- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Tracking Dynamic Point Processes On Networks. Arxiv:1409.0031v1 Stat.ml

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0031**Description:**Cascading chains of events are a salient feature of many real-world social, biological, and financial networks. In social networks, social reciprocity accounts for retaliations in gang interactions, proxy wars in nation-state conflicts, or Internet memes shared via social media. Neuron spikes stimulate or inhibit spike activity in other neurons. Stock market shocks can trigger a contagion of volatility throughout a financial network. In these and other examples, only individual events associated... read more »## Exploring The Limits Of Static Failover Routing. Arxiv:1409.0034v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0034**Description:**Fast Reroute FRR and other forms of immediate failover have long been used to recover from certain classes of failures without invoking the network control plane. While the set of such techniques is growing, the limits of even the simplest such approach, which we call static failover routing, has not been adequately explored. We present both positive and negative results on this natural form of routing resilience, and end with an open conjecture. read more »## Computing Classic Closeness Centrality, At Scale. Arxiv:1409.0035v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0035**Description:**Closeness centrality, first considered by Bavelas 1948 , is an importance measure of a node in a network which is based on the distances from the node to all other nodes. The classic definition, proposed by Bavelas 1950 , Beauchamp 1965 , and Sabidussi 1966 , is the inverse of the average distance to all other nodes. We propose the first highly scalable near linear-time processing and linear space overhead algorithm for estimating, within a small relative error, the classic closeness centralitie... read more »## Usability Engineering Of Games: A Comparative Analysis Of Measuring Excitement Using Sensors, Direct Observations And Self-reported Data. Arxiv:1409.0052v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0052**Description:**Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies and new ideas come up every now and then. This paper tests the hypothesis of using an EDA based physiological measurements as a usability testing tool by considering three measures which are observers opinions, self reported data and EDA based physiological sensor data. These data were analyzed comparatively and statistically. It concludes by discussing the findings that has been obtain... read more »## A Secure Tftp Protocol With Security Proofs. Arxiv:1409.0060v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0060**Description:**Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security protocol for smart device and server communications using Trivial File Transfer Protocol TFTP . We suggest the use of lightweight symmetric encry... read more »## An Experimental Study Of Cryptography Capability Using Chained Key Exchange Scheme For Embedded Devices. Arxiv:1409.0065v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0065**Description:**After 38 years of birthday Diffie-Hellman Key Exchange DHKE , there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented, but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded microcontroller. We choose ARM RaspberryPi board as hardware platform for experimental setup. To enable Ras... read more »## Personalization Of Itineraries Search Using Ontology And Rules To Avoid Congestion In Urban Areas. Arxiv:1409.0069v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0069**Description:**There is a relatively small amount of research covering urban freight movements. Most research dealing with the subject of urban mobility focuses on passenger vehicles, not commercial vehicles hauling freight. However, in many ways, urban freight transport contributes to congestion, air pollution, noise, accident and more fuel consumption which raises logistic costs, and hence the price of products. The main focus of this paper is to propose a new solution for congestion in order to improve the ... read more »## On Minimal Realisations Of Dynamical Structure Functions. Arxiv:1409.0072v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0072**Description:**Motivated by the fact that transfer functions do not contain structural information about networks, dynamical structure functions were introduced to capture causal relationships between measured nodes in networks. From the dynamical structure functions, a we show that the actual number of hidden states can be larger than the number of hidden states estimated from the corresponding transfer function; b we can obtain partial information about the true state-space equation, which cannot in general ... read more »## Software-defined And Virtualized Future Mobile And Wireless Networks: A Survey. Arxiv:1409.0079v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0079**Description:**With the proliferation of mobile demands and increasingly multifarious services and applications, mobile Internet has been an irreversible trend. Unfortunately, the current mobile and wireless network MWN faces a series of pressing challenges caused by the inherent design. In this paper, we extend two latest and promising innovations of Internet, software-defined networking and network virtualization, to mobile and wireless scenarios. We first describe the challenges and expectations of MWN, and... read more »## Show Me The Money: Dynamic Recommendations For Revenue Maximization. Arxiv:1409.0080v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0080**Description:**Recommender Systems RS play a vital role in applications such as e-commerce and on-demand content streaming. Research on RS has mainly focused on the customer perspective, i.e., accurate prediction of user preferences and maximization of user utilities. As a result, most existing techniques are not explicitly built for revenue maximization, the primary business goal of enterprises. In this work, we explore and exploit a novel connection between RS and the profitability of a business. As recommen... read more »## On K -gons And K -holes In Point Sets. Arxiv:1409.0081v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0081**Description:**We consider a variation of the classical Erd H o s-Szekeres problems on the existence and number of convex k -gons and k -holes empty k -gons in a set of n points in the plane. Allowing the k -gons to be non-convex, we show bounds and structural results on maximizing and minimizing their numbers. Most noteworthy, for any k and sufficiently large n , we give a quadratic lower bound for the number of k -holes, and show that this number is maximized by sets in convex position. read more »## Sparse Coding On Symmetric Positive Definite Manifolds Using Bregman Divergences. Arxiv:1409.0083v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0083**Description:**This paper introduces sparse coding and dictionary learning for Symmetric Positive Definite SPD matrices, which are often used in machine learning, computer vision and related areas. Unlike traditional sparse coding schemes that work in vector spaces, in this paper we discuss how SPD matrices can be described by sparse combination of dictionary atoms, where the atoms are also SPD matrices. We propose to seek sparse coding by embedding the space of SPD matrices into Hilbert spaces through two typ... read more »## Kernel Coding: General Formulation And Special Cases. Arxiv:1409.0084v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0084**Description:**Representing images by compact codes has proven beneficial for many visual recognition tasks. Most existing techniques, however, perform this coding step directly in image feature space, where the distributions of the different classes are typically entangled. In contrast, here, we study the problem of performing coding in a high-dimensional Hilbert space, where the classes are expected to be more easily separable. To this end, we introduce a general coding formulation that englobes the most pop... read more »## Designing Path Planning Algorithms For Mobile Anchor Towards Range-free Localization. Arxiv:1409.0085v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0085**Description:**Localization is one of the most important factor in wireless sensor networks as many applications demand position information of sensors. Recently there is an increasing interest on the use of mobile anchors for localizing sensors. Most of the works available in the literature either looks into the aspect of reducing path length of mobile anchor or tries to increase localization accuracy. The challenge is to design a movement strategy for a mobile anchor that reduces path length while meeting th... read more »## Quantum Digital-to-analog Conversion Algorithm Using Decoherence. Arxiv:1409.0088v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0088**Description:**We consider the problem of mapping digital data encoded on a quantum register to analog amplitudes in parallel. It is shown to be unlikely that a fully unitary polynomial-time quantum algorithm exists for this problem; NP becomes a subset of BQP if it exists. In the practical point of view, we propose a non-unitary linear-time algorithm using quantum decoherence. It tacitly uses an exponentially large physical resource, which is typically a huge number of identical molecules. Quantumness of corr... read more »## Multi-use Multi-secret Sharing Scheme For General Access Structure. Arxiv:1409.0089v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0089**Description:**The main aim of this paper is to construct a multi-secret sharing scheme for general access structure in a trusted dealer model using suitable hash function and Lagrange's interpolation method. Even though, the proposed scheme is a multi-secret and multi-use one, each participant has to carry only one share. The suitable use of collision resistant one way hash function makes the scheme efficient and multi-use. Moreover, the scheme has a nice property that secrets, participants or qualified sets ... read more »## Facilitating Adoption Of Network Services With Externalities Via Cost Subsidization. Arxiv:1409.0090v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0090**Description:**This paper investigates the adoption level of a network service where the net utility perceived by each user incorporates three key features, namely, user service affinity heterogeneity, a network externality, and a subscription cost. Services with network externality face a "chicken and egg" adoption problem in that the service requires customers in order to attract customers. In this paper we study cost subsidization as a means to "reach the knee" and thereby change the equ... read more »## Proceedings Of The 1st Omnet++ Community Summit, Hamburg, Germany, September 2, 2014. Arxiv:1409.0093v1 Cs.pf

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0093**Description:**This is the Proceedings of the 1st OMNeT++ Community Summit, which was held in Hamburg, Germany, September 2, 2014. read more »## An Optimal Algorithm For The Weighted Backup 2-center Problem On A Tree. Arxiv:1409.0098v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0098**Description:**In this paper, we are concerned with the weighted backup 2-center problem on a tree. The backup 2-center problem is a kind of center facility location problem, in which one is asked to deploy two facilities, with a given probability to fail, in a network. Given that the two facilities do not fail simultaneously, the goal is to find two locations, possibly on edges, that minimize the expected value of the maximum distance over all vertices to their closest functioning facility. In the weighted se... read more »## Marginalizing Over The Pagerank Damping Factor. Arxiv:1409.0104v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0104**Description:**In this note, we show how to marginalize over the damping parameter of the PageRank equation so as to obtain a parameter-free version known as TotalRank. Our discussion is meant as a reference and intended to provide a guided tour towards an interesting result that has applications in information retrieval and classification. read more »## A Plug&play P300 Bci Using Information Geometry. Arxiv:1409.0107v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0107**Description:**This paper presents a new classification methods for Event Related Potentials ERP based on an Information geometry framework. Through a new estimation of covariance matrices, this work extend the use of Riemannian geometry, which was previously limited to SMR-based BCI, to the problem of classification of ERPs. As compared to the state-of-the-art, this new method increases performance, reduces the number of data needed for the calibration and features good generalisation across sessions and subj... read more »## Resource Allocation For Outdoor-to-indoor Multicarrier Transmission With Shared Ue-side Distributed Antenna Systems. Arxiv:1409.0112v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0112**Description:**In this paper, we study the resource allocation algorithm design for downlink multicarrier transmission with a shared user equipment UE -side distributed antenna system SUDAS which utilizes both licensed and unlicensed frequency bands for improving the system throughput. The joint UE selection and transceiver processing matrix design is formulated as a non-convex optimization problem for the maximization of the end-to-end system throughput bits/s . In order to obtain a tractable resource allocat... read more »## Computerized Multi Microphone Test System. Arxiv:1409.0117v1 Cs.sd

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0117**Description:**An acoustic testing approach based on the concept of a microphone sensor surrounding the product under test is proposed. Microphone signals are processed simultaneously by a test system computer, according to the objective of the test. The spatial and frequency domain selectivity features of this method are examined. Sound-spatial visualization algorithm is observed. A test system design based on the concept of a microphone surrounding the tested product has the potential to improve distortion m... read more »## The Word Problem In Hanoi Towers Groups. Arxiv:1409.0119v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0119**Description:**We prove that elements of the Hanoi Towers groups mathcal H _m have depth bounded from above by a poly-logarithmic function O log^ m-2 n , where n is the length of an element. Therefore the word problem in groups mathcal H _m is solvable in subexponential time exp O log^ m-2 n . read more »## On Solving A Generalized Chinese Remainder Theorem In The Presence Of Remainder Errors. Arxiv:1409.0121v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0121**Description:**In estimating frequencies given that the signal waveforms are undersampled multiple times, Xia and his collaborators proposed to use a generalized version of Chinese remainder Theorem CRT , where the moduli are dm_1, dm_2, cdots, dm_k with m_1, m_2, cdots, m_k being pairwise coprime. If the errors of the corrupted remainders are within frac d 4 , their schemes are able to construct an approximation of the solution to the generalized CRT with an error smaller than frac d 4 . One of the critical i... read more »## Through The Frosted Glass: Security Problems In A Translucent Ui. Arxiv:1409.0128v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0128**Description:**Translucency is now a common design element in at least one popular mobile operating system. This raises security concerns as it can make it harder for users to correctly identify and interpret trusted interaction elements. In this paper, we demonstrate this security problem using the example of the Safari browser in the latest iOS version on Apple tablets and phones iOS7 , and discuss technical challenges of an attack as well as solutions to these challenges. We conclude with a survey-based use... read more »## Costly Collaborations: The Impact Of Scientific Fraud On Co-authors' Careers. Arxiv:1409.0129v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0129**Description:**Over the last few years, several major scientific fraud cases have shocked the scientific community. The number of retractions each year has also increased tremendously, especially in the biomedical field, and scientific misconduct accounts for approximately more than half of those retractions. It is assumed that co-authors of retracted papers are affected by their colleagues' misconduct, and the aim of this study is to provide empirical evidence of the effect of retractions in biomedical resear... read more »## Approximations And Optimal Control For State-dependent Limited Processor Sharing Queues. Arxiv:1409.0153v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0153**Description:**The paper studies approximations and control of a processor sharing PS server where the service rate depends on the number of jobs occupying the server. The control of such a system is implemented by imposing a limit on the number of jobs that can share the server concurrently, with the rest of the jobs waiting in a first-in-first-out FIFO buffer. A desirable control scheme should strike the right balance between efficiency operating at a high service rate and parallelism preventing small jobs f... read more »## Computers Should Be Uniters Not Dividers: A Vision Of Computer-enhanced Happy Future. Arxiv:1409.0158v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0158**Description:**This manifesto provides a vision of how computers can be used to bring people together, to enhance people's use of their natural creativity, and thus, make them happier. read more »## Towards Verifying Procedural Programs Using Constrained Rewriting Induction. Arxiv:1409.0166v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0166**Description:**This paper aims at developing a verification method for procedural programs via a transformation into the recently introduced Logically Constrained Term Rewriting Systems LCTRSs . To this end, we introduce an extension of transformation methods based on integer TRSs, which can also handle global variables and arrays, and encode safety checks. Then we adapt existing rewriting induction methods to LCTRSs and propose a simple yet effective method to generalize equations. We show that we can automat... read more »## Abelian Networks Ii. Halting On All Inputs. Arxiv:1409.0169v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0169**Description:**Abelian networks are systems of communicating automata satisfying a local commutativity condition. We show that a finite irreducible abelian network halts on all inputs if and only if all eigenvalues of its production matrix lie in the open unit disk. read more »## Abelian Networks Iii. The Critical Group. Arxiv:1409.0170v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0170**Description:**The critical group of an abelian network is a finite abelian group that governs the behavior of the network on large inputs. It generalizes the sandpile group of a graph. We show that the critical group of an irreducible abelian network acts freely and transitively on recurrent states of the network. We exhibit the critical group as a quotient of a free abelian group by a subgroup containing the image of the Laplacian, with equality in the case that the network is rectangular. We generalize Dhar... read more »## Ota Based 200 G Omega Resistance On 700 Mu M2 In 180 Nm Cmos For Neuromorphic Applications. Arxiv:1409.0171v1 Q-bio.nc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0171**Description:**Generating an exponential decay function with a time constant on the order of hundreds of milliseconds is a mainstay for neuromorphic circuits. Usually, either subthreshold circuits or RC-decays based on transconductance amplifiers are used. In the latter case, transconductances in the 10 pS range are needed. However, state-of-the-art low-transconductance amplifiers still require too much circuit area to be applicable in neuromorphic circuits where >100 of these time constant circuits may be ... read more »## A Variant Of Maximum Weight Independent Set Problem. Arxiv:1409.0173v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0173**Description:**We study a natural extension of the Maximum Weight Independent Set Problem MWIS , one of the most studied optimization problems in Graph algorithms. The problem is as follows. We are given a graph G= V,E , a weight function w: V rightarrow mathbb R^+ , a budget function b: V rightarrow mathbb Z^+ , and a positive integer B . A k -budgeted independent set in G is a subset of vertices such that no pair of vertices in that subset are adjacent and the sum of the budgets of the vertices in that subse... read more »## Continuous Quantum Measurement In Spin Environments. Arxiv:1409.0191v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0191**Description:**We derive a formalism of stochastic master equations SME which describes the decoherence dynamics of a system in spin environments conditioned on the measurement record. Markovian and non-Markovian nature of environment can be revealed by a spectroscopy method based on weak quantum measurement weak spectroscopy . On account of that correlated environments can lead to a nonlocal open system which exhibits strong non-Markovian effects although the local dynamics are Markovian, the spectroscopy met... read more »## Pragmatic Interpretation Of Quantum Logic. Arxiv:1409.0194v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0194**Description:**Scholars have wondered for a long time whether the language of quantum mechanics introduces a quantum notion of truth which is formalized by quantum logic QL and is incompatible with the classical Tarskian notion. We show that QL can be interpreted as a pragmatic language of assertive formulas which formalize statements about physical systems that are empirically justified or unjustified in the framework of quantum mechanics. According to this interpretation, QL formalizes properties of the meta... read more »## Localization In Wireless Sensor Networks Using Quadratic Optimization. Arxiv:1409.0201v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0201**Description:**The localization problem in a wireless sensor network is to determine the coordination of sensor nodes using the known positions of some nodes called anchors and corresponding noisy distance measurements. There is a variety of different approaches to solve this problem such as semi-definite programming SDP based, sum of squares and second order cone programming, and between them, SDP-based approaches have shown good performance. In recent years, the primary SDP approach has been investigated and... read more »## Ad Hoc Microphone Array Calibration: Euclidean Distance Matrix Completion Algorithm And Theoretical Guarantees. Arxiv:1409.0203v1 Cs.sd

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0203**Description:**This paper addresses the problem of ad hoc microphone array calibration where only partial information about the distances between microphones is available. We construct a matrix consisting of the pairwise distances and propose to estimate the missing entries based on a novel Euclidean distance matrix completion algorithm by alternative low-rank matrix completion and projection onto the Euclidean distance space. This approach confines the recovered matrix to the EDM cone at each iteration of the... read more »## Fast Overlapping And Hierarchical Community Detection Via Local Dynamic Interaction. Arxiv:1409.0205v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0205**Description:**Community structure has many practical applications and identifying communities could help us to understand and exploit networks more effectively. Generally, real-world networks include several different kinds of nodes which are general cluster nodes within communities, as well as some special nodes like hubs and outliers. In addition, real-world networks often have a hierarchical structure with communities embedded within other communities. However, there are few effective methods can identify ... read more »## A Computational Approach To Bisimulation Of Hybrid Dynamical Systems. Arxiv:1409.0206v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0206**Description:**The problem of finding a finite state symbolic model which is bisimilar to a hybrid dynamical system HDS and has the minimum number of states is considered. The considered class of HDS allows for discrete-valued inputs that only affect the jumps events of the HDS. Representation of the HDS in the form of a transition system is revisited in comparison with prior works. An algorithm is proposed for solving the problem which gives the bisimulation with the minimum number of states if it already exi... read more »## Who Create Trends In Online Social Media: The Crowd Or Opinion Leaders . Arxiv:1409.0210v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0210**Description:**Trends in online social media always reflect the collective attention of a vast number of individuals across the network. For example, Internet slang words can be ubiquitous because of social memes and online contagions in an extremely short period. From Weibo, a Twitter-like service in China, we find that the adoption of popular Internet slang words experiences two peaks in its temporal evolution, in which the former is relatively much lower than the latter. This interesting phenomenon in fact ... read more »## Testable Uniqueness Conditions For Empirical Assessment Of Undersampling Levels In Total Variation-regularized X-ray Ct. Arxiv:1409.0214v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0214**Description:**We study recoverability in fan-beam computed tomography CT with sparsity and total variation priors: how many underdetermined linear measurements suffice for recovering images of given sparsity Results from compressed sensing CS establish such conditions for, e.g., random measurements, but not for CT. Recoverability is typically tested by checking whether a computed solution recovers the original. This approach cannot guarantee solution uniqueness and the recoverability decision therefore depend... read more »## No Weak Local Rules For The 4p-fold Tilings. Arxiv:1409.0215v1 Math.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0215**Description:**Planar tilings with n -fold rotational symmetry are commonly used to model the long range order of quasicrystals. In this context, it is important to know which tilings are characterized only by local rules. Local rules are constraints on the way neighboor tiles can fit together. They aim to model finite-range energetic interactions which stabilize quasicrystals. They are said to be weak if they moreover allow the tilings to have small variations which do not affect the long range order. On the ... read more »## Towards Wire-speed Platform-agnostic Control Of Openflow Switches. Arxiv:1409.0242v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0242**Description:**The possibility to offload, via a platform-agnostic specification, the execution of some/part of the control functions down to the switch and operate them at wire speed based on packet level events, would yield significant benefits in terms of control latency and reaction times, meanwhile retaining the SDN-type ability to program and instantiate a desired network operation from a central controller. While programmability inside the switches, at wire speed and using platform-independent abstracti... read more »## A Comparative Study Of Programming Languages In Rosetta Code. Arxiv:1409.0252v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0252**Description:**Sometimes debates on programming languages are more religious than scientific. Questions about which language is more succinct or efficient, or makes developers more productive are discussed with fervor, and their answers are too often based on anecdotes and unsubstantiated beliefs. In this study, we use the largely untapped research potential of Rosetta Code, a code repository of solutions to common programming tasks in various languages, to draw a fair and well-founded comparison. Rosetta Code... read more »## Simultaneous Wireless Information And Power Transfer In Modern Communication Systems. Arxiv:1409.0261v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0261**Description:**Energy harvesting for wireless communication networks is a new paradigm that allows terminals to recharge their batteries from external energy sources in the surrounding environment. A promising energy harvesting technology is wireless power transfer where terminals harvest energy from electromagnetic radiation. Thereby, the energy may be harvested opportunistically from ambient electromagnetic sources or from sources that intentionally transmit electromagnetic energy for energy harvesting purpo... read more »## Nash Equilibria For A Quadratic Voting Game. Arxiv:1409.0264v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0264**Description:**Voters making a binary decision purchase votes from a centralized clearing house, paying the square of the number of votes purchased. The net payoff to an agent with utility u who purchases v votes is Psi S_ n+1 u-v^ 2 , where Psi is a monotone function taking values between -1 and +1 and S_ n+1 is the sum of all votes purchased by the n+1 voters participating in the election. The utilities of the voters are assumed to arise by random sampling from a probability distribution F_ U with compact su... read more »## Virtual Evidence: A Constructive Semantics For Classical Logics. Arxiv:1409.0266v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0266**Description:**This article presents a computational semantics for classical logic using constructive type theory. Such semantics seems impossible because classical logic allows the Law of Excluded Middle LEM , not accepted in constructive logic since it does not have computational meaning. However, the apparently oracular powers expressed in the LEM, that for any proposition P either it or its negation, not P, is true can also be explained in terms of constructive evidence that does not refer to "oracles... read more »## Online Networks Destroy Social Trust. Arxiv:1409.0267v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0267**Description:**Studies in the social capital literature have documented two stylised facts: first, a decline in measures of social participation has occurred in many OECD countries. Second, and more recently, the success of social networking sites SNSs has resulted in a steep rise in online social participation. Our study adds to this body of research by conducting the first empirical assessment of how online networking affects two economically relevant aspects of social capital, i.e. trust and sociability. We... read more »## Mult-task Sparse Structure Learning. Arxiv:1409.0272v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0272**Description:**Multi-task learning MTL aims to improve generalization performance by learning multiple related tasks simultaneously. While sometimes the underlying task relationship structure is known, often the structure needs to be estimated from data at hand. In this paper, we present a novel family of models for MTL, applicable to regression and classification problems, capable of learning the structure of task relationships. In particular, we consider a joint estimation problem of the task relationship st... read more »## Towards A Calculus Of Echo State Networks. Arxiv:1409.0280v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0280**Description:**Reservoir computing is a recent trend in neural networks which uses the dynamical perturbations on the phase space of a system to compute a desired target function. We present how one can formulate an expectation of system performance in a simple class of reservoir computing called echo state networks. In contrast with previous theoretical frameworks, which only reveal an upper bound on the total memory in the system, we analytically calculate the entire memory curve as a function of the structu... read more »## Outage Probability Of Energy Harvesting Relay-aided Cooperative Networks Over Rayleigh Fading Channel. Arxiv:1409.0286v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0286**Description:**Energy harvesting technique is a potential way for relay node energy supply in cooperative networks in terms of deployment flexibility and maintain charge reduction. Unlike traditional power source, relay node in this case may run out of energy with certain probability, which can degrade the benefit from relay-aided cooperative transmission. In this paper, we concentrate on the outage behavior of cooperative networks aided by energy harvesting relay node in slow fading channel, and attempt to de... read more »## Scalable Inference For Neuronal Connectivity From Calcium Imaging. Arxiv:1409.0289v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0289**Description:**Fluorescent calcium imaging provides a potentially powerful tool for inferring connectivity in neural circuits with up to thousands of neurons. However, a key challenge in using calcium imaging for connectivity detection is that current systems often have a temporal response and frame rate that can be orders of magnitude slower than the underlying neural spiking process. Bayesian inference methods based on expectation-maximization EM have been proposed to overcome these limitations, but are ofte... read more »## A Mobile Food Recommendation System Based On The Traffic Light Diet. Arxiv:1409.0296v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0296**Description:**Innovative, real-time solutions are needed to address the mismatch between the demand for and supply of critical information to inform and motivate diet and health-related behavior change. Research suggests that interventions using mobile health technologies hold great promise for influencing knowledge, attitudes, and behaviors related to energy balance. The objective of this paper is to present insights related to the development and testing of a mobile food recommendation system targeting fast... read more »## Team Behavior In Interactive Dynamic Influence Diagrams With Applications To Ad Hoc Teams. Arxiv:1409.0302v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0302**Description:**Planning for ad hoc teamwork is challenging because it involves agents collaborating without any prior coordination or communication. The focus is on principled methods for a single agent to cooperate with others. This motivates investigating the ad hoc teamwork problem in the context of individual decision making frameworks. However, individual decision making in multiagent settings faces the task of having to reason about other agents' actions, which in turn involves reasoning about others. An... read more »## Searching For A Unique Style In Soccer. Arxiv:1409.0308v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0308**Description:**Is it possible to have a unique, recognizable style in soccer nowadays We address this question by proposing a method to quantify the motif characteristics of soccer teams based on their pass networks. We introduce the the concept of "flow motifs" to characterize the statistically significant pass sequence patterns. It extends the idea of the network motifs, highly significant subgraphs that usually consists of three or four nodes. The analysis of the motifs in the pass networks allows... read more »## Using Architecture To Reason About Information Security. Arxiv:1409.0309v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0309**Description:**We demonstrate, by a number of examples, that information-flow security properties can be proved from abstract architectural descriptions, that describe only the causal structure of a system and local properties of trusted components. We specify these architectural descriptions of systems by generalizing intransitive noninterference policies to admit the ability to filter information passed between communicating domains. A notion of refinement of such system architectures is developed that suppo... read more »## Empirical Evaluation Of Tree Distances For Parser Evaluation. Arxiv:1409.0314v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0314**Description:**In this empirical study, I compare various tree distance measures -- originally developed in computational biology for the purpose of tree comparison -- for the purpose of parser evaluation. I will control for the parser setting by comparing the automatically generated parse trees from the state-of-the-art parser Charniak, 2000 with the gold-standard parse trees. The article describes two different tree distance measures RF and QD along with its variants GRF and GQD for the purpose of parser eva... read more »## On Self-approaching And Increasing-chord Drawings Of 3-connected Planar Graphs. Arxiv:1409.0315v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0315**Description:**An st -path in a drawing of a graph is self-approaching if during a traversal of the corresponding curve from s to any point t' on the curve the distance to t' is non-increasing. A path has increasing chords if it is self-approaching in both directions. A drawing is self-approaching increasing-chord if any pair of vertices is connected by a self-approaching increasing-chord path. We study self-approaching and increasing-chord drawings of triangulations and 3-connected planar graphs. We show that... read more »## Energy-aware Cloud Management Through Progressive Sla Specification. Arxiv:1409.0325v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0325**Description:**Novel energy-aware cloud management methods dynamically reallocate computation across geographically distributed data centers to leverage regional electricity price and temperature differences. As a result, a managed VM may suffer occasional downtimes. Current cloud providers only offer high availability VMs, without enough flexibility to apply such energy-aware management. In this paper we show how to analyse past traces of dynamic cloud management actions based on electricity prices and temper... read more »## Storing Sequences In Binary Tournament-based Neural Networks. Arxiv:1409.0334v1 Cs.ne

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0334**Description:**An extension to a recently introduced architecture of clique-based neural networks is presented. This extension makes it possible to store sequences with high efficiency. To obtain this property, network connections are provided with orientation and with flexible redundancy carried by both spatial and temporal redundancy, a mechanism of anticipation being introduced in the model. In addition to the sequence storage with high efficiency, this new scheme also offers biological plausibility. In ord... read more »## Multi-tensor Completion For Estimating Missing Values In Video Data. Arxiv:1409.0347v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0347**Description:**Many tensor-based data completion methods aim to solve image and video in-painting problems. But, all methods were only developed for a single dataset. In most of real applications, we can usually obtain more than one dataset to reflect one phenomenon, and all the datasets are mutually related in some sense. Thus one question raised whether such the relationship can improve the performance of data completion or not In the paper, we proposed a novel and efficient method by exploiting the relation... read more »## Visualization Of Co-readership Patterns From An Online Reference Management System. Arxiv:1409.0348v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0348**Description:**In this paper, we present a methodology and prototype for creating knowledge domain visualizations based on readership statistics recorded in the social reference management system Mendeley. In particular, we use co-readership patterns to map the field of educational technology. The resulting visualization, based on the most read publications in this field on Mendeley, reveals 13 subject areas of educational technology research. The visualization is a recent representation of the field: 80 of th... read more »## Building An Archive With Saada. Arxiv:1409.0351v1 Astro-ph.im

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0351**Description:**Saada transforms a set of heterogeneous FITS files or VOTables of various categories images, tables, spectra ... in a database without writing code. Databases created with Saada come with a rich Web interface and an Application Programming Interface API . They support the four most common VO services. Such databases can mix various categories of data in multiple collections. They allow a direct access to the original data while providing a homogenous view thanks to an internal data model compati... read more »## "share And Enjoy": Publishing Useful And Usable Scientific Models. Arxiv:1409.0367v1 Cs.ce

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0367**Description:**The reproduction and replication of reported scientific results is a hot topic within the academic community. The retraction of numerous studies from a wide range of disciplines, from climate science to bioscience, has drawn the focus of many commentators, but there exists a wider socio-cultural problem that pervades the scientific community. Sharing data and models often requires extra effort, and this is currently seen as a significant overhead that may not be worth the time investment. Automa... read more »## Polynomial Solvability Of Np -complete Problems. Arxiv:1409.0375v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0375**Description:**Polynomial algorithm for solving "Hamiltonian circuit" problem is presented in the paper. Computational complexity of the algorithm is equal O n^ 20.5 log_2n log_2 log_2n where n is cardinality of the observed graph vertex set. That is why polynomial solvability for NP-complete problems is proved. read more »## An Interim Summary On Semantic Model Differencing. Arxiv:1409.0384v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0384**Description:**This position paper provides an interim summary on the goals and current state of our ongoing research project on semantic model differencing for software evolution. We describe the basics of semantic model differencing, give two examples from our recent work, and discuss future challenges in taking full advantage of the potential of semantic differencing techniques in the context of models' evolution. read more »## Cyber-physical Systems -- Eine Herausforderung An Die Automatisierungstechnik . Arxiv:1409.0385v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0385**Description:**We discuss challenges to control systems engineering arising from the advent of cyber-physical systems CPS . After discussing the terminology, general, IT-related issues are treated which need cooperation with computer science, in particular software engineering. Then we study those challenges that require specific core competencies from control systems engineering. We sketch solution approaches for the exemplary problem of dealing with changes in the physical environment of a CPS. ---- Der Beit... read more »## Testing Noninterference, Quickly. Arxiv:1409.0393v1 Cs.pl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0393**Description:**Information-flow control mechanisms are difficult both to design and to prove correct. To reduce the time wasted on doomed proof attempts due to broken definitions, we advocate modern random testing techniques for finding counterexamples during the design process. We show how to use QuickCheck, a property-based random-testing tool, to guide the design of increasingly complex information-flow abstract machines, leading up to a sophisticated register machine with a novel and highly permissive flow... read more »## A Requirements Modeling Language For The Component Behavior Of Cyber Physical Robotics Systems. Arxiv:1409.0394v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0394**Description:**Software development for robotics applications is a sophisticated endeavor as robots are inherently complex. Explicit modeling of the architecture and behavior of robotics application yields many advantages to cope with this complexity by identifying and separating logically and physically independent components and by hierarchically structuring the system under development. On top of component and connector models we propose modeling the requirements on the behavior of robotics software compone... read more »## Modeling Cyber-physical Systems: Model-driven Specification Of Energy Efficient Buildings. Arxiv:1409.0400v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0400**Description:**A lot of current buildings are operated energy inefficient and offer a great potential to reduce the overall energy consumption and CO2 emission. Detecting these inefficiencies is a complicated task and needs domain experts that are able to identify them. Most approaches try to support detection by focussing on monitoring the building's operation and visualizing data. Instead our approach focuses on using techniques taken from the cyber-physical systems' modeling domain. We create a model of the... read more »## Supporting Acceptance Testing In Distributed Software Projects With Integrated Feedback Systems: Experiences And Requirements. Arxiv:1409.0402v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0402**Description:**During acceptance testing customers assess whether a system meets their expectations and often identify issues that should be improved. These findings have to be communicated to the developers a task we observed to be error prone, especially in distributed teams. Here, it is normally not possible to have developer representatives from every site attend the test. Developers who were not present might misunderstand insufficiently documented findings. This hinders fixing the issues and endangers cu... read more »## Heterogeneous Computing On Mixed Unstructured Grids With Pyfr. Arxiv:1409.0405v1 Physics.flu-dyn

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0405**Description:**PyFR is an open-source high-order accurate computational fluid dynamics solver for mixed unstructured grids that can target a range of hardware platforms from a single codebase. In this paper we demonstrate the ability of PyFR to perform high-order accurate unsteady simulations of flow on mixed unstructured grids using heterogeneous multi-node hardware. Specifically, after benchmarking single-node performance for various platforms, PyFR v0.2.2 is used to undertake simulations of unsteady flow ov... read more »## Autonomous Driving - 5 Years After The Urban Challenge: The Anticipatory Vehicle As A Cyber-physical System. Arxiv:1409.0413v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0413**Description:**In November 2007 the international competition DARPA Urban Challenge took place on the former George Airforce Base in Victorville, California to significantly promote the research and development on autonomously driving vehicles for urban environments. In the final race only eleven out of initially 89 competitors participated and "Boss" from Carnegie Mellon University succeeded. This paper summarizes results of the research carried out by all finalists within the last five years after ... read more »## Sselab: A Plug-in-based Framework For Web-based Project Portals. Arxiv:1409.0415v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0415**Description:**Tools are an essential part of every software engineering project. But the number of tools that are used in all phases of the software development life-cycle and their complexity is growing continually. Consequently, the setup and maintenance of current tool chains and development environments requires much effort and consumes a lot of time. One approach to counter this, is to employ web-based systems for development tasks, because centralized systems simplify the administration and the deployme... read more »## The Energy Navigator - A Web-platform For Performance Design And Management. Arxiv:1409.0416v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0416**Description:**Over the last three decades comprehensive research has been carried out trying to improve commissioning processes with powerful modeling tools and methodologies for data analysis and visualization. Typically addressed application scenarios are facilities management, contracting, special consulting services and measurement & verification as part of a certification process. The results are all but convincing: Monitoring of building operation has so far not become a regular service for building... read more »## Balanced Permutations Even-mansour Ciphers. Arxiv:1409.0421v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0421**Description:**The r -rounds Even-Mansour block cipher uses r public permutations of 0, 1 ^n and r+1 secret keys. An attack on this construction was described in cite DDKS , for r = 2, 3 . Although this attack is only marginally better than brute force, it is based on an interesting observation due to cite NWW : for a "typical" permutation P , the distribution of P x oplus x is not uniform. To address this, and other potential threats that might stem from this observation in this or other context, we... read more »## Google Matrix Analysis Of Directed Networks. Arxiv:1409.0428v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0428**Description:**In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tool... read more »## A Coloring Algorithm For Disambiguating Graph And Map Drawings. Arxiv:1409.0436v1 Cs.dm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0436**Description:**Drawings of non-planar graphs always result in edge crossings. When there are many edges crossing at small angles, it is often difficult to follow these edges, because of the multiple visual paths resulted from the crossings that slow down eye movements. In this paper we propose an algorithm that disambiguates the edges with automatic selection of distinctive colors. Our proposed algorithm computes a near optimal color assignment of a dual collision graph, using a novel branch-and-bound procedur... read more »## Near Optimal Compressed Sensing Without Priors: Parametric Sure Approximate Message Passing. Arxiv:1409.0440v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0440**Description:**Both theoretical analysis and empirical evidence confirm that the approximate message passing AMP algorithm can be interpreted as recursively solving a signal denoising problem: at each AMP iteration, one observes a Gaussian noise perturbed original signal. Retrieving the signal amounts to a successive noise cancellation until the noise variance decreases to a satisfactory level. In this paper we incorporate the Stein's unbiased risk estimate SURE based parametric denoiser with the AMP framework... read more »## Computational Complexity Of Solving Elementary Differential Equations Over Unbounded Domains. Arxiv:1409.0451v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0451**Description:**In this paper we investigate the computational complexity of solving ordinary differential equations ODEs y^ prime =f y over emph unbounded domains. Contrarily to the bounded case, this problem has not been well-studied, apparently due to the "conventional wisdom" that it can always be reduced to the bounded case by using rescaling techniques. However, as we show in this paper, rescaling techniques do not seem to provide meaningful insights on the complexity of this problem, since the ... read more »## On Cooperative Multiple Access Channels With Delayed Csi At Transmitters. Arxiv:1409.0454v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0454**Description:**We consider a cooperative two-user multiaccess channel in which the transmission is controlled by a random state. Both encoders transmit a common message and, one of the encoders also transmits an individual message. We study the capacity region of this communication model for different degrees of availability of the states at the encoders, causally or strictly causally. In the case in which the states are revealed causally to both encoders but not to the decoder we find an explicit characteriza... read more »## On The Recognition Of Fan-planar And Maximal Outer-fan-planar Graphs. Arxiv:1409.0461v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0461**Description:**Fan-planar graphs were recently introduced as a generalization of 1-planar graphs. A graph is fan-planar if it can be embedded in the plane, such that each edge that is crossed more than once, is crossed by a bundle of two or more edges incident to a common vertex. A graph is outer-fan-planar if it has a fan-planar embedding in which every vertex is on the outer face. If, in addition, the insertion of an edge destroys its outer-fan-planarity, then it is maximal outer-fan-planar. In this paper, w... read more »## Neural Coordination Can Be Enhanced By Occasional Interruption Of Normal Firing Patterns: A Self-optimizing Spiking Neural Network Model. Arxiv:1409.0470v1 Nlin.ao

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0470**Description:**The state space of a conventional Hopfield network typically exhibits many different attractors of which only a small subset satisfy constraints between neurons in a globally optimal fashion. It has recently been demonstrated that combining Hebbian learning with occasional alterations of normal neural states avoids this problem by means of self-organized enlargement of the best basins of attraction. However, so far it is not clear to what extent this process of self-optimization is also operativ... read more »## A New Algorithm For Solving Ring-lpn With A Reducible Polynomial. Arxiv:1409.0472v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0472**Description:**The LPN Learning Parity with Noise problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive. We present a new algorithm for solving the RING-LPN problem in the case when the polynomial used is reducible. It greatly outperforms previous algorithms for solving this problem. Using the algorithm, we can break the Lapin authentication protocol for... read more »## Neural Machine Translation By Jointly Learning To Align And Translate. Arxiv:1409.0473v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0473**Description:**Neural machine translation is a recently proposed approach to machine translation. Unlike the traditional statistical machine translation, the neural machine translation aims at building a single neural network that can be jointly tuned to maximize the translation performance. The models proposed recently for neural machine translation often belong to a family of encoder-decoders and consists of an encoder that encodes a source sentence into a fixed-length vector from which a decoder generates a... read more »## Facets And Typed Relations As Tools For Reasoning Processes In Information Retrieval. Arxiv:1409.0491v1 Cs.ir

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0491**Description:**Faceted arrangement of entities and typed relations for representing different associations between the entities are established tools in knowledge representation. In this paper, a proposal is being discussed combining both tools to draw inferences along relational paths. This approach may yield new benefit for information retrieval processes, especially when modeled for heterogeneous environments in the Semantic Web. Faceted arrangement can be used as a se-lection tool for the semantic knowledg... read more »## Distortion Exponent In Fading Mimo Channels With Time-varying Side Information. Arxiv:1409.0494v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0494**Description:**Transmission of a Gaussian source over a time-varying multiple-input multiple-output MIMO channel is studied under strict delay constraints. Availability of a correlated side information at the receiver is assumed, whose quality, i.e., correlation with the source signal, also varies over time. A block-fading model is considered for both the states of the time-varying channel and the time-varying side information; and perfect channel and side information state information at the receiver is assum... read more »## On Approximate Decidability Of Minimal Programs. Arxiv:1409.0496v1 Math.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0496**Description:**An index e in a numbering of partial-recursive functions is called minimal if every lesser index computes a different function from e . Since the 1960's it has been known that, in any reasonable programming language, no effective procedure determines whether or not a given index is minimal. We investigate whether the task of determining minimal indices can be solved in an approximate sense. Our first question, regarding the set of minimal indices, is whether there exists an algorithm which can c... read more »## Drawing Graphs Within Restricted Area. Arxiv:1409.0499v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0499**Description:**We study the problem of selecting a maximum-weight subgraph of a given graph such that the subgraph can be drawn within a prescribed drawing area subject to given non-uniform vertex sizes. We develop and analyze heuristics both for the general undirected case and for the use case of directed calculation graphs which are used to analyze the typical mistakes that high school students make when transforming mathematical expressions in the process of calculating, for example, sums of fractions. read more »## Model Reproduces Individual, Group And Collective Dynamics Of Human Contact Networks. Arxiv:1409.0507v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0507**Description:**Empirical data on the dynamics of human face-to-face interactions across a variety of social venues have recently revealed a number of context-independent structural and temporal properties of human contact networks. This universality suggests that some basic mechanisms may be responsible for the unfolding of human interactions in the physical space. Here we discuss a simple model that reproduces the empirical distributions for the individual, group and collective dynamics of face-to-face contac... read more »## Experiments On Data Preprocessing Of Persian Blog Networks. Arxiv:1409.0517v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1409.0517**Description:**Social networks analysis and exploring is important for researchers, sociologists, academics, and various businesses due to their information potential. Because of the large volume, diversity, and the data growth rate in web 2.0, some challenges have been made in these data analysis. Based on definitions, weblogs are a form of social networking. So far, the majority of studies and researches in the field of weblog networks analysis and exploring their stored data have been based on international... read more »## The Equity Tax And Shelter. Arxiv:cs/0012013v14 Cs.ce Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/cs/0012013**Description:**Taxes have major costs beyond the collected revenue: deadweight from distorted incentives, compliance and enforcement costs, etc. A simple market mechanism, the Equity Tax, avoids these problems for the trickiest cases: corporate, dividend, and capital gains taxes. It exploits the ability of the share prices to reflect the expected true annual return as perceived by investors, not as defined by law and works only for publicly held corporations. Since going or staying public cannot be forced, and... read more »## Staging Mixed-initiative Dialogs By Program Generation And Transformation. Arxiv:1108.0476v3 Cs.pl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1108.0476**Description:**Specifying and implementing flexible human-computer dialogs, such as those used in kiosks and smart phone apps, is challenging because of the numerous and varied directions in which each user might steer a dialog. The objective of this research is to improve dialog specification and implementation. To do so we enriched a notation based on concepts from programming languages, especially partial evaluation, for specifying a variety of unsolicited reporting, mixed-initiative dialogs in a concise re... read more »## A Geometric Approach For Fully Automatic Chromosome Segmentation. Arxiv:1112.4164v5 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1112.4164**Description:**A fundamental task in human chromosome analysis is chromosome segmentation. Segmentation plays an important role in chromosome karyotyping. The first step in segmentation is to remove intrusive objects such as stain debris and other noises. The next step is detection of touching and overlapping chromosomes, and the final step is separation of such chromosomes. Common methods for separation between touching chromosomes are interactive and require human intervention for correct separation between ... read more »## Citations, Sequence Alignments, Contagion, And Semantics: On Acyclic Structures And Their Randomness. Arxiv:1204.6535v6 Cs.dm Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1204.6535**Description:**Datasets from several domains, such as life-sciences, semantic web, machine learning, natural language processing, etc. are naturally structured as acyclic graphs. These datasets, particularly those in bio-informatics and computational epidemiology, have grown tremendously over the last decade or so. Increasingly, as a consequence, there is a need to build and evaluate various strategies for processing acyclic structured graphs. Most of the proposed research models the real world acyclic structu... read more »## Kernel Principal Component Analysis And Its Applications In Face Recognition And Active Shape Models. Arxiv:1207.3538v3 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1207.3538**Description:**Principal component analysis PCA is a popular tool for linear dimensionality reduction and feature extraction. Kernel PCA is the nonlinear form of PCA, which better exploits the complicated spatial structure of high-dimensional features. In this paper, we first review the basic ideas of PCA and kernel PCA. Then we focus on the reconstruction of pre-images for kernel PCA. We also give an introduction on how PCA is used in active shape models ASMs , and discuss how kernel PCA can be applied to imp... read more »## Distributed Supervisory Control Of Discrete-event Systems With Communication Delay. Arxiv:1207.5072v3 Cs.sy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1207.5072**Description:**This paper identifies a property of delay-robustness in distributed supervisory control of discrete-event systems DES with communication delays. In previous work a distributed supervisory control problem has been investigated on the assumption that inter-agent communications take place with negligible delay. From an applications viewpoint it is desirable to relax this constraint and identify communicating distributed controllers which are delay-robust, namely logically equivalent to their delay-... read more »## Tight Analysis Of Priority Queuing Policy For Egress Traffic. Arxiv:1207.5959v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1207.5959**Description:**Recently, the problems of evaluating performances of switches and routers have been formulated as online problems, and a great amount of results have been presented. In this paper, we focus on managing outgoing packets called em egress traffic on switches that support Quality of Service QoS , and analyze the performance of one of the most fundamental scheduling policies em Priority Queuing PQ using competitive analysis. We formulate the problem of managing egress queues as follows: An output int... read more »## A Simple Model Clarifies The Complicated Relationships Of Complex Networks. Arxiv:1210.3121v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1210.3121**Description:**Real-world networks such as the Internet and WWW have many common traits. Until now, hundreds of models were proposed to characterize these traits for understanding the networks. Because different models used very different mechanisms, it is widely believed that these traits origin from different causes. However, we find that a simple model based on optimisation can produce many traits, including scale-free, small-world, ultra small-world, Delta-distribution, compact, fractal, regular and random... read more »## Stable Xor-based Policies For The Broadcast Erasure Channel With Feedback. Arxiv:1211.5358v5 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1211.5358**Description:**In this paper we describe a network coding scheme for the Broadcast Erasure Channel with multiple unicast stochastic flows, in the case of a single source transmitting packets to N users, where per-slot feedback is fed back to the transmitter in the form of ACK/NACK messages. This scheme performs only binary XOR operations and involves a network of queues, along with special rules for coding and moving packets among the queues, that ensure instantaneous decodability. The system under considerati... read more »## Diagonalizing By Fixed-points. Arxiv:1303.0730v4 Math.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1303.0730**Description:**A universal schema for diagonalization was popularized by N. S. Yanofsky 2003 in which the existence of a diagonolized-out and contradictory object implies the existence of a fixed-point for a certain function. It was shown that many self-referential paradoxes and diagonally proved theorems can fit in that schema. Here, we fit more theorems in the universal schema of diagonalization, such as Euclid's theorem on the infinitude of the primes and new proofs of Boolos 1997 for Cantor's theorem on th... read more »## Classifying And Visualizing Motion Capture Sequences Using Deep Neural Networks. Arxiv:1306.3874v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1306.3874**Description:**The gesture recognition using motion capture data and depth sensors has recently drawn more attention in vision recognition. Currently most systems only classify dataset with a couple of dozens different actions. Moreover, feature extraction from the data is often computational complex. In this paper, we propose a novel system to recognize the actions from skeleton data with simple, but effective, features using deep neural networks. Features are extracted for each frame based on the relative po... read more »## Introduction To Queueing Theory And Stochastic Teletraffic Models. Arxiv:1307.2968v3 Math.pr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1307.2968**Description:**The aim of this textbook is to provide students with basic knowledge of stochastic models that may apply to telecommunications research areas, such as traffic modelling, resource provisioning and traffic management. These study areas are often collectively called teletraffic. This book assumes prior knowledge of a programming language, mathematics, probability and stochastic processes normally taught in an electrical engineering course. For students who have some but not sufficiently strong back... read more »## Further Results On The Observability Analysis And Observer Design For Single Range Localization In 3d. Arxiv:1308.0517v3 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.0517**Description:**The issue of single range based observability analysis and observer design for the kinematics model of a 3D vehicle subject to a constant unknown drift velocity is addressed. The proposed method departs from alternative solutions to the problem and leads to the definition of a linear time invariant state equation with a linear time varying output that can be used to globally solve the original nonlinear state estimation problem with a standard Kalman filter. Simple necessary and sufficient obser... read more »## Connection Matrices And The Definability Of Graph Parameters. Arxiv:1308.3654v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.3654**Description:**In this paper we extend and prove in detail the Finite Rank Theorem for connection matrices of graph parameters definable in Monadic Second Order Logic with counting CMSOL from B. Godlin, T. Kotek and J.A. Makowsky 2008 and J.A. Makowsky 2009 . We demonstrate its vast applicability in simplifying known and new non-definability results of graph properties and finding new non-definability results for graph parameters. We also prove a Feferman-Vaught Theorem for the logic CFOL, First Order Logic wi... read more »## A General Definition Of The Big-oh Notation For Algorithm Analysis. Arxiv:1309.3210v9 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.3210**Description:**We show that the O -notation, as it is currently defined, fails to compose, and therefore is not suitable for algorithm analysis. We characterize the conditions under which this failure happens. We then list 23 desirable properties for an O -notation, and reduce them to 9 primitive properties which imply the other properties. We prove that the primitive properties are equivalent to the definition of the O -notation as linear dominance. We define the O -mappings as a general tool for manipulating... read more »## Abelian Networks I. Foundations And Examples. Arxiv:1309.3445v2 Cs.fl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.3445**Description:**In Deepak Dhar's model of abelian distributed processors, automata occupy the vertices of a graph and communicate via the edges. We show that two simple axioms ensure that the final output does not depend on the order in which the automata process their inputs. A collection of automata obeying these axioms is called an "abelian network". We prove a least action principle for abelian networks. As an application, we show how abelian networks can solve certain linear and nonlinear integer... read more »## Faithful Implementations Of Distributed Algorithms And Control Laws. Arxiv:1309.4372v3 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.4372**Description:**When a distributed algorithm is executed by strategic agents with misaligned interests, a social leader needs to design appropriate tax/subsidy mechanisms to incentivize agents to faithfully implement the intended algorithms so that the socially optimal outcome is obtained. We discuss this issue in the framework of the indirect mechanism design theory. In particular, we show that indirect Groves mechanisms are not only sufficient but also necessary for this purpose, which is a reminiscent of the... read more »## A Classification Of Configuration Spaces Of Planar Robot Arms With Application To A Continuous Inverse Kinematics Problem. Arxiv:1309.7960v2 Math.dg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.7960**Description:**Using results on the topology of moduli space of polygons Jaggi, 92; Kapovich and Millson, 94 , it can be shown that for a planar robot arm with n segments there are some values of the base-length, z , at which the configuration space of the constrained arm arm with its end effector fixed has two disconnected components, while at other values the constrained configuration space has one connected component. We first review some of these known results. Then the main design problem addressed in thi... read more »## Moser's Shadow Problem. Arxiv:1310.4345v2 Math.mg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.4345**Description:**Moser's shadow problem asks to find the best function f_ b n with the property that for each bounded convex polyhedron P in 3 -space with n vertices there is some direction bf v depending on P such that when illuminated by parallel light rays from infinity in direction bf v the polyhedron casts a shadow having at least f_ b n vertices. This paper shows that f_ b n = Theta big log n / log log n big . It also shows that the best function f n that every bounded or unbounded polyhedron with n vertic... read more »## A Model For Adversarial Wiretap Channel. Arxiv:1312.6457v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.6457**Description:**In wiretap model of secure communication the goal is to provide asymptotic perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted attention in recent years because it captures eavesdropping attack in wireless communication. The wiretap adversary is a passive eavesdropping adversary at the physi... read more »## "information-friction" And Its Implications On Minimum Energy Required For Communication. Arxiv:1401.1059v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.1059**Description:**Just as there are frictional losses associated with moving masses on a surface, what if there were frictional losses associated with moving information on a substrate Indeed, many modes of communication suffer from such frictional losses. We propose to model these losses as proportional to "bit-meters," i.e., the product of mass of information i.e., the number of bits and the distance of information transport. We use this "information- friction" model to understand fundamenta... read more »## Graph Cuts With Interacting Edge Costs - Examples, Approximations, And Algorithms. Arxiv:1402.0240v3 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1402.0240**Description:**We study an extension of the classical graph cut problem, wherein we replace the modular sum of edge weights cost function by a submodular set function defined over graph edges. Special cases of this problem have appeared in different applications in signal processing, machine learning and computer vision. In this paper, we connect these applications via the generic formulation of "cooperative graph cuts", for which we study complexity, algorithms and connections to polymatroidal netwo... read more »## Joint Routing And Stdma-based Scheduling To Minimize Delays In Grid Wireless Sensor Networks. Arxiv:1402.7017v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1402.7017**Description:**In this report, we study the issue of delay optimization and energy efficiency in grid wireless sensor networks WSNs . We focus on STDMA Spatial Reuse TDMA scheduling, where a predefined cycle is repeated, and where each node has fixed transmission opportunities during specific slots defined by colors . We assume a STDMA algorithm that takes advantage of the regularity of grid topology to also provide a spatially periodic coloring "tiling" of the same color pattern . In this setting, t... read more »## A Suffix Tree Or Not A Suffix Tree . Arxiv:1403.1364v3 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.1364**Description:**In this paper we study the structure of suffix trees. Given an unlabeled tree tau on n nodes and suffix links of its internal nodes, we ask the question "Is tau a suffix tree ", i.e., is there a string S whose suffix tree has the same topological structure as tau We place no restrictions on S , in particular we do not require that S ends with a unique symbol. This corresponds to considering the more general definition of implicit or extended suffix trees. Such general suffix trees have... read more »## Adversarial Wiretap Channel With Public Discussion. Arxiv:1403.5598v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.5598**Description:**We consider a model of adversarial wiretap channel where an adversary selects a fraction rho_r of a transmitted codeword to read, and selects a fraction rho_w of the codeword, to "add" adversarial error to. This model captures jamming adversaries with partial access to the wireless channel, as well as adversaries that partially control paths in networks. An epsilon, delta - mathsf AWTP protocol transmits messages from Alice to Bob, guaranteeing that the privacy loss of the transmitted ... read more »## Spectral Sparse Representation For Clustering: Evolved From Pca, K-means, Laplacian Eigenmap, And Ratio Cut. Arxiv:1403.6290v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.6290**Description:**Dimensionality reduction methods, e.g. PCA and Laplacian eigenmap LE , and cluster analysis methods, e.g. K-means and ratio cut Rcut , are two kinds of widely-used unsupervised data analysis tools. The former concerns high representation fidelity, while the latter semantics. Some preliminary relations between these methods have been established in the literature, but they are not yet integrated into a unified framework. In this paper, we show that under an ideal condition, the four methods: PCA,... read more »## Geometric Random Edge. Arxiv:1404.1568v4 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.1568**Description:**We show that a variant of the random-edge pivoting rule results in a strongly polynomial time simplex algorithm for linear programs max c^Tx colon Ax leq b , whose constraint matrix A satisfies a geometric property introduced by Brunsch and R "oglin: The sine of the angle of a row of A to a hyperplane spanned by n-1 other rows of A is at least delta . This property is a geometric generalization of A being integral and all sub-determinants of A being bounded by Delta in absolute value since ... read more »## Analyzing Android Browser Apps For File:// Vulnerabilities. Arxiv:1404.4553v3 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.4553**Description:**Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated syst... read more »## Service-constraint Based Truthful Incentive Mechanisms For Crowd Sensing. Arxiv:1404.6013v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.6013**Description:**Crowd sensing is a new paradigm which leverages the pervasive smartphones to efficiently collect and upload sensing data, enabling numerous novel applications. To achieve good service quality for a crowd sensing application, incentive mechanisms are necessary for attracting more user participation. Most of existing mechanisms apply only for the budget-constraint scenario where the platform the crowd sensing organizer has a budget limit. On the contrary, we focus on a different scenario where the... read more »## Fast Synchronization Of Random Automata. Arxiv:1404.6962v2 Cs.fl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.6962**Description:**A synchronizing word for an automaton is a word that brings that automaton into one and the same state, regardless of the starting position. Cerny conjectured in 1964 that if a n-state deterministic automaton has a synchronizing word, then it has a synchronizing word of size at most n-1 ^2. Berlinkov recently made a breakthrough in the probabilistic analysis of synchronization by proving that with high probability, an automaton has a synchronizing word. In this article, we prove that with high p... read more »## When Push Comes To Shove Verbs Are Constrained By Articulatory Gestures. Arxiv:1405.1359v2 Cs.cl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.1359**Description:**The ability to predict which patterns are formed in brain scans when imagining a celery or an airplane, based on how these concepts as words co-occur in texts, suggests that it is possible to model mental representations based on word statistics. Whether counting how frequently nouns and verbs combine in Google search queries, or extracting eigenvectors from matrices made up of Wikipedia lines and Shakespeare plots, these latent semantics approximate the associative links that form concepts. How... read more »## On The Relation Between The Randomized Extended Kaczmarz Algorithm And Coordinate Descent. Arxiv:1405.6920v2 Math.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.6920**Description:**In this note we compare the randomized extended Kaczmarz EK algorithm and randomized coordinate descent CD for solving the full-rank overdetermined linear least-squares problem and prove that CD needs less operations for satisfying the same residual-related termination criteria. For the general least-squares problems, we show that running first CD to compute the residual and then standard Kaczmarz on the resulting consistent system is more efficient than EK. read more »## Multiscale Fields Of Patterns. Arxiv:1406.0924v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.0924**Description:**We describe a general framework for representing and learning high-order image models that can be used in a variety of applications. The approach involves modeling local patterns in a multiscale representation of an image. Local properties of a coarse image capture non-local properties of the original image. In the case of binary images local properties are defined in terms of binary patterns observed over small neighborhoods around each pixel. With the multiscale representation we capture the f... read more »## Deterministic Polynomial-time Test For Prime Ideals In A Dedekind Domain With Finite Rank. Arxiv:1406.3523v3 Math.ra Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.3523**Description:**We describe a deterministic polynomial-time test that determining whether a nonzero ideal is a prime ideal in a Dedekind domain with finite rank. The techniques which we used are basis representation of finite rings and the Hermite and Smith normal forms. read more »## 3d Shapenets For 2.5d Object Recognition And Next-best-view Prediction. Arxiv:1406.5670v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.5670**Description:**3D shape is a crucial but heavily underutilized cue in object recognition, mostly due to the lack of a good generic shape representation. With the recent boost of inexpensive 2.5D depth sensors e.g. Microsoft Kinect , it is even more urgent to have a useful 3D shape model in an object recognition pipeline. Furthermore, when the recognition has low confidence, it is important to have a fail-safe mode for object recognition systems to intelligently choose the best view to obtain extra observation ... read more »## Knet: A General Framework For Learning Word Embedding Using Morphological Knowledge. Arxiv:1407.1687v2 Cs.cl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1687**Description:**Neural network techniques are widely applied to obtain high-quality distributed representations of words, i.e., word embeddings, to address text mining, information retrieval, and natural language processing tasks. Recently, efficient methods have been proposed to learn word embeddings from context that captures both semantic and syntactic relationships between words. However, it is challenging to handle unseen words or rare words with insufficient context. In this paper, inspired by the study o... read more »## Computable Jordan Decomposition Of Linear Continuous Functionals On C 0;1 . Arxiv:1407.3679v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.3679**Description:**By the Riesz representation theorem using the Riemann-Stieltjes integral, linear continuous functionals on the set of continuous functions from the unit interval into the reals can either be characterized by functions of bounded variation from the unit interval into the reals, or by signed measures on the Borel-subsets. Each of these objects has an even minimal Jordan decomposition into non-negative or non-decreasing objects. Using the representation approach to computable analysis, a computable... read more »## Probabilistic Opacity For Markov Decision Processes. Arxiv:1407.4225v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.4225**Description:**Opacity is a generic security property, that has been defined on non probabilistic transition systems and later on Markov chains with labels. For a secret predicate, given as a subset of runs, and a function describing the view of an external observer, the value of interest for opacity is a measure of the set of runs disclosing the secret. We extend this definition to the richer framework of Markov decision processes, where non deterministic choice is combined with probabilistic transitions, and... read more »## Online Packet-routing In Grids With Bounded Buffers. Arxiv:1407.4498v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.4498**Description:**We present deterministic and randomized algorithms for the problem of online packet routing in grids in the competitive network throughput model cite AKOR . In this model the network has nodes with bounded buffers and bounded link capacities. The goal in this model is to maximize the throughput, i.e., the number of delivered packets. Our deterministic algorithm is the first online algorithm with an O left log^ O 1 n right competitive ratio for uni-directional grids where n denotes the size of th... read more »## Priority-based Coordination Of Autonomous And Legacy Vehicles At Intersection. Arxiv:1407.5813v2 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.5813**Description:**Recently, researchers have proposed various autonomous intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to support legacy vehicles without compromising above-mentioned features. We make the hypothesis that legacy vehicles are able to kee... read more »## Who Negatively Influences Me Formalizing Diffusion Dynamics Of Negative Exposure Leading To Student Attrition In Moocs. Arxiv:1407.7133v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.7133**Description:**In this work, we explain the underlying interaction mechanisms which govern students' influence on each other in Massive Open Online Courses MOOCs . Specifically, we outline different ways in which students can be negatively exposed to their peers on MOOC forums and discuss a simple formulation of learning network diffusion, which formalizes the essence of how such an influence spreads and can potentially lead to student attrition over time. We also view the limitations of our student modeling i... read more »## Volumes Of Logistic Regression Models With Applications To Model Selection. Arxiv:1408.0881v2 Math.st Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.0881**Description:**The Fisher information metric is the unique Riemannian metric for statistical models which is invariant under certain natural transformations, so the corresponding geometry is likely to be important and useful for studying these models. In this paper, we focus on logistic regression models and the simplest geometric invariant, the volume. We show that the volume of a logistic regression model with n observations and q linearly-independent covariates is bounded below by pi^q and above by n choose... read more »## Second-order Asymptotics For The Discrete Memoryless Mac With Degraded Message Sets. Arxiv:1408.1119v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.1119**Description:**This paper studies the second-order asymptotics of the discrete memoryless multiple-access channel with degraded message sets. For a fixed average error probability epsilon in 0,1 and an arbitrary point on the boundary of the capacity region, we characterize the speed of convergence of rate pairs that converge to that point for codes that have asymptotic error probability no larger than epsilon , thus complementing an analogous result given previously for the Gaussian setting. read more »## Hopc: Histogram Of Oriented Principal Components Of 3d Pointclouds For Action Recognition. Arxiv:1408.3809v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.3809**Description:**Existing techniques for 3D action recognition are sensitive to viewpoint variations because they extract features from depth images which change significantly with viewpoint. In contrast, we directly process the pointclouds and propose a new technique for action recognition which is more robust to noise, action speed and viewpoint variations. Our technique consists of a novel descriptor and keypoint detection algorithm. The proposed descriptor is extracted at a point by encoding the Histogram of... read more »## Are Topic-specific Search Term, Journal Name And Author Name Recommendations Relevant For Researchers . Arxiv:1408.4440v2 Cs.dl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.4440**Description:**In this paper we describe a case study where researchers in the social sciences n=19 assess topical relevance for controlled search terms, journal names and author names which have been compiled automatically by bibliometric-enhanced information retrieval IR services. We call these bibliometric-enhanced IR services Search Term Recommender STR , Journal Name Recommender JNR and Author Name Recommender ANR in this paper. The researchers in our study practitioners, PhD students and postdocs were as... read more »## Quantitative Analysis Of Genealogy Using Digitised Family Trees. Arxiv:1408.5571v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.5571**Description:**Driven by the popularity of television shows such as Who Do You Think You Are many millions of users have uploaded their family tree to web projects such as WikiTree. Analysis of this corpus enables us to investigate genealogy computationally. The study of heritage in the social sciences has led to an increased understanding of ancestry and descent but such efforts are hampered by difficult to access data. Genealogical research is typically a tedious process involving trawling through sources su... read more »## Improved Distributed Principal Component Analysis. Arxiv:1408.5823v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.5823**Description:**We study the distributed computing setting in which there are multiple servers, each holding a set of points, who wish to compute functions on the union of their point sets. A key task in this setting is Principal Component Analysis PCA , in which the servers would like to compute a low dimensional subspace capturing as much of the variance of the union of their point sets as possible. Given a procedure for approximate PCA, one can use it to approximately solve problems such as k -means clusteri... read more »## A Lightweight Identification Protocol For Embedded Devices. Arxiv:1408.5945v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.5945**Description:**The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves. In fact, we combine biometric data and asymetric cryptography, namely elliptic curves and standard tools to design a multifactor identification protocol. Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore, one can use it in any constraint device such as embedded systems. read more »## Natural Selection As An Inhibitor Of Genetic Diversity: Multiplicative Weights Updates Algorithm And A Conjecture Of Haploid Genetics. Arxiv:1408.6270v2 Math.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6270**Description:**In a recent series of papers a surprisingly strong connection was discovered between standard models of evolution in mathematical biology and Multiplicative Weights Updates Algorithm, a ubiquitous model of online learning and optimization. These papers establish that mathematical models of biological evolution are tantamount to applying discrete Multiplicative Weights Updates Algorithm, a close variant of MWUA, on coordination games. This connection allows for introducing insights from the study... read more »## Multispectral Palmprint Recognition Using Textural Features. Arxiv:1408.6615v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6615**Description:**In order to use the identification means to the best extent, we need robust and fast algorithms and systems to process the data. Having palmprint as a reliable and unique characteristic of every person, we should extract its features based on its geometry, lines and angles. There are countless ways to define measures for the recognition task. To analyze a new point of view, we extracted textural features and used them for palmprint recognition. Co-occurrence matrix can be used for textural featu... read more »## Efficient Learning In Large-scale Combinatorial Semi-bandits. Arxiv:1406.7443v1 Cs.lg Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.7443**Description:**In this paper, we consider efficient learning in large-scale combinatorial semi-bandits with linear generalization, and as a solution, propose a novel learning algorithm called Randomized Combinatorial Maximization RCM . RCM is motivated by Thompson sampling, and is computationally efficient as long as the offline version of the combinatorial problem can be solved efficiently. We establish that RCM is provably statistically efficient in the coherent Gaussian case, by developing a Bayes regret bo... read more »

Sales Lead Management Rss Ronan Keating Rss Bladder Control Rss Blood Tests Rss Hotel Mallorca Rss Bed Wetting Rss Cash Payday Loan Rss Rainforest Coffee Rss Nfl Mock Draft Rss Treatment For Acne Rss Airline Miles Rss Basketball Jersey Rss Fluid Rss Koco Rss Budget Car Rss Nostril Rss Alison Krauss Rss Mortgage Residential Rss Unique Christmas Gift Rss 23 Minutes In Hell Rss Fighting Games Rss Irfanview Rss Kings Leon Rss Copy Of Birth Certificate Rss Push Rss Benidorm Rss Hoodwinked Rss Purchase Domain Name Rss Survivor Tv Rss Single Romance Rss Velcro Strap Rss Accounting Program Rss Elenco Rss Steve Earle Rss Bible Prophecy Rss Birdman Rss Buy Cheap Cialis Online Rss Food For Kids Party Rss Hewlett Packard Printers Rss Easy E Rss Software Protection Rss Ged School Rss