- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## A Public Key Cryptoscheme Using Bit-pairs And Probabilistic Mazes. Arxiv:1408.6226v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6226**Description:**The authors give the definition and property of a bit-pair shadow, and design the three algorithms of a public key cryptoscheme that is based on a multivariate permutation problem MPP and an anomalous subset product problem ASPP to which no subexponential time solutions are found so far, and regards a bit-pair as an operation unit. Further, demonstrate that the decryption algorithm is correct, deduce the probability that a plaintext solution is nonunique is nearly zero, dissect the running times... read more »## Estimation Of The New Agile Xp Process Model For Medium-scale Projects Using Industrial Case Studies. Arxiv:1408.6228v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6228**Description:**Agile is one of the terms with which software professionals are quite familiar. Agile models promote fast development to develop high quality software. XP process model is one of the most widely used and most documented agile models. XP model is meant for small-scale projects. Since XP model is a good model, therefore there is need of its extension for the development of medium and large-scale projects. XP model has certain drawbacks such as weak documentation and poor performance while adapting... read more »## Ims-based Mobile Learning System. Arxiv:1408.6229v1 Cs.cy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6229**Description:**Electronic E learning management system is not a novel idea in the educational domain. Learning management systems are used to deal with academic activities such as course syllabi, time table scheduling, assessments and project discussion forums. Almost, all the top universities of world are using general purpose/customized solutions to manage learning management systems like SAP, Oracle, Moodle and Blackboard. The aim of this paper i.e., Mobile M Learning System MLS is not to substitute the tra... read more »## A Note On The Quantum Modular Exponentiation Method Used In Shor's Factoring Algorithm. Arxiv:1408.6252v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6252**Description:**An efficient quantum modular exponentiation method is indispensible for Shor's factoring algorithm. But the Shor's original description specifies only the process a, 1 rightarrow a, x^a , mbox mod , n , where a, x, n are integers. Nielsen and Chuang specify that a rangle y rangle rightarrow a rangle U^ a_ t-1 2^ t-1 cdots U^ a_02^ 0 y rangle = a rangle x^ a_ t-1 2^ t-1 times cdots times x^ a_0 2^0 y mbox mod , n rangle = a rangle x^ a y mbox mod , n rangle where a 's binary representation is a_ ... read more »## Image Classification By Sparse Representation-based Transduction. Arxiv:1408.6257v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6257**Description:**Sparse Representation SR shows powerful discriminating power when the training samples are sufficient to construct an overcomplete dictionary. However, in the lack of training samples case, the dictionary is too small to sparsely represent the test sample which restricts the classification performance of sparse representation. In order to address this problem, we propose a new sparse representation-based classifier named Sparse Graph-based Classifier SGC via introducing graph-based transductive ... read more »## Natural Selection As An Inhibitor Of Genetic Diversity: Multiplicative Weights Updates Algorithm And A Conjecture Of Haploid Genetics. Arxiv:1408.6270v1 Math.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6270**Description:**In a recent series of papers a surprisingly strong connection was discovered between standard models of evolution in mathematical biology and Multiplicative Weights Updates Algorithm, a ubiquitous model of online learning and optimization. These papers establish that mathematical models of biological evolution are tantamount to applying discrete Multiplicative Weights Updates Algorithm, a close variant of MWUA, on coordination games. This connection allows for introducing insights from the study... read more »## Autonomous Surveying Boat. Arxiv:1408.6271v1 Cs.ro

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6271**Description:**The fresh water reservoirs are one of the main power resources of Pakistan.These water reservoirs are in the form of Tarbela Dam, Mangla Dam, Bhasha Dam,and Warsak Dam. To estimate the current power capability of the Dams, the statistical information about the water in the dam has to be clear and precise. For the purpose of water management monthly or yearly survey of the dams required. One of the important parameter is to find the water level of water, which can help us in finding the pressure ... read more »## On Symmetries Of The Strassen Algorithm. Arxiv:1408.6273v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6273**Description:**We consider the famous Strassen algorithm for fast multiplication of matrices. We show that this algorithm has a nontrivial finite group of automorphisms of order 36 namely the direct product of two copies of the symmetric group on 3 symbols , or even 72, if we consider "extended" Strassen algorithm. This is an indirect evidence that the unknown at present optimal algorithm for multiplication of two size 3 by 3 matrices also may have a large automorphism group, and this may be a fruitf... read more »## Sketch-based Influence Maximization And Computation: Scaling Up With Guarantees. Arxiv:1408.6282v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6282**Description:**Propagation of contagion through networks is a fundamental process. It is used to model the spread of information, influence, or a viral infection. Diffusion patterns can be specified by a probabilistic model, such as Independent Cascade IC , or captured by a set of representative traces. Basic computational problems in the study of diffusion are influence queries determining the potency of a specified seed set of nodes and Influence Maximization identifying the most influential seed set of a gi... read more »## Tension Bounds For Information Complexity. Arxiv:1408.6285v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6285**Description:**The main contribution of this work is to relate information complexity to "tension" Prabhakaran and Prabhakaran, 2014 - an information-theoretic quantity defined with no reference to protocols - and to illustrate that it allows deriving strong lower-bounds on information complexity. In particular, we use a very special case of this connection to give a quantitatively tighter connection between information complexity and discrepancy than the one in the work of Braverman and Weinstein 20... read more »## Function + Action = Interaction. Arxiv:1408.6290v1 Cs.hc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6290**Description:**This article presents the mathematical background of general interactive systems. The first principle of designing a large system is to _divide and conquer_, which implies that we could possibly reduce human error if we divided a large system in smaller subsystems. Interactive systems are, however, often composed of many subsystems that are _organically_ connected to one another and thus difficult to divide. In other words, we cannot apply a framework of set theory to the programming of interact... read more »## Finish Them : Pricing Algorithms For Human Computation. Arxiv:1408.6292v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6292**Description:**Given a batch of human computation tasks, a commonly ignored aspect is how the price i.e., the reward paid to human workers of these tasks must be set or varied in order to meet latency or cost constraints. Often, the price is set up-front and not modified, leading to either a much higher monetary cost than needed if the price is set too high , or to a much larger latency than expected if the price is set too low . Leveraging a pricing model from prior work, we develop algorithms to optimally se... read more »## An Inexact Newton-krylov Algorithm For Constrained Diffeomorphic Image Registration. Arxiv:1408.6299v1 Math.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6299**Description:**We propose numerical algorithms for solving large deformation diffeomorphic image registration problems. We formulate the non-rigid image registration problem as a problem of optimal control. This leads to an infinite-dimensional partial differential equation PDE constrained optimization problem. The PDE constraint consists, in its simplest form, of a hyperbolic transport equation for the evolution of the image intensity. The control variable is the velocity field. Tikhonov regularization ensure... read more »## Motif Conservation Laws For The Configuration Model. Arxiv:1408.6303v1 Q-bio.mn

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6303**Description:**The observation that some subgraphs, called motifs, appear more often in real networks than in their randomized counterparts has attracted much attention in the scientific community. In the prevalent approach the detection of motifs is based on comparing subgraph counts in a network with their counterparts in the configuration model with the same degree distribution as the network. In this short note we derive conservation laws that relate motif counts in the configuration model. read more »## A Note On Cross Correlation Distribution Of Ternary M-sequences. Arxiv:1408.6311v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6311**Description:**In this note, we prove a conjecture proposed by Tao Zhang, Shuxing Li, Tao Feng and Gennian Ge, IEEE Transaction on Information Theory, vol. 60, no. 5, May 2014. This conjecture is about the cross correlation distribution of ternary m -sequences. read more »## 2048 Is Pspace Hard, But Sometimes Easy. Arxiv:1408.6315v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6315**Description:**We prove that a variant of 2048, a popular online puzzle game, is PSPACE-Complete. Our hardness result holds for a version of the problem where the player has oracle access to the computer player's moves. Specifically, we show that for an n times n game board mathcal G , computing a sequence of moves to reach a particular configuration mathbb C from an initial configuration mathbb C _0 is PSPACE-Complete. Our reduction is from Nondeterministic Constraint Logic NCL . We also show that determining... read more »## Crossing Minimization For 1-page And 2-page Drawings Of Graphs With Bounded Treewidth. Arxiv:1408.6321v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6321**Description:**We investigate crossing minimization for 1-page and 2-page book drawings. We show that computing the 1-page crossing number is fixed-parameter tractable with respect to the number of crossings, that testing 2-page planarity is fixed-parameter tractable with respect to treewidth, and that computing the 2-page crossing number is fixed-parameter tractable with respect to the sum of the number of crossings and the treewidth of the input graph. We prove these results via Courcelle's theorem on the fi... read more »## A Generic And Extensible Framework For Monitoring Energy Consumption Of Openstack Clouds. Arxiv:1408.6328v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6328**Description:**Although cloud computing has been transformational to the IT industry, it is built on large data centres that often consume massive amounts of electrical power. Efforts have been made to reduce the energy clouds consume, with certain data centres now approaching a Power Usage Effectiveness PUE factor of 1.08. While this is an incredible mark, it also means that the IT infrastructure accounts for a large part of the power consumed by a data centre. Hence, means to monitor and analyse how energy i... read more »## A Constructive Proof Presenting Languages In Sigma_2^p That Cannot Be Decided By Circuit Families Of Size N^k . Arxiv:1408.6334v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6334**Description:**As far as I know, at the time that I originally devised this result 1998 , this was the first constructive proof that, for any integer k , there is a language in Sigma_2^P that cannot be simulated by a family of logic circuits of size n^k . However, this result had previously been proved non-constructively: see Cai and Watanabe CW08 for more information on the history of this problem. This constructive proof is based upon constructing a language Gamma derived from the satisfiabiility problem, an... read more »## Compression, Restoration, Re-sampling, Compressive Sensing: Fast Transforms In Digital Imaging. Arxiv:1408.6335v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6335**Description:**Transform image processing methods are methods that work in domains of image transforms, such as Discrete Fourier, Discrete Cosine, Wavelet and alike. They are the basic tool in image compression, in image restoration, in image re-sampling and geometrical transformations and can be traced back to early 1970-ths. The paper presents a review of these methods with emphasis on their comparison and relationships, from the very first steps of transform image compression methods to adaptive and local a... read more »## Mor Cryptosystem And Classical Chevalley Groups In Odd Characteristic. Arxiv:1408.6340v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6340**Description:**In this paper we study the MOR cryptosystem using finite classical Chevalley groups over a finite field of odd characteristic. In the process we develop an algorithm for these Chevalley groups in the same spirit as the row-column operation for special linear group. We focus our study on orthogonal and symplectic groups. We find the hardness of the proposed MOR cryptosystem for these groups. read more »## Design And Implementation Of Parallel Debugger And Profiler For Mpj Express. Arxiv:1408.6347v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6347**Description:**MPJ Express is a messaging system that allows computational scientists to write and execute parallel Java applications on High Performance Computing HPC hardware. Despite its successful adoption in the Java HPC community, the MPJ Express software currently does not provide any support for debugging and profiling parallel applications and hence forces its users to rely on manual and tedious debugging/profiling methods. Support for such tools is essential to help application developers increase th... read more »## Definition And Properties To Assess Multi-agent Environments As Social Intelligence Tests. Arxiv:1408.6350v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6350**Description:**Social intelligence in natural and artificial systems is usually measured by the evaluation of associated traits or tasks that are deemed to represent some facets of social behaviour. The amalgamation of these traits is then used to configure the intuitive notion of social intelligence. Instead, in this paper we start from a parametrised definition of social intelligence as the expected performance in a set of environments with several agents, and we assess and derive tests from it. This definit... read more »## Canonicity Results For Mu-calculi: An Algorithmic Approach. Arxiv:1408.6367v1 Math.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6367**Description:**We investigate the canonicity of inequalities of the intuitionistic mu-calculus. The notion of canonicity in the presence of fixed point operators is not entirely straightforward. In the algebraic setting of canonical extensions we examine both the usual notion of canonicity and what we will call tame canonicity. This latter concept has previously been investigated for the classical mu-calculus by Bezhanishvili and Hodkinson. Our approach is in the spirit of Sahlqvist theory. That is, we identif... read more »## Optimal Linear Precoding In Multi-user Mimo Systems: A Large System Analysis. Arxiv:1408.6369v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6369**Description:**We consider the downlink of a single-cell multi-user MIMO system in which the base station makes use of N antennas to communicate with K single-antenna user equipments UEs randomly positioned in the coverage area. In particular, we focus on the problem of designing the optimal linear precoding for minimizing the total power consumption while satisfying a set of target signal-to-interference-plus-noise ratios SINRs . To gain insights into the structure of the optimal solution and reduce the compu... read more »## Concurrent Cuba. Arxiv:1408.6373v1 Physics.comp-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6373**Description:**The parallel version of the multidimensional numerical integration package Cuba is presented and achievable speed-ups discussed. read more »## Push Is Fast On Sparse Random Graphs. Arxiv:1408.6378v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6378**Description:**We consider the classical push broadcast process on a large class of sparse random multigraphs that includes random power law graphs and multigraphs. Our analysis shows that for every varepsilon>0 , whp O log n rounds are sufficient to inform all but an varepsilon -fraction of the vertices. It is not hard to see that, e.g. for random power law graphs, the push process needs whp n^ Omega 1 rounds to inform all vertices. Fountoulakis, Panagiotou and Sauerwald proved that for random graphs that ... read more »## Long Term Throughput And Approximate Capacity Of Transmitter-receiver Energy Harvesting Channel With Fading. Arxiv:1408.6385v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6385**Description:**We first consider an energy harvesting channel with fading, where only the transmitter harvests energy from natural sources. We bound the optimal long term throughput by a constant for a class of energy arrival distributions. The proposed method also gives a constant approximation to the capacity of the energy harvesting channel with fading. Next, we consider a more general system where both the transmitter and the receiver employ energy harvesting to power themselves. In this case, we show that... read more »## A Linear Kernel For Planar Red-blue Dominating Set. Arxiv:1408.6388v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6388**Description:**In the Red-Blue Dominating Set problem, we are given a bipartite graph G = V_B cup V_R,E and an integer k , and asked whether G has a subset D subseteq V_B of at most k "blue" vertices such that each "red" vertex from V_R is adjacent to a vertex in D . We provide the first explicit linear kernel for this problem on planar graphs, of size at most 46k . read more »## Bridging The Semantic Gap Between Rdf And Sparql Using Completeness Statements Extended Version . Arxiv:1408.6395v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6395**Description:**RDF data is often treated as incomplete, following the Open-World Assumption. On the other hand, SPARQL, the standard query language over RDF, usually follows the Closed-World Assumption, assuming RDF data to be complete. This gives rise to a semantic gap between RDF and SPARQL. In this paper, we address how to close the semantic gap between RDF and SPARQL in terms of certain answers and possible answers using completeness statements. read more »## Video In Sentences Out. Arxiv:1408.6418v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6418**Description:**We present a system that produces sentential descriptions of video: who did what to whom, and where and how they did it. Action class is rendered as a verb, participant objects as noun phrases, properties of those objects as adjectival modifiers in those noun phrases, spatial relations between those participants as prepositional phrases, and characteristics of the event as prepositional-phrase adjuncts and adverbial modifiers. Extracting the information needed to render these linguistic entities... read more »## Achievable Degrees-of-freedom Through Blind Interference Alignment Using Staggered Antenna Switching For The K-user Siso Interference Channel. Arxiv:1408.6427v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6427**Description:**In this letter, we present the first characterization for the achievable Degrees-of-Freedom DoF by Blind Interference Alignment BIA using staggered antenna switching in the K -user Gaussian Interference Channel. In such scheme, each transmitter is equipped with one conventional antenna and each receiver is equipped with one reconfigurable multi-mode antenna. Assuming that the channel is known to the receivers only, we show that BIA can achieve frac 2K K+2 DoF, which surpasses the sum DoF achieve... read more »## Sensor Noise Rejection. Arxiv:1408.6434v1 Stat.ap

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6434**Description:**An inaccessible control architecture caused an undesirable influence on a UAV. The encountered noise in the performance was modeled using stochastic methods and a corrective term was implemented on an external controller. Our findings suggest that the sonar noise problem is unconventional may warrant the development of a new methodology. read more »## A Note On The Ranking Of Saudi Arabian Universities Based On Highlycited.com. Arxiv:1408.6438v1 Cs.dl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6438**Description:**Recently, Thomson Reuters has published its 2014 list of highly cited researchers HCRs 1 . Initial studies over the list 2 suggested that some universities for instance, King Abdulaziz University in Saudi Arabia may have been manipulating its world ranking by contracting with highly cited researchers. In this work, we analyse the ranking of other Saudi universities based solely on the list. Our analysis suggests that other universities in Saudi Arabia do not follow the steps of King Abdulaziz Un... read more »## Public Spheres In Twitter- And Blogosphere. Evidence From The Us. Arxiv:1408.6451v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6451**Description:**The political requires a forum for its deliberation and Habermas has located it in the public spheres. Originally, mass media's role was one of a facilitator of these debates. However, under the immense pressures of free market competition and mobile audiences, mass media prefers episodic over thematic news. On the opposite end of the spectrum, social media has been heralded as a new forum, a reincarnation of the ailing public spheres to further the deliberation of the political. But do the foll... read more »## Modeling Non-progressive Phenomena For Influence Propagation. Arxiv:1408.6466v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6466**Description:**Recent work on modeling influence propagation focus on progressive models, i.e., once a node is influenced active the node stays in that state and cannot become inactive. However, this assumption is unrealistic in many settings where nodes can transition between active and inactive states. For instance, a user of a social network may stop using an app and become inactive, but again activate when instigated by a friend, or when the app adds a new feature or releases a new version. In this work, w... read more »## Developments In Formal Proofs. Arxiv:1408.6474v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6474**Description:**This report describes three particular technological advances in formal proofs. The HOL Light proof assistant will be used to illustrate the design of a highly reliable system. Today, proof assistants can verify large bodies of advanced mathematics; and as an example, we turn to the formal proof in Coq of the Feit-Thompson Odd Order theorem in group theory. Finally, we discuss advances in the automation of formal proofs, as implemented in proof assistants such as Mizar, Coq, Isabelle, and HOL Li... read more »## Sets, The Axiom Of Choice, And All That: A Tutorial. Arxiv:1408.6475v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6475**Description:**This tutorial deal with the Axiom of Choice and some of its applications to topics related to Computer Science. We will see that the Axiom of Choice is equivalent to some well-known proof principles like Zorn's Lemma or Tuckey's Maximality Principle. We try to touch upon some topics, which appear to be important for developing mathematical structures within computer science. read more »## Tree Games With Regular Objectives. Arxiv:1408.6477v1 Cs.lo

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6477**Description:**We study tree games developed recently by Matteo Mio as a game interpretation of the probabilistic mu -calculus. With expressive power comes complexity. Mio showed that tree games are able to encode Blackwell games and, consequently, are not determined under deterministic strategies. We show that non-stochastic tree games with objectives recognisable by so-called game automata are determined under deterministic, finite memory strategies. Moreover, we give an elementary algorithmic procedure whic... read more »## Finding Maximum K-cliques Faster Using Lazy Global Domination. Arxiv:1408.6485v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6485**Description:**A clique in a graph is a set of vertices, each of which is adjacent to every other vertex in this set. A k-clique relaxes this requirement, requiring vertices to be within a distance k of each other, rather than directly adjacent. In theory, a maximum clique algorithm can easily be adapted to solve the maximum k-clique problem. We use a state of the art maximum clique algorithm to show that this is feasible in practice, and introduce a lazy global domination rule which sometimes vastly reduces t... read more »## A Note On Turing Degree Spectra Of Minimal Subshifts. Arxiv:1408.6487v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6487**Description:**Subshifts are shift invariant closed subsets of Sigma^ mathbb Z ^d , minimal subshifts are subshifts in which all points contain the same patterns. It has been proved by Jeandel and Vanier that the Turing degree spectra of non-periodic minimal subshifts always contain the cone of Turing degrees above any of its degree. It was however not known whether each minimal subshift's spectrum was formed of exactly one cone or not. We construct inductively a minimal subshift whose spectrum consists of an ... read more »## Automated Experiments On Ad Privacy Settings: A Tale Of Opacity, Choice, And Discrimination. Arxiv:1408.6491v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6491**Description:**To partly address people's concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. We present AdFisher, an automated tool that explores how user behaviors, Google's ads, and Ad Settings interact. Our tool uses a rigorous experimental design and analysis to ensure the statistical significance of our results. It uses machine learning to automate the selection of a statistical test. We use AdFishe... read more »## Adaptive Quadrature Detection For Multicarrier Continuous-variable Quantum Key Distribution. Arxiv:1408.6493v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6493**Description:**We propose the adaptive quadrature detection for multicarrier continuous-variable quantum key distribution CVQKD . A multicarrier CVQKD scheme uses Gaussian subcarrier continuous variables for the information conveying and Gaussian sub-channels for the transmission. The proposed multicarrier detection scheme dynamically adapts to the sub-channel conditions using a corresponding statistics which is provided by our sophisticated sub-channel estimation procedure. The sub-channel estimation phase de... read more »## Fft, Fmm, Or Multigrid A Comparative Study Of State-of-the-art Poisson Solvers. Arxiv:1408.6497v1 Math.na

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6497**Description:**We discuss the fast solution of the Poisson problem on a unit cube. We benchmark the performance of the most scalable methods for the Poisson problem: the Fast Fourier Transform FFT , the Fast Multipole Method FMM , the geometric multigrid GMG and algebraic multigrid AMG . The GMG and FMM are novel parallel schemes using high-order approximation for Poisson problems developed in our group. The FFT code is from P3DFFT library and AMG code from ML Trilinos library. We examine and report results fo... read more »## The Binary Energy Harvesting Channel With A Unit-sized Battery. Arxiv:1408.6504v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6504**Description:**We consider a binary energy harvesting communication channel with a finite-sized battery at the transmitter. In this model, the channel input is constrained by the available energy at each channel use, which is driven by an external energy harvesting process, the size of the battery, and the previous channel inputs. We consider an abstraction where energy is harvested in binary units and stored in a battery with the capacity of a single unit, and the channel inputs are binary. Viewing the availa... read more »## Knapsack Problems In Products Of Groups. Arxiv:1408.6509v1 Math.gr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6509**Description:**The classic knapsack and related problems have natural generalizations to arbitrary non-commutative groups, collectively called knapsack-type problems in groups. We study the effect of free and direct products on their time complexity. We show that free products in certain sense preserve time complexity of knapsack-type problems, while direct products may amplify it. read more »## Constructing Linear Encoders With Good Spectra. Arxiv:0909.3131v11 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/0909.3131**Description:**Linear encoders with good joint spectra are suitable candidates for optimal lossless joint source-channel coding JSCC , where the joint spectrum is a variant of the input-output complete weight distribution and is considered good if it is close to the average joint spectrum of all linear encoders of the same coding rate . In spite of their existence, little is known on how to construct such encoders in practice. This paper is devoted to their construction. In particular, two families of linear e... read more »## Ambiguity Of Omega -languages Of Turing Machines. Arxiv:1209.5669v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1209.5669**Description:**An omega -language is a set of infinite words over a finite alphabet X. We consider the class of recursive omega -languages, i.e. the class of omega -languages accepted by Turing machines with a B "uchi acceptance condition, which is also the class Sigma 11 of effective analytic subsets of X omega for some finite alphabet X. We investigate here the notion of ambiguity for recursive omega -languages with regard to acceptance by B "uchi Turing machines. We first present in detail essenti... read more »## Shortest, Fastest, And Foremost Broadcast In Dynamic Networks. Arxiv:1210.3277v5 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1210.3277**Description:**Highly dynamic networks rarely offer end-to-end connectivity at a given time. Yet, connectivity in these networks can be established over time and space, based on temporal analogues of multi-hop paths also called em journeys . Attempting to optimize the selection of the journeys in these networks naturally leads to the study of three cases: shortest minimum hop , fastest minimum duration , and foremost earliest arrival journeys. Efficient centralized algorithms exists to compute all cases, when ... read more »## Local Privacy, Data Processing Inequalities, And Statistical Minimax Rates. Arxiv:1302.3203v4 Math.st Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1302.3203**Description:**Working under a model of privacy in which data remains private even from the statistician, we study the tradeoff between privacy guarantees and the utility of the resulting statistical estimators. We prove bounds on information-theoretic quantities, including mutual information and Kullback-Leibler divergence, that depend on the privacy guarantees. When combined with standard minimax techniques, including the Le Cam, Fano, and Assouad methods, these inequalities allow for a precise characterizat... read more »## A Semantic Account Of Strong Normalization In Linear Logic. Arxiv:1304.6762v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1304.6762**Description:**We prove that given two cut free nets of linear logic, by means of their relational interpretations one can: 1 first determine whether or not the net obtained by cutting the two nets is strongly normalizable 2 then in case it is strongly normalizable compute the maximal length of the reduction sequences starting from that net. read more »## The Private Classical Capacity Of A Partially Degradable Quantum Channel. Arxiv:1305.5970v2 Quant-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1305.5970**Description:**For a partially degradable PD channel, the channel output state can be used to simulate the degraded environment state. The quantum capacity of a PD channel has been proven to be additive. Here, we show that the private classical capacity of arbitrary dimensional PD channels is equal to the quantum capacity of the channel and also single-letterizes. We prove that higher rates of private classical communication can be achieved over a PD channel in comparison to standard degradable channels. read more »## Closing The Price Of Anarchy Gap In The Interdependent Security Game. Arxiv:1308.0979v2 Cs.gt Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.0979**Description:**The reliability and security of a user in an interconnected system depends on all users' collective effort in security. Consequently, investments in security technologies by strategic users is typically modeled as a public good problem, known as the Interdependent Security IDS game. The equilibria for such games are often inefficient, as selfish users free-ride on positive externalities of others' contributions. In this paper, we present a mechanism that implements the socially optimal equilibri... read more »## Beyond Ohba's Conjecture: A Bound On The Choice Number Of K -chromatic Graphs With N Vertices. Arxiv:1308.6739v3 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.6739**Description:**Let text ch G denote the choice number of a graph G also called "list chromatic number" or "choosability" of G . Noel, Reed, and Wu proved the conjecture of Ohba that text ch G = chi G when V G le 2 chi G +1 . We extend this to a general upper bound: text ch G le max chi G , lceil V G + chi G -1 / 3 rceil . Our result is sharp for V G le 3 chi G using Ohba's examples, and it improves the best-known upper bound for text ch K_ 4, dots,4 . read more »## Optimal Embedding Of Functions For In-network Computation: Complexity Analysis And Algorithms. Arxiv:1401.2518v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.2518**Description:**We consider optimal distributed computation of a given function of distributed data. The input data nodes and the sink node that receives the function form a connected network that is described by an undirected weighted network graph. The algorithm to compute the given function is described by a weighted directed acyclic graph and is called the computation graph. An embedding defines the computation communication sequence that obtains the function at the sink. Two kinds of optimal embeddings are... read more »## Mimo Multiway Relaying With Pairwise Data Exchange: A Degrees Of Freedom Perspective. Arxiv:1401.7229v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.7229**Description:**In this paper, we study achievable degrees of freedom DoF of a multiple-input multiple-output MIMO multiway relay channel mRC where K users, each equipped with M antennas, exchange messages in a pairwise manner via a common N -antenna relay node. A novel and systematic way of joint beamforming design at the users and at the relay is proposed to align signals for efficient implementation of physical-layer network coding PNC . It is shown that, when the user number K=3 , the proposed beamforming d... read more »## Publicly Verifiable Secret Sharing Using Non-abelian Groups. Arxiv:1403.3661v3 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.3661**Description:**In his paper Stadler develops techniques for improving the security of existing secret sharing protocols by allowing to check whether the secret shares given out by the dealer are valid. In particular, the secret sharing is executed over abelian groups. In this paper we develop similar methods over non-abelian groups. read more »## Space Shuffle: A Scalable, Flexible, And High-bandwidth Data Center Network. Arxiv:1405.4697v3 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.4697**Description:**Data center applications require the network to be scalable and bandwidth-rich. Current data center network architectures often use rigid topologies to increase network bandwidth. A major limitation is that they can hardly support incremental network growth. Recent work proposes to use random interconnects to provide growth flexibility. However routing on a random topology suffers from control and data plane scalability problems, because routing decisions require global information and forwardin... read more »## Latent Kullback Leibler Control For Continuous-state Systems Using Probabilistic Graphical Models. Arxiv:1406.0993v2 Cs.sy Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.0993**Description:**Kullback Leibler KL control problems allow for efficient computation of optimal control by solving a principal eigenvector problem. However, direct applicability of such framework to continuous state-action systems is limited. In this paper, we propose to embed a KL control problem in a probabilistic graphical model where observed variables correspond to the continuous possibly high-dimensional state of the system and latent variables correspond to a discrete low-dimensional representation of th... read more »## On The Impact Of Time-varying Interference-channel On The Spatial Approach Of Spectrum Sharing Between S-band Radar And Communication System. Arxiv:1406.1169v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1406.1169**Description:**Spectrum sharing is a new approach to solve the congestion problem in the RF spectrum. A spatial approach for spectrum sharing between a radar and a communication system was proposed, which mitigates the radar interference to communication by projecting the radar waveform onto the null space of the interference channel, between radar and communication system 1 . In this work, we extend this approach to a maritime MIMO radar which experiences a time varying interference channel due to the oscilla... read more »## Toward Energy-efficient 5g Wireless Communications Technologies. Arxiv:1407.0344v4 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.0344**Description:**The densification and expansion of wireless networks pose new challenges on energy efficiency. With a drastic increase of infrastructure nodes e.g. ultra-dense deployment of small cells , the total energy consumption may easily exceed an acceptable level. While most studies focus on the energy radiated by the antennas, the bigger part of the total energy budget is actually consumed by the hardware e.g., coolers and circuit energy consumption . The ability to shutdown infrastructure nodes or part... read more »## Parameter Synthesis For Cardiac Cell Hybrid Models Using Delta-decisions. Arxiv:1407.1524v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1524**Description:**A central problem in systems biology is to identify parameter values such that a biological model satisfies some behavioral constraints eg, time series . In this paper we focus on parameter synthesis for hybrid continuous/discrete models, as many biological systems can possess multiple operational modes with specific continuous dynamics in each mode. These biological systems are naturally modeled as hybrid automata, most often with nonlinear continuous dynamics. However, hybrid automata are noto... read more »## Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors. Arxiv:1407.5659v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.5659**Description:**The rate regions of multilevel diversity coding systems MDCS , a sub-class of the broader family of multi-source multi-sink networks with special structure, are investigated. After showing how to enumerate all non-isomorphic MDCS instances of a given size, the Shannon outer bound and several achievable inner bounds based on linear codes are given for the rate region of each non-isomorphic instance. For thousands of MDCS instances, the bounds match, and hence exact rate regions are proven. Result... read more »## Larsen-elm: Selective Ensemble Of Extreme Learning Machines Using Lars For Blended Data. Arxiv:1408.2003v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2003**Description:**Extreme learning machine ELM as a neural network algorithm has shown its good performance, such as fast speed, simple structure etc, but also, weak robustness is an unavoidable defect in original ELM for blended data. We present a new machine learning framework called LARSEN-ELM for overcoming this problem. In our paper, we would like to show two key steps in LARSEN-ELM. In the first step, preprocessing, we select the input variables highly related to the output using least angle regression LARS... read more »## Rmse-elm: Recursive Model Based Selective Ensemble Of Extreme Learning Machines For Robustness Improvement. Arxiv:1408.2004v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2004**Description:**Extreme learning machine ELM as an emerging branch of shallow networks has shown its excellent generalization and fast learning speed. However, for blended data, the robustness of ELM is weak because its weights and biases of hidden nodes are set randomly. Moreover, the noisy data exert a negative effect. To solve this problem, a new framework called RMSE-ELM is proposed in this paper. It is a two-layer recursive model. In the first layer, the framework trains lots of ELMs in different groups co... read more »## Supporting Sparql Update Queries In Rdf-xml Integration. Arxiv:1408.2800v2 Cs.db Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.2800**Description:**The Web of Data encourages organizations and companies to publish their data according to the Linked Data practices and offer SPARQL endpoints. On the other hand, the dominant standard for information exchange is XML. The SPARQL2XQuery Framework focuses on the automatic translation of SPARQL queries in XQuery expressions in order to access XML data across the Web. In this paper, we outline our ongoing work on supporting update queries in the RDF-XML integration scenario. read more »## To Lie Or Not To Lie In A Subspace. Arxiv:1408.5544v2 Stat.ml Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.5544**Description:**Give deterministic necessary and sufficient conditions to guarantee that if a subspace fits certain partially observed data from a union of subspaces, it is because such data really lies in a subspace. Furthermore, Give deterministic necessary and sufficient conditions to guarantee that if a subspace fits certain partially observed data, such subspace is unique. Do this by characterizing when and only when a set of incomplete vectors behaves as a single but complete one. read more »## Enhancing Sparsity And Resolution Via Reweighted Atomic Norm Minimization. Arxiv:1408.5750v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.5750**Description:**The mathematical theory of super-resolution developed recently by Cand e s and Fernandes-Granda states that a continuous, sparse frequency spectrum can be recovered with infinite precision via a convex atomic norm technique given a set of regularly spaced time-space samples. This theory was then extended to the cases with partial/compressive samples and/or multiple measurement vectors via atomic norm minimization ANM , known as off-grid/continuous compressed sensing. However, a major problem of ... read more »## The Power Of Proofs: New Algorithms For Timed Automata Model Checking. Arxiv:1408.6104v2 Cs.fl Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6104**Description:**This paper presents the first model-checking algorithm for an expressive modal mu-calculus over timed automata, L^ mathit rel , mathit af _ nu, mu , and reports performance results for an implementation. This mu-calculus contains extended time-modality operators and can express all of TCTL. Our algorithmic approach uses an "on-the-fly" strategy based on proof search as a means of ensuring high performance for both positive and negative answers to model-checking questions. In particular... read more »## Knapsack Problems In Groups. Arxiv:1302.5671v1 Math.gr Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1302.5671**Description:**We generalize the classical knapsack and subset sum problems to arbitrary groups and study the computational complexity of these new problems. We show that these problems, as well as the bounded submonoid membership problem, are P-time decidable in hyperbolic groups and give various examples of finitely presented groups where the subset sum problem is NP-complete. read more »## Engineering Gesture-based Authentication Systems. Arxiv:1408.6010v1 Cs.cr Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1408.6010**Description:**Gestures are a topic of increasing interest in authentication and successful implementation as a security layer requires reliable gesture recognition. So far much work focuses on new ways to recognize gestures, leaving discussion on the viability of recognition in an authentication scheme to the background. It is unclear how recognition should be deployed for practical and robust real-world authentication. In this article, we analyze the effectiveness of different approaches to recognizing gestu... read more »

David Christopher Rss Http Www Nbcnews Nightly News Rss Http Www.nbcnews. Nightly News Rss Music Audio Sound Instruments Gear Rss The Strain Rss Fashion Hats Rss Instruments Gear Rss Music, Audio, Sound, Instruments Gear Rss Cook Keyboard Rss Health And Food Rss All Things Home Rss Bones Fr Rss Ice Skate Rss Iceskating Rss Ice Dance Rss Bangalore Aviation Rss The Elite Daily Rss Spotback Rss Spotback. Rss Stay At Home Dads Rss Clipped Rss Photo Journalism Rss Yearbook Rss Mib 30 Rss Http Paltelegraph Rss Hyperacusis Network Rss Philadelphia Blog Uwishunu Rss I Rock I Roll Rss Iphone News And Reviews Rss Csicop Rss Excuses Rss Artistsnetwork Rss News Ments Rss Power Management Rss Smps Rss Power Electronics Rss Girls On The Beach Rss Babes On The Beach Rss Hawaii Beach Rss Elcato Rss Systemische Rss Real Estate America Rss