences, Vol. 34 No. 1-4 Comb, 2009, p: 1-12
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has been much research on codes over $\mathbb{Z}_4$, sometimes called quaternary codes, for over a decade. Yet, no database is available for best known quaternary codes. This work introduces a new database for quaternary codes. It also presents a new search algorithm called genetic code search (GCS), as well as new quaternary codes obtained by existing and new search methods.
[ { "version": "v1", "created": "Wed, 13 May 2015 14:38:59 GMT" } ]
2015-05-14T00:00:00
[ [ "Aydin", "Nuh", "" ], [ "Asamov", "Tsvetan", "" ] ]
new_dataset
0.999775
1505.03446
Deepak Vasisht
Deepak Vasisht, Swarun Kumar, Dina Katabi
Sub-Nanosecond Time of Flight on Commercial Wi-Fi Cards
14 pages
null
null
null
cs.NI cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-of-flight, i.e., the time incurred by a signal to travel from transmitter to receiver, is perhaps the most intuitive way to measure distances using wireless signals. It is used in major positioning systems such as GPS, RADAR, and SONAR. However, attempts at using time-of-flight for indoor localization have failed to deliver acceptable accuracy due to fundamental limitations in measuring time on Wi-Fi and other RF consumer technologies. While the research community has developed alternatives for RF-based indoor localization that do not require time-of-flight, those approaches have their own limitations that hamper their use in practice. In particular, many existing approaches need receivers with large antenna arrays while commercial Wi-Fi nodes have two or three antennas. Other systems require fingerprinting the environment to create signal maps. More fundamentally, none of these methods support indoor positioning between a pair of Wi-Fi devices without~third~party~support. In this paper, we present a set of algorithms that measure the time-of-flight to sub-nanosecond accuracy on commercial Wi-Fi cards. We implement these algorithms and demonstrate a system that achieves accurate device-to-device localization, i.e. enables a pair of Wi-Fi devices to locate each other without any support from the infrastructure, not even the location of the access points.
[ { "version": "v1", "created": "Wed, 13 May 2015 16:13:38 GMT" } ]
2015-05-14T00:00:00
[ [ "Vasisht", "Deepak", "" ], [ "Kumar", "Swarun", "" ], [ "Katabi", "Dina", "" ] ]
new_dataset
0.985996
0704.1756
Jose M. Martin-Garcia
Jose M. Martin-Garcia, Renato Portugal, Leon R. U. Manssur
The Invar Tensor Package
Accepted in Computer Physics Communications. Package can be downloaded from http://metric.iem.csic.es/Martin-Garcia/xAct/Invar/ (Mathematica version) or http://www.lncc.br/~portugal/Invar.html (Maple version)
Comp. Phys. Commun. 177 (2007) 640-648
10.1016/j.cpc.2007.05.015
null
cs.SC gr-qc hep-th
null
The Invar package is introduced, a fast manipulator of generic scalar polynomial expressions formed from the Riemann tensor of a four-dimensional metric-compatible connection. The package can maximally simplify any polynomial containing tensor products of up to seven Riemann tensors within seconds. It has been implemented both in Mathematica and Maple algebraic systems.
[ { "version": "v1", "created": "Fri, 13 Apr 2007 13:03:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Martin-Garcia", "Jose M.", "" ], [ "Portugal", "Renato", "" ], [ "Manssur", "Leon R. U.", "" ] ]
new_dataset
0.994218
0705.4654
Donald Sofge
Peter F. Lichtenwalner and Donald A. Sofge
Local Area Damage Detection in Composite Structures Using Piezoelectric Transducers
7 pages
P.F. Lichtenwalner and D. Sofge, "Local Area Damage Detection in Composite Structures Using Piezoelectric Transducers," In Proc. SPIE Sym. on Smart Structures and Materials, Vol. 3326, SPIE, pp. 509-515, 1998
10.1117/12.310667
null
cs.SD cs.CV
null
An integrated and automated smart structures approach for structural health monitoring is presented, utilizing an array of piezoelectric transducers attached to or embedded within the structure for both actuation and sensing. The system actively interrogates the structure via broadband excitation of multiple actuators across a desired frequency range. The structure's vibration signature is then characterized by computing the transfer functions between each actuator/sensor pair, and compared to the baseline signature. Experimental results applying the system to local area damage detection in a MD Explorer rotorcraft composite flexbeam are presented.
[ { "version": "v1", "created": "Thu, 31 May 2007 17:19:17 GMT" } ]
2015-05-13T00:00:00
[ [ "Lichtenwalner", "Peter F.", "" ], [ "Sofge", "Donald A.", "" ] ]
new_dataset
0.994418
0712.4176
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Choong Seon Hong
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
6 pages
Proceedings of the 9th IEEE ICACT 2007, Volume I, February 12-14, 2007, Phoenix Park, Korea, pp. 804-809
10.1093/ietisy/e90-d.11.1885
null
cs.CR cs.NI
null
With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authentication scheme and improve that scheme to ensure robust security for the remote authentication process, keeping all the advantages that were present in that scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. We present a detailed cryptanalysis of previously proposed Shen et. al scheme and an analysis of the improved scheme to show its improvements and efficiency.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:37:45 GMT" } ]
2015-05-13T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Hong", "Choong Seon", "" ] ]
new_dataset
0.994803
0806.3099
Daniel Turner
D. Z. Turner, K. B. Nakshatrala and K. D. Hjelmstad
On the stability of bubble functions and a stabilized mixed finite element formulation for the Stokes problem
25 pages, 13 figures (The previous version was compiled by mistake with the wrong style file, the current one uses amsart, and there is no difference in the text or the figures)
null
10.1002/fld.1936
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the relationship between stabilized and enriched finite element formulations for the Stokes problem. We also present a new stabilized mixed formulation for which the stability parameter is derived purely by the method of weighted residuals. This new formulation allows equal order interpolation for the velocity and pressure fields. Finally, we show by counterexample that a direct equivalence between subgrid-based stabilized finite element methods and Galerkin methods enriched by bubble functions cannot be constructed for quadrilateral and hexahedral elements using standard bubble functions.
[ { "version": "v1", "created": "Wed, 18 Jun 2008 22:29:27 GMT" }, { "version": "v2", "created": "Sat, 21 Jun 2008 02:56:56 GMT" } ]
2015-05-13T00:00:00
[ [ "Turner", "D. Z.", "" ], [ "Nakshatrala", "K. B.", "" ], [ "Hjelmstad", "K. D.", "" ] ]
new_dataset
0.996023
0807.1765
Renato Figueiredo
Renato Figueiredo, P. Oscar Boykin, Jose A. B. Fortes, Tao Li, Jie-Kwon Peir, David Wolinsky, Lizy John, David Kaeli, David Lilja, Sally McKee, Gokhan Memik, Alain Roy, Gary Tyson
Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education
11 pages, 2 figures. Describes the Archer project, http://archer-project.org
null
10.1007/978-3-642-03354-4_7
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces Archer, a community-based computing resource for computer architecture research and education. The Archer infrastructure integrates virtualization and batch scheduling middleware to deliver high-throughput computing resources aggregated from resources distributed across wide-area networks and owned by different participating entities in a seamless manner. The paper discusses the motivations leading to the design of Archer, describes its core middleware components, and presents an analysis of the functionality and performance of a prototype wide-area deployment running a representative computer architecture simulation workload.
[ { "version": "v1", "created": "Fri, 11 Jul 2008 02:47:55 GMT" } ]
2015-05-13T00:00:00
[ [ "Figueiredo", "Renato", "" ], [ "Boykin", "P. Oscar", "" ], [ "Fortes", "Jose A. B.", "" ], [ "Li", "Tao", "" ], [ "Peir", "Jie-Kwon", "" ], [ "Wolinsky", "David", "" ], [ "John", "Lizy", "" ], [ "Kaeli", "David", "" ], [ "Lilja", "David", "" ], [ "McKee", "Sally", "" ], [ "Memik", "Gokhan", "" ], [ "Roy", "Alain", "" ], [ "Tyson", "Gary", "" ] ]
new_dataset
0.996325
0809.2639
Yiyue Wu
Yiyue Wu and Robert Calderbank
Code diversity in multiple antenna wireless communication
9 pages
null
10.1109/JSTSP.2009.2035861
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The standard approach to the design of individual space-time codes is based on optimizing diversity and coding gains. This geometric approach leads to remarkable examples, such as perfect space-time block codes, for which the complexity of Maximum Likelihood (ML) decoding is considerable. Code diversity is an alternative and complementary approach where a small number of feedback bits are used to select from a family of space-time codes. Different codes lead to different induced channels at the receiver, where Channel State Information (CSI) is used to instruct the transmitter how to choose the code. This method of feedback provides gains associated with beamforming while minimizing the number of feedback bits. It complements the standard approach to code design by taking advantage of different (possibly equivalent) realizations of a particular code design. Feedback can be combined with sub-optimal low complexity decoding of the component codes to match ML decoding performance of any individual code in the family. It can also be combined with ML decoding of the component codes to improve performance beyond ML decoding performance of any individual code. One method of implementing code diversity is the use of feedback to adapt the phase of a transmitted signal as shown for 4 by 4 Quasi-Orthogonal Space-Time Block Code (QOSTBC) and multi-user detection using the Alamouti code. Code diversity implemented by selecting from equivalent variants is used to improve ML decoding performance of the Golden code. This paper introduces a family of full rate circulant codes which can be linearly decoded by fourier decomposition of circulant matrices within the code diversity framework. A 3 by 3 circulant code is shown to outperform the Alamouti code at the same transmission rate.
[ { "version": "v1", "created": "Tue, 16 Sep 2008 05:30:39 GMT" } ]
2015-05-13T00:00:00
[ [ "Wu", "Yiyue", "" ], [ "Calderbank", "Robert", "" ] ]
new_dataset
0.981805
0902.2685
Jakub Mo\'scicki
J.T.Mo\'scicki, F.Brochu, J.Ebke, U.Egede, J.Elmsheuser, K.Harrison, R.W.L.Jones, H.C.Lee, D.Liko, A.Maier, A.Muraru, G.N.Patrick, K.Pajchel, W.Reece, B.H.Samset, M.W.Slater, A.Soroko, C.L.Tan, D.C.Vanderster, M.Williams
Ganga: a tool for computational-task management and easy access to Grid resources
Extended and clarified information on the Grid computing context for Ganga, supported job model etc. Additional minor corrections and clarifications. Updated the author list as agreed with the Ganga team
null
10.1016/j.cpc.2009.06.016
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the computational task-management tool Ganga, which allows for the specification, submission, bookkeeping and post-processing of computational tasks on a wide set of distributed resources. Ganga has been developed to solve a problem increasingly common in scientific projects, which is that researchers must regularly switch between different processing systems, each with its own command set, to complete their computational tasks. Ganga provides a homogeneous environment for processing data on heterogeneous resources. We give examples from High Energy Physics, demonstrating how an analysis can be developed on a local system and then transparently moved to a Grid system for processing of all available data. Ganga has an API that can be used via an interactive interface, in scripts, or through a GUI. Specific knowledge about types of tasks or computational resources is provided at run-time through a plugin system, making new developments easy to integrate. We give an overview of the Ganga architecture, give examples of current use, and demonstrate how Ganga can be used in many different areas of science.
[ { "version": "v1", "created": "Mon, 16 Feb 2009 13:31:44 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 08:14:08 GMT" } ]
2015-05-13T00:00:00
[ [ "Mościcki", "J. T.", "" ], [ "Brochu", "F.", "" ], [ "Ebke", "J.", "" ], [ "Egede", "U.", "" ], [ "Elmsheuser", "J.", "" ], [ "Harrison", "K.", "" ], [ "Jones", "R. W. L.", "" ], [ "Lee", "H. C.", "" ], [ "Liko", "D.", "" ], [ "Maier", "A.", "" ], [ "Muraru", "A.", "" ], [ "Patrick", "G. N.", "" ], [ "Pajchel", "K.", "" ], [ "Reece", "W.", "" ], [ "Samset", "B. H.", "" ], [ "Slater", "M. W.", "" ], [ "Soroko", "A.", "" ], [ "Tan", "C. L.", "" ], [ "Vanderster", "D. C.", "" ], [ "Williams", "M.", "" ] ]
new_dataset
0.986309
0903.2904
Andreas Bauer
Andreas Bauer, Rajeev Gore, Alwen Tiu
A decidable policy language for history-based transaction monitoring
null
null
10.1007/978-3-642-03466-4_6
null
cs.LO cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting, the decision to trust a user may sensibly be based on that user's past behaviour. We introduce a specification language based on linear temporal logic for expressing a policy for categorising the behaviour patterns of a user depending on its transaction history. We also present an algorithm for checking whether the transaction history obeys the stated policy. To be useful in a real setting, such a language should allow one to express realistic policies which may involve parameter quantification and quantitative or statistical patterns. We introduce several extensions of linear temporal logic to cater for such needs: a restricted form of universal and existential quantification; arbitrary computable functions and relations in the term language; and a "counting" quantifier for counting how many times a formula holds in the past. We then show that model checking a transaction history against a policy, which we call the history-based transaction monitoring problem, is PSPACE-complete in the size of the policy formula and the length of the history. The problem becomes decidable in polynomial time when the policies are fixed. We also consider the problem of transaction monitoring in the case where not all the parameters of actions are observable. We formulate two such "partial observability" monitoring problems, and show their decidability under certain restrictions.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 06:23:44 GMT" } ]
2015-05-13T00:00:00
[ [ "Bauer", "Andreas", "" ], [ "Gore", "Rajeev", "" ], [ "Tiu", "Alwen", "" ] ]
new_dataset
0.951894
0903.3524
Jin-San Cheng
Jin-San Cheng, Xiao-Shan Gao and Jia Li
Ambient Isotopic Meshing of Implicit Algebraic Surface with Singularities
34 pages, 17 Postscript figures
null
10.1007/978-3-642-04103-7_9
MM-preprints, vol. 27, 2008
cs.CG cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete method is proposed to compute a certified, or ambient isotopic, meshing for an implicit algebraic surface with singularities. By certified, we mean a meshing with correct topology and any given geometric precision. We propose a symbolic-numeric method to compute a certified meshing for the surface inside a box containing singularities and use a modified Plantinga-Vegter marching cube method to compute a certified meshing for the surface inside a box without singularities. Nontrivial examples are given to show the effectiveness of the algorithm. To our knowledge, this is the first method to compute a certified meshing for surfaces with singularities.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 13:53:35 GMT" } ]
2015-05-13T00:00:00
[ [ "Cheng", "Jin-San", "" ], [ "Gao", "Xiao-Shan", "" ], [ "Li", "Jia", "" ] ]
new_dataset
0.998946
0904.2203
Imran Pirwani
Imran A. Pirwani (1), Mohammad R. Salavatipour (1) ((1) Department of Computing Science, University of Alberta, Edmonton, Canada)
A Weakly-Robust PTAS for Minimum Clique Partition in Unit Disk Graphs
21 pages, 9 figures
null
10.1007/978-3-642-13731-0_19
null
cs.CG cs.DC cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of partitioning the set of vertices of a given unit disk graph (UDG) into a minimum number of cliques. The problem is NP-hard and various constant factor approximations are known, with the current best ratio of 3. Our main result is a {\em weakly robust} polynomial time approximation scheme (PTAS) for UDGs expressed with edge-lengths, it either (i) computes a clique partition or (ii) gives a certificate that the graph is not a UDG; for the case (i) that it computes a clique partition, we show that it is guaranteed to be within $(1+\eps)$ ratio of the optimum if the input is UDG; however if the input is not a UDG it either computes a clique partition as in case (i) with no guarantee on the quality of the clique partition or detects that it is not a UDG. Noting that recognition of UDG's is NP-hard even if we are given edge lengths, our PTAS is a weakly-robust algorithm. Our algorithm can be transformed into an $O(\frac{\log^* n}{\eps^{O(1)}})$ time distributed PTAS. We consider a weighted version of the clique partition problem on vertex weighted UDGs that generalizes the problem. We note some key distinctions with the unweighted version, where ideas useful in obtaining a PTAS breakdown. Yet, surprisingly, it admits a $(2+\eps)$-approximation algorithm for the weighted case where the graph is expressed, say, as an adjacency matrix. This improves on the best known 8-approximation for the {\em unweighted} case for UDGs expressed in standard form.
[ { "version": "v1", "created": "Tue, 14 Apr 2009 20:44:57 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2009 22:50:13 GMT" } ]
2015-05-13T00:00:00
[ [ "Pirwani", "Imran A.", "" ], [ "Salavatipour", "Mohammad R.", "" ] ]
new_dataset
0.976755
0905.2919
Elena Grigorescu
Elena Grigorescu and Tali Kaufman and Madhu Sudan
Succinct Representation of Codes with Applications to Testing
null
null
10.1007/978-3-642-03685-9_40
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by questions in property testing, we search for linear error-correcting codes that have the "single local orbit" property: i.e., they are specified by a single local constraint and its translations under the symmetry group of the code. We show that the dual of every "sparse" binary code whose coordinates are indexed by elements of F_{2^n} for prime n, and whose symmetry group includes the group of non-singular affine transformations of F_{2^n} has the single local orbit property. (A code is said to be "sparse" if it contains polynomially many codewords in its block length.) In particular this class includes the dual-BCH codes for whose duals (i.e., for BCH codes) simple bases were not known. Our result gives the first short (O(n)-bit, as opposed to the natural exp(n)-bit) description of a low-weight basis for BCH codes. The interest in the "single local orbit" property comes from the recent result of Kaufman and Sudan (STOC 2008) that shows that the duals of codes that have the single local orbit property under the affine symmetry group are locally testable. When combined with our main result, this shows that all sparse affine-invariant codes over the coordinates F_{2^n} for prime n are locally testable. If, in addition to n being prime, if 2^n-1 is also prime (i.e., 2^n-1 is a Mersenne prime), then we get that every sparse cyclic code also has the single local orbit. In particular this implies that BCH codes of Mersenne prime length are generated by a single low-weight codeword and its cyclic shifts.
[ { "version": "v1", "created": "Mon, 18 May 2009 15:55:38 GMT" } ]
2015-05-13T00:00:00
[ [ "Grigorescu", "Elena", "" ], [ "Kaufman", "Tali", "" ], [ "Sudan", "Madhu", "" ] ]
new_dataset
0.99834
0905.3885
Piotr Faliszewski
E. Elkind, P. Faliszewski, A. Slinko
Swap Bribery
17 pages
null
10.1007/978-3-642-04645-2_27
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In voting theory, bribery is a form of manipulative behavior in which an external actor (the briber) offers to pay the voters to change their votes in order to get her preferred candidate elected. We investigate a model of bribery where the price of each vote depends on the amount of change that the voter is asked to implement. Specifically, in our model the briber can change a voter's preference list by paying for a sequence of swaps of consecutive candidates. Each swap may have a different price; the price of a bribery is the sum of the prices of all swaps that it involves. We prove complexity results for this model, which we call swap bribery, for a broad class of election systems, including variants of approval and k-approval, Borda, Copeland, and maximin.
[ { "version": "v1", "created": "Sun, 24 May 2009 10:01:53 GMT" } ]
2015-05-13T00:00:00
[ [ "Elkind", "E.", "" ], [ "Faliszewski", "P.", "" ], [ "Slinko", "A.", "" ] ]
new_dataset
0.984532
0906.2509
Ruihu Li
Ruihu Li, Zongben Xu
On $[[n,n-4,3]]_{q}$ Quantum MDS Codes for odd prime power $q$
7 pages, submitted to IEEE Trans. Inf. Theory
null
10.1103/PhysRevA.82.052316
CLN: 9-456
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
For each odd prime power $q$, let $4 \leq n\leq q^{2}+1$. Hermitian self-orthogonal $[n,2,n-1]$ codes over $GF(q^{2})$ with dual distance three are constructed by using finite field theory. Hence, $[[n,n-4,3]]_{q}$ quantum MDS codes for $4 \leq n\leq q^{2}+1$ are obtained.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 04:11:25 GMT" } ]
2015-05-13T00:00:00
[ [ "Li", "Ruihu", "" ], [ "Xu", "Zongben", "" ] ]
new_dataset
0.997661
0908.1181
Vijay Vazirani
Vijay V. Vazirani
2-Player Nash and Nonsymmetric Bargaining Games: Algorithms and Structural Properties
null
null
10.1007/978-3-642-16170-4_28
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The solution to a Nash or a nonsymmetric bargaining game is obtained by maximizing a concave function over a convex set, i.e., it is the solution to a convex program. We show that each 2-player game whose convex program has linear constraints, admits a rational solution and such a solution can be found in polynomial time using only an LP solver. If in addition, the game is succinct, i.e., the coefficients in its convex program are ``small'', then its solution can be found in strongly polynomial time. We also give a non-succinct linear game whose solution can be found in strongly polynomial time.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 01:52:35 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 05:04:35 GMT" }, { "version": "v3", "created": "Thu, 24 Sep 2009 21:35:32 GMT" } ]
2015-05-13T00:00:00
[ [ "Vazirani", "Vijay V.", "" ] ]
new_dataset
0.997336
1504.06603
Dmytro Mishkin
Dmytro Mishkin and Jiri Matas and Michal Perdoch and Karel Lenc
WxBS: Wide Baseline Stereo Generalizations
Descriptor and detector evaluation expanded
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have presented a new problem -- the wide multiple baseline stereo (WxBS) -- which considers matching of images that simultaneously differ in more than one image acquisition factor such as viewpoint, illumination, sensor type or where object appearance changes significantly, e.g. over time. A new dataset with the ground truth for evaluation of matching algorithms has been introduced and will be made public. We have extensively tested a large set of popular and recent detectors and descriptors and show than the combination of RootSIFT and HalfRootSIFT as descriptors with MSER and Hessian-Affine detectors works best for many different nuisance factors. We show that simple adaptive thresholding improves Hessian-Affine, DoG, MSER (and possibly other) detectors and allows to use them on infrared and low contrast images. A novel matching algorithm for addressing the WxBS problem has been introduced. We have shown experimentally that the WxBS-M matcher dominantes the state-of-the-art methods both on both the new and existing datasets.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 19:19:04 GMT" }, { "version": "v2", "created": "Tue, 12 May 2015 14:42:53 GMT" } ]
2015-05-13T00:00:00
[ [ "Mishkin", "Dmytro", "" ], [ "Matas", "Jiri", "" ], [ "Perdoch", "Michal", "" ], [ "Lenc", "Karel", "" ] ]
new_dataset
0.999726
1505.02798
Richard Zanibbi
Richard Zanibbi and Awelemdy Orakwue
Math Search for the Masses: Multimodal Search Interfaces and Appearance-Based Retrieval
Paper for Invited Talk at 2015 Conference on Intelligent Computer Mathematics (July, Washington DC)
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We summarize math search engines and search interfaces produced by the Document and Pattern Recognition Lab in recent years, and in particular the min math search interface and the Tangent search engine. Source code for both systems are publicly available. "The Masses" refers to our emphasis on creating systems for mathematical non-experts, who may be looking to define unfamiliar notation, or browse documents based on the visual appearance of formulae rather than their mathematical semantics.
[ { "version": "v1", "created": "Mon, 11 May 2015 20:39:48 GMT" } ]
2015-05-13T00:00:00
[ [ "Zanibbi", "Richard", "" ], [ "Orakwue", "Awelemdy", "" ] ]
new_dataset
0.99323
1505.02826
Bing Li
Xiuli Hu, Pangbei Hong, Bing Li
Benefit of Multipath TCP on the Stability of Network
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multipath-TCP receives a lot of attention recently and can potentially improve quality of service for both private and commercial users. It leverages the multiple available paths and send packets through all the available paths. The growing of Mutipath TCP has received a growing interest from both researchers who publish a growing number of articles on the topic and the vendors since Apple has decided to use Multipath TCP on its smartphones and tablets to support the Siri voice recognition application. In this paper, we study the performance of Multipath TCP from its impact on the stability of the network. In particular, we study three scenarios, Internet, which is the largest networks and involves heterogeneous traffic, data center, which is smaller but has different traffic patterns compared with Internet scale network and wireless network, whose energy consumption also needs to be considered. Our study shows that stability is affected but not seriouly for Internet and wireless network, but datacenter network stability is seriously affected due to its bursty traffic pattern.
[ { "version": "v1", "created": "Mon, 11 May 2015 22:39:40 GMT" } ]
2015-05-13T00:00:00
[ [ "Hu", "Xiuli", "" ], [ "Hong", "Pangbei", "" ], [ "Li", "Bing", "" ] ]
new_dataset
0.99962
1505.02982
Baoguang Shi
Baoguang Shi, Cong Yao, Chengquan Zhang, Xiaowei Guo, Feiyue Huang, Xiang Bai
Automatic Script Identification in the Wild
5 pages, 7 figures, submitted to ICDAR 2015
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid increase of transnational communication and cooperation, people frequently encounter multilingual scenarios in various situations. In this paper, we are concerned with a relatively new problem: script identification at word or line levels in natural scenes. A large-scale dataset with a great quantity of natural images and 10 types of widely used languages is constructed and released. In allusion to the challenges in script identification in real-world scenarios, a deep learning based algorithm is proposed. The experiments on the proposed dataset demonstrate that our algorithm achieves superior performance, compared with conventional image classification methods, such as the original CNN architecture and LLC.
[ { "version": "v1", "created": "Tue, 12 May 2015 12:38:30 GMT" } ]
2015-05-13T00:00:00
[ [ "Shi", "Baoguang", "" ], [ "Yao", "Cong", "" ], [ "Zhang", "Chengquan", "" ], [ "Guo", "Xiaowei", "" ], [ "Huang", "Feiyue", "" ], [ "Bai", "Xiang", "" ] ]
new_dataset
0.974296
1505.03014
Linas Baltrunas
Linas Baltrunas, Karen Church, Alexandros Karatzoglou, Nuria Oliver
Frappe: Understanding the Usage and Perception of Mobile App Recommendations In-The-Wild
null
null
null
11
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a real world deployment of a context-aware mobile app recommender system (RS) called Frappe. Utilizing a hybrid-approach, we conducted a large-scale app market deployment with 1000 Android users combined with a small-scale local user study involving 33 users. The resulting usage logs and subjective feedback enabled us to gather key insights into (1) context-dependent app usage and (2) the perceptions and experiences of end-users while interacting with context-aware mobile app recommendations. While Frappe performs very well based on usage-centric evaluation metrics insights from the small-scale study reveal some negative user experiences. Our results point to a number of actionable lessons learned specifically related to designing, deploying and evaluating mobile context-aware RS in-the-wild with real users.
[ { "version": "v1", "created": "Tue, 12 May 2015 14:11:58 GMT" } ]
2015-05-13T00:00:00
[ [ "Baltrunas", "Linas", "" ], [ "Church", "Karen", "" ], [ "Karatzoglou", "Alexandros", "" ], [ "Oliver", "Nuria", "" ] ]
new_dataset
0.974035
1505.03020
Wilson Olaya-Le\'on
Carlos Munuera and Wilson Olaya-Le\'on
An Introduction to Algebraic Geometry codes
null
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an introduction to the theory of algebraic geometry codes. Starting from evaluation codes and codes from order and weight functions, special attention is given to one-point codes and, in particular, to the family of Castle codes.
[ { "version": "v1", "created": "Tue, 12 May 2015 14:21:10 GMT" } ]
2015-05-13T00:00:00
[ [ "Munuera", "Carlos", "" ], [ "Olaya-León", "Wilson", "" ] ]
new_dataset
0.999823
1505.03062
Kirthi Krishnamurthy
Krishnamurthy Kirthi
Binary GH Sequences for Multiparty Communication
7 pages, 6 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates cross correlation properties of sequences derived from GH sequences modulo p, where p is a prime number and presents comparison with cross correlation properties of pseudo noise sequences. For GH sequences modulo prime, a binary random sequence B(n) is constructed, based on whether the period is p-1 (or a divisor) or 2p+2 (or a divisor). We show that B(n) sequences have much less peak cross correlation compared to PN sequence fragments obtained from the same generator. Potential applications of these sequences to cryptography are sketched.
[ { "version": "v1", "created": "Tue, 12 May 2015 15:36:24 GMT" } ]
2015-05-13T00:00:00
[ [ "Kirthi", "Krishnamurthy", "" ] ]
new_dataset
0.973262
1505.03078
Taha Arian
Zeinab Ghafari, Taha Arian, Morteza Analoui
SFAMSS: a secure framework for atm machines via secret sharing
null
null
null
null
cs.CR
http://creativecommons.org/licenses/publicdomain/
As ATM applications deploy for a banking system, the need to secure communications will become critical. However, multicast protocols do not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. In recent years, we have seen the emergence and the growing of ATMs (Automatic Teller Machines) in banking systems. Many banks are extending their activity and increasing transactions by using ATMs. ATM will allow them to reach more customers in a cost effective way and to make their transactions fast and efficient. However, communicating in the network must satisfy integrity, privacy, confidentiality, authentication and non-repudiation. Many frameworks have been implemented to provide security in communication and transactions. In this paper, we analyze ATM communication protocol and propose a novel framework for ATM systems that allows entities communicate in a secure way without using a lot of storage. We describe the architecture and operation of SFAMSS in detail. Our framework is implemented with Java and the software architecture, and its components are studied in detailed.
[ { "version": "v1", "created": "Tue, 12 May 2015 16:15:56 GMT" } ]
2015-05-13T00:00:00
[ [ "Ghafari", "Zeinab", "" ], [ "Arian", "Taha", "" ], [ "Analoui", "Morteza", "" ] ]
new_dataset
0.950039
1505.03116
Michael Hemmer
Dominik Krupke and Maximilian Ernestus and Michael Hemmer and Sandor P. Fekete
Distributed Cohesive Control for Robot Swarms: Maintaining Good Connectivity in the Presence of Exterior Forces
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a number of powerful local mechanisms for maintaining a dynamic swarm of robots with limited capabilities and information, in the presence of external forces and permanent node failures. We propose a set of local continuous algorithms that together produce a generalization of a Euclidean Steiner tree. At any stage, the resulting overall shape achieves a good compromise between local thickness, global connectivity, and flexibility to further continuous motion of the terminals. The resulting swarm behavior scales well, is robust against node failures, and performs close to the best known approximation bound for a corresponding centralized static optimization problem.
[ { "version": "v1", "created": "Tue, 12 May 2015 18:51:41 GMT" } ]
2015-05-13T00:00:00
[ [ "Krupke", "Dominik", "" ], [ "Ernestus", "Maximilian", "" ], [ "Hemmer", "Michael", "" ], [ "Fekete", "Sandor P.", "" ] ]
new_dataset
0.958429
1410.3065
Derrick Wing Kwan Ng
Derrick Wing Kwan Ng and Robert Schober
Secure and Green SWIPT in Distributed Antenna Networks with Limited Backhaul Capacity
accepted for publication, IEEE Transactions on Wireless Communications, May 10, 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the resource allocation algorithm design for secure information and renewable green energy transfer to mobile receivers in distributed antenna communication systems. In particular, distributed remote radio heads (RRHs/antennas) are connected to a central processor (CP) via capacity-limited backhaul links to facilitate joint transmission. The RRHs and the CP are equipped with renewable energy harvesters and share their energies via a lossy micropower grid for improving the efficiency in conveying information and green energy to mobile receivers via radio frequency (RF) signals. The considered resource allocation algorithm design is formulated as a mixed non-convex and combinatorial optimization problem taking into account the limited backhaul capacity and the quality of service requirements for simultaneous wireless information and power transfer (SWIPT). We aim at minimizing the total network transmit power when only imperfect channel state information of the wireless energy harvesting receivers, which have to be powered by the wireless network, is available at the CP. In light of the intractability of the problem, we reformulate it as an optimization problem with binary selection, which facilitates the design of an iterative resource allocation algorithm to solve the problem optimally using the generalized Bender's decomposition (GBD). Furthermore, a suboptimal algorithm is proposed to strike a balance between computational complexity and system performance. Simulation results illustrate that the proposed GBD based algorithm obtains the global optimal solution and the suboptimal algorithm achieves a close-to-optimal performance. Besides, the distributed antenna network for SWIPT with renewable energy sharing is shown to require a lower transmit power compared to a traditional system with multiple co-located antennas.
[ { "version": "v1", "created": "Sun, 12 Oct 2014 08:10:11 GMT" }, { "version": "v2", "created": "Mon, 11 May 2015 08:11:56 GMT" } ]
2015-05-12T00:00:00
[ [ "Ng", "Derrick Wing Kwan", "" ], [ "Schober", "Robert", "" ] ]
new_dataset
0.999385
1410.6968
Christoph Becker
Christoph Becker, Ruzanna Chitchyan, Leticia Duboc, Steve Easterbrook, Martin Mahaux, Birgit Penzenstadler, Guillermo Rodriguez-Navas, Camille Salinesi, Norbert Seyff, Colin Venters, Coral Calero, Sedef Akinli Kocak, Stefanie Betz
The Karlskrona manifesto for sustainability design
null
null
null
null
cs.SE cs.GL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Sustainability is a central concern for our society, and software systems increasingly play a central role in it. As designers of software technology, we cause change and are responsible for the effects of our design choices. We recognize that there is a rapidly increasing awareness of the fundamental need and desire for a more sustainable world, and there is a lot of genuine goodwill. However, this alone will be ineffective unless we come to understand and address our persistent misperceptions. The Karlskrona Manifesto for Sustainability Design aims to initiate a much needed conversation in and beyond the software community by highlighting such perceptions and proposing a set of fundamental principles for sustainability design.
[ { "version": "v1", "created": "Sat, 25 Oct 2014 22:43:33 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2015 16:57:49 GMT" }, { "version": "v3", "created": "Fri, 20 Mar 2015 00:38:55 GMT" }, { "version": "v4", "created": "Sun, 10 May 2015 16:23:39 GMT" } ]
2015-05-12T00:00:00
[ [ "Becker", "Christoph", "" ], [ "Chitchyan", "Ruzanna", "" ], [ "Duboc", "Leticia", "" ], [ "Easterbrook", "Steve", "" ], [ "Mahaux", "Martin", "" ], [ "Penzenstadler", "Birgit", "" ], [ "Rodriguez-Navas", "Guillermo", "" ], [ "Salinesi", "Camille", "" ], [ "Seyff", "Norbert", "" ], [ "Venters", "Colin", "" ], [ "Calero", "Coral", "" ], [ "Kocak", "Sedef Akinli", "" ], [ "Betz", "Stefanie", "" ] ]
new_dataset
0.999543
1501.04904
Itzhak Tamo
Alexander Barg, Itzhak Tamo, Serge Vladut
Locally recoverable codes on algebraic curves
Will appear at ISIT 2015
null
null
null
cs.IT math.AG math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A code over a finite alphabet is called locally recoverable (LRC code) if every symbol in the encoding is a function of a small number (at most r) other symbols. A family of linear LRC codes that generalize the classic construction of Reed-Solomon codes was constructed in a recent paper by I. Tamo and A. Barg. In this paper we extend this construction to codes on algebraic curves. We give a general construction of LRC codes on curves and compute some examples, including asymptotically good families of codes derived from the Garcia- Stichtenoth towers. The local recovery procedure is performed by polynomial interpolation over r coordinates of the codevector. We also obtain a family of Hermitian codes with two disjoint recovering sets for every symbol of the codeword.
[ { "version": "v1", "created": "Tue, 20 Jan 2015 18:22:31 GMT" }, { "version": "v2", "created": "Sun, 10 May 2015 08:40:45 GMT" } ]
2015-05-12T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Tamo", "Itzhak", "" ], [ "Vladut", "Serge", "" ] ]
new_dataset
0.999654
1505.02252
Yun Fan
Yun Fan, Hualu Liu
Quasi-cyclic Codes of Index 1.5
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce quasi-cyclic codes of index 1.5, construct such codes in terms of polynomials and matrices; and prove that the quasi-cyclic codes of index 1.5 are asymptotically good.
[ { "version": "v1", "created": "Sat, 9 May 2015 09:52:21 GMT" } ]
2015-05-12T00:00:00
[ [ "Fan", "Yun", "" ], [ "Liu", "Hualu", "" ] ]
new_dataset
0.99339
1505.02388
Heba Abdelnasser
Heba Abdelnasser, Khaled A. Harras, Moustafa Youssef
UbiBreathe: A Ubiquitous non-Invasive WiFi-based Breathing Estimator
Accepted for publication in MobiHoc 2015
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monitoring breathing rates and patterns helps in the diagnosis and potential avoidance of various health problems. Current solutions for respiratory monitoring, however, are usually invasive and/or limited to medical facilities. In this paper, we propose a novel respiratory monitoring system, UbiBreathe, based on ubiquitous off-the-shelf WiFi-enabled devices. Our experiments show that the received signal strength (RSS) at a WiFi-enabled device held on a person's chest is affected by the breathing process. This effect extends to scenarios when the person is situated on the line-of-sight (LOS) between the access point and the device, even without holding it. UbiBreathe leverages these changes in the WiFi RSS patterns to enable ubiquitous non-invasive respiratory rate estimation, as well as apnea detection. We propose the full architecture and design for UbiBreathe, incorporating various modules that help reliably extract the hidden breathing signal from a noisy WiFi RSS. The system handles various challenges such as noise elimination, interfering humans, sudden user movements, as well as detecting abnormal breathing situations. Our implementation of UbiBreathe using off-the-shelf devices in a wide range of environmental conditions shows that it can estimate different breathing rates with less than 1 breaths per minute (bpm) error. In addition, UbiBreathe can detect apnea with more than 96% accuracy in both the device-on-chest and hands-free scenarios. This highlights its suitability for a new class of anywhere respiratory monitoring.
[ { "version": "v1", "created": "Sun, 10 May 2015 14:43:17 GMT" } ]
2015-05-12T00:00:00
[ [ "Abdelnasser", "Heba", "" ], [ "Harras", "Khaled A.", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.99471
1505.02653
Rafik Zitouni
Rafik Zitouni, Laurent George and Yacine Abouda
A Dynamic Spectrum Access on SDR for IEEE 802.15.4 networks
Wireless Innovation Forum SDR 2015
Proceedings of WInnComm 2015
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our paper deals with a Dynamic Spectrum Access (DSA) and its implementation on a Software Defined Radio (SDR) for IEEE 802.15.4e Networks. The network nodes select the carrier frequency after Energy-Detection based Spectrum Sensing (SS). To ensure frequency hoping between two nodes in IEEE 802.15.4e Network, we propose a synchronization algorithm. We considerate the IEEE 802.15.4e Network is Secondary User (SU), and all other networks are Primary Users (PUs) in unlicensed 868/915 MHz and 2450 MHz bands of a Cognitive Radio (CR). However, the algorithm and the energy-sensor have been implemented over GNU Radio and Universal Software Radio Peripheral (USRP) SDR. In addition, real packet transmissions have been performed in two cases. In the first case, SU communicates in static carrier-frequency, while in the second case with the implemented DSA. For each case, PU transmitter disturbs SU, which calculates Packet Success Rate (PSR) to measure the robustness of a used DSA. The obtained PSR is improved by 80\% when the SU accomplished DSA rather than a static access.
[ { "version": "v1", "created": "Mon, 11 May 2015 14:57:32 GMT" } ]
2015-05-12T00:00:00
[ [ "Zitouni", "Rafik", "" ], [ "George", "Laurent", "" ], [ "Abouda", "Yacine", "" ] ]
new_dataset
0.992758
1409.4583
Azniv Kasparian
Azniv Kasparian, Evgeniya Velikova
Tangent Codes
null
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present article studies the finite Zariski tangent spaces to an affine variety X as linear codes, in order to characterize their typical or exceptional properties by global geometric conditions on X. The discussion concerns the generic minimum distance of a tangent code to X, its lower semi-continuity under a deformation of X, as well as the existence of Zariski tangent spaces to X with exceptional minimum distance. Tangent codes are shown to admit simultaneous decoding. The duals of the tangent codes to X are realized by gradients of polynomials from the ideal of X. We provide constructions of affine varieties with near MDS, cyclic or Hamming tangent codes. Puncturing, shortening and extending finite Zariski tangent spaces are related to the corresponding operations on affine varieties. The (u|u+v) construction of tangent codes is associated with a fibered product of varieties. Explicit constructions realize linear Hamming isometries as differentials of morphisms of affine varieties.
[ { "version": "v1", "created": "Tue, 16 Sep 2014 11:16:19 GMT" }, { "version": "v2", "created": "Fri, 8 May 2015 11:00:30 GMT" } ]
2015-05-11T00:00:00
[ [ "Kasparian", "Azniv", "" ], [ "Velikova", "Evgeniya", "" ] ]
new_dataset
0.999314
1505.02002
Alberto Dafonte
Alberto Dafonte-Gomez
The Key Elements of Viral Advertising. From Motivation to Emotion in the Most Shared Videos
null
Comunicar Journal 43: Media Prosumers (Vol. 22 - 2014)
10.3916/C43-2014-20
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/3.0/
From its origins in the mid 90s, the application of the concept of virality to commercial communication has represented an opportunity for brands to cross the traditional barriers of the audience concerning advertising and turn it into active communicator of brand messages. Viral marketing is based, since then, on two basic principles: offer free and engaging content that mask its commercial purpose to the individual and using a peer-to-peer dissemination system. The transformation of the passive spectator into an active user who broadcasts advertising messages promoted by sponsors, responds to needs and motivations of individuals and content features which have been described by previous research in this field, mainly through quantitative methods based on user perceptions. This paper focusses on those elements detected in its previous research as promoters of the sharing action in the 25 most shared viral video ads between 2006 and 2013 using content analysis. The results obtained show the most common features in these videos and the prominent presence of surprise and joy as dominant emotions in the most successful viral videos.
[ { "version": "v1", "created": "Fri, 8 May 2015 11:40:49 GMT" } ]
2015-05-11T00:00:00
[ [ "Dafonte-Gomez", "Alberto", "" ] ]
new_dataset
0.967624
1404.6723
Anna-Lena Trautmann
Natalia Silberstein and Anna-Lena Trautmann
Subspace Codes based on Graph Matchings, Ferrers Diagrams and Pending Blocks
Parts of this work were presented at ISIT 2013 in Istanbul, Turkey. To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides new constructions and lower bounds for subspace codes, using Ferrers diagram rank-metric codes from matchings of the complete graph and pending blocks. We present different constructions for constant dimension codes with minimum injection distance $2$ or $k-1$, where $k$ is the constant dimension. Furthermore, we present a construction of new codes from old codes for any minimum distance. Then we construct non-constant dimension codes from these codes. The examples of codes obtained by these constructions are the largest known codes for the given parameters.
[ { "version": "v1", "created": "Sun, 27 Apr 2014 07:59:04 GMT" }, { "version": "v2", "created": "Thu, 7 May 2015 10:20:46 GMT" } ]
2015-05-08T00:00:00
[ [ "Silberstein", "Natalia", "" ], [ "Trautmann", "Anna-Lena", "" ] ]
new_dataset
0.999508
1501.07429
Nans Lefebvre
Nans Lefebvre
Convergence law for hyper-graphs with prescribed degree sequences
10 pages, 6 figures
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We view hyper-graphs as incidence graphs, i.e. bipartite graphs with a set of nodes representing vertices and a set of nodes representing hyper-edges, with two nodes being adjacent if the corresponding vertex belongs to the corresponding hyper-edge. It defines a random hyper-multigraph specified by two distributions, one for the degrees of the vertices, and one for the sizes of the hyper-edges. We develop the logical analysis of this framework and first prove a convergence law for first-order logic, then characterise the limit first-order theories defined by a wide class of degree distributions. Convergence laws of other models follow, and in particular for the classical Erd\H{o}s-R\'enyi graphs and $k$-uniform hyper-graphs.
[ { "version": "v1", "created": "Thu, 29 Jan 2015 12:07:25 GMT" }, { "version": "v2", "created": "Mon, 16 Feb 2015 01:02:47 GMT" }, { "version": "v3", "created": "Wed, 6 May 2015 21:36:34 GMT" } ]
2015-05-08T00:00:00
[ [ "Lefebvre", "Nans", "" ] ]
new_dataset
0.970364
1505.01733
Kishor Chandra
Kishor Chandra, R. Venkatesha Prasad, Bien Quang, I.G.M.M. Niemegeers
CogCell: Cognitive Interplay between 60GHz Picocells and 2.4/5GHz Hotspots in the 5G Era
14 PAGES in IEEE Communications Magazine, Special issue on Emerging Applications, Services and Engineering for Cognitive Cellular Systems (EASE4CCS), July 2015
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid proliferation of wireless communication devices and the emergence of a variety of new applications have triggered investigations into next-generation mobile broadband systems, i.e., 5G. Legacy 2G--4G systems covering large areas were envisioned to serve both indoor and outdoor environments. However, in the 5G-era, 80\% of overall traffic is expected to be generated in indoors. Hence, the current approach of macro-cell mobile network, where there is no differentiation between indoors and outdoors, needs to be reconsidered. We envision 60\,GHz mmWave picocell architecture to support high-speed indoor and hotspot communications. We envisage the 5G indoor network as a combination of-, and interplay between, 2.4/5\,GHz having robust coverage and 60\,GHz links offering high datarate. This requires an intelligent coordination and cooperation. We propose 60\,GHz picocellular network architecture, called CogCell, leveraging the ubiquitous WiFi. We propose to use 60\,GHz for the data plane and 2.4/5GHz for the control plane. The hybrid network architecture considers an opportunistic fall-back to 2.4/5\,GHz in case of poor connectivity in the 60\,GHz domain. Further, to avoid the frequent re-beamforming in 60\,GHz directional links due to mobility, we propose a cognitive module -- a sensor-assisted intelligent beam switching procedure -- which reduces the communication overhead. We believe that the CogCell concept will help future indoor communications and possibly outdoor hotspots, where mobile stations and access points collaborate with each other to improve the user experience.
[ { "version": "v1", "created": "Thu, 7 May 2015 15:04:13 GMT" } ]
2015-05-08T00:00:00
[ [ "Chandra", "Kishor", "" ], [ "Prasad", "R. Venkatesha", "" ], [ "Quang", "Bien", "" ], [ "Niemegeers", "I. G. M. M.", "" ] ]
new_dataset
0.971198
1505.01750
Yan Shvartzshnaider
Yan Shvartzshnaider
Immutable Views -- Access control (to your information) for masses
null
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are a lot of on going efforts in the research community as well as industry around providing privacy-preserving and secure storage for personal data. Although, over time it has adopted many tag lines such as Personal Information Hub [12], personal container [8], DataBox [4], Personal Data Store (PDS) [3] and many others, these are essentially reincarnations of a simple idea: provide a secure way and place for users to store their information and allow them to provision who has access to that information. In this paper, we would like to discuss a way to facilitate access control mechanism (AC) in the various "personal cloud" proposals.
[ { "version": "v1", "created": "Thu, 7 May 2015 15:43:04 GMT" } ]
2015-05-08T00:00:00
[ [ "Shvartzshnaider", "Yan", "" ] ]
new_dataset
0.99956
1401.8242
Mikael Vejdemo-Johansson
Dan Hirsch and Ingemar Markstr\"om and Meredith L Patterson and Anders Sandberg and Mikael Vejdemo-Johansson
More ties than we thought
Accepted at PeerJ Computer Science 12 pages, 6 color photographs
null
null
null
cs.FL cs.CG math.CO math.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the existing enumeration of neck tie-knots to include tie-knots with a textured front, tied with the narrow end of a tie. These tie-knots have gained popularity in recent years, based on reconstructions of a costume detail from The Matrix Reloaded, and are explicitly ruled out in the enumeration by Fink and Mao (2000). We show that the relaxed tie-knot description language that comprehensively describes these extended tie-knot classes is context free. It has a regular sub-language that covers all the knots that originally inspired the work. From the full language, we enumerate 266 682 distinct tie-knots that seem tie-able with a normal neck-tie. Out of these 266 682, we also enumerate 24 882 tie-knots that belong to the regular sub-language.
[ { "version": "v1", "created": "Fri, 31 Jan 2014 17:54:19 GMT" }, { "version": "v2", "created": "Wed, 6 May 2015 05:50:32 GMT" } ]
2015-05-07T00:00:00
[ [ "Hirsch", "Dan", "" ], [ "Markström", "Ingemar", "" ], [ "Patterson", "Meredith L", "" ], [ "Sandberg", "Anders", "" ], [ "Vejdemo-Johansson", "Mikael", "" ] ]
new_dataset
0.97329
1504.01441
Orazio Gallo
Orazio Gallo (1), Alejandro Troccoli (1), Jun Hu (1 and 2), Kari Pulli (1 and 3), Jan Kautz (1) ((1) NVIDIA, (2) Duke University, (3) Light)
Locally Non-rigid Registration for Mobile HDR Photography
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image registration for stack-based HDR photography is challenging. If not properly accounted for, camera motion and scene changes result in artifacts in the composite image. Unfortunately, existing methods to address this problem are either accurate, but too slow for mobile devices, or fast, but prone to failing. We propose a method that fills this void: our approach is extremely fast---under 700ms on a commercial tablet for a pair of 5MP images---and prevents the artifacts that arise from insufficient registration quality.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 00:29:54 GMT" }, { "version": "v2", "created": "Wed, 8 Apr 2015 00:33:20 GMT" }, { "version": "v3", "created": "Tue, 5 May 2015 00:15:00 GMT" } ]
2015-05-06T00:00:00
[ [ "Gallo", "Orazio", "", "NVIDIA" ], [ "Troccoli", "Alejandro", "", "NVIDIA" ], [ "Hu", "Jun", "", "1 and 2" ], [ "Pulli", "Kari", "", "1 and 3" ], [ "Kautz", "Jan", "", "NVIDIA" ] ]
new_dataset
0.99214
1505.00876
Kenza Guenda
Aicha Batoul, Kenza Guenda and T. Aaron Gulliver
Constacyclic Codes Over Finite Principal Ideal Rings
null
null
null
null
cs.IT math.IT math.RA
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we give an important isomorphism between contacyclic codes and cyclic codes over finite principal ideal rings. Necessary and sufficient conditions for the existence of non-trivial cyclic self-dual codes over finite principal ideal rings are given.
[ { "version": "v1", "created": "Tue, 5 May 2015 04:09:37 GMT" } ]
2015-05-06T00:00:00
[ [ "Batoul", "Aicha", "" ], [ "Guenda", "Kenza", "" ], [ "Gulliver", "T. Aaron", "" ] ]
new_dataset
0.99978
1505.00920
Bala Suyambu Jeyaram
BalaSuyambu J, Radha R, Rama R
New 2D CA based Image Encryption Scheme and a novel Non-Parametric Test for Pixel Randomness
This work we had already submitted to Journal of Cryptology and was not published then we had submitted to IJIG, since its not processed for a long time we are withdrawing it and submitting to arXiv
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have proposed a new test for pixel randomness using non-parametric method in statistics. In order to validate this new non-parametric test we have designed an encryption scheme based on 2D cellular automata. The strength of the designed encryption scheme is first assessed by standard methods for security analysis and the pixel randomness is then determined by the newly proposed non-parametric method.
[ { "version": "v1", "created": "Tue, 5 May 2015 08:43:51 GMT" } ]
2015-05-06T00:00:00
[ [ "J", "BalaSuyambu", "" ], [ "R", "Radha", "" ], [ "R", "Rama", "" ] ]
new_dataset
0.999194
1505.01085
David Fouhey
David F. Fouhey and Xiaolong Wang and Abhinav Gupta
In Defense of the Direct Perception of Affordances
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The field of functional recognition or affordance estimation from images has seen a revival in recent years. As originally proposed by Gibson, the affordances of a scene were directly perceived from the ambient light: in other words, functional properties like sittable were estimated directly from incoming pixels. Recent work, however, has taken a mediated approach in which affordances are derived by first estimating semantics or geometry and then reasoning about the affordances. In a tribute to Gibson, this paper explores his theory of affordances as originally proposed. We propose two approaches for direct perception of affordances and show that they obtain good results and can out-perform mediated approaches. We hope this paper can rekindle discussion around direct perception and its implications in the long term.
[ { "version": "v1", "created": "Tue, 5 May 2015 17:11:26 GMT" } ]
2015-05-06T00:00:00
[ [ "Fouhey", "David F.", "" ], [ "Wang", "Xiaolong", "" ], [ "Gupta", "Abhinav", "" ] ]
new_dataset
0.977787
1505.01120
Oren Segal
Oren Segal, Philip Colangelo, Nasibeh Nasiri, Zhuo Qian, Martin Margala
SparkCL: A Unified Programming Framework for Accelerators on Heterogeneous Clusters
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce SparkCL, an open source unified programming framework based on Java, OpenCL and the Apache Spark framework. The motivation behind this work is to bring unconventional compute cores such as FPGAs/GPUs/APUs/DSPs and future core types into mainstream programming use. The framework allows equal treatment of different computing devices under the Spark framework and introduces the ability to offload computations to acceleration devices. The new framework is seamlessly integrated into the standard Spark framework via a Java-OpenCL device programming layer which is based on Aparapi and a Spark programming layer that includes new kernel function types and modified Spark transformations and actions. The framework allows a single code base to target any type of compute core that supports OpenCL and easy integration of new core types into a Spark cluster.
[ { "version": "v1", "created": "Tue, 5 May 2015 18:34:25 GMT" } ]
2015-05-06T00:00:00
[ [ "Segal", "Oren", "" ], [ "Colangelo", "Philip", "" ], [ "Nasiri", "Nasibeh", "" ], [ "Qian", "Zhuo", "" ], [ "Margala", "Martin", "" ] ]
new_dataset
0.991482
1505.01133
Jun Chen
Kia Khezeli, Jun Chen
Outer Bounds on the Admissible Source Region for Broadcast Channels with Correlated Sources
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two outer bounds on the admissible source region for broadcast channels with correlated sources are presented: the first one is strictly tighter than the existing outer bound by Gohari and Anantharam while the second one provides a complete characterization of the admissible source region in the case where the two sources are conditionally independent given the common part. These outer bounds are deduced from the general necessary conditions established for the lossy source broadcast problem via suitable comparisons between the virtual broadcast channel (induced by the source and the reconstructions) and the physical broadcast channel.
[ { "version": "v1", "created": "Tue, 5 May 2015 19:19:22 GMT" } ]
2015-05-06T00:00:00
[ [ "Khezeli", "Kia", "" ], [ "Chen", "Jun", "" ] ]
new_dataset
0.995116
1204.2310
Yue Wu
Yue Wu, Yicong Zhou, Joseph P. Noonan, Sos Agaian, and C. L. Philip Chen
A Novel Latin Square Image Cipher
26 pages, 17 figures, and 7 tables
Information Sciences 264 (2014): 317-339
10.1016/j.ins.2013.11.027
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square Whitening, Latin Square S-box and Latin Square P-box ; 2) we provide a new way of integrating probabilistic encryption in image encryption by embedding random noise in the least significant image bit-plane; and 3) we construct LSIC with these Latin square image encryption primitives all on one keyed Latin square in a new loom-like substitution-permutation network. Consequently, the proposed LSIC achieve many desired properties of a secure cipher including a large key space, high key sensitivities, uniformly distributed ciphertext, excellent confusion and diffusion properties, semantically secure, and robustness against channel noise. Theoretical analysis show that the LSIC has good resistance to many attack models including brute-force attacks, ciphertext-only attacks, known-plaintext attacks and chosen-plaintext attacks. Experimental analysis under extensive simulation results using the complete USC-SIPI Miscellaneous image dataset demonstrate that LSIC outperforms or reach state of the art suggested by many peer algorithms. All these analysis and results demonstrate that the LSIC is very suitable for digital image encryption. Finally, we open source the LSIC MATLAB code under webpage https://sites.google.com/site/tuftsyuewu/source-code.
[ { "version": "v1", "created": "Wed, 11 Apr 2012 00:54:13 GMT" } ]
2015-05-05T00:00:00
[ [ "Wu", "Yue", "" ], [ "Zhou", "Yicong", "" ], [ "Noonan", "Joseph P.", "" ], [ "Agaian", "Sos", "" ], [ "Chen", "C. L. Philip", "" ] ]
new_dataset
0.999441
1411.6718
Mohamed Aly
Mahmoud Nabil, Mohamed Aly, Amir Atiya
LABR: A Large Scale Arabic Sentiment Analysis Benchmark
10 pages
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce LABR, the largest sentiment analysis dataset to-date for the Arabic language. It consists of over 63,000 book reviews, each rated on a scale of 1 to 5 stars. We investigate the properties of the dataset, and present its statistics. We explore using the dataset for two tasks: (1) sentiment polarity classification; and (2) ratings classification. Moreover, we provide standard splits of the dataset into training, validation and testing, for both polarity and ratings classification, in both balanced and unbalanced settings. We extend our previous work by performing a comprehensive analysis on the dataset. In particular, we perform an extended survey of the different classifiers typically used for the sentiment polarity classification problem. We also construct a sentiment lexicon from the dataset that contains both single and compound sentiment words and we explore its effectiveness. We make the dataset and experimental details publicly available.
[ { "version": "v1", "created": "Tue, 25 Nov 2014 03:48:56 GMT" }, { "version": "v2", "created": "Sun, 3 May 2015 08:35:59 GMT" } ]
2015-05-05T00:00:00
[ [ "Nabil", "Mahmoud", "" ], [ "Aly", "Mohamed", "" ], [ "Atiya", "Amir", "" ] ]
new_dataset
0.999822
1501.00304
Muhammad Jawaherul Alam
Md. Jawaherul Alam, William Evans, Stephen G. Kobourov, Sergey Pupyrev, Jackson Toeniskoetter, and Torsten Ueckerdt
Contact Representations of Graphs in 3D
null
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study contact representations of graphs in which vertices are represented by axis-aligned polyhedra in 3D and edges are realized by non-zero area common boundaries between corresponding polyhedra. We show that for every 3-connected planar graph, there exists a simultaneous representation of the graph and its dual with 3D boxes. We give a linear-time algorithm for constructing such a representation. This result extends the existing primal-dual contact representations of planar graphs in 2D using circles and triangles. While contact graphs in 2D directly correspond to planar graphs, we next study representations of non-planar graphs in 3D. In particular we consider representations of optimal 1-planar graphs. A graph is 1-planar if there exists a drawing in the plane where each edge is crossed at most once, and an optimal n-vertex 1-planar graph has the maximum (4n - 8) number of edges. We describe a linear-time algorithm for representing optimal 1-planar graphs without separating 4-cycles with 3D boxes. However, not every optimal 1-planar graph admits a representation with boxes. Hence, we consider contact representations with the next simplest axis-aligned 3D object, L-shaped polyhedra. We provide a quadratic-time algorithm for representing optimal 1-planar graph with L-shaped polyhedra.
[ { "version": "v1", "created": "Thu, 1 Jan 2015 20:16:00 GMT" }, { "version": "v2", "created": "Sun, 3 May 2015 05:36:09 GMT" } ]
2015-05-05T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Evans", "William", "" ], [ "Kobourov", "Stephen G.", "" ], [ "Pupyrev", "Sergey", "" ], [ "Toeniskoetter", "Jackson", "" ], [ "Ueckerdt", "Torsten", "" ] ]
new_dataset
0.991423
1504.05793
Erdal Arikan
Erdal Ar{\i}kan
A Packing Lemma for Polar Codes
5 pages. To be presented at 2015 IEEE International Symposium on Information Theory, June 14-19, 2015, Hong Kong. Minor corrections to v2
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A packing lemma is proved using a setting where the channel is a binary-input discrete memoryless channel $(\mathcal{X},w(y|x),\mathcal{Y})$, the code is selected at random subject to parity-check constraints, and the decoder is a joint typicality decoder. The ensemble is characterized by (i) a pair of fixed parameters $(H,q)$ where $H$ is a parity-check matrix and $q$ is a channel input distribution and (ii) a random parameter $S$ representing the desired parity values. For a code of length $n$, the constraint is sampled from $p_S(s) = \sum_{x^n\in {\mathcal{X}}^n} \phi(s,x^n)q^n(x^n)$ where $\phi(s,x^n)$ is the indicator function of event $\{s = x^n H^T\}$ and $q^n(x^n) = \prod_{i=1}^nq(x_i)$. Given $S=s$, the codewords are chosen conditionally independently from $p_{X^n|S}(x^n|s) \propto \phi(s,x^n) q^n(x^n)$. It is shown that the probability of error for this ensemble decreases exponentially in $n$ provided the rate $R$ is kept bounded away from $I(X;Y)-\frac{1}{n}I(S;Y^n)$ with $(X,Y)\sim q(x)w(y|x)$ and $(S,Y^n)\sim p_S(s)\sum_{x^n} p_{X^n|S}(x^n|s) \prod_{i=1}^{n} w(y_i|x_i)$. In the special case where $H$ is the parity-check matrix of a standard polar code, it is shown that the rate penalty $\frac{1}{n}I(S;Y^n)$ vanishes as $n$ increases. The paper also discusses the relation between ordinary polar codes and random codes based on polar parity-check matrices.
[ { "version": "v1", "created": "Wed, 22 Apr 2015 13:30:05 GMT" }, { "version": "v2", "created": "Thu, 23 Apr 2015 06:06:45 GMT" }, { "version": "v3", "created": "Sat, 2 May 2015 11:47:15 GMT" } ]
2015-05-05T00:00:00
[ [ "Arıkan", "Erdal", "" ] ]
new_dataset
0.998654
1505.00278
Michal \v{C}ertick\'y
Bj\"orn Persson Mattsson, Tom\'a\v{s} Vajda, Michal \v{C}ertick\'y
Automatic Observer Script for StarCraft: Brood War Bot Games (technical report)
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short report describes an automated BWAPI-based script developed for live streams of a StarCraft Brood War bot tournament, SSCAIT. The script controls the in-game camera in order to follow the relevant events and improve the viewer experience. We enumerate its novel features and provide a few implementation notes.
[ { "version": "v1", "created": "Fri, 1 May 2015 20:41:19 GMT" } ]
2015-05-05T00:00:00
[ [ "Mattsson", "Björn Persson", "" ], [ "Vajda", "Tomáš", "" ], [ "Čertický", "Michal", "" ] ]
new_dataset
0.999709
1505.00356
Kenza Guenda
Aicha Batoul, Kenza Guenda and T. Aaron Gulliver
On Repeated-Root Constacyclic Codes of Length $2^amp^r$ over Finite Fields
arXiv admin note: text overlap with arXiv:1406.1848 by other authors
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we investigate the structure of repeated root constacyclic codes of length $2^amp^r$ over $\mathbb{F}_{p^s}$ with $a\geq1$ and $(m,p)=1$. We characterize the codes in terms of their generator polynomials. This provides simple conditions on the existence of self-dual negacyclic codes. Further, we gave cases where the constacyclic codes are equivalent to cyclic codes.
[ { "version": "v1", "created": "Sat, 2 May 2015 17:09:47 GMT" } ]
2015-05-05T00:00:00
[ [ "Batoul", "Aicha", "" ], [ "Guenda", "Kenza", "" ], [ "Gulliver", "T. Aaron", "" ] ]
new_dataset
0.999685
1505.00424
Piotr Plonski
Piotr P{\l}o\'nski, Dorota Stefan, Robert Sulej, Krzysztof Zaremba
Electron Neutrino Classification in Liquid Argon Time Projection Chamber Detector
9 pages
null
null
null
cs.CV physics.ins-det
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neutrinos are one of the least known elementary particles. The detection of neutrinos is an extremely difficult task since they are affected only by weak sub-atomic force or gravity. Therefore large detectors are constructed to reveal neutrino's properties. Among them the Liquid Argon Time Projection Chamber (LAr-TPC) detectors provide excellent imaging and particle identification ability for studying neutrinos. The computerized methods for automatic reconstruction and identification of particles are needed to fully exploit the potential of the LAr-TPC technique. Herein, the novel method for electron neutrino classification is presented. The method constructs a feature descriptor from images of observed event. It characterizes the signal distribution propagated from vertex of interest, where the particle interacts with the detector medium. The classifier is learned with a constructed feature descriptor to decide whether the images represent the electron neutrino or cascade produced by photons. The proposed approach assumes that the position of primary interaction vertex is known. The method's performance in dependency to the noise in a primary vertex position and deposited energy of particles is studied.
[ { "version": "v1", "created": "Sun, 3 May 2015 12:52:22 GMT" } ]
2015-05-05T00:00:00
[ [ "Płoński", "Piotr", "" ], [ "Stefan", "Dorota", "" ], [ "Sulej", "Robert", "" ], [ "Zaremba", "Krzysztof", "" ] ]
new_dataset
0.972874
1505.00573
Ananthanarayanan Chockalingam
Sanjay Vishwakarma and A. Chockalingam
MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finite-alphabet input in the presence of an user and $J$ non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code consists of two parts: i) common message (non-secret), and ii) secret message. The source transmits two independent messages: i) common message (non-secret), and ii) secret message. The common message is transmitted at a fixed rate $R_{0}$, and it is intended for the user. The secret message is also intended for the user but it should be kept secret from the $J$ eavesdroppers. The source and the MIMO DF relay operate under individual power constraints. In order to improve the secrecy rate, the MIMO relay also injects artificial noise. The CSI on all the links are assumed to be imperfect and CSI errors are assumed to be norm bounded. In order to maximize the worst case secrecy rate, we maximize the worst case link information rate to the user subject to: i) the individual power constraints on the source and the MIMO relay, and ii) the best case link information rates to $J$ eavesdroppers be less than or equal to $R_{0}$ in order to support a fixed common message rate $R_{0}$. Numerical results showing the effect of perfect/imperfect CSI, presence/absence of AN with finite-alphabet input on the secrecy rate are presented.
[ { "version": "v1", "created": "Mon, 4 May 2015 09:57:51 GMT" } ]
2015-05-05T00:00:00
[ [ "Vishwakarma", "Sanjay", "" ], [ "Chockalingam", "A.", "" ] ]
new_dataset
0.992898
1505.00589
Emiliano De Cristofaro
Lucky Onwuzurike and Emiliano De Cristofaro
Danger is My Middle Name: Experimenting with SSL Vulnerabilities in Android Apps
A preliminary version of this paper appears in the Proceedings of ACM WiSec 2015. This is the full version
null
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at least 10M times, that request full network access. Our experiments show that, although prior work has drawn a lot of attention to SSL implementations on mobile platforms, several popular apps (32/100) accept all certificates and all hostnames, and four actually transmit sensitive data unencrypted. We set up an experimental testbed simulating man-in-the-middle attacks and find that many apps (up to 91% when the adversary has a certificate installed on the victim's device) are vulnerable, allowing the attacker to access sensitive information, including credentials, files, personal details, and credit card numbers. Finally, we provide a few recommendations to app developers and highlight several open research problems.
[ { "version": "v1", "created": "Mon, 4 May 2015 10:50:26 GMT" } ]
2015-05-05T00:00:00
[ [ "Onwuzurike", "Lucky", "" ], [ "De Cristofaro", "Emiliano", "" ] ]
new_dataset
0.985484
1505.00043
Yun Tian
Yun Tian, Bojian Xu, Yanqing Ji, Jesse Scholer
CloudTree: A Library to Extend Cloud Services for Trees
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a library that enables on a cloud the creation and management of tree data structures from a cloud client. As a proof of concept, we implement a new cloud service CloudTree. With CloudTree, users are able to organize big data into tree data structures of their choice that are physically stored in a cloud. We use caching, prefetching, and aggregation techniques in the design and implementation of CloudTree to enhance performance. We have implemented the services of Binary Search Trees (BST) and Prefix Trees as current members in CloudTree and have benchmarked their performance using the Amazon Cloud. The idea and techniques in the design and implementation of a BST and prefix tree is generic and thus can also be used for other types of trees such as B-tree, and other link-based data structures such as linked lists and graphs. Preliminary experimental results show that CloudTree is useful and efficient for various big data applications.
[ { "version": "v1", "created": "Thu, 30 Apr 2015 21:59:29 GMT" } ]
2015-05-04T00:00:00
[ [ "Tian", "Yun", "" ], [ "Xu", "Bojian", "" ], [ "Ji", "Yanqing", "" ], [ "Scholer", "Jesse", "" ] ]
new_dataset
0.982099
1302.2271
Andrew Winslow
Gill Barequet, Sarah M. Cannon, Eli Fox-Epstein, Benjamin Hescott, Diane L. Souvaine, Csaba D. T\'oth, Andrew Winslow
Diffuse Reflection Diameter in Simple Polygons
To appear in Discrete Applied Mathematics
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a conjecture of Aanjaneya, Bishnu, and Pal that the minimum number of diffuse reflections sufficient to illuminate the interior of any simple polygon with $n$ walls from any interior point light source is $\lfloor n/2 \rfloor - 1$. Light reflecting diffusely leaves a surface in all directions, rather than at an identical angle as with specular reflections.
[ { "version": "v1", "created": "Sat, 9 Feb 2013 21:13:22 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2015 19:12:29 GMT" } ]
2015-05-01T00:00:00
[ [ "Barequet", "Gill", "" ], [ "Cannon", "Sarah M.", "" ], [ "Fox-Epstein", "Eli", "" ], [ "Hescott", "Benjamin", "" ], [ "Souvaine", "Diane L.", "" ], [ "Tóth", "Csaba D.", "" ], [ "Winslow", "Andrew", "" ] ]
new_dataset
0.995906
1504.08212
Jean Louis Fendji Kedieng Ebongue
Jean Louis Ebongue Kedieng Fendji, Christopher Thron, Jean Michel Nlong
A Metropolis Approach for Mesh Router Nodes placement in Rural Wireless Mesh Networks
14 pages
Journal of Computers vol. 10, no. 2, pp. 101-114, 2015
10.17706/jcp.10.2.101-114
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless mesh networks appear as an appealing solution to reduce the digital divide between rural and urban regions. However the placement of router nodes is still a critical issue when planning this type of network, especially in rural regions where we usually observe low density and sparse population. In this paper, we firstly provide a network model tied to rural regions by considering the area to cover as decomposed into a set of elementary areas which can be required or optional in terms of coverage and where a node can be placed or not. Afterwards, we try to determine an optimal number and positions of mesh router nodes while maximizing the coverage of areas of interest, minimizing the coverage of optional areas and ensuring connectivity of all mesh router nodes. For that we propose a particularized algorithm based on Metropolis approach to ensure an optimal coverage and connectivity with an optimal number of routers. The proposed algorithm is evaluated on different region instances. We obtained a required coverage between 94% and 97% and a coverage percentage of optional areas less than 16% with an optimal number of routers nr_max2 =1.3*nr_min , (nr_min being the minimum number of router which is the ratio between the total area requiring coverage and the area which can be covered by a router).
[ { "version": "v1", "created": "Thu, 30 Apr 2015 13:18:56 GMT" } ]
2015-05-01T00:00:00
[ [ "Fendji", "Jean Louis Ebongue Kedieng", "" ], [ "Thron", "Christopher", "" ], [ "Nlong", "Jean Michel", "" ] ]
new_dataset
0.984546
1408.1681
Ankur Moitra
Ankur Moitra
Super-resolution, Extremal Functions and the Condition Number of Vandermonde Matrices
19 pages
null
null
null
cs.IT cs.DS math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Super-resolution is a fundamental task in imaging, where the goal is to extract fine-grained structure from coarse-grained measurements. Here we are interested in a popular mathematical abstraction of this problem that has been widely studied in the statistics, signal processing and machine learning communities. We exactly resolve the threshold at which noisy super-resolution is possible. In particular, we establish a sharp phase transition for the relationship between the cutoff frequency ($m$) and the separation ($\Delta$). If $m > 1/\Delta + 1$, our estimator converges to the true values at an inverse polynomial rate in terms of the magnitude of the noise. And when $m < (1-\epsilon) /\Delta$ no estimator can distinguish between a particular pair of $\Delta$-separated signals even if the magnitude of the noise is exponentially small. Our results involve making novel connections between {\em extremal functions} and the spectral properties of Vandermonde matrices. We establish a sharp phase transition for their condition number which in turn allows us to give the first noise tolerance bounds for the matrix pencil method. Moreover we show that our methods can be interpreted as giving preconditioners for Vandermonde matrices, and we use this observation to design faster algorithms for super-resolution. We believe that these ideas may have other applications in designing faster algorithms for other basic tasks in signal processing.
[ { "version": "v1", "created": "Thu, 7 Aug 2014 18:54:19 GMT" }, { "version": "v2", "created": "Fri, 8 Aug 2014 12:42:01 GMT" }, { "version": "v3", "created": "Mon, 27 Apr 2015 20:35:47 GMT" }, { "version": "v4", "created": "Wed, 29 Apr 2015 02:18:44 GMT" } ]
2015-04-30T00:00:00
[ [ "Moitra", "Ankur", "" ] ]
new_dataset
0.983916
1409.0875
Emil Bj\"ornson
Emil Bj\"ornson, Michail Matthaiou, M\'erouane Debbah
Massive MIMO with Non-Ideal Arbitrary Arrays: Hardware Scaling Laws and Circuit-Aware Design
Accepted for publication in IEEE Transactions on Wireless Communications, 16 pages, 8 figures. The results can be reproduced using the following Matlab code: https://github.com/emilbjornson/hardware-scaling-laws
null
10.1109/TWC.2015.2420095
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive multiple-input multiple-output (MIMO) systems are cellular networks where the base stations (BSs) are equipped with unconventionally many antennas, deployed on co-located or distributed arrays. Huge spatial degrees-of-freedom are achieved by coherent processing over these massive arrays, which provide strong signal gains, resilience to imperfect channel knowledge, and low interference. This comes at the price of more infrastructure; the hardware cost and circuit power consumption scale linearly/affinely with the number of BS antennas $N$. Hence, the key to cost-efficient deployment of large arrays is low-cost antenna branches with low circuit power, in contrast to today's conventional expensive and power-hungry BS antenna branches. Such low-cost transceivers are prone to hardware imperfections, but it has been conjectured that the huge degrees-of-freedom would bring robustness to such imperfections. We prove this claim for a generalized uplink system with multiplicative phase-drifts, additive distortion noise, and noise amplification. Specifically, we derive closed-form expressions for the user rates and a scaling law that shows how fast the hardware imperfections can increase with $N$ while maintaining high rates. The connection between this scaling law and the power consumption of different transceiver circuits is rigorously exemplified. This reveals that one can make the circuit power increase as $\sqrt{N}$, instead of linearly, by careful circuit-aware system design.
[ { "version": "v1", "created": "Tue, 2 Sep 2014 20:14:42 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2014 10:46:42 GMT" }, { "version": "v3", "created": "Wed, 29 Apr 2015 10:25:38 GMT" } ]
2015-04-30T00:00:00
[ [ "Björnson", "Emil", "" ], [ "Matthaiou", "Michail", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.999609
1504.07479
Philip Davis
Philip M. Davis, Angela Cochran
Cited Half-Life of the Journal Literature
Table 1 is replaced to fix a sorting error
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analyzing 13,455 journals listed in the Journal Citation Report (Thomson Reuters) from 1997 through 2013, we report that the mean cited half-life of the scholarly literature is 6.5 years and growing at a rate of 0.13 years per annum. Focusing on a subset of journals (N=4,937) for which we have a continuous series of half-life observations, 209 of 229 (91%) subject categories experienced increasing cited half-lives. Contrary to the overall trend, engineering and chemistry journals experienced declining cited half-lives. Last, as journals attracted more citations, a larger proportion of them were directed toward older papers. The trend to cite older papers is not fully explained by technology (digital publishing, search and retrieval, etc.), but may be the result of a structural shift to fund incremental and applied research over fundamental science.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 14:03:27 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2015 14:58:32 GMT" } ]
2015-04-30T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Cochran", "Angela", "" ] ]
new_dataset
0.998233
1504.07513
Marco Bozzano
Benjamin Bittner, Marco Bozzano, Roberto Cavada, Alessandro Cimatti, Marco Gario, Alberto Griggio, Cristian Mattarei, Andrea Micheli, Gianni Zampedri
The xSAP Safety Analysis Platform
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the xSAP safety analysis platform. xSAP provides several model-based safety analysis features for finite- and infinite-state synchronous transition systems. In particular, it supports library-based definition of fault modes, an automatic model extension facility, generation of safety analysis artifacts such as Dynamic Fault Trees (DFTs) and Failure Mode and Effects Analysis (FMEA) tables. Moreover, it supports probabilistic evaluation of Fault Trees, failure propagation analysis using Timed Failure Propagation Graphs (TFPGs), and Common Cause Analysis (CCA). xSAP has been used in several industrial projects as verification back-end, and is currently being evaluated in a joint R&D Project involving FBK and The Boeing Company.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 14:53:01 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2015 07:59:40 GMT" } ]
2015-04-30T00:00:00
[ [ "Bittner", "Benjamin", "" ], [ "Bozzano", "Marco", "" ], [ "Cavada", "Roberto", "" ], [ "Cimatti", "Alessandro", "" ], [ "Gario", "Marco", "" ], [ "Griggio", "Alberto", "" ], [ "Mattarei", "Cristian", "" ], [ "Micheli", "Andrea", "" ], [ "Zampedri", "Gianni", "" ] ]
new_dataset
0.961714
1504.07685
Sariel Har-Peled
Boris Aronov, Sariel Har-Peled, Christian Knauer, Yusu Wang, Carola Wenk
Fr\'echet Distance for Curves, Revisited
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
$\renewcommand{\Re}{{\rm I\!\hspace{-0.025em} R}} \newcommand{\eps}{{\varepsilon}} \newcommand{\SetX}{\mathsf{X}} \newcommand{\VorX}[1]{\mathcal{V} \pth{#1}} \newcommand{\Polygon}{\mathsf{P}} \newcommand{\Space}{\overline{\mathsf{m}}} \newcommand{\pth}[2][\!]{#1\left({#2}\right)}$ We revisit the problem of computing Fr\'echet distance between polygonal curves under $L_1$, $L_2$, and $L_\infty$ norms, focusing on discrete Fr\'echet distance, where only distance between vertices is considered. We develop efficient algorithms for two natural classes of curves. In particular, given two polygonal curves of $n$ vertices each, a $\eps$-approximation of their discrete Fr\'echet distance can be computed in roughly $O(n\kappa^3\log n/\eps^3)$ time in three dimensions, if one of the curves is \emph{$\kappa$-bounded}. Previously, only a $\kappa$-approximation algorithm was known. If both curves are the so-called \emph{\backbone~curves}, which are widely used to model protein backbones in molecular biology, we can $\eps$-approximate their Fr\'echet distance in near linear time in two dimensions, and in roughly $O(n^{4/3}\log nm)$ time in three dimensions. In the second part, we propose a pseudo--output-sensitive algorithm for computing Fr\'echet distance exactly. The complexity of the algorithm is a function of a quantity we call the \emph{\bwnumber{}}, which is quadratic in the worst case, but tends to be much smaller in practice.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 23:38:35 GMT" } ]
2015-04-30T00:00:00
[ [ "Aronov", "Boris", "" ], [ "Har-Peled", "Sariel", "" ], [ "Knauer", "Christian", "" ], [ "Wang", "Yusu", "" ], [ "Wenk", "Carola", "" ] ]
new_dataset
0.976269
1504.07753
Despina Stasi
Robert H. Sloan, Despina Stasi, and Gyorgy Turan
Hydras: Directed Hypergraphs and Horn Formulas
17 pages, 4 figures
null
null
null
cs.DM cs.LO math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new graph parameter, the hydra number, arising from the minimization problem for Horn formulas in propositional logic. The hydra number of a graph $G=(V,E)$ is the minimal number of hyperarcs of the form $u,v\rightarrow w$ required in a directed hypergraph $H=(V,F)$, such that for every pair $(u, v)$, the set of vertices reachable in $H$ from $\{u, v\}$ is the entire vertex set $V$ if $(u, v) \in E$, and it is $\{u, v\}$ otherwise. Here reachability is defined by forward chaining, a standard marking algorithm. Various bounds are given for the hydra number. We show that the hydra number of a graph can be upper bounded by the number of edges plus the path cover number of the line graph of a spanning subgraph, which is a sharp bound in several cases. On the other hand, we construct single-headed graphs for which that bound is off by a constant factor. Furthermore, we characterize trees with low hydra number, and give a lower bound for the hydra number of trees based on the number of vertices that are leaves in the tree obtained from $T$ by deleting its leaves. This bound is sharp for some families of trees. We give bounds for the hydra number of complete binary trees and also discuss a related minimization problem.
[ { "version": "v1", "created": "Wed, 29 Apr 2015 08:08:39 GMT" } ]
2015-04-30T00:00:00
[ [ "Sloan", "Robert H.", "" ], [ "Stasi", "Despina", "" ], [ "Turan", "Gyorgy", "" ] ]
new_dataset
0.999302
1502.05361
Martin Koutecky
Petr Kolman, Martin Kouteck\'y
Extended Formulation for CSP that is Compact for Instances of Bounded Treewidth
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide an extended formulation for the class of constraint satisfaction problems and prove that its size is polynomial for instances whose constraint graph has bounded treewidth. This implies new upper bounds on extension complexity of several important NP-hard problems on graphs of bounded treewidth.
[ { "version": "v1", "created": "Wed, 18 Feb 2015 20:00:10 GMT" }, { "version": "v2", "created": "Tue, 28 Apr 2015 08:17:39 GMT" } ]
2015-04-29T00:00:00
[ [ "Kolman", "Petr", "" ], [ "Koutecký", "Martin", "" ] ]
new_dataset
0.986109
1504.07283
Thomas Sandholm
Thomas Sandholm, Julie Ward, Filippo Balestrieri and Bernardo A. Huberman
QoS-Based Pricing and Scheduling of Batch Jobs in OpenStack Clouds
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current Cloud infrastructure services (IaaS) market employs a resource-based selling model: customers rent nodes from the provider and pay per-node per-unit-time. This selling model places the burden upon customers to predict their job resource requirements and durations. Inaccurate prediction by customers can result in over-provisioning of resources, or under-provisioning and poor job performance. Thanks to improved resource virtualization and multi-tenant performance isolation, as well as common frameworks for batch jobs, such as MapReduce, Cloud providers can predict job completion times more accurately. We offer a new definition of QoS-levels in terms of job completion times and we present a new QoS-based selling mechanism for batch jobs in a multi-tenant OpenStack cluster. Our experiments show that the QoS-based solution yields up to 40% improvement over the revenue of more standard selling mechanisms based on a fixed per-node price across various demand and supply conditions in a 240-VCPU OpenStack cluster.
[ { "version": "v1", "created": "Mon, 27 Apr 2015 21:28:41 GMT" } ]
2015-04-29T00:00:00
[ [ "Sandholm", "Thomas", "" ], [ "Ward", "Julie", "" ], [ "Balestrieri", "Filippo", "" ], [ "Huberman", "Bernardo A.", "" ] ]
new_dataset
0.979522
1504.07342
Jiandong Zhu
Xinyun Liu, Jiandong Zhu
On Potential Equations of Finite Games
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, some new criteria for detecting whether a finite game is potential are proposed by solving potential equations. The verification equations with the minimal number for checking a potential game are obtained for the first time. Some connections between the potential equations and the existing characterizations of potential games are established. It is revealed that a finite game is potential if and only if its every bi-matrix sub-game is potential.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 04:41:31 GMT" } ]
2015-04-29T00:00:00
[ [ "Liu", "Xinyun", "" ], [ "Zhu", "Jiandong", "" ] ]
new_dataset
0.999274
1504.07459
Marian-Andrei Rizoiu
Marian-Andrei Rizoiu, Adrien Guille and Julien Velcin
CommentWatcher: An Open Source Web-based platform for analyzing discussions on web forums
null
null
null
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present CommentWatcher, an open source tool aimed at analyzing discussions on web forums. Constructed as a web platform, CommentWatcher features automatic mass fetching of user posts from forum on multiple sites, extracting topics, visualizing the topics as an expression cloud and exploring their temporal evolution. The underlying social network of users is simultaneously constructed using the citation relations between users and visualized as a graph structure. Our platform addresses the issues of the diversity and dynamics of structures of webpages hosting the forums by implementing a parser architecture that is independent of the HTML structure of webpages. This allows easy on-the-fly adding of new websites. Two types of users are targeted: end users who seek to study the discussed topics and their temporal evolution, and researchers in need of establishing a forum benchmark dataset and comparing the performances of analysis tools.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 13:18:00 GMT" } ]
2015-04-29T00:00:00
[ [ "Rizoiu", "Marian-Andrei", "" ], [ "Guille", "Adrien", "" ], [ "Velcin", "Julien", "" ] ]
new_dataset
0.998684
1504.07563
Olayinka Olafare
Olayinka Olafare, Hani Parhizkar, Silas Vem
A New Secure Mobile Cloud Architecture
15 Pages, 8 Figures, 9 Tables, A New Secure Mobile Cloud Architecture 2015
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The demand and use of mobile phones, PDAs and smart phones are constantly on the rise as such, manufacturers of these devices are improving the technology and usability of these devices constantly. Due to the handy shape and size these devices come in, their processing capabilities and functionalities, they are preferred by many over the conventional desktop or laptop computers. Mobile devices are being used today to perform most tasks that a desktop or laptop computer could be used for. On this premise, mobile devices are also used to connect to the resources of cloud computing hence, mobile cloud computing (MCC). The seemingly ubiquitous and pervasive nature of most mobile devices has made it acceptable and adequate to match the ubiquitous and pervasive nature of cloud computing. Mobile cloud computing is said to have increased the challenges known to cloud computing due to the security loop holes that most mobile devices have.
[ { "version": "v1", "created": "Sat, 25 Apr 2015 08:28:46 GMT" } ]
2015-04-29T00:00:00
[ [ "Olafare", "Olayinka", "" ], [ "Parhizkar", "Hani", "" ], [ "Vem", "Silas", "" ] ]
new_dataset
0.999444
1504.07595
Asbj{\o}rn Br{\ae}ndeland
Asbj{\o}rn Br{\ae}ndeland
nCk sequences and their difference sequences
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A nCk sequence is a sequence of n-bit numbers with k bits set. Given such a sequence C, the difference sequence D of C is subject to certain regularities that make it possible to generate D in 2|C| time, and, hence, to generate C in 3|C| time.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 18:45:30 GMT" } ]
2015-04-29T00:00:00
[ [ "Brændeland", "Asbjørn", "" ] ]
new_dataset
0.999888
1410.0983
Marcos Portnoi
Marcos Portnoi and Chien-Chung Shen
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Accepted at International Conference on Computing, Networking and Communications (ICNC 2015)
null
10.1109/ICCNC.2015.7069321
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords. Two-factor authentication aids in the security, even though, as a side effect, might worsen user experience. We depict a mobile sign-on scheme that benefits from the dynamic relationship between a user's attributes, the service the user wishes to utilize, and location (where the user is, and what services are available there) as an authentication factor. We demonstrate our scheme employing Bluetooth Low Energy beacons for location awareness and the expressiveness of Attribute-Based Encryption to capture and leverage the described relationship. Bluetooth Low Energy beacons broadcast encrypted messages with encoded access policies. Within range of the beacons, a user with appropriate attributes is able to decrypt the broadcast message and obtain parameters that allow the user to perform a short or simplified login.
[ { "version": "v1", "created": "Fri, 3 Oct 2014 21:40:52 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2014 20:54:41 GMT" } ]
2015-04-28T00:00:00
[ [ "Portnoi", "Marcos", "" ], [ "Shen", "Chien-Chung", "" ] ]
new_dataset
0.999835
1411.4796
Reino Niskanen
Vesa Halava, Tero Harju, Reino Niskanen and Igor Potapov
Weighted automata on infinite words in the context of Attacker-Defender games
23 pages, 5 figures
null
null
null
cs.FL cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider infinite-state Attacker-Defender games with reachability objectives. The results of the paper are twofold. Firstly we prove a new language-theoretic result for weighted automata on infinite words and show its encoding into the framework of Attacker-Defender games. Secondly we use this novel concept to prove undecidability for checking existence of a winning strategy in several low-dimensional mathematical games including vector reachability games, word games and braid games.
[ { "version": "v1", "created": "Tue, 18 Nov 2014 10:24:35 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2015 10:58:34 GMT" }, { "version": "v3", "created": "Mon, 27 Apr 2015 13:35:17 GMT" } ]
2015-04-28T00:00:00
[ [ "Halava", "Vesa", "" ], [ "Harju", "Tero", "" ], [ "Niskanen", "Reino", "" ], [ "Potapov", "Igor", "" ] ]
new_dataset
0.9675
1411.5752
Bharath Hariharan
Bharath Hariharan and Pablo Arbel\'aez and Ross Girshick and Jitendra Malik
Hypercolumns for Object Segmentation and Fine-grained Localization
CVPR Camera ready
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognition algorithms based on convolutional networks (CNNs) typically use the output of the last layer as feature representation. However, the information in this layer may be too coarse to allow precise localization. On the contrary, earlier layers may be precise in localization but will not capture semantics. To get the best of both worlds, we define the hypercolumn at a pixel as the vector of activations of all CNN units above that pixel. Using hypercolumns as pixel descriptors, we show results on three fine-grained localization tasks: simultaneous detection and segmentation[22], where we improve state-of-the-art from 49.7[22] mean AP^r to 60.0, keypoint localization, where we get a 3.3 point boost over[20] and part labeling, where we show a 6.6 point gain over a strong baseline.
[ { "version": "v1", "created": "Fri, 21 Nov 2014 03:12:33 GMT" }, { "version": "v2", "created": "Sat, 25 Apr 2015 23:08:59 GMT" } ]
2015-04-28T00:00:00
[ [ "Hariharan", "Bharath", "" ], [ "Arbeláez", "Pablo", "" ], [ "Girshick", "Ross", "" ], [ "Malik", "Jitendra", "" ] ]
new_dataset
0.9546
1412.8439
Sewoong Oh
Giulia Fanti, Peter Kairouz, Sewoong Oh, Pramod Viswanath
Spy vs. Spy: Rumor Source Obfuscation
14 pages 10 figures
null
null
null
cs.SI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Anonymous messaging platforms, such as Secret and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles. We further consider a stronger adversarial model where a subset of colluding users track the reception of messages. We show that the adaptive diffusion provides a strong protection of the anonymity of the source even under this scenario.
[ { "version": "v1", "created": "Mon, 29 Dec 2014 19:47:16 GMT" }, { "version": "v2", "created": "Fri, 2 Jan 2015 20:20:06 GMT" }, { "version": "v3", "created": "Sun, 26 Apr 2015 03:50:07 GMT" } ]
2015-04-28T00:00:00
[ [ "Fanti", "Giulia", "" ], [ "Kairouz", "Peter", "" ], [ "Oh", "Sewoong", "" ], [ "Viswanath", "Pramod", "" ] ]
new_dataset
0.990257
1501.03924
Gao Jian
Jian Gao, Fang-Wei Fu, Ling Xiao, Rama Krishna Bandi
On cyclic codes over $\mathbb{Z}_q+u\mathbb{Z}_q$
11. arXiv admin note: text overlap with arXiv:1309.1623
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $R=\mathbb{Z}_q+u\mathbb{Z}_q$, where $q=p^s$ and $u^2=0$. In this paper, some structural properties of cyclic codes over the ring $R$ are considered. A necessary and sufficient condition for cyclic codes over the ring $R$ to be free is obtained and a BCH-type bound on the minimum Hamming distance for them is also given.
[ { "version": "v1", "created": "Fri, 16 Jan 2015 09:36:11 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 02:42:29 GMT" }, { "version": "v3", "created": "Sat, 24 Jan 2015 01:37:22 GMT" }, { "version": "v4", "created": "Sun, 26 Apr 2015 06:55:09 GMT" } ]
2015-04-28T00:00:00
[ [ "Gao", "Jian", "" ], [ "Fu", "Fang-Wei", "" ], [ "Xiao", "Ling", "" ], [ "Bandi", "Rama Krishna", "" ] ]
new_dataset
0.999447
1504.01623
Yoann Dieudonn\'e
S\'ebastien Bouchard, Yoann Dieudonn\'e and Bertrand Ducourthial
Byzantine Gathering in Networks
null
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates an open problem introduced in [14]. Two or more mobile agents start from different nodes of a network and have to accomplish the task of gathering which consists in getting all together at the same node at the same time. An adversary chooses the initial nodes of the agents and assigns a different positive integer (called label) to each of them. Initially, each agent knows its label but does not know the labels of the other agents or their positions relative to its own. Agents move in synchronous rounds and can communicate with each other only when located at the same node. Up to f of the agents are Byzantine. A Byzantine agent can choose an arbitrary port when it moves, can convey arbitrary information to other agents and can change its label in every round, in particular by forging the label of another agent or by creating a completely new one. What is the minimum number M of good agents that guarantees deterministic gathering of all of them, with termination? We provide exact answers to this open problem by considering the case when the agents initially know the size of the network and the case when they do not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2. More precisely, for networks of known size, we design a deterministic algorithm gathering all good agents in any network provided that the number of good agents is at least f+1. For networks of unknown size, we also design a deterministic algorithm ensuring the gathering of all good agents in any network but provided that the number of good agents is at least f+2. Both of our algorithms are optimal in terms of required number of good agents, as each of them perfectly matches the respective lower bound on M shown in [14], which is of f+1 when the size of the network is known and of f+2 when it is unknown.
[ { "version": "v1", "created": "Tue, 7 Apr 2015 14:40:31 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 12:56:52 GMT" }, { "version": "v3", "created": "Mon, 27 Apr 2015 06:38:07 GMT" } ]
2015-04-28T00:00:00
[ [ "Bouchard", "Sébastien", "" ], [ "Dieudonné", "Yoann", "" ], [ "Ducourthial", "Bertrand", "" ] ]
new_dataset
0.984232
1504.06827
Manuel Cebrian
Yury Kryvasheyeu, Haohui Chen, Nick Obradovich, Esteban Moro, Pascal Van Hentenryck, James Fowler, and Manuel Cebrian
Nowcasting Disaster Damage
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intensity and composition of Twitter's message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings suggest that massive online social networks can be used for rapid assessment ("nowcasting") of damage caused by a large-scale disaster.
[ { "version": "v1", "created": "Sun, 26 Apr 2015 14:15:36 GMT" } ]
2015-04-28T00:00:00
[ [ "Kryvasheyeu", "Yury", "" ], [ "Chen", "Haohui", "" ], [ "Obradovich", "Nick", "" ], [ "Moro", "Esteban", "" ], [ "Van Hentenryck", "Pascal", "" ], [ "Fowler", "James", "" ], [ "Cebrian", "Manuel", "" ] ]
new_dataset
0.983956
1504.06921
Hooi Sin Ng
Hooi Sin Ng, Yong Haur Tay, Kim Meng Liang, Hamam Mokayed and Hock Woon Hon
Detection and Recognition of Malaysian Special License Plate Based On SIFT Features
seven pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated car license plate recognition systems are developed and applied for purpose of facilitating the surveillance, law enforcement, access control and intelligent transportation monitoring with least human intervention. In this paper, an algorithm based on SIFT feature points clustering and matching is proposed to address the issue of recognizing Malaysian special plates. These special plates do not follow the format of standard car plates as they may contain italic, cursive, connected and small letters. The algorithm is tested with 150 Malaysian special plate images under different environment and the promising experimental results demonstrate that the proposed algorithm is relatively robust.
[ { "version": "v1", "created": "Mon, 27 Apr 2015 03:49:33 GMT" } ]
2015-04-28T00:00:00
[ [ "Ng", "Hooi Sin", "" ], [ "Tay", "Yong Haur", "" ], [ "Liang", "Kim Meng", "" ], [ "Mokayed", "Hamam", "" ], [ "Hon", "Hock Woon", "" ] ]
new_dataset
0.999506
1504.07193
Marcos Portnoi
Marcos Portnoi, Chien-Chung Shen
Secure Zones: An Attribute-Based Encryption advisory system for safe firearms
Communications and Network Security (CNS), 2013 IEEE Conference on. arXiv admin note: substantial text overlap with arXiv:1411.1733
null
10.1109/CNS.2013.6682746
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the user and the firearm are received by embedded hardware in the firearms, which then advises the user about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and user attributes, and providing privacy and security through it cryptography. We describe a holistic approach to evolving the firearm to a cyber-physical system to aid in augmenting safety. We introduce a conceptual model for a firearm equipped with sensors and a context-aware software agent. Based on the information from the sensors, the agent can access the context and inform the user of potential unsafe operations. To support Secure Zones and the cyber-physical firearm model, we propose a Key Infrastructure Scheme for key generation, distribution, and management, and a Context-Aware Software Agent Framework for Firearms.
[ { "version": "v1", "created": "Mon, 27 Apr 2015 18:11:54 GMT" } ]
2015-04-28T00:00:00
[ [ "Portnoi", "Marcos", "" ], [ "Shen", "Chien-Chung", "" ] ]
new_dataset
0.996419
1503.00851
Ozgur Yilmaz
Ozgur Yilmaz
Connectionist-Symbolic Machine Intelligence using Cellular Automata based Reservoir-Hyperdimensional Computing
Corrected Typos. Responded some comments on section 8. Added appendix for details. Recurrent architecture emphasized
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel framework of reservoir computing, that is capable of both connectionist machine intelligence and symbolic computation. Cellular automaton is used as the reservoir of dynamical systems. Input is randomly projected onto the initial conditions of automaton cells and nonlinear computation is performed on the input via application of a rule in the automaton for a period of time. The evolution of the automaton creates a space-time volume of the automaton state space, and it is used as the reservoir. The proposed framework is capable of long short-term memory and it requires orders of magnitude less computation compared to Echo State Networks. We prove that cellular automaton reservoir holds a distributed representation of attribute statistics, which provides a more effective computation than local representation. It is possible to estimate the kernel for linear cellular automata via metric learning, that enables a much more efficient distance computation in support vector machine framework. Also, binary reservoir feature vectors can be combined using Boolean operations as in hyperdimensional computing, paving a direct way for concept building and symbolic processing.
[ { "version": "v1", "created": "Tue, 3 Mar 2015 08:14:08 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2015 20:31:01 GMT" }, { "version": "v3", "created": "Fri, 24 Apr 2015 06:33:58 GMT" } ]
2015-04-27T00:00:00
[ [ "Yilmaz", "Ozgur", "" ] ]
new_dataset
0.997228
1504.04433
Lu Shao
Lu Shao, Cheng Wang, Changjun Jiang
STC: Coarse-Grained Vehicular Data Based Travel Speed Sensing by Leveraging Spatial-Temporal Correlation
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As an important information for traffic condition evaluation, trip planning, transportation management, etc., average travel speed for a road means the average speed of vehicles travelling through this road in a given time duration. Traditional ways for collecting travel-speed oriented traffic data always depend on dedicated sensors and supporting infrastructures, and are therefore financial costly. Differently, vehicular crowdsensing as an infrastructure-free way, can be used to collect data including real-time locations and velocities of vehicles for road travel speed estimation, which is a quite low-cost way. However, vehicular crowdsensing data is always coarse-grained. This coarseness can lead to the incompleteness of travel speeds. Aiming to handle this problem as well as estimate travel speed accurately, in this paper, we propose an approach named STC that exploits the spatial-temporal correlation among travel speeds for roads by introducing the time-lagged cross correlation function. The time lagging factor describes the time consumption of traffic feature diffusion along roads. To properly calculate cross correlation, we novelly make the determination of the time lagging factor self-adaptive by recording the locations of vehicles at different roads. Then, utilizing the local stationarity of cross correlation, we further reduce the problem of single-road travel speed vacancy completion to a minimization problem. Finally, we fill all the vacancies of travel speed for roads in a recursive way using the geometric structure of road net. Elaborate experiments based on real taxi trace data show that STC can settle the incompleteness problem of vehicle crowdsensing data based travel speed estimation and ensure the accuracy of estimated travel speed better, in comparison with representative existing methods such as KNN, Kriging and ARIMA.
[ { "version": "v1", "created": "Fri, 17 Apr 2015 03:40:39 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2015 02:03:00 GMT" }, { "version": "v3", "created": "Fri, 24 Apr 2015 03:27:06 GMT" } ]
2015-04-27T00:00:00
[ [ "Shao", "Lu", "" ], [ "Wang", "Cheng", "" ], [ "Jiang", "Changjun", "" ] ]
new_dataset
0.998964
1504.06434
Jasper Uijlings
Jasper Uijlings and Vittorio Ferrari
Situational Object Boundary Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intuitively, the appearance of true object boundaries varies from image to image. Hence the usual monolithic approach of training a single boundary predictor and applying it to all images regardless of their content is bound to be suboptimal. In this paper we therefore propose situational object boundary detection: We first define a variety of situations and train a specialized object boundary detector for each of them using [Dollar and Zitnick 2013]. Then given a test image, we classify it into these situations using its context, which we model by global image appearance. We apply the corresponding situational object boundary detectors, and fuse them based on the classification probabilities. In experiments on ImageNet, Microsoft COCO, and Pascal VOC 2012 segmentation we show that our situational object boundary detection gives significant improvements over a monolithic approach. Additionally, our method substantially outperforms [Hariharan et al. 2011] on semantic contour detection on their SBD dataset.
[ { "version": "v1", "created": "Fri, 24 Apr 2015 09:15:33 GMT" } ]
2015-04-27T00:00:00
[ [ "Uijlings", "Jasper", "" ], [ "Ferrari", "Vittorio", "" ] ]
new_dataset
0.986978
1301.7119
Yoann Dieudonn\'e
Yoann Dieudonn\'e, Andrzej Pelc, Vincent Villain
How to Meet Asynchronously at Polynomial Cost
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two mobile agents starting at different nodes of an unknown network have to meet. This task is known in the literature as rendezvous. Each agent has a different label which is a positive integer known to it, but unknown to the other agent. Agents move in an asynchronous way: the speed of agents may vary and is controlled by an adversary. The cost of a rendezvous algorithm is the total number of edge traversals by both agents until their meeting. The only previous deterministic algorithm solving this problem has cost exponential in the size of the graph and in the larger label. In this paper we present a deterministic rendezvous algorithm with cost polynomial in the size of the graph and in the length of the smaller label. Hence we decrease the cost exponentially in the size of the graph and doubly exponentially in the labels of agents. As an application of our rendezvous algorithm we solve several fundamental problems involving teams of unknown size larger than 1 of labeled agents moving asynchronously in unknown networks. Among them are the following problems: team size, in which every agent has to find the total number of agents, leader election, in which all agents have to output the label of a single agent, perfect renaming in which all agents have to adopt new different labels from the set {1, . . . , k}, where k is the number of agents, and gossiping, in which each agent has initially a piece of information (value) and all agents have to output all the values. Using our rendezvous algorithm we solve all these problems at cost polynomial in the size of the graph and in the smallest length of all labels of participating agents.
[ { "version": "v1", "created": "Wed, 30 Jan 2013 01:25:48 GMT" }, { "version": "v2", "created": "Thu, 23 Apr 2015 15:36:59 GMT" } ]
2015-04-24T00:00:00
[ [ "Dieudonné", "Yoann", "" ], [ "Pelc", "Andrzej", "" ], [ "Villain", "Vincent", "" ] ]
new_dataset
0.99532
1504.05908
Marco Kuhlmann
Peter Jonsson and Marco Kuhlmann
Maximum Pagenumber-k Subgraph is NP-Complete
6 pages, 1 figure
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a graph $G$ with a total order defined on its vertices, the Maximum Pagenumber-$k$ Subgraph Problem asks for a maximum subgraph $G'$ of $G$ such that $G'$ can be embedded into a $k$-book when the vertices are placed on the spine according to the specified total order. We show that this problem is NP-complete for $k \geq 2$.
[ { "version": "v1", "created": "Tue, 21 Apr 2015 06:36:48 GMT" }, { "version": "v2", "created": "Thu, 23 Apr 2015 10:17:25 GMT" } ]
2015-04-24T00:00:00
[ [ "Jonsson", "Peter", "" ], [ "Kuhlmann", "Marco", "" ] ]
new_dataset
0.970509
1504.06025
Jingwei Xu
Jingwei Xu, Tiben Che, Gwan Choi
XJ-BP: Express Journey Belief Propagation Decoding for Polar Codes
submitted to GLOBECOMM 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel propagation (BP) based decoding algorithm for polar codes. The proposed algorithm facilitates belief propagation by utilizing the specific constituent codes that exist in the factor graph, which results in an express journey (XJ) for belief information to propagate in each decoding iteration. In addition, this XJ-BP decoder employs a novel round-trip message passing scheduling method for the increased efficiency. The proposed method simplifies min-sum (MS) BP decoder by 40.6%. Along with the round-trip scheduling, the XJ-BP algorithm reduces the computational complexity of MS BP decoding by 90.4%; this enables an energy-efficient hardware implementation of BP decoding in practice.
[ { "version": "v1", "created": "Thu, 23 Apr 2015 02:04:55 GMT" } ]
2015-04-24T00:00:00
[ [ "Xu", "Jingwei", "" ], [ "Che", "Tiben", "" ], [ "Choi", "Gwan", "" ] ]
new_dataset
0.991056
1504.05694
Serge Egelman
Linda Lee, Serge Egelman, Joong Hwa Lee, David Wagner
Risk Perceptions for Wearable Devices
null
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wearable devices, or "wearables," bring great benefits but also potential risks that could expose users' activities with- out their awareness or consent. In this paper, we report findings from the first large-scale survey conducted to investigate user security and privacy concerns regarding wearables. We surveyed 1,782 Internet users in order to identify risks that are particularly concerning to them; these risks are inspired by the sensor inputs and applications of popular wearable technologies. During this experiment, our questions controlled for the effects of what data was being accessed and with whom it was being shared. We also investigated how these emergent threats compared to existent mobile threats, how upcoming capabilities and artifacts compared to existing technologies, and how users ranked technical and nontechnical concerns to sketch a concrete and broad view of the wearable device landscape. We hope that this work will inform the design of future user notification, permission management, and access control schemes for wearables.
[ { "version": "v1", "created": "Wed, 22 Apr 2015 08:44:23 GMT" } ]
2015-04-23T00:00:00
[ [ "Lee", "Linda", "" ], [ "Egelman", "Serge", "" ], [ "Lee", "Joong Hwa", "" ], [ "Wagner", "David", "" ] ]
new_dataset
0.980226
1504.05740
Eitan Yaakobi
Eitan Yaakobi, Alexander Yucovich, Gal Maor, Gala Yadgar
When Do WOM Codes Improve the Erasure Factor in Flash Memories?
to be presented at ISIT 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flash memory is a write-once medium in which reprogramming cells requires first erasing the block that contains them. The lifetime of the flash is a function of the number of block erasures and can be as small as several thousands. To reduce the number of block erasures, pages, which are the smallest write unit, are rewritten out-of-place in the memory. A Write-once memory (WOM) code is a coding scheme which enables to write multiple times to the block before an erasure. However, these codes come with significant rate loss. For example, the rate for writing twice (with the same rate) is at most 0.77. In this paper, we study WOM codes and their tradeoff between rate loss and reduction in the number of block erasures, when pages are written uniformly at random. First, we introduce a new measure, called erasure factor, that reflects both the number of block erasures and the amount of data that can be written on each block. A key point in our analysis is that this tradeoff depends upon the specific implementation of WOM codes in the memory. We consider two systems that use WOM codes; a conventional scheme that was commonly used, and a new recent design that preserves the overall storage capacity. While the first system can improve the erasure factor only when the storage rate is at most 0.6442, we show that the second scheme always improves this figure of merit.
[ { "version": "v1", "created": "Wed, 22 Apr 2015 11:30:06 GMT" } ]
2015-04-23T00:00:00
[ [ "Yaakobi", "Eitan", "" ], [ "Yucovich", "Alexander", "" ], [ "Maor", "Gal", "" ], [ "Yadgar", "Gala", "" ] ]
new_dataset
0.998959
1504.05940
Kasper Fl{\o}e Trillingsgaard
Kasper Fl{\o}e Trillingsgaard, Wei Yang, Giuseppe Durisi, Petar Popovski
Broadcasting a Common Message with Variable-Length Stop-Feedback Codes
Extended version of a paper submitted to ISIT 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the maximum coding rate achievable over a two-user broadcast channel for the scenario where a common message is transmitted using variable-length stop-feedback codes. Specifically, upon decoding the common message, each decoder sends a stop signal to the encoder, which transmits continuously until it receives both stop signals. For the point-to-point case, Polyanskiy, Poor, and Verd\'u (2011) recently demonstrated that variable-length coding combined with stop feedback significantly increases the speed at which the maximum coding rate converges to capacity. This speed-up manifests itself in the absence of a square-root penalty in the asymptotic expansion of the maximum coding rate for large blocklengths, a result a.k.a. zero dispersion. In this paper, we show that this speed-up does not necessarily occur for the broadcast channel with common message. Specifically, there exist scenarios for which variable-length stop-feedback codes yield a positive dispersion.
[ { "version": "v1", "created": "Wed, 22 Apr 2015 19:50:12 GMT" } ]
2015-04-23T00:00:00
[ [ "Trillingsgaard", "Kasper Fløe", "" ], [ "Yang", "Wei", "" ], [ "Durisi", "Giuseppe", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.997722
1504.05276
Rasheed Hussain
Rasheed Hussain, Donghyun Kim, Michele Nogueira, Junggab Son, Alade O. Tokuta, and Heekuck Oh
PBF: A New Privacy-Aware Billing Framework for Online Electric Vehicles with Bidirectional Auditability
13 pages, 7 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently an online electric vehicle (OLEV) concept has been introduced, where vehicles are propelled through the wirelessly transmitted electrical power from the infrastructure installed under the road while moving. The absence of secure-and-fair billing is one main hurdle to widely adopt this promising technology. This paper introduces a secure and privacy-aware fair billing framework for OLEV on the move through the charging plates installed under the road. We first propose two extreme lightweight mutual authentication mechanisms, a direct authentication and a hash chain-based authentication between vehicles and the charging plates that can be used for different vehicular speeds on the road. Second we propose a secure and privacy-aware wireless power transfer on move for the vehicles with bidirectional auditability guarantee by leveraging game-theoretic approach. Each charging plate transfers a fixed amount of energy to the vehicle and bills the vehicle in a privacy-aware way accordingly. Our protocol guarantees secure, privacy-aware, and fair billing mechanism for the OLEVs while receiving electric power from the road. Moreover our proposed framework can play a vital role in eliminating the security and privacy challenges in the deployment of power transfer technology to the OLEVs.
[ { "version": "v1", "created": "Tue, 21 Apr 2015 02:13:04 GMT" } ]
2015-04-22T00:00:00
[ [ "Hussain", "Rasheed", "" ], [ "Kim", "Donghyun", "" ], [ "Nogueira", "Michele", "" ], [ "Son", "Junggab", "" ], [ "Tokuta", "Alade O.", "" ], [ "Oh", "Heekuck", "" ] ]
new_dataset
0.995892
1404.7383
Shenghao Wang
Shenghao Wang, Huajie Han, Kun Gao, Zhili Wang, Can Zhang, Meng Yang, Zhao Wu, Augusto Marcelli and Ziyu Wu
A LabVIEW based user-friendly X-ray phase-contrast imaging system software platform
11 pages, 5 figures, 1 table
Journal of X-ray Science and Technology, vol. 23, No.2, 189-199, 2015
10.3233/XST-150480
null
cs.SE physics.ins-det physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
X-ray phase-contrast imaging can provide greatly improved contrast over conventional absorption-based imaging for weakly absorbing samples, such as biological soft tissues and fibre composites. In this manuscript, we introduce an easy and fast way to develop a user-friendly software platform dedicated to the new grating-based X-ray phase-contrast imaging setup recently built at the National Synchrotron Radiation Laboratory of the University of Science and Technology of China. Unified management and control of 21 motorized positioning stages, of an ultra-precision piezoelectric translation stage and of the X-ray tube are achieved with this platform. The software package also covers the automatic image acquisition of the phase-stepping scanning with a flat panel detector. Moreover, a data post-processing module for signals retrieval and other custom features are in principle available. With a seamless integration of all necessary functions in a unique package, this software platform will greatly support the user activity during experimental runs.
[ { "version": "v1", "created": "Tue, 29 Apr 2014 14:57:08 GMT" }, { "version": "v2", "created": "Mon, 5 May 2014 13:57:32 GMT" } ]
2015-04-21T00:00:00
[ [ "Wang", "Shenghao", "" ], [ "Han", "Huajie", "" ], [ "Gao", "Kun", "" ], [ "Wang", "Zhili", "" ], [ "Zhang", "Can", "" ], [ "Yang", "Meng", "" ], [ "Wu", "Zhao", "" ], [ "Marcelli", "Augusto", "" ], [ "Wu", "Ziyu", "" ] ]
new_dataset
0.99942
1504.04725
Yan-yu Zhang
Yan-Yu Zhang, Hong-Yi Yu, Jian-Kang Zhang, Yi-Jun Zhu, Jin-Long Wang and Tao Wang
Full Large-Scale Diversity Space Codes for MIMO Optical Wireless Communications
accepted by ISIT 2015
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a multiple-input-multiple-output optical wireless communication (MIMO-OWC) system suffering from log-normal fading. In this scenario, a general criterion for the design of full large-scale diversity space code (FLDSC) with the maximum likelihood (ML) detector is developed. Based on our criterion, FLDSC is attained if and only if all the entries of the space coding matrix are positive. Particularly for $2\times 2$ MIMO-OWC with unipolar pulse amplitude modulation (PAM), a closed-form linear FLDSC satisfying this criterion is attained by smartly taking advantage of some available properties as well as by developing some new interesting properties on Farey sequences in number theory to rigorously attack the continuous and discrete variables mixed max-min problem. In fact, this specific design not only proves that a repetition code (RC) is the best linear FLDSC, but also uncovers a significant difference between MIMO radio frequency (RF) communications and MIMO-OWC that space-only transmission is sufficient for a full diversity achievement. Computer simulations demonstrate that FLDSC substantially outperforms spatial multiplexing with the same total optical power and spectral efficiency and the latter obtains only the small-scale diversity gain.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 14:41:56 GMT" } ]
2015-04-21T00:00:00
[ [ "Zhang", "Yan-Yu", "" ], [ "Yu", "Hong-Yi", "" ], [ "Zhang", "Jian-Kang", "" ], [ "Zhu", "Yi-Jun", "" ], [ "Wang", "Jin-Long", "" ], [ "Wang", "Tao", "" ] ]
new_dataset
0.996626
1504.04750
Dilek K\"u\c{c}\"uk
Dilek K\"u\c{c}\"uk and Tolga \.Inan and Burak Boyrazo\u{g}lu and Serkan Buhan and \"Ozg\"ul Salor and I\c{s}{\i}k \c{C}ad{\i}rc{\i} and Muammer Ermi\c{s}
PQStream: A Data Stream Architecture for Electrical Power Quality
Appears in Proceedings of International Workshop on Knowledge Discovery from Ubiquitous Data Streams of ECML/PKDD, 2007
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a data stream architecture is presented for electrical power quality (PQ) which is called PQStream. PQStream is developed to process and manage time-evolving data coming from the country-wide mobile measurements of electrical PQ parameters of the Turkish Electricity Transmission System. It is a full-fledged system with a data measurement module which carries out processing of continuous PQ data, a stream database which stores the output of the measurement module, and finally a Graphical User Interface for retrospective analysis of the PQ data stored in the stream database. The presented model is deployed and is available to PQ experts, academicians and researchers of the area. As further studies, data mining methods such as classification and clustering algorithms will be applied in order to deduce useful PQ information from this database of PQ data.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 18:25:18 GMT" } ]
2015-04-21T00:00:00
[ [ "Küçük", "Dilek", "" ], [ "İnan", "Tolga", "" ], [ "Boyrazoğlu", "Burak", "" ], [ "Buhan", "Serkan", "" ], [ "Salor", "Özgül", "" ], [ "Çadırcı", "Işık", "" ], [ "Ermiş", "Muammer", "" ] ]
new_dataset
0.995758
1504.04751
Dilek K\"u\c{c}\"uk
Dilek K\"u\c{c}\"uk and Meltem Turhan Y\"ondem
A Knowledge-poor Pronoun Resolution System for Turkish
Appears in Proceedings of the 6th Discourse Anaphora and Anaphora Resolution Colloquium (DAARC), 2007
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pronoun resolution system which requires limited syntactic knowledge to identify the antecedents of personal and reflexive pronouns in Turkish is presented. As in its counterparts for languages like English, Spanish and French, the core of the system is the constraints and preferences determined empirically. In the evaluation phase, it performed considerably better than the baseline algorithm used for comparison. The system is significant for its being the first fully specified knowledge-poor computational framework for pronoun resolution in Turkish where Turkish possesses different structural properties from the languages for which knowledge-poor systems had been developed.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 18:34:19 GMT" } ]
2015-04-21T00:00:00
[ [ "Küçük", "Dilek", "" ], [ "Yöndem", "Meltem Turhan", "" ] ]
new_dataset
0.999568
1504.04926
Hoang Dau
Son Hoang Dau and Han Mao Kiah and Wentu Song and Chau Yuen
Locally Encodable and Decodable Codes for Distributed Storage Systems
7 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the locality of encoding and decoding operations in distributed storage systems (DSS), and propose a new class of codes, called locally encodable and decodable codes (LEDC), that provides a higher degree of operational locality compared to currently known codes. For a given locality structure, we derive an upper bound on the global distance and demonstrate the existence of an optimal LEDC for sufficiently large field size. In addition, we also construct two families of optimal LEDC for fields with size linear in code length.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 03:12:23 GMT" } ]
2015-04-21T00:00:00
[ [ "Dau", "Son Hoang", "" ], [ "Kiah", "Han Mao", "" ], [ "Song", "Wentu", "" ], [ "Yuen", "Chau", "" ] ]
new_dataset
0.999467
1504.04931
David Eppstein
David Eppstein, J. Michael McCarthy, and Brian E. Parrish
Rooted Cycle Bases
12 pages with 10 additional pages of appendices and 10 figures. Extended version of a paper to appear at the 14th Algorithms and Data Structures Symposium (WADS), Victoria, BC, August 2015
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A cycle basis in an undirected graph is a minimal set of simple cycles whose symmetric differences include all Eulerian subgraphs of the given graph. We define a rooted cycle basis to be a cycle basis in which all cycles contain a specified root edge, and we investigate the algorithmic problem of constructing rooted cycle bases. We show that a given graph has a rooted cycle basis if and only if the root edge belongs to its 2-core and the 2-core is 2-vertex-connected, and that constructing such a basis can be performed efficiently. We show that in an unweighted or positively weighted graph, it is possible to find the minimum weight rooted cycle basis in polynomial time. Additionally, we show that it is NP-complete to find a fundamental rooted cycle basis (a rooted cycle basis in which each cycle is formed by combining paths in a fixed spanning tree with a single additional edge) but that the problem can be solved by a fixed-parameter-tractable algorithm when parameterized by clique-width.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 04:02:52 GMT" } ]
2015-04-21T00:00:00
[ [ "Eppstein", "David", "" ], [ "McCarthy", "J. Michael", "" ], [ "Parrish", "Brian E.", "" ] ]
new_dataset
0.997901
1504.04934
Aaron Wang
Qiming Wang, Liping Li
On the Symmetry of Polar Codes for Symmetric Binary-Input Discrete Memoryless Channels
5 pages, no figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the symmetry of polar codes on symmetric binary-input discrete memoryless channels (B-DMC). The symmetry property of polar codes is originally pointed out in Arikan's work for general B-DMC channels. With the symmetry, the output vector $y_1^N$ ($N$ be the block length) can be divided into equivalence classes in terms of their transition probabilities. In this paper, we present a new frame of analysis on the symmetry of polar codes for B-DMC channels. Theorems are provided to characterize the symmetries among the received vectors.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 04:19:03 GMT" } ]
2015-04-21T00:00:00
[ [ "Wang", "Qiming", "" ], [ "Li", "Liping", "" ] ]
new_dataset
0.997289
1504.05008
Kavitha Radhakumar
Kavitha. R and B. Sundar Rajan
On the Number of Optimal Index Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Index coding there is a single sender with multiple messages and multiple receivers each wanting a different set of messages and knowing a different set of messages a priori. The Index Coding problem is to identify the minimum number of transmissions (optimal length) to be made so that all receivers can decode their wanted messages using the transmitted symbols and their respective prior information and also the codes with optimal length. Recently it was shown that different optimal length codes perform differently in a wireless channel. Towards identifying the best optimal length index code one needs to know the number of optimal length index codes. In this paper we present results on the number of optimal length index codes making use of the representation of an index coding problem by an equivalent network code. We give the minimum number of codes possible with the optimal length. This is done using a simpler algebraic formulation of the problem compared to the approach of Koetter and Medard.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 10:53:15 GMT" } ]
2015-04-21T00:00:00
[ [ "R", "Kavitha.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.992885
1504.05100
Vitaly Skachek
Faruk G\"olo\u{g}lu, J\"uri Lember, Ago-Erik Riet, and Vitaly Skachek
New Bounds for Permutation Codes in Ulam Metric
To be presented at ISIT 2015, 5 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New bounds on the cardinality of permutation codes equipped with the Ulam distance are presented. First, an integer-programming upper bound is derived, which improves on the Singleton-type upper bound in the literature for some lengths. Second, several probabilistic lower bounds are developed, which improve on the known lower bounds for large minimum distances. The results of a computer search for permutation codes are also presented.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 16:05:20 GMT" } ]
2015-04-21T00:00:00
[ [ "Göloğlu", "Faruk", "" ], [ "Lember", "Jüri", "" ], [ "Riet", "Ago-Erik", "" ], [ "Skachek", "Vitaly", "" ] ]
new_dataset
0.998677
1301.1378
J\'ozsef Vass Ph.D.
J\'ozsef Vass
Apollonian Circumcircles of IFS Fractals
Submitted for publication. (Contains 8 pages with 4 figures.)
null
null
null
cs.CG cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Euclidean triangles and IFS fractals seem to be disparate geometrical concepts, unless we consider the Sierpi\'{n}ski gasket, which is a self-similar collection of triangles. The "circumcircle" hints at a direct link, as it can be derived for three-map IFS fractals in general, defined in an Apollonian manner. Following this path, one may discover a broader relationship between polygons and IFS fractals.
[ { "version": "v1", "created": "Tue, 8 Jan 2013 01:57:09 GMT" }, { "version": "v2", "created": "Thu, 16 Apr 2015 23:29:37 GMT" } ]
2015-04-20T00:00:00
[ [ "Vass", "József", "" ] ]
new_dataset
0.98012
1306.5176
David Richerby
Andreas G\"obel and Leslie Ann Goldberg and Colin McQuillan and David Richerby and Tomoyuki Yamakami
Counting list matrix partitions of graphs
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a symmetric D*D matrix M over {0,1,*}, a list M-partition of a graph G is a partition of G's vertices into D parts associated with the rows of M. The part of each vertex is chosen from a given list so that no edge of G maps to a 0 in M and no non-edge of G maps to a 1 in M. Many important graph-theoretic structures can be represented as list M-partitions, such as graph colourings, split graphs and homogeneous sets and pairs, which arise in the proofs of the weak and strong perfect graph conjectures. There has been quite a bit of work on determining for which matrices M computations involving list M-partitions are tractable. We focus on counting list M-partitions, given a graph G and a list for each vertex of G. We identify a set of "tractable" matrices and give an algorithm that counts list M-partitions in polynomial time for every (fixed) matrix M in this set. The algorithm uses data structures such as sparse-dense partitions and subcube decompositions to reduce each instance to a sequence of instances in which the lists restrict access to portions of M in which the interaction of 0s and 1s is controlled. We solve the resulting restricted instances by converting them into counting constraint satisfaction problems (#CSPs) which we solve using arc-consistency. For every matrix M for which our algorithm fails, we show that counting list M-partitions is #P-complete. Further, we give an explicit characterisation of the dichotomy theorem: counting list M-partitions is in FP if M has a structure called a derectangularising sequence; otherwise, counting list M-partitions is #P-hard. We show that the meta-problem of determining whether a given matrix has a derectangularising sequence is NP-complete. Finally, we show that lists can be used to encode cardinality restrictions in M-partitions problems and use this to give a polynomial-time algorithm for counting homogeneous pairs in graphs.
[ { "version": "v1", "created": "Fri, 21 Jun 2013 15:41:59 GMT" }, { "version": "v2", "created": "Thu, 27 Feb 2014 15:45:37 GMT" }, { "version": "v3", "created": "Fri, 17 Apr 2015 17:52:29 GMT" } ]
2015-04-20T00:00:00
[ [ "Göbel", "Andreas", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "McQuillan", "Colin", "" ], [ "Richerby", "David", "" ], [ "Yamakami", "Tomoyuki", "" ] ]
new_dataset
0.969994
1504.04420
Manjunath M
Manjunath M, Manjaiah D.H
PAR: Petal ant routing algorithm for mobile ad hoc network
14 Pages, 17 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During route discovery of mobile ad hoc network, broadcasting of route request and route reply packets are the essential operations for finding the path between two ends. In such situations, intermediate node which may or may not belongs will participate in route discovery process, update routing table and rebroadcast the route discovery packets again to its neighboring nodes. Finally optimal path is found with minimum hops. This simply upsurges overhead and deteriorates the performance of routing. The proposed Petal Ant Routing (PAR) algorithm offers a low overhead by optimizing FANT and BANT transmissions in route discover process. The algorithm is an improved version of SARA and has features extracted from petal routing. The algorithm is simulated on NS2, compared with ACO frame work called SARA and classical routing protocols such as AODV and AOMDV. The simulation results shows that PAR further reduces overhead by eliminating redundant FANT transmission compared to other routing algorithm.
[ { "version": "v1", "created": "Thu, 16 Apr 2015 05:08:32 GMT" } ]
2015-04-20T00:00:00
[ [ "M", "Manjunath", "" ], [ "H", "Manjaiah D.", "" ] ]
new_dataset
0.995509