- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## A Qoe-based Scheduling Algorithm For Ugs Service Class In Wimax Network. Arxiv:1410.6154v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6154**Description:**To satisfy the increasing demand for multimedia services in broadband Internet networks, the WiMAX Worldwide Interoperability for Microwave Acces technology has emerged as an alternative to the wired broadband access solutions. It provides an Internet connection to broadband coverage area of several kilometers in radius by ensuring a satisfactory quality of service QoS , it's an adequate response to some rural or inaccessible areas. Unlike DSL Digital Subscriber Line or other wired technology, W... read more »## Quantum Algorithms For Shortest Paths Problems In Structured Instances. Arxiv:1410.6220v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6220**Description:**We consider the quantum time complexity of the all pairs shortest paths APSP problem and some of its variants. The trivial classical algorithm for APSP and most all pairs path problems runs in O n^3 time, while the trivial algorithm in the quantum setting runs in tilde O n^ 2.5 time, using Grover search. A major open problem in classical algorithms is to obtain a truly subcubic time algorithm for APSP, i.e. an algorithm running in O n^ 3- varepsilon time for constant varepsilon>0 . To approac... read more »## Forward Period Analysis And The Long Term Simulation Of A Periodic Hamiltonian System. Arxiv:1410.6242v1 Math.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6242**Description:**The period of a Morse oscillator and mathematical pendulum system are obtained, accurate to 100 significant digits, by forward period analysis FPA . From these results, the long-term 0, 10^60 time unit solutions, which overlap from the Planck time to the age of the universe, are computed reliably and quickly with a parallel multiple-precision Taylor series PMT scheme. The application of FPA to periodic systems can reduce the computation loops of long-term reliable simulation from O t^ 1+1/M to O... read more »## Capturing Spatial Interdependence In Image Features: The Counting Grid, An Epitomic Representation For Bags Of Features. Arxiv:1410.6264v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6264**Description:**In recent scene recognition research images or large image regions are often represented as disorganized "bags" of features which can then be analyzed using models originally developed to capture co-variation of word counts in text. However, image feature counts are likely to be constrained in different ways than word counts in text. For example, as a camera pans upwards from a building entrance over its first few floors and then further up into the sky Fig. 1, some feature counts in t... read more »## Verifying Linearizability: A Comparative Survey. Arxiv:1410.6268v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6268**Description:**Linearizability has become the key correctness criterion for concurrent data structures, ensuring that histories of the concurrent object under consideration are consistent, where consistency is judged with respect to a sequential history of a corresponding abstract data structure. Linearizability allows any order of concurrent i.e., overlapping calls to operations to be picked, but requires the real-time order of non-overlapping to be preserved. A history of overlapping operation calls is linea... read more »## The Probabilistic Structure Of Discrete Agent-based Models. Arxiv:1410.6277v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6277**Description:**This paper describes a formalization of agent-based models ABMs as random walks on regular graphs and relates the symmetry group of those graphs to a coarse-graining of the ABM that is still Markovian. An ABM in which N agents can be in delta different states leads to a Markov chain with delta^N states. In ABMs with a sequential update scheme by which one agent is chosen to update its state at a time, transitions are only allowed between system configurations that differ with respect to a single... read more »## Signal Inference With Unknown Response: Calibration Uncertainty Renormalized Estimator. Arxiv:1410.6289v1 Physics.data-an

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6289**Description:**The calibration of a measurement device is crucial for every scientific experiment, where a signal has to be inferred from data. We present CURE, the calibration uncertainty renormalized estimator, to reconstruct a signal and simultaneously the instrument's calibration from the same data without knowing the exact calibration, but its covariance structure. The idea of CURE is starting with an assumed calibration to successively include more and more portions of calibration uncertainty into the si... read more »## Enhanced Tkip Michael Attacks. Arxiv:1410.6295v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6295**Description:**This paper presents new attacks against TKIP within IEEE 802.11 based networks. Using the known Beck-Tews attack, we define schemas to con- tinuously generate new keystreams, which allow more and longer arbitrary packets to be injected into the network. We further describe an attack against the Michael message integrity code, that allows an attacker to concatenate a known with an unknown valid TKIP packet such that the unknown MIC at the end is still valid for the new entire packet. Based on thi... read more »## A Type Assignment For Lambda-calculus Complete Both For Fptime And Strong Normalization. Arxiv:1410.6298v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6298**Description:**One of the aims of Implicit Computational Complexity is the design of programming languages with bounded computational complexity; indeed, guaranteeing and certifying a limited resources usage is of central importance for various aspects of computer science. One of the more promising approaches to this aim is based on the use of lambda-calculus as paradigmatic programming language and the design of type assignment systems for lambda-terms, where types guarantee both the functional correctness an... read more »## Canonical Polyadic Decomposition With Assistant Information For Brain Computer Interface. Arxiv:1410.6313v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6313**Description:**Canonical Polyadic Decomposition is an important method for multi-way array analysis, and has been successfully applied to a variety of signals. It can be seen as an unsupervised method for feature extraction in a classification problem. After that, a classifier, such as support vector machine, is utilized to classify those features. In this manner, classification task is achieved by two isolated steps. We proposed supervised Canonical Polyadic Decomposition by directly incorporating auxiliary l... read more »## A Regularization Approach To Blind Deblurring And Denoising Of Qr Barcodes. Arxiv:1410.6333v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6333**Description:**Using only regularization-based methods, we provide an ansatz-free algorithm for blind deblurring of QR bar codes in the presence of noise. The algorithm exploits the fact that QR bar codes are prototypical images for which part of the image is a priori known finder patterns . The method has four steps: i denoising of the entire image via a suitably weighted TV flow; ii using a priori knowledge of one of the finder corners to apply a higher-order smooth regularization to estimate the unknown poi... read more »## Application Of Reactive Transport Modelling To Growth And Transport Of Microorganisms In The Capillary Fringe. Arxiv:1410.6335v1 Cs.ce

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6335**Description:**A multicomponent multiphase reactive transport simulator has been developed to facilitate the investigation of a large variety of phenomena in porous media including component transport, diffusion, microbiological growth and decay, cell attachment and detachment and phase exchange. The coupled problem is solved using operator splitting. This approach allows a flexible adaptation of the solution strategy to the concrete problem. Moreover, the individual submodels were optimised to be able to desc... read more »## Constructions And Properties Of Linear Locally Repairable Codes. Arxiv:1410.6339v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6339**Description:**In this paper, locally repairable codes with all-symbol locality are studied. Methods to modify already existing codes are presented. Also, it is shown that with high probability, a random matrix with a few extra columns guaranteeing the locality property, is a generator matrix for a locally repairable code with a good minimum distance. The proof of this also gives a constructive method to find locally repairable codes. Constructions are given of three infinite classes of optimal vector-linear l... read more »## Bar Recursion Over Finite Partial Functions. Arxiv:1410.6361v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6361**Description:**We introduce a new, demand-driven variant of Spector's bar recursion in the spirit of the Berardi-Bezem-Coquand functional. The bar recursion takes place over finite partial functions, where the control parameter varphi , used in Spector's bar recursion to terminate the computation at sequences s satisfying varphi hat s < s , now acts as a guide for deciding exactly where to make bar recursive updates, terminating the computation whenever varphi hat u in rm dom u . We begin by examining the c... read more »## Dynamics-based Reactive Synthesis And Automated Revisions For High-level Robot Control. Arxiv:1410.6375v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6375**Description:**The aim of this work is to address issues where formal specifications cannot be realized on a given dynamical system subjected to a changing environment. Such failures occur whenever the dynamics of the system restrict the robot in such a way that the environment may prevent the robot from progressing safely to its goals. We provide a framework that automatically synthesizes revisions to such specifications that restrict the assumed behaviors of the environment and the behaviors of the system. W... read more »## Attribute Efficient Linear Regression With Data-dependent Sampling. Arxiv:1410.6382v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6382**Description:**In this paper we analyze a budgeted learning setting, in which the learner can only choose and observe a small subset of the attributes of each training example. We develop efficient algorithms for ridge and lasso linear regression, which utilize the geometry of the data by a novel data-dependent sampling scheme. When the learner has prior knowledge on the second moments of the attributes, the optimal sampling probabilities can be calculated precisely, and result in data-dependent improvements f... read more »## On Lower And Upper Bounds In Smooth Strongly Convex Optimization - A Unified Approach Via Linear Iterative Methods. Arxiv:1410.6387v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6387**Description:**In this thesis we develop a novel framework to study smooth and strongly convex optimization algorithms, both deterministic and stochastic. Focusing on quadratic functions we are able to examine optimization algorithms as a recursive application of linear operators. This, in turn, reveals a powerful connection between a class of optimization algorithms and the analytic theory of polynomials whereby new lower and upper bounds are derived. In particular, we present a new and natural derivation of ... read more »## Permutation Reconstruction From Differences. Arxiv:1410.6396v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6396**Description:**We prove that the problem of reconstructing a permutation pi_1, dotsc, pi_n of the integers 1 dotso n given the absolute differences pi_ i+1 - pi_i , i = 1, dotsc,n-1 is NP-complete. As an intermediate step we first prove the NP-completeness of the decision version of a new puzzle game that we call Crazy Frog Puzzle. The permutation reconstruction from differences is one of the simplest combinatorial problems that have been proved to be computationally intractable. read more »## Justifying The Small-world Phenomenon Via Random Recursive Trees. Arxiv:1410.6397v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6397**Description:**We present a new technique for proving logarithmic upper bounds for diameters of evolving random graph models, which is based on defining a coupling between random graphs and variants of random recursive trees. The advantage of the technique is three-fold: it is quite simple and provides short proofs, it is applicable to a broad variety of models including those incorporating preferential attachment, and it provides bounds with small constants. We illustrate this by proving, for the first time, ... read more »## On The Average-case Complexity Of Parameterized Clique. Arxiv:1410.6400v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6400**Description:**The k-Clique problem is a fundamental combinatorial problem that plays a prominent role in classical as well as in parameterized complexity theory. It is among the most well-known NP-complete and W 1 -complete problems. Moreover, its average-case complexity analysis has created a long thread of research already since the 1970s. Here, we continue this line of research by studying the dependence of the average-case complexity of the k-Clique problem on the parameter k. To this end, we define two n... read more »## Initialization Of Multilayer Forecasting Artifical Neural Networks. Arxiv:1410.6413v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6413**Description:**In this paper, a new method was developed for initialising artificial neural networks predicting dynamics of time series. Initial weighting coefficients were determined for neurons analogously to the case of a linear prediction filter. Moreover, to improve the accuracy of the initialization method for a multilayer neural network, some variants of decomposition of the transformation matrix corresponding to the linear prediction filter were suggested. The efficiency of the proposed neural network ... read more »## A Parallel And Efficient Algorithm For Learning To Match. Arxiv:1410.6414v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6414**Description:**Many tasks in data mining and related fields can be formalized as matching between objects in two heterogeneous domains, including collaborative filtering, link prediction, image tagging, and web search. Machine learning techniques, referred to as learning-to-match in this paper, have been successfully applied to the problems. Among them, a class of state-of-the-art methods, named feature-based matrix factorization, formalize the task as an extension to matrix factorization by incorporating auxi... read more »## Tight Tradeoffs For Approximating Palindromes In Streams. Arxiv:1410.6433v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6433**Description:**We consider the question of finding the longest palindrome in a text of length n in the streaming model, where the characters arrive one-by-one, and we cannot go back and retrieve a previously seen character. While computing the answer exactly using sublinear memory is not possible in such a setting, one can still hope for a good approximation guarantee. We focus on the two most natural variants, where we aim for either an additive or a multiplicative approximation of the length of the longest p... read more »## Density-based Region Search With Arbitrary Shape For Object Localization. Arxiv:1410.6447v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6447**Description:**Region search is widely used for object localization. Typically, the region search methods project the score of a classifier into an image plane, and then search the region with the maximal score. The recently proposed region search methods, such as efficient subwindow search and efficient region search, which localize objects from the score distribution on an image are much more efficient than sliding window search. However, for some classifiers and tasks, the projected scores are nearly all po... read more »## Parallel Prefix Polymorphism Permits Parallelization, Presentation & Proof. Arxiv:1410.6449v1 Cs.pl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6449**Description:**Polymorphism in programming languages enables code reuse. Here, we show that polymorphism has broad applicability far beyond computations for technical computing: parallelism in distributed computing, presentation of visualizations of runtime data flow, and proofs for formal verification of correctness. The ability to reuse a single codebase for all these purposes provides new ways to understand and verify parallel programs. read more »## Btrim: A Fast, Lightweight Adapter And Quality Trimming Program For Next-generation Sequencing Technologies. Arxiv:1410.6455v1 Q-bio.gn

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6455**Description:**Btrim is a fast and lightweight software to trim adapters and low quality regions in reads from ultra high-throughput next-generation sequencing machines. It also can reliably identify barcodes and assign the reads to the original samples. Based on a modified Myers's bit-vector dynamic programming algorithm, Btrim can handle indels in adapters and barcodes. It removes low quality regions and trims off adapters at both or either end of the reads. A typical trimming of 30M reads with two sets of a... read more »## A Conditional Construction Of Restricted Isometries. Arxiv:1410.6457v1 Math.fa

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6457**Description:**We study the restricted isometry property of a matrix that is built from the discrete Fourier transform matrix by collecting rows indexed by quadratic residues. We find an epsilon>0 such that, conditioned on a folklore conjecture in number theory, this matrix satisfies the restricted isometry property with sparsity parameter K= Omega M^ 1/2+ epsilon , where M is the number of rows. read more »## Analyzing The Number Of Latent Topics Via Spectral Decomposition. Arxiv:1410.6466v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6466**Description:**Correctly choosing the number of topics plays an important role in successfully applying topic models to real world applications. Following the latest tensor decomposition framework by Anandkumar et al., we make the first attempt to provide theoretical analysis on the number of topics under Latent Dirichlet Allocation model. With mild conditions, our method provides accessible information on the number of topics, which includes both upper and lower bounds. Experimental results on synthetic datas... read more »## Foreground-background Segmentation Based On Codebook And Edge Detector. Arxiv:1410.6472v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6472**Description:**Background modeling techniques are used for moving object detection in video. Many algorithms exist in the field of object detection with different purposes. In this paper, we propose an improvement of moving object detection based on codebook segmentation. We associate the original codebook algorithm with an edge detection algorithm. Our goal is to prove the efficiency of using an edge detection algorithm with a background modeling algorithm. Throughout our study, we compared the quality of the... read more »## An Upper Bound On Euclidean Embeddings Of Rigid Graphs With 8 Vertices. Arxiv:1204.6527v2 Cs.cg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1204.6527**Description:**A graph is called generically rigid in R^d if, for any choice of sufficiently generic edge lengths, it can be embedded in R^d in a finite number of distinct ways, modulo rigid transformations. Here, we deal with the problem of determining the maximum number of planar Euclidean embeddings of minimally rigid graphs with 8 vertices, because this is the smallest unknown case in the plane. read more »## Benchmarking Usability And Performance Of Multicore Languages. Arxiv:1302.2837v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1302.2837**Description:**Developers face a wide choice of programming languages and libraries supporting multicore computing. Ever more diverse paradigms for expressing parallelism and synchronization become available while their influence on usability and performance remains largely unclear. This paper describes an experiment comparing four markedly different approaches to parallel programming: Chapel, Cilk, Go, and Threading Building Blocks TBB . Each language is used to implement sequential and parallel versions of s... read more »## Dimension Independent Matrix Square Using Mapreduce. Arxiv:1304.1467v3 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1304.1467**Description:**We compute the singular values of an m times n sparse matrix A in a distributed setting, without communication dependence on m , which is useful for very large m . In particular, we give a simple nonadaptive sampling scheme where the singular values of A are estimated within relative error with constant probability. Our proven bounds focus on the MapReduce framework, which has become the de facto tool for handling such large matrices that cannot be stored or even streamed through a single machin... read more »## Barycentric Coordinates As Interpolants. Arxiv:1308.1279v4 Cs.gr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.1279**Description:**Barycentric coordinates are frequently used as interpolants to shade computer graphics images. A simple equation transforms barycentric coordinates from screen space into eye space in order to undo the perspective transformation and permit accurate interpolative shading of texture maps. This technique is amenable to computation using a block-normalized integer representation. read more »## Subband Coding For Large-scale Scientific Simulation Data Using Jpeg 2000. Arxiv:1310.2289v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.2289**Description:**The ISO/IEC JPEG 2000 image coding standard is a family of source coding algorithms targeting high-resolution image communications. JPEG 2000 features highly scalable embedded coding features that allow one to interactively zoom out to reduced resolution thumbnails of enormous data sets or to zoom in on highly localized regions of interest with very economical communications and rendering requirements. While intended for fixed-precision input data, the implementation of the irreversible version ... read more »## Relative Deviation Learning Bounds And Generalization With Unbounded Loss Functions. Arxiv:1310.5796v3 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.5796**Description:**We present an extensive analysis of relative deviation bounds, including detailed proofs of two-sided inequalities and their implications. We also give detailed proofs of two-sided generalization bounds that hold in the general case of unbounded loss functions, under the assumption that a moment of the loss is bounded. These bounds are useful in the analysis of importance weighting and other learning tasks such as unbounded regression. read more »## Distributed Estimation Of A Parametric Field: Algorithms And Performance Analysis. Arxiv:1310.7324v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.7324**Description:**This paper presents a distributed estimator for a deterministic parametric physical field sensed by a homogeneous sensor network and develops a new transformed expression for the Cramer-Rao lower bound CRLB on the variance of distributed estimates. The proposed transformation reduces a multidimensional integral representation of the CRLB to an expression involving an infinite sum. Stochastic models used in this paper assume additive noise in both the observation and transmission channels. Two ca... read more »## Low-rank Modeling And Its Applications In Image Analysis. Arxiv:1401.3409v3 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.3409**Description:**Low-rank modeling generally refers to a class of methods that solve problems by representing variables of interest as low-rank matrices. It has achieved great success in various fields including computer vision, data mining, signal processing and bioinformatics. Recently, much progress has been made in theories, algorithms and applications of low-rank modeling, such as exact low-rank matrix recovery via convex programming and matrix completion applied to collaborative filtering. These advances h... read more »## Formal Specification And Quantitative Analysis Of A Constellation Of Navigation Satellites. Arxiv:1402.5599v5 Cs.sy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1402.5599**Description:**Navigation satellites are a core component of navigation satellite based systems such as GPS, GLONASS and Galileo which provide location and timing information for a variety of uses. Such satellites are designed for operating on orbit to perform tasks and have lifetimes of 10 years or more. Reliability, availability and maintainability RAM analysis of systems has been indispensable in the design phase of satellites in order to achieve minimum failures or to increase mean time between failures MT... read more »## Covering Numbers Of L_p -balls Of Convex Sets And Functions. Arxiv:1403.6922v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.6922**Description:**We prove bounds for the covering numbers of classes of convex functions and convex sets in Euclidean space. Previous results require the underlying convex functions or sets to be uniformly bounded. We relax this assumption and replace it with weaker integral constraints. Existing results can be recovered as special cases of our results. read more »## Online Group Feature Selection. Arxiv:1404.4774v3 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.4774**Description:**Online feature selection with dynamic features has become an active research area in recent years. However, in some real-world applications such as image analysis and email spam filtering, features may arrive by groups. Existing online feature selection methods evaluate features individually, while existing group feature selection methods cannot handle online processing. Motivated by this, we formulate the online group feature selection problem, and propose a novel selection approach for this pr... read more »## Power-aware Applications For Scientific Cluster And Distributed Computing. Arxiv:1404.6929v2 Physics.comp-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.6929**Description:**The aggregate power use of computing hardware is an important cost factor in scientific cluster and distributed computing systems. The Worldwide LHC Computing Grid WLCG is a major example of such a distributed computing system, used primarily for high throughput computing HTC applications. It has a computing capacity and power consumption rivaling that of the largest supercomputers. The computing capacity required from this system is also expected to grow over the next decade. Optimizing the pow... read more »## Complex Contagion Process In Spreading Of Online Innovation. Arxiv:1405.6879v2 Physics.soc-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.6879**Description:**Diffusion of innovation can be interpreted as a social spreading phenomena governed by the impact of media and social interactions. Although these mechanisms have been identified by quantitative theories, their role and relative importance are not entirely understood, since empirical verification has so far been hindered by the lack of appropriate data. Here we analyse a dataset recording the spreading dynamics of the world's largest Voice over Internet Protocol service to empirically support th... read more »## Ergodic Theory Meets Polarization. I: An Ergodic Theory For Binary Operations. Arxiv:1406.2943v3 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.2943**Description:**An open problem in polarization theory is to determine the binary operations that always lead to polarization when they are used in Ar i kan-like constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This first part of the paper introduces the mathematical framework that we will use in the second part to characterize the polarizing operations: uniformity-preserving, irreducible, e... read more »## Ergodic Theory Meets Polarization. Ii: A Foundation Of Polarization Theory. Arxiv:1406.2949v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.2949**Description:**An open problem in polarization theory is to determine the binary operations that always lead to polarization when used in Ar i kan-like constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This second part provides a foundation of polarization theory based on the ergodic theory of binary operations which we developed in the first part. We show that a binary operation is polarizi... read more »## Decision Versions Of Optimization Problems: Cardinality Constraint Lower Bound As A Cnf Horn Formula For Maximum Matching. Arxiv:1407.1403v4 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1403**Description:**We provide a formula for the lower bound in the form of F ge K , in such a way that the decision version of unweighted non-bipartite matching can be solved in polynomial time. The parameter K can vary from instance to instance. We assume that the domains, the set of vertices and the set of edges, are ordered. To our knowledge, no polynomially solvable satisfiability expression has been developed for this problem so far, or for that matter, for any decision problem derived from optimization. Henc... read more »## A Comparison Of Common Users Across Instagram And Ask.fm To Better Understand Cyberbullying. Arxiv:1408.4882v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.4882**Description:**This paper examines users who are common to two popular online social networks, Instagram and Ask.fm, that are often used for cyberbullying. An analysis of the negativity and positivity of word usage in posts by common users of these two social networks is performed. These results are normalized in comparison to a sample of typical users in both networks. We also examine the posting activity of common user profiles and consider its correlation with negativity. Within the Ask.fm social network, w... read more »## Subspace Alignment For Domain Adaptation. Arxiv:1409.5241v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5241**Description:**In this paper, we introduce a new domain adaptation DA algorithm where the source and target domains are represented by subspaces spanned by eigenvectors. Our method seeks a domain invariant feature space by learning a mapping function which aligns the source subspace with the target one. We show that the solution of the corresponding optimization problem can be obtained in a simple closed form, leading to an extremely fast algorithm. We present two approaches to determine the only hyper-paramet... read more »## Quick Detection Of High-degree Entities In Large Directed Networks. Arxiv:1410.0571v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.0571**Description:**In this paper, we address the problem of quick detection of high-degree entities in large online social networks. Practical importance of this problem is attested by a large number of companies that continuously collect and update statistics about popular entities, usually using the degree of an entity as an approximation of its popularity. We suggest a simple, efficient, and easy to implement two-stage randomized algorithm that provides highly accurate solutions for this problem. For instance, ... read more »## Minimization Problems Based On A Parametric Family Of Relative Entropies I: Forward Projection. Arxiv:1410.2346v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.2346**Description:**Minimization problems with respect to a one-parameter family of generalized relative entropies are studied. These relative entropies, which we term relative alpha -entropies denoted mathscr I _ alpha , arise as redundancies under mismatched compression when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the usual relative entropy Kullback-Leibler divergence . Just like relative entropy, these rela... read more »## Finite Automata For The Sub- And Superword Closure Of Cfls: Descriptional And Computational Complexity. Arxiv:1410.2737v2 Cs.fl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.2737**Description:**We answer two open questions by Gruber, Holzer, Kutrib, 2009 on the state-complexity of representing sub- or superword closures of context-free grammars CFGs : 1 We prove a tight upper bound of 2^ mathcal O n on the size of nondeterministic finite automata NFAs representing the subword closure of a CFG of size n . 2 We present a family of CFGs for which the minimal deterministic finite automata representing their subword closure matches the upper-bound of 2^ 2^ mathcal O n following from 1 . Fur... read more »## Enhanced Multiobjective Evolutionary Algorithm Based On Decomposition For Solving The Unit Commitment Problem. Arxiv:1410.4343v2 Cs.ne Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4343**Description:**The unit commitment UC problem is a nonlinear, high-dimensional, highly constrained, mixed-integer power system optimization problem and is generally solved in the literature considering minimizing the system operation cost as the only objective. However, due to increasing environmental concerns, the recent attention has shifted to incorporating emission in the problem formulation. In this paper, a multi-objective evolutionary algorithm based on decomposition MOEA/D is proposed to solve the UC p... read more »## Optimal Allocation Of Power Pool For Two-cell Single-user Joint Transmission. Arxiv:1410.4407v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4407**Description:**Joint transmission is a kind of cooperative transmission technology, which converts other cell interference into signal. In this letter, for single-user joint transmission, we propose that a power pool can be created in order to increase the system sum-rate or lower the power consumption. Then, we investigate the sum-rate maximization problem under this framework. Since it is impossible that subchannel gains for the two base stations are identical, we can obtain a much more concise structure and... read more »## Power Allocation And Scheduling For Two-cell Distributed Interference Subtraction System. Arxiv:1410.4444v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4444**Description:**This letter studies the power allocation and scheduling problem in two-cell distributed interference subtraction system. Through the interference is cancelled at one receiver side and the analysis of objective function monotony, our key result is the decoupling of power allocation and scheduling without loss of optimality. Simulation exhibits the significant gains of our proposed algorithm over open-loop power allocation with non-cooperation proportional fair scheduling. read more »## Secrecy Degrees Of Freedom Of Wireless X Networks Using Artificial Noise Alignment. Arxiv:1410.5009v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5009**Description:**The problem of transmitting confidential messages in M times K wireless X networks is considered, in which each transmitter intends to send one confidential message to every receiver. In particular, the secrecy degrees of freedom SDOF of the considered network achieved by an artificial noise alignment ANA approach, which integrates interference alignment and artificial noise transmission, are studied. At first, an SDOF upper bound is derived for the M times K X network with confidential messages... read more »## Naive Bayes And Text Classification I - Introduction And Theory. Arxiv:1410.5329v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5329**Description:**Naive Bayes classifiers, a family of classifiers that are based on the popular Bayes' probability theorem, are known for creating simple yet well performing models, especially in the fields of document classification and disease prediction. In this article, we will look at the main concepts of naive Bayes classification in the context of document categorization. read more »## Classes Of Delay-independent Multimessage Multicast Networks Under The Generalized Model. Arxiv:1410.5343v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5343**Description:**In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot . A node is said to incur no delay if its received symbol obtained in a time slot is available for encoding its transmitted symbol sent in the same time slot. Under the classical model, the... read more »## Building A Balanced K-d Tree In Logarithmic Time. Arxiv:1410.5420v3 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5420**Description:**The original description of the k-d tree recognized that rebalancing techniques, such as are used to build an AVL tree, are not applicable to a k-d tree. Hence, in order to build a balanced k-d tree, it is necessary to find the median of the data for each recursive subdivision of those data. The sort or selection that is used to find the median for each subdivision strongly influences the computational complexity of building a k-d tree. This paper discusses an alternate approach that builds a ba... read more »## Psbs: Practical Size-based Scheduling. Arxiv:1410.6122v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6122**Description:**Size-based schedulers have very desirable performance properties: optimal or near-optimal response time can be coupled with strong fairness guarantees. Despite this, such systems are very rarely implemented in practical settings, because they require knowing a priori the amount of work needed to complete jobs: this assumption is very difficult to satisfy in concrete systems. It is definitely more likely to inform the system with an estimate of the job sizes, but existing studies point to somewha... read more »## The Lovelace 2.0 Test Of Artificial Creativity And Intelligence. Arxiv:1410.6142v2 Cs.ai Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.6142**Description:**Observing that the creation of certain types of artistic artifacts necessitate intelligence, we present the Lovelace 2.0 Test of creativity as an alternative to the Turing Test as a means of determining whether an agent is intelligent. The Lovelace 2.0 Test builds off prior tests of creativity and additionally provides a means of directly comparing the relative intelligence of different agents. read more »

Dpreview. Rss Criar Um Blog Rss Oplin 4cast 4cast Rss Disability Law Rss Theliberiantimes Rss Greentechmedia Rss Internet Freedom Rss Development App Rss Toptechnews Rss Israel News In Hebrew Rss Blog Out Loud Blog Rss Scott Walker Tilt Rss Busto Arsizio Rss Good Guys Rss Public Integrity Rss E Ola Rss Ktvz News Rss Home Wall Decor Rss Banking Finance Rss Weather Channel City Rss Weather Msn Rss Gobbler Rss Houselogic Rss Maansayahankii Koowaad Rss Equine Care Rss Equine Health Rss College Student Tips Rss Temas Catolicos Rss Conoce Tu Fe Rss The Headhunters Rss Calendario Liturgico Rss Beyond Words Rss Http Mic Rss Http Hyperallergic Rss Http Www Thesartorialist Rss Http Www.thesartorialist. Rss Learn Yoga Rss Yogi Rss Luonto Liitto Rss De De Beratung Rss Sciencedaily Women Rss