- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Fast Low-rank Representation Based Spatial Pyramid Matching For Image Classification. Arxiv:1409.5786v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5786**Description:**Recently, Spatial Pyramid Matching SPM with nonlinear coding strategies, e.g., sparse code based SPM ScSPM and locality-constrained linear coding LLC , have achieved a lot of success in image classification. Although these methods achieve a higher recognition rate and take less time for classification than the traditional SPM, they consume more time to encode each local descriptor extracted from the image. In this paper, we propose using Low Rank Representation LRR in place of sparse code or vec... read more »## 1-string Cz-representation Of Planar Graphs. Arxiv:1409.5816v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5816**Description:**In this paper, we prove that every planar 4-connected graph has a CZ-representation---a string representation using paths in a rectangular grid that contain at most one vertical segment. Furthermore, two paths representing vertices u,v intersect precisely once whenever there is an edge between u and v . The required size of the grid is n times 2n . read more »## Explicit Integration With Gpu Acceleration For Large Kinetic Networks. Arxiv:1409.5826v1 Physics.comp-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5826**Description:**We demonstrate the first implementation of recently-developed fast explicit kinetic integration algorithms on modern graphics processing unit GPU accelerators. Taking as a generic test case a Type Ia supernova explosion with an extremely stiff thermonuclear network having 150 isotopic species and 1604 reactions coupled to hydrodynamics using operator splitting, we demonstrate the capability to solve of order 100 realistic kinetic networks in parallel in the same time that standard implicit metho... read more »## Femtocell Association In Two-tier Cellular Networks: Complexity And Efficient Algorithms. Arxiv:1409.5828v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5828**Description:**This research considers the problem of base station association in a small cell environment. The wireless network in consideration is of two-tiers, where randomly dispersed overlay femtocell base stations FBSs coexist with a macrocell base station MBS . The paper considers two optimization problems, maximizing the set of associated users and maximizing the set of weighted associated users by the FBSs, subject to signal-to-interference-plus-noise ratio SINR requirements as well as the quality of ... read more »## Tight Error Bounds For Structured Prediction. Arxiv:1409.5834v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5834**Description:**Structured prediction tasks in machine learning involve the simultaneous prediction of multiple labels. This is typically done by maximizing a score function on the space of labels, which decomposes as a sum of pairwise elements, each depending on two specific labels. Intuitively, the more pairwise terms are used, the better the expected accuracy. However, there is currently no theoretical account of this intuition. This paper takes a significant step in this direction. We formulate the problem ... read more »## Profiling Underprivileged Residents With Mid-term Public Transit Smartcard Data Of Beijing. Arxiv:1409.5839v1 Cs.oh

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5839**Description:**Mobility of economically underprivileged residents in China has seldom been well profiled due to privacy issue and the characteristics of Chinese over poverty. In this paper, we identify and characterize underprivileged residents in Beijing using ubiquitous public transport smartcard transactions in 2008 and 2010, respectively. We regard these frequent bus/metro riders FRs in China, especially in Beijing, as economically underprivileged residents. Our argument is tested against 1 the household t... read more »## When Money Learns To Fly: Towards Sensing As A Service Applications Using Bitcoin. Arxiv:1409.5841v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5841**Description:**Sensing-as-a-Service S2aaS is an emerging Internet of Things IOT business model pattern. To be technically feasible and to effectively allow for broad adoption, S2aaS implementations have to overcome manifold systemic hurdles, specifically regarding payment and sensor identification. In an effort to overcome these hurdles, we propose Bitcoin as protocol for S2aaS networks. To lay the groundwork and start the conversation about disruptive changes that Bitcoin technology could bring to S2aaS conce... read more »## Key Capacity For Product Sources With Application To Stationary Gaussian Processes. Arxiv:1409.5844v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5844**Description:**We show that for product sources, rate splitting is optimal for secret key agreement using limited one-way communication between two terminals. This yields an alternative proof of the tensorization property of a strong data processing inequality originally studied by Erkip and Cover and amended recently by Anantharam et al. We derive a "water-filling" solution of the communication-rate--key-rate tradeoff for a wide class of discrete memoryless vector Gaussian sources which subsumes the... read more »## Planning Security Services For It Systems. Arxiv:1409.5845v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5845**Description:**Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'. read more »## Homotopy Bisimilarity For Higher-dimensional Automata. Arxiv:1409.5865v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5865**Description:**We introduce a new category of higher-dimensional automata in which the morphisms are functional homotopy simulations, i.e. functional simulations up to concurrency of independent events. For this, we use unfoldings of higher-dimensional automata into higher-dimensional trees. Using a notion of open maps in this category, we define homotopy bisimilarity. We show that homotopy bisimilarity is equivalent to a straight-forward generalization of standard bisimilarity to higher dimensions, and that i... read more »## Incremental Bounded Model Checking For Embedded Software Extended Version . Arxiv:1409.5872v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5872**Description:**Program analysis is on the brink of mainstream in embedded systems development. Formal verification of behavioural requirements, finding runtime errors and automated test case generation are some of the most common applications of automated verification tools based on Bounded Model Checking. Existing industrial tools for embedded software use an off-the-shelf Bounded Model Checker and apply it iteratively to verify the program with an increasing number of unwindings. This approach unnecessarily ... read more »## Ammse Optimization For Multiuser Miso Systems With Imperfect Csit And Perfect Csir. Arxiv:1409.5886v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5886**Description:**In this paper, we consider the design of robust linear precoders for MU-MISO systems where users have perfect Channel State Information CSI while the BS has partial CSI. In particular, the BS has access to imperfect estimates of the channel vectors, in addition to the covariance matrices of the estimation error vectors. A closed-form expression for the Average Minimum Mean Square Error AMMSE is obtained using the second order Taylor Expansion. This approximation is used to formulate two fairness... read more »## Capturing "attrition Intensifying" Structural Traits From Didactic Interaction Sequences Of Mooc Learners. Arxiv:1409.5887v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5887**Description:**This work is an attempt to discover hidden structural configurations in learning activity sequences of students in Massive Open Online Courses MOOCs . Leveraging combined representations of video clickstream interactions and forum activities, we seek to fundamentally understand traits that are predictive of decreasing engagement over time. Grounded in the interdisciplinary field of network science, we follow a graph based approach to successfully extract indicators of active and passive MOOC par... read more »## Maximizing Symmetric Submodular Functions. Arxiv:1409.5900v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5900**Description:**Symmetric submodular functions are an important family of submodular functions capturing many interesting functions including cut functions of graphs and hypergraphs. Maximization of such functions subject to various constraints receives little attention by current research, unlike similar minimization problems which have been widely studied. In this work, we identify a few submodular maximization problems for which one can get a better approximation for symmetric objectives than the state of th... read more »## Bits And Watts: Improving Energy Disaggregation Performance Using Power Line Communication Modems. Arxiv:1409.5907v1 Cs.oh

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5907**Description:**Non-intrusive load monitoring NILM or energy disaggregation, aims to disaggregate a household's electricity consumption into constituent appliances. More than three decades of work in NILM has resulted in the development of several novel algorithmic approaches. However, despite these advancements, two core challenges still exist: i disaggregating low power consumption appliances and ii distinguishing between multiple instances of similar appliances. These challenges are becoming increasingly imp... read more »## Nilmtk V0.2: A Non-intrusive Load Monitoring Toolkit For Large Scale Data Sets. Arxiv:1409.5908v1 Cs.oh

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5908**Description:**In this demonstration, we present an open source toolkit for evaluating non-intrusive load monitoring research; a field which aims to disaggregate a household's total electricity consumption into individual appliances. The toolkit contains: a number of importers for existing public data sets, a set of preprocessing and statistics functions, a benchmark disaggregation algorithm and a set of metrics to evaluate the performance of such algorithms. Specifically, this release of the toolkit has been ... read more »## Finite Automata With Restricted Two-way Motion. Arxiv:1409.5909v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5909**Description:**We consider finite two-way automata and measure the use of two-way motion by counting the number of left moves in accepting computations. Restriction of the automata according to this measure allows us to study in detail the use of two-way motion for the acceptance of regular languages in terms of state complexity. The two-way spectrum of a given regular language is introduced. This quantity reflects the change of size of minimal accepting devices if the use of two-way motion is increased increm... read more »## On Kljn-based Secure Key Distribution In Vehicular Communication Networks. Arxiv:1409.5911v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5911**Description:**In a former paper Fluct. Noise Lett., 13 2014 1450020 we introduced a vehicular communication system with unconditionally secure key exchange based on the Kirchhoff-Law-Johnson-Noise KLJN key distribution scheme. In this paper, we address the secure KLJN key donation to vehicles and give an upper limit for the lifetime of this key. read more »## Multiband Spectrum Access: Great Promises For Future Cognitive Radio Networks. Arxiv:1409.5913v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5913**Description:**Cognitive radio has been widely considered as one of the prominent solutions to tackle the spectrum scarcity. While the majority of existing research has focused on single-band cognitive radio, multiband cognitive radio represents great promises towards implementing efficient cognitive networks compared to single-based networks. Multiband cognitive radio networks MB-CRNs are expected to significantly enhance the network's throughput and provide better channel maintenance by reducing handoff freq... read more »## Automated Discharging Arguments For Density Problems In Grids. Arxiv:1409.5922v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5922**Description:**Discharging arguments demonstrate a connection between local structure and global averages. This makes it an effective tool for proving lower bounds on the density of special sets in infinite grids. However, the minimum density of an identifying code in the hexagonal grid remains open, with an upper bound of frac 3 7 approx 0.428571 and a lower bound of frac 5 12 approx 0.416666 . We present a new, experimental framework for producing discharging arguments using an algorithm. This algorithm repl... read more »## Chaotic Crystallography: How The Physics Of Information Reveals Structural Order In Materials. Arxiv:1409.5930v1 Cond-mat.mtrl-sci

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5930**Description:**We review recent progress in applying information- and computation-theoretic measures to describe material structure that transcends previous methods based on exact geometric symmetries. We discuss the necessary theoretical background for this new toolset and show how the new techniques detect and describe novel material properties. We discuss how the approach relates to well known crystallographic practice and examine how it provides novel interpretations of familiar structures. Throughout, we ... read more »## Robust Multi-branch Tomlinson-harashima Precoding In Cooperative Mimo Relay Systems. Arxiv:1409.5932v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5932**Description:**This paper proposes the design of robust transceivers with Tomlinson-Harashima precoding THP for multiple-input multiple-output MIMO relay systems with amplify-and-forward AF protocols based on a multi-branch MB strategy. The MB strategy employs successive interference cancellation SIC on several parallel branches which are equipped with different ordering patterns so that each branch produces transmit signals by exploiting a certain ordering pattern. For each parallel branch, the proposed robus... read more »## Distributed Robust Learning. Arxiv:1409.5937v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5937**Description:**We propose a generic distributed learning framework for robust statistical learning on emph big contaminated data . The Distributed Robust Learning DRL framework can reduce the computational cost of traditional robust learning methods by several orders. We provide a sharp analysis on the robustness of DRL, showing that DRL not only preserves the robustness of base robust learning methods, but also tolerates breakdowns of a constant fraction of computing nodes. Moreover, DRL can enhance the break... read more »## Ip Tracing And Active Network Response. Arxiv:1409.5942v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5942**Description:**Active security is mainly concerned with performing one or more security functions when a host in a communication network is subject to an attack. Such security functions include appropriate actions against attackers. To properly afford active security actions a set of software subsystems should be integrated together so that they can automatically detect and appropriately address any vulnerability in the underlying network. This work presents integrated model for active security response model.... read more »## G "odel For Goldilocks: A Rigorous, Streamlined Proof Of G "odel's First Incompleteness Theorem, Requiring Minimal Background. Arxiv:1409.5944v1 Math.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5944**Description:**Most discussions of G "odel's theorems fall into one of two types: either they emphasize perceived philosophical "meanings" of the theorems, and maybe sketch some of the ideas of the proofs, usually relating G "odel's proofs to riddles and paradoxes, but do not attempt to present rigorous, complete proofs; or they do present rigorous proofs, but in the traditional style of mathematical logic, with all of its heavy notation and difficult definitions, and technical issues which... read more »## An Energy Efficiency Policy For Communications With C-ran, Icn And Transition Smooth. Arxiv:1409.5954v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5954**Description:**Towards next generation communications, Energy Efficiency EE attracts lots of attentions nowadays. Some innovative techniques have been proposed in prior literatures, especially the sleep mechanism of base station BS . Yet how to sleep and when to sleep are still vague concepts. Another, most of the studies focus on the cellular section or core networks separately while integral and comprehensive version is neglected in prior literatures. In this paper,the integral optimization structure is stud... read more »## A Global Approach For Solving Edge-matching Puzzles. Arxiv:1409.5957v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5957**Description:**We consider apictorial edge-matching puzzles, in which the goal is to arrange a collection of puzzle pieces with colored edges so that the colors match along the edges of adjacent pieces. We devise an algebraic representation for this problem and provide conditions under which it exactly characterizes a puzzle. Using the new representation, we recast the combinatorial, discrete problem of solving puzzles as a global, polynomial system of equations with continuous variables. We further propose ne... read more »## Entanglement Distribution In Optical Networks. Arxiv:1409.5965v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5965**Description:**The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed to any pair of users, independent of their location. The network is constructed employing commercia... read more »## From "i Love You Babe" To "leave Me Alone" - Romantic Relationship Breakups On Twitter. Arxiv:1409.5980v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5980**Description:**We use public data from Twitter to study the breakups of the romantic relationships of 661 couples. Couples are identified through profile references such as user1 writing " user2 is the best boyfriend ever ". Using this data set we find evidence for a number of existing hypotheses describing psychological processes including i pre-relationship closeness being indicative of post-relationship closeness, ii "stonewalling", i.e., ignoring messages by a partner, being indicative ... read more »## Computing The Least-core And Nucleolus For Threshold Cardinality Matching Games. Arxiv:1409.5987v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5987**Description:**Cooperative games provide a framework for fair and stable profit allocation in multi-agent systems. emph Core , emph least-core and emph nucleolus are such solution concepts that characterize stability of cooperation. In this paper, we study the algorithmic issues on the least-core and nucleolus of threshold cardinality matching games TCMG . A TCMG is defined on a graph G= V,E and a threshold T , in which the player set is V and the profit of a coalition S subseteq V is 1 if the size of a maximu... read more »## Optimal Navigation Functions For Nonlinear Stochastic Systems. Arxiv:1409.5993v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5993**Description:**This paper presents a new methodology to craft navigation functions for nonlinear systems with stochastic uncertainty. The method relies on the transformation of the Hamilton-Jacobi-Bellman HJB equation into a linear partial differential equation. This approach allows for optimality criteria to be incorporated into the navigation function, and generalizes several existing results in navigation functions. It is shown that the HJB and that existing navigation functions in the literature sit on end... read more »## On The Strengths Of Connectivity And Robustness In General Random Intersection Graphs. Arxiv:1409.5995v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5995**Description:**Random intersection graphs have received much attention for nearly two decades, and currently have a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. In this paper, we investigate the strengths of connectivity and robustness in a general random intersection graph model. Specifically, we establish sharp asymptotic zero-one laws for k -connectivity and k -robustness, as well as the asymptotically exact probability of k -connectivi... read more »## Reconfigurable Wireless Networks. Arxiv:1409.6001v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6001**Description:**Driven by the advent of sophisticated and ubiquitous applications, and the ever-growing need for information, wireless networks are without a doubt steadily evolving into profoundly more complex and dynamic systems. The user demands are progressively rampant, while application requirements continue to expand in both range and diversity. Future wireless networks, therefore, must be equipped with the ability to handle numerous, albeit challenging requirements. Network reconfiguration, considered a... read more »## Completely Independent Spanning Trees In Some Regular Graphs. Arxiv:1409.6002v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6002**Description:**Let k ge 2 be an integer and T_1, ldots, T_k be spanning trees of a graph G . If for any pair of vertices u,v of V G , the paths from u to v in each T_i , 1 le i le k , do not contain common edges and common vertices, except the vertices u and v , then T_1, ldots, T_k are completely independent spanning trees in G . For 2k -regular graphs which are 2k -connected, such as the Cartesian product of a complete graph of order 2k-1 and a cycle and some Cartesian products of three cycles for k=3 , the ... read more »## Bypassing Kls: Gaussian Cooling And An O N^3 Volume Algorithm. Arxiv:1409.6011v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6011**Description:**We present an O^ n^3 randomized algorithm for estimating the volume of a well-rounded convex body given by a membership oracle, improving on the previous best complexity of O^ n^4 . The new algorithmic ingredient is an accelerated cooling schedule where the rate of cooling increases with the temperature. Previously, the known approach for potentially achieving such complexity relied on a positive resolution of the KLS hyperplane conjecture, a central open problem in convex geometry. read more »## A Fast Algorithm For Computing Irreducible Triangulations Of Closed Surfaces In E^d . Arxiv:1409.6015v1 Math.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6015**Description:**We give a fast algorithm for computing an irreducible triangulation T^ prime of an oriented, connected, boundaryless, and compact surface S in E^d from any given triangulation T of S . If the genus g of S is positive, then our algorithm takes O g^2+gn time to obtain T^ prime , where n is the number of triangles of T . Otherwise, T^ prime is obtained in linear time in n . While the latter upper bound is optimal, the former upper bound improves upon the currently best known upper bound by a lg n /... read more »## On K -connectivity And Minimum Vertex Degree In Random S -intersection Graphs. Arxiv:1409.6021v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6021**Description:**Random s-intersection graphs have recently received much interest 1-9 . In a random s-intersection graph, each vertex is assigned to a set of items in some manner, and two vertices have an edge in between if and only if they share at least s items. In particular, in a uniform random s-intersection graph, each vertex independently selects the same number of items uniformly at random from a common item pool, while in a binomial random s-intersection graph, each item in some item pool is independen... read more »## On Asymptotically Exact Probability Of K -connectivity In Random Key Graphs Intersecting Erd H O S-r 'enyi Graphs. Arxiv:1409.6022v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6022**Description:**Random key graphs have been used in secure wireless sensor networks WSNs and various other applications. Random key graphs, denoted mathbb G n;K,P , form a class of random intersection graphs and can be described as follows: With mathcal V _n= v_1, ldots, v_n denoting the set of vertices, each vertex v_i is assigned a set S_i of K distinct keys that are selected uniformly at random from a key pool of size P . An undirected edge is then drawn between any pair of distinct vertices v_i and v_j if S... read more »## A High-level Model Of Neocortical Feedback Based On An Event Window Segmentation Algorithm. Arxiv:1409.6023v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6023**Description:**The author previously presented an event window segmentation EWS algorithm 5 that uses purely statistical methods to learn to recognize recurring patterns in an input stream of events. In the following discussion, the EWS algorithm is first extended to make predictions about future events. Next, this extended algorithm is used to construct a high-level, simplified model of a neocortical hierarchy. An event stream enters at the bottom of the hierarchy, and drives processing activity upward in the... read more »## Correlation Between Centrality Metrics And Their Application To The Opinion Model. Arxiv:1409.6033v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6033**Description:**In recent decades, a number of centrality metrics describing network properties of nodes have been proposed to rank the importance of nodes. In order to understand the correlations between centrality metrics and to approximate a high-complexity centrality metric by a strongly correlated low-complexity metric, we first study the correlation between centrality metrics in terms of their Pearson correlation coefficient and their similarity in ranking of nodes. In addition to considering the widely u... read more »## Domain Adaptive Neural Networks For Object Recognition. Arxiv:1409.6041v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6041**Description:**We propose a simple neural network model to deal with the domain adaptation problem in object recognition. Our model incorporates the Maximum Mean Discrepancy MMD measure as a regularization in the supervised learning to reduce the distribution mismatch between the source and target domains in the latent space. From experiments, we demonstrate that the MMD regularization is an effective tool to provide good domain adaptation models on both SURF features and raw image pixels of a particular image... read more »## Analyzing Sparse Dictionaries For Online Learning With Kernels. Arxiv:1409.6045v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6045**Description:**Many signal processing and machine learning methods share essentially the same linear-in-the-parameter model, with as many parameters as available samples as in kernel-based machines. Sparse approximation is essential in many disciplines, with new challenges emerging in online learning with kernels. To this end, several sparsity measures have been proposed in the literature to quantify sparse dictionaries and constructing relevant ones, the most prolific ones being the distance, the approximatio... read more »## Approximation Errors Of Online Sparsification Criteria. Arxiv:1409.6046v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6046**Description:**Many machine learning frameworks, such as resource-allocating networks, kernel-based methods, Gaussian processes, and radial-basis-function networks, require a sparsification scheme in order to address the online learning paradigm. For this purpose, several online sparsification criteria have been proposed to restrict the model definition on a subset of samples. The most known criterion is the linear approximation criterion, which discards any sample that can be well represented by the already c... read more »## Oblivious Bounds On The Probability Of Boolean Functions. Arxiv:1409.6052v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6052**Description:**This paper develops upper and lower bounds for the probability of Boolean functions by treating multiple occurrences of variables as independent and assigning them new individual probabilities. We call this approach dissociation and give an exact characterization of optimal oblivious bounds, i.e. when the new probabilities are chosen independent of the probabilities of all other variables. Our motivation comes from the weighted model counting problem or, equivalently, the problem of computing th... read more »## Joint Optimization Of Power Allocation And Training Duration For Uplink Multiuser Mimo Communications. Arxiv:1409.6059v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6059**Description:**In this paper, we consider a multiuser multiple-input multiple-output MU-MIMO communication system between a base station equipped with multiple antennas and multiple mobile users each equipped with a single antenna. The uplink scenario is considered. The uplink channels are acquired by the base station through a training phase. Two linear processing schemes are considered, namely maximum-ratio combining MRC and zero-forcing ZF . We optimize the training period and optimal training energy under ... read more »## Spatially-sparse Convolutional Neural Networks. Arxiv:1409.6070v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6070**Description:**Convolutional neural networks CNNs perform well on problems such as handwriting recognition and image classification. However, the performance of the networks is often limited by budget and time constraints, particularly when trying to train deep networks. Motivated by the problem of online handwriting recognition, we developed a CNN for processing spatially-sparse inputs; a character drawn with a one-pixel wide pen on a high resolution grid looks like a sparse matrix. Taking advantage of the sp... read more »## The Information Theoretically Efficient Model Item : A Model For Computerized Analysis Of Large Datasets. Arxiv:1409.6075v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6075**Description:**This document discusses the Information Theoretically Efficient Model ITEM , a computerized system to generate an information theoretically efficient multinomial logistic regression from a general dataset. More specifically, this model is designed to succeed even where the logit transform of the dependent variable is not necessarily linear in the independent variables. This research shows that for large datasets, the resulting models can be produced on modern computers in a tractable amount of t... read more »## Structure And Complexity Of Ex Post Efficient Random Assignments. Arxiv:1409.6076v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6076**Description:**In the random assignment problem, objects are randomly assigned to agents keeping in view the agents' preferences over objects. A random assignment specifies the probability of an agent getting an object. We examine the structural and computational aspects of ex post efficiency of random assignments. We first show that whereas an ex post efficient assignment can be computed easily, checking whether a given random assignment is ex post efficient is NP-complete. Hence implementing a given random a... read more »## Temporally Coherent Chinese Restaurant Process For Discovery Of Persons And Corresponding Tracklets From User-generated Videos. Arxiv:1409.6080v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6080**Description:**A tracklet is a short sequence of detections of an entity of interest, such as a person's face, in contiguous frames of a video. In this paper we consider clustering tracklets in long videos, an important problem of current interest in Computer Vision. It involves identifying tracklets in short segments of the video and finding associations between tracklets over the entire video. These tasks require careful modelling of spatio-temporal cues. State of the art 27 proposes a probabilistic model wh... read more »## Optimal Ternary Constant-composition Codes With Weight Four And Distance Six. Arxiv:1409.6092v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6092**Description:**The sizes of optimal constant-composition codes of weight three have been determined by Chee, Ge and Ling with four cases in doubt. Group divisible codes played an important role in their constructions. In this paper, we study the problem of constructing optimal ternary constant-composition codes with Hamming weight four and minimum distance six. The problem is solved with a small number of lengths undetermined. The previously known results are those with code length no greater than 10. read more »## Identification Of Influential Scientists Vs. Mass Producers By The Perfectionism Index. Arxiv:1409.6099v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6099**Description:**The concept of h-index has been proposed to easily assess a researcher's performance with a single number. However, by using only this number, we lose significant information about the distribution of citations per article in an author's publication list. In this article, we study an author's citation curve and we define two new areas related to this curve. We call these "penalty areas", since the greater they are, the more an author's performance is penalized. We exploit these areas t... read more »## Best-arm Identification In Linear Bandits. Arxiv:1409.6110v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6110**Description:**We study the best-arm identification problem in linear bandit, where the rewards of the arms depend linearly on an unknown parameter theta^ and the objective is to return the arm with the largest reward. We characterize the complexity of the problem and introduce sample allocation strategies that pull arms to identify the best arm with a fixed confidence, while minimizing the sample budget. In particular, we show the importance of exploiting the global linear structure to improve the estimate of... read more »## Distributed Clustering And Learning Over Networks. Arxiv:1409.6111v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6111**Description:**Distributed processing over networks relies on in-network processing and cooperation among neighboring agents. Cooperation is beneficial when agents share a common objective. However, in many applications agents may belong to different clusters that pursue different objectives. Then, indiscriminate cooperation will lead to undesired results. In this work, we propose an adaptive clustering and learning scheme that allows agents to learn which neighbors they should cooperate with and which other n... read more »## Context-free Characterization Of Indexed Languages. Arxiv:1409.6112v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6112**Description:**Indexed languages are languages recognized by pushdown automata of level 2 and by indexed grammars. We propose here some new characterizations linking indexed languages to context-free languages: the class of indexed languages is the image of the Dyck language by a class of context-free transducers, it is also the class of images, by a projection defined by an FO-formula of nested words labelled by a Dyck word. This last result generalize the logical characterization of context-free languages. read more »## The Mor Cryptosystem And Unitary Group In Odd Characteristic. Arxiv:1409.6136v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6136**Description:**This paper is a continuation of the work done to understand the security of a MOR cryptosystem over matrix groups defined over a finite field. In this paper we show that in the case of unitary group U d,q^2 the security of the MOR cryptosystem is similar to the hardness of the discrete logarithm problem in mathbb F _ q^ 2d . In our way of developing the MOR cryptosystem, we developed row-column operations for unitary matrices that solves the word problem in the group of unitary matrices. This is... read more »## A Connected 3-state Reversible Mealy Automaton Cannot Generate An Infinite Burnside Group. Arxiv:1409.6142v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6142**Description:**The class of automaton groups is a rich source of the simplest examples of infinite Burnside groups. However, there are some classes of automata that do not contain such examples. For instance, all infinite Burnside automaton groups in the literature are generated by non reversible Mealy automata and it was recently shown that 2-state invertible-reversible Mealy automata cannot generate infinite Burnside groups. Here we extend this result to connected 3-state invertible-reversible Mealy automata... read more »## Fixed Points Of Boolean Networks, Guessing Graphs, And Coding Theory. Arxiv:1409.6144v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6144**Description:**In this paper, we are interested in the number of fixed points of functions f:A^n to A^n over a finite alphabet A defined on a given signed digraph D . We first use techniques from network coding to derive some lower bounds on the number of fixed points that only depends on D . We then discover relationships between the number of fixed points of f and problems in coding theory, especially the design of codes for the asymmetric channel. Using these relationships, we derive upper and lower bounds ... read more »## Automatic Retraction And Full Cycle Operation For A Class Of Airborne Wind Energy Generators. Arxiv:1409.6151v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6151**Description:**Airborne wind energy systems aim to harvest the power of winds blowing at altitudes higher than what conventional wind turbines reach. They employ a tethered flying structure, usually a wing, and exploit the aerodynamic lift to produce electrical power. In the case of ground-based systems, where the traction force on the tether is used to drive a generator on the ground, a two phase power cycle is carried out: one phase to produce power, where the tether is reeled out under high traction force, ... read more »## 1-hkust: Object Detection In Ilsvrc 2014. Arxiv:1409.6155v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6155**Description:**The Imagenet Large Scale Visual Recognition Challenge ILSVRC is the one of the most important big data challenges to date. We participated in the object detection track of ILSVRC 2014 and received the fourth place among the 38 teams. We introduce in our object detection system a number of novel techniques in localization and recognition. For localization, initial candidate proposals are generated using selective search, and a novel bounding boxes regression method is used for better object local... read more »## Perfect Prediction Equilibrium. Arxiv:1409.6172v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6172**Description:**In the framework of finite games in extensive form with perfect information and strict preferences, this paper introduces a new equilibrium concept under the assumption of total transparency: all players share the same knowledge and know as much as an omniscient external observer. In particular, there is common knowledge of the solution of the game including the reached outcome and the thought process leading to it, in addition to common knowledge of the game structure and of the players' ration... read more »## A Benchmark Suite For Template Detection And Content Extraction Technical Report . Arxiv:1409.6182v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6182**Description:**Template detection and content extraction are two of the main areas of information retrieval applied to the Web. They perform different analyses over the structure and content of webpages to extract some part of the document. However, their objective is different. While template detection identifies the template of a webpage usually comparing with other webpages of the same website , content extraction identifies the main content of the webpage discarding the other part. Therefore, they are some... read more »## Estimating Topological Properties Of Weighted Networks From Limited Information. Arxiv:1409.6193v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6193**Description:**A fundamental problem in studying and modeling economic and financial systems is represented by privacy issues, which put severe limitations on the amount of accessible information. Here we investigate a novel method to reconstruct the structural properties of complex weighted networks using only partial information: the total number of nodes and links, and the values of the strength for all nodes. The latter are used first as fitness to estimate the unknown node degrees through a standard confi... read more »## Online Privacy As A Collective Phenomenon. Arxiv:1409.6197v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6197**Description:**The problem of online privacy is often reduced to individual decisions to hide or reveal personal information in online social networks OSNs . However, with the increasing use of OSNs, it becomes more important to understand the role of the social network in disclosing personal information that a user has not revealed voluntarily: How much of our private information do our friends disclose about us, and how much of our privacy is lost simply because of online social interaction Without strong te... read more »## Computing The P -adic Canonical Quadratic Form In Polynomial Time. Arxiv:1409.6199v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6199**Description:**An n -ary integral quadratic form is a formal expression Q x_1,..,x_n = sum_ 1 leq i,j leq n a_ ij x_ix_j in n -variables x_1,...,x_n , where a_ ij =a_ ji in mathbb Z . We present a randomized polynomial time algorithm that given a quadratic form Q x_1,...,x_n , a prime p , and a positive integer k outputs a mathtt U in text GL _n mathbb Z /p^k mathbb Z such that mathtt U transforms Q to its p -adic canonical form. read more »## Touch Attention Bayesian Models For Robotic Active Haptic Exploration Of Heterogeneous Surfaces. Arxiv:1409.6226v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6226**Description:**This work contributes to the development of active haptic exploration strategies of surfaces using robotic hands in environments with an unknown structure. The architecture of the proposed approach consists two main Bayesian models, implementing the touch attention mechanisms of the system. The model pi_per perceives and discriminates different categories of materials haptic stimulus integrating compliance and texture features extracted from haptic sensory data. The model pi_tar actively infers ... read more »## Compliance Error Compensation In Robotic-based Milling. Arxiv:1409.6231v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6231**Description:**The paper deals with the problem of compliance errors compensation in robotic-based milling. Contrary to previous works that assume that the forces/torques generated by the manufacturing process are constant, the interaction between the milling tool and the workpiece is modeled in details. It takes into account the tool geometry, the number of teeth, the feed rate, the spindle rotation speed and the properties of the material to be processed. Due to high level of the disturbing forces/torques, t... read more »## Accuracy Improvement Of Robot-based Milling Using An Enhanced Manipulator Model. Arxiv:1409.6234v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6234**Description:**The paper is devoted to the accuracy improvement of robot-based milling by using an enhanced manipulator model that takes into account both geometric and elastostatic factors. Particular attention is paid to the model parameters identification accuracy. In contrast to other works, the proposed approach takes into account impact of the gravity compensator and link weights on the manipulator elastostatic properties. In order to improve the identification accuracy, the industry oriented performance... read more »## Detecting People In Cubist Art. Arxiv:1409.6235v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6235**Description:**Although the human visual system is surprisingly robust to extreme distortion when recognizing objects, most evaluations of computer object detection methods focus only on robustness to natural form deformations such as people's pose changes. To determine whether algorithms truly mirror the flexibility of human vision, they must be compared against human vision at its limits. For example, in Cubist abstract art, painted objects are distorted by object fragmentation and part-reorganization, to th... read more »## Approximating Betweenness Centrality In Large Evolving Networks. Arxiv:1409.6241v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6241**Description:**Betweenness centrality ranks the importance of nodes by their participation in all shortest paths of the network. Therefore computing exact betweenness values is impractical in large networks. For static networks, approximation based on randomly sampled paths has been shown to be significantly faster in practice. However, for dynamic networks, no approximation algorithm for betweenness centrality is known that improves on static recomputation. We address this deficit by proposing two incremental... read more »## Learning Algorithm For Relation-substitutable Context-free Languages. Arxiv:1409.6247v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6247**Description:**Yoshinaka introduced the class of k,l-substitutable context-free languages.This paper introduces a new class of languages "relation-substitutable", which is a simple generalization of Yoshinaka's k,l-substitutable class. We show the class is also polynomial-time identifiable in the limit from positive data. read more »## Constructing Coverability Graphs For Time Basic Petri Nets. Arxiv:1409.6253v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6253**Description:**Time-Basic Petri nets, is a powerful formalism for modeling real-time systems where time constraints are expressed through time functions of marking's time description associated with transition, representing possible firing times. We introduce a technique for coverability analysis based on the building of a finite graph. This technique further exploits the time anonymous concept 5,6 , in order to deal with topologically unbounded nets, exploits the concept of a coverage of TA tokens, i.e., a so... read more »## 2-vertex Connectivity In Directed Graphs. Arxiv:1409.6277v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6277**Description:**We complement our study of 2-connectivity in directed graphs, by considering the computation of the following 2-vertex-connectivity relations: We say that two vertices v and w are 2-vertex-connected if there are two internally vertex-disjoint paths from v to w and two internally vertex-disjoint paths from w to v. We also say that v and w are vertex-resilient if the removal of any vertex different from v and w leaves v and w in the same strongly connected component. We show how to compute the abo... read more »## Roaming Charges For Customers Of Cellular-wireless Entrant And Incumbent Providers. Arxiv:1409.6281v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6281**Description:**We consider a simple two-player game involving a large incumbent and small entrant into a cellular wireless access provider marketplace. The entrant's customers must pay roaming charges. We assume that the roaming charges are regulated, because if they are dictated by the incumbent then they could be set so high so as to be a barrier to entry in the marketplace. The game is studied at its Nash equilibrium. A roaming charge is identified that is arguably fair in the sense that revenues for the ac... read more »## On Tensor Rank Of Conditional Probability Tables In Bayesian Networks. Arxiv:1409.6287v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6287**Description:**A difficult task in modeling with Bayesian networks is the elicitation of numerical parameters of Bayesian networks. A large number of parameters is needed to specify a conditional probability table CPT that has a larger parent set. In this paper we show that, most CPTs from real applications of Bayesian networks can actually be very well approximated by tables that require substantially less parameters. This observation has practical consequence not only for model elicitation but also for effic... read more »## Enabling Incremental Query Re-optimization. Arxiv:1409.6288v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6288**Description:**As declarative query processing techniques expand in scope --- to the Web, data streams, network routers, and cloud platforms --- there is an increasing need for adaptive query processing techniques that can re-plan in the presence of failures or unanticipated performance changes. A status update on the data distributions or the compute nodes may have significant repercussions on the choice of which query plan should be running. Ideally, new system architectures would be able to make cost-based ... read more »## Observable Dynamics And Coordinate Systems For Automotive Target Tracking. Arxiv:1005.3004v2 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1005.3004**Description:**We investigate several coordinate systems and dynamical vector fields for target tracking to be used in driver assistance systems. We show how to express the discrete dynamics of maneuvering target vehicles in arbitrary coordinates starting from the target's and the own ego vehicle's assumed dynamical model in global coordinates. We clarify the notion of "ego compensation" and show how non-inertial effects are to be included when using a body-fixed coordinate system for target tracking... read more »## Mean Field Theory Of Spin Glasses. Arxiv:1008.4844v5 Cond-mat.stat-mech Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1008.4844**Description:**These lecture notes focus on the mean field theory of spin glasses, with particular emphasis on the presence of a very large number of metastable states in these systems. This phenomenon, and some of its physical consequences, will be discussed in details for fully-connected models and for models defined on random lattices. This will be done using the replica and cavity methods. These notes have been prepared for a course of the PhD program in Statistical Mechanics at SISSA, Trieste and at the U... read more »## A Kdv-like Advection-dispersion Equation With Some Remarkable Properties. Arxiv:1109.3745v3 Nlin.ps Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1109.3745**Description:**We discuss a new non-linear PDE, u_t + 2 u_xx/u u_x = epsilon u_xxx, invariant under scaling of dependent variable and referred to here as SIdV. It is one of the simplest such translation and space-time reflection-symmetric first order advection-dispersion equations. This PDE with dispersion coefficient unity was discovered in a genetic programming search for equations sharing the KdV solitary wave solution. It provides a bridge between non-linear advection, diffusion and dispersion. Special cas... read more »## Numerical Computations For Operator Axiom. Arxiv:1208.0701v10 Cs.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1208.0701**Description:**Operator Axiom produces new real numbers with new operators. New operators naturally produce new equations and thus extend the traditional mathematical models which are selected to describe various scientific rules. So new operators help to describe complex scientific rules which are difficult described by traditional equations and have an enormous application potential. As to the equations including new operators, engineering computation often need the approximate solutions reflecting an intuit... read more »## Choice Disjunctive Queries In Logic Programming. Arxiv:1211.6940v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1211.6940**Description:**One of the long-standing research problems on logic programming is to treat the cut predicate in a logical, high-level way. We argue that this problem can be solved by adopting linear logic and choice-disjunctive goal formulas of the form G_0 add G_1 where G_0, G_1 are goals. These goals have the following intended semantics: choose the true disjunct G_i and execute G_i where i = 0 rm or 1 , while discarding the unchosen disjunct. Note that only one goal can remain alive during execution. These ... read more »## Excess-risk Of Distributed Stochastic Learners. Arxiv:1302.1157v2 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1302.1157**Description:**This work studies the learning ability of consensus and diffusion distributed learners from continuous streams of data arising from different but related statistical distributions. Four distinctive features for diffusion learners are revealed in relation to other decentralized schemes even under left-stochastic combination policies. First, closed-form expressions for the evolution of their excess-risk are derived for strongly-convex risk functions under a diminishing step-size rule. Using these ... read more »## Scaling Exponent Of List Decoders With Applications To Polar Codes. Arxiv:1304.5220v4 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1304.5220**Description:**Motivated by the significant performance gains which polar codes experience under successive cancellation list decoding, their scaling exponent is studied as a function of the list size. In particular, the error probability is fixed and the trade-off between block length and back-off from capacity is analyzed. A lower bound is provided on the error probability under rm MAP decoding with list size L for any binary-input memoryless output-symmetric channel and for any class of linear codes such th... read more »## R3mc: A Riemannian Three-factor Algorithm For Low-rank Matrix Completion. Arxiv:1306.2672v2 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1306.2672**Description:**We exploit the versatile framework of Riemannian optimization on quotient manifolds to develop R3MC, a nonlinear conjugate-gradient method for low-rank matrix completion. The underlying search space of fixed-rank matrices is endowed with a novel Riemannian metric that is tailored to the least-squares cost. Numerical comparisons suggest that R3MC robustly outperforms state-of-the-art algorithms across different problem instances, especially those that combine scarcely sampled and ill-conditioned ... read more »## A New Method For The Analysis Of Signals: The Square Wave Transform Swt . Arxiv:1309.3719v5 Cs.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.3719**Description:**The results obtained by analyzing signals with the Square Wave Method SWM introduced previously can be presented in the frequency domain clearly and precisely by using the Square Wave Transform SWT described here. As an example, the SWT is used to analyze a sequence of samples that is, of measured values taken from an electroencephalographic recording. read more »## Uni-mumac: A Unified Down/up-link Mu-mimo Mac Protocol For Ieee 802.11ac Wlans. Arxiv:1309.5049v3 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.5049**Description:**Due to the dominance of the downlink traffic in Wireless Local Area Networks WLANs , a large number of previous research efforts have been put to enhance the transmission from the Access Point AP to stations STAs . The downlink Multi-User Multiple-Input Multiple-Output MU-MIMO technique, supported by the latest IEEE amendment-802.11ac, is considered as one of the key enhancements leading WLANs to the Gigabit era. However, as cloud uploading services, Peer-to-Peer P2P and telepresence application... read more »## A Framework For Structural Input/output And Control Configuration Selection In Large-scale Systems. Arxiv:1309.5868v3 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.5868**Description:**This paper addresses problems on the structural design of control systems taking explicitly into consideration the possible application to large-scale systems. We provide an efficient and unified framework to solve the following major minimization problems: i selection of the minimum number of manipulated/measured variables to achieve structural controllability/observability of the system, and ii selection of the minimum number of feedback interconnections between measured and manipulated variab... read more »## On The Index Of Simon's Congruence For Piecewise Testability. Arxiv:1310.1278v5 Cs.fl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.1278**Description:**Simon's congruence, denoted sim_n, relates words having the same subwords of length up to n. We show that, over a k-letter alphabet, the number of words modulo sim_n is in 2^ Theta n^ k-1 log n . read more »## A Bayesian Network View On Acoustic Model-based Techniques For Robust Speech Recognition. Arxiv:1310.3099v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.3099**Description:**This article provides a unifying Bayesian network view on various approaches for acoustic model adaptation, missing feature, and uncertainty decoding that are well-known in the literature of robust automatic speech recognition. The representatives of these classes can often be deduced from a Bayesian network that extends the conventional hidden Markov models used in speech recognition. These extensions, in turn, can in many cases be motivated from an underlying observation model that relates cle... read more »## When "i Cut, You Choose" Method Implies Intransitivity. Arxiv:1311.0803v3 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.0803**Description:**There is a common belief that humans and many animals follow transitive inference choosing A over C on the basis of knowing that A is better than B and B is better than C . Transitivity seems to be the essence of rational choice. We present a theoretical model of a repeated game in which the players make a choice between three goods e.g. food . The rules of the game refer to the simple procedure of fair division among two players, known as the "I cut, you choose" mechanism which has be... read more »## Large Independent Sets In Triangle-free Planar Graphs. Arxiv:1311.2749v2 Cs.dm Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.2749**Description:**Every triangle-free planar graph on n vertices has an independent set of size at least n+1 /3, and this lower bound is tight. We give an algorithm that, given a triangle-free planar graph G on n vertices and an integer k>=0, decides whether G has an independent set of size at least n+k /3, in time 2^ O sqrt k n. Thus, the problem is fixed-parameter tractable when parameterized by k. Furthermore, as a corollary of the result used to prove the correctness of the algorithm, we show that there ex... read more »## Combining Persistent Homology And Invariance Groups For Shape Comparison. Arxiv:1312.7219v2 Math.at Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.7219**Description:**In many applications concerning the comparison of data expressed by R^m-valued functions defined on a topological space X, the invariance with respect to a given group G of self-homeomorphisms of X is required. While persistent homology is quite efficient in the topological and qualitative comparison of this kind of data when the invariance group G is the group Homeo X of all self-homeomorphisms of X, this theory is not tailored to manage the case in which G is a proper subgroup of Homeo X , and... read more »## Improved Bounds On Maximum Sets Of Letters In Sequences With Forbidden Alternations. Arxiv:1401.0063v2 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.0063**Description:**Let A_ s,k m be the maximum number of distinct letters in any sequence which can be partitioned into m contiguous blocks of pairwise distinct letters, has at least k occurrences of every letter, and has no subsequence forming an alternation of length s . Nivasch 2010 proved that A_ 5, 2d+1 m = theta m alpha_ d m for all fixed d geq 2 . We show that A_ s+1, s m = binom m- lceil frac s 2 rceil lfloor frac s 2 rfloor for all s geq 2 , A_ 5, 6 m = theta m log log m , and A_ 5, 2d+2 m = theta m alpha... read more »## Relating P -adic Eigenvalues And The Local Smith Normal Form. Arxiv:1401.1773v3 Math.ra Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.1773**Description:**Conditions are established under which the p -adic valuations of the invariant factors diagonal entries of the Smith form of an integer matrix are equal to the p -adic valuations of the eigenvalues. It is then shown that this correspondence is the typical case for "most" matrices; precise density bounds are given for when the property holds, as well as easy transformations to this typical case. read more »## Randomized Minmax Regret For Combinatorial Optimization Under Uncertainty. Arxiv:1401.7043v2 Cs.dm Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.7043**Description:**The minmax regret problem for combinatorial optimization under uncertainty can be viewed as a zero-sum game played between an optimizing player and an adversary, where the optimizing player selects a solution and the adversary selects costs with the intention of maximizing the regret of the player. The existing minmax regret model considers only deterministic solutions/strategies, and minmax regret versions of most polynomial solvable problems are NP-hard. In this paper, we consider a randomized... read more »## Universal Knowledge Discovery From Big Data: Towards A Paradigm Shift From 'knowledge Discovery' To 'wisdom Discovery'. Arxiv:1403.7570v3 Cs.cy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.7570**Description:**Many people hold a vision that big data will provide big insights and have a big impact in the future, and big-data-assisted scientific discovery is seen as an emerging and promising scientific paradigm. However, how to turn big data into deep insights with tremendous value still remains obscure. To meet the challenge, universal knowledge discovery from big data UKD is proposed. The new concept focuses on discovering universal knowledge, which exists in the statistical analyses of big data and p... read more »## Sampling A Uniform Random Solution Of A Quadratic Equation Modulo P^k . Arxiv:1404.0281v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.0281**Description:**An n -ary integral quadratic form is a formal expression Q x_1,...,x_n = sum_ 1 leq i,j leq n a_ ij x_ix_j in n -variables x_1,...,x_n , where a_ ij =a_ ji in mathbb Z . We present a poly n,k, log p, log t randomized algorithm that given a quadratic form Q x_1,...,x_n , a prime p , a positive integer k and an integer t , samples a uniform solution of Q x_1,...,x_n equiv t bmod p^k . read more »## Linear Hamilton Jacobi Bellman Equations In High Dimensions. Arxiv:1404.1089v2 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.1089**Description:**The Hamilton Jacobi Bellman Equation HJB provides the globally optimal solution to large classes of control problems. Unfortunately, this generality comes at a price, the calculation of such solutions is typically intractible for systems with more than moderate state space size due to the curse of dimensionality. This work combines recent results in the structure of the HJB, and its reduction to a linear Partial Differential Equation PDE , with methods based on low rank tensor representations, k... read more »## Music For Single-snapshot Spectral Estimation: Stability And Super-resolution. Arxiv:1404.1484v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.1484**Description:**This paper studies the problem of line spectral estimation in the continuum of a bounded interval with one snapshot of array measurement. The single-snapshot measurement data is turned into a Hankel data matrix which admits the Vandermonde decomposition and is suitable for the MUSIC algorithm. The MUSIC algorithm amounts to finding the null space the noise space of the Hankel matrix, forming the noise-space correlation function and identifying the s smallest local minima of the noise-space corre... read more »## Constant Delay And Constant Feedback Moving Window Network Coding For Wireless Multicast: Design And Asymptotic Analysis. Arxiv:1404.3438v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.3438**Description:**A major challenge of wireless multicast is to be able to support a large number of users while simultaneously maintaining low delay and low feedback overhead. In this paper, we develop a joint coding and feedback scheme named Moving Window Network Coding with Anonymous Feedback MWNC-AF that successfully addresses this challenge. In particular, we show that our scheme simultaneously achieves both a constant decoding delay and a constant feedback overhead, irrespective of the number of receivers n... read more »## Unified Structured Learning For Simultaneous Human Pose Estimation And Garment Attribute Classification. Arxiv:1404.4923v3 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.4923**Description:**In this paper, we utilize structured learning to simultaneously address two intertwined problems: human pose estimation HPE and garment attribute classification GAC , which are valuable for a variety of computer vision and multimedia applications. Unlike previous works that usually handle the two problems separately, our approach aims to produce a jointly optimal estimation for both HPE and GAC via a unified inference procedure. To this end, we adopt a preprocessing step to detect potential huma... read more »## In Order Packet Delivery In Instantly Decodable Network Coded Systems Over Wireless Broadcast. Arxiv:1404.5709v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.5709**Description:**In this paper, we study in-order packet delivery in instantly decodable network coded systems for wireless broadcast networks. We are interested in applications, in which the successful delivery of a packet depends on the correct reception of this packet and all its preceding packets. We formulate the problem of minimizing the number of undelivered packets to all receivers over all transmissions until completion as a stochastic shortest path SSP problem. Although finding the optimal packet selec... read more »## Asymptotically Optimal Anomaly Detection Via Sequential Testing. Arxiv:1405.4659v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.4659**Description:**Sequential detection of independent anomalous processes among K processes is considered. At each time, only M processes can be observed, and the observations from each chosen process follow two different distributions, depending on whether the process is normal or abnormal. Each anomalous process incurs a cost per unit time until its anomaly is identified and fixed. Switching across processes and state declarations are allowed at all times, while decisions are based on all past observations and ... read more »## Decodability Attack Against The Fuzzy Commitment Scheme With Public Feature Transforms. Arxiv:1406.1154v3 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.1154**Description:**The fuzzy commitment scheme is a cryptographic primitive that can be used to store biometric templates being encoded as fixed-length feature vectors protected. If multiple related records generated from the same biometric instance can be intercepted, their correspondence can be determined using the decodability attack. In 2011, Kelkboom et al. proposed to pass the feature vectors through a record-specific but public permutation process in order to prevent this attack. In this paper, it is shown ... read more »## A Fast Simulation Method For The Sum Of Subexponential Distributions. Arxiv:1406.4689v4 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.4689**Description:**Estimating the probability that a sum of random variables RVs exceeds a given threshold is a well-known challenging problem. Closed-form expression of the sum distribution is usually intractable and presents an open problem. A crude Monte Carlo MC simulation is the standard technique for the estimation of this type of probability. However, this approach is computationally expensive especially when dealing with rare events i.e events with very small probabilities . Importance Sampling IS is an al... read more »## On The Maximum Entropy Property Of The First-order Stable Spline Kernel And Its Implications. Arxiv:1406.5706v2 Math.st Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.5706**Description:**A new nonparametric approach for system identification has been recently proposed where the impulse response is seen as the realization of a zero--mean Gaussian process whose covariance, the so--called stable spline kernel, guarantees that the impulse response is almost surely stable. Maximum entropy properties of the stable spline kernel have been pointed out in the literature. In this paper we provide an independent proof that relies on the theory of matrix extension problems in the graphical ... read more »## Approximations For The Moments Of Nonstationary And State Dependent Birth-death Queues. Arxiv:1406.6164v2 Math.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.6164**Description:**In this paper we propose a new method for approximating the nonstationary moment dynamics of one dimensional Markovian birth-death processes. By expanding the transition probabilities of the Markov process in terms of Poisson-Charlier polynomials, we are able to estimate any moment of the Markov process even though the system of moment equations may not be closed. Using new weighted discrete Sobolev spaces, we derive explicit error bounds of the transition probabilities and new weak a priori est... read more »## Low-latency Successive-cancellation List Decoders For Polar Codes With Multi-bit Decision. Arxiv:1406.7036v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.7036**Description:**Polar codes, as the first provable capacity-achieving error-correcting codes, have received much attention in recent years. However, the decoding performance of polar codes with traditional successive-cancellation SC algorithm cannot match that of the low-density parity-check LDPC or turbo codes. Because SC list SCL decoding algorithm can significantly improve the error-correcting performance of polar codes, design of SCL decoders is important for polar codes to be deployed in practical applicat... read more »## How To Achieve The Capacity Of Asymmetric Channels. Arxiv:1406.7373v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.7373**Description:**We discuss coding techniques that allow reliable transmission up to the capacity of a discrete memoryless em a symmetric channel. To do so, we take the point of view of modern coding theory and we discuss how recent advances in coding for symmetric channels help in providing more efficient solutions also for the asymmetric case. In more detail, we consider three basic approaches. The first one is Gallager's scheme that consists of concatenating a linear code with a non-linear mapper so that the ... read more »## Analyzing The Performance Of Multilayer Neural Networks For Object Recognition. Arxiv:1407.1610v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1610**Description:**In the last two years, convolutional neural networks CNNs have achieved an impressive suite of results on standard recognition datasets and tasks. CNN-based features seem poised to quickly replace engineered representations, such as SIFT and HOG. However, compared to SIFT and HOG, we understand much less about the nature of the features learned by large CNNs. In this paper, we experimentally probe several aspects of CNN feature learning in an attempt to help practitioners gain useful, evidence-b... read more »## Sampling In Space Restricted Settings. Arxiv:1407.1689v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1689**Description:**Space efficient algorithms play a central role in dealing with large amount of data. In such settings, one would like to analyse the large data using small amount of "working space". One of the key steps in many algorithms for analysing large data is to maintain a or a small number random sample from the data points. In this paper, we consider two space restricted settings -- i streaming model, where data arrives over time and one can use only a small amount of storage, and ii query mo... read more »## Categorical Proof Theory Of Co-intuitionistic Linear Logic. Arxiv:1407.3416v5 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.3416**Description:**To provide a categorical semantics for co-intuitionistic logic one has to face the fact, noted by Tristan Crolard, that the definition of co-exponents as adjuncts of coproducts does not work in the category Set, where coproducts are disjoint unions. Following the familiar construction of models of intuitionistic linear logic with exponential" ", we build models of co-intuitionistic logic in symmetric monoidal left-closed categories with additional structure, using a variant of Crolard'... read more »## Flow-based Influence Graph Visual Summarization. Arxiv:1408.2401v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2401**Description:**Visually mining a large influence graph is appealing yet challenging. People are amazed by pictures of newscasting graph on Twitter, engaged by hidden citation networks in academics, nevertheless often troubled by the unpleasant readability of the underlying visualization. Existing summarization methods enhance the graph visualization with blocked views, but have adverse effect on the latent influence structure. How can we visually summarize a large graph to maximize influence flows In particula... read more »## A Probabilistic Mac For Cognitive Radio Systems With Energy Harvesting Nodes. Arxiv:1408.2779v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2779**Description:**In this paper, we consider a cognitive radio CR system where the secondary user SU harvests energy from both the nature resources and the primary user PU radio frequency RF signal. We propose an energy-based probabilistic access scheme in which SU probabilistically accesses and senses the primary channel. The decision is based on the available energy and the PU's activity. We investigate the problem of maximizing the SU's success rate provided that the PU average quality of service QoS constrain... read more »## Hopc: Histogram Of Oriented Principal Components Of 3d Pointclouds For Action Recognition. Arxiv:1408.3809v4 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.3809**Description:**Existing techniques for 3D action recognition are sensitive to viewpoint variations because they extract features from depth images which change significantly with viewpoint. In contrast, we directly process the pointclouds and propose a new technique for action recognition which is more robust to noise, action speed and viewpoint variations. Our technique consists of a novel descriptor and keypoint detection algorithm. The proposed descriptor is extracted at a point by encoding the Histogram of... read more »## Action Classification With Locality-constrained Linear Coding. Arxiv:1408.3810v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.3810**Description:**We propose an action classification algorithm which uses Locality-constrained Linear Coding LLC to capture discriminative information of human body variations in each spatiotemporal subsequence of a video sequence. Our proposed method divides the input video into equally spaced overlapping spatiotemporal subsequences, each of which is decomposed into blocks and then cells. We use the Histogram of Oriented Gradient HOG3D feature to encode the information in each cell. We justify the use of LLC fo... read more »## Bug Hunting By Computing Range Reduction. Arxiv:1408.7039v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.7039**Description:**We describe a method of model checking called Computing Range Reduction CRR . The CRR method is based on derivation of clauses that reduce the set of traces of reachable states in such a way that at least one counterexample remains if any . These clauses are derived by a technique called Partial Quantifier Elimination PQE . Given a number n, the CRR method finds a counterexample of length less or equal to n or proves that such a counterexample does not exist. We show experimentally that a PQE-so... read more »## Quantum Digital-to-analog Conversion Algorithm Using Decoherence. Arxiv:1409.0088v2 Quant-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0088**Description:**We consider the problem of mapping digital data encoded on a quantum register to analog amplitudes in parallel. It is shown to be unlikely that a fully unitary polynomial-time quantum algorithm exists for this problem; NP becomes a subset of BQP if it exists. In the practical point of view, we propose a nonunitary linear-time algorithm using quantum decoherence. It tacitly uses an exponentially large physical resource, which is typically a huge number of identical molecules. Quantumness of corre... read more »## The Ordered Weighted Ell_1 Norm: Atomic Formulation, Dual Norm, And Projections. Arxiv:1409.4271v3 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.4271**Description:**The ordered weighted ell_1 norm OWL was recently proposed, with two different motivations: because of its good statistical properties as a sparsity promoting regularizer, and as generalization of the so-called it octagonal shrinkage and clustering algorithm for regression OSCAR . The OSCAR is a convex group-sparsity inducing regularizer, which does not require the prior specification of the group structure. Also recently, much interest has been raised by the atomic norm formulation of several re... read more »## Audit Games With Multiple Defender Resources. Arxiv:1409.4503v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.4503**Description:**Modern organizations e.g., hospitals, social networks, government agencies rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a configurable punishment parameter. We significantly generalize this audit game model to account for multip... read more »## Vertex Guarding In Weak Visibility Polygons. Arxiv:1409.4621v2 Cs.cg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.4621**Description:**The art gallery problem enquires about the least number of guards that are sufficient to ensure that an art gallery, represented by a polygon P , is fully guarded. In 1998, the problems of finding the minimum number of point guards, vertex guards, and edge guards required to guard P were shown to be APX-hard by Eidenbenz, Widmayer and Stamm. In 1987, Ghosh presented approximation algorithms for vertex guards and edge guards that achieved a ratio of mathcal O log n , which was improved upto mathc... read more »## Sandboxing For Software Transactional Memory With Deferred Updates. Arxiv:1409.5313v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5313**Description:**Software transactional memory implementations which allow transactions to work on inconsistent states of shared data, risk to cause application visible errors such as memory access violations or endless loops. Hence, many implementations rely on repeated incremental validation of every read of the transaction to always guarantee for a consistent view of shared data. Because this eager validation technique generates significant processing costs several proposals have been published to establish a... read more »## Elastic Business Process Management: State Of The Art And Open Challenges For Bpm In The Cloud. Arxiv:1409.5715v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.5715**Description:**With the advent of cloud computing, organizations are nowadays able to react rapidly to changing demands for computational resources. Not only individual applications can be hosted on virtual cloud infrastructures, but also complete business processes. This allows the realization of so-called elastic processes, i.e., processes which are carried out using elastic cloud resources. Despite the manifold benefits of elastic processes, there is still a lack of solutions supporting them. In this paper,... read more »## Approximately Optimal Mechanism Design: Motivation, Examples, And Lessons Learned. Arxiv:1406.6773v1 Cs.gt Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.6773**Description:**Optimal mechanism design enjoys a beautiful and well-developed theory, and also a number of killer applications. Rules of thumb produced by the field influence everything from how governments sell wireless spectrum licenses to how the major search engines auction off online advertising. There are, however, some basic problems for which the traditional optimal mechanism design approach is ill-suited --- either because it makes overly strong assumptions, or because it advocates overly complex desi... read more »

Hibrido Rss Chandoo Rss Angela Huffmon S Latest Rss 2011 Articles Rss Look 10 Rss Rasa Rss Fr Tech Rss Beyonces Rss Celebrity Leaks Rss Ferra Rss C Le Rss Build Src Rss Ikhwanweb. Rss Davduf Net Rss This Is Hard Me Rss Human Vision Rss Eyes And Vision Rss Ironman Results Rss Ironman Live Rss Les People Rss Rosh Hashanah Rss Statistical Models Rss Welsh History Rss Sverigedemokraterna Rss Busted Halo Blogs Rss January 2007 Rss Cox Net Rss Cnn Espanol Espanol Rss Marsdd Rss Mars Toronto Rss Cnn Espanol Espanol Rss Organization Tips Rss Tass Rss Australian Arts Rss Guide For Tv Shows Rss Daily Tv Guide Rss Robert Lake Rss Fnac Spectacles Rss Problogger Blog Rss Straight Times Rss Strait Rss Accounting Web Rss