id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1101.1507
Kyle Burke
Kyle Burke, Olivia George
A PSPACE-complete Graph Nim
14 pages, 3 figures
null
null
null
cs.GT cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We build off the game, NimG to create a version named Neighboring Nim. By reducing from Geography, we show that this game is PSPACE-hard. The games created by the reduction share strong similarities with Undirected (Vertex) Geography and regular Nim, both of which are in P. We show how to construct PSPACE-complete versions with nim heaps *1 and *2. This application of graphs can be used as a form of game sum with any games, not only Nim.
[ { "version": "v1", "created": "Fri, 7 Jan 2011 19:19:42 GMT" }, { "version": "v2", "created": "Tue, 30 Aug 2011 03:34:54 GMT" }, { "version": "v3", "created": "Tue, 7 Oct 2014 11:40:08 GMT" } ]
2014-10-08T00:00:00
[ [ "Burke", "Kyle", "" ], [ "George", "Olivia", "" ] ]
new_dataset
0.999652
1410.0600
Ghislain Fourny
Ghislain Fourny
Cell Stores
Technical report - 10 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cell stores provide a relational-like, tabular level of abstraction to business users while leveraging recent database technologies, such as key-value stores and document stores. This allows to scale up and out the efficient storage and retrieval of highly dimensional data. Cells are the primary citizens and exist in different forms, which can be explained with an analogy to the state of matter: as a gas for efficient storage, as a solid for efficient retrieval, and as a liquid for efficient interaction with the business users. Cell stores were abstracted from, and are compatible with the XBRL standard for importing and exporting data. The first cell store repository contains roughly 200GB of SEC filings data, and proves that retrieving data cubes can be performed in real time (the threshold acceptable by a human user being at most a few seconds).
[ { "version": "v1", "created": "Thu, 2 Oct 2014 16:14:22 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2014 15:51:58 GMT" } ]
2014-10-08T00:00:00
[ [ "Fourny", "Ghislain", "" ] ]
new_dataset
0.997569
1410.1613
Xianghui Cao
Devu Manikantan Shila, Xianghui Cao, Yu Cheng, Zequ Yang, Yang Zhou, Jiming Chen
Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ZigBee has been recently drawing a lot of attention as a promising solution for ubiquitous computing. The ZigBee devices are normally resource-limited, making the network susceptible to a variety of security threats. This paper presents a severe attack on ZigBee networks termed as ghost, which leverages the underlying vulnerabilities of the IEEE 802.15.4 security suites to deplete the energy of the devices. We manifest that the impact of ghost is severe as it can reduce the lifetime of devices from years to days and facilitate a variety of threats including denial of service and replay attacks. We highlight that merely deploying a standard suite of advanced security techniques does not necessarily guarantee improved security, but instead might be leveraged by adversaries to cause severe disruption in the network. We propose several recommendations on how to localize and withstand the ghost and other related attacks in ZigBee networks. Extensive simulations are provided to show the impact of the ghost and the performance of the proposed recommendations. Moreover, physical experiments also have been conducted and the observations confirm the severity of the impact by the ghost attack. We believe that the presented work will aid the researchers to improve the security of ZigBee further.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 04:19:04 GMT" } ]
2014-10-08T00:00:00
[ [ "Shila", "Devu Manikantan", "" ], [ "Cao", "Xianghui", "" ], [ "Cheng", "Yu", "" ], [ "Yang", "Zequ", "" ], [ "Zhou", "Yang", "" ], [ "Chen", "Jiming", "" ] ]
new_dataset
0.996851
1410.1639
Yichen Jiang
Yichen Jiang, Yi Ji, Tianhua Liu
An Anonymous Communication Scheme based on Ring Signature in VANETs
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular ad hoc networks allow vehicles to connect themselves as networks so that cars could communicate with each other. This paper introduces an anonymous communication scheme providing integrity protection, multi-level privacy and auditability. The scheme is based on a certificateless ring signature proposed in this paper, which is contributed to reduce the length of the signature and simplify the key management. In our scheme, vehicles can compose the anonymous group without the help of road-side infrastructure or central authority. The computation overhead is close to a normal signature scheme, so it is efficient in most application scenarios. We also present a small-scale implementation to show the availability of the prototype system.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 08:31:34 GMT" } ]
2014-10-08T00:00:00
[ [ "Jiang", "Yichen", "" ], [ "Ji", "Yi", "" ], [ "Liu", "Tianhua", "" ] ]
new_dataset
0.999414
1410.1726
Ahmad Abdelfattah
Ahmad Abdelfattah, David Keyes, Hatem Ltaief
KBLAS: An Optimized Library for Dense Matrix-Vector Multiplication on GPU Accelerators
Submitted to the ACM Transactions on Mathematical Software
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
KBLAS is a new open source high performance library that provides optimized kernels for a subset of Level 2 BLAS functionalities on CUDA-enabled GPUs. Since performance of dense matrix-vector multiplication is hindered by the overhead of memory accesses, a double-buffering optimization technique is employed to overlap data motion with computation. After identifying a proper set of tuning parameters, KBLAS is able to efficiently run on various GPU architectures across different generations, avoiding the time-consuming step of code rewriting, while still being compliant with the standard BLAS API. Another advanced optimization technique allows to ensure coalesced memory access when dealing with submatrices, especially in the context of high level dense linear algebra algorithms. All four precisions KBLAS kernels have been leveraged to multi-GPUs environment, which requires the introduction of new APIs to ease users' experiences on these challenging systems. The KBLAS performance outperforms existing state-of-the-art implementations on all matrix sizes, achieves asymptotically up to 50% and 60% speedup on single GPU and multi-GPUs systems, respectively, and validates our performance model. A subset of KBLAS high performance kernels has been integrated into NVIDIA's standard BLAS implementation (cuBLAS) for larger dissemination, starting version 6.0.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 13:43:53 GMT" } ]
2014-10-08T00:00:00
[ [ "Abdelfattah", "Ahmad", "" ], [ "Keyes", "David", "" ], [ "Ltaief", "Hatem", "" ] ]
new_dataset
0.989011
1410.1740
Stefanie Haustein
Stefanie Haustein, Timothy D. Bowman, Kim Holmberg, Isabella Peters and Vincent Larivi\`ere
Astrophysicists on Twitter: An in-depth analysis of tweeting and scientific publication behavior
14 pages, 5 figures, 7 tables
Aslib Journal of Information Management 66(3) (2014) 279-296
10.1108/AJIM-09-2013-0081
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the tweeting behavior of 37 astrophysicists on Twitter and compares their tweeting behavior with their publication behavior and citation impact to show whether they tweet research-related topics or not. Astrophysicists on Twitter are selected to compare their tweets with their publications from Web of Science. Different user groups are identified based on tweeting and publication frequency. A moderate negative correlation (p=-0.390*) is found between the number of publications and tweets per day, while retweet and citation rates do not correlate. The similarity between tweets and abstracts is very low (cos=0.081). User groups show different tweeting behavior such as retweeting and including hashtags, usernames and URLs. The study is limited in terms of the small set of astrophysicists. Results are not necessarily representative of the entire astrophysicist community on Twitter and they most certainly do not apply to scientists in general. Future research should apply the methods to a larger set of researchers and other scientific disciplines. To a certain extent, this study helps to understand how researchers use Twitter. The results hint at the fact that impact on Twitter can neither be equated with nor replace traditional research impact metrics. However, tweets and other so-called altmetrics might be able to reflect other impact of scientists such as public outreach and science communication. To the best of our knowledge, this is the first in-depth study comparing researchers' tweeting activity and behavior with scientific publication output in terms of quantity, content and impact.
[ { "version": "v1", "created": "Tue, 7 Oct 2014 14:26:58 GMT" } ]
2014-10-08T00:00:00
[ [ "Haustein", "Stefanie", "" ], [ "Bowman", "Timothy D.", "" ], [ "Holmberg", "Kim", "" ], [ "Peters", "Isabella", "" ], [ "Larivière", "Vincent", "" ] ]
new_dataset
0.99285
1410.1773
Fredrick Ishengoma
Fredrick Romanus Ishengoma
A Novel Design of IEEE 802.15.4 and Solar Based Autonomous Water Quality Monitoring Prototype using ECHERP
12 pages, International Journal of Computer Science and Network Solutions, Volume 2, Issue 1, January 2014
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recently advancement in Wireless Sensor Network (WSN) technology has brought new distributed sensing applications such as water quality monitoring. With sensing capabilities and using parameters like pH, conductivity and temperature, the quality of water can be known. This paper proposes a novel design based on IEEE 802.15.4 (Zig-Bee protocol) and solar energy called Autonomous Water Quality Monitoring Prototype (AWQMP). The prototype is designed to use ECHERP routing protocol and Adruino Mega 2560, an open-source electronic prototyping platform for data acquisition. AWQMP is expected to give real time data acquirement and to reduce the cost of manual water quality monitoring due to its autonomous characteristic. Moreover, the proposed prototype will help to study the behavior of aquatic animals in deployed water bodies.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 12:52:37 GMT" } ]
2014-10-08T00:00:00
[ [ "Ishengoma", "Fredrick Romanus", "" ] ]
new_dataset
0.991176
1010.0852
Daniela Maftuleac
Victor Chepoi and Daniela Maftuleac
Shortest path problem in rectangular complexes of global nonpositive curvature
null
null
10.1016/j.comgeo.2012.04.002
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
CAT(0) metric spaces constitute a far-reaching common generalization of Euclidean and hyperbolic spaces and simple polygons: any two points x and y of a CAT(0) metric space are connected by a unique shortest path {\gamma}(x,y). In this paper, we present an efficient algorithm for answering two-point distance queries in CAT(0) rectangular complexes and two of theirs subclasses, ramified rectilinear polygons (CAT(0) rectangular complexes in which the links of all vertices are bipartite graphs) and squaregraphs (CAT(0) rectangular complexes arising from plane quadrangulations in which all inner vertices have degrees \geq4). Namely, we show that for a CAT(0) rectangular complex K with n vertices, one can construct a data structure D of size $O(n^2)$ so that, given any two points x,y in K, the shortest path {\gamma}(x,y) between x and y can be computed in O(d(p,q)) time, where p and q are vertices of two faces of K containing the points x and y, respectively, such that {\gamma}(x,y) is contained in K(I(p,q)) and d(p,q) is the distance between p and q in the underlying graph of K. If K is a ramified rectilinear polygon, then one can construct a data structure D of optimal size O(n) and answer two-point shortest path queries in O(d(p,q)log{\Delta}) time, where {\Delta} is the maximal degree of a vertex of G(K). Finally, if K is a squaregraph, then one can construct a data structure D of size O(nlogn) and answer two-point shortest path queries in O(d(p,q)) time.
[ { "version": "v1", "created": "Tue, 5 Oct 2010 12:05:21 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2012 21:23:18 GMT" } ]
2014-10-07T00:00:00
[ [ "Chepoi", "Victor", "" ], [ "Maftuleac", "Daniela", "" ] ]
new_dataset
0.965287
1312.0885
Dipankar Saha
Dipankar Saha, Aanan Chatterjee, Sayan Chatterjee, and C. K. Sarkar
Row-Based Dual Vdd Assignment, for a Level Converter Free CSA Design and Its Near-Threshold Operation
Final Version of this work is available @ Advances in Electrical Engineering, Hindawi Publishing Corporation (Volume 2014 (2014), Article ID 814975, 6 pages)
null
10.1155/2014/814975
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Subthreshold circuit designs are very much popular for some of the ultra low power applications, where the minimum energy consumption is the primary concern. But, due to the weak driving current, these circuits generally suffer from huge performance degradation. Therefore, in this paper, we primarily targeted to analyze the performance of a Near-Threshold Circuit (NTC), which retains the excellent energy efficiency of the subthreshold design, while improving the performance to a certain extent. A modified row-based dual Vdd 4-operand CSA (Carry Save Adder) design has been reported in the present work using 45 nm technology. Moreover, to find out the effectiveness of the near-threshold operation of the 4-operand CSA design; it has been compared with the other design styles. From the simulation results, obtained for the frequency of 20 MHz, we found that the proposed scheme of CSA design consumes 3.009*10-7 Watt of Average Power (Pavg), which is almost 90.9 % lesser than that of the conventional CSA design. Whereas, looking at the perspective of maximum delay at output, the proposed scheme of CSA design provides a fair 44.37 % improvement, compared to that of the subthreshold CSA design.
[ { "version": "v1", "created": "Fri, 29 Nov 2013 09:48:57 GMT" }, { "version": "v2", "created": "Sun, 27 Jul 2014 06:43:16 GMT" }, { "version": "v3", "created": "Wed, 6 Aug 2014 14:33:21 GMT" }, { "version": "v4", "created": "Sun, 5 Oct 2014 11:01:20 GMT" } ]
2014-10-07T00:00:00
[ [ "Saha", "Dipankar", "" ], [ "Chatterjee", "Aanan", "" ], [ "Chatterjee", "Sayan", "" ], [ "Sarkar", "C. K.", "" ] ]
new_dataset
0.998831
1312.3735
Christoph Bunte
Christoph Bunte and Amos Lapidoth
Codes for Tasks and R\'enyi Entropy Rate
5 pages, to be presented at ISIT 2014; minor changes in the presentation, added a reference
null
10.1109/ISIT.2014.6874852
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A task is randomly drawn from a finite set of tasks and is described using a fixed number of bits. All the tasks that share its description must be performed. Upper and lower bounds on the minimum $\rho$-th moment of the number of performed tasks are derived. The key is an analog of the Kraft Inequality for partitions of finite sets. When a sequence of tasks is produced by a source of a given R\'enyi entropy rate of order $1/(1+\rho)$ and $n$ tasks are jointly described using $nR$ bits, it is shown that for $R$ larger than the R\'enyi entropy rate, the $\rho$-th moment of the ratio of performed tasks to $n$ can be driven to one as $n$ tends to infinity, and that for $R$ less than the R\'enyi entropy rate it tends to infinity. This generalizes a recent result for IID sources by the same authors. A mismatched version of the direct part is also considered, where the code is designed according to the wrong law. The penalty incurred by the mismatch can be expressed in terms of a divergence measure that was shown by Sundaresan to play a similar role in the Massey-Arikan guessing problem.
[ { "version": "v1", "created": "Fri, 13 Dec 2013 09:09:01 GMT" }, { "version": "v2", "created": "Fri, 2 May 2014 13:16:18 GMT" } ]
2014-10-07T00:00:00
[ [ "Bunte", "Christoph", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.994021
1402.4675
Boris Bellalta Dr.
T. Adame, A. Bel, B. Bellalta, J. Barcelo, M. Oliver
IEEE 802.11ah: The Wi-Fi Approach for M2M Communications
IEEE Wireless Magazine, 2014
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
M2M communications are projected to be one of the fastest growing technology segments of the IT sector in the next years. Sensor and actuator networks connect communication machines and devices so that they automatically transmit information, serving the growing demand for environmental data acquisition. IEEE 802.11ah Task Group addresses the creation of a new standard for giving response to the particular requirements of this type of networks: large number of power-constrained stations, long transmission range, small and infrequent data messages, low data-rates and non-critical delay. This article explores the key features of this new standard under development, especially those related to the reduction of energy consumption in the MAC Layer. In this direction, a performance assessment of IEEE 802.11ah in four typical M2M scenarios has been performed.
[ { "version": "v1", "created": "Wed, 19 Feb 2014 14:35:12 GMT" }, { "version": "v2", "created": "Sun, 5 Oct 2014 17:46:59 GMT" } ]
2014-10-07T00:00:00
[ [ "Adame", "T.", "" ], [ "Bel", "A.", "" ], [ "Bellalta", "B.", "" ], [ "Barcelo", "J.", "" ], [ "Oliver", "M.", "" ] ]
new_dataset
0.998527
1405.7464
Anna-Lena Trautmann
Anna-Lena Trautmann and Emanuele Viterbo
Cross-Error Correcting Integer Codes over $\mathbb{Z}_{2^m}$
To be published in the proceedings of ISITA 2014, IEICE copyright
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we investigate codes in $\mathbb{Z}_{2^m}^n$ that can correct errors that occur in just one coordinate of the codeword, with a magnitude of up to a given parameter $t$. We will show upper bounds on these cross codes, derive constructions for linear codes and respective decoding algorithm. The constructions (and decoding algorithms) are given for length $n = 2$ and $n = 3$, but for general $m$ and $t$.
[ { "version": "v1", "created": "Thu, 29 May 2014 05:08:12 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2014 03:31:09 GMT" } ]
2014-10-07T00:00:00
[ [ "Trautmann", "Anna-Lena", "" ], [ "Viterbo", "Emanuele", "" ] ]
new_dataset
0.98947
1407.1428
Avery Miller
Avery Miller, Andrzej Pelc
Fast Rendezvous with Advice
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two mobile agents, starting from different nodes of an $n$-node network at possibly different times, have to meet at the same node. This problem is known as rendezvous. Agents move in synchronous rounds using a deterministic algorithm. In each round, an agent decides to either remain idle or to move to one of the adjacent nodes. Each agent has a distinct integer label from the set $\{1,...,L\}$, which it can use in the execution of the algorithm, but it does not know the label of the other agent. If $D$ is the distance between the initial positions of the agents, then $\Omega(D)$ is an obvious lower bound on the time of rendezvous. However, if each agent has no initial knowledge other than its label, time $O(D)$ is usually impossible to achieve. We study the minimum amount of information that has to be available a priori to the agents to achieve rendezvous in optimal time $\Theta(D)$. This information is provided to the agents at the start by an oracle knowing the entire instance of the problem, i.e., the network, the starting positions of the agents, their wake-up rounds, and both of their labels. The oracle helps the agents by providing them with the same binary string called advice, which can be used by the agents during their navigation. The length of this string is called the size of advice. Our goal is to find the smallest size of advice which enables the agents to meet in time $\Theta(D)$. We show that this optimal size of advice is $\Theta(D\log(n/D)+\log\log L)$. The upper bound is proved by constructing an advice string of this size, and providing a natural rendezvous algorithm using this advice that works in time $\Theta(D)$ for all networks. The matching lower bound, which is the main contribution of this paper, is proved by exhibiting classes of networks for which it is impossible to achieve rendezvous in time $\Theta(D)$ with smaller advice.
[ { "version": "v1", "created": "Sat, 5 Jul 2014 19:33:08 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2014 13:08:32 GMT" } ]
2014-10-07T00:00:00
[ [ "Miller", "Avery", "" ], [ "Pelc", "Andrzej", "" ] ]
new_dataset
0.997321
1410.1090
Junhua Mao
Junhua Mao, Wei Xu, Yi Yang, Jiang Wang, Alan L. Yuille
Explain Images with Multimodal Recurrent Neural Networks
null
null
null
null
cs.CV cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a multimodal Recurrent Neural Network (m-RNN) model for generating novel sentence descriptions to explain the content of images. It directly models the probability distribution of generating a word given previous words and the image. Image descriptions are generated by sampling from this distribution. The model consists of two sub-networks: a deep recurrent neural network for sentences and a deep convolutional network for images. These two sub-networks interact with each other in a multimodal layer to form the whole m-RNN model. The effectiveness of our model is validated on three benchmark datasets (IAPR TC-12, Flickr 8K, and Flickr 30K). Our model outperforms the state-of-the-art generative method. In addition, the m-RNN model can be applied to retrieval tasks for retrieving images or sentences, and achieves significant performance improvement over the state-of-the-art methods which directly optimize the ranking objective function for retrieval.
[ { "version": "v1", "created": "Sat, 4 Oct 2014 20:24:34 GMT" } ]
2014-10-07T00:00:00
[ [ "Mao", "Junhua", "" ], [ "Xu", "Wei", "" ], [ "Yang", "Yi", "" ], [ "Wang", "Jiang", "" ], [ "Yuille", "Alan L.", "" ] ]
new_dataset
0.968699
1410.1127
Xianwen Wang
Xianwen Wang, Shenmeng Xu, Zhi Wang, Lian Peng, Chuanli Wang
International Scientific Collaboration of China: Collaborating Countries, Institutions and Individuals
11 pages,3 figures
Scientometrics 95.3 (2013): 885-894
10.1007/s11192-012-0877-4
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using bibliometric methods, we investigate China's international scientific collaboration from 3 levels of collaborating countries, institutions and individuals. We design a database in SQL Server, and make analysis of Chinese SCI papers based on the corresponding author field. We find that China's international scientific collaboration is focused on a handful of countries. Nearly 95% international co-authored papers are collaborated with only 20 countries, among which the USA account for more than 40% of all. Results also show that Chinese lineage in the international co-authorship is obvious, which means Chinese immigrant scientists are playing an important role in China's international scientific collaboration, especially in English-speaking countries.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 06:41:02 GMT" } ]
2014-10-07T00:00:00
[ [ "Wang", "Xianwen", "" ], [ "Xu", "Shenmeng", "" ], [ "Wang", "Zhi", "" ], [ "Peng", "Lian", "" ], [ "Wang", "Chuanli", "" ] ]
new_dataset
0.990933
1410.1130
Koen Samyn
Koen Samyn, Sofie Van Hoecke, Bart Pieters, Charles Hollemeersch, Aljosha Demeulemeester and Rik van de Walle
Real-time animation of human characters with fuzzy controllers
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The production of animation is a resource intensive process in game companies. Therefore, techniques to synthesize animations have been developed. However, these procedural techniques offer limited adaptability by animation artists. In order to solve this, a fuzzy neural network model of the animation is proposed, where the parameters can be tuned either by machine learning techniques that use motion capture data as training data or by the animation artist himself. This paper illustrates how this real time procedural animation system can be developed, taking the human gait on flat terrain and inclined surfaces as example. Currently, the parametric model is capable of synthesizing animations for various limb sizes and step sizes.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 07:26:44 GMT" } ]
2014-10-07T00:00:00
[ [ "Samyn", "Koen", "" ], [ "Van Hoecke", "Sofie", "" ], [ "Pieters", "Bart", "" ], [ "Hollemeersch", "Charles", "" ], [ "Demeulemeester", "Aljosha", "" ], [ "van de Walle", "Rik", "" ] ]
new_dataset
0.978588
1410.1160
Aleksandar Milenkoski
Aleksandar Milenkoski and Samuel Kounev and Alberto Avritzer and Nuno Antunes and Marco Vieira
On Benchmarking Intrusion Detection Systems in Virtualized Environments
SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group
null
null
SPEC-RG-2013-002
cs.CR cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze state-of-the-art intrusion detection techniques applied in virtualized environments and architectures of VMM-based IDSes. Further, we identify challenges that apply specifically to benchmarking VMM-based IDSes focussing on workloads and metrics. For example, we discuss the challenge of defining representative baseline benign workload profiles as well as the challenge of defining malicious workloads containing attacks targeted at the VMM. We also discuss the impact of on-demand resource provisioning features of virtualized environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS benchmarking measures such as capacity and attack detection accuracy. Finally, we outline future research directions in the area of benchmarking VMM-based IDSes and of intrusion detection in virtualized environments in general.
[ { "version": "v1", "created": "Sun, 5 Oct 2014 13:30:15 GMT" } ]
2014-10-07T00:00:00
[ [ "Milenkoski", "Aleksandar", "" ], [ "Kounev", "Samuel", "" ], [ "Avritzer", "Alberto", "" ], [ "Antunes", "Nuno", "" ], [ "Vieira", "Marco", "" ] ]
new_dataset
0.985703
1410.1267
Alex James Dr
Akshay Kumar Maan, Dinesh Sasi Kumar, Sherin Sugathan, and Alex Pappachen James
Memristive Threshold Logic Circuit Design of Fast Moving Object Detection
To be published in IEEE Transactions on Very Large Scale Integration (VLSI) Systems
null
10.1109/TVLSI.2014.2359801
null
cs.CV cs.AR cs.ET
http://creativecommons.org/licenses/by-nc-sa/3.0/
Real-time detection of moving objects involves memorisation of features in the template image and their comparison with those in the test image. At high sampling rates, such techniques face the problems of high algorithmic complexity and component delays. We present a new resistive switching based threshold logic cell which encodes the pixels of a template image. The cell comprises a voltage divider circuit that programs the resistances of the memristors arranged in a single node threshold logic network and the output is encoded as a binary value using a CMOS inverter gate. When a test image is applied to the template-programmed cell, a mismatch in the respective pixels is seen as a change in the output voltage of the cell. The proposed cell when compared with CMOS equivalent implementation shows improved performance in area, leakage power, power dissipation and delay.
[ { "version": "v1", "created": "Mon, 6 Oct 2014 06:52:57 GMT" } ]
2014-10-07T00:00:00
[ [ "Maan", "Akshay Kumar", "" ], [ "Kumar", "Dinesh Sasi", "" ], [ "Sugathan", "Sherin", "" ], [ "James", "Alex Pappachen", "" ] ]
new_dataset
0.999452
1410.0735
Roya Ensafi
Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A nation-scale firewall, colloquially referred to as the "Great Firewall of China," implements many different types of censorship and content filtering to control China's Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using hybrid idle scan techniques that are able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel's SYN backlog. We demonstrate both techniques by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that 1) failures in the firewall occur throughout the entire country without any conspicuous geographical patterns, 2) a network block in China appears to have unfiltered access to parts of the Tor network, and 3) the filtering seems to be mostly centralized at the level of Internet exchange points. Our work also answers many other open questions about the Great Firewall's architecture and implementation.
[ { "version": "v1", "created": "Fri, 3 Oct 2014 01:11:24 GMT" } ]
2014-10-06T00:00:00
[ [ "Ensafi", "Roya", "" ], [ "Winter", "Philipp", "" ], [ "Mueen", "Abdullah", "" ], [ "Crandall", "Jedidiah R.", "" ] ]
new_dataset
0.99025
1410.0879
Jean Gregoire
Jean Gregoire
Priority-based coordination of mobile robots
PhD Thesis, 182 pages
null
null
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the end of the 1980's, the development of self-driven autonomous vehicles is an intensive research area in most major industrial countries. Positive socio-economic potential impacts include a decrease of crashes, a reduction of travel times, energy efficiency improvements, and a reduced need of costly physical infrastructure. Some form of vehicle-to-vehicle and/or vehicle-to-infrastructure cooperation is required to ensure a safe and efficient global transportation system. This thesis deals with a particular form of cooperation by studying the problem of coordinating multiple mobile robots at an intersection area. Most of coordination systems proposed in previous work consist in planning a trajectory and to control the robots along the planned trajectory: that is the plan-as-program paradigm where planning is considered as a generative mechanism of action. The approach of the thesis is to plan priorities -- the relative order of robots to go through the intersection -- which is much weaker as many trajectories respect the same priorities. More precisely, priorities encode the homotopy classes of solutions to the coordination problem. Priority assignment is equivalent to the choice of some homotopy class to solve the coordination problem instead of a particular trajectory. Once priorities are assigned, robots are controlled through a control law preserving the assigned priorities, i.e., ensuring the described trajectory belongs to the chosen homotopy class. It results in a more robust coordination system -- able to handle a large class of unexpected events in a reactive manner -- particularly well adapted for an application to the coordination of autonomous vehicles at intersections where cars, public transport and pedestrians share the road.
[ { "version": "v1", "created": "Fri, 3 Oct 2014 15:24:00 GMT" } ]
2014-10-06T00:00:00
[ [ "Gregoire", "Jean", "" ] ]
new_dataset
0.983903
1409.6092
Wei Hengjia
Wei Hengjia, Zhang Hui, Zhu Mingzhi and Ge Gennian
Optimal Ternary Constant-Composition Codes with Weight Four and Distance Six
44 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sizes of optimal constant-composition codes of weight three have been determined by Chee, Ge and Ling with four cases in doubt. Group divisible codes played an important role in their constructions. In this paper, we study the problem of constructing optimal ternary constant-composition codes with Hamming weight four and minimum distance six. The problem is solved with a small number of lengths undetermined. The previously known results are those with code length no greater than 10.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 07:36:49 GMT" }, { "version": "v2", "created": "Thu, 2 Oct 2014 04:48:37 GMT" } ]
2014-10-03T00:00:00
[ [ "Hengjia", "Wei", "" ], [ "Hui", "Zhang", "" ], [ "Mingzhi", "Zhu", "" ], [ "Gennian", "Ge", "" ] ]
new_dataset
0.997453
1410.0371
Ankit Chaudhary
J. L. Raheja, B. Ajay, Ankit Chaudhary
Real Time Fabric Defect Detection System on an Embedded DSP Platform
Optik Elsevier 2013
null
10.1016/j.ijleo.2013.03.038
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In industrial fabric productions, automated real time systems are needed to find out the minor defects. It will save the cost by not transporting defected products and also would help in making compmay image of quality fabrics by sending out only undefected products. A real time fabric defect detection system (FDDS), implementd on an embedded DSP platform is presented here. Textural features of fabric image are extracted based on gray level co-occurrence matrix (GLCM). A sliding window technique is used for defect detection where window moves over the whole image computing a textural energy from the GLCM of the fabric image. The energy values are compared to a reference and the deviations beyond a threshold are reported as defects and also visually represented by a window. The implementation is carried out on a TI TMS320DM642 platform and programmed using code composer studio software. The real time output of this implementation was shown on a monitor.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 02:49:07 GMT" } ]
2014-10-03T00:00:00
[ [ "Raheja", "J. L.", "" ], [ "Ajay", "B.", "" ], [ "Chaudhary", "Ankit", "" ] ]
new_dataset
0.998625
1410.0443
Himanshu Tyagi
Masahito Hayashi, Himanshu Tyagi, Shun Watanabe
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing
This paper was presented at Allerton 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish an upper bound on the rate of codes for a wiretap channel with public feedback for a fixed probability of error and secrecy parameter. As a corollary, we obtain a strong converse for the capacity of a degraded wiretap channel with public feedback. Our converse proof is based on a reduction of active hypothesis testing for discriminating between two channels to coding for wiretap channel with feedback.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 02:56:19 GMT" } ]
2014-10-03T00:00:00
[ [ "Hayashi", "Masahito", "" ], [ "Tyagi", "Himanshu", "" ], [ "Watanabe", "Shun", "" ] ]
new_dataset
0.966038
1410.0471
Arto Klami
Zakria Hussain, Arto Klami, Jussi Kujala, Alex P. Leung, Kitsuchart Pasupa, Peter Auer, Samuel Kaski, Jorma Laaksonen and John Shawe-Taylor
PinView: Implicit Feedback in Content-Based Image Retrieval
12 pages
null
null
null
cs.IR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes PinView, a content-based image retrieval system that exploits implicit relevance feedback collected during a search session. PinView contains several novel methods to infer the intent of the user. From relevance feedback, such as eye movements or pointer clicks, and visual features of images, PinView learns a similarity metric between images which depends on the current interests of the user. It then retrieves images with a specialized online learning algorithm that balances the tradeoff between exploring new images and exploiting the already inferred interests of the user. We have integrated PinView to the content-based image retrieval system PicSOM, which enables applying PinView to real-world image databases. With the new algorithms PinView outperforms the original PicSOM, and in online experiments with real users the combination of implicit and explicit feedback gives the best results.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 08:05:19 GMT" } ]
2014-10-03T00:00:00
[ [ "Hussain", "Zakria", "" ], [ "Klami", "Arto", "" ], [ "Kujala", "Jussi", "" ], [ "Leung", "Alex P.", "" ], [ "Pasupa", "Kitsuchart", "" ], [ "Auer", "Peter", "" ], [ "Kaski", "Samuel", "" ], [ "Laaksonen", "Jorma", "" ], [ "Shawe-Taylor", "John", "" ] ]
new_dataset
0.998665
1410.0478
Subhadip Basu
Nibaran Das, Sandip Pramanik, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri
Recognition of Handwritten Bangla Basic Characters and Digits using Convex Hull based Feature Set
null
2009 International Conference on Artificial Intelligence and Pattern Recognition, At Orlando, Florida pp. 380-386
10.13140/2.1.3689.4089
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed over different bays attributes of the convex hull of a pattern, for effective recognition of isolated handwritten Bangla basic characters and digits. On experimentation with a database of 10000 samples, the maximum recognition rate of 76.86% is observed for handwritten Bangla characters. For Bangla numerals the maximum success rate of 99.45%. is achieved on a database of 12000 sample. The current work validates the usefulness of a new kind of feature set for recognition of handwritten Bangla basic characters and numerals.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 08:26:38 GMT" } ]
2014-10-03T00:00:00
[ [ "Das", "Nibaran", "" ], [ "Pramanik", "Sandip", "" ], [ "Basu", "Subhadip", "" ], [ "Saha", "Punam Kumar", "" ], [ "Sarkar", "Ram", "" ], [ "Kundu", "Mahantapas", "" ], [ "Nasipuri", "Mita", "" ] ]
new_dataset
0.990901
1410.0531
Fredrick Ishengoma
Fredrick Romanus Ishengoma
Online Social Networks and Terrorism 2.0 in Developing Countries
11 pages
International Journal of Computer Science and Network Solutions, Volume 1, Issue 4, December 2013
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advancement in technology has brought a new era in terrorism where Online Social Networks have become a major platform of communication with wide range of usage from message channeling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use social networks for information exchange, mobilizing and uniting and raising money for the victims. This paper critically analyses the specific usage of social networks in the times of terrorism attacks in developing countries.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 12:52:24 GMT" } ]
2014-10-03T00:00:00
[ [ "Ishengoma", "Fredrick Romanus", "" ] ]
new_dataset
0.998217
1410.0573
Thomas Nickson
Thomas Nickson, Igor Potapov
Broadcasting Automata and Patterns on Z^2
null
null
null
null
cs.FL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Broadcasting Automata model draws inspiration from a variety of sources such as Ad-Hoc radio networks, cellular automata, neighbourhood se- quences and nature, employing many of the same pattern forming methods that can be seen in the superposition of waves and resonance. Algorithms for broad- casting automata model are in the same vain as those encountered in distributed algorithms using a simple notion of waves, messages passed from automata to au- tomata throughout the topology, to construct computations. The waves generated by activating processes in a digital environment can be used for designing a vari- ety of wave algorithms. In this chapter we aim to study the geometrical shapes of informational waves on integer grid generated in broadcasting automata model as well as their potential use for metric approximation in a discrete space. An explo- ration of the ability to vary the broadcasting radius of each node leads to results of categorisations of digital discs, their form, composition, encodings and gener- ation. Results pertaining to the nodal patterns generated by arbitrary transmission radii on the plane are explored with a connection to broadcasting sequences and ap- proximation of discrete metrics of which results are given for the approximation of astroids, a previously unachievable concave metric, through a novel application of the aggregation of waves via a number of explored functions.
[ { "version": "v1", "created": "Thu, 2 Oct 2014 14:41:57 GMT" } ]
2014-10-03T00:00:00
[ [ "Nickson", "Thomas", "" ], [ "Potapov", "Igor", "" ] ]
new_dataset
0.997039
1404.1775
Erik Demaine
Erik D. Demaine and Martin L. Demaine
Fun with Fonts: Algorithmic Typography
14 pages, 12 figures. Revised paper with new glass cane font. Original version in Proceedings of the 7th International Conference on Fun with Algorithms
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past decade, we have designed six typefaces based on mathematical theorems and open problems, specifically computational geometry. These typefaces expose the general public in a unique way to intriguing results and hard problems in hinged dissections, geometric tours, origami design, computer-aided glass design, physical simulation, and protein folding. In particular, most of these typefaces include puzzle fonts, where reading the intended message requires solving a series of puzzles which illustrate the challenge of the underlying algorithmic problem.
[ { "version": "v1", "created": "Mon, 7 Apr 2014 13:03:52 GMT" }, { "version": "v2", "created": "Wed, 1 Oct 2014 02:45:46 GMT" } ]
2014-10-02T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ] ]
new_dataset
0.991064
1410.0190
Iqbal Hussain
Iqbal Hussain, Ming Xiao, and Lars K. Rasmussen
Rateless Codes for the Multi-Way Relay Channel
4 pages, 03 figures, Accepted in IEEE Wireless Communication Letters
IEEE Wireless Communication Letters 2014
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider distributed Luby transform (DLT) codes for efficient packet transmission in a multi-way relay network, where the links are modeled as erasure channels. Density evolution is applied for asymptotic performance analysis, and subsequently used in a linear-programming design framework for optimizing the degree distribution at the relay in terms of overhead. Moreover a buffer is introduced at the relay to enable efficient downlink transmission even if packets are lost during uplink transmission. Performance losses in terms of delay and/or erasure rates caused by link erasures during uplink transmission are thus alleviated. The proposed DLT codes provide significant improvements in overhead and decoded erasure rates. Numerical results for finite-length codes follow closely the asymptotic analysis. Our results demonstrate that the proposed buffer-based DLT codes outperform its counterparts for lossy uplink transmission.
[ { "version": "v1", "created": "Wed, 1 Oct 2014 11:54:32 GMT" } ]
2014-10-02T00:00:00
[ [ "Hussain", "Iqbal", "" ], [ "Xiao", "Ming", "" ], [ "Rasmussen", "Lars K.", "" ] ]
new_dataset
0.981234
1409.8372
Leon Abdillah
Leon Andretti Abdillah
Indonesian's presidential social media campaigns
Best Paper Award, L. A. Abdillah, "Indonesian's presidential social media campaigns," in Seminar Nasional Sistem Informasi Indonesia (SESINDO2014), ITS, Surabaya, 22 September, 2014
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media has been used for political campaigns of presidential candidates in a number of democratic countries, including Indonesia.The candidates for president and vice president have been following the latest trends in the virtual world by using social media such as: 1) Facebook, and 2) Twitter.The author's continuing research with a focus on the popularity of candidates for president and vice president of the Indonesian presidential election in July 9, 2014.The authors found that Facebook remains a social media most widely used in Indonesia for presidential campaigns. Prabowo secured the most number of fans on Facebook. While Joko Widodo secured the most number of followers on Twitter.Facebook users is dominated by the user in the age range 18-24 years, and most cities are using Facebook is Jakarta.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 03:07:26 GMT" } ]
2014-10-01T00:00:00
[ [ "Abdillah", "Leon Andretti", "" ] ]
new_dataset
0.999748
1409.8464
Friedrich Slivovsky
Friedrich Slivovsky and Stefan Szeider
Model Counting for Formulas of Bounded Clique-Width
Extended version of a paper published at ISAAC 2013
Proceedings of ISAAC 2013. Lecture Notes in Computer Science, vol. 8283, pp. 677-687, Springer, 2013
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that #SAT is polynomial-time tractable for classes of CNF formulas whose incidence graphs have bounded symmetric clique-width (or bounded clique-width, or bounded rank-width). This result strictly generalizes polynomial-time tractability results for classes of formulas with signed incidence graphs of bounded clique-width and classes of formulas with incidence graphs of bounded modular treewidth, which were the most general results of this kind known so far.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 10:27:07 GMT" } ]
2014-10-01T00:00:00
[ [ "Slivovsky", "Friedrich", "" ], [ "Szeider", "Stefan", "" ] ]
new_dataset
0.995044
1409.8489
Mark Scanlon
Mark Scanlon, Jason Farina, M-Tahar Kechadi
BitTorrent Sync: Network Investigation Methodology
9th International Conference on Availability, Reliability and Security (ARES 2014)
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles covering various invasion of privacy issues and data protection breaches in the media has caused many to review their online security practices with their personal information. To provide an alternative to cloud based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync to alpha testers in April 2013. BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.
[ { "version": "v1", "created": "Tue, 30 Sep 2014 11:21:30 GMT" } ]
2014-10-01T00:00:00
[ [ "Scanlon", "Mark", "" ], [ "Farina", "Jason", "" ], [ "Kechadi", "M-Tahar", "" ] ]
new_dataset
0.994525
1202.1229
Christopher Portmann
Christopher Portmann
Key recycling in authentication
17+3 pages. 11 figures. v3: Rewritten with AC instead of UC. Extended the main result to both synchronous and asynchronous networks. Matches published version up to layout and updated references. v2: updated introduction and references
IEEE Trans. Inf. Th., 60(7):4383-4396, 2014
10.1109/TIT.2014.2317312
null
cs.IT cs.CR math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\epsilon$-secure, if $\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.
[ { "version": "v1", "created": "Mon, 6 Feb 2012 18:09:38 GMT" }, { "version": "v2", "created": "Thu, 31 May 2012 14:26:48 GMT" }, { "version": "v3", "created": "Mon, 29 Sep 2014 13:15:35 GMT" } ]
2014-09-30T00:00:00
[ [ "Portmann", "Christopher", "" ] ]
new_dataset
0.995175
1408.5445
Heide Gluesing-Luerssen
Neville Fogarty and Heide Gluesing-Luerssen
A Circulant Approach to Skew-Constacyclic Codes
null
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce circulant matrices that capture the structure of a skew-polynomial ring F[x;\theta] modulo the left ideal generated by a polynomial of the type x^n-a. This allows us to develop an approach to skew-constacyclic codes based on such circulants. Properties of these circulants are derived, and in particular it is shown that the transpose of a certain circulant is a circulant again. This recovers the well-known result that the dual of a skew-constacyclic code is a constacyclic code again. Special attention is paid to the case where x^n-a is two-sided.
[ { "version": "v1", "created": "Fri, 22 Aug 2014 23:48:11 GMT" }, { "version": "v2", "created": "Fri, 26 Sep 2014 23:36:05 GMT" } ]
2014-09-30T00:00:00
[ [ "Fogarty", "Neville", "" ], [ "Gluesing-Luerssen", "Heide", "" ] ]
new_dataset
0.950484
1409.3554
Ankit Chaudhary
Ankit Chaudhary
Finger-Stylus for Non Touch-Enable Systems
JKSU Engineering Sciences, Elsevier, 2015
null
10.1016/j.jksues.2014.02.002
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since computer was invented, people are using many devices to interact with computer. Initially there were keyboard, mouse etc. but with the advancement of technology, new ways are being discovered that are quite usual and natural to the humans like stylus, touch-enable systems. In the current age of technology, user is expected to touch the machine interface to give input. Hand gesture is such a way to interact with machines where natural bare hand is used to communicate without touching machine interface. It gives a feeling to user that he is interacting in natural way to some human, not with traditional machines. This paper presents a technique where user needs not to touch the machine interface to draw on screen. Here hand finger draws shapes on monitor like stylus, without touching the monitor. This method can be used in many applications including games. The finger was used as an input device that acts like paint-brush or finger-stylus and is used to make shapes in front of the camera. Fingertip extraction and motion tracking were done in Matlab with real time constraints. This work is an early attempt to replace stylus with the natural finger without touching screen.
[ { "version": "v1", "created": "Sun, 7 Sep 2014 19:20:45 GMT" }, { "version": "v2", "created": "Sat, 27 Sep 2014 06:24:09 GMT" } ]
2014-09-30T00:00:00
[ [ "Chaudhary", "Ankit", "" ] ]
new_dataset
0.999467
1409.7853
Fatiha Merazka FM
Aziz Mouzali, Fatiha Merazka
Quantum correction with three codes
24 pages
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we provise an implementation of five, seven and nine-qubits error correcting codes on a classical computer using the quantum simulator Feynman program. We also compare the three codes by computing the fidelity when double errors occurs in a depolarizing channel. As triple errors and more are considered very unlikely, it has negligible effect on the next results
[ { "version": "v1", "created": "Sat, 27 Sep 2014 22:46:57 GMT" } ]
2014-09-30T00:00:00
[ [ "Mouzali", "Aziz", "" ], [ "Merazka", "Fatiha", "" ] ]
new_dataset
0.973616
1409.7963
Arjun Jain
Arjun Jain, Jonathan Tompson, Yann LeCun and Christoph Bregler
MoDeep: A Deep Learning Framework Using Motion Features for Human Pose Estimation
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a novel and efficient method for articulated human pose estimation in videos using a convolutional network architecture, which incorporates both color and motion features. We propose a new human body pose dataset, FLIC-motion, that extends the FLIC dataset with additional motion features. We apply our architecture to this dataset and report significantly better performance than current state-of-the-art pose detection systems.
[ { "version": "v1", "created": "Sun, 28 Sep 2014 21:32:15 GMT" } ]
2014-09-30T00:00:00
[ [ "Jain", "Arjun", "" ], [ "Tompson", "Jonathan", "" ], [ "LeCun", "Yann", "" ], [ "Bregler", "Christoph", "" ] ]
new_dataset
0.996253
1409.8008
Arjun Das
Arjun Das, Utpal Garain
CRF-based Named Entity Recognition @ICON 2013
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes performance of CRF based systems for Named Entity Recognition (NER) in Indian language as a part of ICON 2013 shared task. In this task we have considered a set of language independent features for all the languages. Only for English a language specific feature, i.e. capitalization, has been added. Next the use of gazetteer is explored for Bengali, Hindi and English. The gazetteers are built from Wikipedia and other sources. Test results show that the system achieves the highest F measure of 88% for English and the lowest F measure of 69% for both Tamil and Telugu. Note that for the least performing two languages no gazetteer was used. NER in Bengali and Hindi finds accuracy (F measure) of 87% and 79%, respectively.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 07:11:30 GMT" } ]
2014-09-30T00:00:00
[ [ "Das", "Arjun", "" ], [ "Garain", "Utpal", "" ] ]
new_dataset
0.998539
1409.8018
C. John Deepu
C.J. Deepu, X. Zhang, W.-S. Liew, D. L.T. Wong, Y. Lian
An ECG-on-Chip with 535-nW/Channel Integrated Lossless Data Compressor for Wireless Sensors
null
IEEE Journal of Solid-State Circuits, Nov 2014
10.1109/JSSC.2014.2349994
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a low-power ECG recording system-on-chip (SoC) with on-chip low-complexity lossless ECG compression for data reduction in wireless/ambulatory ECG sensor devices. The chip uses a linear slope predictor for data compression, and incorporates a novel low-complexity dynamic coding-packaging scheme to frame the prediction error into fixed-length 16-bit format. The proposed technique achieves an average compression ratio of 2.25x on MIT/BIH ECG database. Implemented in a standard 0.35 um process, the compressor uses 0.565K gates/channel occupying 0.4 mm2 for four channels, and consumes 535 nW/channel at 2.4 V for ECG sampled at 512 Hz. Small size and ultra-low power consumption makes the proposed technique suitable for wearable ECG sensor applications.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 08:06:04 GMT" } ]
2014-09-30T00:00:00
[ [ "Deepu", "C. J.", "" ], [ "Zhang", "X.", "" ], [ "Liew", "W. -S.", "" ], [ "Wong", "D. L. T.", "" ], [ "Lian", "Y.", "" ] ]
new_dataset
0.991779
1409.8020
Deepu John
C.J. Deepu, X.Y. Xu, X.D. Zou, L.B. Yao, and Y. Lian
An ECG-on-Chip for Wearable Cardiac Monitoring Devices
null
5th IEEE International Symposium on Electronic Design Test and Applications 2010
10.1109/DELTA.2010.43
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a highly integrated, low power chip solution for ECG signal processing in wearable devices. The chip contains an instrumentation amplifier with programmable gain, a band-pass filter, a 12-bit SAR ADC, a novel QRS detector, 8K on-chip SRAM, and relevant control circuitry and CPU interfaces. The analog front end circuits accurately senses and digitizes the raw ECG signal, which is then filtered to extract the QRS. The sampling frequency used is 256 Hz. ECG samples are buffered locally on an asynchronous FIFO and is read out using a faster clock, as and when it is required by the host CPU via an SPI interface. The chip was designed and implemented in 0.35um standard CMOS process. The analog core operates at 1V while the digital circuits and SRAM operate at 3.3V. The chip total core area is 5.74 mm^2 and consumes 9.6uW. Small size and low power consumption make this design suitable for usage in wearable heart monitoring devices.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 08:14:15 GMT" } ]
2014-09-30T00:00:00
[ [ "Deepu", "C. J.", "" ], [ "Xu", "X. Y.", "" ], [ "Zou", "X. D.", "" ], [ "Yao", "L. B.", "" ], [ "Lian", "Y.", "" ] ]
new_dataset
0.998588
1409.8152
Yelena Mejova
Yelena Mejova, Amy X. Zhang, Nicholas Diakopoulos, Carlos Castillo
Controversy and Sentiment in Online News
Computation+Journalism Symposium 2014
null
null
null
cs.CY cs.CL
http://creativecommons.org/licenses/by/3.0/
How do news sources tackle controversial issues? In this work, we take a data-driven approach to understand how controversy interplays with emotional expression and biased language in the news. We begin by introducing a new dataset of controversial and non-controversial terms collected using crowdsourcing. Then, focusing on 15 major U.S. news outlets, we compare millions of articles discussing controversial and non-controversial issues over a span of 7 months. We find that in general, when it comes to controversial issues, the use of negative affect and biased language is prevalent, while the use of strong emotion is tempered. We also observe many differences across news sources. Using these findings, we show that we can indicate to what extent an issue is controversial, by comparing it with other issues in terms of how they are portrayed across different media.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 15:23:50 GMT" } ]
2014-09-30T00:00:00
[ [ "Mejova", "Yelena", "" ], [ "Zhang", "Amy X.", "" ], [ "Diakopoulos", "Nicholas", "" ], [ "Castillo", "Carlos", "" ] ]
new_dataset
0.997496
1409.8174
Mark Scanlon
Jason Farina, Mark Scanlon, M-Tahar Kechadi
BitTorrent Sync: First Impressions and Digital Forensic Implications
Proc. of Digtial Forensics Research Workshop (DFRWS EU 2014)
Digital Investigation, Volume 11, Supplement 1, Pages S77-S86, (2014)
10.1016/j.diin.2014.03.010
null
cs.CR cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorrent Sync is seen as an alternative by many and has gathered over two million users by December 2013 (doubling since the previous month). The service is completely decentralised, offers much of the same synchronisation functionality of cloud powered services and utilises encryption for data transmission (and optionally for remote storage). The importance of understanding BitTorrent Sync and its resulting digital investigative implications for law enforcement and forensic investigators will be paramount to future investigations. This paper outlines the client application, its detected network traffic and identifies artefacts that may be of value as evidence for future digital investigations.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 16:20:57 GMT" } ]
2014-09-30T00:00:00
[ [ "Farina", "Jason", "" ], [ "Scanlon", "Mark", "" ], [ "Kechadi", "M-Tahar", "" ] ]
new_dataset
0.999562
1409.8220
Irene Marquez Corbella
Alain Couvreur (INRIA Saclay - Ile de France), Irene M\'arquez-Corbella (INRIA Saclay - Ile de France), Ruud Pellikaan
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
null
CIM-MS Series by Springer-Verlag (2014)
null
null
cs.IT cs.CR math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product. Wieschebrink treated the genus zero case a few years ago but his approach cannot be extent straightforwardly to other genera. We address this problem by introducing and using a new notion, which we call the t-closure of a code.
[ { "version": "v1", "created": "Mon, 29 Sep 2014 18:25:58 GMT" } ]
2014-09-30T00:00:00
[ [ "Couvreur", "Alain", "", "INRIA Saclay - Ile de France" ], [ "Márquez-Corbella", "Irene", "", "INRIA Saclay - Ile de France" ], [ "Pellikaan", "Ruud", "" ] ]
new_dataset
0.95295
1409.7408
Xishuo Liu
Xishuo Liu, Stark C. Draper
LP-decodable multipermutation codes
This work was supported by NSF and NSERC. To appear at the 2014 Allerton Conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new way of constructing and decoding multipermutation codes. Multipermutations are permutations of a multiset that may consist of duplicate entries. We first introduce a new class of matrices called multipermutation matrices. We characterize the convex hull of multipermutation matrices. Based on this characterization, we propose a new class of codes that we term LP-decodable multipermutation codes. Then, we derive two LP decoding algorithms. We first formulate an LP decoding problem for memoryless channels. We then derive an LP algorithm that minimizes the Chebyshev distance. Finally, we show a numerical example of our algorithm.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 20:09:01 GMT" } ]
2014-09-29T00:00:00
[ [ "Liu", "Xishuo", "" ], [ "Draper", "Stark C.", "" ] ]
new_dataset
0.993384
1409.7465
Ayaka Sakata
Rafah El-Khatib, Jean Barbier, Ayaka Sakata, and R\"udiger Urbanke
Error correcting codes and spatial coupling
Chapter of "Statistical Physics, Optimization, Inference, and Message-Passing Algorithms", Eds.: F. Krzakala, F. Ricci-Tersenghi, L. Zdeborov\`a, R. Zecchina, E. W. Tramel, L. F. Cugliandolo (Oxford University Press, to appear)
null
null
null
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These are notes from the lecture of R\"udiger Urbanke given at the autumn school "Statistical Physics, Optimization, Inference, and Message-Passing Algorithms", that took place in Les Houches, France from Monday September 30th, 2013, till Friday October 11th, 2013. The school was organized by Florent Krzakala from UPMC and ENS Paris, Federico Ricci-Tersenghi from La Sapienza Roma, Lenka Zdeborov\`a from CEA Saclay and CNRS, and Riccardo Zecchina from Politecnico Torino. The first three sections cover the basics of polar codes and low density parity check codes. In the last three sections, we see how the spatial coupling helps belief propagation decoding.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 03:13:03 GMT" } ]
2014-09-29T00:00:00
[ [ "El-Khatib", "Rafah", "" ], [ "Barbier", "Jean", "" ], [ "Sakata", "Ayaka", "" ], [ "Urbanke", "Rüdiger", "" ] ]
new_dataset
0.967989
1403.1180
Nikos Chondros
Nikos Chondros, Mema Roussopoulos
A distributed Integrity Catalog for digital repositories
null
null
null
null
cs.DB cs.DC cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital repositories, either digital preservation systems or archival systems, periodically check the integrity of stored objects to assure users of their correctness. To do so, prior solutions calculate integrity metadata and require the repository to store it alongside the actual data objects. This integrity metadata is essential for regularly verifying the correctness of the stored data objects. To safeguard and detect damage to this metadata, prior solutions rely on widely visible media, that is unaffiliated third parties, to store and provide back digests of the metadata to verify it is intact. However, they do not address recovery of the integrity metadata in case of damage or attack by an adversary. In essence, they do not preserve this metadata. We introduce IntegrityCatalog, a system that collects all integrity related metadata in a single component, and treats them as first class objects, managing both their integrity and their preservation. We introduce a treap-based persistent authenticated dictionary managing arbitrary length key/value pairs, which we use to store all integrity metadata, accessible simply by object name. Additionally, IntegrityCatalog is a distributed system that includes a network protocol that manages both corruption detection and preservation of this metadata, using administrator-selected network peers with two possible roles. Verifiers store and offer attestations on digests and have minimal storage requirements, while preservers efficiently synchronize a complete copy of the catalog to assist in recovery in case of a detected catalog compromise on the local system. We describe our prototype implementation of IntegrityCatalog, measure its performance empirically, and demonstrate its effectiveness in real-world situations, with worst measured throughput of approximately 1K insertions per second, and 2K verified search operations per second.
[ { "version": "v1", "created": "Tue, 4 Feb 2014 17:52:22 GMT" }, { "version": "v2", "created": "Thu, 25 Sep 2014 09:13:02 GMT" } ]
2014-09-26T00:00:00
[ [ "Chondros", "Nikos", "" ], [ "Roussopoulos", "Mema", "" ] ]
new_dataset
0.989909
1409.7247
David Karpuk
David Karpuk, Camilla Hollanti, Amaro Barreal
Node Repair for Distributed Storage Systems over Fading Channels
To appear in ISITA 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems and associated storage codes can efficiently store a large amount of data while ensuring that data is retrievable in case of node failure. The study of such systems, particularly the design of storage codes over finite fields, assumes that the physical channel through which the nodes communicate is error-free. This is not always the case, for example, in a wireless storage system. We study the probability that a subpacket is repaired incorrectly during node repair in a distributed storage system, in which the nodes communicate over an AWGN or Rayleigh fading channels. The asymptotic probability (as SNR increases) that a node is repaired incorrectly is shown to be completely determined by the repair locality of the DSS and the symbol error rate of the wireless channel. Lastly, we propose some design criteria for physical layer coding in this scenario, and use it to compute optimally rotated QAM constellations for use in wireless distributed storage systems.
[ { "version": "v1", "created": "Thu, 25 Sep 2014 13:06:52 GMT" } ]
2014-09-26T00:00:00
[ [ "Karpuk", "David", "" ], [ "Hollanti", "Camilla", "" ], [ "Barreal", "Amaro", "" ] ]
new_dataset
0.975363
1303.0210
Aysajan Abidin
Aysajan Abidin and Jan-{\AA}ke Larsson
Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key
15 pages
Quantum Information Processing, 13, 2155-2170, 2014
10.1007/s11128-013-0641-6
null
cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\epsilon$ and the authentication key has an $\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\epsilon+|\mT|\epsilon'$, where $|\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\mT|\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\epsilon+\epsilon'$. This proves that the scheme is ($\epsilon+\epsilon'$)-UC-secure, without using the composability theorem.
[ { "version": "v1", "created": "Fri, 1 Mar 2013 16:19:31 GMT" } ]
2014-09-25T00:00:00
[ [ "Abidin", "Aysajan", "" ], [ "Larsson", "Jan-Åke", "" ] ]
new_dataset
0.998942
1409.6856
Julia Padberg
Julia Padberg
Reconfigurable Decorated PT Nets with Inhibitor Arcs and Transition Priorities
null
null
null
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we deal with additional control structures for decorated PT Nets. The main contribution are inhibitor arcs and priorities. The first ensure that a marking can inhibit the firing of a transition. Inhibitor arcs force that the transition may only fire when the place is empty. an order of transitions restrict the firing, so that an transition may fire only if it has the highest priority of all enabled transitions. This concept is shown to be compatible with reconfigurable Petri nets.
[ { "version": "v1", "created": "Wed, 24 Sep 2014 08:30:53 GMT" } ]
2014-09-25T00:00:00
[ [ "Padberg", "Julia", "" ] ]
new_dataset
0.98031
1409.7060
Bernhard Rumpe
Bernhard Rumpe, Peter Scholz
A manager's view on large scale XP projects
4 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1409.6604
Third International Conference on Extreme Programming and Flexible Processes in Software Engineering, XP2002, May 26-30, Alghero, Italy, pg. 158-159, 2002
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XP is a code oriented, light weight software engineering methodology, suited merely for small sized teams who develop software that relies on vague or rapidly changing requirements. Being very code oriented, the discipline of systems engineering knows it as approach of incremental system change. In this contribution, we discuss the enhanced version of a concept on how to extend XP on large scale projects with hundreds of software engineers and programmers, respectively. A previous version was already presented in [1]. The basic idea is to apply the "hierarchical approach", a management principle of reorganizing companies, as well as well known moderation principles to XP project organization. We show similarities between software engineering methods and company reorganization processes and discuss how the elements of the hierarchical approach can improve XP. We provide guidelines on how to scale up XP to very large projects e.g. those common in telecommunication industry and IT technology consultancy firms by using moderation techniques.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 17:51:10 GMT" } ]
2014-09-25T00:00:00
[ [ "Rumpe", "Bernhard", "" ], [ "Scholz", "Peter", "" ] ]
new_dataset
0.961754
1404.5668
Pedro Alejandro Ortega
Pedro A. Ortega, Daniel D. Lee
An Adversarial Interpretation of Information-Theoretic Bounded Rationality
7 pages, 4 figures. Proceedings of AAAI-14
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, there has been a growing interest in modeling planning with information constraints. Accordingly, an agent maximizes a regularized expected utility known as the free energy, where the regularizer is given by the information divergence from a prior to a posterior policy. While this approach can be justified in various ways, including from statistical mechanics and information theory, it is still unclear how it relates to decision-making against adversarial environments. This connection has previously been suggested in work relating the free energy to risk-sensitive control and to extensive form games. Here, we show that a single-agent free energy optimization is equivalent to a game between the agent and an imaginary adversary. The adversary can, by paying an exponential penalty, generate costs that diminish the decision maker's payoffs. It turns out that the optimal strategy of the adversary consists in choosing costs so as to render the decision maker indifferent among its choices, which is a definining property of a Nash equilibrium, thus tightening the connection between free energy optimization and game theory.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 23:21:14 GMT" } ]
2014-09-24T00:00:00
[ [ "Ortega", "Pedro A.", "" ], [ "Lee", "Daniel D.", "" ] ]
new_dataset
0.964788
1404.5709
Mohammad Shahedul Karim
Mohammad S. Karim, Parastoo Sadeghi, Neda Aboutorab and Sameh Sorour
In Order Packet Delivery in Instantly Decodable Network Coded Systems over Wireless Broadcast
Submitted
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study in-order packet delivery in instantly decodable network coded systems for wireless broadcast networks. We are interested in applications, in which the successful delivery of a packet depends on the correct reception of this packet and all its preceding packets. We formulate the problem of minimizing the number of undelivered packets to all receivers over all transmissions until completion as a stochastic shortest path (SSP) problem. Although finding the optimal packet selection policy using SSP is computationally complex, it allows us to systematically exploit the problem structure and draw guidelines for efficient packet selection policies that can reduce the number of undelivered packets to all receivers over all transmissions until completion. According to these guidelines, we design a simple heuristic packet selection algorithm. Simulation results illustrate that our proposed algorithm provides quicker packet delivery to the receivers compared to the existing algorithms in the literature.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 05:45:28 GMT" }, { "version": "v2", "created": "Sun, 21 Sep 2014 09:55:30 GMT" }, { "version": "v3", "created": "Tue, 23 Sep 2014 02:46:07 GMT" } ]
2014-09-24T00:00:00
[ [ "Karim", "Mohammad S.", "" ], [ "Sadeghi", "Parastoo", "" ], [ "Aboutorab", "Neda", "" ], [ "Sorour", "Sameh", "" ] ]
new_dataset
0.963624
1409.6382
Rolando Gomez
Rolando G\'omez Macedo and Felipe Zald\'ivar
On the Category of Group Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the category of group codes, that generalizes the category of linear codes over a finite field, and with the generalized notions of direct sums and ndecomposable group codes, we prove that every MDS non trivial code, every perfect non trivial code, and every constant weight nondegenerate group code are indecomposable. We prove that every group code is a direct sum of indecomposable group codes, and using this result we obtain the automorphism groups of any group code in terms of its decomposition in indecomposable components. We conclude with the determination of the structure of decomposable cyclic group codes.
[ { "version": "v1", "created": "Tue, 23 Sep 2014 01:18:57 GMT" } ]
2014-09-24T00:00:00
[ [ "Macedo", "Rolando Gómez", "" ], [ "Zaldívar", "Felipe", "" ] ]
new_dataset
0.973597
1409.6584
Bernhard Rumpe
Fred W. Rauskolb, Kai Berger, Christian Lipski, Marcus Magnor, Karsten Cornelsen, Jan Effertz, Thomas Form, Fabian Graefe, Sebastian Ohl, Walter Schumacher, J\"orn Marten Wille, Peter Hecker, Tobias Nothdurft, Michael Doering, Kai Homeier, Johannes Morgenroth, Lars Wolf, Christian Basarke, Christian Berger, Tim G\"ulke, Felix Klose, Bernhard Rumpe
Caroline: An Autonomously Driving Vehicle for Urban Environments
68 pages, 7 figures
M. Buehler, K. Iagnemma, S. Singh (Eds.). The DARPA Urban Challenge - Autonomous Vehicles in City Traffic. Springer Tracts in Advanced Robotics, Volume 56, pp. 441-508, 2010
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 2007 DARPA Urban Challenge afforded the golden opportunity for the Technische Universit\"at Braunschweig to demonstrate its abilities to develop an autonomously driving vehicle to compete with the world's best competitors. After several stages of qualification, our team CarOLO qualified early for the DARPA Urban Challenge Final Event and was among only eleven teams from initially 89 competitors to compete in the final. We had the ability to work together in a large group of experts, each contributing his expertise in his discipline, and significant organisational, financial and technical support by local sponsors who helped us to become the best non-US team. In this report, we describe the 2007 DARPA Urban Challenge, our contribution "Caroline", the technology and algorithms along with her performance in the DARPA Urban Challenge Final Event on November 3, 2007.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 11:57:55 GMT" } ]
2014-09-24T00:00:00
[ [ "Rauskolb", "Fred W.", "" ], [ "Berger", "Kai", "" ], [ "Lipski", "Christian", "" ], [ "Magnor", "Marcus", "" ], [ "Cornelsen", "Karsten", "" ], [ "Effertz", "Jan", "" ], [ "Form", "Thomas", "" ], [ "Graefe", "Fabian", "" ], [ "Ohl", "Sebastian", "" ], [ "Schumacher", "Walter", "" ], [ "Wille", "Jörn Marten", "" ], [ "Hecker", "Peter", "" ], [ "Nothdurft", "Tobias", "" ], [ "Doering", "Michael", "" ], [ "Homeier", "Kai", "" ], [ "Morgenroth", "Johannes", "" ], [ "Wolf", "Lars", "" ], [ "Basarke", "Christian", "" ], [ "Berger", "Christian", "" ], [ "Gülke", "Tim", "" ], [ "Klose", "Felix", "" ], [ "Rumpe", "Bernhard", "" ] ]
new_dataset
0.999054
1409.6596
Bernhard Rumpe
Marcus Fontoura, Wolfgang Pree, Bernhard Rumpe
The WebShop E-Commerce Framework
6 pages, 15 figures
International Conference on Internet Computing CSREA press, 2001
null
null
cs.SE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an e-commerce framework called WebShop, which was developed by the authors for the purpose of demonstrating the use of UML and the UML-F in the domain of Web applications. Thus, the WebShop is not regarded as a full-fledged system out of which real Web stores can be derived. For example, the framework in the presented version does not encounter security features. However, it presents the most important variation points related to online catalogs. The UML-F Web site http://www.UML-F.net provides the Java source files and some sample adaptations of WebShop.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 18:09:12 GMT" } ]
2014-09-24T00:00:00
[ [ "Fontoura", "Marcus", "" ], [ "Pree", "Wolfgang", "" ], [ "Rumpe", "Bernhard", "" ] ]
new_dataset
0.998444
1409.6598
Bernhard Rumpe
Steve Cook, Anneke Kleppe, Richard Mitchell, Bernhard Rumpe, Jos Warmer, Alan Wills
The Amsterdam Manifesto on OCL
35 pages, 4 figures
Object Modeling with the OCL, pp. 115-149 LNCS 2263, Springer Verlag, 2002
10.1007/3-540-45669-4_7
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In November 1998 the authors participated in a two-day workshop on the Object Constraint Language (OCL) in Amsterdam. The focus was to clarify issues about the semantics and the use of OCL, and to discuss useful and necessary extensions of OCL. Various topics have been raised and clarified. This manifesto contains the results of that workshop and the following work on these topics. Overview of OCL.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 17:56:16 GMT" } ]
2014-09-24T00:00:00
[ [ "Cook", "Steve", "" ], [ "Kleppe", "Anneke", "" ], [ "Mitchell", "Richard", "" ], [ "Rumpe", "Bernhard", "" ], [ "Warmer", "Jos", "" ], [ "Wills", "Alan", "" ] ]
new_dataset
0.999361
1409.6601
Bernhard Rumpe
Ulrike Thomas, Gerd Hirzinger, Bernhard Rumpe, Christoph Schulze, Andreas Wortmann
A New Skill Based Robot Programming Language Using UML/P Statecharts
6 pages, 10 figures, Proceedings of the 2013 IEEE International Conference on Robotics and Automation (ICRA), Karlsruhe, Germany
null
10.1109/ICRA.2013.6630615
null
cs.SE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the new robot programming language LightRocks (Light Weight Robot Coding for Skills), a domain specific language (DSL) for robot programming. The language offers three different level of abstraction for robot programming. On lowest level skills are coded by domain experts. On a more abstract level these skills are supposed to be combined by shop floor workers or technicians to define tasks. The language is designed to allow as much flexibility as necessary on the lowest level of abstraction and is kept as simple as possible with the more abstract layers. A Statechart like model is used to describe the different levels of detail. For this we apply the UML/P and the language workbench MontiCore. To this end we are able to generate code while hiding controller specific implementation details. In addition the development in LightRocks is supported by a generic graphical editor implemented as an Eclipse plugin.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 17:48:53 GMT" } ]
2014-09-24T00:00:00
[ [ "Thomas", "Ulrike", "" ], [ "Hirzinger", "Gerd", "" ], [ "Rumpe", "Bernhard", "" ], [ "Schulze", "Christoph", "" ], [ "Wortmann", "Andreas", "" ] ]
new_dataset
0.999028
1409.6606
Bernhard Rumpe
Stefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar W\"atjen
A Security Architecture for Mobile Wireless Sensor Networks
12 pages, 1 figures
Security in Ad-hoc and Sensor Networks: First European Workshop (ESAS 2004) Heidelberg, Germany, August 6, 2004, Revised Selected Papers. LNCS 3313, pp 166-177, Springer-Verlag Berlin Heidelberg 2005
10.1007/978-3-540-30496-8_14
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks increasingly become viable solutions to many challenging problems and will successively be deployed in many areas in the future. However, deploying new technology without security in mind has often proved to be unreasonably dangerous. We propose a security architecture for self-organizing mobile wireless sensor networks that prevents many attacks these networks are exposed to. Furthermore, it limits the security impact of some attacks that cannot be prevented. We analyse our security architecure and show that it provides the desired security aspects while still being a lightweight solution and thus being applicable for self-organizing mobile wireless sensor networks.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 17:25:18 GMT" } ]
2014-09-24T00:00:00
[ [ "Schmidt", "Stefan", "" ], [ "Krahn", "Holger", "" ], [ "Fischer", "Stefan", "" ], [ "Wätjen", "Dietmar", "" ] ]
new_dataset
0.973226
1304.5220
Marco Mondelli
Marco Mondelli, S. Hamed Hassani, R\"udiger Urbanke
Scaling Exponent of List Decoders with Applications to Polar Codes
14 pages, submitted to IEEE Trans. Inform. Theory and presented in part to ITW'13
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the significant performance gains which polar codes experience under successive cancellation list decoding, their scaling exponent is studied as a function of the list size. In particular, the error probability is fixed and the trade-off between block length and back-off from capacity is analyzed. A lower bound is provided on the error probability under $\rm MAP$ decoding with list size $L$ for any binary-input memoryless output-symmetric channel and for any class of linear codes such that their minimum distance is unbounded as the block length grows large. Then, it is shown that under $\rm MAP$ decoding, although the introduction of a list can significantly improve the involved constants, the scaling exponent itself, i.e., the speed at which capacity is approached, stays unaffected for any finite list size. In particular, this result applies to polar codes, since their minimum distance tends to infinity as the block length increases. A similar result is proved for genie-aided successive cancellation decoding when transmission takes place over the binary erasure channel, namely, the scaling exponent remains constant for any fixed number of helps from the genie. Note that since genie-aided successive cancellation decoding might be strictly worse than successive cancellation list decoding, the problem of establishing the scaling exponent of the latter remains open.
[ { "version": "v1", "created": "Thu, 18 Apr 2013 18:47:39 GMT" }, { "version": "v2", "created": "Sun, 21 Apr 2013 18:05:46 GMT" }, { "version": "v3", "created": "Fri, 26 Jul 2013 18:33:23 GMT" }, { "version": "v4", "created": "Mon, 22 Sep 2014 08:40:00 GMT" } ]
2014-09-23T00:00:00
[ [ "Mondelli", "Marco", "" ], [ "Hassani", "S. Hamed", "" ], [ "Urbanke", "Rüdiger", "" ] ]
new_dataset
0.972312
1311.2749
Zdenek Dvorak
Zdenek Dvorak and Matthias Mnich
Large Independent Sets in Triangle-Free Planar Graphs
14 pages, 1 figure
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Every triangle-free planar graph on n vertices has an independent set of size at least (n+1)/3, and this lower bound is tight. We give an algorithm that, given a triangle-free planar graph G on n vertices and an integer k>=0, decides whether G has an independent set of size at least (n+k)/3, in time 2^{O(sqrt{k})}n. Thus, the problem is fixed-parameter tractable when parameterized by k. Furthermore, as a corollary of the result used to prove the correctness of the algorithm, we show that there exists epsilon>0 such that every planar graph of girth at least five on n vertices has an independent set of size at least n/(3-epsilon).
[ { "version": "v1", "created": "Tue, 12 Nov 2013 12:19:45 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2014 14:20:03 GMT" } ]
2014-09-23T00:00:00
[ [ "Dvorak", "Zdenek", "" ], [ "Mnich", "Matthias", "" ] ]
new_dataset
0.997236
1406.7036
Bo Yuan
Bo Yuan, Keshab K. Parhi
Low-Latency Successive-Cancellation List Decoders for Polar Codes with Multi-bit Decision
submitted to IEEE TVLSI in Feb 2014, accepted in Sep. 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes, as the first provable capacity-achieving error-correcting codes, have received much attention in recent years. However, the decoding performance of polar codes with traditional successive-cancellation (SC) algorithm cannot match that of the low-density parity-check (LDPC) or turbo codes. Because SC list (SCL) decoding algorithm can significantly improve the error-correcting performance of polar codes, design of SCL decoders is important for polar codes to be deployed in practical applications. However, because the prior latency reduction approaches for SC decoders are not applicable for SCL decoders, these list decoders suffer from the long latency bottleneck. In this paper, we propose a multi-bit-decision approach that can significantly reduce latency of SCL decoders. First, we present a reformulated SCL algorithm that can perform intermediate decoding of 2 bits together. The proposed approach, referred as 2-bit reformulated SCL (2b-rSCL) algorithm, can reduce the latency of SCL decoder from (3n-2) to (2n-2) clock cycles without any performance loss. Then, we extend the idea of 2-bit-decision to general case, and propose a general decoding scheme that can perform intermediate decoding of any 2K bits simultaneously. This general approach, referred as 2K-bit reformulated SCL (2Kb-rSCL) algorithm, can reduce the overall decoding latency to as short as n/2K-2-2 cycles. Furthermore, based on the proposed algorithms, VLSI architectures for 2b-rSCL and 4b-rSCL decoders are synthesized. Compared with a prior SCL decoder, the proposed (1024, 512) 2b-rSCL and 4b-rSCL decoders can achieve 21% and 60% reduction in latency, 1.66 times and 2.77 times increase in coded throughput with list size 2, and 2.11 times and 3.23 times increase in coded throughput with list size 4, respectively.
[ { "version": "v1", "created": "Thu, 26 Jun 2014 21:41:13 GMT" }, { "version": "v2", "created": "Sat, 20 Sep 2014 07:14:54 GMT" } ]
2014-09-23T00:00:00
[ [ "Yuan", "Bo", "" ], [ "Parhi", "Keshab K.", "" ] ]
new_dataset
0.999319
1409.5816
Martin Derka
Therese Biedl, Martin Derka
1-String CZ-Representation of Planar Graphs
null
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove that every planar 4-connected graph has a CZ-representation---a string representation using paths in a rectangular grid that contain at most one vertical segment. Furthermore, two paths representing vertices $u,v$ intersect precisely once whenever there is an edge between $u$ and $v$. The required size of the grid is $n \times 2n$.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 21:01:03 GMT" } ]
2014-09-23T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Derka", "Martin", "" ] ]
new_dataset
0.992465
1409.5932
Rodrigo de Lamare
L. Zhang, Y. Cai, R. C. de Lamare, M. Zhao
Robust Multi-Branch Tomlinson-Harashima Precoding in Cooperative MIMO Relay Systems
14 pages, 9 figures, IEEE Transactions on Communications, 2014
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes the design of robust transceivers with Tomlinson-Harashima precoding (THP) for multiple-input multiple-output (MIMO) relay systems with amplify-and-forward (AF) protocols based on a multi-branch (MB) strategy. The MB strategy employs successive interference cancellation (SIC) on several parallel branches which are equipped with different ordering patterns so that each branch produces transmit signals by exploiting a certain ordering pattern. For each parallel branch, the proposed robust nonlinear transceiver design consists of THP at the source along with a linear precoder at the relay and a linear minimum-mean-squared-error (MMSE) receiver at the destination. By taking the channel uncertainties into account, the source and relay precoders are jointly optimised to minimise the mean-squared-error (MSE). We then employ a diagonalization method along with some attributes of matrix-monotone functions to convert the optimization problem with matrix variables into an optimization problem with scalar variables. We resort to an iterative method to obtain the solution for the relay and the source precoders via Karush-Kuhn-Tucker (KKT) conditions. An appropriate selection rule is developed to choose the nonlinear transceiver corresponding to the best branch for data transmission. Simulation results demonstrate that the proposed MB-THP scheme is capable of alleviating the effects of channel state information (CSI) errors and improving the robustness of the system.
[ { "version": "v1", "created": "Sun, 21 Sep 2014 02:38:02 GMT" } ]
2014-09-23T00:00:00
[ [ "Zhang", "L.", "" ], [ "Cai", "Y.", "" ], [ "de Lamare", "R. C.", "" ], [ "Zhao", "M.", "" ] ]
new_dataset
0.998503
1409.6142
Matthieu Picantin
Ines Klimann, Matthieu Picantin and Dmytro Savchuk
A connected 3-state reversible Mealy automaton cannot generate an infinite Burnside group
12 pages, 4 figures
null
null
null
cs.FL math.GR
http://creativecommons.org/licenses/publicdomain/
The class of automaton groups is a rich source of the simplest examples of infinite Burnside groups. However, there are some classes of automata that do not contain such examples. For instance, all infinite Burnside automaton groups in the literature are generated by non reversible Mealy automata and it was recently shown that 2-state invertible-reversible Mealy automata cannot generate infinite Burnside groups. Here we extend this result to connected 3-state invertible-reversible Mealy automata, using new original techniques. The results provide the first uniform method to construct elements of infinite order in each infinite group in this class.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 11:15:35 GMT" } ]
2014-09-23T00:00:00
[ [ "Klimann", "Ines", "" ], [ "Picantin", "Matthieu", "" ], [ "Savchuk", "Dmytro", "" ] ]
new_dataset
0.974349
1409.6281
George Kesidis
George Kesidis, Douglas Mercer, Christopher Griffin, Serge Fdida
Roaming charges for customers of cellular-wireless entrant and incumbent providers
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a simple two-player game involving a large incumbent and small entrant into a cellular wireless access provider marketplace. The entrant's customers must pay roaming charges. We assume that the roaming charges are regulated, because if they are dictated by the incumbent then they could be set so high so as to be a barrier to entry in the marketplace. The game is studied at its Nash equilibrium. A roaming charge is identified that is arguably fair in the sense that revenues for the access providers are proportionate to their infrastructure costs.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 19:06:19 GMT" } ]
2014-09-23T00:00:00
[ [ "Kesidis", "George", "" ], [ "Mercer", "Douglas", "" ], [ "Griffin", "Christopher", "" ], [ "Fdida", "Serge", "" ] ]
new_dataset
0.989417
1409.5595
E Canessa
M. Rainone, C. Fonda and E. Canessa
IMAGINARY Math Exhibition using Low-cost 3D Printers
null
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/3.0/
We have made an attempt to reproduce 17 objects of the IMAGINARY Open Mathematics Exhibition (www.imaginary.org) using low-cost, desktop 3D printers. The IMAGINARY open math is an international project by the Mathematisches Forschungsinstitut Oberwolfach in Germany and includes galleries of volumetric objects that are unique, have aesthetic appeal and mathematical meaning. We illustrate here the printing of these diverse learning materials using new 3D affordable printing technologies based on Fused Deposition Modelling (FDM) and the use of biodegradable plastic PLA. The final goal is to support museums, schools and higher education institutions in countries with lower scientific infrastructure.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 10:50:32 GMT" } ]
2014-09-22T00:00:00
[ [ "Rainone", "M.", "" ], [ "Fonda", "C.", "" ], [ "Canessa", "E.", "" ] ]
new_dataset
0.997852
1409.5744
Ahmed Badawy
Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek El Fouly, Amr Mohamed
A Simple AoA Estimation Scheme
null
null
null
null
cs.SY cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an intuitive, simple and hardware friendly, yet surprisingly novel and efficient, received signal's angle of arrival (AoA) estimation scheme. Our intuitive, two-phases cross-correlation based scheme relies on a switched beam antenna array, which is used to collect an omni-directional signal using few elements of the antenna array in the first phase. In the second phase, the scheme switches the main beam of the antenna array to scan the angular region of interest. The collected signal from each beam (direction or angle) is cross correlated with the omni-directional signal. The cross-correlation coefficient will be the highest at the correct AoA and relatively negligible elsewhere. The proposed scheme simplicity stems from its low computational complexity (only cross-correlation and comparison operations are required) and its independence of the transmitted signal structure (does not require information about the transmitted signal). The proposed scheme requires a receiver with switched beam antenna array, which can be attached to a single radio frequency chain through phase shifters, hence, its hardware friendliness. The high efficiency of our system can be observed by comparing its performance with the literature's best performing MUSIC algorithm. The comparison demonstrates that our scheme outperforms the MUSIC algorithm, specially at low SNR levels. Moreover, the number of sources that can be detected using our scheme is bound by the number of switched beams, rather than the number of antenna elements in the case of the MUSIC algorithm.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 18:14:34 GMT" } ]
2014-09-22T00:00:00
[ [ "Badawy", "Ahmed", "" ], [ "Khattab", "Tamer", "" ], [ "Trinchero", "Daniele", "" ], [ "Fouly", "Tarek El", "" ], [ "Mohamed", "Amr", "" ] ]
new_dataset
0.999508
1404.6974
Claudia Schon
Ulrich Furbach and Claudia Schon
Deontic Logic for Human Reasoning
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deontic logic is shown to be applicable for modelling human reasoning. For this the Wason selection task and the suppression task are discussed in detail. Different versions of modelling norms with deontic logic are introduced and in the case of the Wason selection task it is demonstrated how differences in the performance of humans in the abstract and in the social contract case can be explained. Furthermore it is shown that an automated theorem prover can be used as a reasoning tool for deontic logic.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 13:34:20 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2014 08:46:31 GMT" } ]
2014-09-19T00:00:00
[ [ "Furbach", "Ulrich", "" ], [ "Schon", "Claudia", "" ] ]
new_dataset
0.9996
1409.4476
Francisco Mota
Francisco Mota
Projective Root-Locus: An Extension of Root-Locus Plot to the Projective Plane
13 pages, 8 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an extension of the classical Root-Locus (RL) method where the points are calculated in the real projective plane instead of the conventional affine real plane; we denominate this extension of the Root-Locus as "Projective Root-Locus (PjRL)". To plot the PjRL we use the concept of "Gnomonic Projection" in order to have a representation of the projective real plane as a simi-sphere of radius one in ${\mathbb R}^3$. We will see that the PjRL reduces to the RL in the affine $XY$ plane, but also we can plot the RL onto another affine component of the projective plane, like $ZY$ affine plane for instance, to obtain what we denominate complementary plots of the conventional RL. We also show that with the PjRL the points at infinity of the RL can be computed as solutions of a set algebraic equations.
[ { "version": "v1", "created": "Tue, 16 Sep 2014 00:53:37 GMT" }, { "version": "v2", "created": "Thu, 18 Sep 2014 03:36:41 GMT" } ]
2014-09-19T00:00:00
[ [ "Mota", "Francisco", "" ] ]
new_dataset
0.972271
1409.5257
Stefano Salsano
Stefano Salsano, Nicola Blefari-Melazzi, Francesco Lo Presti, Giuseppe Siracusano, Pier Luigi Ventre
Generalized Virtual Networking: an enabler for Service Centric Networking and Network Function Virtualization
null
Networks 2014, 16th International Telecommunications Network Strategy and Planning Symposium, 17-19 September 2014, Funchal, Portugal
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce the Generalized Virtual Networking (GVN) concept. GVN provides a framework to influence the routing of packets based on service level information that is carried in the packets. It is based on a protocol header inserted between the Network and Transport layers, therefore it can be seen as a layer 3.5 solution. Technically, GVN is proposed as a new transport layer protocol in the TCP/IP protocol suite. An IP router that is not GVN capable will simply process the IP destination address as usual. Similar concepts have been proposed in other works, and referred to as Service Oriented Networking, Service Centric Networking, Application Delivery Networking, but they are now generalized in the proposed GVN framework. In this respect, the GVN header is a generic container that can be adapted to serve the needs of arbitrary service level routing solutions. The GVN header can be managed by GVN capable end-hosts and applications or can be pushed/popped at the edge of a GVN capable network (like a VLAN tag). In this position paper, we show that Generalized Virtual Networking is a powerful enabler for SCN (Service Centric Networking) and NFV (Network Function Virtualization) and how it couples with the SDN (Software Defined Networking) paradigm.
[ { "version": "v1", "created": "Thu, 18 Sep 2014 11:02:48 GMT" } ]
2014-09-19T00:00:00
[ [ "Salsano", "Stefano", "" ], [ "Blefari-Melazzi", "Nicola", "" ], [ "Presti", "Francesco Lo", "" ], [ "Siracusano", "Giuseppe", "" ], [ "Ventre", "Pier Luigi", "" ] ]
new_dataset
0.999344
1409.5327
Neil Walton
N.S. Walton
Store-Forward and its implications for Proportional Scheduling
null
null
null
null
cs.NI cs.PF math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Proportional Scheduler was recently proposed as a scheduling algorithm for multi-hop switch networks. For these networks, the BackPressure scheduler is the classical benchmark. For networks with fixed routing, the Proportional Scheduler is maximum stable, myopic and, furthermore, will alleviate certain scaling issued found in BackPressure for large networks. Nonetheless, the equilibrium and delay properties of the Proportional Scheduler has not been fully characterized. In this article, we postulate on the equilibrium behaviour of the Proportional Scheduler though the analysis of an analogous rule called the Store-Forward allocation. It has been shown that Store-Forward has asymptotically allocates according to the Proportional Scheduler. Further, for Store-Forward networks, numerous equilibrium quantities are explicitly calculable. For FIFO networks under Store-Forward, we calculate the policies stationary distribution and end-to-end route delay. We discuss network topologies when the stationary distribution is product-form, a phenomenon which we call \emph{product form resource pooling}. We extend this product form notion to independent set scheduling on perfect graphs, where we show that non-neighbouring queues are statistically independent. Finally, we analyse the large deviations behaviour of the equilibrium distribution of Store-Forward networks in order to construct Lyapunov functions for FIFO switch networks.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 19:45:20 GMT" } ]
2014-09-19T00:00:00
[ [ "Walton", "N. S.", "" ] ]
new_dataset
0.988989
1406.3216
Giuseppe Cascavilla
Andrea Burattin, Giuseppe Cascavilla, Mauro Conti
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks
16 pages, 6 figures
null
null
null
cs.SI cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online Social Networks are becoming the most important "places" where people share information about their lives. With the increasing concern that users have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think. In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In particular, we show how easy it is to retrieve information that a user might have set as (and hence thought as) "private". As a case study, we focus on retrieving the list of friends for users that did set this information as "hidden" (to non-friends). We propose four different strategies to achieve this goal, and we evaluate them. The results of our thorough experiments show the feasibility of our strategies as well as their effectiveness: our approach is able to retrieve a significant percentage of the names of the "hidden" friends: i.e., some 25% on average, and more than 70% for some users.
[ { "version": "v1", "created": "Thu, 12 Jun 2014 12:34:52 GMT" }, { "version": "v2", "created": "Wed, 17 Sep 2014 15:35:29 GMT" } ]
2014-09-18T00:00:00
[ [ "Burattin", "Andrea", "" ], [ "Cascavilla", "Giuseppe", "" ], [ "Conti", "Mauro", "" ] ]
new_dataset
0.974123
1409.4958
Yi Wang phd
Yi Wang
Tensity Research Based on the Information of Eye Movement
null
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User's mental state is concerned gradually, during the interaction course of human robot. As the measurement and identification method of psychological state, tension, has certain practical significance role. At presents there is no suitable method of measuring the tension. Firstly, sum up some availability of eye movement index. And then parameters extraction on eye movement characteristics of normal illumination is studied, including the location of the face, eyes location, access to the pupil diameter, the eye pupil center characteristic parameters. And with the judgment of the tension in eye images, extract exact information of gaze direction. Finally, through the experiment to prove the proposed method is effective.
[ { "version": "v1", "created": "Wed, 17 Sep 2014 11:52:36 GMT" } ]
2014-09-18T00:00:00
[ [ "Wang", "Yi", "" ] ]
new_dataset
0.952418
1409.5054
Ayad Ghany Ismaeel
Bnar Faisal Daham, Ayad Ghany Ismaeel, Suha A. Abdual-Rahman
TCP Performance for Kurd Messenger Application Using Bio-computing
15 pages, 11 figures, 6 Tabels. arXiv admin note: substantial text overlap with arXiv:1206.0893
Zanco, Journal of Pure and Applied Sciences, Salahaddin University, Hawler, IRAQ, Vol. 21 No. 2, 2009, Pages 123-139
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work was conducted to design, implement, and evaluate a new model of measuring Transmission Control Protocol (TCP) performance of real time network. The proposed model Biological Kurd Messenger (BIOKM) has two main goals: First is to run the model efficiently, second is to obtain high TCP performance via real time network using bio-computing technique, especially molecular calculation because it provides wisdom results and it can exploit all facilities of phylogentic analysis. To measure TCP performance two protocols were selected Internet Relay Chat Daemon (IRCD) and File Transfer Protocol (FTP), the BIOKM model consists of two applications Kurd Messenger Server Side (KMSS) and Kurd Messenger Client Side (KMCS) written in Java programming language by implementing algorithms of BIOKM Server and Client application. The paper also includes the implementation of hybridized model algorithm based on Neighbor-Joining (NJ) method to measure TCP performance, then implementing algorithm of Little law (steady state) for single server queue as a comparison with bio-computing algorithm. The results obtained by using bio-computing and little law techniques show very good performance and the two techniques result are very close to each other this is because of local implementation. The main tools which have been used in this work can be divided into software and hardware tools. Keywords: Biological Kurd Messenger (BIOKM), Kurd Messenger Phylogenetic tree, Hybridized Model, Little Law, TCP Performance.
[ { "version": "v1", "created": "Tue, 16 Sep 2014 09:26:27 GMT" } ]
2014-09-18T00:00:00
[ [ "Daham", "Bnar Faisal", "" ], [ "Ismaeel", "Ayad Ghany", "" ], [ "Abdual-Rahman", "Suha A.", "" ] ]
new_dataset
0.993359
1403.2527
Runwei Zhang
Runwei Zhang, Francois Ingelrest, Guillermo Barrenetxea, Patrick Thiran, Martin Vetterli
The Beauty of the Commons: Optimal Load Sharing by Base Station Hopping in Wireless Sensor Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless sensor networks (WSNs), the base station (BS) is a critical sensor node whose failure causes severe data losses. Deploying multiple fixed BSs improves the robustness, yet requires all BSs to be installed with large batteries and large energy-harvesting devices due to the high energy consumption of BSs. In this paper, we propose a scheme to coordinate the multiple deployed BSs such that the energy supplies required by individual BSs can be substantially reduced. In this scheme, only one BS is selected to be active at a time and the other BSs act as regular sensor nodes. We first present the basic architecture of our system, including how we keep the network running with only one active BS and how we manage the handover of the role of the active BS. Then, we propose an algorithm for adaptively selecting the active BS under the spatial and temporal variations of energy resources. This algorithm is simple to implement but is also asymptotically optimal under mild conditions. Finally, by running simulations and real experiments on an outdoor testbed, we verify that the proposed scheme is energy-efficient, has low communication overhead and reacts rapidly to network changes.
[ { "version": "v1", "created": "Tue, 11 Mar 2014 10:25:21 GMT" }, { "version": "v2", "created": "Fri, 14 Mar 2014 14:12:59 GMT" }, { "version": "v3", "created": "Mon, 15 Sep 2014 21:05:09 GMT" } ]
2014-09-17T00:00:00
[ [ "Zhang", "Runwei", "" ], [ "Ingelrest", "Francois", "" ], [ "Barrenetxea", "Guillermo", "" ], [ "Thiran", "Patrick", "" ], [ "Vetterli", "Martin", "" ] ]
new_dataset
0.964496
1409.4626
Evgeny Nikulchev
Evgeniy Pluzhnik, Evgeny Nikulchev, Simon Payain
Laboratory Test Bench for Research Network and Cloud Computing
5 pages
Int'l J. of Communications, Network and System Sciences, 7:7, 243-247
10.4236/ijcns.2014.77026
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At present moment, there is a great interest in development of information systems operating in cloud infrastructures. Generally, many of tasks remain unresolved such as tasks of optimization of large databases in a hybrid cloud infrastructure, quality of service (QoS) at different levels of cloud services, dynamic control of distribution of cloud resources in application systems and many others. Research and development of new solutions can be limited in case of using emulators or international commercial cloud services, due to the closed architecture and limited opportunities for experimentation. Article provides answers to questions on the establishment of a pilot cloud practically "at home" with the ability to adjust the width of the emulation channel and delays in data transmission. It also describes architecture and configuration of the experimental setup. The proposed modular structure can be expanded by available computing power.
[ { "version": "v1", "created": "Sun, 14 Sep 2014 18:00:13 GMT" } ]
2014-09-17T00:00:00
[ [ "Pluzhnik", "Evgeniy", "" ], [ "Nikulchev", "Evgeny", "" ], [ "Payain", "Simon", "" ] ]
new_dataset
0.99941
1308.4477
Tong Ye
Tong Ye, Tony T. Lee, and Weisheng Hu
AWG-based Non-blocking Clos Networks
Add some contents to the manuscript in page 2, 12 and 13
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The three-stage Clos networks remain the most popular solution to many practical switching systems to date. The aim of this paper is to show that the modular structure of Clos networks is invariant with respect to the technological changes. Due to the wavelength routing property of arrayed-waveguide gratings (AWGs), non-blocking and contention-free wavelength-division-multiplexing (WDM) switches require that two calls carried by the same wavelength must be connected by separated links; otherwise, they must be carried by different wavelengths. Thus, in addition to the non-blocking condition, the challenge of the design of AWG-based multistage switching networks is to scale down the wavelength granularity and to reduce the conversion range of tunable wavelength converters (TWCs). We devise a logic scheme to partition the WDM switch network into wavelength autonomous cells, and show that the wavelength scalability problem can be solved by recursively reusing similar, but smaller, set of wavelengths in different cells. Furthermore, we prove that the rearrangeably non-blocking (RNB) condition and route assignments in these AWG-based three-stage networks are consistent with that of classical Clos networks. Thus, the optimal AWG-based non-blocking Clos networks also can achieve 100% utilization when all input and output wavelength channels are busy.
[ { "version": "v1", "created": "Wed, 21 Aug 2013 03:34:39 GMT" }, { "version": "v2", "created": "Sat, 13 Sep 2014 23:28:37 GMT" } ]
2014-09-16T00:00:00
[ [ "Ye", "Tong", "" ], [ "Lee", "Tony T.", "" ], [ "Hu", "Weisheng", "" ] ]
new_dataset
0.989401
1311.4703
Tuvi Etzion
Michal Horovitz and Tuvi Etzion
Constructions of Snake-in-the-Box Codes for Rank Modulation
IEEE Transactions on Information Theory
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Snake-in-the-box code is a Gray code which is capable of detecting a single error. Gray codes are important in the context of the rank modulation scheme which was suggested recently for representing information in flash memories. For a Gray code in this scheme the codewords are permutations, two consecutive codewords are obtained by using the "push-to-the-top" operation, and the distance measure is defined on permutations. In this paper the Kendall's $\tau$-metric is used as the distance measure. We present a general method for constructing such Gray codes. We apply the method recursively to obtain a snake of length $M_{2n+1}=((2n+1)(2n)-1)M_{2n-1}$ for permutations of $S_{2n+1}$, from a snake of length $M_{2n-1}$ for permutations of~$S_{2n-1}$. Thus, we have $\lim\limits_{n\to \infty} \frac{M_{2n+1}}{S_{2n+1}}\approx 0.4338$, improving on the previous known ratio of $\lim\limits_{n\to \infty} \frac{1}{\sqrt{\pi n}}$. By using the general method we also present a direct construction. This direct construction is based on necklaces and it might yield snakes of length $\frac{(2n+1)!}{2} -2n+1$ for permutations of $S_{2n+1}$. The direct construction was applied successfully for $S_7$ and $S_9$, and hence $\lim\limits_{n\to \infty} \frac{M_{2n+1}}{S_{2n+1}}\approx 0.4743$.
[ { "version": "v1", "created": "Tue, 19 Nov 2013 11:37:16 GMT" }, { "version": "v2", "created": "Wed, 26 Feb 2014 13:32:24 GMT" }, { "version": "v3", "created": "Sun, 13 Jul 2014 13:44:15 GMT" }, { "version": "v4", "created": "Sun, 14 Sep 2014 17:40:56 GMT" } ]
2014-09-16T00:00:00
[ [ "Horovitz", "Michal", "" ], [ "Etzion", "Tuvi", "" ] ]
new_dataset
0.997849
1404.5665
Vasilis Papavasileiou
Panagiotis Manolios, Vasilis Papavasileiou, Mirek Riedewald
ILP Modulo Data
FMCAD 2014 final version plus proofs
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vast quantity of data generated and captured every day has led to a pressing need for tools and processes to organize, analyze and interrelate this data. Automated reasoning and optimization tools with inherent support for data could enable advancements in a variety of contexts, from data-backed decision making to data-intensive scientific research. To this end, we introduce a decidable logic aimed at database analysis. Our logic extends quantifier-free Linear Integer Arithmetic with operators from Relational Algebra, like selection and cross product. We provide a scalable decision procedure that is based on the BC(T) architecture for ILP Modulo Theories. Our decision procedure makes use of database techniques. We also experimentally evaluate our approach, and discuss potential applications.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 23:02:58 GMT" }, { "version": "v2", "created": "Tue, 20 May 2014 19:22:31 GMT" }, { "version": "v3", "created": "Mon, 15 Sep 2014 19:49:17 GMT" } ]
2014-09-16T00:00:00
[ [ "Manolios", "Panagiotis", "" ], [ "Papavasileiou", "Vasilis", "" ], [ "Riedewald", "Mirek", "" ] ]
new_dataset
0.994595
1404.7067
Silvano Dal Zilio
Silvano Dal Zilio (LAAS), Lukasz Fronc (LAAS), Bernard Berthomieu (LAAS), Fran\c{c}ois Vernadat (LAAS)
Time Petri Nets with Dynamic Firing Dates: Semantics and Applications
null
null
10.1007/978-3-319-10512-3_7
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define an extension of time Petri nets such that the time at which a transition can fire, also called its firing date, may be dynamically updated. Our extension provides two mechanisms for updating the timing constraints of a net. First, we propose to change the static time interval of a transition each time it is newly enabled; in this case the new time interval is given as a function of the current marking. Next, we allow to update the firing date of a transition when it is persistent, that is when a concurrent transition fires. We show how to carry the widely used state class abstraction to this new kind of time Petri nets and define a class of nets for which the abstraction is exact. We show the usefulness of our approach with two applications: first for scheduling preemptive task, as a poor man's substitute for stopwatch, then to model hybrid systems with non trivial continuous behavior.
[ { "version": "v1", "created": "Mon, 28 Apr 2014 17:36:43 GMT" } ]
2014-09-16T00:00:00
[ [ "Zilio", "Silvano Dal", "", "LAAS" ], [ "Fronc", "Lukasz", "", "LAAS" ], [ "Berthomieu", "Bernard", "", "LAAS" ], [ "Vernadat", "François", "", "LAAS" ] ]
new_dataset
0.994588
1409.1654
Ashraf Shahin
Ashraf A. Shahin
Polymorphic Worms Collection in Cloud Computing
International Journal of Computer Science and Mobile Computing, Vol.3 Issue.8, August- 2014, pg. 645-652
null
null
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years, computer worms are seen as one of significant challenges of cloud computing. Worms are rapidly changing and getting more sophisticated to evade detection. One major issue to defend against computer worms is collecting worms' payloads to generate their signature and study their behavior. To collect worms' payloads, we identified challenges for detecting and collecting worms' payloads and proposed high-interactive honeypot to collect payloads of zero-day polymorphic worms in homogeneous and heterogeneous cloud computing platforms. Virtual machine (VM) memory and VM disk image are inspected from outside using open-source forensics tools and VMWare Virtual Disk Development Kit. Our experiments show that the proposed approach overcomes the identified challenges.
[ { "version": "v1", "created": "Fri, 5 Sep 2014 03:14:47 GMT" }, { "version": "v2", "created": "Sat, 13 Sep 2014 02:20:50 GMT" } ]
2014-09-16T00:00:00
[ [ "Shahin", "Ashraf A.", "" ] ]
new_dataset
0.988082
1409.2235
Qi Mo
Qi Mo, Hengchin Yeh, Dinesh Manocha
Tracing Analytic Ray Curves for Light and Sound Propagation in Non-linear Media
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The physical world consists of spatially varying media, such as the atmosphere and the ocean, in which light and sound propagates along non-linear trajectories. This presents a challenge to existing ray-tracing based methods, which are widely adopted to simulate propagation due to their efficiency and flexibility, but assume linear rays. We present a novel algorithm that traces analytic ray curves computed from local media gradients, and utilizes the closed-form solutions of both the intersections of the ray curves with planar surfaces, and the travel distance. By constructing an adaptive unstructured mesh, our algorithm is able to model general media profiles that vary in three dimensions with complex boundaries consisting of terrains and other scene objects such as buildings. We trace the analytic ray curves using the adaptive unstructured mesh, which considerably improves the efficiency over prior methods. We highlight the algorithm's application on simulation of sound and visual propagation in outdoor scenes.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 08:19:21 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2014 01:25:09 GMT" }, { "version": "v3", "created": "Sat, 13 Sep 2014 23:59:10 GMT" } ]
2014-09-16T00:00:00
[ [ "Mo", "Qi", "" ], [ "Yeh", "Hengchin", "" ], [ "Manocha", "Dinesh", "" ] ]
new_dataset
0.991222
1409.3319
Pattama Longani
Pattama Longani
Square Grid Points Coveraged by Connected Sources with Coverage Radius of One on a Two-Dimensional Grid
20 pages, 10 figures, International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 4, August 2014
10.5121/ijcsit
null
cs.CC cs.NI
http://creativecommons.org/licenses/publicdomain/
We take some parts of a theoretical mobility model in a two-dimension grid proposed by Greenlaw and Kantabutra to be our model. The model has eight necessary factors that we commonly use in a mobile wireless network: sources or wireless signal providers, the directions that a source can move, users or mobile devices, the given directions which define a user's movement, the given directions which define a source's movement, source's velocity, source's coverage, and obstacles. However, we include only the sources, source's coverage, and the obstacles in our model. We define Square Grid Points Coverage (SGPC) problem to minimize number of sources with coverage radius of one to cover a square grid point size of p with the restriction that all the sources must be communicable and proof that SGPC is in NP-complete class. We also give an Approx-Square-Grid-Coverage (ASGC) algorithm to compute the approximate solution of SGPC. ASGC uses the rule that any number can be obtained from the addition of 3, 4 and 5 and then combines 3-gadgets, 4-gadgets and 5-gadgets to specify the position of sources to cover a square grid point size of p. We find that the algorithm achieves an approximation ratio of . Moreover, we state about the extension usage of our algorithm and show some examples. We show that if we use ASGC on a square grid size of p and if sources can be moved, the area under the square grid can be covered in eight-time-steps movement. We also prove that if we extend our source coverage radius to 1.59, without any movement the area under the square gird will also be covered. Further studies are also discussed and a list of some tentative problems is given in the conclusion.
[ { "version": "v1", "created": "Thu, 11 Sep 2014 03:59:48 GMT" } ]
2014-09-16T00:00:00
[ [ "Longani", "Pattama", "" ] ]
new_dataset
0.993029
1409.3942
Richa Sharma
Richa Sharma, Shweta Nigam, Rekha Jain
Polarity detection movie reviews in hindi language
null
null
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays peoples are actively involved in giving comments and reviews on social networking websites and other websites like shopping websites, news websites etc. large number of people everyday share their opinion on the web, results is a large number of user data is collected .users also find it trivial task to read all the reviews and then reached into the decision. It would be better if these reviews are classified into some category so that the user finds it easier to read. Opinion Mining or Sentiment Analysis is a natural language processing task that mines information from various text forms such as reviews, news, and blogs and classify them on the basis of their polarity as positive, negative or neutral. But, from the last few years, user content in Hindi language is also increasing at a rapid rate on the Web. So it is very important to perform opinion mining in Hindi language as well. In this paper a Hindi language opinion mining system is proposed. The system classifies the reviews as positive, negative and neutral for Hindi language. Negation is also handled in the proposed system. Experimental results using reviews of movies show the effectiveness of the system
[ { "version": "v1", "created": "Sat, 13 Sep 2014 12:36:56 GMT" } ]
2014-09-16T00:00:00
[ [ "Sharma", "Richa", "" ], [ "Nigam", "Shweta", "" ], [ "Jain", "Rekha", "" ] ]
new_dataset
0.999686
1409.4078
Boris Burshteyn
Boris Burshteyn
The distributed Language Hello White Paper
10 pages
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hello is a general-purpose, object-oriented, protocol-agnostic distributed programming language. This paper explains the ideas that guided design of Hello. It shows the spirit of Hello using two brief expressive programs and provides a summary of language features. In addition, it explores historical parallels between the binary programming of early computers and the distributed programming of modern networks.
[ { "version": "v1", "created": "Sun, 14 Sep 2014 17:26:34 GMT" } ]
2014-09-16T00:00:00
[ [ "Burshteyn", "Boris", "" ] ]
new_dataset
0.998621
1002.4317
Amelia Carolina Sparavigna
Amelia Carolina Sparavigna, Roberto Marazzato
CLD-shaped Brushstrokes in Non-Photorealistic Rendering
Keywords: Image processing, Non-photorealistic processing, Image-based rendering Coherence Length Diagram
International Journal of Software Engineering and Computing, 2011, Volume 3, Issue 1, Pages 11-15
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rendering techniques based on a random grid can be improved by adapting brushstrokes to the shape of different areas of the original picture. In this paper, the concept of Coherence Length Diagram is applied to determine the adaptive brushstrokes, in order to simulate an impressionist painting. Some examples are provided to instance the proposed algorithm.
[ { "version": "v1", "created": "Tue, 23 Feb 2010 12:32:34 GMT" } ]
2014-09-12T00:00:00
[ [ "Sparavigna", "Amelia Carolina", "" ], [ "Marazzato", "Roberto", "" ] ]
new_dataset
0.996393
1205.0997
Mario Blaum
Mario Blaum, James Lee Hafner and Steven Hetzler
Partial-MDS Codes and their Application to RAID Type of Architectures
This new version corrects a typo in Theorem 5.5
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A family of codes with a natural two-dimensional structure is presented, inspired by an application of RAID type of architectures whose units are solid state drives (SSDs). Arrays of SSDs behave differently to arrays of hard disk drives (HDDs), since hard errors in sectors are common and traditional RAID approaches (like RAID 5 or RAID 6) may be either insufficient or excessive. An efficient solution to this problem is given by the new codes presented, called partial-MDS (PMDS) codes.
[ { "version": "v1", "created": "Fri, 4 May 2012 16:08:26 GMT" }, { "version": "v2", "created": "Thu, 11 Sep 2014 16:45:24 GMT" } ]
2014-09-12T00:00:00
[ [ "Blaum", "Mario", "" ], [ "Hafner", "James Lee", "" ], [ "Hetzler", "Steven", "" ] ]
new_dataset
0.999495
1409.3143
Teresa Gomez-Diaz
Teresa Gomez-Diaz (LIGM)
Free software, Open source software, licenses. A short presentation including a procedure for research software and data dissemination
4 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main goal of this document is to help the research community to understand the basic concepts of software distribution: Free software, Open source software, licenses. This document also includes a procedure for research software and data dissemination.
[ { "version": "v1", "created": "Tue, 9 Sep 2014 19:05:40 GMT" }, { "version": "v2", "created": "Thu, 11 Sep 2014 14:00:57 GMT" } ]
2014-09-12T00:00:00
[ [ "Gomez-Diaz", "Teresa", "", "LIGM" ] ]
new_dataset
0.997828
1409.3367
Gabriel Muller
Gabriel L. Muller
HTML5 WebSocket protocol and its application to distributed computing
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
HTML5 WebSocket protocol brings real time communication in web browsers to a new level. Daily, new products are designed to stay permanently connected to the web. WebSocket is the technology enabling this revolution. WebSockets are supported by all current browsers, but it is still a new technology in constant evolution. WebSockets are slowly replacing older client-server communication technologies. As opposed to comet-like technologies WebSockets' remarkable performances is a result of the protocol's fully duplex nature and because it doesn't rely on HTTP communications. To begin with this paper studies the WebSocket protocol and different WebSocket servers implementations. This first theoretic part focuses more deeply on heterogeneous implementations and OpenCL. The second part is a benchmark of a new promising library. The real-time engine used for testing purposes is SocketCluster. SocketCluster provides a highly scalable WebSocket server that makes use of all available cpu cores on an instance. The scope of this work is reduced to vertical scaling of SocketCluster.
[ { "version": "v1", "created": "Thu, 11 Sep 2014 09:36:46 GMT" } ]
2014-09-12T00:00:00
[ [ "Muller", "Gabriel L.", "" ] ]
new_dataset
0.999535
1409.3404
Dominik Egarter
Christoph Klemenjak, Dominik Egarter, Wilfried Elmenreich
YoMo - The Arduino based Smart Metering Board
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart meters are an enabling technology for many smart grid applications. This paper introduces a design for a low-cost smart meter system as well as the fundamentals of smart metering. The smart meter platform, provided as open hardware, is designed with a connector interface compatible to the Arduino platform, thus opening the possibilities for smart meters with flexible hardware and computation features, starting from low-cost 8 bit micro controllers up to powerful single board computers that can run Linux. The metering platform features a current transformer which allows a non-intrusive installation of the current measurement unit. The suggested design can switch loads, offers a variable sampling frequency, and provides measurement data such as active power, reactive and apparent power. Results indicate that measurement accuracy and resolution of the proposed metering platform are sufficient for a range of different applications and loads from a few watts up to five kilowatts.
[ { "version": "v1", "created": "Thu, 11 Sep 2014 11:57:04 GMT" } ]
2014-09-12T00:00:00
[ [ "Klemenjak", "Christoph", "" ], [ "Egarter", "Dominik", "" ], [ "Elmenreich", "Wilfried", "" ] ]
new_dataset
0.999808
1409.3512
Udaya Raj Dhungana
Udaya Raj Dhungana, Subarna Shakya, Kabita Baral and Bharat Sharma
Word Sense Disambiguation using WSD specific Wordnet of Polysemy Words
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new model of WordNet that is used to disambiguate the correct sense of polysemy word based on the clue words. The related words for each sense of a polysemy word as well as single sense word are referred to as the clue words. The conventional WordNet organizes nouns, verbs, adjectives and adverbs together into sets of synonyms called synsets each expressing a different concept. In contrast to the structure of WordNet, we developed a new model of WordNet that organizes the different senses of polysemy words as well as the single sense words based on the clue words. These clue words for each sense of a polysemy word as well as for single sense word are used to disambiguate the correct meaning of the polysemy word in the given context using knowledge based Word Sense Disambiguation (WSD) algorithms. The clue word can be a noun, verb, adjective or adverb.
[ { "version": "v1", "created": "Wed, 10 Sep 2014 19:01:18 GMT" } ]
2014-09-12T00:00:00
[ [ "Dhungana", "Udaya Raj", "" ], [ "Shakya", "Subarna", "" ], [ "Baral", "Kabita", "" ], [ "Sharma", "Bharat", "" ] ]
new_dataset
0.999642
1401.2778
Loet Leydesdorff
Loet Leydesdorff, Floortje Alkemade, Gaston Heimeriks, and Rinke Hoekstra
Patents as Instruments for Exploring Innovation Dynamics: Geographic and Technological Perspectives on "Photovoltaic Cells"
accepted for publication in Scientometrics on September 10, 2014
null
null
null
cs.CY cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamics of innovation are nonlinear and complex: geographical, technological, and economic selection environments can be expected to interact. Can patents provide an analytical lens to this process in terms of different attributes such as inventor addresses, classification codes, backward and forward citations, etc.? Two recently developed patent maps with interactive overlay techniques--Google Maps and maps based on citation relations among International Patent Classifications (IPC)--are elaborated into dynamic versions that allow for online animations and comparisons by using split screens. Various forms of animation are explored. The recently developed Cooperative Patent Classifications (CPC) of the U.S. Patent and Trade Office (USPTO) and the European Patent Office (EPO) provide new options for a precise delineation of samples in both USPTO data and the Worldwide Patent Statistics Database (PatStat) of EPO. Among the "technologies for the mitigation of climate change" (class Y02), we zoom in on nine material technologies for photovoltaic cells; and focus on one of them (CuInSe2) as a lead case. The longitudinal development of Rao-Stirling diversity in the IPC-based maps provides a heuristics for studying technological generations during the period under study (1975-2012). The sequencing of generations prevails in USPTO data more than in PatStat data because PatStat aggregates patent information from countries in different stages of technological development, whereas one can expect USPTO patents to be competitive at the technological edge.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 10:43:40 GMT" }, { "version": "v2", "created": "Wed, 10 Sep 2014 14:47:39 GMT" } ]
2014-09-11T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Alkemade", "Floortje", "" ], [ "Heimeriks", "Gaston", "" ], [ "Hoekstra", "Rinke", "" ] ]
new_dataset
0.967465
1409.2918
Mario Mastriani
Mario Mastriani
Quantum Edge Detection for Image Segmentation in Optical Environments
31 pages, 20 figures, 5 tables. arXiv admin note: substantial text overlap with arXiv:1406.5121, arXiv:1408.2427; and text overlap with arXiv:quant-ph/0402085 by other authors
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A quantum edge detector for image segmentation in optical environments is presented in this work. A Boolean version of the same detector is presented too. The quantum version of the new edge detector works with computational basis states, exclusively. This way, we can easily avoid the problem of quantum measurement retrieving the result of applying the new detector on the image. Besides, a new criterion and logic based on projections onto vertical axis of Bloch's Sphere exclusively are presented too. This approach will allow us: 1) a simpler development of logic quantum operations, where they will closer to those used in the classical logic operations, 2) building simple and robust classical-to-quantum and quantum-to-classical interfaces. Said so far is extended to quantum algorithms outside image processing too. In a special section on metric and simulations, a new metric based on the comparison between the classical and quantum versions algorithms for edge detection of images is presented. Notable differences between the results of classical and quantum versions of such algorithms (outside and inside of quantum computer, respectively) show the existence of implementation problems involved in the experiment, and that they have not been properly modeled for optical environments. However, although they are different, the quantum results are equally valid. The latter is clearly seen in the computer simulations
[ { "version": "v1", "created": "Tue, 9 Sep 2014 23:22:56 GMT" } ]
2014-09-11T00:00:00
[ [ "Mastriani", "Mario", "" ] ]
new_dataset
0.994827
0903.4875
Lynn Reid
A. Dubey, L.B. Reid, K. Weide, K. Antypas, M.K. Ganapathy, K. Riley, D. Sheeler, A. Siegal
Extensible Component Based Architecture for FLASH, A Massively Parallel, Multiphysics Simulation Code
33 pages, 7 figures; revised paper submitted to Parallel Computing
null
10.1016/j.parco.2009.08.001
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
FLASH is a publicly available high performance application code which has evolved into a modular, extensible software system from a collection of unconnected legacy codes. FLASH has been successful because its capabilities have been driven by the needs of scientific applications, without compromising maintainability, performance, and usability. In its newest incarnation, FLASH3 consists of inter-operable modules that can be combined to generate different applications. The FLASH architecture allows arbitrarily many alternative implementations of its components to co-exist and interchange with each other, resulting in greater flexibility. Further, a simple and elegant mechanism exists for customization of code functionality without the need to modify the core implementation of the source. A built-in unit test framework providing verifiability, combined with a rigorous software maintenance process, allow the code to operate simultaneously in the dual mode of production and development. In this paper we describe the FLASH3 architecture, with emphasis on solutions to the more challenging conflicts arising from solver complexity, portable performance requirements, and legacy codes. We also include results from user surveys conducted in 2005 and 2007, which highlight the success of the code.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 18:52:05 GMT" }, { "version": "v2", "created": "Fri, 24 Jul 2009 17:16:49 GMT" } ]
2014-09-10T00:00:00
[ [ "Dubey", "A.", "" ], [ "Reid", "L. B.", "" ], [ "Weide", "K.", "" ], [ "Antypas", "K.", "" ], [ "Ganapathy", "M. K.", "" ], [ "Riley", "K.", "" ], [ "Sheeler", "D.", "" ], [ "Siegal", "A.", "" ] ]
new_dataset
0.956667
1409.1023
Thomas Nyman
Thomas Nyman, Jan-Erik Ekberg and N. Asokan
Citizen Electronic Identities using TPM 2.0
This work is based on an earlier work: Citizen Electronic Identities using TPM 2.0, to appear in the Proceedings of the 4th international workshop on Trustworthy embedded devices, TrustED'14, November 3, 2014, Scottsdale, Arizona, USA, http://dx.doi.org/10.1145/2666141.2666146
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.
[ { "version": "v1", "created": "Wed, 3 Sep 2014 10:24:44 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2014 08:55:32 GMT" } ]
2014-09-10T00:00:00
[ [ "Nyman", "Thomas", "" ], [ "Ekberg", "Jan-Erik", "" ], [ "Asokan", "N.", "" ] ]
new_dataset
0.985438
1409.2073
Tobias Kortkamp
Tobias Kortkamp
An NLP Assistant for Clide
Bachelor Report
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/3.0/
This report describes an NLP assistant for the collaborative development environment Clide, that supports the development of NLP applications by providing easy access to some common NLP data structures. The assistant visualizes text fragments and their dependencies by displaying the semantic graph of a sentence, the coreference chain of a paragraph and mined triples that are extracted from a paragraph's semantic graphs and linked using its coreference chain. Using this information and a logic programming library, we create an NLP database which is used by a series of queries to mine the triples. The algorithm is tested by translating a natural language text describing a graph to an actual graph that is shown as an annotation in the text editor.
[ { "version": "v1", "created": "Sun, 7 Sep 2014 02:31:03 GMT" } ]
2014-09-09T00:00:00
[ [ "Kortkamp", "Tobias", "" ] ]
new_dataset
0.997293
1409.2088
Michael Kruse
Michael Kruse (LRI, INRIA Saclay - Ile de France)
Introducing Molly: Distributed Memory Parallelization with LLVM
null
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Programming for distributed memory machines has always been a tedious task, but necessary because compilers have not been sufficiently able to optimize for such machines themselves. Molly is an extension to the LLVM compiler toolchain that is able to distribute and reorganize workload and data if the program is organized in statically determined loop control-flows. These are represented as polyhedral integer-point sets that allow program transformations applied on them. Memory distribution and layout can be declared by the programmer as needed and the necessary asynchronous MPI communication is generated automatically. The primary motivation is to run Lattice QCD simulations on IBM Blue Gene/Q supercomputers, but since the implementation is not yet completed, this paper shows the capabilities on Conway's Game of Life.
[ { "version": "v1", "created": "Sun, 7 Sep 2014 06:41:30 GMT" } ]
2014-09-09T00:00:00
[ [ "Kruse", "Michael", "", "LRI, INRIA Saclay - Ile de France" ] ]
new_dataset
0.996011
1409.2208
Christopher Tucker Ph.D.
Christopher A. Tucker
A wireless hand-held platform for robotic behavior control
12 pages, 4 figures
null
null
null
cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The need for customizable properties in autonomous robotic platforms, such as in-home nursing care for the elderly and parallel implementations of human-to-machine control interfaces creates an opportunity to introduce methods deploying commonly available mobile devices running robotic command applications in managed code. This paper will discuss a human-to-machine interface and demonstrate a prototype consisting of a mobile device running a configurable application communicating with a mobile robot using a managed, type-safe language, C#.NET, over Bluetooth.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 05:09:49 GMT" } ]
2014-09-09T00:00:00
[ [ "Tucker", "Christopher A.", "" ] ]
new_dataset
0.999276
1409.2246
Philip Wette
Philip Wette and Holger Karl
DCT${^2}$Gen: A Versatile TCP Traffic Generator for Data Centers
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Only little is publicly known about traffic in non-educational data centers. Recent studies made some knowledge available, which gives us the opportunity to create more realistic traffic models for data center research. We used this knowledge to create the first publicly available traffic generator that produces realistic traffic between hosts in data centers of arbitrary size. We characterize traffic by using six probability distribution functions and concentrate on the generation of traffic on flow-level. The distribution functions are described as step functions, which makes our generator highly configurable to generate traffic for different kinds of data centers. Moreover, in data centers, traffic between hosts in the same rack and hosts in different racks have different properties. We model this phenomenon, making our generated traffic very realistic. We carefully evaluated our approach and conclude that it reproduces these characteristics with high accuracy.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 08:59:17 GMT" } ]
2014-09-09T00:00:00
[ [ "Wette", "Philip", "" ], [ "Karl", "Holger", "" ] ]
new_dataset
0.990724
1409.2353
Bernhard Rumpe
Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe
Modal Object Diagrams
25 pages, 9 figures
Proc. 25th Euro. Conf. on Object Oriented Programming (ECOOP'11), LNCS 6813, pp. 281-305, Springer, 2011
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While object diagrams (ODs) are widely used as a means to document object-oriented systems, they are expressively weak, as they are limited to describe specific possible snapshots of the system at hand. In this paper we introduce modal object diagrams (MODs), which extend the classical OD language with positive/negative and example/invariant modalities. The extended language allows the designer to specify not only positive example models but also negative examples, ones that the system should not allow, positive invariants, ones that all system's snapshots should include, and negative invariants, ones that no system snapshot is allowed to include. Moreover, as a primary application of the extended language we provide a formal verification technique that decides whether a given class diagram satisfies (i.e., models) a multi-modal object diagrams specification. In case of a negative answer, the technique outputs relevant counterexample object models, as applicable. The verification is based on a reduction to Alloy. The ideas are implemented in a prototype Eclipse plug-in. Examples show the usefulness of the extended language in specifying structural requirements of object-oriented systems in an intuitive yet expressive way.
[ { "version": "v1", "created": "Mon, 8 Sep 2014 14:16:16 GMT" } ]
2014-09-09T00:00:00
[ [ "Maoz", "Shahar", "" ], [ "Ringert", "Jan Oliver", "" ], [ "Rumpe", "Bernhard", "" ] ]
new_dataset
0.997363