- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Tracking An Object With Unknown Accelerations Using A Shadowing Filter. Arxiv:1502.07743v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07743**Description:**A commonly encountered problem is the tracking of a physical object, like a maneuvering ship, aircraft, land vehicle, spacecraft or animate creature carrying a wireless device. The sensor data is often limited and inaccurate observations of range or bearing. This problem is more difficult than tracking a ballistic trajectory, because an operative affects unknown and arbitrarily changing accelerations. Although stochastic methods of filtering or state estimation Kalman filters and particle filter... read more »## Distributed Diagnosability Analysis With Petri Nets. Arxiv:1502.07744v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07744**Description:**We propose a framework to distributed diagnos- ability analysis of concurrent systems modeled with Petri nets as a collection of components synchronizing on common observable transitions, where faults can occur in several components. The diagnosability analysis of the entire system is done in parallel by verifying the interaction of each component with the fault free versions of the other components. Furthermore, we use existing efficient methods and tools, in particular parallel LTL-X model che... read more »## Fast And Accurate Prediction Of Numerical Relativity Waveforms From Binary Black Hole Mergers Using Surrogate Models. Arxiv:1502.07758v1 Gr-qc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07758**Description:**Simulating a binary black hole coalescence by solving Einstein's equations is computationally expensive, requiring days to months of supercomputing time. In this paper, we construct an accurate and fast-to-evaluate surrogate model for numerical relativity NR waveforms from non-spinning binary black hole coalescences with mass ratios from 1 to 10 and durations corresponding to about 15 orbits before merger. Our surrogate, which is built using reduced order modeling techniques, is distinct from tr... read more »## Airborne Ultrasonic Tactile Display Brain-computer Interface -- A Small Robotic Arm Online Control Study. Arxiv:1502.07762v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07762**Description:**We report on an extended robot control application of a contact-less and airborne ultrasonic tactile display AUTD stimulus-based brain-computer interface BCI paradigm, which received last year The Annual BCI Research Award 2014. In the award winning human communication augmentation paradigm the six palm positions are used to evoke somatosensory brain responses, in order to define a novel contactless tactile BCI. An example application of a small robot management is also presented in which the us... read more »## Total Variation On A Tree. Arxiv:1502.07770v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07770**Description:**We consider the problem of minimizing the continuous valued total variation subject to different unary terms on trees and propose fast direct algorithms based on dynamic programming to solve these problems. We treat both the convex and the non-convex case and derive worst case complexities that are equal or better then existing methods. We show applications to total variation based 2D image processing and computer vision problems based on a Lagrangian decomposition approach. The resulting algori... read more »## Efficient Geometric-based Computation Of The String Subsequence Kernel. Arxiv:1502.07776v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07776**Description:**Kernel methods are powerful tools in machine learning. They have to be computationally efficient. In this paper, we present a novel Geometric-based approach to compute efficiently the string subsequence kernel SSK . Our main idea is that the SSK computation reduces to range query problem. We started by the construction of a match list L s,t = i,j :s_ i =t_ j where s and t are the strings to be compared; such match list contains only the required data that contribute to the result. To compute eff... read more »## The Conjugated Null Space Method Of Blind Psf Estimation And Deconvolution Optimization. Arxiv:1502.07781v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07781**Description:**We have shown that the vector of the point spread function PSF lexicographical presentation belongs to the left side conjugated null space NS of the autoregression AR matrix operator on condition the AR parameters are common for original and blurred images. The method of the PSF and inverse PSF IPSF evaluation in the basis of the NS eigenfunctions is offered. The optimization of the PSF and IPSF shape with the aim of fluctuation elimination is considered in NS spectral domain and image space dom... read more »## Generating 56-bit Passwords Using Markov Models And Charles Dickens . Arxiv:1502.07786v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07786**Description:**We describe a password generation scheme based on Markov models built from English text specifically, Charles Dickens' A Tale Of Two Cities . We show a linear-running-time bijection between random bitstrings of any desired length and generated text, ensuring that all passwords are generated with equal probability. We observe that the generated passwords appear to strike a reasonable balance between memorability and security. Using the system, we get 56-bit passwords like 'The cusay is wither &qu... read more »## Product Measure Approximation Of Symmetric Graph Properties. Arxiv:1502.07787v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07787**Description:**In the study of random structures we often face a trade-off between realism and tractability, the latter typically enabled by assuming some form of independence. In this work we initiate an effort to bridge this gap by developing tools that allow us to work with independence without assuming it. Let mathcal G _ n be the set of all graphs on n vertices and let S be an arbitrary subset of mathcal G _ n , e.g., the set of graphs with m edges. The study of random networks can be seen as the study of... read more »## Analysis Of Gradient Based Algorithm For Signal Reconstruction In The Presence Of Noise. Arxiv:1502.07788v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07788**Description:**Common problem in signal processing is reconstruction of the missing signal samples. Missing samples can occur by intentionally omitting signal coefficients to reduce memory requirements, or to speed up the transmission process. Also, noisy signal coefficients can be considered as missing ones, since they have wrong values due to the noise. The reconstruction of these coefficients is demanding task, considered within the Compressive sensing area. Signal with large number of missing samples can b... read more »## Exploiting Coplanar Clusters To Enhance 3d Localization In Wireless Sensor Networks. Arxiv:1502.07790v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07790**Description:**This thesis studies range-based WSN localization problem in 3D environments that induce coplanarity. In most real-world applications, even though the environment is 3D, the grounded sensor nodes are usually deployed on 2D planar surfaces. Examples of these surfaces include structures seen in both indoor e.g. floors, doors, walls, tables etc. and outdoor e.g. mountains, valleys, hills etc. environments. In such environments, sensor nodes typically appear as coplanar node clusters. We refer to thi... read more »## Visualizing Cartograms: Goals And Task Taxonomy. Arxiv:1502.07792v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07792**Description:**Cartograms are maps in which areas of geographic regions countries, states appear in proportion to some variable of interest population, income . Cartograms are popular visualizations for geo-referenced data that have been around for over a century. Newspapers, magazines, textbooks, blogs, and presentations frequently employ cartograms to show voting results, popularity, and in general, geographic patterns. Despite the popularity of cartograms and the large number of cartogram variants, there ar... read more »## Graph Grammars, Insertion Lie Algebras, And Quantum Field Theory. Arxiv:1502.07796v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07796**Description:**Graph grammars extend the theory of formal languages in order to model distributed parallelism in theoretical computer science. We show here that to certain classes of context-free and context-sensitive graph grammars one can associate a Lie algebra, whose structure is reminiscent of the insertion Lie algebras of quantum field theory. We also show that the Feynman graphs of quantum field theories are graph languages generated by a theory dependent graph grammar. read more »## Modelling Local Deep Convolutional Neural Network Features To Improve Fine-grained Image Classification. Arxiv:1502.07802v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07802**Description:**We propose a local modelling approach using deep convolutional neural networks CNNs for fine-grained image classification. Recently, deep CNNs trained from large datasets have considerably improved the performance of object recognition. However, to date there has been limited work using these deep CNNs as local feature extractors. This partly stems from CNNs having internal representations which are high dimensional, thereby making such representations difficult to model using stochastic models.... read more »## A Secure Cyclic Steganographic Technique For Color Images Using Randomization. Arxiv:1502.07808v1 Cs.mm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07808**Description:**Information Security is a major concern in today's modern era. Almost all the communicating bodies want the security, confidentiality and integrity of their personal data. But this security goal cannot be achieved easily when we are using an open network like Internet. Steganography provides one of the best solutions to this problem. This paper represents a new Cyclic Steganographic T echnique CST based on Least Significant Bit LSB for true color RGB images. The proposed method hides the secret ... read more »## Optimal Energy-efficient Regular Delivery Of Packets In Cyber-physical Systems. Arxiv:1502.07809v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07809**Description:**In cyber-physical systems such as in-vehicle wireless sensor networks, a large number of sensor nodes continually generate measurements that should be received by other nodes such as actuators in a regular fashion. Meanwhile, energy-efficiency is also important in wireless sensor networks. Motivated by these, we develop scheduling policies which are energy efficient and simultaneously maintain "regular" deliveries of packets. A tradeoff parameter is introduced to balance these two conf... read more »## Anonymous Hibe With Short Ciphertexts: Full Security In Prime Order Groups. Arxiv:1502.07812v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07812**Description:**Anonymous Hierarchical Identity-Based Encryption HIBE is an extension of Identity-Based Encryption IBE , and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schemes can be applicable to anonymous communication systems and public key encryption systems with keyword searching. However, previous anonymous HIBE schemes have some disadvantages that the security was proven in the weaker model, the size of ciphertexts is not short, or the construction... read more »## Minimum Message Length Estimation Of Mixtures Of Multivariate Gaussian And Von Mises-fisher Distributions. Arxiv:1502.07813v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07813**Description:**Mixture modelling involves explaining some observed evidence using a combination of probability distributions. The crux of the problem is the inference of an optimal number of mixture components and their corresponding parameters. This paper discusses unsupervised learning of mixture models using the Bayesian Minimum Message Length MML criterion. To demonstrate the effectiveness of search and inference of mixture parameters using the proposed approach, we select two key probability distributions... read more »## Puzzle Imaging: Using Large-scale Dimensionality Reduction Algorithms For Localization. Arxiv:1502.07816v1 Q-bio.nc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07816**Description:**Current high-resolution imaging techniques require an intact sample that preserves spatial relationships. We here present a novel approach, "puzzle imaging," that allows imaging a spatially scrambled sample. This technique takes many spatially disordered samples, and then pieces them back together using local properties embedded within the sample. We show that puzzle imaging can efficiently produce high-resolution images using dimensionality reduction algorithms. We demonstrate the the... read more »## Coalition Manipulations Of The Gale-shapley Algorithm. Arxiv:1502.07823v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07823**Description:**It is well-known that the Gale-Shapley algorithm is not truthful for all agents. Previous studies on this front mostly focus on blacklist manipulations by a single woman and by the set of all women. Little is known about manipulations by a coalition of women or other types of manipulations, such as manipulation by permuting preference lists. In this paper, we consider the problem of finding an equilibrium for a coalition of women aka. liars in the Gale-Shapley algorithm. We restrict attentions o... read more »## Hybrid Coding Of Visual Content And Local Image Features. Arxiv:1502.07828v1 Cs.mm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07828**Description:**Distributed visual analysis applications, such as mobile visual search or Visual Sensor Networks VSNs require the transmission of visual content on a bandwidth-limited network, from a peripheral node to a processing unit. Traditionally, a Compress-Then-Analyze approach has been pursued, in which sensing nodes acquire and encode the pixel-level representation of the visual content, that is subsequently transmitted to a sink node in order to be processed. This approach might not represent the most... read more »## File Updates Under Random/arbitrary Insertions And Deletions. Arxiv:1502.07830v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07830**Description:**A client/encoder edits a file, as modeled by an insertion-deletion InDel process. An old copy of the file is stored remotely at a data-centre/decoder, and is also available to the client. We consider the problem of throughput- and computationally-efficient communication from the client to the data-centre, to enable the server to update its copy to the newly edited file. We study two models for the source files/edit patterns: the random pre-edit sequence left-to-right random InDel RPES-LtRRID pro... read more »## Rectangular Maximum-volume Submatrices And Their Applications. Arxiv:1502.07838v1 Math.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07838**Description:**A definition of p -volume of rectangular matrices is given. We generalize the results for square maximum-volume submatrices to the case rectangular maximal-volume submatrices and provide estimates for the growth of the coefficients. Three promising applications of such submatrices are presented: recommender systems, finding maximal elements in low-rank matrices and preconditioning of overdetermined linear systems. The code is available online at url https://bitbucket.org/muxas/rect_maxvol . read more »## Dawn: Delay-aware Wi-fi Offloading And Network Selection. Arxiv:1502.07839v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07839**Description:**To accommodate the explosive growth in mobile data traffic, both mobile cellular operators and mobile users are increasingly interested in offloading the traffic from cellular networks to Wi-Fi networks. However, previously proposed offloading schemes mainly focus on reducing the cellular data usage, without paying too much attention on the quality of service QoS requirements of the applications. In this paper, we study the Wi-Fi offloading problem with delay-tolerant applications under usage-ba... read more »## The Qc Relaxation: Theoretical And Computational Results On Optimal Power Flow. Arxiv:1502.07847v1 Cs.ce

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07847**Description:**Convex relaxations of the power flow equations and, in particular, the Semi-Definite Programming SDP and Second-Order Cone SOC relaxations, have attracted significant interest in recent years. The Quadratic Convex QC relaxation is a departure from these relaxations in the sense that it imposes constraints to preserve stronger links between the voltage variables through convex envelopes of the polar representation. This paper is a systematic study of the QC relaxation for AC Optimal Power Flow wi... read more »## Inferring An Indeterminate String From A Prefix Graph. Arxiv:1502.07870v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07870**Description:**An itbf indeterminate string or, more simply, just a itbf string s x = s x 1..n on an alphabet Sigma is a sequence of nonempty subsets of Sigma . We say that s x i_1 and s x i_2 itbf match written s x i_1 match s x i_2 if and only if s x i_1 cap s x i_2 ne emptyset . A itbf feasible array is an array s y = s y 1..n of integers such that s y 1 = n and for every i in 2..n , s y i in 0..n - i + 1 . A itbf prefix table of a string s x is an array s pi = s pi 1..n of integers such that, for every i i... read more »## Is Nearly-linear The Same In Theory And Practice A Case Study With A Combinatorial Laplacian Solver. Arxiv:1502.07888v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07888**Description:**Linear system solving is one of the main workhorses in applied mathematics. Recently, theoretical computer scientists have contributed sophisticated algorithms for solving linear systems with symmetric diagonally dominant matrices a class to which Laplacian matrices belong in provably nearly-linear time. While these algorithms are highly interesting from a theoretical perspective, there are no published results how they perform in practice. With this paper we address this gap. We provide the fir... read more »## Expressiveness Of The Modal Mu-calculus On Monotone Neighborhood Structures. Arxiv:1502.07889v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07889**Description:**We characterize the expressive power of the modal mu-calculus on monotone neighborhood structures, in the style of the Janin-Walukiewicz theorem for the standard modal mu-calculus. For this purpose we consider a monadic second-order logic for monotone neighborhood structures. Our main result shows that the monotone modal mu-calculus corresponds exactly to the fragment of this second-order language that is invariant for neighborhood bisimulations. read more »## Local Translation Prediction With Global Sentence Representation. Arxiv:1502.07920v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07920**Description:**Statistical machine translation models have made great progress in improving the translation quality. However, the existing models predict the target translation with only the source- and target-side local context information. In practice, distinguishing good translations from bad ones does not only depend on the local features, but also rely on the global sentence-level information. In this paper, we explore the source-side global sentence-level features for target-side local translation predic... read more »## Data-driven Robust Receding Horizon Fault Estimation. Arxiv:1502.07926v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07926**Description:**This paper presents a data-driven receding horizon fault estimation method for additive actuator and sensor faults in unknown linear time-invariant systems, with enhanced robustness to stochastic identification errors. State-of-the-art methods construct fault estimators with identified state-space models or Markov parameters, but they do not compensate for identification errors. Motivated by this limitation, we first propose a receding horizon fault estimator parameterized by predictor Markov pa... read more »## Combinatorial Approximation Of Maximum K -vertex Cover In Bipartite Graphs Within Ratio 0.7. Arxiv:1502.07930v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07930**Description:**We propose a textit purely combinatorial algorithm for mkvc in bipartite graphs, achieving approximation ratio 0.7. The only combinatorial algorithms currently known until now for this problem are the natural greedy algorithm, that achieves ratio 0.632, and an easy 2/3 -approximation algorithm presented in cite DBLP:journals/corr/BonnetEPS14 . read more »## Document Clustering Using K-means And K-medoids. Arxiv:1502.07938v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07938**Description:**With the huge upsurge of information in day-to-days life, it has become difficult to assemble relevant information in nick of time. But people, always are in dearth of time, they need everything quick. Hence clustering was introduced to gather the relevant information in a cluster. There are several algorithms for clustering information out of which in this paper, we accomplish K-means and K-Medoids clustering algorithm and a comparison is carried out to find which algorithm is best for clusteri... read more »## Coding Local And Global Binary Visual Features Extracted From Video Sequences. Arxiv:1502.07939v1 Cs.mm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07939**Description:**Binary local features represent an effective alternative to real-valued descriptors, leading to comparable results for many visual analysis tasks, while being characterized by significantly lower computational complexity and memory requirements. When dealing with large collections, a more compact representation based on global features is often preferred, which can be obtained from local features by means of, e.g., the Bag-of-Visual-Word BoVW model. Several applications, including for example vi... read more »## Non-stochastic Best Arm Identification And Hyperparameter Optimization. Arxiv:1502.07943v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07943**Description:**Motivated by the task of hyperparameter optimization, we introduce the non-stochastic best-arm identification problem. Within the multi-armed bandit literature, the cumulative regret objective enjoys algorithms and analyses for both the non-stochastic and stochastic settings while to the best of our knowledge, the best-arm identification framework has only been considered in the stochastic setting. We introduce the non-stochastic setting under this framework, identify a known algorithm that is w... read more »## Querying Spreadsheets: An Empirical Study. Arxiv:1502.07948v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07948**Description:**One of the most important assets of any company is being able to easily access information on itself and on its business. In this line, it has been observed that this important information is often stored in one of the millions of spreadsheets created every year, due to simplicity in using and manipulating such an artifact. Unfortunately, in many cases it is quite difficult to retrieve the intended information from a spreadsheet: information is often stored in a huge unstructured matrix, with no... read more »## Delay-aware Uplink Fronthaul Allocation In Cloud Radio Access Networks. Arxiv:1502.07966v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07966**Description:**In cloud radio access networks C-RANs , the baseband units and radio units of base stations are separated, which requires high-capacity fronthaul links connecting both parts. In this paper, we consider the delay-aware fronthaul allocation problem for C-RANs. The stochastic optimization problem is formulated as an infinite horizon average cost Markov decision process. To deal with the curse of dimensionality, we derive a closed-form approximate priority function and the associated error bound usi... read more »## A Simple Framework On Sorting Permutations. Arxiv:1502.07971v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07971**Description:**In this paper we present a simple framework to study various distance problems of permutations, including the transposition and block-interchange distance of permutations as well as the reversal distance of signed permutations. These problems are very important in the study of the evolution of genomes. We give a general formulation for lower bounds of the transposition and block-interchange distance from which the existing lower bounds obtained by Bafna and Pevzner, and Christie can be easily de... read more »## The Fidelity Of Recovery Is Multiplicative. Arxiv:1502.07973v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07973**Description:**Fawzi and Renner arXiv:1410.0664 recently established a lower bound on the conditional quantum mutual information of tripartite quantum states rho_ ABC in terms of the fidelity of recovery, i.e. the maximal fidelity of the state rho_ ABC with a state reconstructed from its marginal rho_ BC by acting only on the C system. In this brief note we show that the fidelity of recovery is multiplicative by utilizing semi-definite programming duality. This allows us to simplify an operational proof by Bra... read more »## A Convex Feasibility Approach To Anytime Model Predictive Control. Arxiv:1502.07974v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07974**Description:**This paper proposes to decouple performance optimization and enforcement of asymptotic convergence in Model Predictive Control MPC so that convergence to a given terminal set is achieved independently of how much performance is optimized at each sampling step. By embedding an explicit decreasing condition in the MPC constraints and thanks to a novel and very easy-to-implement convex feasibility solver proposed in the paper, it is possible to run an outer performance optimization algorithm on top... read more »## Error-correcting Factorization. Arxiv:1502.07976v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07976**Description:**Error Correcting Output Codes ECOC is a successful technique in multi-class classification, which is a core problem in Pattern Recognition and Machine Learning. A major advantage of ECOC over other methods is that the multi- class problem is decoupled into a set of binary problems that are solved independently. However, literature defines a general error-correcting capability for ECOCs without analyzing how it distributes among classes, hindering a deeper analysis of pair-wise error-correction. ... read more »## R 'enyi Generalizations Of Quantum Information Measures. Arxiv:1502.07977v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07977**Description:**Quantum information measures such as the entropy and the mutual information find applications in physics, e.g., as correlation measures. Generalizing such measures based on the R 'enyi entropies is expected to enhance their scope in applications. We prescribe R 'enyi generalizations for any quantum information measure which consists of a linear combination of von Neumann entropies with coefficients chosen from the set -1,0,1 . As examples, we describe R 'enyi generalizations of the conditional q... read more »## Topological Properties And Temporal Dynamics Of Place Networks In Urban Environments. Arxiv:1502.07979v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07979**Description:**Understanding the spatial networks formed by the trajectories of mobile users can be beneficial to applications ranging from epidemiology to local search in modern mobile applications. Despite the potential for impact in a number of fields, several aspects of human mobility networks remain largely unexplored due to the lack of large-scale data at a fine spatiotemporal resolution. Using a longitudinal dataset from the location-based service Foursquare, we perform an empirical analysis on the grow... read more »## The Lamplighter Group Mathbb Z _3 Wr Mathbb Z Generated By A Bireversible Automaton. Arxiv:1502.07981v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07981**Description:**We construct a bireversible self-dual automaton with 3 states over an alphabet with 3 letters which generates the lamplighter group mathbb Z _3 wr mathbb Z . read more »## Infinigons Of The Hyperbolic Plane And Grossone. Arxiv:1502.07990v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07990**Description:**In this paper, we study the contribution of the theory of grossone to the study of infinigons in the hyperbolic plane. We can see that the theory of grossone can help us to obtain much more classification for these objects than in the traditional setting. read more »## Secret Image Sharing Based Cts With Cheating Detection. Arxiv:1502.07993v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07993**Description:**Cheque Truncation System CTS is an automatic cheque clearance system implemented by RBI.CTS uses cheque image, instead of the physical cheque itself, for cheque clearance thus reducing the turn around time drastically. This approach holds back the physical movement of cheque from presenting bank to the drawee bank. In CTS, digital image of the cheque is protected using standard public key and symmetric key encryptions like RSA, triple DES etc. This involves a lot of computation overhead and key ... read more »## An Effective Private Data Storage And Retrieval System Using Secret Sharing Scheme Based On Secure Multi-party Computation. Arxiv:1502.07994v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07994**Description:**Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable information is a major privacy concern.On-line public databases and resources pose a significant risk to user privacy, since a malicious database owner may monitor user queries and infer useful information about the customer.The challenge in data privacy... read more »## Sparse Time-frequency Representation For Signals With Fast Varying Instantaneous Frequency. Arxiv:1502.07996v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07996**Description:**Time-frequency distributions have been used to provide high resolution representation in a large number of signal processing applications. However, high resolution and accurate instantaneous frequency IF estimation usually depend on the employed distribution and complexity of signal phase function. To ensure an efficient IF tracking for various types of signals, the class of complex time distributions has been developed. These distributions facilitate analysis in the cases when standard distribu... read more »## On The Energy Complexity Of Ldpc Decoder Circuits. Arxiv:1502.07999v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07999**Description:**It is shown that in a sequence of randomly generated bipartite configurations with number of left nodes approaching infinity, the probability that a particular configuration in the sequence has a minimum bisection width proportional to the number of vertices in the configuration approaches 1 so long as a sufficient condition on the node degree distribution is satisfied. This graph theory result implies an almost sure Omega left n^ 2 right scaling rule for the energy of capacity-approaching LDPC ... read more »## Illusory Sense Of Human Touch From A Warm And Soft Artificial Hand. Arxiv:1502.08003v1 Physics.med-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08003**Description:**To touch and be touched are vital to human development, well being, and relationships. However, to those who have lost their arms and hands due to accident or war, touching becomes a serious concern that often leads to psychosocial issues and social stigma. In this paper, we demonstrate that the touch from a warm and soft rubber hand can be perceived by another person as if the touch were coming from a human hand. We describe a three step process toward this goal. First, we made participants sel... read more »## Optimizing A Certified Proof Checker For A Large-scale Computer-generated Proof. Arxiv:1502.08008v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08008**Description:**In recent work, we formalized the theory of optimal-size sorting networks with the goal of extracting a verified checker for the large-scale computer-generated proof that 25 comparisons are optimal when sorting 9 inputs, which required more than a decade of CPU time and produced 27 GB of proof witnesses. The checker uses an untrusted oracle based on these witnesses and is able to verify the smaller case of 8 inputs within a couple of days, but it did not scale to the full proof for 9 inputs. In ... read more »## Second-order Quantile Methods For Experts And Combinatorial Games. Arxiv:1502.08009v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08009**Description:**We aim to design strategies for sequential decision making that adjust to the difficulty of the learning problem. We study this question both in the setting of prediction with expert advice, and for more general combinatorial decision tasks. We are not satisfied with just guaranteeing minimax regret rates, but we want our algorithms to perform significantly better on easy data. Two popular ways to formalize such adaptivity are second-order regret bounds and quantile bounds. The underlying notion... read more »## Tropical Differential Equations. Arxiv:1502.08010v1 Cs.sc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08010**Description:**Tropical differential equations are introduced and an algorithm is designed which tests solvability of a system of tropical linear differential equations within the complexity polynomial in the size of the system and in its coefficients. Moreover, we show that there exists a minimal solution, and the algorithm constructs it in case of solvability . This extends a similar complexity bound established for tropical linear systems. In case of tropical linear differential systems in one variable a po... read more »## Localization Theorems For Eigenvalues Of Quaternionic Matrices. Arxiv:1502.08014v1 Math.ra

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08014**Description:**Ostrowski type and the corrected version of the Brauer type theorems are derived for the left eigenvalues of quaternionic matrix. Some distribution theorems are given in terms of ovals of Cassini that are sharper than the Ostrowski type theorems, respectively, for left and right eigenvalues of quaternionic matrix. In addition, generalizations of the Gerschgorin type theorems are discussed for both the left and right eigenvalues of quater- nionic matrix, and finally, we show that our framework is... read more »## Video Description Generation Incorporating Spatio-temporal Features And A Soft-attention Mechanism. Arxiv:1502.08029v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08029**Description:**Recent progress in using recurrent neural networks RNNs for image description has motivated us to explore the application of RNNs to video description. Recent work has also suggested that attention mechanisms may be able to increase performance. To this end, we apply a long short-term memory LSTM network in two configurations: with a recently introduced soft-attention mechanism, and without. Our results suggest two things. First, incorporating a soft-attention mechanism into the text generation ... read more »## Author Name Disambiguation By Using Deep Neural Network. Arxiv:1502.08030v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08030**Description:**Author name ambiguity decreases the quality and reliability of information retrieved from digital libraries. Existing methods have tried to solve this problem by predefining a feature set based on expert's knowledge for a specific dataset. In this paper, we propose a new approach which uses deep neural network to learn features automatically from data. Additionally, we propose the general system architecture for author name disambiguation on any dataset. In this research, we evaluate the propose... read more »## Scirecsys: A Recommendation System For Scientific Publication By Discovering Keyword Relationships. Arxiv:1502.08033v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08033**Description:**In this work, we propose a new approach for discovering various relationships among keywords over the scientific publications based on a Markov Chain model. It is an important problem since keywords are the basic elements for representing abstract objects such as documents, user profiles, topics and many things else. Our model is very effective since it combines four important factors in scientific publications: content, publicity, impact and randomness. Particularly, a recommendation system cal... read more »## Decentralized Abstractions For Feedback Interconnected Multi-agent Systems. Arxiv:1502.08037v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08037**Description:**The purpose of this report is to define abstractions for multi-agent systems under coupled constraints. In the proposed decentralized framework, we specify a finite or countable transition system for each agent which only takes into account the discrete positions of its neighbors. The dynamics of the considered systems consist of two components. An appropriate feedback law which guarantees that certain performance requirements eg. connectivity are preserved and induces the coupled constraints an... read more »## Probabilistic Zero-shot Classification With Semantic Rankings. Arxiv:1502.08039v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08039**Description:**In this paper we propose a non-metric ranking-based representation of semantic similarity that allows natural aggregation of semantic information from multiple heterogeneous sources. We apply the ranking-based representation to zero-shot learning problems, and present deterministic and probabilistic zero-shot classifiers which can be built from pre-trained classifiers without retraining. We demonstrate their the advantages on two large real-world image datasets. In particular, we show that aggre... read more »## Distanceppg: Robust Non-contact Vital Signs Monitoring Using A Camera. Arxiv:1502.08040v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08040**Description:**Vital signs such as pulse rate and breathing rate are currently measured using contact probes. But, non-contact methods for measuring vital signs are desirable both in hospital settings e.g. in NICU and for ubiquitous in-situ health tracking e.g. on mobile phone and computers with webcams . Recently, camera-based non-contact vital sign monitoring have been shown to be feasible. However, camera-based vital sign monitoring is challenging for people having darker skin tone, under low lighting condi... read more »## Image Segmentation In Liquid Argon Time Projection Chamber Detector. Arxiv:1502.08046v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08046**Description:**The Liquid Argon Time Projection Chamber LAr-TPC detectors provide excellent imaging and particle identification ability for studying neutrinos. An efficient and automatic reconstruction procedures are required to exploit potential of this imaging technology. Herein, a novel method for segmentation of images from LAr-TPC detectors is presented. The proposed approach computes a feature descriptor for each pixel in the image, which characterizes amplitude distribution in pixel and its neighbourhoo... read more »## Approximating Nearest Neighbor Distances. Arxiv:1502.08048v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08048**Description:**Several researchers proposed using non-Euclidean metrics on point sets in Euclidean space for clustering noisy data. Almost always, a distance function is desired that recognizes the closeness of the points in the same cluster, even if the Euclidean cluster diameter is large. Therefore, it is preferred to assign smaller costs to the paths that stay close to the input points. In this paper, we consider the most natural metric with this property, which we call the nearest neighbor metric. Given a ... read more »## Stochastic Dual Coordinate Ascent With Adaptive Probabilities. Arxiv:1502.08053v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.08053**Description:**This paper introduces AdaSDCA: an adaptive variant of stochastic dual coordinate ascent SDCA for solving the regularized empirical risk minimization problems. Our modification consists in allowing the method adaptively change the probability distribution over the dual variables throughout the iterative process. AdaSDCA achieves provably better complexity bound than SDCA with the best fixed probability distribution, known as importance sampling. However, it is of a theoretical character as it is ... read more »## Analytical Models For Power Networks: The Case Of The Western Us And Ercot Grids. Arxiv:1204.0165v3 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1204.0165**Description:**The topological structure of the power grid plays a key role in the reliable delivery of electricity and price settlement in the electricity market. Incorporation of new energy sources and loads into the grid over time has led to its structural and geographical expansion and can affect its stable operation. This paper presents an intuitive analytical model for the temporal evolution of large grids and uses it to understand common structural features observed in grids across America. In particula... read more »## Applicability Of Well-established Memristive Models For Simulations Of Resistive Switching Devices. Arxiv:1403.5801v2 Cs.et Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.5801**Description:**Highly accurate and predictive models of resistive switching devices are needed to enable future memory and logic design. Widely used is the memristive modeling approach considering resistive switches as dynamical systems. Here we introduce three evaluation criteria for memristor models, checking for plausibility of the I-V characteristics, the presence of a sufficiently non-linearity of the switching kinetics, and the feasibility of predicting the behavior of two anti-serially connected devices... read more »## Renyi Generalizations Of The Conditional Quantum Mutual Information. Arxiv:1403.6102v6 Quant-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.6102**Description:**The conditional quantum mutual information I A;B C of a tripartite state rho_ ABC is an information quantity which lies at the center of many problems in quantum information theory. Three of its main properties are that it is non-negative for any tripartite state, that it decreases under local operations applied to systems A and B , and that it obeys the duality relation I A;B C =I A;B D for a four-party pure state on systems ABCD . The conditional mutual information also underlies the squashed ... read more »## Identification, Location-domination And Metric Dimension On Interval And Permutation Graphs. Ii. Algorithms And Complexity. Arxiv:1405.2424v2 Cs.dm Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.2424**Description:**We consider the problems of finding optimal identifying codes, open locating-dominating sets and resolving sets denoted IDENTIFYING CODE, OPEN LOCATING-DOMINATING SET and METRIC DIMENSION of an interval or a permutation graph. In these problems, one asks to distinguish all vertices of a graph by a subset of the vertices, using either the neighbourhood within the solution set or the distances to the solution vertices. Using a general reduction for this class of problems, we prove that the decisio... read more »## Batch Informed Trees Bit : Sampling-based Optimal Planning Via The Heuristically Guided Search Of Implicit Random Geometric Graphs. Arxiv:1405.5848v6 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.5848**Description:**In this paper, we present Batch Informed Trees BIT , a planning algorithm based on unifying graph- and sampling-based planning techniques. By recognizing that a set of samples describes an implicit random geometric graph RGG , we are able to combine the efficient ordered nature of graph-based techniques, such as A , with the anytime scalability of sampling-based algorithms, such as Rapidly-exploring Random Trees RRT . BIT uses a heuristic to efficiently search a series of increasingly dense impl... read more »## Scalable Latent Tree Model And Its Application To Health Analytics. Arxiv:1406.4566v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.4566**Description:**We present an integrated approach to structure and parameter estimation in latent tree graphical models, where some nodes are hidden. Our overall approach follows a "divide-and-conquer" strategy that learns models over small groups of variables and iteratively merges into a global solution. The structure learning involves combinatorial operations such as minimum spanning tree construction and local recursive grouping; the parameter learning is based on the method of moments and on tens... read more »## Looking Before Leaping: Creating A Software Registry. Arxiv:1407.5378v2 Astro-ph.im Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.5378**Description:**What lessons can be learned from examining numerous efforts to create a repository or directory of scientist-written software for a discipline Astronomy has seen a number of efforts to build such a resource, one of which is the Astrophysics Source Code Library ASCL . The ASCL ascl.net was founded in 1999, had a period of dormancy, and was restarted in 2010. When taking over responsibility for the ASCL in 2010, the new editor sought to answer the opening question, hoping this would better inform ... read more »## Proceedings Of The First International Workshop On Fpgas For Software Programmers Fsp 2014 . Arxiv:1408.4423v2 Cs.ar Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.4423**Description:**This volume contains the papers accepted at the First International Workshop on FPGAs for Software Programmers FSP 2014 , held in Munich, Germany, September 1st, 2014. FSP 2014 was co-located with the International Conference on Field Programmable Logic and Applications FPL . read more »## Cooperation With Disagreement Correction In The Presence Of Communication Failures. Arxiv:1408.7035v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.7035**Description:**Vehicle-to-vehicle communication is a fundamental requirement in cooperative vehicular systems to achieve high performance while keeping high safety standards. Vehicles periodically exchange critical information with nearby vehicles to determine their maneuvers according to the information quality and established strategies. However, wireless communication is prone to failures. Thus, participants can be unaware that other participants have not received the information on time resulting in confli... read more »## Unsupervised Domain Adaptation By Backpropagation. Arxiv:1409.7495v2 Stat.ml Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.7495**Description:**Top-performing deep architectures are trained on massive amounts of labeled data. In the absence of labeled data for a certain task, domain adaptation often provides an attractive option given that labeled data of similar nature but from a different domain e.g. synthetic images are available. Here, we propose a new approach to domain adaptation in deep architectures that can be trained on large amount of labeled data from the source domain and large amount of unlabeled data from the target domai... read more »## A Complementary Resistive Switch-based Crossbar Array Adder. Arxiv:1410.2031v2 Cs.et Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.2031**Description:**Redox-based resistive switching devices ReRAM are an emerging class of non-volatile storage elements suited for nanoscale memory applications. In terms of logic operations, ReRAM devices were suggested to be used as programmable interconnects, large-scale look-up tables or for sequential logic operations. However, without additional selector devices these approaches are not suited for use in large scale nanocrossbar memory arrays, which is the preferred architecture for ReRAM devices due to the ... read more »## One-shot Marton Inner Bound For Classical-quantum Broadcast Channel. Arxiv:1410.3248v5 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.3248**Description:**We consider the problem of communication over a classical-quantum broadcast channel with one sender and two receivers. Generalizing the classical inner bounds shown by Marton and the recent quantum asymptotic version shown by Savov and Wilde, we obtain one-shot inner bounds in the quantum setting. Our bounds are stated in terms of smooth min and max Renyi divergences. We obtain these results using a different analysis of the random codebook argument and employ a new one-shot classical mutual cov... read more »## On The Hardness Of Bribery Variants In Voting With Cp-nets. Arxiv:1410.5186v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.5186**Description:**We continue previous work by Mattei et al. Mattei, N., Pini, M., Rossi, F., Venable, K.: Bribery in voting with CP-nets. Ann. of Math. and Artif. Intell. pp. 1--26 2013 in which they study the computational complexity of bribery schemes when voters have conditional preferences that are modeled by CP-nets. For most of the cases they considered, they could show that the bribery problem is solvable in polynomial time. Some cases remained open---we solve two of them and extend the previous results t... read more »## A Decentralized Interactive Architecture For Aerial And Ground Mobile Robots Cooperation. Arxiv:1410.8292v4 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.8292**Description:**This paper presents a novel decentralized interactive architecture for aerial and ground mobile robots cooperation. The aerial mobile robot is used to provide a global coverage during an area inspection, while the ground mobile robot is used to provide a local coverage of ground features. We include a human-in-the-loop to provide waypoints for the ground mobile robot to progress safely in the inspected area. The aerial mobile robot follows continuously the ground mobile robot in order to always ... read more »## Refined Upper Bounds On Stopping Redundancy Of Binary Linear Codes. Arxiv:1410.8753v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1410.8753**Description:**The l -th stopping redundancy rho_l mathcal C of the binary n, k, d code mathcal C , 1 le l le d , is defined as the minimum number of rows in the parity-check matrix of mathcal C , such that the smallest stopping set is of size at least l . The stopping redundancy rho mathcal C is defined as rho_d mathcal C . In this work, we improve on the probabilistic analysis of stopping redundancy, proposed by Han, Siegel and Vardy, which yields the best bounds known today. In our approach, we judiciously ... read more »## Nesta, The Nicta Energy System Test Case Archive. Arxiv:1411.0359v2 Cs.ai Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1411.0359**Description:**In recent years the power systems research community has seen an explosion of work applying operations research techniques to challenging power network optimization problems. Regardless of the application under consideration, all of these works rely on power system test cases for evaluation and validation. However, many of the well established power system test cases were developed as far back as the 1960's with the aim of testing AC power flow algorithms. It is unclear if these power flow test ... read more »## A Primer On Ipv4 Scarcity. Arxiv:1411.2649v3 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1411.2649**Description:**With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective registries. In this work we frame the fundamentals of the IPv4 address exhaustion phenomena and connected issues. We elaborate on how the current ecosystem of IPv4 address space has evolved since the standardization of IPv4, leading to the rather complex... read more »## Theano-based Large-scale Visual Recognition With Multiple Gpus. Arxiv:1412.2302v3 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.2302**Description:**In this report, we describe a Theano-based AlexNet Krizhevsky et al., 2012 implementation and its naive data parallelism on multiple GPUs. Our performance on 2 GPUs is comparable with the state-of-art Caffe library Jia et al., 2014 run on 1 GPU. To the best of our knowledge, this is the first open-source Python-based AlexNet implementation to-date. read more »## Computing Covers Using Prefix Tables. Arxiv:1412.3016v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.3016**Description:**An emph indeterminate string x = x 1..n on an alphabet Sigma is a sequence of nonempty subsets of Sigma ; x is said to be emph regular if every subset is of size one. A proper substring u of regular x is said to be a emph cover of x iff for every i in 1..n , an occurrence of u in x includes x i . The emph cover array gamma = gamma 1..n of x is an integer array such that gamma i is the longest cover of x 1..i . Fifteen years ago a complex, though nevertheless linear-time, algorithm was proposed t... read more »## Certifying And Removing Disparate Impact. Arxiv:1412.3756v2 Stat.ml Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.3756**Description:**What does it mean for an algorithm to be biased In U.S. law, unintentional bias is encoded via disparate impact, which occurs when a selection process has widely different outcomes for different groups, even as it appears to be neutral. This legal determination hinges on a definition of a protected class ethnicity, gender, religious practice and an explicit description of the process. When the process is implemented using computers, determining disparate impact and hence bias is harder. It might... read more »## Flattened Convolutional Neural Networks For Feedforward Acceleration. Arxiv:1412.5474v2 Cs.ne Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.5474**Description:**We present flattened convolutional neural networks that are designed for fast feedforward execution. The redundancy of the parameters, especially weights of the convolutional filters in convolutional neural networks has been extensively studied and different heuristics have been proposed to construct a low rank basis of the filters after training. In this work, we train flattened networks that consist of consecutive sequence of one-dimensional filters across all directions in 3D space to obtain ... read more »## Factored Representations For Regression. Arxiv:1412.6286v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6286**Description:**This paper introduces a novel regression-algorithm based on factored functions. We define the class of linear factored functions LFF and derive an applicable regularization term from a Taylor approximation of the regression-cost under sample noise. The regularization can be efficiently exploited by a greedy optimization scheme to learn factored basis functions during training. The novel algorithm performs competitively to Gaussian processes GP , but seems less susceptible to the curse of dimensi... read more »## Embedding Word Similarity With Neural Machine Translation. Arxiv:1412.6448v2 Cs.cl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6448**Description:**Neural language models learn word representations, or embeddings, that capture rich linguistic and conceptual information. Here we investigate the embeddings learned by neural machine translation models, a recently-developed class of neural language model. We show that embeddings from translation models outperform those learned by monolingual models at tasks that require knowledge of both conceptual similarity and lexical-syntactic role. We further show that these effects hold when translating f... read more »## Algorithmic Robustness For Semi-supervised Epsilon, Gamma, Tau -good Metric Learning. Arxiv:1412.6452v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6452**Description:**The importance of metrics in machine learning has attracted a growing interest for distance and similarity learning, and especially the Mahalanobis distance. However, it is worth noting that this research field lacks theoretical guarantees that can be expected on the generalization capacity of the classifier associated to a learned metric. The theoretical framework of epsilon, gamma, tau -good similarity functions has been one of the first attempts to draw a link between the properties of a simi... read more »## Fitnets: Hints For Thin Deep Nets. Arxiv:1412.6550v3 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6550**Description:**While depth tends to improve network performances, it also makes gradient-based training more difficult since deeper networks tend to be more non-linear. The recently proposed knowledge distillation approach is aimed at obtaining small and fast-to-execute models, and it has shown that a student network could imitate the soft output of a larger teacher network or ensemble of networks. In this paper, we extend this idea to allow the training of a student that is deeper and thinner than the teacher... read more »## Discovering Hidden Factors Of Variation In Deep Networks. Arxiv:1412.6583v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6583**Description:**We propose a method for learning latent representations of the factors of variation in data. By augmenting deep autoencoders with a supervised cost and an additional unsupervised cost, we create a semi-supervised model that can discover and explicitly represent factors of variation beyond those relevant for categorization. We use a novel unsupervised covariance penalty XCov to disentangle factors like handwriting style for digits and subject identity in faces. We demonstrate this on the MNIST ha... read more »## Semantic Modelling With Long-short-term Memory For Information Retrieval. Arxiv:1412.6629v3 Cs.ir Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.6629**Description:**In this paper we address the following problem in web document and information retrieval IR : How can we use long-term context information to gain better IR performance Unlike common IR methods that use bag of words representation for queries and documents, we treat them as a sequence of words and use long short term memory LSTM to capture contextual dependencies. To the best of our knowledge, this is the first time that LSTM is applied to information retrieval tasks. Unlike training traditional... read more »## Language Recognition Using Random Indexing. Arxiv:1412.7026v2 Cs.cl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.7026**Description:**Random Indexing is a simple implementation of Random Projections with a wide range of applications. It can solve a variety of problems with good accuracy without introducing much complexity. Here we use it for identifying the language of text samples. We present a novel method of generating language representation vectors using letter blocks. Further, we show that the method is easily implemented and requires little computational power and space. Experiments on a number of model parameters illus... read more »## Learning Linearly Separable Features For Speech Recognition Using Convolutional Neural Networks. Arxiv:1412.7110v5 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.7110**Description:**Automatic speech recognition systems usually rely on spectral-based features, such as MFCC of PLP. These features are extracted based on prior knowledge such as, speech perception or/and speech production. Recently, convolutional neural networks have been shown to be able to estimate phoneme conditional probabilities in a completely data-driven manner, i.e. using directly temporal raw speech signal as input. This system was shown to yield similar or better performance than HMM/ANN based system o... read more »## Deep Fried Convnets. Arxiv:1412.7149v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1412.7149**Description:**The fully connected layers of a deep convolutional neural network typically contain over 90 of the network parameters, and consume the majority of the memory required to store the network parameters. Reducing the number of parameters while preserving essentially the same predictive performance is critically important for operating deep neural networks in memory constrained environments such as GPUs or embedded devices. In this paper we show how kernel methods, in particular a single Fastfood lay... read more »## A Linear K-fold Cheeger Inequality. Arxiv:1501.01741v2 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1501.01741**Description:**Given an undirected graph G , the classical Cheeger constant, h_G , measures the optimal partition of the vertices into 2 parts with relatively few edges between them based upon the sizes of the parts. The well-known Cheeger's inequality states that 2 lambda_1 le h_G le sqrt 2 lambda_1 where lambda_1 is the minimum nontrivial eigenvalue of the normalized Laplacian matrix. Recent work has generalized the concept of the Cheeger constant when partitioning the vertices of a graph into k > 2 parts... read more »## Structure Learning And Statistical Estimation In Distribution Networks - Part I. Arxiv:1501.04131v2 Math.oc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1501.04131**Description:**Traditionally power distribution networks are either not observable or only partially observable. This complicates development and implementation of new smart grid technologies, such as those related to demand response, outage detection and management, and improved load-monitoring. In this two part paper, inspired by proliferation of metering technology, we discuss estimation problems in structurally loopy but operationally radial distribution grids from measurements, e.g. voltage data, which ar... read more »## Finding Structural Information Of Rf Power Amplifiers Using An Orthogonal Non-parametric Kernel Smoothing Estimator. Arxiv:1502.04010v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.04010**Description:**A non-parametric technique to model the behavior of power amplifiers is presented. The proposed technique relies on the principles of density estimation using the kernel method and it is suited for the application of power amplifier modeling. The proposed methodology transforms the input domain to an orthogonal memory domain. In such a domain, non-parametric static functions are discovered using the kernel estimator. These orthogonal non-parametric functions can be fitted with any desired mathem... read more »## Stakeholders, Viewpoints And Languages Of A Modelling Framework For The Design And Development Of Data-intensive Mobile Apps. Arxiv:1502.04014v2 Cs.se Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.04014**Description:**Today millions of mobile apps are downloaded and used all over the world. Guidelines and best practices on how to design and develop mobile apps are being periodically released, mainly by mobile platform vendors and researchers. They cover different concerns, and refer to different technical and non-technical stakeholders. Still, mobile applications are developed with ad-hoc development processes, and on-paper best practices. In this paper we discuss a multi-view modelling framework supporting t... read more »## Exact Tensor Completion Using T-svd. Arxiv:1502.04689v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.04689**Description:**In this paper we focus on the problem of completion of multidimensional arrays also referred to as tensors from limited sampling. Our approach is based on a recently proposed tensor-Singular Value Decomposition t-SVD 1 . Using this factorization one can derive notion of tensor rank, referred to as the tensor tubal rank, which has optimality properties similar to that of matrix rank derived from SVD. As shown in 2 some multidimensional data, such as panning video sequences exhibit low tensor tuba... read more »## Study On Sparse Representation Based Classification For Biometric Verification. Arxiv:1502.06073v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.06073**Description:**In this paper, we propose a multimodal verification system integrating face and ear based on sparse representation based classification SRC . The face and ear query samples are first encoded separately to derive sparsity-based match scores, and which are then combined with sum-rule fusion for verification. Apart from validating the encouraging performance of SRC-based multimodal verification, this paper also dedicates to provide a clear understanding about the characteristics of SRC-based biomet... read more »## Optimization-based Linear Network Coding For General Connections Of Continuous Flows. Arxiv:1502.06601v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.06601**Description:**For general connections, the problem of finding network codes and optimizing resources for those codes is intrinsically difficult and little is known about its complexity. Most of the existing solutions rely on very restricted classes of network codes in terms of the number of flows allowed to be coded together, and are not entirely distributed. In this paper, we consider a new method for constructing linear network codes for general connections of continuous flows to minimize the total cost of ... read more »## A Dictionary Approach To Ebsd Indexing. Arxiv:1502.07436v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07436**Description:**We propose a framework for indexing of grain and sub-grain structures in electron backscatter diffraction EBSD images of polycrystalline materials. The framework is based on a previously introduced physics-based forward model by Callahan and De Graef 2013 relating measured patterns to grain orientations Euler angle . The forward model is tuned to the microscope and the sample symmetry group. We discretize the domain of the forward model onto a dense grid of Euler angles and for each measured pat... read more »## The Phase Transition In Random Regular Exact Cover. Arxiv:1502.07591v2 Cs.cc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.07591**Description:**A k -uniform, d -regular instance of Exact Cover is a family of m sets F_ n,d,k = S_j subseteq 1, ldots,n , where each subset has size k and each 1 le i le n is contained in d of the S_j . It is satisfiable if there is a subset T subseteq 1, ldots,n such that T cap S_j =1 for all j . Alternately, we can consider it a d -regular instance of Positive 1-in- k SAT, i.e., a Boolean formula with m clauses and n variables where each clause contains k variables and demands that exactly one of them is tr... read more »## On The Hardness Of Classically Simulating The One Clean Qubit Model. Arxiv:1312.2496v2 Quant-ph Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.2496**Description:**Deterministic quantum computation with one quantum bit DQC1 is a model of quantum computing where the input restricted to containing a single qubit in a pure state and with all other qubits in a completely-mixed state, with only a single qubit measurement at the end of the computation E. Knill and R. Laflamme, Phys. Rev. Lett. bf81 , 5672 1998 . While it is known that DQC1 can efficiently solve several problems for which no known classical efficient algorithms exist, the question of whether DQC1... read more »## Impossibility Of Classically Simulating One-clean-qubit Computation. Arxiv:1409.6777v2 Quant-ph Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.6777**Description:**Deterministic quantum computation with one quantum bit DQC1 is a restricted model of quantum computing where the input state is the completely mixed state except for a single clean qubit, and only a single output qubit is measured at the end of the computing. It is proved that the restriction of quantum computation to the DQC1 model does not change the complexity classes NQP and SBQP. As a main consequence, it follows that the DQC1 model cannot be efficiently simulated by classical computers unl... read more »## Power Of Quantum Computing With Restricted Postselections. Arxiv:1502.00067v1 Quant-ph Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1502.00067**Description:**We consider restricted versions of rm postBQP where postselection probabilities can be efficiently calculated by classical or quantum computers. We show that such restricted rm postBQP classes are in rm AWPP subseteq rm PP = rm postBQP . This result suggests that postselecting an event with an exponentially small probability does not necessarily boost rm BQP to PP. The best upperbound of rm BQP is rm AWPP , and therefore restricted rm postBQP classes are other examples of complexity classes &quo... read more »

Live Nhl Rss Www Leonardo It Rss Sciencedaily Environment Rss 20166 Rss Turtlebay Foreignpolicy Rss Yelp Business Rss Long Island Events Rss Sciencedaily. Environment Rss People S Blog Co Rss Engineering Blog Rss Twitter Engineering Blog Rss Http Chicago Suntimes Index Html Rss Linkedin Pulse Rss Pulse Linkedin Rss Olhardigital Br Rss Google News It Rss Google News. It Rss Www.leonardo.it Rss Leonardo. It Rss Http Chicago.suntimes. Index.html Rss Http Foreignpolicy Rss Journallive Uk Rss Carzone Channel Rss Pittcon Rss Quarta Rss Contracts Finder Rss Spinning Records Rss Latest Edm News Rss Avg Internet Threats Rss Lyrics New Rss Top Security Rss Top Security Threats Rss Crosswind Rss Gore Blogs Rss Friendly Blogs Rss Paul George Rss Fifa Blog Rss Nba Blog Rss Planting Blogs Rss Dubnation Rss Top Food Rss Tree Blogs Rss