- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Modeling Context And Situations In Pervasive Computing Environments. Arxiv:1503.07159v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07159**Description:**In pervasive computing environments, various entities often have to cooperate and integrate seamlessly in a emph situation which can, thus, be considered as an amalgamation of the context of several entities interacting and coordinating with each other, and often performing one or more activities. However, none of the existing context models and ontologies address situation modeling. In this paper, we describe the design, structure and implementation of a generic, flexible and extensible context... read more »## On The Analytical Tractability Of Hexagonal Network Model With Random Traffic Distribution. Arxiv:1503.07160v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07160**Description:**Explicit derivation of interferences in hexagonal wireless networks has been widely considered intractable and requires extensive computations with system level simulations. In this paper, we fundamentally tackle this problem and explicitly evaluate interference factor f for any mobile location m in a hexagonal network composed of omni-directional or tri-sectorized sites. The explicit formula of f is a very convergent series on m and involves the use of hypergeometric and Hurwitz Riemann zeta fu... read more »## An Integer Linear Programming Solution To The Telescope Network Scheduling Problem. Arxiv:1503.07170v1 Astro-ph.im

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07170**Description:**Telescope networks are gaining traction due to their promise of higher resource utilization than single telescopes and as enablers of novel astronomical observation modes. However, as telescope network sizes increase, the possibility of scheduling them completely or even semi-manually disappears. In an earlier paper, a step towards software telescope scheduling was made with the specification of the Reservation formalism, through the use of which astronomers can express their complex observation... read more »## Optimal Control In Markov Decision Processes Via Distributed Optimization. Arxiv:1503.07189v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07189**Description:**Optimal control synthesis in stochastic systems with respect to quantitative temporal logic constraints can be formulated as linear programming problems. However, centralized synthesis algorithms do not scale to many practical systems. To tackle this issue, we propose a decomposition-based distributed synthesis algorithm. By decomposing a large-scale stochastic system modeled as a Markov decision process into a collection of interacting sub-systems, the original control problem is formulated as ... read more »## Shortest-path Queries In Planar Graphs On Gpu-accelerated Architectures. Arxiv:1503.07192v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07192**Description:**We develop an efficient parallel algorithm for answering shortest-path queries in planar graphs and implement it on a multi-node CPU/GPU clusters. The algorithm uses a divide-and-conquer approach for decomposing the input graph into small and roughly equal subgraphs and constructs a distributed data structure containing shortest distances within each of those subgraphs and between their boundary vertices. For a planar graph with n vertices, that data structure needs O n storage per processor and... read more »## Computational Methods For Stochastic Control With Metric Interval Temporal Logic Specifications. Arxiv:1503.07193v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07193**Description:**This paper studies an optimal control problem for continuous-time stochastic systems subject to reachability objectives specified in a subclass of metric interval temporal logic specifications, a temporal logic with real-time constraints. We propose a probabilistic method for synthesizing an optimal control policy that maximizes the probability of satisfying a specification based on a discrete approximation of the underlying stochastic system. First, we show that the original problem can be form... read more »## Revisiting Interval Graphs For Network Science. Arxiv:1503.07199v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07199**Description:**The vertices of an interval graph represent intervals over a real line where overlapping intervals denote that their corresponding vertices are adjacent. This implies that the vertices are measurable by a metric and there exists a linear structure in the system. The generalization is an embedding of a graph onto a multi-dimensional Euclidean space and it was used by scientists to study the multi-relational complexity of ecology. However the research went out of fashion in the 1980s and was not r... read more »## Geometry And Determinism Of Optimal Stationary Control In Partially Observable Markov Decision Processes. Arxiv:1503.07206v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07206**Description:**It is well known that any finite state Markov decision process MDP has a deterministic memory-less policy that maximizes the discounted long-term expected reward. Hence for such MDPs the optimal control problem can be solved over the set of memoryless deterministic policies. In the case of partially observable Markov decision processes POMDPs , where there is uncertainty about the world state, optimal policies must generally be stochastic, if no additional information is presented, e.g., the obs... read more »## Universal Approximation Of Markov Kernels By Shallow Stochastic Feedforward Networks. Arxiv:1503.07211v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07211**Description:**We establish upper bounds for the minimal number of hidden units for which a binary stochastic feedforward network with sigmoid activation probabilities and a single hidden layer is a universal approximator of Markov kernels. We show that each possible probabilistic assignment of the states of n output units, given the states of k geq1 input units, can be approximated arbitrarily well by a network with 2^ k-1 2^ n-1 -1 hidden units. read more »## Automated Test Input Generation For Android: Are We There Yet . Arxiv:1503.07217v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07217**Description:**Mobile applications, often simply called "apps", are increasingly widespread, and we use them daily to perform a number of activities. Like all software, apps must be adequately tested to gain confidence that they behave correctly. Therefore, in recent years, researchers and practitioners alike have begun to investigate ways to automate apps testing. In particular, because of Android's open source nature and its large share of the market, a great deal of research has been performed on ... read more »## Measuring Complexity Through Average Symmetry. Arxiv:1503.07218v1 Cond-mat.stat-mech

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07218**Description:**This work introduces a complexity measure which addresses some conflicting issues between existing ones by using a new principle - measuring the average amount of symmetry broken by an object. It attributes low although different complexity to either deterministic or random homogeneous densities and higher complexity to the intermediate cases. This new measure is easily computable, breaks the coarse graining paradigm and can be straightforwardly generalised, including to continuous cases and gen... read more »## Individual Planning In Agent Populations: Exploiting Anonymity And Frame-action Hypergraphs. Arxiv:1503.07220v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07220**Description:**Interactive partially observable Markov decision processes I-POMDP provide a formal framework for planning for a self-interested agent in multiagent settings. An agent operating in a multiagent environment must deliberate about the actions that other agents may take and the effect these actions have on the environment and the rewards it receives. Traditional I-POMDPs model this dependence on the actions of other agents using joint action and model spaces. Therefore, the solution complexity grows... read more »## Exponential Convergence Bounds Using Integral Quadratic Constraints. Arxiv:1503.07222v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07222**Description:**The theory of integral quadratic constraints IQCs allows verification of stability and gain-bound properties of systems containing nonlinear or uncertain elements. Gain bounds often imply exponential stability, but it can be challenging to compute useful numerical bounds on the exponential decay rate. In this work, we present a modification of the classical IQC results of Megretski and Rantzer that leads to a tractable computational procedure for finding exponential rate certificates. read more »## Feeder Topology Identification. Arxiv:1503.07224v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07224**Description:**Advanced control of distributed energy resources at the consumer level requires full situational awareness of the the distribution system. One important problem is that of feeder topology identification, due to changing switch configurations, given a sparse number of measurements. We formulate the problem for residential feeders as a spanning tree identification problem over a general graph. Given a set of power flow measurements and load pseudo measurements, we show that the underlying graph st... read more »## A Note On Optimal Experiment Design For Nonlinear Systems Using Dynamic Programming. Arxiv:1503.07232v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07232**Description:**We present a method of solving the T-optimal design problem for nonlinear dynamical systems using dynamic programming. In contrast with previous dynamic programming formulations, we avoid adding an equation for the dispersion to the system state, allowing for more efficient solutions. read more »## A Formal Study On Backward Compatible Dynamic Software Updates. Arxiv:1503.07235v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07235**Description:**We study the dynamic software update problem for programs interacting with an environment that is not necessarily updated. We argue that such updates should be backward compatible. We propose a general definition of backward compatibility and cases of backward compatible program update. Based on our detailed study of real world program evolution, we propose classes of backward compatible update for interactive programs, which are included at an average of 32 of all studied program changes. The d... read more »## Isotropically Random Orthogonal Matrices: Performance Of Lasso And Minimum Conic Singular Values. Arxiv:1503.07236v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07236**Description:**Recently, the precise performance of the Generalized LASSO algorithm for recovering structured signals from compressed noisy measurements, obtained via i.i.d. Gaussian matrices, has been characterized. The analysis is based on a framework introduced by Stojnic and heavily relies on the use of Gordon's Gaussian min-max theorem GMT , a comparison principle on Gaussian processes. As a result, corresponding characterizations for other ensembles of measurement matrices have not been developed. In thi... read more »## Regularized Minimax Conditional Entropy For Crowdsourcing. Arxiv:1503.07240v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07240**Description:**There is a rapidly increasing interest in crowdsourcing for data labeling. By crowdsourcing, a large number of labels can be often quickly gathered at low cost. However, the labels provided by the crowdsourcing workers are usually not of high quality. In this paper, we propose a minimax conditional entropy principle to infer ground truth from noisy crowdsourced labels. Under this principle, we derive a unique probabilistic labeling model jointly parameterized by worker ability and item difficult... read more »## Graphmat: High Performance Graph Analytics Made Productive. Arxiv:1503.07241v1 Cs.pf

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07241**Description:**Given the growing importance of large-scale graph analytics, there is a need to improve the performance of graph analysis frameworks without compromising on productivity. GraphMat is our solution to bridge this gap between a user-friendly graph analytics framework and native, hand-optimized code. GraphMat functions by taking vertex programs and mapping them to high performance sparse matrix operations in the backend. We get the productivity benefits of a vertex programming framework without sacr... read more »## Safe Platooning Of Unmanned Aerial Vehicles Via Reachability. Arxiv:1503.07253v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07253**Description:**Recently, there has been immense interest in using unmanned aerial vehicles UAVs for civilian operations such as package delivery, firefighting, and fast disaster response. As a result, UAV traffic management systems are needed to support potentially thousands of UAVs flying simultaneously in the airspace, in order to ensure their liveness and safety requirements are met. Hamilton-Jacobi HJ reachability is a powerful framework for providing conditions under which these requirements can be met, a... read more »## Dual Polynomials For Collision And Element Distinctness. Arxiv:1503.07261v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07261**Description:**The approximate degree of a Boolean function f: -1, 1 ^n to -1, 1 is the minimum degree of a real polynomial that approximates f to within error 1/3 in the ell_ infty norm. In an influential result, Aaronson and Shi J. ACM 2004 proved tight tilde Omega n^ 1/3 and tilde Omega n^ 2/3 lower bounds on the approximate degree of the Collision and Element Distinctness functions, respectively. Their proof was non-constructive, using a sophisticated symmetrization argument and tools from approximation th... read more »## Towards Controlling Refinements Of Statecharts. Arxiv:1503.07266v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07266**Description:**In incremental development strategies, modelers frequently refine Statecharts models to satisfy requirements and changes. Although several solutions exist to the problem of Statecharts refinement, they provide such levels of freedom that a statechart cannot make assumptions or guarantees about its future structure. In this paper, we propose a set of bounding rules to limit the allowable Statecharts refinement operations such that certain assumptions will hold. read more »## Initialization Strategies Of Spatio-temporal Convolutional Neural Networks. Arxiv:1503.07274v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07274**Description:**We propose a new way of incorporating temporal information present in videos into Spatial Convolutional Neural Networks ConvNets trained on images, that avoids training Spatio-Temporal ConvNets from scratch. We describe several initializations of weights in 3D Convolutional Layers of Spatio-Temporal ConvNet using 2D Convolutional Weights learned from ImageNet. We show that it is important to initialize 3D Convolutional Weights judiciously in order to learn temporal representations of videos. We ... read more »## Multi-bernoulli Sensor-control Via Minimization Of Expected Estimation Errors. Arxiv:1503.07276v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07276**Description:**This paper presents a sensor-control method for choosing the best next state of the sensor s , that provide s accurate estimation results in a multi-target tracking application. The proposed solution is formulated for a multi-Bernoulli filter and works via minimization of a new estimation error-based cost function. Simulation results demonstrate that the proposed method can outperform the state-of-the-art methods in terms of computation time and robustness to clutter while delivering similar acc... read more »## Morphological Analyzer And Generator For Russian And Ukrainian Languages. Arxiv:1503.07283v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07283**Description:**pymorphy2 is a morphological analyzer and generator for Russian and Ukrainian languages. It uses large efficiently encoded lexi- cons built from OpenCorpora and LanguageTool data. A set of linguistically motivated rules is developed to enable morphological analysis and generation of out-of-vocabulary words observed in real-world documents. For Russian pymorphy2 provides state-of-the-arts morphological analysis quality. The analyzer is implemented in Python programming language with optional C++ ... read more »## A Rule-based Short Query Intent Identification System. Arxiv:1503.07284v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07284**Description:**Using SMS Short Message System , cell phones can be used to query for information about various topics. In an SMS based search system, one of the key problems is to identify a domain broad topic associated with the user query; so that a more comprehensive search can be carried out by the domain specific search engine. In this paper we use a rule based approach, to identify the domain, called Short Query Intent Identification System SQIIS . We construct two different rule-bases using different st... read more »## The Social System Identification Problem. Arxiv:1503.07288v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07288**Description:**The focus of this paper is modeling what we call a Social Radar, i.e. a method to estimate the relative influence between social agents, by sampling their opinions and as they evolve, after injecting in the network stubborn agents. The stubborn agents opinion is not influenced by the peers they seek to sway, and their opinion bias is the known input to the social network system. The novelty is in the model presented to probe a social network and the solution of the associated regression problem.... read more »## Wireless Power Charging Control In Multiuser Broadband Networks. Arxiv:1503.07291v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07291**Description:**Recent advances in wireless power transfer WPT technology provide a cost-effective solution to charge wireless devices remotely without disruption to the use. In this paper, we propose an efficient wireless charging control method for exploiting the frequency diversity in multiuser broadband wireless networks, to reduce energy outage and keep the system operating in an efficient and sustainable state. In particular, we first analyze the impact of charging control method to the operating lifetime... read more »## Using Latent Semantic Analysis To Identify Quality In Use Qu Indicators From User Reviews. Arxiv:1503.07294v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07294**Description:**The paper describes a novel approach to categorize users' reviews according to the three Quality in Use QU indicators defined in ISO: effectiveness, efficiency and freedom from risk. With the tremendous amount of reviews published each day, there is a need to automatically summarize user reviews to inform us if any of the software able to meet requirement of a company according to the quality requirements. We implemented the method of Latent Semantic Analysis LSA and its subspace to predict QU i... read more »## A Brief Survey Of Recent Edge-preserving Smoothing Algorithms On Digital Images. Arxiv:1503.07297v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07297**Description:**Edge preserving filters preserve the edges and its information while blurring an image. In other words they are used to smooth an image, while reducing the edge blurring effects across the edge like halos, phantom etc. They are nonlinear in nature. Examples are bilateral filter, anisotropic diffusion filter, guided filter, trilateral filter etc. Hence these family of filters are very useful in reducing the noise in an image making it very demanding in computer vision and computational photograph... read more »## Exploring Patterns In European Singles Charts. Arxiv:1503.07301v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07301**Description:**European singles charts are important part of the music industry responsible for creating popularity of songs. After modeling and exploring dynamics of global album sales in previous papers, we investigate patterns of hit singles popularity according to all data 1966-2015 from weekly charts polls in 12 Western European countries. The dynamics of building popularity in various national charts is more than the economy because it depends on spread of information. In our research we have shown how c... read more »## The Complexity Of Phylogeny Constraint Satisfaction. Arxiv:1503.07310v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07310**Description:**We systematically study the computational complexity of a broad class of computational problems in phylogenetic reconstruction. The class contains for example the rooted triple consistency problem, forbidden subtree problems, the quartet consistency problem, and many other problems studied in the bioinformatics literature. The studied class of problems can be described as the constraint satisfaction problems for constraint languages having a quantifier-free definition over the rooted triple rela... read more »## Fractional Pilot Reuse In Massive Mimo Systems. Arxiv:1503.07321v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07321**Description:**Pilot contamination is known to be one of the main impairments for massive MIMO multi-cell communications. Inspired by the concept of fractional frequency reuse and by recent contributions on pilot reutilization among non-adjacent cells, we propose a new pilot allocation scheme to mitigate this effect. The key idea is to allow users in neighboring cells that are closest to their base stations to reuse the same pilot sequences. Focusing on the uplink, we obtain expressions for the overall spectra... read more »## An Experiment On Using Bayesian Networks For Process Mining. Arxiv:1503.07341v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07341**Description:**Process mining is a technique that performs an automatic analysis of business processes from a log of events with the promise of understanding how processes are executed in an organisation. Several models have been proposed to address this problem, however, here we propose a different approach to deal with uncertainty. By uncertainty, we mean estimating the probability of some sequence of tasks occurring in a business process, given that only a subset of tasks may be observable. In this sense, t... read more »## One-step Stochastic Processes Simulation Software Package. Arxiv:1503.07342v1 Cs.sc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07342**Description:**Background. It is assumed that the introduction of stochastic in mathematical model makes it more adequate. But there is virtually no methods of coordinated depended on structure of the system stochastic introduction into deterministic models. Authors have improved the method of stochastic models construction for the class of one-step processes and illustrated by models of population dynamics. Population dynamics was chosen for study because its deterministic models were sufficiently well explor... read more »## Mixed Polarity Reversible Peres Gates. Arxiv:1503.07356v1 Cs.et

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07356**Description:**Reversible Peres gates with more than two all over binary-valued control signals are discussed. Methods are disclosed for the low cost realization of this kind of Peres gates without requiring ancillary lines. Proper distribution of the controlled gates and their inverses allow driving the reversible Peres gate with control signals of different polarities. read more »## The Two-user Causal Cognitive Interference Channel: Novel Outer Bounds And Constant Gap Result For The Symmetric Gaussian Noise Channel In Weak Interference. Arxiv:1503.07372v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07372**Description:**This paper studies the two-user Causal Cognitive Interference Channel CCIC , where two transmitters aim to communicate independent messages to two different receivers via a common channel. One source, referred to as the cognitive, is capable of overhearing the other source, referred to as the primary, through a noisy in-band link and thus can assist in sending the primary's data. Two novel outer bounds of the type 2R_p+R_c and R_p+2R_c are derived for the class of injective semi-deterministic CC... read more »## Global Tracking Passivity--based Pi Control Of Bilinear Systems And Its Application To The Boost And Modular Multilevel Converters. Arxiv:1503.07376v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07376**Description:**This paper deals with the problem of trajectory tracking of a class of bilinear systems with time--varying measurable disturbance. A set of matrices A,B_i has been identified, via a linear matrix inequality, for which it is possible to ensure global tracking of admissible, differentiable trajectories with a simple linear time--varying PI controller. Instrumental to establish the result is the construction of an output signal with respect to which the incremental model is passive. The result is a... read more »## A Tale Of Two Mechanisms: Incentivizing Investments In Security Games. Arxiv:1503.07377v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07377**Description:**In a system of interdependent users, the security of an entity is affected not only by that user's investment in security measures, but also by the positive externality of the security decisions of some of the other users. The provision of security in such system is therefore modeled as a public good provision problem, and is referred to as a security game. In this paper, we compare two well-known incentive mechanisms in this context for incentivizing optimal security investments among users, na... read more »## Compressed Sensing Mri Using Masked Dct And Dft Measurements. Arxiv:1503.07384v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07384**Description:**This paper presents modification of the TwIST algorithm for Compressive Sensing MRI images reconstruction. Compressive Sensing is new approach in signal processing whose basic idea is recovering signal form small set of available samples. The application of the Compressive Sensing in biomedical imaging has found great importance. It allows significant lowering of the acquisition time, and therefore, save the patient from the negative impact of the MR apparatus. TwIST is commonly used algorithm f... read more »## Vectorized Vbyte Decoding. Arxiv:1503.07387v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07387**Description:**We consider the ubiquitous technique of VByte compression, which represents each integer as a variable length sequence of bytes. The low 7 bits of each byte encode a portion of the integer, and the high bit of each byte is reserved as a continuation flag. This flag is set to 1 for all bytes except the last, and the decoding of each integer is complete when a byte with a high bit of 0 is encountered. VByte decoding can be a performance bottleneck especially when the unpredictable lengths of the e... read more »## Network Formation With Value Heterogeneity: Centrality, Segregation And Adverse Effects. Arxiv:1503.07389v1 Q-fin.ec

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07389**Description:**We investigate formation of economic and social networks where agents may form or cut ties. The novelty is combining a setup where agents are heterogeneous in their talent for generating value in the links they form and value may also accrue from indirect ties. We provide sufficient conditions for assortative matching: agents of greater talent have partners of greater talent. A novel feature is that agents with higher talent are more central in networks. Another novel feature is degree assortati... read more »## Transmitting Full Set Of Alphabet Letters To Human Hand Via Writing Motion With 5-minute Training. Arxiv:1503.07401v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07401**Description:**In this paper we report a method to transmit symbolic information to untrained users with only their hands where no visual or auditory cues are available. Our simple concept is presenting three-dimensional letter trajectories to the readers' hand via a stylus which is electronically manipulated. Despite its simplicity, experimental participants were able to read 14mm-height lower-case alphabets displayed at a pace of one letter per second with the accuracy rate of 71 with their first trials, whi... read more »## Making The Most Of Tweet-inherent Features For Social Spam Detection On Twitter. Arxiv:1503.07405v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07405**Description:**Social spam produces a great amount of noise on social media services such as Twitter, which reduces the signal-to-noise ratio that both end users and data mining applications observe. Existing techniques on social spam detection have focused primarily on the identification of spam accounts by using extensive historical and network-based data. In this paper we focus on the detection of spam tweets, which optimises the amount of data that needs to be gathered by relying only on tweet-inherent fea... read more »## Comparing Graphs Via Persistence Distortion. Arxiv:1503.07414v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07414**Description:**Metric graphs are ubiquitous in science and engineering. For example, many data are drawn from hidden spaces that are graph-like, such as the cosmic web. A metric graph offers one of the simplest yet still meaningful ways to represent the non-linear structure hidden behind the data. In this paper, we propose a new distance between two finite metric graphs, called the persistence-distortion distance, which draws upon a topological idea. This topological perspective along with the metric space vie... read more »## Compressed Sensing And Designs: Theory And Simulations. Arxiv:1503.07424v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07424**Description:**In "An asymptotic result on compressed sensing matrices", a new construction for compressed sensing matrices using combinatorial design theory was introduced. In this paper, we analyse the performance of these matrices using deterministic and probabilistic methods. We provide a new recovery algorithm and detailed simulations. These simulations suggest that the construction is competitive with Gaussian random matrices, and that recovery is tolerant to noise. read more »## A Survey On Approximation Mechanism Design Without Money For Facility Games. Arxiv:1503.07426v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07426**Description:**In a facility game one or more facilities are placed in a metric space to serve a set of selfish agents whose addresses are their private information. In a classical facility game, each agent wants to be as close to a facility as possible, and the cost of an agent can be defined as the distance between her location and the closest facility. In an obnoxious facility game, each agent wants to be far away from all facilities, and her utility is the distance from her location to the facility set. Th... read more »## Coordination And Efficiency In Decentralized Collaboration. Arxiv:1503.07431v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07431**Description:**Environments for decentralized on-line collaboration are now widespread on the Web, underpinning open-source efforts, knowledge creation sites including Wikipedia, and other experiments in joint production. When a distributed group works together in such a setting, the mechanisms they use for coordination can play an important role in the effectiveness of the group's performance. Here we consider the trade-offs inherent in coordination in these on-line settings, balancing the benefits to collabo... read more »## Overlapping Community Detection Using Neighborhood-inflated Seed Expansion. Arxiv:1503.07439v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07439**Description:**Community detection is an important task in network analysis. A community also referred to as a cluster is a set of cohesive vertices that have more connections inside the set than outside. In many social and information networks, these communities naturally overlap. For instance, in a social network, each vertex in a graph corresponds to an individual who usually participates in multiple communities. In this paper, we propose an efficient overlapping community detection algorithm using a seed e... read more »## Building Efficient And Compact Data Structures For Simplicial Complexes. Arxiv:1503.07444v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07444**Description:**The Simplex Tree ST is a recently introduced data structure that can represent abstract simplicial complexes of any dimension and allows efficient implementation of a large range of basic operations on simplicial complexes. In this paper, we show how to optimally compress the Simplex Tree while retaining its functionalities. In addition, we propose two new data structures called the Maximal Simplex Tree MxST and the Simplex Array List SAL . We analyze the compressed Simplex Tree, the Maximal Sim... read more »## Sum Secrecy Rate In Miso Full-duplex Wiretap Channel With Imperfect Csi. Arxiv:1503.07455v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07455**Description:**In this paper, we consider the achievable sum secrecy rate in MISO multiple-input-single-output em full-duplex wiretap channel in the presence of a passive eavesdropper and imperfect channel state information CSI . We assume that the users participating in full-duplex communication have multiple transmit antennas, and that the users and the eavesdropper have single receive antenna each. The users have individual transmit power constraints. They also transmit jamming signals to improve the secrec... read more »## Ransac Based Three Points Algorithm For Ellipse Fitting Of Spherical Object's Projection. Arxiv:1503.07460v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07460**Description:**As the spherical object can be seen everywhere, we should extract the ellipse image accurately and fit it by implicit algebraic curve in order to finish the 3D reconstruction. In this paper, we propose a new ellipse fitting algorithm which only needs three points to fit the projection of spherical object and is different from the traditional algorithms that need at least five point. The fitting procedure is just similar as the estimation of Fundamental Matrix estimation by seven points, and the ... read more »## Computing The Partition Function Of A Polynomial On The Boolean Cube. Arxiv:1503.07463v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07463**Description:**For a polynomial f: -1, 1 ^n --> C, we define the partition function as the average of exp lambda f x over all points x in -1, 1 ^n, where lambda in C is a parameter. We present an algorithm, which, given such f, lambda and epsilon >0 approximates the partition function within a relative error of epsilon in N^ O ln n -ln epsilon time provided lambda < 2L sqrt d ^ -1 , where d is the degree, L is roughly the Lipschitz constant of f and N is the number of monomials in f. As a corollary, w... read more »## Properties Of Sparse Distributed Representations And Their Application To Hierarchical Temporal Memory. Arxiv:1503.07469v1 Q-bio.nc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07469**Description:**Empirical evidence demonstrates that every region of the neocortex represents information using sparse activity patterns. This paper examines Sparse Distributed Representations SDRs , the primary information representation strategy in Hierarchical Temporal Memory HTM systems and the neocortex. We derive a number of properties that are core to scaling, robustness, and generalization. We use the theory to provide practical guidelines and illustrate the power of SDRs as the basis of HTM. Our goal i... read more »## A Survey On Backup Of Data On Remote Server. Arxiv:1503.07473v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07473**Description:**Large amount of electronic data is generated in Cloud computing every day. Efficient maintenance of this data requires proper services. Hence a method to collect data securely, by protecting and developing backups is mentioned. The Objective is to provide Auto Response Server, better solutions for data backup and restoring using Cloud. Data can be collected and sent to a centralized repository in a platform independent format without any network consideration. This data can then be used accordin... read more »## User Profiling Trends, Techniques And Applications. Arxiv:1503.07474v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07474**Description:**The Personalization of information has taken recommender systems at a very high level. With personalization these systems can generate user specific recommendations accurately and efficiently. User profiling helps personalization, where information retrieval is done to personalize a scenario which maintains a separate user profile for individual user. The main objective of this paper is to explore this field of personalization in context of user profiling, to help researchers make aware of the u... read more »## Role Of Matrix Factorization Model In Collaborative Filtering Algorithm: A Survey. Arxiv:1503.07475v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07475**Description:**Recommendation Systems apply Information Retrieval techniques to select the online information relevant to a given user. Collaborative Filtering is currently most widely used approach to build Recommendation System. CF techniques uses the user behavior in form of user item ratings as their information source for prediction. There are major challenges like sparsity of rating matrix and growing nature of data which is faced by CF algorithms. These challenges are been well taken care by Matrix Fact... read more »## A Survey Of Classification Techniques In The Area Of Big Data. Arxiv:1503.07477v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07477**Description:**Big Data concern large-volume, growing data sets that are complex and have multiple autonomous sources. Earlier technologies were not able to handle storage and processing of huge data thus Big Data concept comes into existence. This is a tedious job for users unstructured data. So, there should be some mechanism which classify unstructured data into organized form which helps user to easily access required data. Classification techniques over big transactional database provide required data to ... read more »## On Coefficients Of Powers Of Polynomials And Their Compositions Over Finite Fields. Arxiv:1503.07487v1 Math.nt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07487**Description:**For any given polynomial f over the finite field mathbb F _q with degree at most q-1 , we associate it with a q times q matrix A f = a_ ik consisting of coefficients of its powers f x ^k= sum_ i=0 ^ q-1 a_ ik x^i modulo x^q -x for k=0,1, ldots,q-1 . This matrix has some interesting properties such as A g circ f =A f A g where g circ f x = g f x is the composition of the polynomial g with the polynomial f . In particular, A f^ k = A f ^k for any k -th composition f^ k of f with k geq 0 . As a con... read more »## Sensitivity Analysis For Additive Stdp Rule. Arxiv:1503.07490v1 Q-bio.nc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07490**Description:**Spike Timing Dependent Plasticity STDP is a Hebbian like synaptic learning rule. The basis of STDP has strong experimental evidences and it depends on precise input and output spike timings. In this paper we show that under biologically plausible spiking regime, slight variability in the spike timing leads to drastically different evolution of synaptic weights when its dynamics are governed by the additive STDP rule. read more »## P-score: A Publication-based Metric For Academic Productivity. Arxiv:1503.07496v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07496**Description:**In this work we propose a metric to assess academic productivity based on publication outputs. We are interested in knowing how well a research group in an area of knowledge is doing relatively to a pre-selected set of reference groups, where each group is composed by academics or researchers. To assess academic productivity we propose a new metric, which we call P-score. Our metric P-score assigns weights to venues using only the publication patterns of selected reference groups. This implies t... read more »## Stable Feature Selection From Brain Smri. Arxiv:1503.07508v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07508**Description:**Neuroimage analysis usually involves learning thousands or even millions of variables using only a limited number of samples. In this regard, sparse models, e.g. the lasso, are applied to select the optimal features and achieve high diagnosis accuracy. The lasso, however, usually results in independent unstable features. Stability, a manifest of reproducibility of statistical results subject to reasonable perturbations to data and the model, is an important focus in statistics, especially in the... read more »## Actorscript Tm Extension Of C Sharp Tm , Java Tm , And Objective C Tm : Iadaptive Tm Concurrency For Anticloud Tm Privacy And Security. Arxiv:1008.2748v60 Cs.pl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1008.2748**Description:**ActorScript TM is a general purpose programming language for implementing discretionary, adaptive concurrency that manages resources and demand. It is differentiated from previous languages by the following: - Universality Ability to specify what Actors can do Specify interface between hardware and software Everything in the language is accomplished using message passing including the very definition of ActorScript itself Functional, Imperative, Logic, and Concurrent programming are integrated. ... read more »## Generating Robust And Efficient Networks Under Targeted Attacks. Arxiv:1207.1291v2 Physics.soc-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1207.1291**Description:**Much of our commerce and traveling depend on the efficient operation of large scale networks. Some of those, such as electric power grids, transportation systems, communication networks, and others, must maintain their efficiency even after several failures, or malicious attacks. We outline a procedure that modifies any given network to enhance its robustness, defined as the size of its largest connected component after a succession of attacks, whilst keeping a high efficiency, described in term... read more »## Adaptive Metric Dimensionality Reduction. Arxiv:1302.2752v3 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1302.2752**Description:**We study adaptive data-dependent dimensionality reduction in the context of supervised learning in general metric spaces. Our main statistical contribution is a generalization bound for Lipschitz functions in metric spaces that are doubling, or nearly doubling. On the algorithmic front, we describe an analogue of PCA for metric spaces: namely an efficient procedure that approximates the data's intrinsic dimension, which is often much lower than the ambient dimension. Our approach thus leverages ... read more »## Higher Homotopies In A Hierarchy Of Univalent Universes. Arxiv:1311.4002v2 Math.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.4002**Description:**For Martin-Lof type theory with a hierarchy U 0 : U 1 : U 2 : ... of univalent universes, we show that U n is not an n-type. Our construction also solves the problem of finding a type that strictly has some high truncation level without using higher inductive types. In particular, U n is such a type if we restrict it to n-types. We have fully formalized and verified our results within the dependently typed language and proof assistant Agda. read more »## Parallel Matrix Factorization For Low-rank Tensor Completion. Arxiv:1312.1254v2 Cs.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.1254**Description:**Higher-order low-rank tensors naturally arise in many applications including hyperspectral data recovery, video inpainting, seismic data recon- struction, and so on. We propose a new model to recover a low-rank tensor by simultaneously performing low-rank matrix factorizations to the all-mode ma- tricizations of the underlying tensor. An alternating minimization algorithm is applied to solve the model, along with two adaptive rank-adjusting strategies when the exact rank is not known. Phase tran... read more »## Dj-mc: A Reinforcement-learning Agent For Music Playlist Recommendation. Arxiv:1401.1880v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.1880**Description:**In recent years, there has been growing focus on the study of automated recommender systems. Music recommendation systems serve as a prominent domain for such works, both from an academic and a commercial perspective. A fundamental aspect of music perception is that music is experienced in temporal context and in sequence. In this work we present DJ-MC, a novel reinforcement-learning framework for music recommendation that does not recommend songs individually but rather song sequences, or playl... read more »## K "ahlerian Information Geometry For Signal Processing. Arxiv:1404.2006v3 Math.dg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.2006**Description:**We prove the correspondence between the information geometry of a signal filter and a K "ahler manifold. The information geometry of a minimum-phase linear system with a finite complex cepstrum norm is a K "ahler manifold. The square of the complex cepstrum norm of the signal filter corresponds to the K "ahler potential. The Hermitian structure of the K "ahler manifold is explicitly emergent if and only if the impulse response function of the highest degree in z is constant i... read more »## Computational Homogenization Of Fibrous Piezoelectric Materials. Arxiv:1405.3302v2 Cs.ce Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.3302**Description:**Flexible piezoelectric devices made of polymeric materials are widely used for micro- and nanoelectro-mechanical systems. In particular, numerous recent applications concern energy harvesting. Due to the importance of computational modeling to understand the influence that microscale geometry and constitutive variables exert on the macroscopic behavior, a numerical approach is developed here for multiscale and multi physics modeling of piezoelectric materials made of aligned arrays of polymeric ... read more »## Blind Sensor Calibration Using Approximate Message Passing. Arxiv:1406.5903v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.5903**Description:**The ubiquity of approximately sparse data has led a variety of com- munities to great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them on real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal ac- quisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing ... read more »## A Cut Principle For Information Flow. Arxiv:1410.4617v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4617**Description:**We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation of information through it. Suppose a set of channels is a cut set between an information source and a potential sink. We prove that, if there is no disclosure from the source to the cut set, then there can be no disclosure to the sink. We introduce a new formalization of partial disclos... read more »## Does Google Scholar Contain All Highly Cited Documents 1950-2013 . Arxiv:1410.8464v4 Cs.dl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.8464**Description:**The study of highly cited documents on Google Scholar GS has never been addressed to date in a comprehensive manner. The objective of this work is to identify the set of highly cited documents in Google Scholar and define their core characteristics: their languages, their file format, or how many of them can be accessed free of charge. We will also try to answer some additional questions that hopefully shed some light about the use of GS as a tool for assessing scientific impact through citation... read more »## Almost Cover-free Codes And Designs. Arxiv:1410.8566v5 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.8566**Description:**An s -subset of codewords of a binary code X is said to be an em s, ell -bad in X if the code X contains a subset of other ell codewords such that the conjunction of the ell codewords is covered by the disjunctive sum of the s codewords. Otherwise, the s -subset of codewords of X is said to be an em s, ell -good in X .mA binary code X is said to be a cover-free s, ell -code if the code X does not contain s, ell -bad subsets. In this paper, we introduce a natural em probabilistic generalization o... read more »## Light On The Infinite Group Relaxation. Arxiv:1410.8584v2 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.8584**Description:**This is a survey on the infinite group problem, an infinite-dimensional relaxation of integer linear optimization problems introduced by Ralph Gomory and Ellis Johnson in their groundbreaking papers titled "Some continuous functions related to corner polyhedra I, II" Math. Programming 3 1972 , 23-85, 359-389 . The survey presents the infinite group problem in the modern context of cut generating functions. It focuses on the recent developments, such as algorithms for testing extremalit... read more »## Harq Buffer Management: An Information-theoretic View. Arxiv:1501.06166v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1501.06166**Description:**A key practical constraint on the design of Hybrid automatic repeat request HARQ schemes is the size of the on-chip buffer that is available at the receiver to store previously received packets. In fact, in modern wireless standards such as LTE and LTE-A, the HARQ buffer size is one of the main drivers of the modem area and power consumption. This has recently highlighted the importance of HARQ buffer management, that is, of the use of buffer-aware transmission schemes and of advanced compressio... read more »## Poisson Matrix Completion. Arxiv:1501.06243v6 Stat.ml Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1501.06243**Description:**We extend the theory of matrix completion to the case where we make Poisson observations for a subset of entries of a low-rank matrix. We consider the now usual matrix recovery formulation through maximum likelihood with proper constraints on the matrix M , and establish theoretical upper and lower bounds on the recovery error. Our bounds are nearly optimal up to a factor on the order of mathcal O log d_1 d_2 . These bounds are obtained by adapting the arguments used for one-bit matrix completio... read more »## Optimal Cell Clustering And Activation For Energy Saving In Load-coupled Wireless Networks. Arxiv:1502.04344v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.04344**Description:**Optimizing activation and deactivation of base station transmissions provides an instrument for improving energy efficiency in cellular networks. In this paper, we study optimal cell clustering and scheduling of activation duration for each cluster, with the objective of minimizing the sum energy, subject to a time constraint of delivering the users' traffic demand. The cells within a cluster are simultaneously in transmission and napping modes, with cluster activation and deactivation, respecti... read more »## Dynamic Spectrum Access With Statistical Qos Provisioning: A Distributed Learning Approach Beyond Expectation Optimization. Arxiv:1502.06672v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.06672**Description:**This article investigates the problem of dynamic spectrum access with statistical quality of service QoS provisioning for dynamic canonical networks, in which the channel states are time-varying from slot to slot. In the existing work with time-varying environment, the commonly used optimization objective is to maximize the expectation of a certain metric e.g., throughput or achievable rate . However, it is realized that expectation alone is not enough since some applications are sensitive to th... read more »## Fixed-dimensional Energy Games Are In Pseudo-polynomial Time. Arxiv:1502.06875v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.06875**Description:**We generalise the hyperplane separation technique Chatterjee and Velner, 2013 from multi-dimensional mean-payoff to energy games, and achieve an algorithm for solving the latter whose running time is exponential only in the dimension, but not in the number of vertices of the game graph. This answers an open question whether energy games with arbitrary initial credit can be solved in pseudo-polynomial time for fixed dimensions 3 or larger Chaloupka, 2013 . It also improves the complexity of solvi... read more »## Total Variation On A Tree. Arxiv:1502.07770v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07770**Description:**We consider the problem of minimizing the continuous valued total variation subject to different unary terms on trees and propose fast direct algorithms based on dynamic programming to solve these problems. We treat both the convex and the non-convex case and derive worst case complexities that are equal or better than existing methods. We show applications to total variation based 2D image processing and computer vision problems based on a Lagrangian decomposition approach. The resulting algori... read more »## #foodporn: Obesity Patterns In Culinary Interactions. Arxiv:1503.01546v3 Cs.cy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.01546**Description:**We present a large-scale analysis of Instagram pictures taken at 164,753 restaurants by millions of users. Motivated by the obesity epidemic in the United States, our aim is three-fold: i to assess the relationship between fast food and chain restaurants and obesity, ii to better understand people's thoughts on and perceptions of their daily dining experiences, and iii to reveal the nature of social reinforcement and approval in the context of dietary health on social media. When we correlate th... read more »## A Uniform Substitution Calculus For Differential Dynamic Logic. Arxiv:1503.01981v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.01981**Description:**This paper introduces a new proof calculus for differential dynamic logic dL that is entirely based on uniform substitution, a proof rule that substitutes a formula for a predicate symbol everywhere. Uniform substitutions make it possible to rely on axioms rather than axiom schemata, substantially simplifying implementations. Instead of nontrivial schema variables and soundness-critical side conditions on the occurrence patterns of variables, the resulting calculus adopts only a finite number of... read more »## Algorithms For Replica Placement In High-availability Storage. Arxiv:1503.02654v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.02654**Description:**A new model of causal failure is presented and used to solve a novel replica placement problem in data centers. The model describes dependencies among system components as a directed graph. A replica placement is defined as a subset of vertices in such a graph. A criterion for optimizing replica placements is formalized and explained. In this work, the optimization goal is to avoid choosing placements in which a single failure event is likely to wipe out multiple replicas. Using this criterion, ... read more »## Fast And Robust Fixed-rank Matrix Recovery. Arxiv:1503.03004v3 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.03004**Description:**We address the problem of efficient sparse fixed-rank S-FR matrix decomposition, i.e., splitting a corrupted matrix M into an uncorrupted matrix L of rank r and a sparse matrix of outliers S . Fixed-rank constraints are usually imposed by the physical restrictions of the system under study. Here we propose a method to perform accurate and very efficient S-FR decomposition that is more suitable for large-scale problems than existing approaches. Our method is a grateful combination of geometrical ... read more »## On Learning Optimized Reaction Diffusion Processes For Effective Image Restoration. Arxiv:1503.05768v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.05768**Description:**For several decades, image restoration remains an active research topic in low-level computer vision and hence new approaches are constantly emerging. However, many recently proposed algorithms achieve state-of-the-art performance only at the expense of very high computation time, which clearly limits their practical relevance. In this work, we propose a simple but effective approach with both high computational efficiency and high restoration quality. We extend conventional nonlinear reaction d... read more »## Technical Report: Attitude Synchronization In Mathcal S ^2 . Arxiv:1503.06326v2 Cs.sy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.06326**Description:**In this paper we study a family of controllers that guarantees attitude synchronization for a network of elements in the unit sphere domain, i.e. mathcal S ^2 . We propose distributed continuous controllers for elements whose dynamics are controllable i.e. control with torque as command , and which can be implemented by each individual agent without the need of a common global orientation frame among the network, i.e. it requires only local information that can be measured by each individual age... read more »## On Orchestrating Virtual Network Functions In Nfv. Arxiv:1503.06377v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.06377**Description:**Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In addition, organizations often require their traffic to pass through a specific sequence of middleboxes for compliance wi... read more »## Improving M-sbl For Joint Sparse Recovery Using A Subspace Penalty. Arxiv:1503.06679v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.06679**Description:**The multiple measurement vector problem MMV is a generalization of the compressed sensing problem that addresses the recovery of a set of jointly sparse signal vectors. One of the important contributions of this paper is to reveal that the seemingly least related state-of-art MMV joint sparse recovery algorithms - M-SBL multiple sparse Bayesian learning and subspace-based hybrid greedy algorithms - have a very important link. More specifically, we show that replacing the log det cdot term in M-S... read more »## Teor 'ia Del Comportamiento Corrupto: Nociones Cibern 'eticas E Inform 'aticas Para Una Expansi 'on De La Ecuaci 'on De Klitgaard. Arxiv:1503.06842v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.06842**Description:**This essay presents an exploration of elements from information theory and cibernetics on the struggle against corruption behavior in public sector and beyond; the existence of an exemplary or corrupt ethical equilibriums are explored by updating Klitgaard corruption formula along with the presence of information pressure, entropy and cibernetics servomechanisms in digital societies, including alternatives and sistemics approaches for further anti-corruption policies implementation. read more »## On Reverse Pinsker Inequalities. Arxiv:1503.07118v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.07118**Description:**New upper bounds on the relative entropy are derived as a function of the total variation distance. One bound refines an inequality by Verd ' u for general probability measures. A second bound improves the tightness of an inequality by Csisz ' a r and Talata for arbitrary probability measures that are defined on a common finite set. The latter result is further extended, for probability measures on a finite set, leading to an upper bound on the R ' e nyi divergence of an arbitrary non-negative o... read more »## A Note On Entropy Estimation. Arxiv:1503.05911v1 Physics.data-an Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1503.05911**Description:**We compare an entropy estimator Hz recently discussed in 8 with two estimators H1 and H2 introduced in 6 7 . We prove the identity Hz=H1, which has not been taken into account in 8 . Moreover, by numerical simulation we verify that for the most interesting regime of small sample estimation and large event spaces, the estimator H2 has a significant smaller statistical error than Hz. read more »

Multimedia Maina Rss Peace Council Rss Icar Org In Rss Http Www Lyrics Net Rss L Avenir Net Rss Thersa.org Rss Submit Engine Rss Mattino Rss Submit Engine Rss Variety Movies Rss Alquds. Rss L Avenir.net Rss Blogo It Rss Mp3 Download Music Rss Youtube Music Channels Rss National Medicine Rss Blog Backgrounds Rss Song Video Clips Rss Http Www.lyrics.net Rss Rock Lyrics Rss Rock Music Lyrics Rss World Food Program Rss Hadr Rss Prevention Web Rss Icar.org.in Rss Change Org Animals Rss My Life Story Rss Life Story Writing Rss Business News Image Rss Coveteur Rss Blogo.it Rss Blogo Rss Arc North Rss The Vogue Rss Tollywood News Rss 18 33 Rss The Next Web Design Rss The Next Web Dev Rss Mrc Org Rss Business Breaking News Rss Congresso Rss