id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1408.1068
|
Carlos Alberto Fernandez-y-Fernandez
|
Jorge Aguilar, Moises Sanchez, Carlos Fernandez-y-Fernandez, Everth
Rocha, David Martinez and Jose Figueroa
|
The Size of Software Projects Developed by Mexican Companies
|
5 pages, The 2014 International Conference on Software Engineering
Research and Practice (SERP'14)
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently, most software projects around the world are small rather than
large. Despite this, there are more methodologies, tools, frameworks,
processes, and so on, for developing and managing large software projects than
for small ones. Small software projects are important because they generate
considerable resources. For example: apps (small mobile applications) generate
around $25 billion dollars of revenue. This paper shows our findings regarding
the size of the projects built by Mexican software development companies. We
surveyed 107 Mexican companies and found that 92% of their developed projects
are micro and small, and 8% are medium or large. In addition, according to our
research, 84.1% of companies in Mexico are micro or small businesses.
|
[
{
"version": "v1",
"created": "Tue, 5 Aug 2014 18:53:59 GMT"
}
] | 2014-08-06T00:00:00 |
[
[
"Aguilar",
"Jorge",
""
],
[
"Sanchez",
"Moises",
""
],
[
"Fernandez-y-Fernandez",
"Carlos",
""
],
[
"Rocha",
"Everth",
""
],
[
"Martinez",
"David",
""
],
[
"Figueroa",
"Jose",
""
]
] |
new_dataset
| 0.997516 |
1408.1076
|
Niklas Grimm
|
Michael Backes, Niklas Grimm, and Aniket Kate
|
Lime: Data Lineage in the Malicious Environment
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intentional or unintentional leakage of confidential data is undoubtedly one
of the most severe security threats that organizations face in the digital era.
The threat now extends to our personal lives: a plethora of personal
information is available to social networks and smartphone providers and is
indirectly transferred to untrustworthy third party and fourth party
applications.
In this work, we present a generic data lineage framework LIME for data flow
across multiple entities that take two characteristic, principal roles (i.e.,
owner and consumer). We define the exact security guarantees required by such a
data lineage mechanism toward identification of a guilty entity, and identify
the simplifying non repudiation and honesty assumptions. We then develop and
analyze a novel accountable data transfer protocol between two entities within
a malicious environment by building upon oblivious transfer, robust
watermarking, and signature primitives. Finally, we perform an experimental
evaluation to demonstrate the practicality of our protocol.
|
[
{
"version": "v1",
"created": "Tue, 5 Aug 2014 19:45:38 GMT"
}
] | 2014-08-06T00:00:00 |
[
[
"Backes",
"Michael",
""
],
[
"Grimm",
"Niklas",
""
],
[
"Kate",
"Aniket",
""
]
] |
new_dataset
| 0.987451 |
1306.6264
|
G David Forney Jr.
|
G. David Forney Jr
|
Codes on Graphs: Fundamentals
|
32 pages, 22 figures. To appear in IEEE Transactions on Information
Theory. Part of this paper was presented at the 2012 Allerton Conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper develops a fundamental theory of realizations of linear and group
codes on general graphs using elementary group theory, including basic group
duality theory. Principal new and extended results include: normal realization
duality; analysis of systems-theoretic properties of fragments of realizations
and their connections; "minimal = trim and proper" theorem for cycle-free
codes; results showing that all constraint codes except interface nodes may be
assumed to be trim and proper, and that the interesting part of a cyclic
realization is its "2-core;" notions of observability and controllability for
fragments, and related tests; relations between state-trimness and
controllability, and dual state-trimness and observability.
|
[
{
"version": "v1",
"created": "Wed, 26 Jun 2013 14:57:08 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Aug 2014 20:08:18 GMT"
}
] | 2014-08-05T00:00:00 |
[
[
"Forney",
"G. David",
"Jr"
]
] |
new_dataset
| 0.983741 |
1402.2409
|
Christoph Koutschan
|
Shaoshi Chen, Manuel Kauers, Christoph Koutschan
|
A Generalized Apagodu-Zeilberger Algorithm
| null |
Proceedings of the International Symposium on Symbolic and
Algebraic Computation (ISSAC 2014), pages 107-114, 2014. ACM, New York, USA,
ISBN 978-1-4503-2501-1
|
10.1145/2608628.2608641
| null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Apagodu-Zeilberger algorithm can be used for computing annihilating
operators for definite sums over hypergeometric terms, or for definite
integrals over hyperexponential functions. In this paper, we propose a
generalization of this algorithm which is applicable to arbitrary
$\partial$-finite functions. In analogy to the hypergeometric case, we
introduce the notion of proper $\partial$-finite functions. We show that the
algorithm always succeeds for these functions, and we give a tight a priori
bound for the order of the output operator.
|
[
{
"version": "v1",
"created": "Tue, 11 Feb 2014 09:35:59 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2014 15:03:50 GMT"
},
{
"version": "v3",
"created": "Sat, 2 Aug 2014 19:32:33 GMT"
}
] | 2014-08-05T00:00:00 |
[
[
"Chen",
"Shaoshi",
""
],
[
"Kauers",
"Manuel",
""
],
[
"Koutschan",
"Christoph",
""
]
] |
new_dataset
| 0.99884 |
1408.0474
|
Fabio Ricciato
|
Fabio Ricciato
|
Time to timestamp: opportunistic cooperative localization from reception
time measurements
|
This work is currently under review for a IEEE magazine
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a general framework for improving and extending GNSS-based
positioning by leveraging opportunistic measurements from legacy terrestrial
radio signals. The proposed approach requires only that participating nodes
collect and share reception timestamps of incoming packets and/or other
reference signals transmitted by other fixed or mobile nodes, with no need of
inter-node synchronization. The envisioned scheme couples the idea of
cooperative GNSS augmentation with recent pioneering work in the field of
time-based localization in asynchronous networks. In this contribution we
present the fundamental principles of the proposed approach and discuss the
system-level aspects that make it particularly appealing and timely for
Cooperative ITS applications, with the goal of motivating further research and
experimentation in this direction.
|
[
{
"version": "v1",
"created": "Sun, 3 Aug 2014 08:56:21 GMT"
}
] | 2014-08-05T00:00:00 |
[
[
"Ricciato",
"Fabio",
""
]
] |
new_dataset
| 0.992325 |
1408.0683
|
Joost Engelfriet
|
Joost Engelfriet
|
Context-Free Grammars with Storage
|
58 pages, 8 figures, slightly revised version of a report from 1986
| null | null |
86-11
|
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Context-free S grammars are introduced, for arbitrary (storage) type S, as a
uniform framework for recursion-based grammars, automata, and transducers,
viewed as programs. To each occurrence of a nonterminal of a context-free S
grammar an object of type S is associated, that can be acted upon by tests and
operations, as indicated in the rules of the grammar. Taking particular storage
types gives particular formalisms, such as indexed grammars, top-down tree
transducers, attribute grammars, etc. Context-free S grammars are equivalent to
pushdown S automata. The context-free S languages can be obtained from the
deterministic one-way S automaton languages by way of the delta operations on
languages, introduced in this paper.
|
[
{
"version": "v1",
"created": "Mon, 4 Aug 2014 13:40:45 GMT"
}
] | 2014-08-05T00:00:00 |
[
[
"Engelfriet",
"Joost",
""
]
] |
new_dataset
| 0.985768 |
1408.0051
|
EPTCS
|
Katie Barr (University of Leeds), Viv Kendon (University of Leeds)
|
The expressive power of quantum walks in terms of language acceptance
|
In Proceedings QPL 2012, arXiv:1407.8427
|
EPTCS 158, 2014, pp. 39-51
|
10.4204/EPTCS.158.4
| null |
cs.FL cs.ET quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discrete time quantum walks are known to be universal for quantum
computation. This has been proven by showing that they can simulate a universal
quantum gate set. In this paper, we examine computation by quantum walks in
terms of language acceptance, and present two ways in which discrete time
quantum walks can accept some languages with certainty. These walks can take
quantum as well as classical inputs, and we show that when the input is
quantum, the walks can also be interpreted as performing the task of quantum
state discrimination.
|
[
{
"version": "v1",
"created": "Fri, 1 Aug 2014 00:24:58 GMT"
}
] | 2014-08-04T00:00:00 |
[
[
"Barr",
"Katie",
"",
"University of Leeds"
],
[
"Kendon",
"Viv",
"",
"University of Leeds"
]
] |
new_dataset
| 0.989329 |
1408.0053
|
EPTCS
|
Luca Bernardinello (Universit\`a degli studi di Milano-Bicocca), Carlo
Ferigato (Joint Research Centre of the European Commission), Lucia Pomello
(Universit\`a degli studi di Milano-Bicocca)
|
Between quantum logic and concurrency
|
In Proceedings QPL 2012, arXiv:1407.8427
|
EPTCS 158, 2014, pp. 65-75
|
10.4204/EPTCS.158.6
| null |
cs.LO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We start from two closure operators defined on the elements of a special kind
of partially ordered sets, called causal nets. Causal nets are used to model
histories of concurrent processes, recording occurrences of local states and of
events. If every maximal chain (line) of such a partially ordered set meets
every maximal antichain (cut), then the two closure operators coincide, and
generate a complete orthomodular lattice. In this paper we recall that, for any
closed set in this lattice, every line meets either it or its orthocomplement
in the lattice, and show that to any line, a two-valued state on the lattice
can be associated. Starting from this result, we delineate a logical language
whose formulas are interpreted over closed sets of a causal net, where every
line induces an assignment of truth values to formulas. The resulting logic is
non-classical; we show that maximal antichains in a causal net are associated
to Boolean (hence "classical") substructures of the overall quantum logic.
|
[
{
"version": "v1",
"created": "Fri, 1 Aug 2014 00:25:18 GMT"
}
] | 2014-08-04T00:00:00 |
[
[
"Bernardinello",
"Luca",
"",
"Università degli studi di Milano-Bicocca"
],
[
"Ferigato",
"Carlo",
"",
"Joint Research Centre of the European Commission"
],
[
"Pomello",
"Lucia",
"",
"Università degli studi di Milano-Bicocca"
]
] |
new_dataset
| 0.996403 |
1408.0074
|
Ross Adelman
|
Ross Adelman, Nail A. Gumerov, and Ramani Duraiswami
|
Software for Computing the Spheroidal Wave Functions Using Arbitrary
Precision Arithmetic
| null | null | null | null |
cs.MS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The spheroidal wave functions, which are the solutions to the Helmholtz
equation in spheroidal coordinates, are notoriously difficult to compute.
Because of this, practically no programming language comes equipped with the
means to compute them. This makes problems that require their use hard to
tackle. We have developed computational software for calculating these special
functions. Our software is called spheroidal and includes several novel
features, such as: using arbitrary precision arithmetic; adaptively choosing
the number of expansion coefficients to compute and use; and using the
Wronskian to choose from several different methods for computing the spheroidal
radial functions to improve their accuracy. There are two types of spheroidal
wave functions: the prolate kind when prolate spheroidal coordinates are used;
and the oblate kind when oblate spheroidal coordinate are used. In this paper,
we describe both, methods for computing them, and our software. We have made
our software freely available on our webpage.
|
[
{
"version": "v1",
"created": "Fri, 1 Aug 2014 04:29:30 GMT"
}
] | 2014-08-04T00:00:00 |
[
[
"Adelman",
"Ross",
""
],
[
"Gumerov",
"Nail A.",
""
],
[
"Duraiswami",
"Ramani",
""
]
] |
new_dataset
| 0.999032 |
1408.0180
|
Toni Ernvall
|
Toni Ernvall, Thomas Westerb\"ack, Camilla Hollanti
|
Linear Locally Repairable Codes with Random Matrices
|
13 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, locally repairable codes with all-symbol locality are studied.
Methods to modify already existing codes are presented. Also, it is shown that
with high probability, a random matrix with a few extra columns guaranteeing
the locality property, is a generator matrix for a locally repairable code with
a good minimum distance. The proof of this gives also a constructive method to
find locally repairable codes.
|
[
{
"version": "v1",
"created": "Fri, 1 Aug 2014 13:59:16 GMT"
}
] | 2014-08-04T00:00:00 |
[
[
"Ernvall",
"Toni",
""
],
[
"Westerbäck",
"Thomas",
""
],
[
"Hollanti",
"Camilla",
""
]
] |
new_dataset
| 0.999487 |
1407.8215
|
Vanessa Wei Feng Ms.
|
Vanessa Wei Feng and Graeme Hirst
|
Two-pass Discourse Segmentation with Pairing and Global Features
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous attempts at RST-style discourse segmentation typically adopt
features centered on a single token to predict whether to insert a boundary
before that token. In contrast, we develop a discourse segmenter utilizing a
set of pairing features, which are centered on a pair of adjacent tokens in the
sentence, by equally taking into account the information from both tokens.
Moreover, we propose a novel set of global features, which encode
characteristics of the segmentation as a whole, once we have an initial
segmentation. We show that both the pairing and global features are useful on
their own, and their combination achieved an $F_1$ of 92.6% of identifying
in-sentence discourse boundaries, which is a 17.8% error-rate reduction over
the state-of-the-art performance, approaching 95% of human performance. In
addition, similar improvement is observed across different classification
frameworks.
|
[
{
"version": "v1",
"created": "Wed, 30 Jul 2014 21:00:25 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Feng",
"Vanessa Wei",
""
],
[
"Hirst",
"Graeme",
""
]
] |
new_dataset
| 0.971478 |
1407.8242
|
Rakesh Misra
|
Rakesh Misra, Sachin Katti
|
A low-latency control plane for dense cellular networks
|
14 pages, 17 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to keep up with the increasing demands for capacity, cellular
networks are becoming increasingly dense and heterogeneous. Dense deployments
are expected to provide a linear capacity scaling with the number of small
cells deployed due to spatial reuse gains. However in practice network capacity
is severely limited in dense networks due to interference. The primary reason
is that the current LTE control plane deployment model has very high latency
and is unable to cope with the demand of implementing interference management
techniques that require coordination on a millisecond timeframe.
This paper presents SwiftC, a novel low-latency control plane design for LTE
networks. SwiftC's novel contribution is a design for efficiently sending and
receiving control plane messages over the LTE spectrum itself, thus creating a
direct and low-latency coordination signaling link between small cells and the
macrocell. SwiftC builds on recent work in full duplex radios and shows via
prototype implementations that a low latency control plane can be built over
the existing LTE network without wasting licensed spectrum. We also show the
benefits of SwiftC in implementing complex interference management techniques,
and show that with SwiftC small cell deployments can achieve almost a linear
capacity scaling with every small cell deployed.
|
[
{
"version": "v1",
"created": "Thu, 31 Jul 2014 00:23:33 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Misra",
"Rakesh",
""
],
[
"Katti",
"Sachin",
""
]
] |
new_dataset
| 0.987538 |
1407.8249
|
Yixuan Xie
|
Yixuan Xie, Jinhong Yuan and Qifu (Tyler) Sun
|
Design of Quantum Stabilizer Codes From Quadratic Residues Sets
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose two types, namely Type-I and Type-II, quantum stabilizer codes
using quadratic residue sets of prime modulus given by the form $p=4n\pm1$. The
proposed Type-I stabilizer codes are of cyclic structure and code length $N=p$.
They are constructed based on multi-weight circulant matrix generated from
idempotent polynomial, which is obtained from a quadratic residue set. The
proposed Type-II stabilizer codes are of quasi-cyclic (QC) structure and code
length $N=pk$, where $k$ is the size of a quadratic residue set. They are
constructed based on structured sparse-graphs codes derived from proto-matrix
and circulant permutation matrix. With the proposed methods, we design rich
classes of cyclic and quasi-cyclic quantum stabilizer codes with variable code
length. We show how the commutative constraint (also referred to as the
Symplectic Inner Product constraint) for quantum codes can be satisfied for
each proposed construction method. We also analyze both the dimension and
distance for Type-I stabilizer codes and the dimension of Type-II stabilizer
codes. For the cyclic quantum stabilizer codes, we show that they meet the
existing distance bounds in literature.
|
[
{
"version": "v1",
"created": "Thu, 31 Jul 2014 00:50:12 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Xie",
"Yixuan",
"",
"Tyler"
],
[
"Yuan",
"Jinhong",
"",
"Tyler"
],
[
"Qifu",
"",
"",
"Tyler"
],
[
"Sun",
"",
""
]
] |
new_dataset
| 0.998486 |
1407.8355
|
Waldir Moreira
|
Waldir Moreira, Ronedo Ferreira, Douglas Cirqueira, Paulo Mendes and
Eduardo Cerqueira
|
SocialDTN: A DTN implementation for Digital and Social Inclusion
|
3 pages, 4 figures
| null |
10.1145/2502880.2502892
| null |
cs.NI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite of the importance of access to computers and to the Internet for the
development of people and their inclusion in society, there are people that
still suffer with digital divide and social exclusion.
Delay/Disruption-Tolerant Networking (DTN) can help the digital/social
inclusion of these people as it allows opportunistic and asynchronous
communication, which does not depend upon networking infrastructure. We
introduce SocialDTN, an implementation of the DTN architecture for Android
devices that operates over Bluetooth, taking advantages of the social daily
routines of users. As we want to exploit the social proximity and interactions
existing among users, SocialDTN includes a social-aware opportunistic routing
proposal, dLife, instead of the well-known (but social-oblivious) PROPHET.
Simulations show the potential of dLife for our needs. Additionally, some
preliminary results from field experimentations are presented.
|
[
{
"version": "v1",
"created": "Thu, 31 Jul 2014 11:12:13 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Moreira",
"Waldir",
""
],
[
"Ferreira",
"Ronedo",
""
],
[
"Cirqueira",
"Douglas",
""
],
[
"Mendes",
"Paulo",
""
],
[
"Cerqueira",
"Eduardo",
""
]
] |
new_dataset
| 0.980334 |
1407.8474
|
Sayan Bandyapadhyay
|
Sayan Bandyapadhyay, Aritra Banik, Sandip Das, Hirak Sarkar
|
Voronoi Game on Graphs
|
Journal preprint version, 18 pages
| null | null | null |
cs.DS cs.DM cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
\textit{Voronoi game} is a geometric model of competitive facility location
problem played between two players. Users are generally modeled as points
uniformly distributed on a given underlying space. Each player chooses a set of
points in the underlying space to place their facilities. Each user avails
service from its nearest facility. Service zone of a facility consists of the
set of users which are closer to it than any other facility. Payoff of each
player is defined by the quantity of users served by all of its facilities. The
objective of each player is to maximize their respective payoff. In this paper
we consider the two players {\it Voronoi game} where the underlying space is a
road network modeled by a graph. In this framework we consider the problem of
finding $k$ optimal facility locations of Player 2 given any placement of $m$
facilities by Player 1. Our main result is a dynamic programming based
polynomial time algorithm for this problem on tree network. On the other hand,
we show that the problem is strongly $\mathcal{NP}$-complete for graphs. This
proves that finding a winning strategy of P2 is $\mathcal{NP}$-complete.
Consequently, we design an $1-\frac{1}{e}$ factor approximation algorithm,
where $e \approx 2.718$.
|
[
{
"version": "v1",
"created": "Thu, 31 Jul 2014 16:14:07 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Bandyapadhyay",
"Sayan",
""
],
[
"Banik",
"Aritra",
""
],
[
"Das",
"Sandip",
""
],
[
"Sarkar",
"Hirak",
""
]
] |
new_dataset
| 0.999299 |
1407.8509
|
Maurizio Bocca Ph.D.
|
Cesare Alippi, Maurizio Bocca, Giacomo Boracchi, Neal Patwari, Manuel
Roveri
|
RTI Goes Wild: Radio Tomographic Imaging for Outdoor People Detection
and Localization
| null | null | null | null |
cs.NI cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
RF sensor networks are used to localize people indoor without requiring them
to wear invasive electronic devices. These wireless mesh networks, formed by
low-power radio transceivers, continuously measure the received signal strength
(RSS) of the links. Radio Tomographic Imaging (RTI) is a technique that
generates 2D images of the change in the electromagnetic field inside the area
covered by the radio transceivers to spot the presence and movements of
animates (e.g., people, large animals) or large metallic objects (e.g., cars).
Here, we present a RTI system for localizing and tracking people outdoors.
Differently than in indoor environments where the RSS does not change
significantly with time unless people are found in the monitored area, the
outdoor RSS signal is time-variant, e.g., due to rainfalls or wind-driven
foliage. We present a novel outdoor RTI method that, despite the nonstationary
noise introduced in the RSS data by the environment, achieves high localization
accuracy and dramatically reduces the energy consumption of the sensing units.
Experimental results demonstrate that the system accurately detects and tracks
a person in real-time in a large forested area under varying environmental
conditions, significantly reducing false positives, localization error and
energy consumption compared to state-of-the-art RTI methods.
|
[
{
"version": "v1",
"created": "Wed, 30 Jul 2014 09:53:06 GMT"
}
] | 2014-08-01T00:00:00 |
[
[
"Alippi",
"Cesare",
""
],
[
"Bocca",
"Maurizio",
""
],
[
"Boracchi",
"Giacomo",
""
],
[
"Patwari",
"Neal",
""
],
[
"Roveri",
"Manuel",
""
]
] |
new_dataset
| 0.999399 |
1406.6667
|
Andrew Crotty
|
Andrew Crotty, Alex Galakatos, Kayhan Dursun, Tim Kraska, Ugur
Cetintemel, Stan Zdonik
|
Tupleware: Redefining Modern Analytics
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a fundamental discrepancy between the targeted and actual users of
current analytics frameworks. Most systems are designed for the data and
infrastructure of the Googles and Facebooks of the world---petabytes of data
distributed across large cloud deployments consisting of thousands of cheap
commodity machines. Yet, the vast majority of users operate clusters ranging
from a few to a few dozen nodes, analyze relatively small datasets of up to a
few terabytes, and perform primarily compute-intensive operations. Targeting
these users fundamentally changes the way we should build analytics systems.
This paper describes the design of Tupleware, a new system specifically aimed
at the challenges faced by the typical user. Tupleware's architecture brings
together ideas from the database, compiler, and programming languages
communities to create a powerful end-to-end solution for data analysis. We
propose novel techniques that consider the data, computations, and hardware
together to achieve maximum performance on a case-by-case basis. Our
experimental evaluation quantifies the impact of our novel techniques and shows
orders of magnitude performance improvement over alternative systems.
|
[
{
"version": "v1",
"created": "Wed, 25 Jun 2014 19:06:15 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2014 12:49:08 GMT"
}
] | 2014-07-31T00:00:00 |
[
[
"Crotty",
"Andrew",
""
],
[
"Galakatos",
"Alex",
""
],
[
"Dursun",
"Kayhan",
""
],
[
"Kraska",
"Tim",
""
],
[
"Cetintemel",
"Ugur",
""
],
[
"Zdonik",
"Stan",
""
]
] |
new_dataset
| 0.984826 |
1407.4885
|
Yves-Alexandre de Montjoye
|
Yves-Alexandre de Montjoye, Zbigniew Smoreda, Romain Trinquart, Cezary
Ziemlicki, Vincent D. Blondel
|
D4D-Senegal: The Second Mobile Phone Data for Development Challenge
| null | null | null | null |
cs.CY cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The D4D-Senegal challenge is an open innovation data challenge on anonymous
call patterns of Orange's mobile phone users in Senegal. The goal of the
challenge is to help address society development questions in novel ways by
contributing to the socio-economic development and well-being of the Senegalese
population. Participants to the challenge are given access to three mobile
phone datasets. This paper describes the three datasets. The datasets are based
on Call Detail Records (CDR) of phone calls and text exchanges between more
than 9 million of Orange's customers in Senegal between January 1, 2013 to
December 31, 2013. The datasets are: (1) antenna-to-antenna traffic for 1666
antennas on an hourly basis, (2) fine-grained mobility data on a rolling 2-week
basis for a year with bandicoot behavioral indicators at individual level for
about 300,000 randomly sampled users, (3) one year of coarse-grained mobility
data at arrondissement level with bandicoot behavioral indicators at individual
level for about 150,000 randomly sampled users
|
[
{
"version": "v1",
"created": "Fri, 18 Jul 2014 05:07:49 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jul 2014 13:13:59 GMT"
}
] | 2014-07-31T00:00:00 |
[
[
"de Montjoye",
"Yves-Alexandre",
""
],
[
"Smoreda",
"Zbigniew",
""
],
[
"Trinquart",
"Romain",
""
],
[
"Ziemlicki",
"Cezary",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
new_dataset
| 0.999626 |
1407.7733
|
Vlasis Barousis I
|
Vlasis I. Barousis, Mohammad A. Sedaghat, Ralf R. M\"uller and
Constantinos B. Papadias
|
Massive Antenna Arrays with Low Front-End Hardware Complexity: An
Enabling Technology for the Emerging Small Cell and Distributed Network
Architectures
|
10 pages, 4 figures
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the current state-of-the-art of massive antenna array
architectures with significant front-end hardware savings, as an enabler for
future small and powerful cell nodes that will be able to carry massive MIMO
technology. Radio frequency (RF) hardware architectures with a single power
amplifier are reviewed, compared, and found superior to conventional MIMO
implementations in terms of cost, dissipated heat, and physical size. This
progress on the RF-side allows to merge the two competing cellular concepts of
virtual and massive MIMO into a hybrid approach of remote radio heads with
massive MIMO arrays.
|
[
{
"version": "v1",
"created": "Tue, 29 Jul 2014 14:19:19 GMT"
}
] | 2014-07-30T00:00:00 |
[
[
"Barousis",
"Vlasis I.",
""
],
[
"Sedaghat",
"Mohammad A.",
""
],
[
"Müller",
"Ralf R.",
""
],
[
"Papadias",
"Constantinos B.",
""
]
] |
new_dataset
| 0.996632 |
1407.7737
|
Ke Ding
|
Ke Ding and Ying Tan
|
A CUDA-Based Real Parameter Optimization Benchmark
| null | null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Benchmarking is key for developing and comparing optimization algorithms. In
this paper, a CUDA-based real parameter optimization benchmark (cuROB) is
introduced. Test functions of diverse properties are included within cuROB and
implemented efficiently with CUDA. Speedup of one order of magnitude can be
achieved in comparison with CPU-based benchmark of CEC'14.
|
[
{
"version": "v1",
"created": "Tue, 29 Jul 2014 14:26:57 GMT"
}
] | 2014-07-30T00:00:00 |
[
[
"Ding",
"Ke",
""
],
[
"Tan",
"Ying",
""
]
] |
new_dataset
| 0.999035 |
1307.4744
|
Ahmed El Shafie
|
Ahmed El Shafie, Tamer Khattab, Amr El-Keyi and Mohamed Nafie
|
On the Coexistence of a Primary User with an Energy Harvesting Secondary
User: A Case of Cognitive Cooperation
|
Accepted for publication in Wireless Communications & Mobile
Computing (WCMC)
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a cognitive scenario where an energy harvesting
secondary user (SU) shares the spectrum with a primary user (PU). The secondary
source helps the primary source in delivering its undelivered packets during
periods of silence of the primary source. The primary source has a queue for
storing its data packets, whereas the secondary source has two data queues; a
queue for storing its own packets and the other for storing the fraction of the
undelivered primary packets accepted for relaying. The secondary source is
assumed to be a battery-based node which harvests energy packets from the
environment. In addition to its data queues, the SU has an energy queue to
store the harvested energy packets. The secondary energy packets are used for
primary packets decoding and data packets transmission. More specifically, if
the secondary energy queue is empty, the secondary source can neither help the
primary source nor transmit a packet from the data queues. The energy queue is
modeled as a discrete time queue with Markov arrival and service processes. Due
to the interaction of the queues, we provide inner and outer bounds on the
stability region of the proposed system. We investigate the impact of the
energy arrival rate on the stability region. Numerical results show the
significant gain of cooperation.
|
[
{
"version": "v1",
"created": "Sat, 6 Jul 2013 16:54:06 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jul 2013 22:24:02 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Feb 2014 19:12:57 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Jul 2014 01:14:18 GMT"
}
] | 2014-07-29T00:00:00 |
[
[
"Shafie",
"Ahmed El",
""
],
[
"Khattab",
"Tamer",
""
],
[
"El-Keyi",
"Amr",
""
],
[
"Nafie",
"Mohamed",
""
]
] |
new_dataset
| 0.991521 |
1404.7809
|
Andrei Khrennikov Yu
|
Irina Basieva and Andrei Khrennikov
|
Quantum(-like) common knowledge: Binmore-Brandenburger operator approach
|
presented at the conference Quantum Interaction 2014, Filzbach,
Switzerland, June 29- July 3, 2014
| null | null | null |
cs.LO q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the detailed account of the quantum(-like) viewpoint to common
knowledge. The Binmore-Brandenburger operator approach to the notion of common
knowledge is extended to the quantum case. We develop a special quantum(-like)
model of common knowledge based on information representations of agents which
can be operationally represented by Hermitian operators. For simplicity, we
assume that each agent constructs her/his information representation by using
just one operator. However, different agents use in general representations
based on noncommuting operators, i.e., incompatible representations. The
quantum analog of basic system of common knowledge features ${\cal K}1-{\cal
K}5$ is derived.
|
[
{
"version": "v1",
"created": "Fri, 4 Apr 2014 09:34:27 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Jul 2014 04:19:53 GMT"
}
] | 2014-07-29T00:00:00 |
[
[
"Basieva",
"Irina",
""
],
[
"Khrennikov",
"Andrei",
""
]
] |
new_dataset
| 0.994741 |
1406.1881
|
Leonid Pishchulin
|
Leonid Pishchulin, Mykhaylo Andriluka, Bernt Schiele
|
Fine-grained Activity Recognition with Holistic and Pose based Features
|
12 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Holistic methods based on dense trajectories are currently the de facto
standard for recognition of human activities in video. Whether holistic
representations will sustain or will be superseded by higher level video
encoding in terms of body pose and motion is the subject of an ongoing debate.
In this paper we aim to clarify the underlying factors responsible for good
performance of holistic and pose-based representations. To that end we build on
our recent dataset leveraging the existing taxonomy of human activities. This
dataset includes 24,920 video snippets covering 410 human activities in total.
Our analysis reveals that holistic and pose-based methods are highly
complementary, and their performance varies significantly depending on the
activity. We find that holistic methods are mostly affected by the number and
speed of trajectories, whereas pose-based methods are mostly influenced by
viewpoint of the person. We observe striking performance differences across
activities: for certain activities results with pose-based features are more
than twice as accurate compared to holistic features, and vice versa. The best
performing approach in our comparison is based on the combination of holistic
and pose-based approaches, which again underlines their complementarity.
|
[
{
"version": "v1",
"created": "Sat, 7 Jun 2014 10:07:24 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jul 2014 14:55:23 GMT"
}
] | 2014-07-29T00:00:00 |
[
[
"Pishchulin",
"Leonid",
""
],
[
"Andriluka",
"Mykhaylo",
""
],
[
"Schiele",
"Bernt",
""
]
] |
new_dataset
| 0.999656 |
1407.7091
|
Andrew Barry
|
Andrew J. Barry and Russ Tedrake
|
Pushbroom Stereo for High-Speed Navigation in Cluttered Environments
| null | null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel stereo vision algorithm that is capable of obstacle
detection on a mobile-CPU processor at 120 frames per second. Our system
performs a subset of standard block-matching stereo processing, searching only
for obstacles at a single depth. By using an onboard IMU and state-estimator,
we can recover the position of obstacles at all other depths, building and
updating a full depth-map at framerate.
Here, we describe both the algorithm and our implementation on a high-speed,
small UAV, flying at over 20 MPH (9 m/s) close to obstacles. The system
requires no external sensing or computation and is, to the best of our
knowledge, the first high-framerate stereo detection system running onboard a
small UAV.
|
[
{
"version": "v1",
"created": "Sat, 26 Jul 2014 03:49:22 GMT"
}
] | 2014-07-29T00:00:00 |
[
[
"Barry",
"Andrew J.",
""
],
[
"Tedrake",
"Russ",
""
]
] |
new_dataset
| 0.979009 |
1407.7423
|
Micha{\l} Karpi\'nski
|
Micha{\l} Karpi\'nski
|
Vertex 2-coloring without monochromatic cycles
| null | null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study a problem of vertex two-coloring of undirected graph
such that there is no monochromatic cycle of given length. We show that this
problem is hard to solve. We give a proof by presenting a reduction from
variation of satisfiability (SAT) problem. We show nice properties of coloring
cliques with two colors which plays pivotal role in the reduction construction.
|
[
{
"version": "v1",
"created": "Mon, 28 Jul 2014 14:07:09 GMT"
}
] | 2014-07-29T00:00:00 |
[
[
"Karpiński",
"Michał",
""
]
] |
new_dataset
| 0.978495 |
1407.7011
|
Hamidreza Arjmandi
|
Hamidreza Arjmandi, Farshad Lahouti
|
A Key Pre-Distribution Scheme based on Multiple Block Codes for Wireless
Sensor Networks
| null | null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key pre-distribution scheme (KPS) based on multiple codewords of block
codes is presented for wireless sensor networks. The connectivity and security
of the proposed KPS, quantified in terms of probabilities of sharing common
keys for communications of pairs of nodes and their resilience against
colluding nodes, are analytically assessed. The analysis is applicable to both
linear and nonlinear codes and is simplified in the case of maximum distance
separable codes. It is shown that the multiplicity of codes significantly
enhances the security and connectivity of KPS at the cost of a modest increase
of the nodes storage. Numerical and simulation results are provided, which
sheds light on the effect of system parameters of the proposed KPS on its
complexity and performance. Specifically, it is shown that the probability of
resilience of secure pairs against collusion of other nodes only reduces slowly
as the number of colluding nodes increase.
|
[
{
"version": "v1",
"created": "Fri, 25 Jul 2014 19:22:36 GMT"
}
] | 2014-07-28T00:00:00 |
[
[
"Arjmandi",
"Hamidreza",
""
],
[
"Lahouti",
"Farshad",
""
]
] |
new_dataset
| 0.999172 |
1206.2775
|
Gabriele D'Angelo
|
Luca Toscano, Gabriele D'Angelo, Moreno Marzolla
|
Parallel Discrete Event Simulation with Erlang
|
Proceedings of ACM SIGPLAN Workshop on Functional High-Performance
Computing (FHPC 2012) in conjunction with ICFP 2012. ISBN: 978-1-4503-1577-7
| null |
10.1145/2364474.2364487
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discrete Event Simulation (DES) is a widely used technique in which the state
of the simulator is updated by events happening at discrete points in time
(hence the name). DES is used to model and analyze many kinds of systems,
including computer architectures, communication networks, street traffic, and
others. Parallel and Distributed Simulation (PADS) aims at improving the
efficiency of DES by partitioning the simulation model across multiple
processing elements, in order to enabling larger and/or more detailed studies
to be carried out. The interest on PADS is increasing since the widespread
availability of multicore processors and affordable high performance computing
clusters. However, designing parallel simulation models requires considerable
expertise, the result being that PADS techniques are not as widespread as they
could be. In this paper we describe ErlangTW, a parallel simulation middleware
based on the Time Warp synchronization protocol. ErlangTW is entirely written
in Erlang, a concurrent, functional programming language specifically targeted
at building distributed systems. We argue that writing parallel simulation
models in Erlang is considerably easier than using conventional programming
languages. Moreover, ErlangTW allows simulation models to be executed either on
single-core, multicore and distributed computing architectures. We describe the
design and prototype implementation of ErlangTW, and report some preliminary
performance results on multicore and distributed architectures using the well
known PHOLD benchmark.
|
[
{
"version": "v1",
"created": "Wed, 13 Jun 2012 12:12:21 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Dec 2012 07:30:40 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Jul 2014 08:38:15 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Toscano",
"Luca",
""
],
[
"D'Angelo",
"Gabriele",
""
],
[
"Marzolla",
"Moreno",
""
]
] |
new_dataset
| 0.993407 |
1405.1794
|
Anshul Sawant
|
Melika Abolhassani and MohammadHossein Bateni and MohammadTaghi
Hajiaghayi and Hamid Mahini and Anshul Sawant
|
Network Cournot Competition
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cournot competition is a fundamental economic model that represents firms
competing in a single market of a homogeneous good. Each firm tries to maximize
its utility---a function of the production cost as well as market price of the
product---by deciding on the amount of production. In today's dynamic and
diverse economy, many firms often compete in more than one market
simultaneously, i.e., each market might be shared among a subset of these
firms. In this situation, a bipartite graph models the access restriction where
firms are on one side, markets are on the other side, and edges demonstrate
whether a firm has access to a market or not. We call this game \emph{Network
Cournot Competition} (NCC). In this paper, we propose algorithms for finding
pure Nash equilibria of NCC games in different situations. First, we carefully
design a potential function for NCC, when the price functions for markets are
linear functions of the production in that market. However, for nonlinear price
functions, this approach is not feasible. We model the problem as a nonlinear
complementarity problem in this case, and design a polynomial-time algorithm
that finds an equilibrium of the game for strongly convex cost functions and
strongly monotone revenue functions. We also explore the class of price
functions that ensures strong monotonicity of the revenue function, and show it
consists of a broad class of functions. Moreover, we discuss the uniqueness of
equilibria in both of these cases which means our algorithms find the unique
equilibria of the games. Last but not least, when the cost of production in one
market is independent from the cost of production in other markets for all
firms, the problem can be separated into several independent classical
\emph{Cournot Oligopoly} problems. We give the first combinatorial algorithm
for this widely studied problem.
|
[
{
"version": "v1",
"created": "Thu, 8 May 2014 03:08:17 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2014 21:48:57 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Abolhassani",
"Melika",
""
],
[
"Bateni",
"MohammadHossein",
""
],
[
"Hajiaghayi",
"MohammadTaghi",
""
],
[
"Mahini",
"Hamid",
""
],
[
"Sawant",
"Anshul",
""
]
] |
new_dataset
| 0.996756 |
1406.0907
|
Joseph Haraldson
|
Mark Giesbrecht and Joseph Haraldson
|
Computing GCRDs of Approximate Differential Polynomials
|
To appear, Workshop on Symbolic-Numeric Computing (SNC'14) July 2014
| null | null | null |
cs.SC cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Differential (Ore) type polynomials with approximate polynomial coefficients
are introduced. These provide a useful representation of approximate
differential operators with a strong algebraic structure, which has been used
successfully in the exact, symbolic, setting. We then present an algorithm for
the approximate Greatest Common Right Divisor (GCRD) of two approximate
differential polynomials, which intuitively is the differential operator whose
solutions are those common to the two inputs operators. More formally, given
approximate differential polynomials $f$ and $g$, we show how to find "nearby"
polynomials $\widetilde f$ and $\widetilde g$ which have a non-trivial GCRD.
Here "nearby" is under a suitably defined norm. The algorithm is a
generalization of the SVD-based method of Corless et al. (1995) for the
approximate GCD of regular polynomials. We work on an appropriately
"linearized" differential Sylvester matrix, to which we apply a block SVD. The
algorithm has been implemented in Maple and a demonstration of its robustness
is presented.
|
[
{
"version": "v1",
"created": "Tue, 3 Jun 2014 23:52:08 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2014 23:23:11 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Giesbrecht",
"Mark",
""
],
[
"Haraldson",
"Joseph",
""
]
] |
new_dataset
| 0.96817 |
1407.6416
|
Toru Araki
|
Toru Araki, Shingo Osawa, Takashi Shimizu
|
On the distance preserving trees in graphs
|
6 pages
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a vertex $v$ of a graph $G$, a spanning tree $T$ of $G$ is
distance-preserving from $v$ if, for any vertex $w$, the distance from $v$ to
$w$ on $T$ is the same as the distance from $v$ to $w$ on $G$. If two vertices
$u$ and $v$ are distinct, then two distance-preserving spanning trees $T_{u}$
from $u$ and $T_{v}$ from $v$ are distinct in general. A purpose of this paper
is to give a characterization for a given weighted graph $G$ to have a spanning
tree $T$ such that $T$ is a distance-preserving spanning tree from distinct two
vertices.
|
[
{
"version": "v1",
"created": "Thu, 24 Jul 2014 01:01:35 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Araki",
"Toru",
""
],
[
"Osawa",
"Shingo",
""
],
[
"Shimizu",
"Takashi",
""
]
] |
new_dataset
| 0.991581 |
1407.6507
|
Kazi Sakib
|
Kazi Sakib, Mosaddek Hossain Kamal and Upama Kabir
|
A New Routing Protocol for All Optical Network
|
10 Pages
|
Dhaka University Journal of Science, Bangladesh, Vol. 53, No. 2,
July 2005, pp. 1-10
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this research paper, an efficient routing protocol for all optical network
(AOL) is proposed. The technique uses wavelength division multiplexing (WDM).
The proposed one is different from the conventional AOL protocol in
transmission of data and control over optical fiber. A set of wavelengths is
reserved to transfer control information, which is defined as control
wavelengths. Control wavelengths are routed with packet routing scheme and the
others are routed with wavelength routing scheme. In connection oriented
network only the control packets are sent with the control wavelengths, data or
messages are sent with other wavelengths. On the other hand, in datagram
network, all the packets are sent with the control wavelengths. The allocation
of wavelengths may be fully dynamic.
|
[
{
"version": "v1",
"created": "Thu, 24 Jul 2014 09:38:52 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Sakib",
"Kazi",
""
],
[
"Kamal",
"Mosaddek Hossain",
""
],
[
"Kabir",
"Upama",
""
]
] |
new_dataset
| 0.998746 |
1407.6655
|
Jerome Delatour
|
Fr\'ed\'eric Thomas (LISE), J\'er\^ome Delatour, Fran\c{c}ois Terrier
(LIST), Matthias Brun, S\'ebastien G\'erard
|
Contribution \`a la mod\'elisation explicite des plates-formes
d'ex\'ecution pour l'IDM
|
23 pages, in French
|
L'Objet, logiciel, base de donn\'ees, r\'eseaux (RSTI s\'erie) 13,
4 (2007) 9-31
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One foundation of the model driven engineering (MDE) is to separate the
modelling application description from its technological implementation (i.e.
platform). Some of them are dedicated to the system execution. Hence, one
promise solution of the MDE is to automate transformations from platform
independent models to platform specific models. Little work has explicitly
described platform characteristics. Yet, an explicit modelling allows taking in
account their characteristics more easily (par ex., performances,
maintainability,portability). This paper presents both an execution platform
modelling state of art and a pattern to describe execution platform modelling
framework. It intends to confirm the feasibility and the interests in
describing an execution platform metamodel.
|
[
{
"version": "v1",
"created": "Thu, 24 Jul 2014 17:23:49 GMT"
}
] | 2014-07-25T00:00:00 |
[
[
"Thomas",
"Frédéric",
"",
"LISE"
],
[
"Delatour",
"Jérôme",
"",
"LIST"
],
[
"Terrier",
"François",
"",
"LIST"
],
[
"Brun",
"Matthias",
""
],
[
"Gérard",
"Sébastien",
""
]
] |
new_dataset
| 0.981337 |
1406.3209
|
Raghu Vamsi Potukuchi
|
Raghu Vamsi.P, Payal Khurana Batra and Krishna Kant
|
BT-GPSR: An Integrated Trust Model for Secure Geographic Routing in
Wireless Sensor Networks
|
The paper has been withdrawn due to improper display of equations
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
Geographic routing offers guaranteed packet deliv- ery in a dense network. In
this routing, packets are forwarded to a node which is nearer to the
destination with an extensive use of location information. However, research
studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs)
have shown that packet delivery percentage can degrade substantially when
malicious nodes are found in the network. Conventional cryptography techniques
can be adopted in order to deal with ma- licious nodes, but they cannot
mitigate outsider attacks. In recent years, a societal pattern called trust is
used as a tool to mitigate security attacks. Numerous researchers have proposed
security solutions by adopting trust in routing algorithms. However, each
solution has its own strength and weakness. In this paper, an integrated
approach by using reputation and weight based trust systems backed by Greedy
Perimeter Stateless Routing (BT-GPSR) is presented. The proposed approach
outperforms the conventional reputation and weight based methods. The
effectiveness of the proposed BT-GPSR is validated through simulation.
|
[
{
"version": "v1",
"created": "Thu, 12 Jun 2014 12:18:30 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jul 2014 17:36:43 GMT"
}
] | 2014-07-24T00:00:00 |
[
[
"P",
"Raghu Vamsi.",
""
],
[
"Batra",
"Payal Khurana",
""
],
[
"Kant",
"Krishna",
""
]
] |
new_dataset
| 0.998318 |
1407.6062
|
F\'abio Botelho
|
F\'abio Botelho, Alysson Bessani, Fernando M. V. Ramos, Paulo Ferreira
|
SMaRtLight: A Practical Fault-Tolerant SDN Controller
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The increase in the number of SDN-based deployments in production networks is
triggering the need to consider fault-tolerant designs of controller
architectures. Commercial SDN controller solutions incorporate fault tolerance,
but there has been little discussion in the SDN literature on the design of
such systems and the tradeoffs involved. To fill this gap, we present a
by-construction design of a fault-tolerant controller, and materialize it by
proposing and formalizing a practical architecture for small to medium-sized
scale networks. A central component of our particular design is a replicated
shared database that stores all network state. Contrary to the more common
primary-backup approaches, the proposed design guarantees a smooth transition
in case of failures and avoids the need of an additional coordination service.
Our preliminary results show that the performance of our solution fulfills the
demands of the target networks. We hope this paper to be a first step in what
we consider a necessary discussion on how to build robust SDNs.
|
[
{
"version": "v1",
"created": "Tue, 22 Jul 2014 22:45:43 GMT"
}
] | 2014-07-24T00:00:00 |
[
[
"Botelho",
"Fábio",
""
],
[
"Bessani",
"Alysson",
""
],
[
"Ramos",
"Fernando M. V.",
""
],
[
"Ferreira",
"Paulo",
""
]
] |
new_dataset
| 0.999604 |
1407.6290
|
Naser Alajmi Mr
|
Naser Alajmi
|
Wireless Sensor Networks Attacks and Solutions
|
4 pages, 3 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A few years ago, wireless sensor networks (WSNs) used by only military. Now,
we have seen many of organizations use WSNs for some purposes such as weather,
pollution, traffic control, and healthcare. Security is becoming on these days
a major concern for wireless sensor network. In this paper I focus on the
security types of attacks and their detection. This paper anatomizes the
security requirements and security attacks in wireless sensor networks. Also,
indicate to the benchmarks for the security in WSNs.
|
[
{
"version": "v1",
"created": "Wed, 23 Jul 2014 16:50:42 GMT"
}
] | 2014-07-24T00:00:00 |
[
[
"Alajmi",
"Naser",
""
]
] |
new_dataset
| 0.989396 |
1311.0801
|
Tad Hogg
|
Tad Hogg
|
Using Surface-Motions for Locomotion of Microscopic Robots in Viscous
Fluids
|
14 figures and two Quicktime animations of the locomotion methods
described in the paper, each showing one period of the motion over a time of
0.5 milliseconds; version 2 has minor clarifications and corrected typos
|
J. of Micro-Bio Robotics 9(3) 61-77 (2014)
|
10.1007/s12213-014-0074-z
| null |
cs.RO physics.bio-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Microscopic robots could perform tasks with high spatial precision, such as
acting in biological tissues on the scale of individual cells, provided they
can reach precise locations. This paper evaluates the feasibility of in vivo
locomotion for micron-size robots. Two appealing methods rely only on surface
motions: steady tangential motion and small amplitude oscillations. These
methods contrast with common microorganism propulsion based on flagella or
cilia, which are more likely to damage nearby cells if used by robots made of
stiff materials. The power potentially available to robots in tissue supports
speeds ranging from one to hundreds of microns per second, over the range of
viscosities found in biological tissue. We discuss design trade-offs among
propulsion method, speed, power, shear forces and robot shape, and relate those
choices to robot task requirements. This study shows that realizing such
locomotion requires substantial improvements in fabrication capabilities and
material properties over current technology.
|
[
{
"version": "v1",
"created": "Mon, 4 Nov 2013 18:21:47 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jul 2014 15:49:23 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Hogg",
"Tad",
""
]
] |
new_dataset
| 0.968962 |
1312.7446
|
Sheng Huang
|
Sheng Huang and Dan Yang and Haopeng Zhang and Luwen Huangfu and
Xiaohong Zhang
|
Shape Primitive Histogram: A Novel Low-Level Face Representation for
Face Recognition
|
second version, two columns and 11 pages
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We further exploit the representational power of Haar wavelet and present a
novel low-level face representation named Shape Primitives Histogram (SPH) for
face recognition. Since human faces exist abundant shape features, we address
the face representation issue from the perspective of the shape feature
extraction. In our approach, we divide faces into a number of tiny shape
fragments and reduce these shape fragments to several uniform atomic shape
patterns called Shape Primitives. A convolution with Haar Wavelet templates is
applied to each shape fragment to identify its belonging shape primitive. After
that, we do a histogram statistic of shape primitives in each spatial local
image patch for incorporating the spatial information. Finally, each face is
represented as a feature vector via concatenating all the local histograms of
shape primitives. Four popular face databases, namely ORL, AR, Yale-B and LFW-a
databases, are employed to evaluate SPH and experimentally study the choices of
the parameters. Extensive experimental results demonstrate that the proposed
approach outperform the state-of-the-arts.
|
[
{
"version": "v1",
"created": "Sat, 28 Dec 2013 16:09:59 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Feb 2014 00:36:10 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Jul 2014 02:37:56 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Huang",
"Sheng",
""
],
[
"Yang",
"Dan",
""
],
[
"Zhang",
"Haopeng",
""
],
[
"Huangfu",
"Luwen",
""
],
[
"Zhang",
"Xiaohong",
""
]
] |
new_dataset
| 0.999618 |
1404.3263
|
Borhan Sanandaji
|
Borhan M. Sanandaji and Pravin P. Varaiya
|
Compressive Origin-Destination Matrix Estimation
| null | null | null | null |
cs.SY math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents an approach to estimate Origin-Destination (OD) flows and
their path splits, based on traffic counts on links in the network. The
approach called Compressive Origin-Destination Estimation (CODE) is inspired by
Compressive Sensing (CS) techniques. Even though the estimation problem is
underdetermined, CODE recovers the unknown variables exactly when the number of
alternative paths for each OD pair is small. Noiseless, noisy, and weighted
versions of CODE are illustrated for synthetic networks, and with real data for
a small region in East Providence. CODE's versatility is suggested by its use
to estimate the number of vehicles and the Vehicle-Miles Traveled (VMT) using
link counts.
|
[
{
"version": "v1",
"created": "Sat, 12 Apr 2014 07:32:28 GMT"
},
{
"version": "v2",
"created": "Fri, 16 May 2014 22:31:56 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Jul 2014 06:18:28 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Sanandaji",
"Borhan M.",
""
],
[
"Varaiya",
"Pravin P.",
""
]
] |
new_dataset
| 0.993937 |
1407.5111
|
Sumit Agarwal
|
Harsh Ranjan, Sumit Agarwal, Niraj Kumar Singh
|
Design and Analysis of RS Sort
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new comparison base stable sorting algorithm, named
RS sort. RS Sort involves only the comparison of pair of elements in an array
which ultimately sorts the array and does not involve the comparison of each
element with every other element. RS sort tries to build upon the relationship
established between the elements in each pass. Suppose there is an array
containing three elements a1, a2, a3 and if a relationship exist such that
a1<a2 and a2<a3 then it can be established that a1<a3 and so there is no need
to compare a1 and a3. Sorting is a fundamental operation in computer science.
RS sort is analyzed both theoretically and empirically. We have performed its
Empirical analysis and compared its performance with the well-known quick sort
for various input types.
|
[
{
"version": "v1",
"created": "Fri, 18 Jul 2014 20:38:18 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jul 2014 13:54:56 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Ranjan",
"Harsh",
""
],
[
"Agarwal",
"Sumit",
""
],
[
"Singh",
"Niraj Kumar",
""
]
] |
new_dataset
| 0.998086 |
1407.5670
|
Raphael kena Poss
|
Raphael Poss
|
Rust for functional programmers
|
17 pages
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article provides an introduction to Rust, a systems language by Mozilla,
to programmers already familiar with Haskell, OCaml or other functional
languages.
|
[
{
"version": "v1",
"created": "Mon, 21 Jul 2014 21:20:31 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Poss",
"Raphael",
""
]
] |
new_dataset
| 0.99419 |
1407.5819
|
Georg Struth
|
Hitoshi Furusawa and Georg Struth
|
Concurrent Dynamic Algebra
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We reconstruct Peleg's concurrent dynamic logic in the context of modal
Kleene algebras. We explore the algebraic structure of its multirelational
semantics and develop an abstract axiomatisation of concurrent dynamic algebras
from that basis. In this axiomatisation, sequential composition is not
associative. It interacts with concurrent composition through a weak
distributivity law. The modal operators of concurrent dynamic algebra are
obtained from abstract axioms for domain and antidomain operators; the Kleene
star is modelled as a least fixpoint. Algebraic variants of Peleg's axioms are
shown to be valid in these algebras and their soundness is proved relative to
the multirelational model. Additional results include iteration principles for
the Kleene star and a refutation of variants of Segerberg's axiom in the
multirelational setting. The most important results have been verified formally
with Isabelle/HOL.
|
[
{
"version": "v1",
"created": "Tue, 22 Jul 2014 11:18:47 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Furusawa",
"Hitoshi",
""
],
[
"Struth",
"Georg",
""
]
] |
new_dataset
| 0.989355 |
1407.5947
|
Stefano Buzzi
|
Paolo Banelli, Stefano Buzzi, Giulio Colavolpe, Andrea Modenini,
Fredrik Rusek, and Alessandro Ugolini
|
Modulation Formats and Waveforms for the Physical Layer of 5G Wireless
Networks: Who Will be the Heir of OFDM?
|
to appear IEEE Signal Processing Magazine, special issue on Signal
Processing for the 5G Revolution, November 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
5G cellular communications promise to deliver the gigabit experience to
mobile users, with a capacity increase of up to three orders of magnitude with
respect to current LTE systems. There is widespread agreement that such an
ambitious goal will be realized through a combination of innovative techniques
involving different network layers. At the physical layer, the OFDM modulation
format, along with its multiple-access strategy OFDMA, is not taken for
granted, and several alternatives promising larger values of spectral
efficiency are being considered. This paper provides a review of some
modulation formats suited for 5G, enriched by a comparative analysis of their
performance in a cellular environment, and by a discussion on their
interactions with specific 5G ingredients. The interaction with a massive MIMO
system is also discussed by employing real channel measurements.
|
[
{
"version": "v1",
"created": "Tue, 22 Jul 2014 17:17:25 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Banelli",
"Paolo",
""
],
[
"Buzzi",
"Stefano",
""
],
[
"Colavolpe",
"Giulio",
""
],
[
"Modenini",
"Andrea",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Ugolini",
"Alessandro",
""
]
] |
new_dataset
| 0.955812 |
1407.5961
|
EPTCS
|
Romain Brenguier (Universit\'e Libre de Bruxelles), Guillermo A.
P\'erez (Universit\'e Libre de Bruxelles), Jean-Fran\c{c}ois Raskin
(Universit\'e Libre de Bruxelles), Ocan Sankur (Universit\'e Libre de
Bruxelles)
|
AbsSynthe: abstract synthesis from succinct safety specifications
|
In Proceedings SYNT 2014, arXiv:1407.4937
|
EPTCS 157, 2014, pp. 100-116
|
10.4204/EPTCS.157.11
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe a synthesis algorithm for safety specifications
described as circuits. Our algorithm is based on fixpoint computations,
abstraction and refinement, it uses binary decision diagrams as symbolic data
structure. We evaluate our tool on the benchmarks provided by the organizers of
the synthesis competition organized within the SYNT'14 workshop.
|
[
{
"version": "v1",
"created": "Mon, 21 Jul 2014 07:28:59 GMT"
}
] | 2014-07-23T00:00:00 |
[
[
"Brenguier",
"Romain",
"",
"Université Libre de Bruxelles"
],
[
"Pérez",
"Guillermo A.",
"",
"Université Libre de Bruxelles"
],
[
"Raskin",
"Jean-François",
"",
"Université Libre de Bruxelles"
],
[
"Sankur",
"Ocan",
"",
"Université Libre de\n Bruxelles"
]
] |
new_dataset
| 0.99932 |
1407.5136
|
Rodrigo de Lamare
|
J. Liu and R. C. de Lamare
|
Rate-Compatible LDPC Codes Based on Puncturing and Extension Techniques
for Short Block Lengths
|
8 figures, 9 pages, AEU International Journal on Communications and
Electronics, 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate novel strategies for generating rate-compatible
(RC) irregular low-density parity-check (LDPC) codes with short/moderate block
lengths. We propose three puncturing and two extension schemes, which are
designed to determine the puncturing positions that minimize the performance
degradation and the extension that maximize the performance. The first
puncturing scheme employs a counting cycle algorithm and a grouping strategy
for variable nodes having short cycles of equal length in the Tanner Graph
(TG). The second scheme relies on a metric called Extrinsic Message Degree
(EMD) and the third scheme is a simulation-based exhaustive search to find the
best puncturing pattern among several random ones. In addition, we devise two
layer-structured extension schemes based on a counting cycle algorithm and an
EMD metric which are applied to design RC-LDPC codes. Simulation results show
that the proposed extension and puncturing techniques achieve greater rate
flexibility and good performance over the additive white Gaussian noise (AWGN)
channel, outperforming existing techniques.
|
[
{
"version": "v1",
"created": "Sat, 19 Jul 2014 00:55:12 GMT"
}
] | 2014-07-22T00:00:00 |
[
[
"Liu",
"J.",
""
],
[
"de Lamare",
"R. C.",
""
]
] |
new_dataset
| 0.955613 |
1407.5173
|
Deepu John
|
C.J.Deepu
|
An ECG-SoC with 535nW/channel lossless data compression for wearable
sensors
| null | null | null | null |
cs.AR
|
http://creativecommons.org/licenses/by/3.0/
|
This paper presents a low power ECG recording Sys-tem-on-Chip (SoC) with
on-chip low complexity lossless ECG compression for data reduction in
wireless/ambulatory ECG sensor devices. The proposed algorithm uses a linear
slope predictor to estimate the ECG samples, and uses a novel low complexity
dynamic coding-packaging scheme to frame the resulting estimation error into
fixed-length 16-bit format. The proposed technique achieves an average
compression ratio of 2.25x on MIT/BIH ECG database. Implemented in 0.35 {\mu}m
process, the compressor uses 0.565 K gates/channel occupying 0.4 mm2 for
4-channel, and consumes 535 nW/channel at 2.4V for ECG sampled at 512 Hz. Small
size and ultra-low power consumption makes the proposed technique suitable for
wearable ECG sensor application.
|
[
{
"version": "v1",
"created": "Sat, 19 Jul 2014 11:42:48 GMT"
}
] | 2014-07-22T00:00:00 |
[
[
"Deepu",
"C. J.",
""
]
] |
new_dataset
| 0.967049 |
1407.5456
|
Manju Kaushik
|
Manju Kaushik
|
Research of Load Testing and Result Based on Loadrunner
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we made the plan of a load testing, and got results by means
of the LoadRunner which is an automatic load testing tool.We combined with the
characteristics of electronic commerce system and did the load testing and
analysis the result of load test by means of the LoadRunner. We fully described
the characteristics of the electronic commerce application, designed the
reasonable test cases,and simulated the practical scenario. In the process of
running Load Runner, we arranged the appropriate transactions and rendezvous,
and designed the truthful test network environment. The plan was applied to the
load testing phase of the telecommunication equipment sales system of special
products. We analyzed the load testing results, proposed the improving
measures, and realized the optimization of the telecommunication equipment
sales system and also found the defect of the system when the massive users
access the system and guided the system improvement using the test result.
|
[
{
"version": "v1",
"created": "Mon, 21 Jul 2014 11:09:21 GMT"
}
] | 2014-07-22T00:00:00 |
[
[
"Kaushik",
"Manju",
""
]
] |
new_dataset
| 0.988755 |
1407.5483
|
Bin Li
|
Bin Li, Hui Shen, David Tse
|
A RM-Polar Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this letter we propose a new hybrid code called "RM-Polar" codes. This new
codes are constructed by combining the construction of Reed-Muller (RM) code
and Polar code. It has much larger minimum Hamming distance than Polar codes,
therefore it has much better error performance than Polar codes.
|
[
{
"version": "v1",
"created": "Mon, 21 Jul 2014 13:15:43 GMT"
}
] | 2014-07-22T00:00:00 |
[
[
"Li",
"Bin",
""
],
[
"Shen",
"Hui",
""
],
[
"Tse",
"David",
""
]
] |
new_dataset
| 0.999892 |
1407.5488
|
Madhumangal Pal Dr.
|
Satyabrata Paul, Madhumangal Pal, Anita Pal
|
L(2,1)-labelling of Circular-arc Graph
|
12 pages
|
Annals of Pure and Applied Mathematics, 5(2) (2014)208-219
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An L(2,1)-labelling of a graph $G=(V, E)$ is $\lambda_{2,1}(G)$ a function
$f$ from the vertex set V (G) to the set of non-negative integers such that
adjacent vertices get numbers at least two apart, and vertices at distance two
get distinct numbers. The L(2,1)-labelling number denoted by $\lambda_{2,1}(G)$
of $G$ is the minimum range of labels over all such labelling. In this article,
it is shown that, for a circular-arc graph $G$, the upper bound of
$\lambda_{2,1}(G)$ is $\Delta+3\omega$, where $\Delta$ and $\omega$ represents
the maximum degree of the vertices and size of maximum clique respectively.
|
[
{
"version": "v1",
"created": "Mon, 21 Jul 2014 13:26:54 GMT"
}
] | 2014-07-22T00:00:00 |
[
[
"Paul",
"Satyabrata",
""
],
[
"Pal",
"Madhumangal",
""
],
[
"Pal",
"Anita",
""
]
] |
new_dataset
| 0.978134 |
1304.5479
|
Ronald de Haan
|
Ronald de Haan, Iyad Kanj, Stefan Szeider
|
Local Backbones
|
A previous version appeared in the proceedings of the 16th
International Conference on Theory and Applications of Satisfiability Testing
(SAT 2013)
|
Proceedings of SAT 2013, LNCS 7962, pp. 377-393, 2013
|
10.1007/978-3-642-39071-5_28
| null |
cs.CC cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A backbone of a propositional CNF formula is a variable whose truth value is
the same in every truth assignment that satisfies the formula. The notion of
backbones for CNF formulas has been studied in various contexts. In this paper,
we introduce local variants of backbones, and study the computational
complexity of detecting them. In particular, we consider k-backbones, which are
backbones for sub-formulas consisting of at most k clauses, and iterative
k-backbones, which are backbones that result after repeated instantiations of
k-backbones. We determine the parameterized complexity of deciding whether a
variable is a k-backbone or an iterative k-backbone for various restricted
formula classes, including Horn, definite Horn, and Krom. We also present some
first empirical results regarding backbones for CNF-Satisfiability (SAT). The
empirical results we obtain show that a large fraction of the backbones of
structured SAT instances are local, in contrast to random instances, which
appear to have few local backbones.
|
[
{
"version": "v1",
"created": "Fri, 19 Apr 2013 16:59:11 GMT"
},
{
"version": "v2",
"created": "Thu, 23 May 2013 14:23:29 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Jul 2014 14:54:29 GMT"
}
] | 2014-07-21T00:00:00 |
[
[
"de Haan",
"Ronald",
""
],
[
"Kanj",
"Iyad",
""
],
[
"Szeider",
"Stefan",
""
]
] |
new_dataset
| 0.989796 |
1312.0455
|
Olga Kupriianova
|
O. Kupriianova, Ch. Lauter, J.-M. Muller
|
Radix Conversion for IEEE754-2008 Mixed Radix Floating-Point Arithmetic
| null | null |
10.1109/ACSSC.2013.6810471
| null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Conversion between binary and decimal floating-point representations is
ubiquitous. Floating-point radix conversion means converting both the exponent
and the mantissa. We develop an atomic operation for FP radix conversion with
simple straight-line algorithm, suitable for hardware design. Exponent
conversion is performed with a small multiplication and a lookup table. It
yields the correct result without error. Mantissa conversion uses a few
multiplications and a small lookup table that is shared amongst all types of
conversions. The accuracy changes by adjusting the computing precision.
|
[
{
"version": "v1",
"created": "Mon, 2 Dec 2013 13:47:14 GMT"
}
] | 2014-07-21T00:00:00 |
[
[
"Kupriianova",
"O.",
""
],
[
"Lauter",
"Ch.",
""
],
[
"Muller",
"J. -M.",
""
]
] |
new_dataset
| 0.997985 |
1407.4898
|
Ghassem Tofighi
|
Ghassem Tofighi, Nasser Ali Afarin, Kamraan Raahemifar, Anastasios N.
Venetsanopoulos
|
Hand Pointing Detection Using Live Histogram Template of Forehead Skin
|
Accepted for oral presentation in DSP2014
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hand pointing detection has multiple applications in many fields such as
virtual reality and control devices in smart homes. In this paper, we proposed
a novel approach to detect pointing vector in 2D space of a room. After
background subtraction, face and forehead is detected. In the second step,
forehead skin H-S plane histograms in HSV space is calculated. By using these
histogram templates of users skin, and back projection method, skin areas are
detected. The contours of hand are extracted using Freeman chain code
algorithm. Next step is finding fingertips. Points in hand contour which are
candidates for the fingertip can be found in convex defects of convex hull and
contour. We introduced a novel method for finding the fingertip based on the
special points on the contour and their relationships. Our approach detects
hand-pointing vectors in live video from a common webcam with 94%TP and 85%TN.
|
[
{
"version": "v1",
"created": "Fri, 18 Jul 2014 07:10:03 GMT"
}
] | 2014-07-21T00:00:00 |
[
[
"Tofighi",
"Ghassem",
""
],
[
"Afarin",
"Nasser Ali",
""
],
[
"Raahemifar",
"Kamraan",
""
],
[
"Venetsanopoulos",
"Anastasios N.",
""
]
] |
new_dataset
| 0.980955 |
1407.4923
|
Wenrui Diao
|
Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang
|
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information
and Control Your Phone
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous research about sensor based attacks on Android platform focused
mainly on accessing or controlling over sensitive device components, such as
camera, microphone and GPS. These approaches get data from sensors directly and
need corresponding sensor invoking permissions.
This paper presents a novel approach (GVS-Attack) to launch permission
bypassing attacks from a zero permission Android application (VoicEmployer)
through the speaker. The idea of GVS-Attack utilizes an Android system built-in
voice assistant module -- Google Voice Search. Through Android Intent
mechanism, VoicEmployer triggers Google Voice Search to the foreground, and
then plays prepared audio files (like "call number 1234 5678") in the
background. Google Voice Search can recognize this voice command and execute
corresponding operations. With ingenious designs, our GVS-Attack can forge
SMS/Email, access privacy information, transmit sensitive data and achieve
remote control without any permission.
Also we found a vulnerability of status checking in Google Search app, which
can be utilized by GVS-Attack to dial arbitrary numbers even when the phone is
securely locked with password. A prototype of VoicEmployer has been implemented
to demonstrate the feasibility of GVS-Attack in real world. In theory, nearly
all Android devices equipped with Google Services Framework can be affected by
GVS-Attack. This study may inspire application developers and researchers
rethink that zero permission doesn't mean safety and the speaker can be treated
as a new attack surface.
|
[
{
"version": "v1",
"created": "Fri, 18 Jul 2014 09:10:33 GMT"
}
] | 2014-07-21T00:00:00 |
[
[
"Diao",
"Wenrui",
""
],
[
"Liu",
"Xiangyu",
""
],
[
"Zhou",
"Zhe",
""
],
[
"Zhang",
"Kehuan",
""
]
] |
new_dataset
| 0.989432 |
1407.3433
|
Abhishek Bhowmick
|
Abhishek Bhowmick, Shachar Lovett
|
List decoding Reed-Muller codes over small fields
|
fixed a bug in the proof of claim 5.6 (now lemma 5.5)
| null | null | null |
cs.CC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The list decoding problem for a code asks for the maximal radius up to which
any ball of that radius contains only a constant number of codewords. The list
decoding radius is not well understood even for well studied codes, like
Reed-Solomon or Reed-Muller codes.
Fix a finite field $\mathbb{F}$. The Reed-Muller code
$\mathrm{RM}_{\mathbb{F}}(n,d)$ is defined by $n$-variate degree-$d$
polynomials over $\mathbb{F}$. In this work, we study the list decoding radius
of Reed-Muller codes over a constant prime field $\mathbb{F}=\mathbb{F}_p$,
constant degree $d$ and large $n$. We show that the list decoding radius is
equal to the minimal distance of the code.
That is, if we denote by $\delta(d)$ the normalized minimal distance of
$\mathrm{RM}_{\mathbb{F}}(n,d)$, then the number of codewords in any ball of
radius $\delta(d)-\varepsilon$ is bounded by $c=c(p,d,\varepsilon)$ independent
of $n$. This resolves a conjecture of Gopalan-Klivans-Zuckerman [STOC 2008],
who among other results proved it in the special case of
$\mathbb{F}=\mathbb{F}_2$; and extends the work of Gopalan [FOCS 2010] who
proved the conjecture in the case of $d=2$.
We also analyse the number of codewords in balls of radius exceeding the
minimal distance of the code. For $e \leq d$, we show that the number of
codewords of $\mathrm{RM}_{\mathbb{F}}(n,d)$ in a ball of radius $\delta(e) -
\varepsilon$ is bounded by $\exp(c \cdot n^{d-e})$, where
$c=c(p,d,\varepsilon)$ is independent of $n$. The dependence on $n$ is tight.
This extends the work of Kaufman-Lovett-Porat [IEEE Inf. Theory 2012] who
proved similar bounds over $\mathbb{F}_2$.
The proof relies on several new ingredients: an extension of the
Frieze-Kannan weak regularity to general function spaces, higher-order Fourier
analysis, and an extension of the Schwartz-Zippel lemma to compositions of
polynomials.
|
[
{
"version": "v1",
"created": "Sun, 13 Jul 2014 05:47:07 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Jul 2014 18:10:59 GMT"
}
] | 2014-07-18T00:00:00 |
[
[
"Bhowmick",
"Abhishek",
""
],
[
"Lovett",
"Shachar",
""
]
] |
new_dataset
| 0.998245 |
1407.4450
|
Carolyn Obiefuna
|
C.A Obiefuna and G.C.Offorma
|
Pre service Teachers Perception of using Mobile Devices in Teaching
Climate Change in Primary Schools
| null | null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The realities of climate change are gradually dawning on everyone including
children. The need for a disaster reduction education requires the use of
mobile technologies to identify some of the impact of climate change within an
environment and create awareness on the dangers associated with climate change.
Since the pre service teachers will teach the primary school pupils, it is apt
that the use of mobile technologies should constitute part of their preparation
while in training. This paper examined pre service teachers perception of using
mobile technologies in teaching climate change in the primary school. One
hundred and fifty (150) pre service teachers in two Colleges of Education in
the erosion disaster zones of Anambra and Imo States in the south eastern state
of Nigeria were used for the study. Three research questions guided the study.
The study utilized a survey approach to collect and analyze the data. The
results from the study show that the pre-service teachers were confident that
the use of mobile devices will create significant climate change awareness.
However, the pre service teachers saw the need for using mobile devices fin
their preparation. Suggestions were made towards ensuring the integration of
mobile technology literacy in the pre service teacher education curriculum.
|
[
{
"version": "v1",
"created": "Wed, 16 Jul 2014 12:32:58 GMT"
}
] | 2014-07-18T00:00:00 |
[
[
"Obiefuna",
"C. A",
""
],
[
"Offorma",
"G. C.",
""
]
] |
new_dataset
| 0.994689 |
1407.4490
|
Shalini Ghosh
|
Shalini Ghosh, Patrick Lincoln, Christian Petersen, Alfonso Valdes
|
Virus Detection in Multiplexed Nanowire Arrays using Hidden Semi-Markov
models
| null | null | null | null |
cs.AI q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the problem of real-time detection of viruses
docking to nanowires, especially when multiple viruses dock to the same
nano-wire. The task becomes more complicated when there is an array of
nanowires coated with different antibodies, where different viruses can dock to
each coated nanowire at different binding strengths. We model the array
response to a viral agent as a pattern of conductance change over nanowires
with known modifier --- this representation permits analysis of the output of
such an array via belief network (Bayes) methods, as well as novel generative
models like the Hidden Semi-Markov Model (HSMM).
|
[
{
"version": "v1",
"created": "Wed, 16 Jul 2014 20:33:11 GMT"
}
] | 2014-07-18T00:00:00 |
[
[
"Ghosh",
"Shalini",
""
],
[
"Lincoln",
"Patrick",
""
],
[
"Petersen",
"Christian",
""
],
[
"Valdes",
"Alfonso",
""
]
] |
new_dataset
| 0.982978 |
1407.4346
|
Nicolas Palix
|
Nicolas Palix (Grenoble 1 UJF, LIG), Ga\"el Thomas (LIP6, INRIA
Paris-Rocquencourt), Suman Saha (LIP6, INRIA Paris-Rocquencourt), Christophe
Calv\`es (LIP6, INRIA Paris-Rocquencourt), Gilles Muller (LIP6, INRIA
Paris-Rocquencourt), Julia L. Lawall (LIP6, INRIA Paris-Rocquencourt)
|
Faults in Linux 2.6
| null |
ACM Transactions on Computer Systems 32, 2 (2014) 1--40
|
10.1145/2619090
| null |
cs.SE cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In August 2011, Linux entered its third decade. Ten years before, Chou et al.
published a study of faults found by applying a static analyzer to Linux
versions 1.0 through 2.4.1. A major result of their work was that the drivers
directory contained up to 7 times more of certain kinds of faults than other
directories. This result inspired numerous efforts on improving the reliability
of driver code. Today, Linux is used in a wider range of environments, provides
a wider range of services, and has adopted a new development and release model.
What has been the impact of these changes on code quality? To answer this
question, we have transported Chou et al.'s experiments to all versions of
Linux 2.6; released between 2003 and 2011. We find that Linux has more than
doubled in size during this period, but the number of faults per line of code
has been decreasing. Moreover, the fault rate of drivers is now below that of
other directories, such as arch. These results can guide further development
and research efforts for the decade to come. To allow updating these results as
Linux evolves, we define our experimental protocol and make our checkers
available.
|
[
{
"version": "v1",
"created": "Wed, 16 Jul 2014 15:35:47 GMT"
}
] | 2014-07-17T00:00:00 |
[
[
"Palix",
"Nicolas",
"",
"Grenoble 1 UJF, LIG"
],
[
"Thomas",
"Gaël",
"",
"LIP6, INRIA\n Paris-Rocquencourt"
],
[
"Saha",
"Suman",
"",
"LIP6, INRIA Paris-Rocquencourt"
],
[
"Calvès",
"Christophe",
"",
"LIP6, INRIA Paris-Rocquencourt"
],
[
"Muller",
"Gilles",
"",
"LIP6, INRIA\n Paris-Rocquencourt"
],
[
"Lawall",
"Julia L.",
"",
"LIP6, INRIA Paris-Rocquencourt"
]
] |
new_dataset
| 0.999821 |
1407.4378
|
Cameron Mura
|
Marcin Cieslik and Cameron Mura
|
PaPy: Parallel and Distributed Data-processing Pipelines in Python
|
7 pages, 5 figures, 2 tables, some use-cases; more at
http://muralab.org/PaPy
| null | null | null |
cs.PL q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
PaPy, which stands for parallel pipelines in Python, is a highly flexible
framework that enables the construction of robust, scalable workflows for
either generating or processing voluminous datasets. A workflow is created from
user-written Python functions (nodes) connected by 'pipes' (edges) into a
directed acyclic graph. These functions are arbitrarily definable, and can make
use of any Python modules or external binaries. Given a user-defined topology
and collection of input data, functions are composed into nested higher-order
maps, which are transparently and robustly evaluated in parallel on a single
computer or on remote hosts. Local and remote computational resources can be
flexibly pooled and assigned to functional nodes, thereby allowing facile
load-balancing and pipeline optimization to maximize computational throughput.
Input items are processed by nodes in parallel, and traverse the graph in
batches of adjustable size -- a trade-off between lazy-evaluation, parallelism,
and memory consumption. The processing of a single item can be parallelized in
a scatter/gather scheme. The simplicity and flexibility of distributed
workflows using PaPy bridges the gap between desktop -> grid, enabling this new
computing paradigm to be leveraged in the processing of large scientific
datasets.
|
[
{
"version": "v1",
"created": "Tue, 15 Jul 2014 03:13:00 GMT"
}
] | 2014-07-17T00:00:00 |
[
[
"Cieslik",
"Marcin",
""
],
[
"Mura",
"Cameron",
""
]
] |
new_dataset
| 0.96705 |
1402.6016
|
Suayb Arslan
|
Suayb S. Arslan
|
Incremental Redundancy, Fountain Codes and Advanced Topics
|
57 pages, 22 figures, Version 0.2
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document is written in order to establish a common base ground on which
the majority of the relevant research about linear fountain codes can be
analyzed and compared. As far as I am concerned, there is no unified approach
that outlines and compares most of the published linear fountain codes in a
single and self-contained framework. This written document has not only
resulted in the review of theoretical fundamentals of efficient coding
techniques for incremental redundancy and linear fountain coding, but also
helped me have a comprehensive reference document and hopefully for many other
graduate students who would like to have some background to pursue a research
career regarding fountain codes and their various applications. Some background
in information, coding, graph and probability theory is expected. Although
various aspects of this topic and many other relevant research are deliberately
left out, I still hope that this document shall serve researchers' need well. I
have also included several exercises to warm up. The presentation style is
usually informal and the presented material is not necessarily rigorous. There
are many spots in the text that are product of my coauthors and myself,
although some of which have not been published yet.
|
[
{
"version": "v1",
"created": "Mon, 24 Feb 2014 23:41:50 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Jul 2014 22:40:31 GMT"
}
] | 2014-07-16T00:00:00 |
[
[
"Arslan",
"Suayb S.",
""
]
] |
new_dataset
| 0.977046 |
1407.3948
|
Denys Matthies
|
Denys J.C. Matthies, Felix M. Manke, Franz M\"uller, Charalampia
Makri, Christoph Anthes, Dieter Kranzlm\"uller
|
VR-Stepper: A Do-It-Yourself Game Interface For Locomotion In Virtual
Environments
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compared to real world tasks, completing tasks in a virtual environment (VE)
seldom involves the whole spectrum of skills the human body offers. User input
in a VE is commonly accomplished through simple finger gestures, such as
walking in a scene by simply pressing a button, even if this kind of
interaction is not very suitable. In order to create a more intuitive and
natural interaction, diverse projects try to tackle the problem of locomotion
in VEs by trying to enable a natural walking movement, which is also supposed
to increase the level of immersion. Existing solutions such as treadmills are
still expensive and need additional fixation of the body. In this paper, we
describe a simple and inexpensive way to build a useful locomotion interface
using a conventional sports stepper and an Arduino. This device enables control
in a VE by walking-in-place and without the need for any additional fixation
gadgets. We conducted a user study with 10 participants to evaluate the
impression on the joy and ease of use, immersion and reliability in comparison
to other interfaces used for locomotion, such as the Wii Balance Board and a
Wand Joystick. We found out that the stepper is experienced slightly better in
terms of immersion and joy of use. Furthermore, found that pressing buttons on
a Joystick was perceived to be more reliable.
|
[
{
"version": "v1",
"created": "Tue, 15 Jul 2014 11:40:10 GMT"
}
] | 2014-07-16T00:00:00 |
[
[
"Matthies",
"Denys J. C.",
""
],
[
"Manke",
"Felix M.",
""
],
[
"Müller",
"Franz",
""
],
[
"Makri",
"Charalampia",
""
],
[
"Anthes",
"Christoph",
""
],
[
"Kranzlmüller",
"Dieter",
""
]
] |
new_dataset
| 0.998442 |
1407.3995
|
Eduardo Silva
|
Carlos A. R. Martins and Eduardo Brandani da Silva
|
Space-Time Codes from Spectral Norm: A Fresh Look
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current research proposes a natural environment for the space-time codes and
in this context it is obtained a new design criterion for space-time codes in
multi-antenna communication channels. The objective of this criterion is to
minimize the pairwise error probability of the maximum likelihood decoder,
endowed with the matrix spectrum norm. The random matrix theory is used and an
approximation function for the probability density function is obtained for the
largest eigenvalue of a Wishart Matrix.
|
[
{
"version": "v1",
"created": "Tue, 15 Jul 2014 13:41:54 GMT"
}
] | 2014-07-16T00:00:00 |
[
[
"Martins",
"Carlos A. R.",
""
],
[
"da Silva",
"Eduardo Brandani",
""
]
] |
new_dataset
| 0.998269 |
1407.4088
|
Frederic Le Mouel
|
Marie-Ange L\`ebre (CITI), Fr\'ed\'eric Le Mou\"el (CITI), Eric
M\'enard, Julien Dillschneider, Richard Denis
|
VANET Applications: Hot Use Cases
| null | null | null | null |
cs.CY cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current challenges of car manufacturers are to make roads safe, to achieve
free flowing traffic with few congestions, and to reduce pollution by an
effective fuel use. To reach these goals, many improvements are performed
in-car, but more and more approaches rely on connected cars with communication
capabilities between cars, with an infrastructure, or with IoT devices.
Monitoring and coordinating vehicles allow then to compute intelligent ways of
transportation. Connected cars have introduced a new way of thinking cars - not
only as a mean for a driver to go from A to B, but as smart cars - a user
extension like the smartphone today. In this report, we introduce concepts and
specific vocabulary in order to classify current innovations or ideas on the
emerging topic of smart car. We present a graphical categorization showing this
evolution in function of the societal evolution. Different perspectives are
adopted: a vehicle-centric view, a vehicle-network view, and a user-centric
view; described by simple and complex use-cases and illustrated by a list of
emerging and current projects from the academic and industrial worlds. We
identified an empty space in innovation between the user and his car:
paradoxically even if they are both in interaction, they are separated through
different application uses. Future challenge is to interlace social concerns of
the user within an intelligent and efficient driving.
|
[
{
"version": "v1",
"created": "Tue, 15 Jul 2014 18:37:39 GMT"
}
] | 2014-07-16T00:00:00 |
[
[
"Lèbre",
"Marie-Ange",
"",
"CITI"
],
[
"Mouël",
"Frédéric Le",
"",
"CITI"
],
[
"Ménard",
"Eric",
""
],
[
"Dillschneider",
"Julien",
""
],
[
"Denis",
"Richard",
""
]
] |
new_dataset
| 0.996833 |
1212.4902
|
Vaneet Aggarwal
|
Mehdi Ashraphijuo and Vaneet Aggarwal and Xiaodong Wang
|
On the Capacity Region and the Generalized Degrees of Freedom Region for
the MIMO Interference Channel with Feedback
|
47 pages, accepted to IEEE Trans. Inf. Th., Sept 2013. arXiv admin
note: text overlap with arXiv:1102.0267 by other authors
|
IEEE Trans. Inf. Th., vol.59, no.12, pp.8357--8376, Dec. 2013
|
10.1109/TIT.2013.2282317
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the effect of feedback on two-user MIMO interference
channels. The capacity region of MIMO interference channels with feedback is
characterized within a constant number of bits, where this constant is
independent of the channel matrices. Further, it is shown that the capacity
region of a MIMO interference channel with feedback and its reciprocal
interference channel are within a constant number of bits. Finally, the
generalized degrees of freedom region for the MIMO interference channel with
feedback is characterized.
|
[
{
"version": "v1",
"created": "Thu, 20 Dec 2012 01:35:23 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Sep 2013 21:04:51 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Ashraphijuo",
"Mehdi",
""
],
[
"Aggarwal",
"Vaneet",
""
],
[
"Wang",
"Xiaodong",
""
]
] |
new_dataset
| 0.987408 |
1301.3376
|
Gabriele Fici
|
Gabriele Fici, Luca Q. Zamboni
|
On the least number of palindromes contained in an infinite word
|
Accepted for publication in Theoretical Computer Science
|
Theoretical Computer Science, 481: 1-8 (2013)
|
10.1016/j.tcs.2013.02.013
| null |
cs.DM cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the least number of palindromic factors in an infinite word.
We first consider general alphabets, and give answers to this problem for
periodic and non-periodic words, closed or not under reversal of factors. We
then investigate the same problem when the alphabet has size two.
|
[
{
"version": "v1",
"created": "Tue, 15 Jan 2013 15:04:04 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Feb 2013 16:32:50 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Fici",
"Gabriele",
""
],
[
"Zamboni",
"Luca Q.",
""
]
] |
new_dataset
| 0.99374 |
1305.1912
|
Alexander Mamonov V
|
Alexander V. Mamonov, Isabel N. Figueiredo, Pedro N. Figueiredo,
Yen-Hsi Richard Tsai
|
Automated polyp detection in colon capsule endoscopy
|
16 pages, 9 figures, 4 tables
|
IEEE Transactions on Medical Imaging 33(7):1488-1502, 2014
|
10.1109/TMI.2014.2314959
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Colorectal polyps are important precursors to colon cancer, a major health
problem. Colon capsule endoscopy (CCE) is a safe and minimally invasive
examination procedure, in which the images of the intestine are obtained via
digital cameras on board of a small capsule ingested by a patient. The video
sequence is then analyzed for the presence of polyps. We propose an algorithm
that relieves the labor of a human operator analyzing the frames in the video
sequence. The algorithm acts as a binary classifier, which labels the frame as
either containing polyps or not, based on the geometrical analysis and the
texture content of the frame. The geometrical analysis is based on a
segmentation of an image with the help of a mid-pass filter. The features
extracted by the segmentation procedure are classified according to an
assumption that the polyps are characterized as protrusions that are mostly
round in shape. Thus, we use a best fit ball radius as a decision parameter of
a binary classifier. We present a statistical study of the performance of our
approach on a data set containing over 18,900 frames from the endoscopic video
sequences of five adult patients. The algorithm demonstrates a solid
performance, achieving 47% sensitivity per frame and over 81% sensitivity per
polyp at a specificity level of 90%. On average, with a video sequence length
of 3747 frames, only 367 false positive frames need to be inspected by a human
operator.
|
[
{
"version": "v1",
"created": "Wed, 8 May 2013 18:33:28 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Oct 2013 20:02:40 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Feb 2014 16:57:38 GMT"
},
{
"version": "v4",
"created": "Thu, 27 Mar 2014 22:52:11 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Mamonov",
"Alexander V.",
""
],
[
"Figueiredo",
"Isabel N.",
""
],
[
"Figueiredo",
"Pedro N.",
""
],
[
"Tsai",
"Yen-Hsi Richard",
""
]
] |
new_dataset
| 0.996903 |
1311.4904
|
Gabriele Fici
|
Gabriele Fici
|
On the Structure of Bispecial Sturmian Words
|
arXiv admin note: substantial text overlap with arXiv:1204.1672
|
Journal of Computer and System Sciences, 80(4): 711-719 (2014)
|
10.1016/j.jcss.2013.11.001
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A balanced word is one in which any two factors of the same length contain
the same number of each letter of the alphabet up to one. Finite binary
balanced words are called Sturmian words. A Sturmian word is bispecial if it
can be extended to the left and to the right with both letters remaining a
Sturmian word. There is a deep relation between bispecial Sturmian words and
Christoffel words, that are the digital approximations of Euclidean segments in
the plane. In 1997, J. Berstel and A. de Luca proved that \emph{palindromic}
bispecial Sturmian words are precisely the maximal internal factors of
\emph{primitive} Christoffel words. We extend this result by showing that
bispecial Sturmian words are precisely the maximal internal factors of
\emph{all} Christoffel words. Our characterization allows us to give an
enumerative formula for bispecial Sturmian words. We also investigate the
minimal forbidden words for the language of Sturmian words.
|
[
{
"version": "v1",
"created": "Tue, 19 Nov 2013 22:01:28 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Fici",
"Gabriele",
""
]
] |
new_dataset
| 0.973682 |
1405.3750
|
Kyumin Lee
|
Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle Zhou, Jeffrey Nichols
|
Who Will Retweet This? Automatically Identifying and Engaging Strangers
on Twitter to Spread Information
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There has been much effort on studying how social media sites, such as
Twitter, help propagate information in different situations, including
spreading alerts and SOS messages in an emergency. However, existing work has
not addressed how to actively identify and engage the right strangers at the
right time on social media to help effectively propagate intended information
within a desired time frame. To address this problem, we have developed two
models: (i) a feature-based model that leverages peoples' exhibited social
behavior, including the content of their tweets and social interactions, to
characterize their willingness and readiness to propagate information on
Twitter via the act of retweeting; and (ii) a wait-time model based on a user's
previous retweeting wait times to predict her next retweeting time when asked.
Based on these two models, we build a recommender system that predicts the
likelihood of a stranger to retweet information when asked, within a specific
time window, and recommends the top-N qualified strangers to engage with. Our
experiments, including live studies in the real world, demonstrate the
effectiveness of our work.
|
[
{
"version": "v1",
"created": "Thu, 15 May 2014 06:00:54 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Jul 2014 07:25:56 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Lee",
"Kyumin",
""
],
[
"Mahmud",
"Jalal",
""
],
[
"Chen",
"Jilin",
""
],
[
"Zhou",
"Michelle",
""
],
[
"Nichols",
"Jeffrey",
""
]
] |
new_dataset
| 0.981697 |
1406.5895
|
Gabriele Fici
|
Arturo Carpi, Gabriele Fici, Stepan Holub, Jakub Oprsal and Marinella
Sciortino
|
Universal Lyndon Words
|
To appear in the proceedings of MFCS 2014
|
Lecture Notes in Computer Science, 8634: 135-146 (2014)
| null | null |
cs.DM cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A word $w$ over an alphabet $\Sigma$ is a Lyndon word if there exists an
order defined on $\Sigma$ for which $w$ is lexicographically smaller than all
of its conjugates (other than itself). We introduce and study \emph{universal
Lyndon words}, which are words over an $n$-letter alphabet that have length
$n!$ and such that all the conjugates are Lyndon words. We show that universal
Lyndon words exist for every $n$ and exhibit combinatorial and structural
properties of these words. We then define particular prefix codes, which we
call Hamiltonian lex-codes, and show that every Hamiltonian lex-code is in
bijection with the set of the shortest unrepeated prefixes of the conjugates of
a universal Lyndon word. This allows us to give an algorithm for constructing
all the universal Lyndon words.
|
[
{
"version": "v1",
"created": "Mon, 23 Jun 2014 13:24:16 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Carpi",
"Arturo",
""
],
[
"Fici",
"Gabriele",
""
],
[
"Holub",
"Stepan",
""
],
[
"Oprsal",
"Jakub",
""
],
[
"Sciortino",
"Marinella",
""
]
] |
new_dataset
| 0.995826 |
1407.3540
|
Tarek El-Gaaly
|
Tarek El-Gaaly, Joshua Gluckman
|
Measuring Atmospheric Scattering from Digital Images of Urban Scenery
using Temporal Polarization-Based Vision
|
Masters in Computer Science Thesis
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Particulate Matter (PM) is a form of air pollution that visually degrades
urban scenery and is hazardous to human health and the environment. Current
monitoring devices are limited in measuring average PM over large areas.
Quantifying the visual effects of haze in digital images of urban scenery and
correlating these effects to PM levels is a vital step in more practically
monitoring our environment. Current image haze extraction algorithms remove
haze from the scene for the sole purpose of enhancing vision. We present two
algorithms which bridge the gap between image haze extraction and environmental
monitoring. We provide a means of measuring atmospheric scattering from images
of urban scenery by incorporating temporal knowledge. In doing so, we also
present a method of recovering an accurate depthmap of the scene and recovering
the scene without the visual effects of haze. We compare our algorithm to three
known haze removal methods. The algorithms are composed of an optimization over
a model of haze formation in images and an optimization using a constraint of
constant depth over a sequence of images taken over time. These algorithms not
only measure atmospheric scattering, but also recover a more accurate depthmap
and dehazed image. The measurements of atmospheric scattering this research
produces, can be directly correlated to PM levels and therefore pave the way to
monitoring the health of the environment by visual means. Accurate atmospheric
sensing from digital images is a challenging and under-researched problem. This
work provides an important step towards a more practical and accurate visual
means of measuring PM from digital images.
|
[
{
"version": "v1",
"created": "Mon, 14 Jul 2014 04:36:31 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"El-Gaaly",
"Tarek",
""
],
[
"Gluckman",
"Joshua",
""
]
] |
new_dataset
| 0.995831 |
1407.3561
|
Juan Batiz-Benet
|
Juan Benet
|
IPFS - Content Addressed, Versioned, P2P File System
| null | null | null | null |
cs.NI cs.DC
|
http://creativecommons.org/licenses/by/3.0/
|
The InterPlanetary File System (IPFS) is a peer-to-peer distributed file
system that seeks to connect all computing devices with the same system of
files. In some ways, IPFS is similar to the Web, but IPFS could be seen as a
single BitTorrent swarm, exchanging objects within one Git repository. In other
words, IPFS provides a high throughput content-addressed block storage model,
with content-addressed hyper links. This forms a generalized Merkle DAG, a data
structure upon which one can build versioned file systems, blockchains, and
even a Permanent Web. IPFS combines a distributed hashtable, an incentivized
block exchange, and a self-certifying namespace. IPFS has no single point of
failure, and nodes do not need to trust each other.
|
[
{
"version": "v1",
"created": "Mon, 14 Jul 2014 08:31:05 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Benet",
"Juan",
""
]
] |
new_dataset
| 0.99663 |
1302.0275
|
Prahladh Harsha
|
Prahladh Harsha and Rahul Jain
|
A strong direct product theorem for the tribes function via the
smooth-rectangle bound
|
16 pages (including title page), fixed error in earlier version
|
In Proc. 33rd IARCS Conf. on Foundations of Software Technology &
Theoretical Computer Science (FSTTCS) (Guwahati, India, 12-14 December),
pages 141-152, 2013
|
10.4230/LIPIcs.FSTTCS.2013.141
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main result of this paper is an optimal strong direct product result for
the two-party public-coin randomized communication complexity of the Tribes
function. This is proved by providing an alternate proof of the optimal lower
bound of \Omega(n) for the randomised communication complexity of the Tribes
function using the so-called smooth-rectangle bound, introduced by Jain and
Klauck [JK10]. The optimal \Omega(n) lower bound for Tribes was originally
proved by Jayram, Kumar and Sivakumar [JKS03], using a more powerful lower
bound technique, namely the information complexity bound. The information
complexity bound is known to be at least as strong a lower bound method as the
smooth-rectangle bound [KLL+12]. On the other hand, we are not aware of any
function or relation for which the smooth-rectangle bound is (asymptotically)
smaller than its public-coin randomized communication complexity. The optimal
direct product for Tribes is obtained by combining our smooth-rectangle bound
for tribes with the strong direct product result of Jain and Yao [JY12] in
terms of smooth-rectangle bound.
|
[
{
"version": "v1",
"created": "Fri, 1 Feb 2013 20:47:07 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Feb 2013 04:16:07 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Feb 2013 10:48:09 GMT"
},
{
"version": "v4",
"created": "Sun, 24 Mar 2013 22:36:18 GMT"
},
{
"version": "v5",
"created": "Sun, 6 Oct 2013 03:38:31 GMT"
},
{
"version": "v6",
"created": "Fri, 11 Jul 2014 05:39:29 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Harsha",
"Prahladh",
""
],
[
"Jain",
"Rahul",
""
]
] |
new_dataset
| 0.99854 |
1311.3284
|
Alexander Barg
|
Itzhak Tamo and Alexander Barg
|
A family of optimal locally recoverable codes
|
Minor changes. This is the final published version of the paper
|
IEEE Transactions on Information Theory, vol. 60, no. 8, 2014
|
10.1109/TIT.2014.2321280
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A code over a finite alphabet is called locally recoverable (LRC) if every
symbol in the encoding is a function of a small number (at most $r$) other
symbols. We present a family of LRC codes that attain the maximum possible
value of the distance for a given locality parameter and code cardinality. The
codewords are obtained as evaluations of specially constructed polynomials over
a finite field, and reduce to a Reed-Solomon code if the locality parameter $r$
is set to be equal to the code dimension. The size of the code alphabet for
most parameters is only slightly greater than the code length. The recovery
procedure is performed by polynomial interpolation over $r$ points. We also
construct codes with several disjoint recovering sets for every symbol. This
construction enables the system to conduct several independent and simultaneous
recovery processes of a specific symbol by accessing different parts of the
codeword. This property enables high availability of frequently accessed data
("hot data").
|
[
{
"version": "v1",
"created": "Wed, 13 Nov 2013 20:38:49 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jul 2014 04:03:54 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Tamo",
"Itzhak",
""
],
[
"Barg",
"Alexander",
""
]
] |
new_dataset
| 0.999077 |
1406.3337
|
Jared Moore
|
Jared Moore, Anthony Clark, Philip McKinley
|
Evolutionary Robotics on the Web with WebGL and Javascript
|
Presented at WebAL-1: Workshop on Artificial Life and the Web 2014
(arXiv:1406.2507)
| null | null |
WebAL1/2014/02
|
cs.NE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web-based applications are highly accessible to users, providing rich,
interactive content while eliminating the need to install software locally.
However, evolutionary robotics (ER) has faced challenges in this domain as
web-based technologies have not been amenable to 3D physics simulations.
Traditionally, physics-based simulations require a local installation and a
high degree of user knowledge to configure an environment, but the emergence of
Javascript-based physics engines enables complex simulations to be executed in
web browsers. These developments create opportunities for ER research to reach
new audiences by increasing accessibility. In this work, we introduce two
web-based tools we have built to facilitate the exchange of ideas with other
researchers as well as outreach to K-12 students and the general public. The
first tool is intended to distribute and exchange ER research results, while
the second is a completely browser-based implementation of an ER environment.
|
[
{
"version": "v1",
"created": "Thu, 12 Jun 2014 19:49:16 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Jun 2014 13:54:17 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Jul 2014 01:20:24 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Moore",
"Jared",
""
],
[
"Clark",
"Anthony",
""
],
[
"McKinley",
"Philip",
""
]
] |
new_dataset
| 0.991026 |
1407.3004
|
Michail Fasoulakis
|
Artur Czumaj, Michail Fasoulakis, Marcin Jurdzi\'nski
|
Approximate well-supported Nash equilibria in symmetric bimatrix games
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The $\varepsilon$-well-supported Nash equilibrium is a strong notion of
approximation of a Nash equilibrium, where no player has an incentive greater
than $\varepsilon$ to deviate from any of the pure strategies that she uses in
her mixed strategy. The smallest constant $\varepsilon$ currently known for
which there is a polynomial-time algorithm that computes an
$\varepsilon$-well-supported Nash equilibrium in bimatrix games is slightly
below $2/3$. In this paper we study this problem for symmetric bimatrix games
and we provide a polynomial-time algorithm that gives a
$(1/2+\delta)$-well-supported Nash equilibrium, for an arbitrarily small
positive constant $\delta$.
|
[
{
"version": "v1",
"created": "Fri, 11 Jul 2014 01:44:49 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Czumaj",
"Artur",
""
],
[
"Fasoulakis",
"Michail",
""
],
[
"Jurdziński",
"Marcin",
""
]
] |
new_dataset
| 0.978124 |
1407.3091
|
Wes Masri
|
Rawad Abou Assi, Fadi A. Zaraket, and Wes Masri
|
UCov: a User-Defined Coverage Criterion for Test Case Intent
Verification
|
30 pages
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of regression testing is to ensure that the behavior of existing
code is not altered by new program changes. The primary focus of regression
testing should be on code associated with: a) earlier bug fixes; and b)
particular application scenarios considered to be important by the tester.
Existing coverage criteria do not enable such focus, e.g., 100% branch coverage
does not guarantee that a given bug fix is exercised or a given application
scenario is tested. Therefore, there is a need for a complementary coverage
criterion in which the user can define a test requirement characterizing a
given behavior to be covered as opposed to choosing from a pool of pre-defined
and generic program elements. We propose UCov, a user-defined coverage
criterion wherein a test requirement is an execution pattern of program
elements and predicates. Our proposed criterion is not meant to replace
existing criteria, but to complement them as it focuses the testing on
important code patterns that could go untested otherwise. UCov supports test
case intent verification. For example, following a bug fix, the testing team
may augment the regression suite with the test case that revealed the bug.
However, this test case might become obsolete due to code modifications not
related to the bug. But if an execution pattern characterizing the bug was
defined by the user, UCov would determine that test case intent verification
failed. We implemented our methodology for the Java platform and applied it
onto two real life case studies. Our implementation comprises the following: 1)
an Eclipse plugin allowing the user to easily specify non-trivial test
requirements; 2) the ability of cross referencing test requirements across
subsequent versions of a given program; and 3) the ability of checking whether
user-defined test requirements were satisfied, i.e., test case intent
verification.
|
[
{
"version": "v1",
"created": "Fri, 11 Jul 2014 10:03:39 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Assi",
"Rawad Abou",
""
],
[
"Zaraket",
"Fadi A.",
""
],
[
"Masri",
"Wes",
""
]
] |
new_dataset
| 0.989207 |
1407.3164
|
Marc Hellmuth
|
Marc Hellmuth, Tilen Marc, Lydia Ostermeier and Peter F. Stadler
|
The Relaxed Square Property
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graph products are characterized by the existence of non-trivial equivalence
relations on the edge set of a graph that satisfy a so-called square property.
We investigate here a generalization, termed RSP-relations. The class of graphs
with non-trivial RSP-relations in particular includes graph bundles.
Furthermore, RSP-relations are intimately related with covering graph
constructions. For K_23-free graphs finest RSP-relations can be computed in
polynomial-time. In general, however, they are not unique and their number may
even grow exponentially. They behave well for graph products, however, in sense
that a finest RSP-relations can be obtained easily from finest RSP-relations on
the prime factors.
|
[
{
"version": "v1",
"created": "Fri, 11 Jul 2014 14:07:49 GMT"
}
] | 2014-07-14T00:00:00 |
[
[
"Hellmuth",
"Marc",
""
],
[
"Marc",
"Tilen",
""
],
[
"Ostermeier",
"Lydia",
""
],
[
"Stadler",
"Peter F.",
""
]
] |
new_dataset
| 0.984948 |
1406.4161
|
Daniele Rotolo
|
Daniele Rotolo and Loet Leydesdorff
|
Matching MEDLINE/PubMed Data with Web of Science (WoS): A Routine in R
language
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel routine, namely medlineR, based on R-language, that
enables the user to match data from MEDLINE/PubMed with records indexed in the
ISI Web of Science (WoS) database. The matching allows exploiting the rich and
controlled vocabulary of Medical Subject Headings (MeSH) of MEDLINE/PubMed with
additional fields of WoS. The integration provides data (e.g. citation data,
list of cited reference, full list of the addresses of authors' host
organisations, WoS subject categories) to perform a variety of scientometric
analyses. This brief communication describes medlineR, the methodology on which
it relies, and the steps the user should follow to perform the matching across
the two databases. In order to specify the differences from Leydesdorff and
Opthof (2013), we conclude the brief communication by testing the routine on
the case of the "Burgada Syndrome".
|
[
{
"version": "v1",
"created": "Mon, 16 Jun 2014 20:27:50 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Jun 2014 16:51:43 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jul 2014 16:24:23 GMT"
},
{
"version": "v4",
"created": "Thu, 10 Jul 2014 16:14:10 GMT"
}
] | 2014-07-11T00:00:00 |
[
[
"Rotolo",
"Daniele",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
new_dataset
| 0.977754 |
1407.0975
|
Saverio Giallorenzo
|
Mila Dalla Preda, Saverio Giallorenzo, Ivan Lanese, Jacopo Mauro, and
Maurizio Gabbrielli
|
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed
Applications
|
Technical Report
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present AIOCJ, a framework for programming distributed adaptive
applications. Applications are programmed using AIOC, a choreographic language
suited for expressing patterns of interaction from a global point of view. AIOC
allows the programmer to specify which parts of the application can be adapted.
Adaptation takes place at runtime by means of rules, which can change during
the execution to tackle possibly unforeseen adaptation needs. AIOCJ relies on a
solid theory that ensures applications to be deadlock-free by construction also
after adaptation. We describe the architecture of AIOCJ, the design of the AIOC
language, and an empirical validation of the framework.
|
[
{
"version": "v1",
"created": "Thu, 3 Jul 2014 16:14:57 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jul 2014 07:11:19 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Jul 2014 09:48:30 GMT"
}
] | 2014-07-11T00:00:00 |
[
[
"Preda",
"Mila Dalla",
""
],
[
"Giallorenzo",
"Saverio",
""
],
[
"Lanese",
"Ivan",
""
],
[
"Mauro",
"Jacopo",
""
],
[
"Gabbrielli",
"Maurizio",
""
]
] |
new_dataset
| 0.988426 |
1407.2723
|
Jan Vr\v{s}ek
|
Jan Vr\v{s}ek (1), Miroslav L\'avi\v{c}ka (1 and 2) ((1) NTIS -- New
Technologies for the Information Society, Faculty of Applied Sciences,
University of West Bohemia, Plze\v{n}, Czech Republic (2) Department of
Mathematics, Faculty of Applied Sciences, University of West Bohemia,
Plze\v{n}, Czech Republic)
|
Determining surfaces of revolution from their implicit equations
| null | null | null | null |
cs.SC cs.GR math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Results of number of geometric operations (often used in technical practise,
as e.g. the operation of blending) are in many cases surfaces described
implicitly. Then it is a challenging task to recognize the type of the obtained
surface, find its characteristics and for the rational surfaces compute also
their parameterizations. In this contribution we will focus on surfaces of
revolution. These objects, widely used in geometric modelling, are generated by
rotating a generatrix around a given axis. If the generatrix is an algebraic
curve then so is also the resulting surface, described uniquely by a polynomial
which can be found by some well-established implicitation technique. However,
starting from a polynomial it is not known how to decide if the corresponding
algebraic surface is rotational or not. Motivated by this, our goal is to
formulate a simple and efficient algorithm whose input is a polynomial with the
coefficients from some subfield of $\mathbb{R}$ and the output is the answer
whether the shape is a surface of revolution. In the affirmative case we also
find the equations of its axis and generatrix. Furthermore, we investigate the
problem of rationality and unirationality of surfaces of revolution and show
that this question can be efficiently answered discussing the rationality of a
certain associated planar curve.
|
[
{
"version": "v1",
"created": "Thu, 10 Jul 2014 08:24:59 GMT"
}
] | 2014-07-11T00:00:00 |
[
[
"Vršek",
"Jan",
"",
"1 and 2"
],
[
"Lávička",
"Miroslav",
"",
"1 and 2"
]
] |
new_dataset
| 0.950102 |
1407.2844
|
Alantha Newman
|
Satoru Iwata, Alantha Newman, R. Ravi
|
Graph-TSP from Steiner Cycles
|
Proceedings of WG 2014
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an approach for the traveling salesman problem with graph metric
based on Steiner cycles. A Steiner cycle is a cycle that is required to contain
some specified subset of vertices. For a graph $G$, if we can find a spanning
tree $T$ and a simple cycle that contains the vertices with odd-degree in $T$,
then we show how to combine the classic "double spanning tree" algorithm with
Christofides' algorithm to obtain a TSP tour of length at most $\frac{4n}{3}$.
We use this approach to show that a graph containing a Hamiltonian path has a
TSP tour of length at most $4n/3$.
Since a Hamiltonian path is a spanning tree with two leaves, this motivates
the question of whether or not a graph containing a spanning tree with few
leaves has a short TSP tour. The recent techniques of M\"omke and Svensson
imply that a graph containing a depth-first-search tree with $k$ leaves has a
TSP tour of length $4n/3 + O(k)$. Using our approach, we can show that a
$2(k-1)$-vertex connected graph that contains a spanning tree with at most $k$
leaves has a TSP tour of length $4n/3$. We also explore other conditions under
which our approach results in a short tour.
|
[
{
"version": "v1",
"created": "Thu, 10 Jul 2014 16:12:01 GMT"
}
] | 2014-07-11T00:00:00 |
[
[
"Iwata",
"Satoru",
""
],
[
"Newman",
"Alantha",
""
],
[
"Ravi",
"R.",
""
]
] |
new_dataset
| 0.990412 |
1404.4495
|
Tom\'a\v{s} Masopust
|
\v{S}t\v{e}p\'an Holub, Galina Jir\'askov\'a, Tom\'a\v{s} Masopust
|
On Upper and Lower Bounds on the Length of Alternating Towers
| null |
MFCS 2014, LNCS 8634, pp. 315-326
| null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A tower between two regular languages is a sequence of strings such that all
strings on odd positions belong to one of the languages, all strings on even
positions belong to the other language, and each string can be embedded into
the next string in the sequence. It is known that if there are towers of any
length, then there also exists an infinite tower. We investigate upper and
lower bounds on the length of finite towers between two regular languages with
respect to the size of the automata representing the languages in the case
there is no infinite tower. This problem is relevant to the separation problem
of regular languages by piecewise testable languages.
|
[
{
"version": "v1",
"created": "Thu, 17 Apr 2014 11:41:27 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Jul 2014 14:56:15 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Holub",
"Štěpán",
""
],
[
"Jirásková",
"Galina",
""
],
[
"Masopust",
"Tomáš",
""
]
] |
new_dataset
| 0.962042 |
1404.5686
|
Liu Yue
|
Yue Liu, Songlin Hu, Tilmann Rabl, Wantao Liu, Hans-Arno Jacobsen,
Kaifeng Wu, Jian Chen, Jintao Li
|
DGFIndex for Smart Grid: Enhancing Hive with a Cost-Effective
Multidimensional Range Index
|
12 pages, VLDB 2014
| null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Smart Grid applications, as the number of deployed electric smart meters
increases, massive amounts of valuable meter data is generated and collected
every day. To enable reliable data collection and make business decisions fast,
high throughput storage and high-performance analysis of massive meter data
become crucial for grid companies. Considering the advantage of high
efficiency, fault tolerance, and price-performance of Hadoop and Hive systems,
they are frequently deployed as underlying platform for big data processing.
However, in real business use cases, these data analysis applications typically
involve multidimensional range queries (MDRQ) as well as batch reading and
statistics on the meter data. While Hive is high-performance at complex data
batch reading and analysis, it lacks efficient indexing techniques for MDRQ.
In this paper, we propose DGFIndex, an index structure for Hive that
efficiently supports MDRQ for massive meter data. DGFIndex divides the data
space into cubes using the grid file technique. Unlike the existing indexes in
Hive, which stores all combinations of multiple dimensions, DGFIndex only
stores the information of cubes. This leads to smaller index size and faster
query processing. Furthermore, with pre-computing user-defined aggregations of
each cube, DGFIndex only needs to access the boundary region for aggregation
query. Our comprehensive experiments show that DGFIndex can save significant
disk space in comparison with the existing indexes in Hive and the query
performance with DGFIndex is 2-50 times faster than existing indexes in Hive
and HadoopDB for aggregation query, 2-5 times faster than both for
non-aggregation query, 2-75 times faster than scanning the whole table in
different query selectivity.
|
[
{
"version": "v1",
"created": "Wed, 23 Apr 2014 02:44:26 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Jun 2014 02:32:27 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jul 2014 09:02:23 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Liu",
"Yue",
""
],
[
"Hu",
"Songlin",
""
],
[
"Rabl",
"Tilmann",
""
],
[
"Liu",
"Wantao",
""
],
[
"Jacobsen",
"Hans-Arno",
""
],
[
"Wu",
"Kaifeng",
""
],
[
"Chen",
"Jian",
""
],
[
"Li",
"Jintao",
""
]
] |
new_dataset
| 0.996625 |
1407.2358
|
Mayank Chakraverty
|
Mayank Chakraverty
|
A Compact Model of Silicon-Based Nanowire Field Effect Transistor for
Circuit Simulation and Design
| null | null | null | null |
cs.ET cond-mat.mes-hall cond-mat.mtrl-sci cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the conventional silicon metal-oxide-semiconductor field-effect transistor
(MOSFET) approaches its scaling limits; many novel device structures are being
extensively explored. Among them, the silicon nanowire transistor (SNWT) has
attracted broad attention. To understand device physics in depth and to assess
the performance limits of SNWTs, simulation is becoming increasingly important.
The objectives of this work are: 1) to theoretically explore the essential
physics of SNWTs (e.g., electrostatics, transport and band structure) by
performing computer-based simulations, and 2) to assess the performance limits
and scaling potentials of SNWTs and to address the SNWT design issues. The
computer based simulations carried out are essentially based on DFT using NEGF
formalism. A silicon nanowire has been modeled as PN diode (Zener Diode), PIN
diode, PIP & NIN diode configurations by selectively doping the nanowire and
simulated by biasing one end of the nanowire to ground and sweeping the other
end of the nanowire from -1 V to 1 V to obtain the electrical characteristics
of the respective diodes. In order to determine the effectiveness of the
modeled diodes in silicon nanowire, the same diodes have been modeled using a
germanium nanowire by selective doping and simulated in the same manner to
obtain the electrical characteristics of the germanium nanowire based diodes
which has been used as a reference to analyze the characteristics obtained
using silicon nanowire. The modeled diodes are extremely small in dimension
when compared to the conventional bulk silicon and germanium based diodes. This
work is followed by modeling and simulation of a gate all around nanowire field
effect transistor using two different gate dielectrics, followed by temperature
dependence of the nanowire FET characteristics and the off state current and
conductance variation using the two dielectrics.
|
[
{
"version": "v1",
"created": "Wed, 9 Jul 2014 05:22:10 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Chakraverty",
"Mayank",
""
]
] |
new_dataset
| 0.998812 |
1407.2377
|
Masaaki Nagahara
|
Masaaki Nagahara, Daniel E. Quevedo, Dragan Nesic
|
Hands-Off Control as Green Control
|
SICE Control Division Multi Symposium 2014 (Japanese domestic
conference); English translation from Japanese article
| null | null | null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, we introduce a new paradigm of control, called hands-off
control, which can save energy and reduce CO2 emissions in control systems. A
hands-off control is defined as a control that has a much shorter support than
the horizon length. The maximum hands-off control is the minimum support (or
sparsest) control among all admissible controls. With maximum hands-off
control, actuators in the feedback control system can be stopped during time
intervals over which the control values are zero. We show the maximum hands-off
control is given by L1 optimal control, for which we also show numerical
computation formulas.
|
[
{
"version": "v1",
"created": "Wed, 9 Jul 2014 08:00:06 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Nagahara",
"Masaaki",
""
],
[
"Quevedo",
"Daniel E.",
""
],
[
"Nesic",
"Dragan",
""
]
] |
new_dataset
| 0.995281 |
1407.2390
|
Deepjoy Das
|
SRM Prasanna, Rituparna Devi, Deepjoy Das, Subhankar Ghosh, Krishna
Naik
|
Online Stroke and Akshara Recognition GUI in Assamese Language Using
Hidden Markov Model
|
6 pages, 9 figures, International Journal of Scientific and Research
Publications, Volume 4, Issue 1, January 2014
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The work describes the development of Online Assamese Stroke & Akshara
Recognizer based on a set of language rules. In handwriting literature strokes
are composed of two coordinate trace in between pen down and pen up labels. The
Assamese aksharas are combination of a number of strokes, the maximum number of
strokes taken to make a combination being eight. Based on these combinations
eight language rule models have been made which are used to test if a set of
strokes form a valid akshara. A Hidden Markov Model is used to train 181
different stroke patterns which generates a model used during stroke level
testing. Akshara level testing is performed by integrating a GUI (provided by
CDAC-Pune) with the Binaries of HTK toolkit classifier, HMM train model and the
language rules using a dynamic linked library (dll). We have got a stroke level
performance of 94.14% and akshara level performance of 84.2%.
|
[
{
"version": "v1",
"created": "Wed, 9 Jul 2014 08:48:41 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Prasanna",
"SRM",
""
],
[
"Devi",
"Rituparna",
""
],
[
"Das",
"Deepjoy",
""
],
[
"Ghosh",
"Subhankar",
""
],
[
"Naik",
"Krishna",
""
]
] |
new_dataset
| 0.990418 |
1407.2535
|
Antonio Lima
|
Antonio Lima, Luca Rossi, Mirco Musolesi
|
Coding Together at Scale: GitHub as a Collaborative Social Network
|
10 pages, 12 figures, 1 table. In Proceedings of 8th AAAI
International Conference on Weblogs and Social Media (ICWSM 2014)
| null | null | null |
cs.SI cs.CY physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GitHub is the most popular repository for open source code. It has more than
3.5 million users, as the company declared in April 2013, and more than 10
million repositories, as of December 2013. It has a publicly accessible API
and, since March 2012, it also publishes a stream of all the events occurring
on public projects. Interactions among GitHub users are of a complex nature and
take place in different forms. Developers create and fork repositories, push
code, approve code pushed by others, bookmark their favorite projects and
follow other developers to keep track of their activities.
In this paper we present a characterization of GitHub, as both a social
network and a collaborative platform. To the best of our knowledge, this is the
first quantitative study about the interactions happening on GitHub. We analyze
the logs from the service over 18 months (between March 11, 2012 and September
11, 2013), describing 183.54 million events and we obtain information about
2.19 million users and 5.68 million repositories, both growing linearly in
time. We show that the distributions of the number of contributors per project,
watchers per project and followers per user show a power-law-like shape. We
analyze social ties and repository-mediated collaboration patterns, and we
observe a remarkably low level of reciprocity of the social connections. We
also measure the activity of each user in terms of authored events and we
observe that very active users do not necessarily have a large number of
followers. Finally, we provide a geographic characterization of the centers of
activity and we investigate how distance influences collaboration.
|
[
{
"version": "v1",
"created": "Wed, 9 Jul 2014 15:48:33 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Lima",
"Antonio",
""
],
[
"Rossi",
"Luca",
""
],
[
"Musolesi",
"Mirco",
""
]
] |
new_dataset
| 0.999659 |
1407.2576
|
Daniela Saban
|
Yash Kanoria, Daniela Saban and Jay Sethuraman
|
The size of the core in assignment markets
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Assignment markets involve matching with transfers, as in labor markets and
housing markets. We consider a two-sided assignment market with agent types and
stochastic structure similar to models used in empirical studies, and
characterize the size of the core in such markets. Each agent has a randomly
drawn productivity with respect to each type of agent on the other side. The
value generated from a match between a pair of agents is the sum of the two
productivity terms, each of which depends only on the type but not the identity
of one of the agents, and a third deterministic term driven by the pair of
types. We allow the number of agents to grow, keeping the number of agent types
fixed. Let $n$ be the number of agents and $K$ be the number of types on the
side of the market with more types. We find, under reasonable assumptions, that
the relative variation in utility per agent over core outcomes is bounded as
$O^*(1/n^{1/K})$, where polylogarithmic factors have been suppressed. Further,
we show that this bound is tight in worst case. We also provide a tighter bound
under more restrictive assumptions. Our results provide partial justification
for the typical assumption of a unique core outcome in empirical studies.
|
[
{
"version": "v1",
"created": "Wed, 9 Jul 2014 18:09:02 GMT"
}
] | 2014-07-10T00:00:00 |
[
[
"Kanoria",
"Yash",
""
],
[
"Saban",
"Daniela",
""
],
[
"Sethuraman",
"Jay",
""
]
] |
new_dataset
| 0.963645 |
0709.1433
|
Mamadou Moustapha Kant\'e
|
Mamadou Moustapha Kante and Michael Rao
|
The Rank-Width of Edge-Colored Graphs
|
It is an update of the last version generalising all the results to
edge-colored graphs and answering some of the raised questions
|
Theory of Computing Systems 52(4):599-644(2013)
|
10.1007/s00224-012-9399-y
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Clique-width is a complexity measure of directed as well as undirected
graphs. Rank-width is an equivalent complexity measure for undirected graphs
and has good algorithmic and structural properties. It is in particular related
to the vertex-minor relation. We discuss an extension of the notion of
rank-width to edge-colored graphs. A C-colored graph is a graph where the arcs
are colored with colors from the set C. There is not a natural notion of
rank-width for C-colored graphs. We define two notions of rank-width for them,
both based on a coding of C-colored graphs by edge-colored graphs where each
edge has exactly one color from a field F and named respectively F-rank-width
and F-bi-rank-width. The two notions are equivalent to clique-width. We then
present a notion of vertex-minor for F-colored graphs and prove that F-colored
graphs of bounded F-rank-width are characterised by a finite list of F-colored
graphs to exclude as vertex-minors. A cubic-time algorithm to decide whether a
F-colored graph has F-rank-width (resp. F-bi-rank-width) at most k, for fixed
k, is also given. Graph operations to check MSOL-definable properties on
F-colored graphs of bounded rank-width are presented. A specialisation of all
these notions to (directed) graphs without edge colors is presented, which
shows that our results generalise the ones in undirected graphs.
|
[
{
"version": "v1",
"created": "Mon, 10 Sep 2007 16:17:20 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Oct 2007 07:31:35 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Mar 2008 10:01:47 GMT"
},
{
"version": "v4",
"created": "Mon, 26 Jul 2010 14:37:29 GMT"
},
{
"version": "v5",
"created": "Tue, 8 Jul 2014 11:24:47 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Kante",
"Mamadou Moustapha",
""
],
[
"Rao",
"Michael",
""
]
] |
new_dataset
| 0.999507 |
1311.0849
|
Abuzer Yakaryilmaz
|
Marzio De Biasi and Abuzer Yakaryilmaz
|
Unary languages recognized by two-way one-counter automata
|
14 pages. An improved version accepted to CIAA2014
| null | null | null |
cs.FL cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A two-way deterministic finite state automaton with one counter (2D1CA) is a
fundamental computational model that has been examined in many different
aspects since sixties, but we know little about its power in the case of unary
languages. Up to our knowledge, the only known unary nonregular languages
recognized by 2D1CAs are those formed by strings having exponential length,
where the exponents form some trivial unary regular language. In this paper, we
present some non-trivial subsets of these languages. By using the input head as
a second counter, we present simulations of two-way deterministic finite
automata with linearly bounded counters and linear--space Turing machines. We
also show how a fixed-size quantum register can help to simplify some of these
languages. Finally, we compare unary 2D1CAs with two--counter machines and
provide some insights about the limits of their computational power.
|
[
{
"version": "v1",
"created": "Mon, 4 Nov 2013 20:53:30 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2014 19:45:20 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"De Biasi",
"Marzio",
""
],
[
"Yakaryilmaz",
"Abuzer",
""
]
] |
new_dataset
| 0.994369 |
1407.1905
|
Yun Fan
|
Bocong Chen, Hai Q. Dinh, Yun Fan, San Ling
|
Polyadic Constacyclic Codes
|
We provide complete solutions on two basic questions on polyadic
constacyclic cdes, and construct some optimal codes from the polyadic
constacyclic cdes
| null | null | null |
cs.IT math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For any given positive integer $m$, a necessary and sufficient condition for
the existence of Type I $m$-adic constacyclic codes is given. Further, for any
given integer $s$, a necessary and sufficient condition for $s$ to be a
multiplier of a Type I polyadic constacyclic code is given. As an application,
some optimal codes from Type I polyadic constacyclic codes, including
generalized Reed-Solomon codes and alternant MDS codes, are constructed.
|
[
{
"version": "v1",
"created": "Mon, 7 Jul 2014 23:13:29 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Chen",
"Bocong",
""
],
[
"Dinh",
"Hai Q.",
""
],
[
"Fan",
"Yun",
""
],
[
"Ling",
"San",
""
]
] |
new_dataset
| 0.999867 |
1407.1923
|
Eli Fox-Epstein
|
Eli Fox-Epstein, Ryuhei Uehara
|
The Convex Configurations of "Sei Shonagon Chie no Ita" and Other
Dissection Puzzles
| null | null | null | null |
cs.CG math.HO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The tangram and Sei Shonagon Chie no Ita are popular dissection puzzles
consisting of seven pieces. Each puzzle can be formed by identifying edges from
sixteen identical right isosceles triangles. It is known that the tangram can
form 13 convex polygons. We show that Sei Shonagon Chie no Ita can form 16
convex polygons, propose a new puzzle that can form 19, no 7 piece puzzle can
form 20, and 11 pieces are necessary and sufficient to form all 20 polygons
formable by 16 identical isosceles right triangles. Finally, we examine the
number of convex polygons formable by different quantities of these triangles.
|
[
{
"version": "v1",
"created": "Tue, 8 Jul 2014 01:42:23 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Fox-Epstein",
"Eli",
""
],
[
"Uehara",
"Ryuhei",
""
]
] |
new_dataset
| 0.999208 |
1407.1933
|
Adam Saulwick
|
Adam Saulwick
|
Lexpresso: a Controlled Natural Language
|
12 pages, 2 figures, 4th Workshop on Controlled Natural Language 2014
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an overview of `Lexpresso', a Controlled Natural Language
developed at the Defence Science & Technology Organisation as a bidirectional
natural language interface to a high-level information fusion system. The paper
describes Lexpresso's main features including lexical coverage, expressiveness
and range of linguistic syntactic and semantic structures. It also touches on
its tight integration with a formal semantic formalism and tentatively
classifies it against the PENS system.
|
[
{
"version": "v1",
"created": "Tue, 8 Jul 2014 02:53:29 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Saulwick",
"Adam",
""
]
] |
new_dataset
| 0.995015 |
1407.1952
|
EPTCS
|
Shang-Wei Lin, Laure Petrucci (Universit\'e Paris 13, Sorbonne Paris
Cit\'e, LIPN, CNRS, UMR 7030, F-93430, Villetaneuse, France)
|
Proceedings 2nd French Singaporean Workshop on Formal Methods and
Applications
| null |
EPTCS 156, 2014
|
10.4204/EPTCS.156
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the proceedings of the 2nd French Singaporean Workshop
on Formal Methods and Applications (FSFMA'14). The workshop was held in
Singapore on May 13th, 2014, as a satellite event of the 19th International
Symposium on Formal Methods (FM'14).
FSFMA aims at sharing research interests and launching collaborations in the
area of formal methods and their applications. The scientific subject of the
workshop covers (but is not limited to) areas such as formal specification,
model checking, verification, program analysis/transformation, software
engineering, and applications in major areas of computer science, including
aeronautics and aerospace. The workshop brings together researchers and
industry R&D experts from France, Singapore and other countries together to
exchange their knowledge, discuss their research findings, and explore
potential collaborations.
This volume contains eight contributions: four invited talks and four regular
papers.
|
[
{
"version": "v1",
"created": "Tue, 8 Jul 2014 05:10:05 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Lin",
"Shang-Wei",
"",
"Université Paris 13, Sorbonne Paris\n Cité, LIPN, CNRS, UMR 7030, F-93430, Villetaneuse, France"
],
[
"Petrucci",
"Laure",
"",
"Université Paris 13, Sorbonne Paris\n Cité, LIPN, CNRS, UMR 7030, F-93430, Villetaneuse, France"
]
] |
new_dataset
| 0.979789 |
1407.2019
|
Pranjal Das
|
Kalyanee Kanchan Baruah, Pranjal Das, Abdul Hannan, Shikhar Kr. Sarma
|
Assamese-English Bilingual Machine Translation
|
In the proceedings of International Conference of Natural Language
Processing and Cognitive Computing (ICONACC)-2014, pp. 227-231
|
International Journal on Natural Language Computing (IJNLC) Vol.
3, No.3, June 2014
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine translation is the process of translating text from one language to
another. In this paper, Statistical Machine Translation is done on Assamese and
English language by taking their respective parallel corpus. A statistical
phrase based translation toolkit Moses is used here. To develop the language
model and to align the words we used two another tools IRSTLM, GIZA
respectively. BLEU score is used to check our translation system performance,
how good it is. A difference in BLEU scores is obtained while translating
sentences from Assamese to English and vice-versa. Since Indian languages are
morphologically very rich hence translation is relatively harder from English
to Assamese resulting in a low BLEU score. A statistical transliteration system
is also introduced with our translation system to deal basically with proper
nouns, OOV (out of vocabulary) words which are not present in our corpus.
|
[
{
"version": "v1",
"created": "Tue, 8 Jul 2014 10:04:07 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Baruah",
"Kalyanee Kanchan",
""
],
[
"Das",
"Pranjal",
""
],
[
"Hannan",
"Abdul",
""
],
[
"Sarma",
"Shikhar Kr.",
""
]
] |
new_dataset
| 0.975478 |
1407.2027
|
Tolga Mataracioglu
|
Tolga Mataracioglu, Sevgi Ozkan Yildirim
|
Obstructions of Turkish Public Organizations Getting ISO/IEC 27001
Certified
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper; a comparison has been made among the Articles contained in the
ISO/IEC 27001 Standard and the Articles of the Civil Servants Law No 657, which
should essentially be complied with by the personnel employed within the bodies
of public institutions in Turkey; and efforts have been made in order to
emphasize the consistent Articles; and in addition, the matters, which should
be paid attention by the public institutions indenting to obtain the ISO/IEC
27001 certificate for the Articles of the Civil Servants Law No 657 which are
not consistent with the ISO/IEC 27001 certification process, have been
mentioned. Furthermore, solution offers have been presented in order to ensure
that the mentioned Articles become consistent with the ISO/IEC 27001
certification process.
|
[
{
"version": "v1",
"created": "Tue, 8 Jul 2014 10:26:18 GMT"
}
] | 2014-07-09T00:00:00 |
[
[
"Mataracioglu",
"Tolga",
""
],
[
"Yildirim",
"Sevgi Ozkan",
""
]
] |
new_dataset
| 0.969416 |
1309.4024
|
Patrick C. McGuire
|
P.C. McGuire, A. Bonnici, K.R. Bruner, C. Gross, J. Orm\"o, R.A.
Smosna, S. Walter, L. Wendt
|
The Cyborg Astrobiologist: Matching of Prior Textures by Image
Compression for Geological Mapping and Novelty Detection
|
27 pages, 3 figures, 2 tables, accepted for publication in the
International Journal of Astrobiology
|
International Journal of Astrobiology, 13(03), pp. 191-202 (2014)
|
10.1017/S1473550413000372
| null |
cs.CV astro-ph.EP astro-ph.IM cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
(abridged) We describe an image-comparison technique of Heidemann and Ritter
that uses image compression, and is capable of: (i) detecting novel textures in
a series of images, as well as of: (ii) alerting the user to the similarity of
a new image to a previously-observed texture. This image-comparison technique
has been implemented and tested using our Astrobiology Phone-cam system, which
employs Bluetooth communication to send images to a local laptop server in the
field for the image-compression analysis. We tested the system in a field site
displaying a heterogeneous suite of sandstones, limestones, mudstones and
coalbeds. Some of the rocks are partly covered with lichen. The image-matching
procedure of this system performed very well with data obtained through our
field test, grouping all images of yellow lichens together and grouping all
images of a coal bed together, and giving a 91% accuracy for similarity
detection. Such similarity detection could be employed to make maps of
different geological units. The novelty-detection performance of our system was
also rather good (a 64% accuracy). Such novelty detection may become valuable
in searching for new geological units, which could be of astrobiological
interest. The image-comparison technique is an unsupervised technique that is
not capable of directly classifying an image as containing a particular
geological feature; labeling of such geological features is done post facto by
human geologists associated with this study, for the purpose of analyzing the
system's performance. By providing more advanced capabilities for similarity
detection and novelty detection, this image-compression technique could be
useful in giving more scientific autonomy to robotic planetary rovers, and in
assisting human astronauts in their geological exploration and assessment.
|
[
{
"version": "v1",
"created": "Mon, 16 Sep 2013 16:32:35 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"McGuire",
"P. C.",
""
],
[
"Bonnici",
"A.",
""
],
[
"Bruner",
"K. R.",
""
],
[
"Gross",
"C.",
""
],
[
"Ormö",
"J.",
""
],
[
"Smosna",
"R. A.",
""
],
[
"Walter",
"S.",
""
],
[
"Wendt",
"L.",
""
]
] |
new_dataset
| 0.997238 |
1406.6647
|
Yue Qiao
|
Yue Qiao, Kannan Srinivasan, Anish Arora
|
Extract Secrets from Wireless Channel: A New Shape-based Approach
| null | null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing secret key extraction techniques use quantization to map wireless
channel amplitudes to secret bits. This pa- per shows that such techniques are
highly prone to environ- ment and local noise effects: They have very high
mismatch rates between the two nodes that measure the channel be- tween them.
This paper advocates using the shape of the channel instead of the size (or
amplitude) of the channel. It shows that this new paradigm shift is
significantly ro- bust against environmental and local noises. We refer to this
shape-based technique as Puzzle. Implementation in a software-defined radio
(SDR) platform demonstrates that Puzzle has a 63% reduction in bit mismatch
rate than the state-of-art frequency domain approach (CSI-2bit). Exper- iments
also show that unlike the state-of-the-art received signal strength (RSS)-based
methods like ASBG, Puzzle is robust against an attack in which an eavesdropper
can pre- dict the secret bits using planned movements.
|
[
{
"version": "v1",
"created": "Wed, 25 Jun 2014 17:20:16 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Jul 2014 21:44:11 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"Qiao",
"Yue",
""
],
[
"Srinivasan",
"Kannan",
""
],
[
"Arora",
"Anish",
""
]
] |
new_dataset
| 0.963268 |
1407.0386
|
Daniel Schall
|
Daniel Schall and Theo H\"arder
|
Energy and Performance-Can a Wimpy-Node Cluster Challenge a Brawny
Server?
|
arXiv admin note: substantial text overlap with arXiv:1407.0120
| null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional DBMS servers are usually over-provisioned for most of their daily
workloads and, because they do not show good energy proportionality, waste a
lot of energy while underutilized. A cluster of small (wimpy) servers, where
the number of nodes can dynamically adjust to the current workload, might offer
better energy characteristics for these workloads. Yet, clusters suffer from
"friction losses" and may not be able to quickly adapt to the workload, whereas
a single, brawny server delivers performance instantaneously. In this paper, we
compare a small cluster of lightweight nodes to a single server in terms of
performance and energy efficiency. We run several benchmarks, consisting of
OLTP and OLAP queries at variable utilization to test the system's ability to
adjust to the workloads. To quantify possible energy saving and its conceivable
drawback on query runtime, we evaluate our implementation on a cluster as well
as on a single, brawny server and compare the results w.r.t. performance and
energy consumption. Our findings confirm that - based on the workload - energy
can be saved without sacrificing too much performance.
|
[
{
"version": "v1",
"created": "Tue, 1 Jul 2014 07:29:37 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Jul 2014 07:32:53 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"Schall",
"Daniel",
""
],
[
"Härder",
"Theo",
""
]
] |
new_dataset
| 0.986137 |
1407.1460
|
Matin Macktoobian
|
Matin Macktoobian
|
Bi-directioal Motion Detection: A Neural Intelligent Model For
Perception of Cognitive Robots
|
6 pages, 8 figures, 2nd Basic & Clinical Neuroscience Congress BCNC
2013, Tehran, Iran
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new neuronal circuit, based on the spiking neuronal network
model, is proposed in order to detect the movement direction of dynamic objects
wandering around cognitive robots. Capability of our new approach in
bi-directional movement detection is beholden to its symmetric configuration of
the proposed circuit. With due attention to magnificence of handling of
blocking problems in neuronal networks such as epilepsy, mounting both
excitatory and inhibitory stimuli has been taken into account. Investigations
upon applied implementation of aforementioned strategy on PIONEER cognitive
robot reveals that the strategy leads to alleviation of potential level in the
sensory networks. Furthermore, investigation on intrinsic delay of the circuit
reveals not only the noticeable switching rate which could be acquired but the
high-efficient coupling of the circuit with the other high-speed ones.
|
[
{
"version": "v1",
"created": "Sun, 6 Jul 2014 05:46:19 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"Macktoobian",
"Matin",
""
]
] |
new_dataset
| 0.994839 |
1407.1461
|
Matin Macktoobian
|
Matin Macktoobian
|
Curved Trajectory Detection : A Novel Neurocognitive Perception Approach
for Autonomous Smart Robots
|
6 pages, 10 figures, 2nd basic & Clinical Neuroscience Congress BCNC
2013, Tehran, Iran
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Braitenberg vehicles could be mentioned as the seminal elements for cognitive
studies in robotics fields especially neurorobotics to invent more smart
robots. Motion detection of dynamic objects could be taken as one of the most
inspiring abilities into account which can lead to evolve more intelligent
Braitenberg vehicles. In this paper, a new neuronal circuit is established in
order to detect curved movements of the objects wandering around Braitenberg
vehicles. Modular structure of the novel circuit provides the opportunity to
expand the model into huge sensory-biosystems. Furthermore, robust performance
of the circuit against epileptic seizures is beholden to simultaneous
utilization of excitatory and inhibitory stimuli in the circuit construction.
Also, straight movements, as special case of curved movements could be tracked.
PIONEER, with due attention to its suitable neurosensors, is used as a
Braitenberg vehicle for empirical evaluations. Simulated results and practical
experiments are applied to this vehicle in order to verify new achievements of
the curved trajectory detector.
|
[
{
"version": "v1",
"created": "Sun, 6 Jul 2014 05:51:27 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"Macktoobian",
"Matin",
""
]
] |
new_dataset
| 0.991537 |
1407.1466
|
Umair Syed
|
Umair Atique Syed and Uma Kandan Muniandy
|
The Smart Shower
|
2 Pages, 3 Figures
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The smart shower is an intelligent device that saves the water during the
shower. It uses the indicator lamps that inform the user of the amount of the
water. Like the traffic signal it has three sets of lamps, green, yellow and
red, each indicating the amount of time spent. This device brain is the Siemens
Logo PLC.
|
[
{
"version": "v1",
"created": "Sun, 6 Jul 2014 07:51:40 GMT"
}
] | 2014-07-08T00:00:00 |
[
[
"Syed",
"Umair Atique",
""
],
[
"Muniandy",
"Uma Kandan",
""
]
] |
new_dataset
| 0.999352 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.