- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Applying Genetic Algorithm For Prioritization Of Test Case Scenarios Derived From Uml Diagrams. Arxiv:1410.4838v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4838**Description:**Software testing involves identifying the test cases whichdiscover errors in the program. However, exhaustive testing ofsoftware is very time consuming. In this paper, a technique isproposed to prioritize test case scenarios by identifying the critical path clusters using genetic algorithm. The test case scenarios are derived from the UML activity diagram and state chart diagram. The testing efficiency is optimized by applying the genetic algorithm on the test data. The information flow metric i... read more »## Impact Of Shadow Banks On Financial Contagion. Arxiv:1410.4847v1 Q-fin.rm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4847**Description:**An asset network systemic risk ANWSER model is presented to investigate the impact of how shadow banks are intermingled in a financial system on the severity of financial contagion. Particularly, the focus of this study is the impact of the following three representative topologies of an interbank loan network between shadow banks and regulated banks. 1 Random mixing network: shadow banks and regulated banks are intermingled randomly. 2 Asset-correlated mixing network: banks having bigger assets... read more »## Predicting Commuter Flows In Spatial Networks Using A Radiation Model Based On Temporal Ranges. Arxiv:1410.4849v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4849**Description:**Understanding network flows such as commuter traffic in large transportation networks is an ongoing challenge due to the complex nature of the transportation infrastructure and of human mobility. Here we show a first-principles based method for traffic prediction using a cost based generalization of the radiation model for human mobility, coupled with a cost-minimizing algorithm for efficient distribution of the mobility fluxes through the network. Using US census and highway traffic data we sho... read more »## Arabic Language Text Classification Using Dependency Syntax-based Feature Selection. Arxiv:1410.4863v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4863**Description:**We study the performance of Arabic text classification combining various techniques: a tfidf vs. dependency syntax, for feature selection and weighting; b class association rules vs. support vector machines, for classification. The Arabic text is used in two forms: rootified and lightly stemmed. The results we obtain show that lightly stemmed text leads to better performance than rootified text; that class association rules are better suited for small feature sets obtained by dependency syntax c... read more »## Olfactory Signals And Systems. Arxiv:1410.4865v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4865**Description:**Olfaction, the sense of smell, has received scant attention from a signal processing perspective in comparison to audition and vision. In this paper, we develop a signal processing paradigm for olfactory signals based on new scientific discoveries including the psychophysics concept of olfactory white. We describe a framework for predicting the perception of odorant compounds from their physicochemical features and use the prediction as a foundation for several downstream processing tasks. We de... read more »## A Modality Lexicon And Its Use In Automatic Tagging. Arxiv:1410.4868v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4868**Description:**This paper describes our resource-building results for an eight-week JHU Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration SCALE-2009 on Semantically-Informed Machine Translation. Specifically, we describe the construction of a modality annotation scheme, a modality lexicon, and two automated modality taggers that were built using the lexicon and annotation scheme. Our annotation scheme is based on identifying three components of modality: a trigger, a t... read more »## Bayesian Estimation Of The Multifractality Parameter For Image Texture Using A Whittle Approximation. Arxiv:1410.4871v1 Physics.data-an

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4871**Description:**Texture characterization is a central element in many image processing applications. Multifractal analysis is a useful signal and image processing tool, yet, the accurate estimation of multifractal parameters for image texture remains a challenge. This is due in the main to the fact that current estimation procedures consist of performing linear regressions across frequency scales of the two-dimensional 2D dyadic wavelet transform, for which only a few such scales are computable for images. The ... read more »## Fast Parallel Algorithm For Enumerating All Chordless Cycles In Graphs. Arxiv:1410.4876v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4876**Description:**Finding chordless cycles is an important theoretical problem in the Graph Theory area. It also can be applied to practical problems such as discover which predators compete for the same food in ecological networks. Motivated by the problem of theoretical interest and also by its significant practical importance, we present in this paper a parallel algorithm for enumerating all the chordless cycles in undirected graphs, which was implemented in OpenCL. read more »## A Multilevel Bilinear Programming Algorithm For The Vertex Separator Problem. Arxiv:1410.4885v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4885**Description:**The Vertex Separator Problem for a graph is to find the smallest collection of vertices whose removal breaks the graph into two disconnected subsets that satisfy specified size constraints. In the paper 10.1016/j.ejor.2014.05.042, the Vertex Separator Problem was formulated as a continuous non-concave/non-convex bilinear quadratic program. In this paper, we develop a more general continuous bilinear program which incorporates vertex weights, and which applies to the coarse graphs that are genera... read more »## Delay Optimal Secrecy In Two-relay Network. Arxiv:1410.4896v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4896**Description:**We consider a two-relay network in which a source aims to communicate a confidential message to a destination while keeping the message secret from the relay nodes. In the first hop, the channels from the source to the relays are assumed to be block-fading and the channel states change arbitrarily -possibly non-stationary and non-ergodic- across blocks. When the relay feedback on the states of the source-to-relay channels is available on the source with no delay, we provide an encoding strategy ... read more »## Type-directed Compilation For Fault-tolerant Non-interference. Arxiv:1410.4917v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4917**Description:**Environmentalnoise e.g.heat,ionizedparticles,etc. causes transient faults in hardware, which lead to corruption of stored values. Mission-critical devices require such faults to be mitigated by fault-tolerance --- a combination of techniques that aim at preserving the functional behaviour of a system despite the disruptive effects of transient faults. Fault-tolerance typically has a high deployment cost -- special hardware might be required to implement it -- and provides weak statistical guaran... read more »## On The Relation Between Reliable Computation Time, Float-point Precision And The Lyapunov Exponent In Chaotic Systems. Arxiv:1410.4919v1 Nlin.cd

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4919**Description:**The relation among reliable computation time, Tc, float-point precision, K, and the Lyapunov exponent, lambda , is obtained as Tc= lnB/ lambda K+C, where B is the base of the float-point system and C is a constant dependent only on the chaotic equation. The equation shows good agreement with numerical experimental results, especially the scale factors. read more »## Finitely Unstable Theories And Computational Complexity. Arxiv:1410.4925v1 Math.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4925**Description:**The complexity class NP can be logically characterized both through existential second order logic SO exists , as proven by Fagin, and through simulating a Turing machine via the satisfiability problem of propositional logic SAT, as proven by Cook. Both theorems involve encoding a Turing machine by a formula in the corresponding logic and stating that a model of this formula exists if and only if the Turing machine halts, i.e. the formula is satisfiable iff the Turing machine accepts its input. ... read more »## Gharibi_facecard For Contacts And Easy Personal - Information Exchange. Arxiv:1410.4928v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4928**Description:**In this paper, we discuss a new contact way for exchanging personal information using mobile phones. The idea of this invention depends on allocating a special code called Gharibi Code GC for each personal mobile and creating a personal information file called Gharibi Face Card GFC , which has all specified personal data of the mobile phone user. When you request someone's GC code, the other party's phone will send you the GFC of that person. We think that this approach will facilitate the proce... read more »## Relative Alpha -entropy Minimizers Subject To Linear Statistical Constraints. Arxiv:1410.4931v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4931**Description:**We study minimization of a parametric family of relative entropies, termed relative alpha -entropies denoted mathscr I _ alpha P,Q . These arise as redundancies under mismatched compression when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the usual relative entropy Kullback-Leibler divergence . Just like relative entropy, these relative alpha -entropies behave like squared Euclidean distance an... read more »## Near-optimal Scheduler Synthesis For Ltl With Future Discounting. Arxiv:1410.4950v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4950**Description:**We study synthesis of optimal schedulers for the linear temporal logic LTL with future discounting. The logic, introduced by Almagor, Boker and Kupferman, is a quantitative variant of LTL in which an event in the far future has only discounted contribution to a truth value that is a real number in the unit interval 0,1 . The precise problem we study---it naturally arises e.g. in search for a scheduler that recovers from an internal error state as soon as possible---is the following: given a Krip... read more »## Pruned Bit-reversal Permutations: Mathematical Characterization, Fast Algorithms And Architectures. Arxiv:1410.4954v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4954**Description:**A mathematical characterization of serially-pruned permutations SPPs employed in variable-length permuters and their associated fast pruning algorithms and architectures are proposed. Permuters are used in many signal processing systems for shuffling data and in communication systems as an adjunct to coding for error correction. Typically only a small set of discrete permuter lengths are supported. Serial pruning is a simple technique to alter the length of a permutation to support a wider range... read more »## Settling The Randomized K-sever Conjecture On Some Special Metrics. Arxiv:1410.4955v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4955**Description:**In this paper, we settle the randomized k -sever conjecture for the following metric spaces: line, circle, Hierarchically well-separated tree HST , if k=2 or n=k+1 for arbitrary metric spaces. Specially, we show that there are O log k -competitive randomized k -sever algorithms for above metric spaces. For any general metric space with n points, we show that there is an O log k log n -competitive randomized k -sever algorithm. read more »## Transforming While/do/for/foreach-loops Into Recursive Methods. Arxiv:1410.4956v1 Cs.pl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4956**Description:**In software engineering, taking a good election between recursion and iteration is essential because their efficiency and maintenance are different. In fact, developers often need to transform iteration into recursion e.g., in debugging, to decompose the call graph into iterations ; thus, it is quite surprising that there does not exist a public transformation from loops to recursion that handles all kinds of loops. This article describes a transformation able to transform iterative loops into e... read more »## On Succinct Representations Of Binary Trees. Arxiv:1410.4963v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4963**Description:**We observe that a standard transformation between emph ordinal trees arbitrary rooted trees with ordered children and binary trees leads to interesting succinct binary tree representations. There are four symmetric versions of these transformations. Via these transformations we get four succinct representations of n -node binary trees that use 2n + n/ log n ^ O 1 bits and support among other operations navigation, inorder numbering, one of pre- or post-order numbering, subtree size and lowest co... read more »## The Visualization Of Change In Word Meaning Over Time Using Temporal Word Embeddings. Arxiv:1410.4966v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4966**Description:**We describe a visualization tool that can be used to view the change in meaning of words over time. The tool makes use of existing static word embedding datasets together with a timestamped n -gram corpus to create em temporal word embeddings. read more »## Pirus: A Web-based File Hosting Service With Object Oriented Logic In Cloud Computing. Arxiv:1410.4967v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4967**Description:**In this paper a new Web-based File Hosting Service with Object Oriented Logic in Cloud Computing called Pirus was developed. The service will be used by the academic community of the University of Piraeus giving users the ability to remotely store and access their personal files with no security compromises. It also offers the administrators the ability to manage users and roles. The objective was to deliver a fully operational service, using state-of-the-art programming techniques to enable sca... read more »## Aspects And Challenges Of Mashup Creator Design. Arxiv:1410.4970v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4970**Description:**With the advent of Web 2.0, an increasing number of web sites has started offering their data over the web in standard formats and exposed their functionality as APIs. A new type of applications has taken advantage of the new data and services available by mixing them, in order to generate new applications fast and efficiently, getting its name from its own architectural style: mashups. A set of applications that aims to help a user create, deploy and manage his mashups has also emerged, using v... read more »## Design Issues For Distributed Mobile Social Networks. Arxiv:1410.4972v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4972**Description:**Social networks and their applications have become extremely popular during the last years, mostly targeting users via the web. However, it has been recently observed an interest to offer social network services to mobile users. Telecom operators attempt to integrate existing social networks to their systems or develop new ones, in order to offer new services to their subscribers. Subsequently, emphasis is given to the user-context modeling, as well as to the integration of sources that leads to... read more »## Semantic Gateway As A Service Architecture For Iot Interoperability. Arxiv:1410.4977v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4977**Description:**The Internet of Things IoT is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks WSN , the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architect... read more »## Privacy Leakage In Mobile Computing: Tools, Methods, And Characteristics. Arxiv:1410.4978v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4978**Description:**The number of smartphones, tablets, sensors, and connected wearable devices are rapidly increasing. Today, in many parts of the globe, the penetration of mobile computers has overtaken the number of traditional personal computers. This trend and the always-on nature of these devices have resulted in increasing concerns over the intrusive nature of these devices and the privacy risks that they impose on users or those associated with them. In this paper, we survey the current state of the art on ... read more »## On The Relation Of Interaction Semantics To Continuations And Defunctionalization. Arxiv:1410.4980v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4980**Description:**In game semantics and related approaches to programming language semantics, programs are modelled by interaction dialogues. Such models have recently been used in the design of new compilation methods, e.g. for hardware synthesis or for programming with sublinear space. This paper relates such semantically motivated non-standard compilation methods to more standard techniques in the compilation of functional programming languages, namely continuation passing and defunctionalization. We first sho... read more »## Gaussian Process Models With Parallelization And Gpu Acceleration. Arxiv:1410.4984v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4984**Description:**In this work, we present an extension of Gaussian process GP models with sophisticated parallelization and GPU acceleration. The parallelization scheme arises naturally from the modular computational structure w.r.t. datapoints in the sparse Gaussian process formulation. Additionally, the computational bottleneck is implemented with GPU acceleration for further speed up. Combining both techniques allows applying Gaussian process models to millions of datapoints. The efficiency of our algorithm i... read more »## Evolvability Signatures Of Generative Encodings: Beyond Standard Performance Benchmarks. Arxiv:1410.4985v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4985**Description:**Evolutionary computation is a promising approach to autonomously synthesize machines with abilities that resemble those of animals, but the field suffers from a lack of strong foundations. In particular, evolutionary systems are currently assessed solely by the fitness score their evolved artifacts can achieve for a specific task, whereas such fitness-based comparisons provide limited insights about how the same system would evaluate on different tasks, and its adaptive capabilities to respond t... read more »## Code Construction And Decoding Algorithms For Semi-quantitative Group Testing With Nonuniform Thresholds. Arxiv:1410.4986v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4986**Description:**We analyze a new group testing system, termed semi-quantitative group testing, which may be viewed as a concatenation of an adder channel and a discrete quantizer. Our focus is on non-uniform quantizers with arbitrary thresholds. For a given choice of parameters for the semi-quantitative group testing model, we define three new families of sequences capturing the constraints on the code design imposed by the choice of the thresholds. The sequences represent extensions and generalizations of Bh a... read more »## Content-priority Based Interest Forwarding In Content Centric Networks. Arxiv:1410.4987v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4987**Description:**Content Centric Networking CCN is a recent advancement in communication networks where the current research is mainly focusing on routing & cache management strategies of CCN. Nonetheless, other perspectives such as network level security and service quality are also of prime importance; areas which have not been covered deeply so far. This paper introduces an interest forwarding mechanism to process the requests of consumers at a CCN router. Interest packets are forwarded with respect to th... read more »## Linearizability Is Expspace-complete. Arxiv:1410.5000v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5000**Description:**It was shown in Alur et al. 1 that the problem of verifying finite concurrent systems through Linearizability is in EXPSPACE. However, there was still a complexity gap between the easy to obtain PSPACE lower bound and the EXPSPACE upper bound. We show in this paper that Linearizability is EXPSPACE-complete. read more »## Secrecy Degrees Of Freedom Of Wireless X Networks Using Artificial Noise Alignment. Arxiv:1410.5009v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5009**Description:**The problem of transmitting confidential messages in M times K wireless X networks is considered, in which each transmitter intends to send one confidential message to every receiver. In particular, the secrecy degrees of freedom SDOF of the considered network achieved by an artificial noise alignment ANA approach, which integrates interference alignment and artificial noise transmission, are studied. At first, an SDOF upper bound is derived for the M times K X network with confidential messages... read more »## Quantifying Performance Bottlenecks Of Stencil Computations Using The Execution-cache-memory Model. Arxiv:1410.5010v1 Cs.pf

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5010**Description:**Stencil algorithms on regular lattices appear in many fields of computational science, and much effort has been put into optimized implementations. Such activities are usually not guided by performance models that provide estimates of expected speedup. Understanding the performance properties and bottlenecks by performance modeling enables a clear view on promising optimization opportunities. In this work we refine the recently developed Execution-Cache-Memory ECM model and use it to quantify th... read more »## Boolean Computation Using Self-sustaining Nonlinear Oscillators. Arxiv:1410.5016v1 Cs.et

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5016**Description:**Self-sustaining nonlinear oscillators of practically any type can function as latches and registers if Boolean logic states are represented physically as the phase of oscillatory signals. Combinational operations on such phase-encoded logic signals can be implemented using arithmetic negation and addition followed by amplitude limiting. With these, general-purpose Boolean computation using a wide variety of natural and engineered oscillators becomes possible. Such phase-encoded logic has inheren... read more »## Sparse Beamforming And User-centric Clustering For Downlink Cloud Radio Access Network. Arxiv:1410.5020v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5020**Description:**This paper considers a downlink cloud radio access network C-RAN in which all the base-stations BSs are connected to a central computing cloud via digital backhaul links with finite capacities. Each user is associated with a user-centric cluster of BSs; the central processor shares the user's data with the BSs in the cluster, which then cooperatively serve the user through joint beamforming. Under this setup, this paper investigates the user scheduling, BS clustering and beamforming design probl... read more »## Unshared Secret Key Cryptography. Arxiv:1410.5021v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5021**Description:**Current security techniques can be implemented with either secret key exchange or physical layer wiretap codes. In this work, we investigate an alternative solution for MIMO wiretap channels. Inspired by the artificial noise AN technique, we propose the unshared secret key USK cryptosystem, where the AN is redesigned as a one-time pad secret key aligned within the null space between transmitter and legitimate receiver. The proposed USK cryptosystem is a new physical layer cryptographic scheme, o... read more »## Block-sparsity-induced Adaptive Filter For Multi-clustering System Identification. Arxiv:1410.5024v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5024**Description:**In order to improve the performance of least mean square LMS -based adaptive filtering for identifying block-sparse systems, a new adaptive algorithm called block-sparse LMS BS-LMS is proposed in this paper. The basis of the proposed algorithm is to insert a penalty of block-sparsity, which is a mixed l_ 2, 0 norm of adaptive tap-weights with equal group partition sizes, into the cost function of traditional LMS algorithm. To describe a block-sparse system response, we first propose a Markov-Gau... read more »## Diffraction Patterns Of Layered Close-packed Structures From Hidden Markov Models. Arxiv:1410.5028v1 Cond-mat.mtrl-sci

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5028**Description:**We recently derived analytical expressions for the pairwise auto correlation functions CFs between modular layers MLs in close-packed structures CPSs for the wide class of stacking processes describable as hidden Markov models HMMs Riechers etal, 2014 , Acta Crystallogr. A, XX 000-000 . We now use these results to calculate diffraction patterns DPs directly from HMMs, discovering that the relationship between the HMMs and DPs is both simple and fundamental in nature. We show that in the limit of... read more »## Generalized Summation-by-parts Operators For The Second Derivative With Variable Coefficients. Arxiv:1410.5029v1 Cs.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5029**Description:**The comprehensive generalization of summation-by-parts of Del Rey Fern 'andez et al. J. Comput. Phys., 266, 2014 is extended to approximations of second derivatives with variable coefficients. This enables the construction of second-derivative operators with one or more of the following characteristics: i non-repeating interior stencil, ii nonuniform nodal distributions, and iii exclusion of one or both boundary nodes. Definitions are proposed that give rise to generalized SBP operators that res... read more »## Decidable Fragments Of Logics Based On Team Semantics. Arxiv:1410.5037v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5037**Description:**We study the complexity of variants of dependence logic defined by generalized dependency atoms. Let FOC^2 denote two-variable logic with counting, and let ESO FOC^2 be the extension of FOC^2 with existential second-order prenex quantification. We show that for any finite collection A of atoms that are definable in ESO FOC^2 , the satisfiability problem of the two-variable fragment of FO A is NEXPTIME-complete. We also study satisfiability of sentences of FO A in the Bernays-Sch "onfinkel-R... read more »## Axiomatizing Propositional Dependence Logics. Arxiv:1410.5038v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5038**Description:**We give sound and complete Hilbert-style axiomatizations for propositional dependence logic PD , modal dependence logic MDL , and extended modal dependence logic EMDL by extending existing axiomatizations for propositional logic and modal logic. In addition, we give novel labeled tableau calculi for PD, MDL, and EMDL. We prove soundness, completeness and termination for each of the labeled calculi. read more »## Success Probability Of The Babai Estimators For Box-constrained Integer Linear Models. Arxiv:1410.5040v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5040**Description:**To estimate the box-constrained integer parameter vector hbx in a linear model, a typical method is to solve a box-constrained integer least squares BILS problem. However, due to its high complexity, the box-constrained Babai integer point x^ sBB is commonly used as a suboptimal solution. First we derive formulas for the success probability P^ sBB of x^ sBB and the success probability P^ sOB of the ordinary Babai integer point x^ sOB when hbx is uniformly distributed over the constraint box. Som... read more »## Gowers Norm, Function Limits, And Parameter Estimation. Arxiv:1410.5053v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5053**Description:**Let f_i: mathbb F _p^i to 0,1 be a sequence of functions, where p is a fixed prime and mathbb F _p is the finite field of order p . The limit of the sequence can be syntactically defined using the notion of ultralimit. Inspired by the Gowers norm, we introduce a metric over limits of function sequences, and study properties of it. One application of this metric is that it provides a characterization of affine-invariant parameters of functions that are constant-query estimable. Using this charact... read more »## Prior Support Knowledge-aided Sparse Bayesian Learning With Partly Erroneous Support Information. Arxiv:1410.5055v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5055**Description:**It has been shown both experimentally and theoretically that sparse signal recovery can be significantly improved given that part of the signal's support is known emph a priori . In practice, however, such prior knowledge is usually inaccurate and contains errors. Using such knowledge may result in severe performance degradation or even recovery failure. In this paper, we study the problem of sparse signal recovery when partial but partly erroneous prior knowledge of the signal's support is avai... read more »## Abstraction Refinement For Trace Inclusion Of Data Automata. Arxiv:1410.5056v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5056**Description:**A data automaton is a finite automaton equipped with variables counters ranging over a multi-sorted data domain. The transitions of the automaton are controlled by first-order formulae, encoding guards and updates. We observe, in addition to the finite alphabet of actions, the values taken by the counters along a run of the automaton, and consider the data languages recognized by these automata. The problem addressed in this paper is the inclusion between the data languages recognized by such au... read more »## Dense 3d Face Correspondence. Arxiv:1410.5058v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5058**Description:**We present an algorithm that automatically establishes dense correspondences between a large number of 3D faces. Starting from automatically detected sparse correspondences on the convex hull of 3D faces, the algorithm triangulates existing correspondences and expands them iteratively along the triangle edges. New correspondences are established by matching keypoints on the geodesic patches along the triangle edges and the process is repeated. After exhausting keypoint matches, further correspon... read more »## Solving Parameterized Problems By Mixing Color Coding-related Techniques. Arxiv:1410.5062v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5062**Description:**We introduce a family of strategies, that we call mixing strategies, for applying color coding-related techniques, developing fast parameterized algorithms. Our strategies combine the following ideas. Mixing narrow sieves and representative sets, two independent color coding-related techniques. For certain "disjointness conditions", improving the best known computation of representative sets. Mixing divide-and-color-based preprocessing with the computation mentioned in the previous ite... read more »## Harnessing The Power Of Social Bookmarking For Improving Tag-based Recommendations. Arxiv:1410.5072v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5072**Description:**Social bookmarking and tagging has emerged a new era in user collaboration. Collaborative Tagging allows users to annotate content of their liking, which via the appropriate algorithms can render useful for the provision of product recommendations. It is the case today for tag-based algorithms to work complementary to rating-based recommendation mechanisms to predict the user liking to various products. In this paper we propose an alternative algorithm for computing personalized recommendations ... read more »## A Parallel Stochastic Approximation Method For Nonconvex Multi-agent Optimization Problems. Arxiv:1410.5076v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5076**Description:**Consider the problem of minimizing the expected value of a possibly nonconvex cost function parameterized by a random vector variable, when the expectation cannot be computed accurately e.g., because the statistics of the random variables are unknown and/or the computational complexity is prohibitive . Classical sample stochastic gradient methods for solving this problem may empirically suffer from slow convergence. In this paper, we propose for the first time a stochastic parallel Successive Co... read more »## On The Provenance Of Linked Data Statistics. Arxiv:1410.5077v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5077**Description:**As the amount of linked data published on the web grows, attempts are being made to describe and measure it. However even basic statistics about a graph, such as its size, are difficult to express in a uniform and predictable way. In order to be able to sensibly interpret a statistic it is necessary to know how it was calculate. In this paper we survey the nature of the problem and outline a strategy for addressing it. read more »## Learning Vague Concepts For The Semantic Web. Arxiv:1410.5078v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5078**Description:**Ontologies can be a powerful tool for structuring knowledge, and they are currently the subject of extensive research. Updating the contents of an ontology or improving its interoperability with other ontologies is an important but difficult process. In this paper, we focus on the presence of vague concepts, which are pervasive in natural language, within the framework of formal ontologies. We will adopt a framework in which vagueness is captured via numerical restrictions that can be automatica... read more »## Stability For Receding-horizon Stochastic Model Predictive Control With Chance Constraints. Arxiv:1410.5083v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5083**Description:**A stochastic model predictive control SMPC approach is presented for discrete-time linear systems with arbitrary time-invariant probabilistic uncertainties and additive Gaussian process noise. Closed-loop stability of the SMPC approach is established by design through appropriate selection of the cost function. Polynomial chaos is used for efficient uncertainty propagation through system dynamics. The performance of the SMPC approach is demonstrated using the Van de Vusse reactions. read more »## On The Capacity Regions Of Two-way Diamond Channels. Arxiv:1410.5085v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5085**Description:**In this paper, we study the capacity regions of two-way diamond channels. We show that for a linear deterministic model the capacity of the diamond channel in each direction can be simultaneously achieved for all values of channel parameters, where the forward and backward channel parameters are not necessarily the same. We divide the achievability scheme into three cases, depending on the forward and backward channel parameters. For the first case, we use a reverse amplify-and-forward strategy ... read more »## Propositional Reasoning About Safety And Termination Of Heap-manipulating Programs. Arxiv:1410.5088v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5088**Description:**This paper shows that it is possible to reason about the safety and termination of programs handling potentially cyclic, singly-linked lists using propositional reasoning even when the safety invariants and termination arguments depend on constraints over the lengths of lists. For this purpose, we propose the theory SLH of singly-linked lists with length, which is able to capture non-trivial interactions between shape and arithmetic. When using the theory of bit-vector arithmetic as a background... read more »## Unrestricted Termination And Non-termination Arguments For Bit-vector Programs. Arxiv:1410.5089v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5089**Description:**Proving program termination is typically done by finding a well-founded ranking function for the program states. Existing termination provers typically find ranking functions using either linear algebra or templates. As such they are often restricted to finding linear ranking functions over mathematical integers. This class of functions is insufficient for proving termination of many terminating programs, and furthermore a termination argument for a program operating on mathematical integers doe... read more »## Comparing Csi And Pca In Amalgamation With Jpeg For Spectral Image Compression. Arxiv:1410.5092v1 Cs.mm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5092**Description:**Continuing our previous research on color image compression 1 , we move towards hyper-spectral image compression. While developing a compression algorithm, information loss and processing complexity should also be considered along with the compressibility. The principle component analysis PCA can be employed to reduce the dimensions of spectral images to achieve high compressibility and performance 2 . Due to processing complexity of PCA, a simple interpolation technique called cubic spline inte... read more »## On Bootstrapping Machine Learning Performance Predictors Via Analytical Models. Arxiv:1410.5102v1 Cs.pf

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5102**Description:**Performance modeling typically relies on two antithetic methodologies: white box models, which exploit knowledge on system's internals and capture its dynamics using analytical approaches, and black box techniques, which infer relations among the input and output variables of a system based on the evidences gathered during an initial training phase. In this paper we investigate a technique, which we name Bootstrapping, which aims at reconciling these two methodologies and at compensating the con... read more »## Great: Graphlet Edge-based Network Alignment. Arxiv:1410.5103v1 Q-bio.mn

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5103**Description:**Network alignment aims to find regions of topological or functional similarities between networks. In computational biology, it can be used to transfer biological knowledge from a well-studied species to a poorly-studied species between aligned network regions. Typically, existing network aligners first compute similarities between nodes in different networks via a node cost function and then aim to find a high-scoring alignment node mapping between the networks with respect to "node conser... read more »## Improved Region-growing And Combinatorial Algorithms For K -route Cut Problems. Arxiv:1410.5105v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5105**Description:**We study the em k -route generalizations of various cut problems, the most general of which is emph k -route multicut k -MC problem, wherein we have r source-sink pairs and the goal is to delete a minimum-cost set of edges to reduce the edge-connectivity of every source-sink pair to below k . The k -route extensions of multiway cut k -MWC , and the minimum s - t cut problem k - s,t -cut , are similarly defined. We present various approximation and hardness results for these k -route cut problems... read more »## The Dof Of The Asymmetric Mimo Interference Channel With Square Direct Link Channel Matrices. Arxiv:1410.5107v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5107**Description:**This paper studies the sum Degrees of Freedom DoF of K -user em asymmetric MIMO Interference Channel IC with square direct link channel matrices, that is, the u -th transmitter and its intended receiver have M_u in mathbb N antennas each, where M_u need not be the same for all u in 1:K . Starting from a 3 -user example, it is shown that existing cooperation-based outer bounds are insufficient to characterize the DoF. Moreover, it is shown that two distinct operating regimes exist. With a it domi... read more »## Attenuating The Impact Of Integrity Attacks On Real-time Pricing In Smart Grids. Arxiv:1410.5111v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5111**Description:**The vulnerability of false data injection attacks on real-time electricity pricing for the power grid market has been recently explored. Previous work has focused on the impact caused by attackers that compromise pricing signals and send false prices to a subset of consumers. In this paper we extend previous work by considering a more powerful and general adversary model, a new analysis method based on sensitivity functions, and by proposing several countermeasures that can mitigate the negative... read more »## Stability And Continuity Of Centrality Measures In Weighted Graphs. Arxiv:1410.5119v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5119**Description:**This paper presents a formal definition of stability for node centrality measures in weighted graphs. It is shown that the commonly used measures of degree, closeness and eigenvector centrality are stable whereas betweenness centrality is not. An alternative definition of the latter that preserves the same centrality notion while satisfying the stability criteria is introduced. Continuity is presented as a less stringent alternative to stability. Betweenness centrality is shown to be not only un... read more »## Strongly Secure Quantum Ramp Secret Sharing Constructed From Algebraic Curves Over Finite Fields. Arxiv:1410.5126v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5126**Description:**The first construction of strongly secure quantum ramp secret sharing by Zhang and Matsumoto had an undesirable feature that the dimension of quantum shares must be larger than the number of shares. By using algebraic curves over finite fields, we propose a new construction in which the number of shares can become arbitrarily large for fixed dimension of shares. read more »## Simulation Based Study Of Tcp Variants In Hybrid Network. Arxiv:1410.5127v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5127**Description:**Transmission control protocol TCP was originally designed for fixed networks to provide the reliability of the data delivery. The improvement of TCP performance was also achieved with different types of networks with introduction of new TCP variants. However, there are still many factors that affect performance of TCP. Mobility is one of the major affects on TCP performance in wireless networks and MANET Mobile Ad Hoc Network . To determine the best TCP variant from mobility point of view, we si... read more »## Dynamic Cluster Head Node Election Dchne Model Over Wireless Sensor Networks Wsns . Arxiv:1410.5128v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5128**Description:**WSNs are becoming an appealing research area due to their several application domains. The performance of WSNs depends on the topology of sensors and their ability to adapt to changes in the network. Sensor nodes are often resource constrained by their limited power, less communication distance capacity, and restricted sensing capability. Therefore, they need to cooperate with each other to accomplish a specific task. Thus, clustering enables sensor nodes to communicate through the cluster head ... read more »## Fostering Of Innovative Usability Testing To Develop Mobile Application For Mobile Collaborative Learning Mcl . Arxiv:1410.5129v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5129**Description:**Emergence of latest technologies has diverted the focus of people form Computer-Supported Collaborative Learning CSCL to mobile supported collaborative learning. MCL is highly demanded in educational organizations to substantiate the pedagogical activities. Some of the MCL supportive architectures including applications are introduced in several fields to improve the activities of those organizations, but they need more concise paradigm to support both types of collaboration: synchronous and asy... read more »## An Algebra Of Reversible Computation. Arxiv:1410.5131v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5131**Description:**We design an axiomatization for reversible computation called reversible ACP RACP . It has four extendible modules, basic reversible processes algebra BRPA , algebra of reversible communicating processes ARCP , recursion and abstraction. Just like process algebra ACP in classical computing, RACP can be treated as an axiomatization foundation for reversible computation. read more »## On Iterative Hard Thresholding Methods For High-dimensional M-estimation. Arxiv:1410.5137v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5137**Description:**The use of M-estimators in generalized linear regression models in high dimensional settings requires risk minimization with hard L_0 constraints. Of the known methods, the class of projected gradient descent also known as iterative hard thresholding IHT methods is known to offer the fastest and most scalable solutions. However, the current state-of-the-art is only able to analyze these methods in extremely restrictive settings which do not hold in high dimensional statistical models. In this wo... read more »## Fixed-points Of Social Choice: An Axiomatic Approach To Network Communities. Arxiv:1410.5152v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5152**Description:**We provide the first social choice theory approach to the question of what constitutes a community in a social network. Inspired by the classic preferences models in social choice theory, we start from an abstract social network framework, called preference networks; these consist of a finite set of members where each member has a total-ranking preference of all members in the set. Within this framework, we develop two complementary approaches to axiomatically study the formation and structures ... read more »## Punctuated Equilibrium Dynamics In Human Communications. Arxiv:1410.5158v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5158**Description:**A minimal model based on individual interactions is proposed to study the non-Poisson statistical properties of human behavior: individuals in the system interact with their neighbors, the probability of an individual acting correlates to its activity, and all individuals involved in action will change their activities randomly. The model creates rich non-Poisson spatial-temporal properties in the activities of individuals, in agreement with the patterns of human communication behaviors. Our fin... read more »## Sparsity Methods For Networked Control. Arxiv:1410.5165v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5165**Description:**In this presentation, we introduce sparsity methods for networked control systems and show the effectiveness of sparse control. In networked control, efficient data transmission is important since transmission delay and error can critically deteriorate the stability and performance. We will show that this problem is solved by sparse control designed by recent sparse optimization methods. read more »## Hardness Of Peeling With Stashes. Arxiv:1410.5169v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5169**Description:**The analysis of several algorithms and data structures can be framed as a peeling process on a random hypergraph: vertices with degree less than k and their adjacent edges are removed until no vertices of degree less than k are left. Often the question is whether the remaining hypergraph, the k-core, is empty or not. In some settings, it may be possible to remove either vertices or edges from the hypergraph before peeling, at some cost. For example, in hashing applications where keys correspond ... read more »## Linguistic Analysis Of Toxic Behavior In An Online Video Game. Arxiv:1410.5185v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5185**Description:**In this paper we explore the linguistic components of toxic behavior by using crowdsourced data from over 590 thousand cases of accused toxic players in a popular match-based competition game, League of Legends. We perform a series of linguistic analyses to gain a deeper understanding of the role communication plays in the expression of toxic behavior. We characterize linguistic behavior of toxic players and compare it with that of typical players in an online competition game. We also find empi... read more »## On The Hardness Of Bribery Variants In Voting With Cp-nets. Arxiv:1410.5186v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5186**Description:**We continue previous work by Mattei et al. Mattei, N., Pini, M., Rossi, F., Venable, K.: Bribery in voting with CP-nets. Ann. of Math. and Artif. Intell. pp. 1--26 2013 in which they study the computational complexity of bribery schemes when voters have conditional preferences that are modeled by CP-nets. For most of the cases they considered, they could show that the bribery problem is solvable in polynomial time. Some cases remained open---we solve two of them and extend the previous results t... read more »## On The Compound Broadcast Channel: Multiple Description Coding And Interference Decoding. Arxiv:1410.5187v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5187**Description:**This work investigates the general two-user Compound Broadcast Channel BC where an encoder wishes to transmit common and private messages to two receivers while being oblivious to two possible channel realizations controlling the communication. The focus is on the characterization of the largest achievable rate region by resorting to more evolved encoding and decoding techniques than the conventional coding for the standard BC. The role of the decoder is first explored, and an achievable rate re... read more »## Structural Parameterizations Of The Mixed Chinese Postman Problem. Arxiv:1410.5191v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5191**Description:**In the Mixed Chinese Postman Problem MCPP , given a weighted mixed graph G G may have both edges and arcs , our aim is to find a minimum weight closed walk traversing each edge and arc at least once. The MCPP parameterized by the number of edges in G or the number of arcs in G is fixed-parameter tractable as proved by van Bevern et al. in press and Gutin, Jones and Sheng ESA 2014 , respectively. Solving an open question of van Bevern et al. in press , we show that unexpectedly the MCPP parameter... read more »## Universal Laws And Absolute Lower Bounds Of Feedback Systems: Entropy Rate Never Decreases, Generalized Bode Integral, Gaussianity-whiteness Measure, Gaussianing-whitening Control, And Beyond. Arxiv:1410.5192v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5192**Description:**This paper aims at obtaining universal laws and absolute lower bounds of feedback systems using information theory. The feedback system setup is that with causal plants and causal controllers. Three laws together with three lower bounds are obtained, which are in entropy domain, frequency domain, and time domain, respectively. Those laws and lower bounds characterize the fundamental limitations of such systems imposed by the feedback mechanism. Two new notions, negentropy rate and Gaussianity-wh... read more »## The Field Of The Reals And The Random Graph Are Not Finite-word Ordinal-automatic. Arxiv:1410.5197v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5197**Description:**Recently, Schlicht and Stephan lifted the notion of automatic-structures to the notion of finite-word ordinal-automatic structures. These are structures whose domain and relations can be represented by automata reading finite words whose shape is some fixed ordinal alpha . We lift Delhomm 'e's relative-growth-technique from the automatic and tree-automatic setting to the ordinal-automatic setting. This result implies that the random graph is not ordinal-automatic and infinite integral domains ar... read more »## Finding Near-optimal Solutions In Multi-robot Path Planning. Arxiv:1410.5200v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5200**Description:**We deal with the problem of planning collision-free trajectories for robots operating in a shared space. Given the start and destination position for each of the robots, the task is to find trajectories for all robots that reach their destinations with minimum total cost such that the robots will not collide when following the found trajectories. Our approach starts from individually optimal trajectory for each robot, which are then penalized for being in collision with other robots. The penalty... read more »## Frames For Subspaces Of Mathbb C ^n . Arxiv:1410.5206v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5206**Description:**We present a theory of finite frames for subspaces of mathbb C ^N . The definition of a subspace frame is given and results analogous to those from frame theory for mathbb C ^N are proven. read more »## Distributed Methods For High-dimensional And Large-scale Tensor Factorization. Arxiv:1410.5209v1 Cs.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5209**Description:**Given a high-dimensional and large-scale tensor, how can we decompose it into latent factors Can we process it on commodity computers with limited memory These questions are closely related to recommendation systems exploiting context information such as time and location. They require tensor factorization methods scalable with both the dimension and size of a tensor. In this paper, we propose two distributed tensor factorization methods, SALS and CDTF. Both methods are scalable with all aspects... read more »## Interactive Error Correction In Implicative Theories. Arxiv:1410.5215v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5215**Description:**Errors in implicative theories coming from binary data are studied. First, two classes of errors that may affect implicative theories are singled out. Two approaches for finding errors of these classes are proposed, both of them based on methods of Formal Concept Analysis. The first approach uses the cardinality minimal canonical or Duquenne-Guigues implication base. The construction of such a base is computationally intractable. Using an alternative approach one checks possible errors on the fl... read more »## Supervised Mid-level Features For Word Image Representation. Arxiv:1410.5224v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5224**Description:**This paper deals with the problem of learning word image representations: given the image of a word, we are interested in finding a descriptive and robust, fixed-length representation. Machine learning techniques can then be used on top of these representations to produce models useful for word retrieval or recognition tasks. Although many works have focused on the machine learning aspect once a global representation has been produced, little work has been devoted to the construction of those ba... read more »## Energy-spectral Efficiency Trade-off For A Massive Su-mimo System With Transceiver Power Consumption. Arxiv:1410.5240v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5240**Description:**We consider a single user SU massive MIMO system with multiple antennas at the transmitter base station and a single antenna at the user terminal UT . Taking transceiver power consumption into consideration, for a given spectral efficiency SE we maximize the energy efficiency EE as a function of the number of base station BS antennas M , resulting in a closed-form expression for the optimal SE-EE trade-off. It is observed that in contrast to the classical SE-EE trade-off which considers only the... read more »## Performance Engineering Of The Kernel Polynomial Method On Large-scale Cpu-gpu Systems. Arxiv:1410.5242v1 Cs.ce

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5242**Description:**The Kernel Polynomial Method KPM is a well-established scheme in quantum physics and quantum chemistry to determine the eigenvalue density and spectral properties of large sparse matrices. In this work we demonstrate the high optimization potential and feasibility of peta-scale heterogeneous CPU-GPU implementations of the KPM. At the node level we show that it is possible to decouple the sparse matrix problem posed by KPM from main memory bandwidth both on CPU and GPU. To alleviate the effects o... read more »## On Content-centric Wireless Delivery Networks. Arxiv:1410.5257v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5257**Description:**The flux of social media and the convenience of mobile connectivity has created a mobile data phenomenon that is expected to overwhelm the mobile cellular networks in the foreseeable future. Despite the advent of 4G/LTE, the growth rate of wireless data has far exceeded the capacity increase of the mobile networks. A fundamentally new design paradigm is required to tackle the ever-growing wireless data challenge. In this article, we investigate the problem of massive content delivery over wirele... read more »## Building Pattern Recognition Applications With The Spare Library. Arxiv:1410.5263v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5263**Description:**This paper presents the SPARE C++ library, an open source software tool conceived to build generic pattern recognition and soft computing systems. The library follows the requirement of the generality: most of the implemented algorithms are able to process user-defined input data types transparently, such as labeled graphs and generalized sequences, as well as standard feature vectors. We give just a high-level picture of the SPARE library characteristics, focusing instead on the specific practi... read more »## Computationally -efficient Algorithms For Multiuser Detection In Short Code Wideband Cdma Tdd Systems. Arxiv:1410.5288v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5288**Description:**Paper derives and analyzes a novel block Fast Fourier Transform FFT based joint detection algorithm. The paper compares the performance and complexity of the novel block-FFT based joint detector to that of the Cholesky based joint detector and single user detection algorithms. The novel algorithm can operate at chip rate sampling, as well as higher sampling rates, unlike existing algorithms. For the performance/complexity analysis, the time division duplex TDD mode of a wideband code division mu... read more »## Optimized Disk Layouts For Adaptive Storage Of Interaction Graphs. Arxiv:1410.5290v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5290**Description:**We are living in an ever more connected world, where data recording the interactions between people, software systems, and the physical world is becoming increasingly prevalent. This data often takes the form of a temporally evolving graph, where entities are the vertices and the interactions between them are the edges. We call such graphs interaction graphs. Various application domains, including telecommunications, transportation, and social media, depend on analytics performed on interaction ... read more »## A Polynomial Time Algorithm For The Conjugacy Decision And Search Problems In Free Abelian-by-infinite Cyclic Groups. Arxiv:1410.5297v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5297**Description:**In this paper we introduce a polynomial time algorithm that solves both the conjugacy decision and search problems in free abelian-by-infinite cyclic groups where the input is elements in normal form. We do this by adapting the work of Bogopolski, Martino, Maslakova, and Ventura in cite bogopolski2006conjugacy and Bogopolski, Martino, and Ventura in cite bogopolski2010orbit , to free abelian-by-infinite cyclic groups, and in certain cases apply a polynomial time algorithm for the orbit problem o... read more »## Updating And Downdating Techniques For Optimizing Network Communicability. Arxiv:1410.5303v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5303**Description:**The total communicability of a network or graph is defined as the sum of the entries in the exponential of the adjacency matrix of the network, possibly normalized by the number of nodes. This quantity offers a good measure of how easily information spreads across the network, and can be useful in the design of networks having certain desirable properties. The total communicability can be computed quickly even for large networks using techniques based on the Lanczos algorithm. In this work we in... read more »## Full Duplex Networking: Mission Impossible . Arxiv:1410.5326v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5326**Description:**Mobile traffic is projected to increase 1000 times from 2010 to 2020. This poses significant challenges on the 5th generation 5G wireless communication system design, including network structure, air interface, key transmission schemes, multiple access, and duplexing schemes. In this paper, full duplex networking issues are discussed, aiming to provide some insights on the design and possible future deployment for 5G. Particularly, the interference scenarios in full duplex are analyzed, followed... read more »## Naive Bayes And Text Classification I - Introduction And Theory. Arxiv:1410.5329v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5329**Description:**Naive Bayes classifiers, a family of classifiers that are based on the popular Bayes' probability theorem, are known for creating simple yet well performing models, especially in the fields of document classification and disease prediction. In this article, we will look at the main concepts of naive Bayes classification in the context of document categorization. read more »## An Overview Of General Performance Metrics Of Binary Classifier Systems. Arxiv:1410.5330v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5330**Description:**This document provides a brief overview of different metrics and terminology that is used to measure the performance of binary classification systems. read more »## Spatially Correlated Channel Estimation Based On Block Iterative Support Detection For Large-scale Mimo. Arxiv:1410.5331v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5331**Description:**Downlink channel estimation with low pilot overhead is an important and challenging problem in large-scale MIMO systems due to the substantially increased MIMO channel dimension. In this letter, we propose a block iterative support detection block-ISD based algorithm for downlink channel estimation to reduce the pilot overhead, which is achieved by fully exploiting the block sparsity inherent in the block-sparse equivalent channel derived from the spatial correlations of MIMO channels. Furthermo... read more »## Classes Of Delay-independent Multimessage Multicast Networks Under The Generalized Model. Arxiv:1410.5343v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5343**Description:**In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot . A node is said to incur no delay if its received symbol obtained in a time slot is available for encoding its transmitted symbol sent in the same time slot. Under the classical model, the... read more »## 3d Printing: Developing Countries Perspectives. Arxiv:1410.5349v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5349**Description:**For the past decade, 3D printing 3DP has become popular due to availability of low-cost 3D printers such as RepRap and Fab Home; and better software, which offers a broad range of manufacturing platform that enables users to create customizable products. 3DP offers everybody with the power to convert a digital design into a three dimensional physical object. While the application of 3DP in developing countries is still at an early stage, the technology application promises vast solutions to exis... read more »## Minimisation Of Multiplicity Tree Automata. Arxiv:1410.5352v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5352**Description:**We consider the problem of minimising the number of states in a multiplicity tree automaton over the field of rational numbers. We give a minimisation algorithm that runs in polynomial time assuming unit-cost arithmetic. We also show that a polynomial bound in the standard Turing model would require a breakthrough in the complexity of polynomial identity testing by proving that the latter problem is logspace equivalent to the decision version of minimisation. The developed techniques also improv... read more »## On The Influence Of Graph Density On Randomized Gossiping. Arxiv:1410.5355v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5355**Description:**Information dissemination is a fundamental problem in parallel and distributed computing. In its simplest variant, the broadcasting problem, a message has to be spread among all nodes of a graph. A prominent communication protocol for this problem is based on the random phone call model Karp et al., FOCS 2000 . In each step, every node opens a communication channel to a randomly chosen neighbor for bi-directional communication. Motivated by replicated databases and peer-to-peer networks, Berenbr... read more »## Remote Sensing Image Classification Exploiting Multiple Kernel Learning. Arxiv:1410.5358v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5358**Description:**We propose a strategy for land use classification which exploits Multiple Kernel Learning MKL to automatically determine a suitable combination of a set of features without requiring any heuristic knowledge about the classification task. Standard MKL requires many training examples, otherwise the learned classifier fails to generalize to unseen data. In this paper we present a novel procedure that allows MKL to achieve good performance in the case of small training sets as well. Experimental res... read more »## Tropical Spectral Theory Of Tensors. Arxiv:1410.5361v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5361**Description:**We introduce and study tropical eigenpairs of tensors, a generalization of the tropical spectral theory of matrices. We show the existence and uniqueness of an eigenvalue. We associate to a tensor a directed hypergraph and define a new type of cycle on a hypergraph, which we call an H-cycle. The eigenvalue of a tensor turns out to be equal to the minimal normalized weighted length of H-cycles of the associated hypergraph. We show that the eigenvalue can be computed efficiently via a linear progr... read more »## Proof Complexity Modulo The Polynomial Hierarchy: Understanding Alternation As A Source Of Hardness. Arxiv:1410.5369v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5369**Description:**We present and study a framework in which one can present alternation-based lower bounds on proof length in proof systems for quantified Boolean formulas. A key notion in this framework is that of proof system ensemble, which is essentially a sequence of proof systems where, for each, proof checking can be performed in the polynomial hierarchy. We introduce a proof system ensemble called relaxing QU-res which is based on the established proof system QU-resolution. Our main results include an exp... read more »## Type Targeted Testing. Arxiv:1410.5370v1 Cs.pl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5370**Description:**We present a new technique called type targeted testing, which translates precise refinement types into comprehensive test-suites. The key insight behind our approach is that through the lens of SMT solvers, refinement types can also be viewed as a high-level, declarative, test generation technique, wherein types are converted to SMT queries whose models can be decoded into concrete program inputs. Our approach enables the systematic and exhaustive testing of implementations from high-level decl... read more »## Poisson Group Testing: A Probabilistic Model For Boolean Compressed Sensing. Arxiv:1410.5373v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5373**Description:**We introduce a novel probabilistic group testing framework, termed Poisson group testing, in which the number of defectives follows a right-truncated Poisson distribution. The Poisson model applies to a number of testing scenarios, where the subjects are assumed to be ordered based on their arrival times and where the probability of being defective decreases with time. For this model, we consider nonadaptive and semi-adaptive methods to identify the defectives. For the nonadaptive methods, we fi... read more »## Temporal Logic Control For Stochastic Linear Systems Using Abstraction Refinement Of Probabilistic Games. Arxiv:1410.5387v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5387**Description:**We consider the problem of computing the set of initial states of a dynamical system such that there exists a control strategy to ensure that the trajectories satisfy a temporal logic specification with probability 1 almost-surely . We focus on discrete-time, stochastic linear dynamics and specifications given as formulas of the Generalized Reactivity 1 fragment of Linear Temporal Logic over linear predicates in the states of the system. We propose a solution based on iterative abstraction-refin... read more »## Scalable Parallel Factorizations Of Sdd Matrices And Efficient Sampling For Gaussian Graphical Models. Arxiv:1410.5392v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5392**Description:**Motivated by a sampling problem basic to computational statistical inference, we develop a nearly optimal algorithm for a fundamental problem in spectral graph theory and numerical analysis. Given an n times n SDDM matrix bf mathbf M , and a constant -1 leq p leq 1 , our algorithm gives efficient access to a sparse n times n linear operator tilde mathbf C such that mathbf M ^ p approx tilde mathbf C tilde mathbf C ^ top. The solution is based on factoring bf mathbf M into a product of simple and... read more »## Neural Turing Machines. Arxiv:1410.5401v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5401**Description:**We extend the capabilities of neural networks by coupling them to external memory resources, which they can interact with by attentional processes. The combined system is analogous to a Turing Machine or Von Neumann architecture but is differentiable end-to-end, allowing it to be efficiently trained with gradient descent. Preliminary results demonstrate that Neural Turing Machines can infer simple algorithms such as copying, sorting, and associative recall from input and output examples. read more »## An Improved Scheme For Asymmetric Lsh. Arxiv:1410.5410v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5410**Description:**A recent technical report developed a provably sublinear time algorithm for approximate emph Maximum Inner Product Search MIPS , by observing that inner products, after independent asymmetric transformations, can be converted into the problem of approximate near neighbor search in terms of the L_2 distance. We name the particular ALSH scheme in cite Report:ALSH_arXiv14 as em L2-ALSH . In this study, we present another asymmetric transformation scheme which converts the problem of maximum inner p... read more »## Codes Over Quaternion Integers With Respect To Lipschitz Metric. Arxiv:0905.4160v5 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/0905.4160**Description:**I want to withdraw this paper. read more »## The Macwilliams Theorem For Four-dimensional Modulo Metrics. Arxiv:0912.5009v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/0912.5009**Description:**In this paper, the MacWilliams theorem is stated for codes over finite field with four-dimensional modulo metrics. read more »## Discrete Dynamical Genetic Programming In Xcs. Arxiv:1204.4200v2 Cs.ai Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1204.4200**Description:**A number of representation schemes have been presented for use within Learning Classifier Systems, ranging from binary encodings to neural networks. This paper presents results from an investigation into using a discrete dynamical system representation within the XCS Learning Classifier System. In particular, asynchronous random Boolean networks are used to represent the traditional condition-action production system rules. It is shown possible to use self-adaptive, open-ended evolution to desig... read more »## Secure Compute-and-forward In A Bidirectional Relay. Arxiv:1206.3392v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1206.3392**Description:**We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple access MAC channel, and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the probl... read more »## Graph Products Revisited: Tight Approximation Hardness Of Induced Matching, Poset Dimension And More. Arxiv:1212.4129v2 Cs.dm Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1212.4129**Description:**Graph product is a fundamental tool with rich applications in both graph theory and theoretical computer science. It is usually studied in the form f G H where G and H are graphs, is a graph product and f is a graph property. For example, if f is the independence number and is the disjunctive product, then the product is known to be multiplicative: f G H =f G f H . In this paper, we study graph products in the following non-standard form: f G oplus H J where G , H and J are graphs, oplus and are... read more »## Inequality And Network Formation Games. Arxiv:1303.1434v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1303.1434**Description:**This paper addresses the matter of inequality in network formation games. We employ a quantity that we are calling the Nash Inequality Ratio NIR , defined as the maximal ratio between the highest and lowest costs incurred to individual agents in a Nash equilibrium strategy, to characterize the extent to which inequality is possible in equilibrium. We give tight upper bounds on the NIR for the network formation games of Fabrikant et al. PODC '03 and Ehsani et al. SPAA '11 . With respect to the re... read more »## Bandits With Knapsacks. Arxiv:1305.2545v4 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1305.2545**Description:**Multi-armed bandit problems are the predominant theoretical model of exploration-exploitation tradeoffs in learning, and they have countless applications ranging from medical trials, to communication networks, to Web search and advertising. In many of these application domains the learner may be constrained by one or more supply or budget limits, in addition to the customary limitation on the time horizon. The literature lacks a general model encompassing these sorts of problems. We introduce su... read more »## Anticipatory Mobile Computing: A Survey Of The State Of The Art And Research Challenges. Arxiv:1306.2356v4 Cs.hc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1306.2356**Description:**Today's mobile phones are far from mere communication devices they were ten years ago. Equipped with sophisticated sensors and advanced computing hardware, phones can be used to infer users' location, activity, social setting and more. As devices become increasingly intelligent, their capabilities evolve beyond inferring context to predicting it, and then reasoning and acting upon the predicted context. This article provides an overview of the current state of the art in mobile sensing and conte... read more »## Mixed Noisy Network Coding And Cooperative Unicasting In Wireless Networks. Arxiv:1307.0991v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1307.0991**Description:**The problem of communicating a single message to a destination in presence of multiple relay nodes, referred to as cooperative unicast network, is considered. First, we introduce "Mixed Noisy Network Coding" MNNC scheme which generalizes "Noisy Network Coding" NNC where relays are allowed to decode-and-forward DF messages while all of them without exception transmit noisy descriptions of their observations. These descriptions are exploited at the destination and the DF relays... read more »## Director Field Model Of The Primary Visual Cortex For Contour Detection. Arxiv:1310.1341v2 Q-bio.nc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.1341**Description:**We aim to build the simplest possible model capable of detecting long, noisy contours in a cluttered visual scene. For this, we model the neural dynamics in the primate primary visual cortex in terms of a continuous director field that describes the average rate and the average orientational preference of active neurons at a particular point in the cortex. We then use a linear-nonlinear dynamical model with long range connectivity patterns to enforce long-range statistical context present in the... read more »## Empirical Distribution Of Equilibrium Play And Its Testing Application. Arxiv:1310.7654v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.7654**Description:**We show that in any n -player m -action normal-form game, we can obtain an approximate equilibrium by sampling any mixed-action equilibrium a small number of times. We study three types of equilibria: Nash, correlated and coarse correlated. For each one of them we obtain upper and lower bounds on the number of samples required for the empirical distribution over the sampled action profiles to form an approximate equilibrium with probability close to one. These bounds imply that using a small num... read more »## Staying Alive: System Design For Self-sufficient Sensor Networks. Arxiv:1310.7717v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.7717**Description:**Self-sustainability is a crucial step for modern sensor networks. Here, we offer an original and comprehensive framework for autonomous sensor networks powered by renewable energy sources. We decompose our design into two nested optimization steps: the inner step characterizes the optimal network operating point subject to an average energy consumption constraint, while the outer step provides online energy management policies making the system energetically self-sufficient in the presence of un... read more »## Privacy-preserving Verifiable Incentive Mechanism For Crowdsourcing Market Applications. Arxiv:1311.6230v7 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.6230**Description:**Recently, a novel class of incentive mechanisms is proposed to attract extensive users to truthfully participate in crowd sensing applications with a given budget constraint. The class mechanisms also bring good service quality for the requesters in crowd sensing applications. Although it is so important, there still exists many verification and privacy challenges, including users' bids and subtask information privacy and identification privacy, winners' set privacy of the platform, and the secu... read more »## Note On The Number Of Edges In Families With Linear Union-complexity. Arxiv:1312.1678v3 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.1678**Description:**We give a simple argument showing that the number of edges in the intersection graph G of a family of n sets in the plane with a linear union-complexity is O omega G n . In particular, we prove chi G leq text col G < 19 omega G for intersection graph G of a family of pseudo-discs, which improves a previous bound. read more »## Generalized Approximate Message Passing For Cosparse Analysis Compressive Sensing. Arxiv:1312.3968v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.3968**Description:**In cosparse analysis compressive sensing CS , one seeks to estimate a non-sparse signal vector from noisy sub-Nyquist linear measurements by exploiting the knowledge that a given linear transform of the signal is cosparse, i.e., has sufficiently many zeros. We propose a novel approach to cosparse analysis CS based on the generalized approximate message passing GAMP algorithm. Unlike other AMP-based approaches to this problem, ours works with a wide range of analysis operators and regularizers. I... read more »## A Leapfrog Strategy For Pursuit-evasion In A Polygonal Environment. Arxiv:1401.2960v2 Cs.cg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.2960**Description:**We study pursuit-evasion in a polygonal environment with polygonal obstacles. In this turn based game, an evader e is chased by pursuers p_1, p_2, ..., p_ ell . The players have full information about the environment and the location of the other players. The pursuers are allowed to coordinate their actions. On the pursuer turn, each p_i can move to any point at distance at most 1 from his current location. On the evader turn, he moves similarly. The pursuers win if some pursuer becomes co-locat... read more »## Coverage And Rate Analysis For Millimeter Wave Cellular Networks. Arxiv:1402.6430v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1402.6430**Description:**Millimeter wave mmWave holds promise as a carrier frequency for fifth generation cellular networks. Because mmWave signals are sensitive to blockage, prior models for cellular networks operated in the ultra high frequency UHF band do not apply to analyze mmWave cellular networks directly. Leveraging concepts from stochastic geometry, this paper proposes a general framework to evaluate the coverage and rate performance in mmWave cellular networks. Using a distance-dependent line-of-site LOS proba... read more »## A Family Of Polycyclic Groups Over Which The Uniform Conjugacy Problem Is Np-complete. Arxiv:1403.4153v3 Math.gr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.4153**Description:**In this paper we study the conjugacy problem in polycyclic groups. Our main result is that we construct polycyclic groups G_n whose conjugacy problem is at least as hard as the subset sum problem with n indeterminates. As such, the conjugacy problem over the groups G_n is NP-complete where the parameters of the problem are taken in terms of n and the length of the elements given on input. read more »## Abstraction Of Elementary Hybrid Systems By Variable Transformation. Arxiv:1403.7022v2 Cs.sy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.7022**Description:**Elementary hybrid systems EHSs are those hybrid systems HSs containing elementary functions such as exp, ln, sin, cos, etc. EHSs are very common in practice, especially in safety-critical domains. Due to the non-polynomial expressions which lead to undecidable arithmetic, verification of EHSs is very hard. Existing approaches based on partition of state space or over-approximation of reachable sets suffer from state explosion or inflation of numerical errors. In this paper, we propose a symbolic... read more »## Existence Of Globally Attracting Solutions For One-dimensional Viscous Burgers Equation With Nonautonomous Forcing - A Computer Assisted Proof. Arxiv:1403.7170v2 Math.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.7170**Description:**We prove the existence of globally attracting solutions of the viscous Burgers equation with periodic boundary conditions on the line for some particular choices of viscosity and non-autonomous forcing. The attract- ing solution is periodic if the forcing is periodic. The method is general and can be applied to other similar partial differential equations. The proof is computer assisted. read more »## Directional Cell Discovery In Millimeter Wave Cellular Networks. Arxiv:1404.5068v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.5068**Description:**The acute disparity between increasing bandwidth demand and available spectrum, has brought millimeter wave mmW bands to the forefront of candidate solutions for the next-generation cellular networks. Highly directional transmissions are essential for cellular communication in these frequencies to compensate for high isotropic path loss. This reliance on directional beamforming, however, complicates initial cell search since the mobile and base station must jointly search over a potentially larg... read more »## Training-based Swipt: Optimal Power Splitting At The Receiver. Arxiv:1405.4623v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.4623**Description:**We consider a point-to-point system with simultaneous wireless information and power transfer SWIPT over a block fading channel. Each transmission block consists of a training phase and a data transmission phase. Pilot symbols are transmitted during the training phase for channel estimation at the receiver. To enable SWIPT, the receiver adopts a power-splitting design, such that a portion of the received signal is used for channel estimation or data detection, while the remaining is used for ene... read more »## Compressive Phase Retrieval Via Generalized Approximate Message Passing. Arxiv:1405.5618v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.5618**Description:**In phase retrieval, the goal is to recover a signal mathbf x in mathbb C ^N from the magnitudes of linear measurements mathbf Ax in mathbb C ^M . While recent theory has established that M approx 4N intensity measurements are necessary and sufficient to recover generic mathbf x , there is great interest in reducing the number of measurements through the exploitation of sparse mathbf x , which is known as compressive phase retrieval. In this work, we detail a novel, probabilistic approach to comp... read more »## Fractional Repetition And Erasure Batch Codes. Arxiv:1405.6157v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.6157**Description:**Batch codes are a family of codes that represent a distributed storage system DSS of n nodes so that any batch of t data symbols can be retrieved by reading at most one symbol from each node. Fractional repetition codes are a family of codes for DSS that enable efficient uncoded repairs of failed nodes. In this work these two families of codes are combined to obtain fractional repetition batch FRB codes which provide both uncoded repairs and parallel reads of subsets of stored symbols. In additi... read more »## Differentially Private Empirical Risk Minimization: Efficient Algorithms And Tight Error Bounds. Arxiv:1405.7085v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.7085**Description:**In this paper, we initiate a systematic investigation of differentially private algorithms for convex empirical risk minimization. Various instantiations of this problem have been studied before. We provide new algorithms and matching lower bounds for private ERM assuming only that each data point's contribution to the loss function is Lipschitz bounded and that the domain of optimization is bounded. We provide a separate set of algorithms and matching lower bounds for the setting in which the l... read more »## Feature Selection For Linear Svm With Provable Guarantees. Arxiv:1406.0167v2 Stat.ml Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.0167**Description:**We give two provably accurate feature-selection techniques for the linear SVM. The algorithms run in deterministic and randomized time respectively. Our algorithms can be used in an unsupervised or supervised setting. The supervised approach is based on sampling features from support vectors. We prove that the margin in the feature space is preserved to within epsilon -relative error of the margin in the full feature space in the worst-case. In the unsupervised setting, we also provide worst-cas... read more »## Type Theoretical Databases. Arxiv:1406.6268v3 Math.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.6268**Description:**We present a soundness theorem for a dependent type theory with context constants with respect to an indexed category of finite, abstract simplical complexes. The point of interest for computer science is that this category can be seen to represent tables in a natural way. Thus the category is a model for databases, a single mathematical structure in which all database schemas and instances of a suitable, but sufficiently general form are represented. The type theory then allows for the specific... read more »## Efficient Gluing Of Numerical Continuation And A Multiple Solution Method For Elliptic Pdes. Arxiv:1406.6900v3 Math.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.6900**Description:**Numerical continuation calculations for ordinary differential equations ODEs are, by now, an established tool for bifurcation analysis in dynamical systems theory as well as across almost all natural and engineering sciences. Although several excellent standard software packages are available for ODEs, there are - for good reasons - no standard numerical continuation toolboxes available for partial differential equations PDEs , which cover a broad range of different classes of PDEs automatically... read more »## Decision Versions Of Optimization Problems: Cardinality Constraint Lower Bound As A Cnf Horn Formula For Maximum Matching. Arxiv:1407.1403v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1403**Description:**We provide a formula for the cardinality constraint, a lower bound in the form of F ge K , in such a way that the conjunction of the BFC and the OFC explained below can be solved simultaneously. The parameter K can vary from instance to instance. We assume the availability of a successor predicate, and that the domain is ordered. To our knowledge, no polynomially solvable expression has been developed so far, even for a simple problem such as Matching. However, once such a formula is developed f... read more »## To Reach Or Not To Reach Efficient Algorithms For Total-payoff Games. Arxiv:1407.5030v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.5030**Description:**Quantitative games are two-player zero-sum games played on directed weighted graphs. We consider variants of usual payoff functions: total-payoff, mean-payoff, discounted-payoff, where we add a reachability objective, i.e., Player 1 wants to reach a target while minimising his payoff. In the mean-payoff and discounted-payoff cases, we show that reachability and classical versions of the game are inter-reducible. In the case of reachability total-payoff, we introduce an efficient value iteration ... read more »## Composing Security Protocols: From Confidentiality To Privacy. Arxiv:1407.5444v3 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.5444**Description:**Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these compositio... read more »## On The Range Of Equilibria Utilities Of A Repeated Epidemic Dissemination Game With A Mediator. Arxiv:1407.6295v3 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.6295**Description:**We consider eager-push epidemic dissemination in a complete graph. Time is divided into synchronous stages. In each stage, a source disseminates nu events. Each event is sent by the source, and forwarded by each node upon its first reception, to f nodes selected uniformly at random, where f is the fanout. We use Game Theory to study the range of f for which equilibria strategies exist, assuming that players are either rational or obedient to the protocol, and that they do not collude. We model i... read more »## Fp//linspace Computability Of Real Riemann Zeta Function In Ko-friedman Model. Arxiv:1408.2362v2 Cs.cc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2362**Description:**In the present paper, we construct an algorithm for the evaluation of real Riemann zeta function zeta s for all real s , s>1 , in polynomial time and linear space on Turing machines. The algorithms is based on a series expansion of real Riemann zeta function zeta s the series globally convergents and uses algorithms for the evaluation of real function 1+x ^h and hypergeometric series in polynomial time and linear space. The algorithms modified in an obvious way to work with the complex number... read more »## Space Complexity Of Integration Of Flinspace Computable Real Functions In Ko-friedman Model. Arxiv:1408.2364v2 Cs.cc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2364**Description:**In the present paper it is shown that real function g x = int_ 0 ^ x f t dt is a linear-space computable real function on interval 0,1 if f is a linear-space computable C^2 0,1 real function on interval 0,1 , and this result does not depend on any open question in the computational complexity theory. The time complexity of computable real functions and integration of computable real functions is considered in the context of Ko--Friedman model which is based on the notion of Cauchy functions comp... read more »## Towards Optimal Algorithms For Prediction With Expert Advice. Arxiv:1409.3040v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.3040**Description:**We study the classic problem of prediction with expert advice in the adversarial setting with a geometric stopping time. cite Cover65 gave the optimal algorithm for the case of 2 experts. In this paper, we design the optimal algorithm for the case of 3 experts. Further, we show that the optimal algorithm, in the case of 2 and 3 experts is a simple probability matching algorithm. We develop improved regret lower bounds for the multiplicative weights algorithm MWA for an arbitrary number of expert... read more »## Polynomial Template Generation Using Sum-of-squares Programming. Arxiv:1409.3941v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.3941**Description:**Template abstract domains allow to express more interesting properties than classical abstract domains. However, template generation is a challenging problem when one uses template abstract domains for program analysis. In this paper, we relate template generation with the program properties that we want to prove. We focus on one-loop programs with nested conditional branches. We formally define the notion of well-representative template basis with respect to such programs and a given property. ... read more »## Second-order Sat Solving Using Program Synthesis. Arxiv:1409.4925v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.4925**Description:**Program synthesis is the automated construction of software from a specification. While program synthesis is undecidable in general, we show that synthesising finite-state programs is NEXPTIME-complete. We then present a fully automatic, sound and complete algorithm for synthesising C programs from a specification written in C. Our approach uses a combination of bounded model checking, explicit-state model checking and genetic programming to achieve surprisingly good performance for a problem wi... read more »## On Uniform Capacitated K -median Beyond The Natural Lp Relaxation. Arxiv:1409.6739v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6739**Description:**In this paper, we study the uniform capacitated k -median problem. Obtaining a constant approximation algorithm for this problem is a notorious open problem; most previous works gave constant approximations by either violating the capacity constraints or the cardinality constraint. Notably, all these algorithms are based on the natural LP-relaxation for the problem. The LP-relaxation has unbounded integrality gap, even when we are allowed to violate the capacity constraints or the cardinality co... read more »## Expression-based Aliasing For Oo-languages. Arxiv:1409.7509v2 Cs.pl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.7509**Description:**Alias analysis has been an interesting research topic in verification and optimization of programs. The undecidability of determining whether two expressions in a program may reference to the same object is the main source of the challenges raised in alias analysis. In this paper we propose an extension of a previously introduced alias calculus based on program expressions, to the setting of unbounded program executions s.a. infinite loops and recursive calls. Moreover, we devise a corresponding... read more »## Algorithm Engineering For A Quantum Annealing Platform. Arxiv:1410.2628v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.2628**Description:**Recent advances bring within reach the viability of solving combinatorial problems using a quantum annealing algorithm implemented on a purpose-built platform that exploits quantum properties. However, the question of how to tune the algorithm for most effective use in this framework is not well understood. In this paper we describe some operational parameters that drive performance, discuss approaches for mitigating sources of error, and present experimental results from a D-Wave Two quantum an... read more »## Compute-and-forward Protocol Design Based On Improved Sphere Decoding. Arxiv:1410.4278v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4278**Description:**We consider the problem of finding the optimal coefficient vector that maximizes the computation rate at a relay in the computer-and-forward scheme. Based on the idea of sphere decoding, we propose a low-complexity method that gives the maximum rate. First, we derive an efficient algorithm to compute the Cholesky factorization by using the structure of the matrix, to transfer the problem to a shortest vector problem SVP . This algorithm gives the closed-form expression of the Cholesky factor R w... read more »## Executable Behaviour And The Pi -calculus. Arxiv:1410.4512v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4512**Description:**Reactive Turing machines extend Turing machines with a facility to model observable interactive behaviour. A behaviour is called executable if, and only if, it is behaviourally equivalent to the behaviour of a reactive Turing machine. In this paper, we study the relationship between executable behaviour and behaviour that can be defined in the pi -calculus. We establish that executable behaviour is definable in the pi -calculus up to a fine notion of behavioural equivalence that preserves all mo... read more »## Dependent Types For Pragmatics. Arxiv:1410.4639v2 Cs.cl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4639**Description:**This paper proposes the use of dependent types for pragmatic phenomena such as pronoun binding and presupposition resolution as a type-theoretic alternative to formalisms such as Discourse Representation Theory and Dynamic Semantics. read more »## Optimal Time Random Access To Grammar-compressed Strings In Small Space. Arxiv:1410.4701v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.4701**Description:**The random access problem for compressed strings is to build a data structure that efficiently supports accessing the character in position i of a string given in compressed form. Given a grammar of size n compressing a string of size N , we present a data structure using O n log_ Delta frac N n cdot Delta log n + log N bits of space that supports accessing position i in O log_ Delta N+ log log N time for any 2 leq Delta leq N that is a power of two. The query time is optimal for polynomially co... read more »

On My Site Rss Ments Trouver Un Rss Long Handle Rss Aff Porra Dude E On Rss Fox Business New Rss Quick Control Rss Red Hat Enterprise Linux 6 6 Rss Red Hat Enterprise Linux 6.6 Rss Yahoo Mail Blog Rss Gizmodo..au Rss Business Of Benefits Rss Tous Les Forums Rss Berlin Restaurants Rss Scherlund Rss Blog Khymos Org Cesar Rss Pubsub Results For Topic Rss Foxnews Magazine Rss .foxnews Rss Clawbies Ca Clawbies Rss How To Fly Rss Mellerud Rss Borlange Rss Swagbucks Rss Global Thunder Rss Screen Flicker Rss Canadian Calendar Rss Canada Calendar Rss Canada Holiday Calendar Rss Canada Holiday Rss Health Secrets Rss Health Secrets. Rss The2ne Olivier Fredon Rss Www Cannabisculture Rss Cannabis Medical Rss Www.cannabisculture. Rss Otros Rss Equity Surveillance Rss Upsidedownworld Rss Global News In Spanish Rss Personal Fin Rss Chicago Now Rss Future Sox Rss