id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1202.1584
Kai Han
Kai Han, Liu Xiang, Jun Luo, and Yang Liu
MEGCOM: Min-Energy Group COMmunication in Multi-hop Wireless Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given the increasing demand from wireless applications, designing energy-efficient group communication protocols is of great importance to multi-hop wireless networks. A group communication session involves a set of member nodes, each of them needs to send a certain number of data packets to all other members. In this paper, we consider the problem of building a shared multicast tree spanning the member nodes such that the total energy consumption of a group communication session using the shared multicast tree is minimized. Since this problem was proven as NP-complete, we propose, under our Min-Energy Group COMmunication (MEGCOM) framework, three distributed approximation algorithms with provable approximation ratios. When the transmission power of each wireless node is fixed, our first two algorithms have the approximation ratios of O(ln(\Delta+ 1)) and O(1), respectively, where \Delta is the maximum node degree in the network. When the transmission power of each wireless node is adjustable, our third algorithm again delivers a constant approximation ratio. We also use extensive simulations to verify the practical performance of our algorithms.
[ { "version": "v1", "created": "Wed, 8 Feb 2012 02:53:37 GMT" }, { "version": "v2", "created": "Sun, 19 Feb 2012 08:20:00 GMT" } ]
2012-02-21T00:00:00
[ [ "Han", "Kai", "" ], [ "Xiang", "Liu", "" ], [ "Luo", "Jun", "" ], [ "Liu", "Yang", "" ] ]
new_dataset
0.997829
1202.4301
Johannes Mittmann
Johannes Mittmann, Nitin Saxena and Peter Scheiblechner
Algebraic Independence in Positive Characteristic -- A p-Adic Calculus
null
null
null
null
cs.CC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set of multivariate polynomials, over a field of zero or large characteristic, can be tested for algebraic independence by the well-known Jacobian criterion. For fields of other characteristic p>0, there is no analogous characterization known. In this paper we give the first such criterion. Essentially, it boils down to a non-degeneracy condition on a lift of the Jacobian polynomial over (an unramified extension of) the ring of p-adic integers. Our proof builds on the de Rham-Witt complex, which was invented by Illusie (1979) for crystalline cohomology computations, and we deduce a natural generalization of the Jacobian. This new avatar we call the Witt-Jacobian. In essence, we show how to faithfully differentiate polynomials over F_p (i.e. somehow avoid dx^p/dx=0) and thus capture algebraic independence. We apply the new criterion to put the problem of testing algebraic independence in the complexity class NP^#P (previously best was PSPACE). Also, we give a modest application to the problem of identity testing in algebraic complexity theory.
[ { "version": "v1", "created": "Mon, 20 Feb 2012 12:25:20 GMT" } ]
2012-02-21T00:00:00
[ [ "Mittmann", "Johannes", "" ], [ "Saxena", "Nitin", "" ], [ "Scheiblechner", "Peter", "" ] ]
new_dataset
0.995021
1202.4307
Paraskevas Lekeas
Paraskevas V. Lekeas
Coalitional Beliefs of Cournot Network Agents
Appendix with 2 figures
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Network cooperative games, due to computational complexity issues, agents are not able to base their behavior on the "whole network status" but have to follow certain "beliefs" as to how it is in their strategic interest to act. This behavior constitutes the main interest of this paper. To this end, we quantify and characterize the set of beliefs that support cooperation of such agents. Assuming that they are engaged in a differentiated Cournot competition and that they equally split the worth produced, we characterize the set of coalitional beliefs that support core non-emptiness and thus guarantee stability of the Network.
[ { "version": "v1", "created": "Mon, 20 Feb 2012 12:49:47 GMT" } ]
2012-02-21T00:00:00
[ [ "Lekeas", "Paraskevas V.", "" ] ]
new_dataset
0.988834
1202.4347
Amit Bawaskar
Jayshree Ghorpade, Jitendra Parande, Madhura Kulkarni, Amit Bawaskar
GPGPU Processing in CUDA Architecture
16 pages, 5 figures, Advanced Computing: an International Journal (ACIJ) 2012
null
10.5121/acij.2012.3109
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The future of computation is the Graphical Processing Unit, i.e. the GPU. The promise that the graphics cards have shown in the field of image processing and accelerated rendering of 3D scenes, and the computational capability that these GPUs possess, they are developing into great parallel computing units. It is quite simple to program a graphics processor to perform general parallel tasks. But after understanding the various architectural aspects of the graphics processor, it can be used to perform other taxing tasks as well. In this paper, we will show how CUDA can fully utilize the tremendous power of these GPUs. CUDA is NVIDIA's parallel computing architecture. It enables dramatic increases in computing performance, by harnessing the power of the GPU. This paper talks about CUDA and its architecture. It takes us through a comparison of CUDA C/C++ with other parallel programming languages like OpenCL and DirectCompute. The paper also lists out the common myths about CUDA and how the future seems to be promising for CUDA.
[ { "version": "v1", "created": "Mon, 20 Feb 2012 15:16:40 GMT" } ]
2012-02-21T00:00:00
[ [ "Ghorpade", "Jayshree", "" ], [ "Parande", "Jitendra", "" ], [ "Kulkarni", "Madhura", "" ], [ "Bawaskar", "Amit", "" ] ]
new_dataset
0.964861
1202.3872
Thomas Pietrzak
Thomas Pietrzak (INRIA Lille - Nord Europe), Andrew Crossan (GIST), Brewster A. Stephen (GIST), Beno\^it Martin (LITA), Isabelle Pecci (LITA)
Creating Usable Pin Array Tactons for Non-Visual Information
null
IEEE Transactions on Haptics 2, 2 (2009) 61-72
10.1109/TOH.2009.6
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spatial information can be difficult to present to a visually impaired computer user. In this paper we examine a new kind of tactile cueing for non-visual interaction as a potential solution, building on earlier work on vibrotactile Tactons. However, unlike vibrotactile Tactons, we use a pin array to stimulate the finger tip. Here, we describe how to design static and dynamic Tactons by defining their basic components. We then present user tests examining how easy it is to distinguish between different forms of pin array Tactons demonstrating accurate Tacton sets to represent directions. These experiments demonstrate usable patterns for static, wave and blinking pin array Tacton sets for guiding a user in one of eight directions. A study is then described that shows the benefits of structuring Tactons to convey information through multiple parameters of the signal. By using multiple independent parameters for a Tacton, this study demonstrates participants perceive more information through a single Tacton. Two applications using these Tactons are then presented: a maze exploration application and an electric circuit exploration application designed for use by and tested with visually impaired users.
[ { "version": "v1", "created": "Fri, 17 Feb 2012 10:49:23 GMT" } ]
2012-02-20T00:00:00
[ [ "Pietrzak", "Thomas", "", "INRIA Lille - Nord Europe" ], [ "Crossan", "Andrew", "", "GIST" ], [ "Stephen", "Brewster A.", "", "GIST" ], [ "Martin", "Benoît", "", "LITA" ], [ "Pecci", "Isabelle", "", "LITA" ] ]
new_dataset
0.994241
1202.2004
Fabio Francesco Gabriele Buono
Fabio F. G. Buono
A New Type of Cipher
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/3.0/
We will define a new type of cipher that doesn't use neither an easy to calcualate and hard to invert matematical function like RSA nor a classical mono or polyalphabetic cipher.
[ { "version": "v1", "created": "Thu, 9 Feb 2012 14:46:47 GMT" }, { "version": "v2", "created": "Sat, 11 Feb 2012 21:18:47 GMT" }, { "version": "v3", "created": "Thu, 16 Feb 2012 19:10:47 GMT" } ]
2012-02-17T00:00:00
[ [ "Buono", "Fabio F. G.", "" ] ]
new_dataset
0.997141
1202.3684
Marius Leordeanu
Marius Leordeanu, Rahul Sukthankar, Cristian Sminchisescu
Generalized Boundaries from Multiple Image Interpretations
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Boundary detection is essential for a variety of computer vision tasks such as segmentation and recognition. In this paper we propose a unified formulation and a novel algorithm that are applicable to the detection of different types of boundaries, such as intensity edges, occlusion boundaries or object category specific boundaries. Our formulation leads to a simple method with state-of-the-art performance and significantly lower computational cost than existing methods. We evaluate our algorithm on different types of boundaries, from low-level boundaries extracted in natural images, to occlusion boundaries obtained using motion cues and RGB-D cameras, to boundaries from soft-segmentation. We also propose a novel method for figure/ground soft-segmentation that can be used in conjunction with our boundary detection method and improve its accuracy at almost no extra computational cost.
[ { "version": "v1", "created": "Thu, 16 Feb 2012 20:08:11 GMT" } ]
2012-02-17T00:00:00
[ [ "Leordeanu", "Marius", "" ], [ "Sukthankar", "Rahul", "" ], [ "Sminchisescu", "Cristian", "" ] ]
new_dataset
0.987105
1002.4180
Subhadip Basu
Saurav Chakraborty, Subhadip Basu
Design of a Smart Unmanned Ground Vehicle for Hazardous Environments
In proceedings of 2nd National Conference on Recent Trends in Information Systems (ReTIS-08), pp. 222-225, Feb 7-9, 2008, Kolkata
In proceedings of 2nd National Conference on Recent Trends in Information Systems (ReTIS-08), pp. 222-225, Feb 7-9, 2008, Kolkata
null
null
cs.RO cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A smart Unmanned Ground Vehicle (UGV) is designed and developed for some application specific missions to operate predominantly in hazardous environments. In our work, we have developed a small and lightweight vehicle to operate in general cross-country terrains in or without daylight. The UGV can send visual feedbacks to the operator at a remote location. Onboard infrared sensors can detect the obstacles around the UGV and sends signals to the operator.
[ { "version": "v1", "created": "Mon, 22 Feb 2010 19:39:26 GMT" } ]
2012-02-15T00:00:00
[ [ "Chakraborty", "Saurav", "" ], [ "Basu", "Subhadip", "" ] ]
new_dataset
0.999236
1202.3018
Brage Ellingsater
Brage Ellings{\ae}ter, Hemdan Bezabih, Josef Noll and Torleiv Maseng
Using TV Receiver Information to Increase Cognitive White Space Spectrum
26 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the usage of cognitive radio devices within the service area of TV broadcast stations. Until now the main approach for a cognitive radio to operate in the TV bands has been to register TV broadcast stations locations and thus protecting the broadcast stations service area. Through information about TV receivers location, we show that a cognitive radio should be able to operate within this service area without causing harmful interference to the TV receivers as defined by Ofcom and FCC. We provide simulations based on real statistics from Norway that show that especially in rural areas TV receiver registration can provide a substantial gain in terms of exploitable frequencies for a cognitive radio.
[ { "version": "v1", "created": "Tue, 14 Feb 2012 12:31:27 GMT" } ]
2012-02-15T00:00:00
[ [ "Ellingsæter", "Brage", "" ], [ "Bezabih", "Hemdan", "" ], [ "Noll", "Josef", "" ], [ "Maseng", "Torleiv", "" ] ]
new_dataset
0.995425
1202.3048
Joydeep Basu
Ritesh Ray Chaudhuri, Joydeep Basu and Tarun Kanti Bhattacharyya
Design and Fabrication of Micromachined Resonators
7 pages, 12 figures
Proceedings of the 6th International Conference on Smart Materials, Structures and Systems, January 04-07, 2012, Bangalore, India
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Microelectromechanical system (MEMS) based on-chip resonators offer great potential for sensing and high frequency signal processing applications due to their exceptional features like small size, large frequency-quality factor product, integrability with CMOS ICs, low power consumption etc. This work is mainly aimed at the design, modeling, simulation, and fabrication of micromachined polysilicon disk resonators exhibiting radial-contour mode vibrations. A few other bulk mode modified resonator geometries are also being explored. The resonator structures have been designed and simulated in CoventorWare finite-element platform and fabricated by the PolyMUMPs surface micromachining process.
[ { "version": "v1", "created": "Tue, 14 Feb 2012 14:34:04 GMT" } ]
2012-02-15T00:00:00
[ [ "Chaudhuri", "Ritesh Ray", "" ], [ "Basu", "Joydeep", "" ], [ "Bhattacharyya", "Tarun Kanti", "" ] ]
new_dataset
0.996376
1105.6084
Ahmed Kosba
Ahmed E. Kosba, Ahmed Saeed and Moustafa Youssef
RASID: A Robust WLAN Device-free Passive Motion Detection System
V1: 14 pages, 11 figures. V2: 16 Pages, 15 figures. The non-parametric model of the system is compared with a parametric model of the system operation. Added 2-sample KS-Test for evaluating the profile update mechanism. Latency in detection decisions was allowed, and parameters configurations tuned accordingly. Same Conclusions. The effect of network activity on system profiles is analyzed
null
null
null
cs.NI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WLAN Device-free passive DfP indoor localization is an emerging technology enabling the localization of entities that do not carry any devices nor participate actively in the localization process using the already installed wireless infrastructure. This technology is useful for a variety of applications such as intrusion detection, smart homes and border protection. We present the design, implementation and evaluation of RASID, a DfP system for human motion detection. RASID combines different modules for statistical anomaly detection while adapting to changes in the environment to provide accurate, robust, and low-overhead detection of human activities using standard WiFi hardware. Evaluation of the system in two different testbeds shows that it can achieve an accurate detection capability in both environments with an F-measure of at least 0.93. In addition, the high accuracy and low overhead performance are robust to changes in the environment as compared to the current state of the art DfP detection systems. We also relay the lessons learned during building our system and discuss future research directions.
[ { "version": "v1", "created": "Mon, 30 May 2011 19:39:19 GMT" }, { "version": "v2", "created": "Sun, 12 Feb 2012 03:08:44 GMT" } ]
2012-02-14T00:00:00
[ [ "Kosba", "Ahmed E.", "" ], [ "Saeed", "Ahmed", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.99872
1202.2420
Wajeb Gharibi
Wajeb Gharibi and Maha Shaabi
Cyber threats in social networking websites
8 pages; International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.
[ { "version": "v1", "created": "Sat, 11 Feb 2012 06:42:03 GMT" } ]
2012-02-14T00:00:00
[ [ "Gharibi", "Wajeb", "" ], [ "Shaabi", "Maha", "" ] ]
new_dataset
0.996548
1202.2509
Bogdan Alexandru Caprarescu
Nicolo M. Calcavecchia, Bogdan Alexandru Caprarescu, Elisabetta Di Nitto, Daniel J. Dubois, Dana Petcu
DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling
Submitted to Springer Computing
null
null
Technical Report 2012.5, Politecnico di Milano
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamic provisioning of virtualized resources offered by cloud computing infrastructures allows applications deployed in a cloud environment to automatically increase and decrease the amount of used resources. This capability is called auto-scaling and its main purpose is to automatically adjust the scale of the system that is running the application to satisfy the varying workload with minimum resource utilization. The need for auto-scaling is particularly important during workload peaks, in which applications may need to scale up to extremely large-scale systems. Both the research community and the main cloud providers have already developed auto-scaling solutions. However, most research solutions are centralized and not suitable for managing large-scale systems, moreover cloud providers' solutions are bound to the limitations of a specific provider in terms of resource prices, availability, reliability, and connectivity. In this paper we propose DEPAS, a decentralized probabilistic auto-scaling algorithm integrated into a P2P architecture that is cloud provider independent, thus allowing the auto-scaling of services over multiple cloud infrastructures at the same time. Our simulations, which are based on real service traces, show that our approach is capable of: (i) keeping the overall utilization of all the instantiated cloud resources in a target range, (ii) maintaining service response times close to the ones obtained using optimal centralized auto-scaling approaches.
[ { "version": "v1", "created": "Sun, 12 Feb 2012 09:26:40 GMT" } ]
2012-02-14T00:00:00
[ [ "Calcavecchia", "Nicolo M.", "" ], [ "Caprarescu", "Bogdan Alexandru", "" ], [ "Di Nitto", "Elisabetta", "" ], [ "Dubois", "Daniel J.", "" ], [ "Petcu", "Dana", "" ] ]
new_dataset
0.991954
1202.2573
Ciprian Dobre
Ciprian Dobre, George Cristian Tudor
Mobile Advertisement in Vehicular Ad-Hoc Networks
Please cite this as "Ciprian Dobre, George Cristian Tudor, Mobile Advertisement in Vehicular Ad-Hoc Networks, in Proc. of 16th Annual Conference on Web Technology, New Media, Communications and Telematics Theory, Methods, Tools and Applications (Euromedia'2011), London, UK, 2011, pp. 43-49, ISBN: 978-90-77381-61-7, EUROSIS-ETI"
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile Advertisement is a location-aware dissemination solution built on top of a vehicular ad-hoc network. We envision a network of WiFi access points that dynamically disseminate data to clients running on the car's smart device. The approach can be considered an alternative to the static advertisement billboards and can be useful to business companies wanting to dynamically advertise their products and offers to people driving their car. The clients can subscribe to information based on specific topics. We present design solutions that use access points as emitters for transmitting messages to wireless-enabled devices equipped on vehicles. We also present implementation details for the evaluation of the proposed solution using a simulator designed for VANET application. The results show that the application can be used for transferring a significant amount of data even under difficult conditions, such as when cars are moving at increased speeds, or the congested Wi-Fi network causes significant packet loss.
[ { "version": "v1", "created": "Sun, 12 Feb 2012 21:11:40 GMT" } ]
2012-02-14T00:00:00
[ [ "Dobre", "Ciprian", "" ], [ "Tudor", "George Cristian", "" ] ]
new_dataset
0.988194
1202.2736
Andr\'e Gaul
Andr\'e Gaul
Function call overhead benchmarks with MATLAB, Octave, Python, Cython and C
The benchmark's source code is available under GPL3 at https://bitbucket.org/andrenarchy/funcall
null
null
null
cs.PL cs.MS math.NA
http://creativecommons.org/licenses/by/3.0/
We consider the overhead of function calls in the programming languages MATLAB/Octave, Python, Cython and C. In many applications a function has to be called very often inside a loop. One such application in numerical analysis is the finite element method where integrals have to be computed on each element in a loop. The called functions can often be evaluated efficiently but the function call itself may be time-consuming. We present a benchmark whose goal is to identify and quantify optimization potentials with respect to time consumption caused by function calls in the mentioned programming languages.
[ { "version": "v1", "created": "Mon, 13 Feb 2012 14:14:00 GMT" } ]
2012-02-14T00:00:00
[ [ "Gaul", "André", "" ] ]
new_dataset
0.999269
1202.2774
Marc Vuffray
Nicolas Macris and Marc Vuffray
Beyond the Bethe Free Energy of LDPC Codes via Polymer Expansions
null
null
null
null
cs.IT cond-mat.stat-mech math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The loop series provides a formal way to write down corrections to the Bethe entropy (and/or free energy) of graphical models. We provide methods to rigorously control such expansions for low-density parity-check codes used over a highly noisy binary symmetric channel. We prove that in the asymptotic limit of large size, with high probability, the Bethe expression gives an exact formula for the entropy (per bit) of the input word conditioned on the output of the channel. Our methods also apply to more general models.
[ { "version": "v1", "created": "Mon, 13 Feb 2012 15:58:26 GMT" } ]
2012-02-14T00:00:00
[ [ "Macris", "Nicolas", "" ], [ "Vuffray", "Marc", "" ] ]
new_dataset
0.994244
1202.2153
Everthon Valadao
Everthon Valadao, Dorgival Guedes, Ricardo Duarte
Caracteriza\c{c}\~ao de tempos de ida-e-volta na Internet
null
Revista Brasileira de Redes de Computadores e Sistemas Distribu\'idos, v. 3, p. 21-34, 2010
null
null
cs.NI cs.DC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Round-trip times (RTTs) are an important metric for the operation of many applications in the Internet. For instance, they are taken into account when choosing servers or peers in streaming systems, and they impact the operation of fault detectors and congestion control algorithms. Therefore, detailed knowledge about RTTs is important for application and protocol developers. In this work we present results on measuring RTTs between 81 PlanetLab nodes every ten seconds, for ten days. The resulting dataset has over 550 million measurements. Our analysis gives us a profile of delays in the network and identifies a Gamma distribution as the model that best fits our data. The average times observed are below 500 ms in more than 99% of the pairs, but there is significant variation, not only when we compare different pairs of hosts during the experiment, but also considering any given pair of hosts over time. By using a clustering technique, we observe that links can be divided in five distinct groups based on the distribution of RTTs over time and the losses observed, ranging from groups of near, well-connected pairs, to groups of distant hosts, with lower quality links between them.
[ { "version": "v1", "created": "Thu, 9 Feb 2012 23:50:42 GMT" } ]
2012-02-13T00:00:00
[ [ "Valadao", "Everthon", "" ], [ "Guedes", "Dorgival", "" ], [ "Duarte", "Ricardo", "" ] ]
new_dataset
0.999523
1202.2171
Raghav Sampangi
Raghav V. Sampangi, Saurabh Dey, Shalini R. Urs and Srinivas Sampalli
A security suite for wireless body area networks
20 pages, 10 figures, 3 tables, International Journal of Network Security & its Applications (IJNSA)
International Journal of Network Security & its Applications (IJNSA) 4(1) (2012) 97-116
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
[ { "version": "v1", "created": "Fri, 10 Feb 2012 03:18:48 GMT" } ]
2012-02-13T00:00:00
[ [ "Sampangi", "Raghav V.", "" ], [ "Dey", "Saurabh", "" ], [ "Urs", "Shalini R.", "" ], [ "Sampalli", "Srinivas", "" ] ]
new_dataset
0.989719
1002.0097
Ali Kakhbod
Ali Kakhbod and Morteza Zadimoghaddam
On the Construction of Prefix-Free and Fix-Free Codes with Specified Codeword Compositions
null
Discrete Applied Mathematics (DAM). vol. 159, no. 18, pp 2269-2275, 2011
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the construction of prefix-free and fix-free codes with specified codeword compositions. We present a polynomial time algorithm which constructs a fix-free code with the same codeword compositions as a given code for a special class of codes called distinct codes. We consider the construction of optimal fix-free codes which minimizes the average codeword cost for general letter costs with uniform distribution of the codewords and present an approximation algorithm to find a near optimal fix-free code with a given constant cost.
[ { "version": "v1", "created": "Sat, 30 Jan 2010 23:31:07 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2010 02:44:03 GMT" }, { "version": "v3", "created": "Mon, 20 Jun 2011 04:50:47 GMT" }, { "version": "v4", "created": "Fri, 15 Jul 2011 04:05:00 GMT" }, { "version": "v5", "created": "Thu, 9 Feb 2012 05:39:23 GMT" } ]
2012-02-10T00:00:00
[ [ "Kakhbod", "Ali", "" ], [ "Zadimoghaddam", "Morteza", "" ] ]
new_dataset
0.999701
1110.5712
Loet Leydesdorff
Loet Leydesdorff and Lutz Bornmann
Mapping (USPTO) Patent Data using Overlays to Google Maps
Journal of the American Society for Information Science and Technology (in press)
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A technique is developed using patent information available online (at the US Patent and Trademark Office) for the generation of Google Maps. The overlays indicate both the quantity and quality of patents at the city level. This information is relevant for research questions in technology analysis, innovation studies and evolutionary economics, as well as economic geography. The resulting maps can also be relevant for technological innovation policies and R&D management, because the US market can be considered the leading market for patenting and patent competition. In addition to the maps, the routines provide quantitative data about the patents for statistical analysis. The cities on the map are colored according to the results of significance tests. The overlays are explored for the Netherlands as a "national system of innovations," and further elaborated in two cases of emerging technologies: "RNA interference" and "nanotechnology."
[ { "version": "v1", "created": "Wed, 26 Oct 2011 06:55:24 GMT" }, { "version": "v2", "created": "Fri, 13 Jan 2012 09:01:23 GMT" }, { "version": "v3", "created": "Thu, 9 Feb 2012 08:59:01 GMT" } ]
2012-02-10T00:00:00
[ [ "Leydesdorff", "Loet", "" ], [ "Bornmann", "Lutz", "" ] ]
new_dataset
0.99893
1202.1925
Matthias F\"ugger
Danny Dolev, Matthias F\"ugger, Christoph Lenzen, Markus Posch, Ulrich Schmid, Andreas Steininger
FATAL+: A Self-Stabilizing Byzantine Fault-tolerant Clocking Scheme for SoCs
arXiv admin note: significant text overlap with arXiv:1105.4780
null
null
null
cs.DC cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present concept and implementation of a self-stabilizing Byzantine fault-tolerant distributed clock generation scheme for multi-synchronous GALS architectures in critical applications. It combines a variant of a recently introduced self-stabilizing algorithm for generating low-frequency, low-accuracy synchronized pulses with a simple non-stabilizing high-frequency, high-accuracy clock synchronization algorithm. We provide thorough correctness proofs and a performance analysis, which use methods from fault-tolerant distributed computing research but also addresses hardware-related issues like metastability. The algorithm, which consists of several concurrent communicating asynchronous state machines, has been implemented in VHDL using Petrify in conjunction with some extensions, and synthetisized for an Altera Cyclone FPGA. An experimental validation of this prototype has been carried out to confirm the skew and clock frequency bounds predicted by the theoretical analysis, as well as the very short stabilization times (required for recovering after excessively many transient failures) achievable in practice.
[ { "version": "v1", "created": "Thu, 9 Feb 2012 09:30:32 GMT" } ]
2012-02-10T00:00:00
[ [ "Dolev", "Danny", "" ], [ "Függer", "Matthias", "" ], [ "Lenzen", "Christoph", "" ], [ "Posch", "Markus", "" ], [ "Schmid", "Ulrich", "" ], [ "Steininger", "Andreas", "" ] ]
new_dataset
0.998152
1202.1953
Murtaza Hussain Shaikh
Murtaza Hussain Shaikh
Arduino Tool: For Interactive Artwork Installations
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emergence of the digital media and computational tools has widened the doors for creativity. The cutting edge in the digital arts and role of new technologies can be explored for the possible creativity. This gives an opportunity to involve arts with technologies to make creative works. The interactive artworks are often installed in the places where multiple people can interact with the installation, which allows the art to achieve its purpose by allowing the people to observe and involve with the installation. The level of engagement of the audience depends on the various factors such as aesthetic satisfaction, how the audience constructs meaning, pleasure and enjoyment. The method to evaluate these experiences is challenging as it depends on integration between the artificial life and real life by means of human computer interaction. This research investigates "How Adriano fits for creative and interactive artwork installations?" using an artwork installation in the campus of NTNU (Norwegian University of Science & Technology). The main focus of this investigation has been to get an overview on the intersection between information technology and Arts. This gives an opportunity to understand various attributes like creativity, cooperation and openness of processes influencing the creative Artworks. The artwork is combination of Adriano and other auxiliary components such as sensors, LED's and speakers.
[ { "version": "v1", "created": "Thu, 9 Feb 2012 11:12:09 GMT" } ]
2012-02-10T00:00:00
[ [ "Shaikh", "Murtaza Hussain", "" ] ]
new_dataset
0.999717
1202.1664
Sridhar Subramanian
Sridhar Subramanian and Baskaran Ramachandran
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
null
null
10.5121/ijnsa.2012.4108
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust value nodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET
[ { "version": "v1", "created": "Wed, 8 Feb 2012 11:38:47 GMT" } ]
2012-02-09T00:00:00
[ [ "Subramanian", "Sridhar", "" ], [ "Ramachandran", "Baskaran", "" ] ]
new_dataset
0.993955
1202.1680
Deepali Kadam
D. D. Kadam Patil and R. K. Shastri (Department of E&TC Vidya Pratishthan's CoE, Baramati, Maharashtra, India)
Design of wireless electronic stethoscope based on zigbee
9 pages,7 figures, IJDPS journal; Published in journl IJDPS,January 2012 issue
null
10.5121/ijdps.2012.3130
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heart sound stethoscope is primary stage to access diseases. In this paper design of an electronic stethoscope with the functions of wireless transmission is discussed. This electronic stethoscope based on embedded processor. The data can be transmitted through wireless transmission using Zigbee module. A microphone is used to pick up the sound of the heart beat. Acoustic stethoscope can be changed into a digital stethoscope by inserting an electric capacity microphone into its head. The signal is processed and amplified to play with or without earphone. Heart sounds are processed, sampled and sent wirelessly using Zigbee module so that multiple doctors can do auscultation. PC connectivity is provided through serial port where from audio and video can be made available through LAN and internet for telemedicine consultation. Heart beat signals are sensed, sent, displayed, monitored, stored, reviewed, and analysed with ease.
[ { "version": "v1", "created": "Wed, 8 Feb 2012 12:51:58 GMT" } ]
2012-02-09T00:00:00
[ [ "Patil", "D. D. Kadam", "", "Department of E&TC Vidya\n Pratishthan's CoE, Baramati, Maharashtra, India" ], [ "Shastri", "R. K.", "", "Department of E&TC Vidya\n Pratishthan's CoE, Baramati, Maharashtra, India" ] ]
new_dataset
0.996526
1202.1683
Emi Mathews
Emi Mathews and Ciby Mathew
Deployment of mobile routers ensuring coverage and connectivity
International Journal of Computer Networks & Communications (IJCNC)
null
null
null
cs.RO cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maintaining connectivity among a group of autonomous agents exploring an area is very important, as it promotes cooperation between the agents and also helps message exchanges which are very critical for their mission. Creating an underlying Ad-hoc Mobile Router Network (AMRoNet) using simple robotic routers is an approach that facilitates communication between the agents without restricting their movements. We address the following question in our paper: How to create an AMRoNet with local information and with minimum number of routers? We propose two new localized and distributed algorithms 1) agent-assisted router deployment and 2) a self-spreading for creating AMRoNet. The algorithms use a greedy deployment strategy for deploying routers effectively into the area maximizing coverage and a triangular deployment strategy to connect different connected component of routers from different base stations. Empirical analysis shows that the proposed algorithms are the two best localized approaches to create AMRoNets.
[ { "version": "v1", "created": "Wed, 8 Feb 2012 12:55:51 GMT" } ]
2012-02-09T00:00:00
[ [ "Mathews", "Emi", "" ], [ "Mathew", "Ciby", "" ] ]
new_dataset
0.993945
1201.1449
Yaser Sadra
Sodeif Ahadpour, Yaser Sadra, Zahra ArastehFard
A Novel Chaotic Encryption Scheme based on Pseudorandom Bit Padding
8 pages, 5 figures, Published in IJCSI International Journal of Computer Science Issues (January 2012)
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, (2012) 449-456
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be used in the diffusion functions of the image encryption for diffused pixels of plain image. In this paper, we propose a chaotic encryption scheme based on pseudorandom bit padding that the bits be generated by a novel logistic pseudorandom image algorithm. To evaluate the security of the cipher image of this scheme, the key space analysis, the correlation of two adjacent pixels and differential attack were performed. This scheme tries to improve the problem of failure of encryption such as small key space and level of security.
[ { "version": "v1", "created": "Fri, 6 Jan 2012 16:41:46 GMT" }, { "version": "v2", "created": "Tue, 7 Feb 2012 18:31:50 GMT" } ]
2012-02-08T00:00:00
[ [ "Ahadpour", "Sodeif", "" ], [ "Sadra", "Yaser", "" ], [ "ArastehFard", "Zahra", "" ] ]
new_dataset
0.998612
1202.0569
Alexander Souza
Alexander Souza
A Constructive Proof of the Cycle Double Cover Conjecture
Due to a flaw in Lemma 9, the paper has been withdrawn
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cycle double cover conjecture states that a graph is bridge-free if and only if there is a family of edge-simple cycles such that each edge is contained in exactly two of them. It was formulated independently by Szekeres (1973) and Seymour (1979). In this paper, we settle the conjecture in the affirmative. In particular, we give an algorithm, which inductively constructs a cycle double cover in polynomial time.
[ { "version": "v1", "created": "Thu, 2 Feb 2012 21:47:55 GMT" }, { "version": "v2", "created": "Tue, 7 Feb 2012 10:43:09 GMT" } ]
2012-02-08T00:00:00
[ [ "Souza", "Alexander", "" ] ]
new_dataset
0.981782
1202.1449
Ansuman Adhikary Ansuman Adhikary
Ansuman Adhikary and Giuseppe Caire
On the Coexistence of Macrocell Spatial Multiplexing and Cognitive Femtocells
Submitted to the 1st International Workshop on Small Cell Wireless Networks (SmallNets), ICC 2012
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a two-tier macrocell/femtocell system where the macrocell base station is equipped with multiple antennas and makes use of multiuser MIMO (spatial multiplexing), and the femtocells are "cognitive". In particular, we assume that the femtocells are aware of the locations of scheduled macrocell users on every time-frequency slot, so that they can make decisions on their transmission opportunities accordingly. Femtocell base stations are also equipped with multiple antennas. We propose a scheme where the macrocell downlink (macro- DL) is aligned with the femtocells uplink (femto-UL) and, Vice Versa, the macrocell uplink (macro-UL) is aligned with the femtocells downlink femto-DL). Using a simple "interference temperature" power control in the macro-DL/femto-UL direction, and exploiting uplink/downlink duality and the Yates, Foschini and Miljanic distributed power control algorithm in the macro- UL/femto-DL direction, we can achieve an extremely attractive macro/femto throughput tradeoff region in both directions. We investigate the impact of multiuser MIMO spatial multiplexing in the macrocell under the proposed scheme, and find that large gains are achievable by letting the macrocell schedule groups of co-located users, such that the number of femtocells affected by the interference temperature power constraint is small.
[ { "version": "v1", "created": "Tue, 7 Feb 2012 15:45:58 GMT" } ]
2012-02-08T00:00:00
[ [ "Adhikary", "Ansuman", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.994694
0807.0199
Thomas Unger
Thomas Unger and Nadya Markin
Quadratic Forms and Space-Time Block Codes from Generalized Quaternion and Biquaternion Algebras
8 pages, final version
IEEE Trans. Inform. Theory 57 (2011), no. 9, 6148-6156
10.1109/TIT.2011.2161909
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of space-time block codes (STBCs), the theory of generalized quaternion and biquaternion algebras (i.e., tensor products of two quaternion algebras) over arbitrary base fields is presented, as well as quadratic form theoretic criteria to check if such algebras are division algebras. For base fields relevant to STBCs, these criteria are exploited, via Springer's theorem, to construct several explicit infinite families of (bi-)quaternion division algebras. These are used to obtain new $2\x 2$ and $4\x 4$ STBCs.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 17:41:49 GMT" }, { "version": "v2", "created": "Fri, 11 Jun 2010 18:41:29 GMT" }, { "version": "v3", "created": "Sun, 31 Oct 2010 17:57:06 GMT" }, { "version": "v4", "created": "Mon, 11 Apr 2011 16:53:54 GMT" } ]
2012-02-07T00:00:00
[ [ "Unger", "Thomas", "" ], [ "Markin", "Nadya", "" ] ]
new_dataset
0.989118
0902.4246
Oleg Kurmaev
Oleg Kurmaev
Constant-Weight and Constant-Charge Binary Run-Length Limited Codes
29 pages, submitted to IEEE Transactions on Information Theory. This paper is a corrected version of a paper with the same title that appeared on the arXiv in Feb. 2009. The major change is in Section VI, in which Subsection D is now well defined
null
10.1109/TIT.2011.2145490
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constant-weight and constant-charge binary sequences with constrained run length of zeros are introduced. For these sequences, the weight and the charge distribution are found. Then, recurrent and direct formulas for calculating the number of these sequences are obtained. With considering these numbers of constant-weight and constant-charge RLL sequences as coefficients of convergent power series, generating functions are derived. The fact, that generating function for enumerating constant-charge RLL sequences does not have a closed form, is proved. Implementation of encoding and decoding procedures using Cover's enumerative scheme is shown. On the base of obtained results, some examples, such as enumeration of running-digital-sum (RDS) constrained RLL sequences or peak-shifts control capability are also provided.
[ { "version": "v1", "created": "Tue, 24 Feb 2009 21:33:58 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 19:16:47 GMT" } ]
2012-02-07T00:00:00
[ [ "Kurmaev", "Oleg", "" ] ]
new_dataset
0.999452
1109.4770
Jens Zumbr\"agel
Marcus Greferath and Jens Zumbr\"agel
On the algebraic representation of selected optimal non-linear binary codes
5 pages
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Revisiting an approach by Conway and Sloane we investigate a collection of optimal non-linear binary codes and represent them as (non-linear) codes over Z4. The Fourier transform will be used in order to analyze these codes, which leads to a new algebraic representation involving subgroups of the group of units in a certain ring. One of our results is a new representation of Best's (10, 40, 4) code as a coset of a subgroup in the group of invertible elements of the group ring Z4[Z5]. This yields a particularly simple algebraic decoding algorithm for this code. The technique at hand is further applied to analyze Julin's (12, 144, 4) code and the (12, 24, 12) Hadamard code. It can also be used in order to construct a (non-optimal) binary (14, 56, 6) code.
[ { "version": "v1", "created": "Thu, 22 Sep 2011 11:03:51 GMT" }, { "version": "v2", "created": "Mon, 6 Feb 2012 15:44:11 GMT" } ]
2012-02-07T00:00:00
[ [ "Greferath", "Marcus", "" ], [ "Zumbrägel", "Jens", "" ] ]
new_dataset
0.994132
1202.0919
Wenbing Dang
Wenbing Dang, Ali Pezeshki, Stephen Howard, William Moran, and Robert Calderbank
Coordinating Complementary Waveforms for Sidelobe Suppression
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general method for constructing radar transmit pulse trains and receive filters for which the radar point-spread function in delay and Doppler, given by the cross-ambiguity function of the transmit pulse train and the pulse train used in the receive filter, is essentially free of range sidelobes inside a Doppler interval around the zero-Doppler axis. The transmit pulse train is constructed by coordinating the transmission of a pair of Golay complementary waveforms across time according to zeros and ones in a binary sequence P. The pulse train used to filter the received signal is constructed in a similar way, in terms of sequencing the Golay waveforms, but each waveform in the pulse train is weighted by an element from another sequence Q. We show that a spectrum jointly determined by P and Q sequences controls the size of the range sidelobes of the cross-ambiguity function and by properly choosing P and Q we can clear out the range sidelobes inside a Doppler interval around the zero- Doppler axis. The joint design of P and Q enables a tradeoff between the order of the spectral null for range sidelobe suppression and the signal-to-noise ratio at the receiver output. We establish this trade-off and derive a necessary and sufficient condition for the construction of P and Q sequences that produce a null of a desired order.
[ { "version": "v1", "created": "Sat, 4 Feb 2012 20:17:10 GMT" } ]
2012-02-07T00:00:00
[ [ "Dang", "Wenbing", "" ], [ "Pezeshki", "Ali", "" ], [ "Howard", "Stephen", "" ], [ "Moran", "William", "" ], [ "Calderbank", "Robert", "" ] ]
new_dataset
0.999705
1202.1041
Ton Kloks
Ton Kloks
Packing interval graphs with vertex-disjoint triangles
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there exists a polynomial algorithm to pack interval graphs with vertex-disjoint triangles.
[ { "version": "v1", "created": "Mon, 6 Feb 2012 03:36:23 GMT" } ]
2012-02-07T00:00:00
[ [ "Kloks", "Ton", "" ] ]
new_dataset
0.977696
1202.1100
\"Omer Bulakci
Omer Bulakci
Wavelets for Single Carrier Communications
This work was presented as a part of Postgraduate Seminar Course: Wavelets in Communications, Aalto University School of Electrical Engineering, February 2, 2011. Three-page report followed by a presentation file. Seminar contribution
null
null
null
cs.NI cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper and the following presentation aim to provide a report regarding the seminar presentation given on 23.02.2011 as a part of the postgraduate seminar course S-88.4223 Wavelets in Communications lectured by Dr. Sumesh Parameswaran at Aalto University School of Electrical Engineering. In particular, the topic on "wavelets for single carrier communications" has been considered herein. Furthermore, a summary of wavelets in Single Carrier (SC)-FDMA Systems is as well provided.
[ { "version": "v1", "created": "Mon, 6 Feb 2012 11:01:25 GMT" } ]
2012-02-07T00:00:00
[ [ "Bulakci", "Omer", "" ] ]
new_dataset
0.999356
1202.0582
Ghazale Hosseinabadi
Ghazale Hosseinabadi and Nitin Vaidya
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper presents the design and performance evaluation of an efficient MAC protocol for wireless networks, called Token-DCF. Token-DCF decreases both idle time and collision time. In Token-DCF, each station keeps track of neighboring links' queue length by overhearing of transmitted packets on the wireless medium. The result is then used to assign privileges to the network stations. A privileged station does not follow the backoff mechanism and transmits immediately after the channel is sensed idle. Our simulation results show that Token-DCF can significantly improve channel utilization, system throughput and channel access delay over 802.11 DCF.
[ { "version": "v1", "created": "Thu, 2 Feb 2012 23:37:03 GMT" } ]
2012-02-06T00:00:00
[ [ "Hosseinabadi", "Ghazale", "" ], [ "Vaidya", "Nitin", "" ] ]
new_dataset
0.999602
1202.0598
Paul E. Gunnells
Dorian Goldfeld and Paul E. Gunnells
Defeating the Kalka--Teicher--Tsaban linear algebra attack on the Algebraic Eraser
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Algebraic Eraser (AE) is a public key protocol for sharing information over an insecure channel using commutative and noncommutative groups; a concrete realization is given by Colored Burau Key Agreement Protocol (CBKAP). In this paper, we describe how to choose data in CBKAP to thwart an attack by Kalka--Teicher--Tsaban.
[ { "version": "v1", "created": "Fri, 3 Feb 2012 02:42:26 GMT" } ]
2012-02-06T00:00:00
[ [ "Goldfeld", "Dorian", "" ], [ "Gunnells", "Paul E.", "" ] ]
new_dataset
0.984821
1202.0788
Marek Trt\'ik
Jan Obdr\v{z}\'alek, Ji\v{r}\'i Slab\'y and Marek Trt\'ik
STANSE: Bug-finding Framework for C Programs
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
STANSE is a free (available under the GPLv2 license) modular framework for finding bugs in C programs using static analysis. Its two main design goals are 1) ability to process large software projects like the Linux kernel and 2) extensibility with new bug-finding techniques with a minimal effort. Currently there are four bug-finding algorithms implemented within STANSE: AutomatonChecker checks properties described in an automata-based formalism, ThreadChecker detects deadlocks among multiple threads, LockChecker finds locking errors based on statistics, and ReachabilityChecker looks for unreachable code. STANSE has been tested on the Linux kernel, where it has found dozens of previously undiscovered bugs.
[ { "version": "v1", "created": "Fri, 3 Feb 2012 17:47:27 GMT" } ]
2012-02-06T00:00:00
[ [ "Obdržálek", "Jan", "" ], [ "Slabý", "Jiří", "" ], [ "Trtík", "Marek", "" ] ]
new_dataset
0.955017
1007.2170
Thomas Rothvoss
Friedrich Eisenbrand, D\"om\"ot\"or P\'alv\"olgyi, Thomas Rothvo{\ss}
Bin Packing via Discrepancy of Permutations
Journal version of SODA'11 paper
null
null
null
cs.DM math.CO math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A well studied special case of bin packing is the 3-partition problem, where n items of size > 1/4 have to be packed in a minimum number of bins of capacity one. The famous Karmarkar-Karp algorithm transforms a fractional solution of a suitable LP relaxation for this problem into an integral solution that requires at most O(log n) additional bins. The three-permutations-problem of Beck is the following. Given any 3 permutations on n symbols, color the symbols red and blue, such that in any interval of any of those permutations, the number of red and blue symbols is roughly the same. The necessary difference is called the discrepancy. We establish a surprising connection between bin packing and Beck's problem: The additive integrality gap of the 3-partition linear programming relaxation can be bounded by the discrepancy of 3 permutations. Reversely, making use of a recent example of 3 permutations, for which a discrepancy of Omega(log n) is necessary, we prove the following: The O(log^2 n) upper bound on the additive gap for bin packing with arbitrary item sizes cannot be improved by any technique that is based on rounding up items. This lower bound holds for a large class of algorithms including the Karmarkar-Karp procedure.
[ { "version": "v1", "created": "Tue, 13 Jul 2010 18:18:32 GMT" }, { "version": "v2", "created": "Thu, 2 Feb 2012 20:28:26 GMT" } ]
2012-02-03T00:00:00
[ [ "Eisenbrand", "Friedrich", "" ], [ "Pálvölgyi", "Dömötör", "" ], [ "Rothvoß", "Thomas", "" ] ]
new_dataset
0.971631
0903.1627
Fran\c{c}ois Nicolas
Julien Cassaigne and Francois Nicolas
On the Morse-Hedlund complexity gap
7 pages. Not intended to be submitted. New proof of an old result
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1938, Morse and Hedlund proved that the subword complexity function of an infinite word is either bounded or at least linearly growing. In 1982, Ehrenfeucht and Rozenberg proved that this gap property holds for the subword complexity function of any language. The aim of the present paper is to present a self-contained, compact proof of Ehrenfeucht and Rozenberg's result.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 19:15:38 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 12:28:47 GMT" }, { "version": "v3", "created": "Thu, 19 Nov 2009 08:48:08 GMT" }, { "version": "v4", "created": "Fri, 4 Dec 2009 17:25:05 GMT" }, { "version": "v5", "created": "Wed, 1 Feb 2012 18:07:36 GMT" } ]
2012-02-02T00:00:00
[ [ "Cassaigne", "Julien", "" ], [ "Nicolas", "Francois", "" ] ]
new_dataset
0.995942
1112.6256
Li Ning Mr.
Mingfei Li, Christoffer Ma and Li Ning
(1+epsilon)-Distance Oracle for Planar Labeled Graph
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a vertex-labeled graph, each vertex $v$ is attached with a label from a set of labels. The vertex-label query desires the length of the shortest path from the given vertex to the set of vertices with the given label. We show how to construct an oracle if the given graph is planar, such that $O(\frac{1}{\epsilon}n\log n)$ storing space is needed, and any vertex-label query could be answered in $O(\frac{1}{\epsilon}\log n\log \rho)$ time with stretch $1+\epsilon$. $\rho$ is the radius of the given graph, which is half of the diameter. For the case that $\rho = O(\log n)$, we construct an oracle that achieves $O(\log n)$ query time, without changing the order of storing space.
[ { "version": "v1", "created": "Thu, 29 Dec 2011 09:23:49 GMT" }, { "version": "v2", "created": "Tue, 31 Jan 2012 13:17:01 GMT" } ]
2012-02-01T00:00:00
[ [ "Li", "Mingfei", "" ], [ "Ma", "Christoffer", "" ], [ "Ning", "Li", "" ] ]
new_dataset
0.999262
1201.6421
Ton Kloks
Ton Kloks
The black-and-white coloring problem on permutation graphs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a graph G and integers b and w. The black-and-white coloring problem asks if there exist disjoint sets of vertices B and W with |B|=b and |W|=w such that no vertex in B is adjacent to any vertex in W. In this paper we show that the problem is polynomial when restricted to permutation graphs.
[ { "version": "v1", "created": "Tue, 31 Jan 2012 02:40:54 GMT" } ]
2012-02-01T00:00:00
[ [ "Kloks", "Ton", "" ] ]
new_dataset
0.997687
1201.6533
Patrick Sol\'e
Adel Alahmadi, Patrick Sol\'e, Houda Sboui, Olfa Yemen
Cyclic codes over $M_2(\F_2)$
10 pages; submitted
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ring in the title is the first non commutative ring to have been used as alphabet for block codes. The original motivation was the construction of some quaternionic modular lattices from codes. The new application is the construction of space time codes obtained by concatenation from the Golden code. In this article, we derive structure theorems for cyclic codes over that ring, and use them to characterize the lengths where self dual cyclic codes exist. These codes in turn give rise to formally self dual quaternary codes.
[ { "version": "v1", "created": "Tue, 31 Jan 2012 13:18:15 GMT" } ]
2012-02-01T00:00:00
[ [ "Alahmadi", "Adel", "" ], [ "Solé", "Patrick", "" ], [ "Sboui", "Houda", "" ], [ "Yemen", "Olfa", "" ] ]
new_dataset
0.971184
1201.6033
Marek Trt\'ik
Marek Trt\'ik
Compact Symbolic Execution (technical report)
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a generalisation of King's symbolic execution technique called compact symbolic execution. It is based on a concept of templates: a template is a declarative parametric description of such a program part, generating paths in symbolic execution tree with regularities in program states along them. Typical sources of these paths are program loops and recursive calls. Using the templates we fold the corresponding paths into single vertices and therefore considerably reduce size of the tree without loss of any information. There are even programs for which compact symbolic execution trees are finite even though the classic symbolic execution trees are infinite.
[ { "version": "v1", "created": "Sun, 29 Jan 2012 12:51:06 GMT" } ]
2012-01-31T00:00:00
[ [ "Trtík", "Marek", "" ] ]
new_dataset
0.999636
1201.5729
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On Compatible Normal Odd Partitions in Cubic Graphs
Accepted for publication in Journal of Graph Theory
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A normal odd partition T of the edges of a cubic graph is a partition into trails of odd length (no repeated edge) such that each vertex is the end vertex of exactly one trail of the partition and internal in some trail. For each vertex v, we can distinguish the edge for which this vertex is pending. Three normal odd partitions are compatible whenever these distinguished edges are distinct for each vertex. We examine this notion and show that a cubic 3 edge-colorable graph can always be provided with three compatible normal odd partitions. The Petersen graph has this property and we can construct other cubic graphs with chromatic index four with the same property. Finally, we propose a new conjecture which, if true, would imply the well known Fan and Raspaud Conjecture
[ { "version": "v1", "created": "Fri, 27 Jan 2012 09:24:05 GMT" } ]
2012-01-30T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
new_dataset
0.991965
1201.5603
Igor Nesiolovskiy
Igor Nesiolovskiy, Artem Nesiolovskiy
BIN@ERN: Binary-Ternary Compressing Data Coding
11 pages, 4 figures
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a new method of data encoding which may be used in various modern digital, computer and telecommunication systems and devices. The method permits the compression of data for storage or transmission, allowing the exact original data to be reconstructed without any loss of content. The method is characterized by the simplicity of implementation, as well as high speed and compression ratio. The method is based on a unique scheme of binary-ternary prefix-free encoding of characters of the original data. This scheme does not require the transmission of the code tables from encoder to decoder; allows for the linear presentation of the code lists; permits the usage of computable indexes of the prefix codes in a linear list for decoding; makes it possible to estimate the compression ratio prior to encoding; makes the usage of multiplication and division operations, as well as operations with the floating point unnecessary; proves to be effective for static as well as adaptive coding; applicable to character sets of any size; allows for repeated compression to improve the ratio.
[ { "version": "v1", "created": "Thu, 26 Jan 2012 18:53:00 GMT" } ]
2012-01-27T00:00:00
[ [ "Nesiolovskiy", "Igor", "" ], [ "Nesiolovskiy", "Artem", "" ] ]
new_dataset
0.996348
1201.5298
Karolina So{\l}tys
Michael Lampis, Valia Mitsou, and Karolina So{\l}tys
Scrabble is PSPACE-Complete
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the computational complexity of the game of Scrabble. We prove the PSPACE-completeness of a derandomized model of the game, answering an open question of Erik Demaine and Robert Hearn.
[ { "version": "v1", "created": "Wed, 25 Jan 2012 15:27:31 GMT" } ]
2012-01-26T00:00:00
[ [ "Lampis", "Michael", "" ], [ "Mitsou", "Valia", "" ], [ "Sołtys", "Karolina", "" ] ]
new_dataset
0.985113
1201.5340
Marek Szyku{\l}a
Marek Szyku{\l}a, Andrzej Kisielewicz
Rainbow Induced Subgraphs in Replication Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph $G$ is called a replication graph of a graph $H$ if $G$ is obtained from $H$ by replacing vertices of $H$ by arbitrary cliques of vertices and then replacing each edge in $H$ by all the edges between corresponding cligues. For a given graph $H$ the $\rho_R(H)$ is the minimal number of vertices of a replication graph $G$ of $H$ such that every proper vertex coloring of $G$ contains a rainbow induced subgraph isomorphic to $H$ having exactly one vertex in each replication clique of $G$. We prove some bounds for $\rho_R$ for some classes of graphs and compute some exact values. Also some experimental results obtained by a computer search are presented and conjectures based on them are formulated.
[ { "version": "v1", "created": "Wed, 25 Jan 2012 18:54:11 GMT" } ]
2012-01-26T00:00:00
[ [ "Szykuła", "Marek", "" ], [ "Kisielewicz", "Andrzej", "" ] ]
new_dataset
0.95624
0912.4613
Pedro Arjona-Villica\~na
P. David Arjona-Villica\~na, Costas C. Constantinou and Alexander S. Stepanenko
Chain Routing: A new routing framework for the Internet based on complete orders
Submitted to Computer Networks
IET Communications 5(16), 2011
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new framework to perform routing at the Autonomous System level is proposed in this paper. This mechanism, called Chain Routing, uses complete orders as its main topological unit. Since complete orders are acyclic digraphs that possess a known topology, it is possible to define an acyclic structure to route packets between a group of Autonomous Systems. The adoption of complete orders also allows easy identification and avoidance of persistent route oscillations, eliminates the possibility of developing transient loops in paths, and provides a structure that facilitates the implementation of traffic engineering. Moreover, by combining Chain Routing with other mechanisms that implement complete orders in time, we suggest that it is possible to design a new routing protocol which could be more reliable and stable than BGP's current implementation. Although Chain Routing will require an increase of the message overhead and greater coordination between network administrators, the rewards in stability and resilience should more than compensate for this effort.
[ { "version": "v1", "created": "Wed, 23 Dec 2009 11:35:13 GMT" }, { "version": "v2", "created": "Sat, 3 Apr 2010 04:28:16 GMT" } ]
2012-01-25T00:00:00
[ [ "Arjona-Villicaña", "P. David", "" ], [ "Constantinou", "Costas C.", "" ], [ "Stepanenko", "Alexander S.", "" ] ]
new_dataset
0.992148
1107.4965
Woomyoung Park
Woomyoung Park and Alexander Barg
Polar codes for q-ary channels, q=2^r
This version appears under a new title. Complete proofs of polarization have been added. The preliminary draft (v2) was published in Proc. 49th Allerton Conference, 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study polarization for nonbinary channels with input alphabet of size q=2^r,r=2,3,... Using Arikan's polarizing kernel H_2, we prove that the virtual channels that arise in the process of polarization converge to q-ary channels with capacity 1,2,...,r bits, and that the total transmission rate approaches the symmetric capacity of the channel. This leads to an explicit transmission scheme for q-ary channels. The error probability of decoding using successive cancellation behaves as exp(-N^\alpha), where N is the code length and {\alpha} is any constant less than 0.5.
[ { "version": "v1", "created": "Mon, 25 Jul 2011 14:54:30 GMT" }, { "version": "v2", "created": "Fri, 7 Oct 2011 14:31:48 GMT" }, { "version": "v3", "created": "Tue, 24 Jan 2012 18:10:55 GMT" } ]
2012-01-25T00:00:00
[ [ "Park", "Woomyoung", "" ], [ "Barg", "Alexander", "" ] ]
new_dataset
0.997825
1201.2074
Jan Wr\'obel
Jan Wrobel
Reflection Scan: an Off-Path Attack on TCP
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker. The attacker sends to a victim a sequence of identical spoofed segments. The victim responds to each segment in the sequence (the sequence is reflected by the victim) if the segments satisfy a certain condition tested by the attacker. The responses do not reach the attacker directly, but induce extra load on a routing queue shared between the victim and the attacker. Increased processing time of packets traversing the queue reveal that the tested condition was true. The paper concentrates on the TCP, but the approach is generic and can be effective against other protocols that allow to construct requests which are conditionally answered by the victim. A proof of concept was created to assess applicability of the method in real-life scenarios.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 15:19:38 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2012 11:16:26 GMT" } ]
2012-01-25T00:00:00
[ [ "Wrobel", "Jan", "" ] ]
new_dataset
0.999104
1112.0296
Omur Ozel
Omur Ozel and Sennur Ulukus
AWGN Channel under Time-Varying Amplitude Constraints with Causal Information at the Transmitter
Published in Asilomar Conference on Signals, Systems and Computers, November 2011; Fig. 4 revised
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the classical AWGN channel where the channel input is constrained to an amplitude constraint that stochastically varies at each channel use, independent of the message. This is an abstraction of an energy harvesting transmitter where the code symbol energy at each channel use is determined by an exogenous energy arrival process and there is no battery for energy storage. At each channel use, an independent realization of the amplitude constraint process is observed by the transmitter causally. This scenario is a state-dependent channel with perfect causal state information at the transmitter. We derive the capacity of this channel using Shannon's coding scheme with causal state information. We prove that the code symbols must be selected from a finite set in the capacity achieving scheme, as in the case of Smith. We numerically study the binary on-off energy arrivals where the amplitude constraint is either zero or a non-zero constant.
[ { "version": "v1", "created": "Thu, 1 Dec 2011 20:33:17 GMT" }, { "version": "v2", "created": "Mon, 23 Jan 2012 19:10:11 GMT" } ]
2012-01-24T00:00:00
[ [ "Ozel", "Omur", "" ], [ "Ulukus", "Sennur", "" ] ]
new_dataset
0.996328
1201.4524
Vance Faber
Vance Faber
Livelock free routing schemes
5 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a livelock free routing algorithm for any allowed network. Unlike some other solutions to this problem: 1) packets entering the network have an absolute upper bound on the time to reach their destination; 2) under light loads, packets are delivered to their destinations in nearly optimal time; 3) packets with desired paths far away from congested areas will have routing times far shorter than packets wanting to access congested areas; 4) if the network becomes congested and later clears, the network operates just as it would have when it was initially under a light load. The main ideas of this note appear in a different form in my 1994 patent 5,369,745. This note adds to those results and makes them more mathematical.
[ { "version": "v1", "created": "Sun, 22 Jan 2012 01:58:21 GMT" } ]
2012-01-24T00:00:00
[ [ "Faber", "Vance", "" ] ]
new_dataset
0.999342
1201.4536
Jaydip Sen
Jaydip Sen
A Multi-Path Certification Protocol for Mobile Ad Hoc Networks
4 pages, 6 figures, 4 pages. In Proceedings of the 4th International Conference on Computers & Devices for Communications (CODEC), December 14 -- 16, 2009, Kolkata, India
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. For security, these protocols are highly dependent on cryptographic key exchange operations. This paper presents a multi-path certification protocol for efficient and reliable key exchange among the nodes in a MANET. Simulation results have shown the effectiveness and efficiency of the protocol.
[ { "version": "v1", "created": "Sun, 22 Jan 2012 07:42:13 GMT" } ]
2012-01-24T00:00:00
[ [ "Sen", "Jaydip", "" ] ]
new_dataset
0.982375
1201.4553
Loet Leydesdorff
Loet Leydesdorff
The Knowledge-Based Economy and the Triple Helix Model
Annual Review of Information Science and Technology 44 (2010) 367-417; preprint version
null
null
null
cs.OH physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
1. Introduction - the metaphor of a "knowledge-based economy"; 2. The Triple Helix as a model of the knowledge-based economy; 3. Knowledge as a social coordination mechanism; 4. Neo-evolutionary dynamics in a Triple Helix of coordination mechanism; 5. The operation of the knowledge base; 6. The restructuring of knowledge production in a KBE; 7. The KBE and the systems-of-innovation approach; 8. The KBE and neo-evolutionary theories of innovation; 8.1 The construction of the evolving unit; 8.2 User-producer relations in systems of innovation; 8.3 'Mode-2' and the production of scientific knowledge; 8.4 A Triple Helix model of innovations; 9. Empirical studies and simulations using the TH model; 10. The KBE and the measurement; 10.1 The communication of meaning and information; 10.2 The expectation of social structure; 10.3 Configurations in a knowledge-based economy
[ { "version": "v1", "created": "Sun, 22 Jan 2012 12:08:58 GMT" } ]
2012-01-24T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
new_dataset
0.998168
1201.4719
Marek Trt\'ik
Ji\v{r}\'i Slab\'y, Jan Strej\v{c}ek, Marek Trt\'ik
On Synergy of Metal, Slicing, and Symbolic Execution
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel technique for finding real errors in programs. The technique is based on a synergy of three well-known methods: metacompilation, slicing, and symbolic execution. More precisely, we instrument a given program with a code that tracks runs of state machines representing various kinds of errors. Next we slice the program to reduce its size without affecting runs of state machines. And then we symbolically execute the sliced program. Depending on the kind of symbolic execution, the technique can be applied as a stand-alone bug finding technique, or to weed out some false positives from an output of another bug-finding tool. We provide several examples demonstrating the practical applicability of our technique.
[ { "version": "v1", "created": "Mon, 23 Jan 2012 14:06:32 GMT" } ]
2012-01-24T00:00:00
[ [ "Slabý", "Jiří", "" ], [ "Strejček", "Jan", "" ], [ "Trtík", "Marek", "" ] ]
new_dataset
0.966017
1201.4301
Chitra Kiran N
Chitra Kiran N., G. Narendra Kumar
A Robust Client Verification in cloud enabled m-Commerce using Gaining Protocol
null
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, November 2011 ISSN (Online): 1694-0814
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proposed system highlights a novel approach of exclusive verification process using gain protocol for ensuring security among both the parties (client-service provider) in m-commerce application with cloud enabled service. The proposed system is based on the potential to verify the clients with trusted hand held device depending on the set of frequent events and actions to be carried out. The framework of the proposed work is design after collecting a real time data sets from an android enabled hand set, which when subjected to gain protocol, will result in detection of malicious behavior of illegal clients in the network. The real time experiment is performed with applicable datasets gather, which show the best result for identifying threats from last 2 months data collected.
[ { "version": "v1", "created": "Fri, 20 Jan 2012 14:21:15 GMT" } ]
2012-01-23T00:00:00
[ [ "N.", "Chitra Kiran", "" ], [ "Kumar", "G. Narendra", "" ] ]
new_dataset
0.988506
1201.3950
Koulali Mohammed-Amine
Mohammed-Amine Koulali, Mohammed El Koutbi, Abdellatif Kobbane and Mostafa Azizi
QGRP: A Novel QoS-Geographic Routing Protocol for Multimedia Wireless Sensor Networks
ISSN (Online): 1694-0814
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, pages 55-61, 2011
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thanks to the potential they hold and the variety of their application domains, Multimedia Wireless Sensor Networks (MWSN) are forecast to become highly integrated into our daily activities. Due to the carried content nature, mainly composed of images and/or video streams with high throughput and delay constraints, Quality of Service in the context of MWSN is a crucial issue. In this paper, we propose a QoS and energy aware geographic routing protocol for MWSN: QGRP. The proposed protocol addresses bandwidth, delay and energy constraints associated with MWSN. QGRP adopts an analytical model of IEEE 802.11 Distributed Coordination Function (DCF) to estimate available bandwidth and generates loop-free routing paths.
[ { "version": "v1", "created": "Thu, 19 Jan 2012 00:20:48 GMT" } ]
2012-01-20T00:00:00
[ [ "Koulali", "Mohammed-Amine", "" ], [ "Koutbi", "Mohammed El", "" ], [ "Kobbane", "Abdellatif", "" ], [ "Azizi", "Mostafa", "" ] ]
new_dataset
0.999367
1201.3821
Carlos Miravet
Carlos Miravet and Francisco B. Rodr\'iguez
A PCA-Based Super-Resolution Algorithm for Short Image Sequences
4 pages, 4 figures. A version of this work was submitted to ICIP 2010
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel, learning-based, two-step super-resolution (SR) algorithm well suited to solve the specially demanding problem of obtaining SR estimates from short image sequences. The first step, devoted to increase the sampling rate of the incoming images, is performed by fitting linear combinations of functions generated from principal components (PC) to reproduce locally the sparse projected image data, and using these models to estimate image values at nodes of the high-resolution grid. PCs were obtained from local image patches sampled at sub-pixel level, which were generated in turn from a database of high-resolution images by application of a physically realistic observation model. Continuity between local image models is enforced by minimizing an adequate functional in the space of model coefficients. The second step, dealing with restoration, is performed by a linear filter with coefficients learned to restore residual interpolation artifacts in addition to low-resolution blurring, providing an effective coupling between both steps of the method. Results on a demanding five-image scanned sequence of graphics and text are presented, showing the excellent performance of the proposed method compared to several state-of-the-art two-step and Bayesian Maximum a Posteriori SR algorithms.
[ { "version": "v1", "created": "Wed, 18 Jan 2012 15:19:03 GMT" } ]
2012-01-19T00:00:00
[ [ "Miravet", "Carlos", "" ], [ "Rodríguez", "Francisco B.", "" ] ]
new_dataset
0.999601
1201.0725
Manel Khelifi
Manel Khelifi, Assia Djabelkhir
LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.
[ { "version": "v1", "created": "Tue, 3 Jan 2012 19:12:46 GMT" }, { "version": "v2", "created": "Tue, 17 Jan 2012 20:28:58 GMT" } ]
2012-01-18T00:00:00
[ [ "Khelifi", "Manel", "" ], [ "Djabelkhir", "Assia", "" ] ]
new_dataset
0.970236
1007.2460
Hiroshi Fukuda
Hiroshi Fukuda, Chiaki Kanomata, Nobuaki Mutoh, Gisaku Nakamura, Doris Schattschneider
Polyominoes and Polyiamonds as Fundamental Domains of Isohedral Tilings with Rotational Symmetry
null
Symmetry 2011, 3(4), 828-851
10.3390/sym3040828
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe computer algorithms that produce the complete set of isohedral tilings by n-omino or n-iamond tiles in which the tiles are fundamental domains and the tilings have 3-, 4-, or 6-fold rotational symmetry. The symmetry groups of such tilings are of types p3, p31m, p4, p4g, and p6. There are no isohedral tilings with symmetry groups p3m1, p4m, or p6m that have polyominoes or polyiamonds as fundamental domains. We display the algorithms' output and give enumeration tables for small values of n. This expands on our earlier works (Fukuda et al 2006, 2008).
[ { "version": "v1", "created": "Thu, 15 Jul 2010 01:21:57 GMT" }, { "version": "v2", "created": "Thu, 30 Jun 2011 02:18:59 GMT" } ]
2012-01-17T00:00:00
[ [ "Fukuda", "Hiroshi", "" ], [ "Kanomata", "Chiaki", "" ], [ "Mutoh", "Nobuaki", "" ], [ "Nakamura", "Gisaku", "" ], [ "Schattschneider", "Doris", "" ] ]
new_dataset
0.958793
1101.4116
Riccardo Murri
Riccardo Murri, Peter Z. Kunszt, Sergio Maffioletti, Valery Tschopp
GridCertLib: a Single Sign-on Solution for Grid Web Applications and Portals
18 pages, 1 figure; final manuscript accepted for publication by the "Journal of Grid Computing"
null
10.1007/s10723-011-9195-y
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the design and implementation of GridCertLib, a Java library leveraging a Shibboleth-based authentication infrastructure and the SLCS online certificate signing service, to provide short-lived X.509 certificates and Grid proxies. The main use case envisioned for GridCertLib, is to provide seamless and secure access to Grid/X.509 certificates and proxies in web applications and portals: when a user logs in to the portal using Shibboleth authentication, GridCertLib can automatically obtain a Grid/X.509 certificate from the SLCS service and generate a VOMS proxy from it. We give an overview of the architecture of GridCertLib and briefly describe its programming model. Its application to some deployment scenarios is outlined, as well as a report on practical experience integrating GridCertLib into portals for Bioinformatics and Computational Chemistry applications, based on the popular P-GRADE and Django softwares.
[ { "version": "v1", "created": "Fri, 21 Jan 2011 11:56:07 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2011 15:46:37 GMT" }, { "version": "v3", "created": "Tue, 6 Sep 2011 14:38:56 GMT" } ]
2012-01-17T00:00:00
[ [ "Murri", "Riccardo", "" ], [ "Kunszt", "Peter Z.", "" ], [ "Maffioletti", "Sergio", "" ], [ "Tschopp", "Valery", "" ] ]
new_dataset
0.998491
1108.6197
Penying Rochanakul
Penying Rochanakul
Two-Level Fingerprinting Codes: Non-Trivial Constructions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the concept of two-level fingerprinting codes, introduced by Anthapadmanabhan and Barg (2009) in context of traceability (TA) codes, to other types of fingerprinting codes, namely identifiable parent property (IPP) codes, secure-frameproof (SFP) codes, and frameproof (FP) codes. We define and propose the first explicit non-trivial construction for two-level IPP, SFP and FP codes.
[ { "version": "v1", "created": "Wed, 31 Aug 2011 11:44:08 GMT" }, { "version": "v2", "created": "Sun, 15 Jan 2012 01:47:34 GMT" } ]
2012-01-17T00:00:00
[ [ "Rochanakul", "Penying", "" ] ]
new_dataset
0.999787
1201.2905
Qiyang Zhao
Zhao Qiyang
NegCut: Automatic Image Segmentation based on MRF-MAP
Since it's an unlucky failure about length-limit violation, I'd like to save it on arXiv as a record. Any suggestions are welcome
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Solving the Maximum a Posteriori on Markov Random Field, MRF-MAP, is a prevailing method in recent interactive image segmentation tools. Although mathematically explicit in its computational targets, and impressive for the segmentation quality, MRF-MAP is hard to accomplish without the interactive information from users. So it is rarely adopted in the automatic style up to today. In this paper, we present an automatic image segmentation algorithm, NegCut, based on the approximation to MRF-MAP. First we prove MRF-MAP is NP-hard when the probabilistic models are unknown, and then present an approximation function in the form of minimum cuts on graphs with negative weights. Finally, the binary segmentation is taken from the largest eigenvector of the target matrix, with a tuned version of the Lanczos eigensolver. It is shown competitive at the segmentation quality in our experiments.
[ { "version": "v1", "created": "Fri, 13 Jan 2012 18:18:03 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2012 03:28:43 GMT" } ]
2012-01-17T00:00:00
[ [ "Qiyang", "Zhao", "" ] ]
new_dataset
0.987824
1201.2980
Xuechong Guan
Xuechong Guan and Yongming Li
Information algebra system of soft sets
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Information algebra is algebraic structure for local computation and inference. Given an initial universe set and a parameter set, we show that a soft set system over them is an information algebra. Moreover, in a soft set system, the family of all soft sets with a finite parameter subset can form a compact information algebra.
[ { "version": "v1", "created": "Sat, 14 Jan 2012 02:51:25 GMT" } ]
2012-01-17T00:00:00
[ [ "Guan", "Xuechong", "" ], [ "Li", "Yongming", "" ] ]
new_dataset
0.986746
1201.3011
Stephen G. Kobourov
Stephen G. Kobourov
Spring Embedders and Force Directed Graph Drawing Algorithms
23 pages, 8 figures
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Force-directed algorithms are among the most flexible methods for calculating layouts of simple undirected graphs. Also known as spring embedders, such algorithms calculate the layout of a graph using only information contained within the structure of the graph itself, rather than relying on domain-specific knowledge. Graphs drawn with these algorithms tend to be aesthetically pleasing, exhibit symmetries, and tend to produce crossing-free layouts for planar graphs. In this survey we consider several classical algorithms, starting from Tutte's 1963 barycentric method, and including recent scalable multiscale methods for large and dynamic graphs.
[ { "version": "v1", "created": "Sat, 14 Jan 2012 12:49:31 GMT" } ]
2012-01-17T00:00:00
[ [ "Kobourov", "Stephen G.", "" ] ]
new_dataset
0.967735
1201.3077
Joseph Gil
Joseph Yossi Gil and David Allen Scott
A Bijective String Sorting Transform
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a string of characters, the Burrows-Wheeler Transform rearranges the characters in it so as to produce another string of the same length which is more amenable to compression techniques such as move to front, run-length encoding, and entropy encoders. We present a variant of the transform which gives rise to similar or better compression value, but, unlike the original, the transform we present is bijective, in that the inverse transformation exists for all strings. Our experiments indicate that using our variant of the transform gives rise to better compression ratio than the original Burrows-Wheeler transform. We also show that both the transform and its inverse can be computed in linear time and consuming linear storage.
[ { "version": "v1", "created": "Sun, 15 Jan 2012 10:17:36 GMT" } ]
2012-01-17T00:00:00
[ [ "Gil", "Joseph Yossi", "" ], [ "Scott", "David Allen", "" ] ]
new_dataset
0.953184
1201.3315
Murat Guzeltepe Mr
Murat G\"uzeltepe
Perfect Mannheim, Lipschitz and Hurwitz weight codes
21 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, upper bounds on codes over Gaussian integers, Lipschitz integers and Hurwitz integers with respect to Mannheim metric, Lipschitz and Hurwitz metric are given.
[ { "version": "v1", "created": "Fri, 13 Jan 2012 14:01:56 GMT" } ]
2012-01-17T00:00:00
[ [ "Güzeltepe", "Murat", "" ] ]
new_dataset
0.999231
1201.3318
Marcin Kik
Marcin Kik
Notes on Bit-reversal Broadcast Scheduling
null
null
null
null
cs.DS cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report contains revision and extension of some results about RBO [arXiv:1108.5095]. RBO is a simple and efficient broadcast scheduling of $n = 2^k$ uniform frames for battery powered radio receivers. Each frame contains a key from some arbitrary linearly ordered universe. The broadcast cycle -- a sequence of frames sorted by the keys and permuted by $k$-bit reversal -- is transmitted in a round robin fashion by the broadcaster. At arbitrary time during the transmission, the receiver may start a simple protocol that reports to him all the frames with the keys that are contained in a specified interval of the key values $[K', K"]$. RBO receives at most $2 k + 1$ other frames' keys before receiving the first key from $[K', K"]$ or noticing that there are no such keys in the broadcast cycle. As a simple corollary, $4 k + 2$ is upper bound the number of keys outside $[K', K"]$ that will ever be received. In unreliable network the expected number of efforts to receive such frames is bounded by $(8 k + 4) / p + 2 (1 - p) / p^2$, where $p$ is probability of successful reception, and the reception rate of the requested frames is $p$ -- the highest possible. The receiver's protocol state consists of the values $k$, $K'$ and $K"$, one wake-up timer and two other $k$-bit variables. Its only nontrivial computation -- the computation of the next wake-up time slot -- can be performed in $O (k)$ simple operations, such as arithmetic/bit-wise operations on $k$-bit numbers, using only constant number of $k$-bit variables.
[ { "version": "v1", "created": "Mon, 16 Jan 2012 16:56:45 GMT" } ]
2012-01-17T00:00:00
[ [ "Kik", "Marcin", "" ] ]
new_dataset
0.989848
1003.3754
Murat Guzeltepe Mr
Murat G\"uzeltepe, Mehmet \"Ozen
Quantum codes from codes over Gaussian integers with respect to the Mannheim metric
8 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, some nonbinary quantum codes using classical codes over Gaussian integers are obtained. Also, some of our quantum codes are better than or comparable with those known before, (for instance [[8; 2; 5]]4+i).
[ { "version": "v1", "created": "Fri, 19 Mar 2010 09:35:07 GMT" }, { "version": "v2", "created": "Fri, 13 Jan 2012 15:52:00 GMT" } ]
2012-01-16T00:00:00
[ [ "Güzeltepe", "Murat", "" ], [ "Özen", "Mehmet", "" ] ]
new_dataset
0.99986
1201.1548
Eric Berberich
Eric Berberich, Pavel Emeliyanenko, Alexander Kobel, Michael Sagraloff
Exact Symbolic-Numeric Computation of Planar Algebraic Curves
46 pages, 4 figures, submitted to Special Issue of TCS on SNC 2011. arXiv admin note: substantial text overlap with arXiv:1010.1386 and arXiv:1103.4697
null
null
null
cs.CG cs.MS cs.SC math.AG math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel certified and complete algorithm to compute arrangements of real planar algebraic curves. It provides a geometric-topological analysis of the decomposition of the plane induced by a finite number of algebraic curves in terms of a cylindrical algebraic decomposition. From a high-level perspective, the overall method splits into two main subroutines, namely an algorithm denoted Bisolve to isolate the real solutions of a zero-dimensional bivariate system, and an algorithm denoted GeoTop to analyze a single algebraic curve. Compared to existing approaches based on elimination techniques, we considerably improve the corresponding lifting steps in both subroutines. As a result, generic position of the input system is never assumed, and thus our algorithm never demands for any change of coordinates. In addition, we significantly limit the types of involved exact operations, that is, we only use resultant and gcd computations as purely symbolic operations. The latter results are achieved by combining techniques from different fields such as (modular) symbolic computation, numerical analysis and algebraic geometry. We have implemented our algorithms as prototypical contributions to the C++-project CGAL. They exploit graphics hardware to expedite the symbolic computations. We have also compared our implementation with the current reference implementations, that is, LGP and Maple's Isolate for polynomial system solving, and CGAL's bivariate algebraic kernel for analyses and arrangement computations of algebraic curves. For various series of challenging instances, our exhaustive experiments show that the new implementations outperform the existing ones.
[ { "version": "v1", "created": "Sat, 7 Jan 2012 11:57:44 GMT" } ]
2012-01-13T00:00:00
[ [ "Berberich", "Eric", "" ], [ "Emeliyanenko", "Pavel", "" ], [ "Kobel", "Alexander", "" ], [ "Sagraloff", "Michael", "" ] ]
new_dataset
0.960951
1201.2551
Ignaz Rutter
Maria Axenovich, Marcus Krug, Georg Osang, Ignaz Rutter
Fork-forests in bi-colored complete bipartite graphs
5 pages, 3 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the problem in [6], which studies the relative efficiency of propositional proof systems, 2-edge colorings of complete bipartite graphs are investigated. It is shown that if the edges of $G=K_{n,n}$ are colored with black and white such that the number of black edges differs from the number of white edges by at most 1, then there are at least $n(1-1/\sqrt{2})$ vertex-disjoint forks with centers in the same partite set of $G$. Here, a fork is a graph formed by two adjacent edges of different colors. The bound is sharp. Moreover, an algorithm running in time $O(n^2 \log n \sqrt{n \alpha(n^2,n) \log n})$ and giving a largest such fork forest is found.
[ { "version": "v1", "created": "Thu, 12 Jan 2012 12:51:45 GMT" } ]
2012-01-13T00:00:00
[ [ "Axenovich", "Maria", "" ], [ "Krug", "Marcus", "" ], [ "Osang", "Georg", "" ], [ "Rutter", "Ignaz", "" ] ]
new_dataset
0.972055
1201.2578
Zhenghao Zhang
Shuping Gong, Zhenghao Zhang, Husheng Li and Aleksandar D. Dimitrovski
Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.
[ { "version": "v1", "created": "Thu, 12 Jan 2012 14:38:18 GMT" } ]
2012-01-13T00:00:00
[ [ "Gong", "Shuping", "" ], [ "Zhang", "Zhenghao", "" ], [ "Li", "Husheng", "" ], [ "Dimitrovski", "Aleksandar D.", "" ] ]
new_dataset
0.998157
1201.1954
Michael Singer
Shaoshi Chen, Manuel Kauers, Michael F. Singer
Telescopers for Rational and Algebraic Functions via Residues
null
null
null
null
cs.SC math.AG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the problem of constructing telescopers for functions of m variables is equivalent to the problem of constructing telescopers for algebraic functions of m -1 variables and present a new algorithm to construct telescopers for algebraic functions of two variables. These considerations are based on analyzing the residues of the input. According to experiments, the resulting algorithm for rational functions of three variables is faster than known algorithms, at least in some examples of combinatorial interest. The algorithm for algebraic functions implies a new bound on the order of the telescopers.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 02:23:14 GMT" }, { "version": "v2", "created": "Wed, 11 Jan 2012 02:54:02 GMT" } ]
2012-01-12T00:00:00
[ [ "Chen", "Shaoshi", "" ], [ "Kauers", "Manuel", "" ], [ "Singer", "Michael F.", "" ] ]
new_dataset
0.995677
1201.2240
Kamal Sarkar
Kamal Sarkar
Bengali text summarization by sentence extraction
null
Proceedings of International Conference on Business and Information Management(ICBIM-2012),NIT Durgapur, PP 233-245
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text summarization is a process to produce an abstract or a summary by selecting significant portion of the information from one or more texts. In an automatic text summarization process, a text is given to the computer and the computer returns a shorter less redundant extract or abstract of the original text(s). Many techniques have been developed for summarizing English text(s). But, a very few attempts have been made for Bengali text summarization. This paper presents a method for Bengali text summarization which extracts important sentences from a Bengali document to produce a summary.
[ { "version": "v1", "created": "Wed, 11 Jan 2012 04:56:59 GMT" } ]
2012-01-12T00:00:00
[ [ "Sarkar", "Kamal", "" ] ]
new_dataset
0.950013
1201.2288
Vijay Dhir
Vijay Dhir, Rattan K. Datta and Maitreyee Dutta
Nimble@ITCEcnoGrid: A Grid in Research Domain for Weather Forecasting
11 pages
International Journal of Grid Computing & Applications (IJGCA) Vol.2, No.4, December 2011, 37-47
10.5121/ijgca.2011.2404
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer Technology has Revolutionized Science. This has motivated scientists to develop mathematical model to simulate salient features of Physical universe. These models can approximate reality at many levels of scale such as atomic nucleus, Earth's biosphere & weather/climate assessment. If the computer power is greater, the greater will be the accuracy in approximation i.e. close will be the approximation to the reality. The speed of the computer required for solution of such problems require computers with processing power of teraflops to Pets flops speed.. The way to speed up the computation is to "parallelize" it. One of the approach is to use multimillion dollar Supercomputer or use Computational Grid (which is also called poor man's supercomputer) having geographically distributed resources e.g. SETI@home (Used to detect radio waves emitted by intelligent civilizations outside earth) has 4.6 million participants computers. There are many alternatives tools available to achieve this goal like Globus Toolkit, Entropia, Legion, BOINC etc but they are mainly based on Linux platform. As majority of the computers available are windows based, so it will be easy to develop a larger network of computers which will use the free cycles of the computer to solve the complex problem at window platform. Nimble@ITCEcnoGrid has been developed. It includes the feature of Inter Thread Communication which is missing in any of the toolkits available. Nimble@ITCEcnoGrid Framework (A Fast Grid with Inter-thread communication with Economic Based Policy) was tested for computation of 'PI' up to 120 decimal points. Encouraged by the speed the same system has been utilized to computes the Momentum, Thermodynamics and Continuity equations for the Weather Forecasting using the Windows based Desktop computers.
[ { "version": "v1", "created": "Wed, 11 Jan 2012 12:02:39 GMT" } ]
2012-01-12T00:00:00
[ [ "Dhir", "Vijay", "" ], [ "Datta", "Rattan K.", "" ], [ "Dutta", "Maitreyee", "" ] ]
new_dataset
0.961417
1112.2205
Paolo Gasti
Steven DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun
ANDaNA: Anonymous Named Data Networking Application
NDSS 2012 - Proceedings of the Network and Distributed System Security Symposium, San Diego, California, USA
null
null
null
cs.CR cs.CY cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.
[ { "version": "v1", "created": "Fri, 9 Dec 2011 20:38:25 GMT" }, { "version": "v2", "created": "Tue, 10 Jan 2012 18:40:33 GMT" } ]
2012-01-11T00:00:00
[ [ "DiBenedetto", "Steven", "" ], [ "Gasti", "Paolo", "" ], [ "Tsudik", "Gene", "" ], [ "Uzun", "Ersin", "" ] ]
new_dataset
0.999084
1201.1966
Manoj Kumar Taleja
Manoj Kumar, Sandeep K. Arya and Sujata Pandey
Single bit full adder design using 8 transistors with novel 3 transistors XNOR gate
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In present work a new XNOR gate using three transistors has been presented, which shows power dissipation of 550.7272$\mu$W in 0.35$\mu$m technology with supply voltage of 3.3V. Minimum level for high output of 2.05V and maximum level for low output of 0.084V have been obtained. A single bit full adder using eight transistors has been designed using proposed XNOR cell, which shows power dissipation of 581.542$\mu$W. Minimum level for high output of 1.97V and maximum level for low output of 0.24V is obtained for sum output signal. For carry signal maximum level for low output of 0.32V and minimum level for high output of 3.2V have been achieved. Simulations have been performed by using SPICE based on TSMC 0.35$\mu$m CMOS technology. Power consumption of proposed XNOR gate and full adder has been compared with earlier reported circuits and proposed circuit's shows better performance in terms of power consumption and transistor count.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 05:15:25 GMT" } ]
2012-01-11T00:00:00
[ [ "Kumar", "Manoj", "" ], [ "Arya", "Sandeep K.", "" ], [ "Pandey", "Sujata", "" ] ]
new_dataset
0.97991
1201.1970
Neha Gupta Ms
Neha Gupta, Sapna Singh, Meenakshi Suthar, Priyanka Soni
Low Power Low Voltage Bulk Driven Balanced OTA
International Journal of VLSI design & Communication Systems (VLSICS) Vol.2, No.4, December 2011, 131-141
null
10.5121/vlsic.2011.2411
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The last few decades, a great deal of attention has been paid to low-voltage (LV) low-power (LP) integrated circuits design since the power consumption has become a critical issue. Among many techniques used for the design of LV LP analog circuits, the Bulk-driven principle offers a promising route towards this design for many aspects mainly the simplicity and using the conventional MOS technology to implement these designs. This paper is devoted to the Bulk-driven (BD) principle and utilizing this principle to design LV LP building block of Operational Transconductance Amplifier (OTA) in standard CMOS processes and supply voltage 0.9V. The simulation results have been carried out by the Spice simulator using the 130nm CMOS technology from TSMC.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 06:03:12 GMT" } ]
2012-01-11T00:00:00
[ [ "Gupta", "Neha", "" ], [ "Singh", "Sapna", "" ], [ "Suthar", "Meenakshi", "" ], [ "Soni", "Priyanka", "" ] ]
new_dataset
0.987438
1201.2000
Ondrej Moris
Petr Hlineny, Ondrej Moris
Dynamic Scope-Based Dijkstra's Algorithm
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We briefly report on the current state of a new dynamic algorithm for the route planning problem based on a concept of scope (the static variant presented at ESA'11, HM2011A). We first motivate dynamization of the concept of scope admissibility, and then we briefly describe a modification of the scope-aware query algorithm of HM2011A to dynamic road networks. Finally, we outline our future work on this concept.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 10:11:11 GMT" } ]
2012-01-11T00:00:00
[ [ "Hlineny", "Petr", "" ], [ "Moris", "Ondrej", "" ] ]
new_dataset
0.998063
1201.2007
Saravanan Kumarasamy
Saravanan Kumarasamy and R. Asokan
Distributed Denial of Service (DDoS) Attacks Detection Mechanism
null
null
10.5121/ijcseit.2011.1504
IJCSEIT-12-11
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets in order that the router's resources be used to route legitimate traffic hence term pushback. Client puzzles have been advocated as a promising countermeasure to DoS attacks in the recent years. In order to identify the attackers, the victim server issues a puzzle to the client that sent the traffic. When the client is able to solve the puzzle, it is assumed to be authentic and the traffic from it is allowed into the server. If the victim suspects that the puzzles are solved by most of the clients, it increases the complexity of the puzzles. This puzzle solving technique allows the traversal of the attack traffic throughout the intermediate routers before reaching the destination. In order to attain the advantages of both pushback and puzzle solving techniques, a hybrid scheme called Router based Pushback technique, which involves both the techniques to solve the problem of DDoS attacks is proposed. In this proposal, the puzzle solving mechanism is pushed back to the core routers rather than having at the victim. The router based client puzzle mechanism checks the host system whether it is legitimate or not by providing a puzzle to be solved by the suspected host.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 10:23:37 GMT" } ]
2012-01-11T00:00:00
[ [ "Kumarasamy", "Saravanan", "" ], [ "Asokan", "R.", "" ] ]
new_dataset
0.999202
1201.2010
K. M. Azharul Hasan
K. M. Azharul Hasan, Al-Mahmud, Amit Mondal, Amit Saha
Recognizing Bangla Grammar using Predictive Parser
13 pages, 13 figures
null
10.5121/ijcsit.2011.3605
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a Context Free Grammar (CFG) for Bangla language and hence we propose a Bangla parser based on the grammar. Our approach is very much general to apply in Bangla Sentences and the method is well accepted for parsing a language of a grammar. The proposed parser is a predictive parser and we construct the parse table for recognizing Bangla grammar. Using the parse table we recognize syntactical mistakes of Bangla sentences when there is no entry for a terminal in the parse table. If a natural language can be successfully parsed then grammar checking from this language becomes possible. The proposed scheme is based on Top down parsing method and we have avoided the left recursion of the CFG using the idea of left factoring.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 10:33:18 GMT" } ]
2012-01-11T00:00:00
[ [ "Hasan", "K. M. Azharul", "" ], [ "Al-Mahmud", "", "" ], [ "Mondal", "Amit", "" ], [ "Saha", "Amit", "" ] ]
new_dataset
0.950441
1201.2043
Keivan Navi
Mehdi Ghasemi, Mohammad Hossein Moaiyeri and Keivan Navi
A New Full Adder Cell for Molecular Electronics
13 pages, 14 figures
International Journal of VLSI design & Communication System(VLSICS) Vol.2, No.4, pp.1-13, Dec. 2011
10.5121/vlsic.2011.2401
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to high power consumption and difficulties with minimizing the CMOS transistor size, molecular electronics has been introduced as an emerging technology. Further, there have been noticeable advances in fabrication of molecular wires and switches and also molecular diodes can be used for designing different logic circuits. Considering this novel technology, we use molecules as the active components of the circuit, for transporting electric charge. In this paper, a full adder cell based on molecular electronics is presented. This full adder is consisted of resonant tunneling diodes and transistors which are implemented via molecular electronics. The area occupied by this kind of full adder would be much times smaller than the conventional designs and it can be used as the building block of more complex molecular arithmetic circuits.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 12:50:15 GMT" } ]
2012-01-11T00:00:00
[ [ "Ghasemi", "Mehdi", "" ], [ "Moaiyeri", "Mohammad Hossein", "" ], [ "Navi", "Keivan", "" ] ]
new_dataset
0.998972
1201.2073
Rafi Muhammad
Mehwish Aziz, Muhammad Rafi
Pbm: A new dataset for blog mining
6; Internet and Web Engineering from: International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
null
null
null
cs.AI cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text mining is becoming vital as Web 2.0 offers collaborative content creation and sharing. Now Researchers have growing interest in text mining methods for discovering knowledge. Text mining researchers come from variety of areas like: Natural Language Processing, Computational Linguistic, Machine Learning, and Statistics. A typical text mining application involves preprocessing of text, stemming and lemmatization, tagging and annotation, deriving knowledge patterns, evaluating and interpreting the results. There are numerous approaches for performing text mining tasks, like: clustering, categorization, sentimental analysis, and summarization. There is a growing need to standardize the evaluation of these tasks. One major component of establishing standardization is to provide standard datasets for these tasks. Although there are various standard datasets available for traditional text mining tasks, but there are very few and expensive datasets for blog-mining task. Blogs, a new genre in web 2.0 is a digital diary of web user, which has chronological entries and contains a lot of useful knowledge, thus offers a lot of challenges and opportunities for text mining. In this paper, we report a new indigenous dataset for Pakistani Political Blogosphere. The paper describes the process of data collection, organization, and standardization. We have used this dataset for carrying out various text mining tasks for blogosphere, like: blog-search, political sentiments analysis and tracking, identification of influential blogger, and clustering of the blog-posts. We wish to offer this dataset free for others who aspire to pursue further in this domain.
[ { "version": "v1", "created": "Tue, 10 Jan 2012 15:18:38 GMT" } ]
2012-01-11T00:00:00
[ [ "Aziz", "Mehwish", "" ], [ "Rafi", "Muhammad", "" ] ]
new_dataset
0.996144
0904.0293
Petar Kormushev
Gennady Agre, Petar Kormushev, Ivan Dilov
INFRAWEBS axiom editor - a graphical ontology-driven tool for creating complex logical expressions
This preprint has been withdrawn by the author for revision
International Journal of Information Theories and Applications, vol. 13, no. 2, ISSN 1310-0513, pp. 169-178, 2006
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current INFRAWEBS European research project aims at developing ICT framework enabling software and service providers to generate and establish open and extensible development platforms for Web Service applications. One of the concrete project objectives is developing a full-life-cycle software toolset for creating and maintaining Semantic Web Services (SWSs) supporting specific applications based on Web Service Modelling Ontology (WSMO) framework. According to WSMO, functional and behavioural descriptions of a SWS may be represented by means of complex logical expressions (axioms). The paper describes a specialized user-friendly tool for constructing and editing such axioms - INFRAWEBS Axiom Editor. After discussing the main design principles of the Editor, its functional architecture is briefly presented. The tool is implemented in Eclipse Graphical Environment Framework and Eclipse Rich Client Platform.
[ { "version": "v1", "created": "Thu, 2 Apr 2009 02:29:47 GMT" }, { "version": "v2", "created": "Sat, 7 Jan 2012 20:10:33 GMT" } ]
2012-01-10T00:00:00
[ [ "Agre", "Gennady", "" ], [ "Kormushev", "Petar", "" ], [ "Dilov", "Ivan", "" ] ]
new_dataset
0.996963
1101.4475
Benedikt Bollig
Benedikt Bollig (LSV)
An automaton over data words that captures EMSO logic
null
null
10.1007/978-3-642-23217-6_12
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a general framework for the specification and implementation of systems whose executions are words, or partial orders, over an infinite alphabet. As a model of an implementation, we introduce class register automata, a one-way automata model over words with multiple data values. Our model combines register automata and class memory automata. It has natural interpretations. In particular, it captures communicating automata with an unbounded number of processes, whose semantics can be described as a set of (dynamic) message sequence charts. On the specification side, we provide a local existential monadic second-order logic that does not impose any restriction on the number of variables. We study the realizability problem and show that every formula from that logic can be effectively, and in elementary time, translated into an equivalent class register automaton.
[ { "version": "v1", "created": "Mon, 24 Jan 2011 09:39:07 GMT" }, { "version": "v2", "created": "Wed, 26 Jan 2011 09:08:04 GMT" }, { "version": "v3", "created": "Mon, 11 Apr 2011 08:02:21 GMT" }, { "version": "v4", "created": "Fri, 10 Jun 2011 14:42:35 GMT" } ]
2012-01-10T00:00:00
[ [ "Bollig", "Benedikt", "", "LSV" ] ]
new_dataset
0.998667
1112.5396
Vahid Liaghat
Saeed Alaei, Mohammad T. Hajiaghayi, Vahid Liaghat, Dan Pei, Barna Saha
AdCell: Ad Allocation in Cellular Networks
null
ESA 2011: 311-322
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With more than four billion usage of cellular phones worldwide, mobile advertising has become an attractive alternative to online advertisements. In this paper, we propose a new targeted advertising policy for Wireless Service Providers (WSPs) via SMS or MMS- namely {\em AdCell}. In our model, a WSP charges the advertisers for showing their ads. Each advertiser has a valuation for specific types of customers in various times and locations and has a limit on the maximum available budget. Each query is in the form of time and location and is associated with one individual customer. In order to achieve a non-intrusive delivery, only a limited number of ads can be sent to each customer. Recently, new services have been introduced that offer location-based advertising over cellular network that fit in our model (e.g., ShopAlerts by AT&T) . We consider both online and offline version of the AdCell problem and develop approximation algorithms with constant competitive ratio. For the online version, we assume that the appearances of the queries follow a stochastic distribution and thus consider a Bayesian setting. Furthermore, queries may come from different distributions on different times. This model generalizes several previous advertising models such as online secretary problem \cite{HKP04}, online bipartite matching \cite{KVV90,FMMM09} and AdWords \cite{saberi05}. ...
[ { "version": "v1", "created": "Thu, 22 Dec 2011 17:44:55 GMT" }, { "version": "v2", "created": "Mon, 9 Jan 2012 02:51:38 GMT" } ]
2012-01-10T00:00:00
[ [ "Alaei", "Saeed", "" ], [ "Hajiaghayi", "Mohammad T.", "" ], [ "Liaghat", "Vahid", "" ], [ "Pei", "Dan", "" ], [ "Saha", "Barna", "" ] ]
new_dataset
0.999659
1201.1812
Jiun-Hung Yu
Jiun-Hung Yu and Hans-Andrea Loeliger
On Polynomial Remainder Codes
null
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polynomial remainder codes are a large class of codes derived from the Chinese remainder theorem that includes Reed-Solomon codes as a special case. In this paper, we revisit these codes and study them more carefully than in previous work. We explicitly allow the code symbols to be polynomials of different degrees, which leads to two different notions of weight and distance. Algebraic decoding is studied in detail. If the moduli are not irreducible, the notion of an error locator polynomial is replaced by an error factor polynomial. We then obtain a collection of gcd-based decoding algorithms, some of which are not quite standard even when specialized to Reed-Solomon codes.
[ { "version": "v1", "created": "Mon, 9 Jan 2012 16:00:45 GMT" } ]
2012-01-10T00:00:00
[ [ "Yu", "Jiun-Hung", "" ], [ "Loeliger", "Hans-Andrea", "" ] ]
new_dataset
0.988242
1001.0695
Sang Won Bae
Sang Won Bae, Matias Korman, and Yoshio Okamoto
The Geodesic Diameter of Polygonal Domains
21 pages, 7 figures, preliminary version presented at ESA2010 and submitted to DCG
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the geodesic diameter of polygonal domains having h holes and n corners. For simple polygons (i.e., h = 0), the geodesic diameter is determined by a pair of corners of a given polygon and can be computed in linear time, as known by Hershberger and Suri. For general polygonal domains with h >= 1, however, no algorithm for computing the geodesic diameter was known prior to this paper. In this paper, we present the first algorithms that compute the geodesic diameter of a given polygonal domain in worst-case time O(n^7.73) or O(n^7 (log n + h)). The main difficulty unlike the simple polygon case relies on the following observation revealed in this paper: two interior points can determine the geodesic diameter and in that case there exist at least five distinct shortest paths between the two.
[ { "version": "v1", "created": "Tue, 5 Jan 2010 13:00:56 GMT" }, { "version": "v2", "created": "Fri, 6 Jan 2012 11:40:06 GMT" } ]
2012-01-09T00:00:00
[ [ "Bae", "Sang Won", "" ], [ "Korman", "Matias", "" ], [ "Okamoto", "Yoshio", "" ] ]
new_dataset
0.997059
1201.1422
Roli Bansal
Roli Bansal, Priti Sehgal, Punam Bedi
Minutiae Extraction from Fingerprint Images - a Review
12 pages; IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, September 2011
null
null
null
cs.CV cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fingerprints are the oldest and most widely used form of biometric identification. Everyone is known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition Systems are based on local ridge features known as minutiae, marking minutiae accurately and rejecting false ones is very important. However, fingerprint images get degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction. A critical step in automatic fingerprint matching is to reliably extract minutiae from the input fingerprint images. This paper presents a review of a large number of techniques present in the literature for extracting fingerprint minutiae. The techniques are broadly classified as those working on binarized images and those that work on gray scale images directly.
[ { "version": "v1", "created": "Tue, 29 Nov 2011 05:42:36 GMT" } ]
2012-01-09T00:00:00
[ [ "Bansal", "Roli", "" ], [ "Sehgal", "Priti", "" ], [ "Bedi", "Punam", "" ] ]
new_dataset
0.995466
1201.1038
Nada Alamri Ms
Nada Alamri, Nadine Akkari
UMTS-WiMAX Vertical Handover in Next Generation Wireless Networks
20 pages, 20 figures, 4 tables, IJDPS; Nada Alamri and Nadine Akkari,"UMTS-WiMAX Vertical Handover in Next Generation Wireless Networks", International Journal for Distributed and Parallel Systems (IJDPS),2011, vol.2, No,6
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vision of next generation wireless network (NGWN) is to integrate different wireless access technologies, each with its own characteristics, into a common IP-based core network to provide mobile user with service continuity and seamless roaming. One of the major issues for the converged heterogeneous networks is providing a seamless vertical handover (VHO) with QoS support. In this paper we have reviewed the various interworking architectures and handover scenarios between UMTS and WiMAX. Also, we have compared the proposed solutions based on different criteria and revealed the pros and cons of each scheme. The comparison aids to adopt a better interworking and handover mechanism in NGWN.
[ { "version": "v1", "created": "Wed, 4 Jan 2012 23:43:32 GMT" } ]
2012-01-06T00:00:00
[ [ "Alamri", "Nada", "" ], [ "Akkari", "Nadine", "" ] ]
new_dataset
0.952424
1201.1065
Vo Tam Van
Vo Tam Van and Seiichi Mita
A Novel Error Correcting System Based on Product Codes for Future Magnetic Recording Channels
4 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel construction of product codes for high-density magnetic recording based on binary low-density parity check (LDPC) codes and binary image of Reed Solomon (RS) codes. Moreover, two novel algorithms are proposed to decode the codes in the presence of both AWGN errors and scattered hard errors (SHEs). Simulation results show that at a bit error rate (bER) of approximately 10^-8, our method allows improving the error performance by approximately 1.9dB compared with that of a hard decision decoder of RS codes of the same length and code rate. For the mixed error channel including random noises and SHEs, the signal-to-noise ratio (SNR) is set at 5dB and 150 to 400 SHEs are randomly generated. The bit error performance of the proposed product code shows a significant improvement over that of equivalent random LDPC codes or serial concatenation of LDPC and RS codes.
[ { "version": "v1", "created": "Thu, 5 Jan 2012 05:41:16 GMT" } ]
2012-01-06T00:00:00
[ [ "Van", "Vo Tam", "" ], [ "Mita", "Seiichi", "" ] ]
new_dataset
0.992167
1201.1122
EPTCS
Lucien Capedevielle (ENS de Lyon)
A type system for PSPACE derived from light linear logic
In Proceedings DICE 2011, arXiv:1201.0345
EPTCS 75, 2012, pp. 33-46
10.4204/EPTCS.75.4
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a polymorphic type system for lambda calculus ensuring that well-typed programs can be executed in polynomial space: dual light affine logic with booleans (DLALB). To build DLALB we start from DLAL (which has a simple type language with a linear and an intuitionistic type arrow, as well as one modality) which characterizes FPTIME functions. In order to extend its expressiveness we add two boolean constants and a conditional constructor in the same way as with the system STAB. We show that the value of a well-typed term can be computed by an alternating machine in polynomial time, thus such a term represents a program of PSPACE (given that PSPACE = APTIME). We also prove that all polynomial space decision functions can be represented in DLALB. Therefore DLALB characterizes PSPACE predicates.
[ { "version": "v1", "created": "Thu, 5 Jan 2012 11:06:58 GMT" } ]
2012-01-06T00:00:00
[ [ "Capedevielle", "Lucien", "", "ENS de Lyon" ] ]
new_dataset
0.99814
1201.1202
Julien Moncel
Sylvain Gravier (IF), Matjaz Kovse (LaBRI), Michel Mollard (IF), Julien Moncel (LAAS), Aline Parreau (IF)
New results on variants of covering codes in Sierpinski graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study identifying codes, locating-dominating codes, and total-dominating codes in Sierpinski graphs. We compute the minimum size of such codes in Sierpinski graphs.
[ { "version": "v1", "created": "Thu, 5 Jan 2012 15:48:54 GMT" } ]
2012-01-06T00:00:00
[ [ "Gravier", "Sylvain", "", "IF" ], [ "Kovse", "Matjaz", "", "LaBRI" ], [ "Mollard", "Michel", "", "IF" ], [ "Moncel", "Julien", "", "LAAS" ], [ "Parreau", "Aline", "", "IF" ] ]
new_dataset
0.971978
1201.0066
Muhammad Jawaherul Alam
Md. Jawaherul Alam, Therese Biedl, Stefan Felsner, Michael Kaufmann, Stephen G. Kobourov and Torsten Ueckerdt
Computing Cartograms with Optimal Complexity
18 pages, 7 figures
null
null
null
cs.DM cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a rectilinear dual of a planar graph vertices are represented by simple rectilinear polygons and edges are represented by side-contact between the corresponding polygons. A rectilinear dual is called a cartogram if the area of each region is equal to a pre-specified weight of the corresponding vertex. The complexity of a cartogram is determined by the maximum number of corners (or sides) required for any polygon. In a series of papers the polygonal complexity of such representations for maximal planar graphs has been reduced from the initial 40 to 34, then to 12 and very recently to the currently best known 10. Here we describe a construction with 8-sided polygons, which is optimal in terms of polygonal complexity as 8-sided polygons are sometimes necessary. Specifically, we show how to compute the combinatorial structure and how to refine the representation into an area-universal rectangular layout in linear time. The exact cartogram can be computed from the area-universal rectangular layout with numerical iteration, or can be approximated with a hill-climbing heuristic. We also describe an alternative construction for Hamiltonian maximal planar graphs, which allows us to directly compute the cartograms in linear time. Moreover, we prove that even for Hamiltonian graphs 8-sided rectilinear polygons are necessary, by constructing a non-trivial lower bound example. The complexity of the cartograms can be reduced to 6 if the Hamiltonian path has the extra property that it is one-legged, as in outer-planar graphs. Thus, we have optimal representations (in terms of both polygonal complexity and running time) for Hamiltonian maximal planar and maximal outer-planar graphs.
[ { "version": "v1", "created": "Fri, 30 Dec 2011 05:44:30 GMT" } ]
2012-01-05T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Biedl", "Therese", "" ], [ "Felsner", "Stefan", "" ], [ "Kaufmann", "Michael", "" ], [ "Kobourov", "Stephen G.", "" ], [ "Ueckerdt", "Torsten", "" ] ]
new_dataset
0.987431
1201.0782
Dirk Hesselbach
Dirk Hesselbach
Umgebungserfassungssystem fuer mobile Roboter (environment logging system for mobile autonomous robots)
null
null
null
null
cs.RO cs.AR
http://creativecommons.org/licenses/by/3.0/
This diploma thesis describes the theoretical bases, the conception of the module and the final result of the development process in application. for the environment logging with a small mobile robot for interiors should be sketched an economical alternative to the expensive laser scanners. the structure, color or the material of the objects in the radius of action, as well as the environment brightness and illuminating are to have thereby no influence on the results of measurement.
[ { "version": "v1", "created": "Tue, 3 Jan 2012 22:15:22 GMT" } ]
2012-01-05T00:00:00
[ [ "Hesselbach", "Dirk", "" ] ]
new_dataset
0.993485
1201.0945
Wajeb Gharibi
Wajeb Gharibi
Symbian `vulnerability' and Mobile Threats
4 pages; International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 10, (2011)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.
[ { "version": "v1", "created": "Wed, 4 Jan 2012 17:49:57 GMT" } ]
2012-01-05T00:00:00
[ [ "Gharibi", "Wajeb", "" ] ]
new_dataset
0.998788
1005.5448
Shailesh Kumar Jagadeesan
Shailesh Kumar and Shrisha Rao
Failover in cellular automata
16 pages, 15 figures and associated video at http://dl.dropbox.com/u/7553694/failover_demo.avi and simulation at http://dl.dropbox.com/u/7553694/failover_simulation.jar
Physics Procedia, vol. 22, pp. 557--564, 2011
10.1016/j.phpro.2011.11.086
null
cs.AI nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A cellular automata (CA) configuration is constructed that exhibits emergent failover. The configuration is based on standard Game of Life rules. Gliders and glider-guns form the core messaging structure in the configuration. The blinker is represented as the basic computational unit, and it is shown how it can be recreated in case of a failure. Stateless failover using primary-backup mechanism is demonstrated. The details of the CA components used in the configuration and its working are described, and a simulation of the complete configuration is also presented.
[ { "version": "v1", "created": "Sat, 29 May 2010 12:17:09 GMT" } ]
2012-01-04T00:00:00
[ [ "Kumar", "Shailesh", "" ], [ "Rao", "Shrisha", "" ] ]
new_dataset
0.987915
1201.0160
Shan Mei
Mei Shan, Zhou Xuan, Zhu Yifan, Zu Zhenghu, Zheng Tao, A.V. Boukhanovsky, P.M.A Sloot
Simulating City-level Airborne Infectious Diseases
20 pages, 5 figures
null
null
null
cs.OH physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the exponential growth in the world population and the constant increase in human mobility, the danger of outbreaks of epidemics is rising. Especially in high density urban areas such as public transport and transfer points, where people come in close proximity of each other, we observe a dramatic increase in the transmission of airborne viruses and related pathogens. It is essential to have a good understanding of the `transmission highways' in such areas, in order to prevent or to predict the spreading of infectious diseases. The approach we take is to combine as much information as is possible, from all relevant sources and integrate this in a simulation environment that allows for scenario testing and decision support. In this paper we lay out a novel approach to study Urban Airborne Disease spreading by combining traffic information, with geo-spatial data, infection dynamics and spreading characteristics.
[ { "version": "v1", "created": "Fri, 30 Dec 2011 17:56:45 GMT" } ]
2012-01-04T00:00:00
[ [ "Shan", "Mei", "" ], [ "Xuan", "Zhou", "" ], [ "Yifan", "Zhu", "" ], [ "Zhenghu", "Zu", "" ], [ "Tao", "Zheng", "" ], [ "Boukhanovsky", "A. V.", "" ], [ "Sloot", "P. M. A", "" ] ]
new_dataset
0.986226
1201.0205
Feng Xia
Guowei Wu, Dongze Lu, Feng Xia, Lin Yao
A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems
null
Information Technology and Control, 2011, Vol.40, No.1, pp. 29-40
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.
[ { "version": "v1", "created": "Sat, 31 Dec 2011 01:13:13 GMT" } ]
2012-01-04T00:00:00
[ [ "Wu", "Guowei", "" ], [ "Lu", "Dongze", "" ], [ "Xia", "Feng", "" ], [ "Yao", "Lin", "" ] ]
new_dataset
0.99962
1201.0207
Feng Xia
Guowei Wu, Feng Xia, Lin Yao, Yan Zhang, Yanwei Zhu
A Hop-by-hop Cross-layer Congestion Control Scheme for Wireless Sensor Networks
null
Journal of Software, Dec 2011
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Congestions in wireless sensor networks (WSNs) could potentially cause packet loss, throughput impairment and energy waste. To address this issue, a hop-by-hop cross-layer congestion control scheme (HCCC) built on contention-based MAC protocol is proposed in this paper. According to MAC-layer channel information including buffer occupancy ratio and congestion degree of local node, HCCC dynamically adjusts channel access priority in MAC layer and data transmission rate of the node to tackle the problem of congestion. Simulations have been conducted to compare HCCC against closely-related existing schemes. The results show that HCCC exhibits considerable superiority in terms of packets loss ratio, throughput and energy efficiency.
[ { "version": "v1", "created": "Sat, 31 Dec 2011 01:42:19 GMT" } ]
2012-01-04T00:00:00
[ [ "Wu", "Guowei", "" ], [ "Xia", "Feng", "" ], [ "Yao", "Lin", "" ], [ "Zhang", "Yan", "" ], [ "Zhu", "Yanwei", "" ] ]
new_dataset
0.998763