- Rss Search
- Rss Feeds
- What Is Rss
- Rss Reader
- About Us
- Contact Us
- Popular Searches
- Latest Searches
- On Your Site
- [+] add to search

Feed Preview | Feed Preview |

**Link: **http://arxiv.org/

**Description: **Computer Science cs updates on the arXiv.org e-print archive

## Accurate Merging Of Images For Predictive Analysis Using Combined Image. Arxiv:1407.8176v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8176**Description:**Several Scientific and engineering applications require merging of sampled images for complex perception development. In most cases, for such requirements, images are merged at intensity level. Even though it gives fairly good perception of combined scenario of objects and scenes, it is found that they are not sufficient enough to analyze certain engineering cases. The main problem is incoherent modulation of intensity arising out of phase properties being lost. In order to compensate these loss... read more »## Exploration Vs. Exploitation In The Information Filtering Problem. Arxiv:1407.8186v1 Math.oc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8186**Description:**We consider information filtering, in which we face a stream of items too voluminous to process by hand e.g., scientific articles, blog posts, emails , and must rely on a computer system to automatically filter out irrelevant items. Such systems face the exploration vs. exploitation tradeoff, in which it may be beneficial to present an item despite a low probability of relevance, just to learn about future items with similar content. We present a Bayesian sequential decision-making model of this... read more »## Fast Bayesian Feature Selection For High Dimensional Linear Regression In Genomics Via The Ising Approximation. Arxiv:1407.8187v1 Q-bio.qm

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8187**Description:**Feature selection, identifying a subset of variables that are relevant for predicting a response, is an important and challenging component of many methods in statistics and machine learning. Feature selection is especially difficult and computationally intensive when the number of variables approaches or exceeds the number of samples, as is often the case for many genomic datasets. Here, we introduce a new approach -- the Bayesian Ising Approximation BIA -- to rapidly calculate posterior probab... read more »## Fence Patrolling By Mobile Agents With Distinct Speeds. Arxiv:1407.8194v1 Cs.cg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8194**Description:**Suppose we want to patrol a fence line segment using k mobile agents with given speeds v_1, ..., v_k so that every point on the fence is visited by an agent at least once in every unit time period. Czyzowicz et al. conjectured that the maximum length of the fence that can be patrolled is v_1 + ... + v_k /2, which is achieved by the simple strategy where each agent i moves back and forth in a segment of length v_i/2. We disprove this conjecture by a counterexample involving k = 6 agents. We also ... read more »## Two-pass Discourse Segmentation With Pairing And Global Features. Arxiv:1407.8215v1 Cs.cl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8215**Description:**Previous attempts at RST-style discourse segmentation typically adopt features centered on a single token to predict whether to insert a boundary before that token. In contrast, we develop a discourse segmenter utilizing a set of pairing features, which are centered on a pair of adjacent tokens in the sentence, by equally taking into account the information from both tokens. Moreover, we propose a novel set of global features, which encode characteristics of the segmentation as a whole, once we ... read more »## A Low-latency Control Plane For Dense Cellular Networks. Arxiv:1407.8242v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8242**Description:**In order to keep up with the increasing demands for capacity, cellular networks are becoming increasingly dense and heterogeneous. Dense deployments are expected to provide a linear capacity scaling with the number of small cells deployed due to spatial reuse gains. However in practice network capacity is severely limited in dense networks due to interference. The primary reason is that the current LTE control plane deployment model has very high latency and is unable to cope with the demand of ... read more »## Study On Flowsim And Its Application For Isolated Signal-ized Intersection Assessment. Arxiv:1407.8244v1 Cs.oh

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8244**Description:**Recently the traffic related problems have become strategically important, due to the continuously increasing vehicle number. As a result, microscopic simulation software has become an efficient method in traffic engineering for its cost-effectiveness and safety characteristics. In this paper, a new fuzzy logic based simulation software FLOWSIM is introduced, which can reflect the mixed traffic flow phenomenon in China better. The fuzzy logic based car-following model and lane-changing model are... read more »## Exponential Decay Of Reconstruction Error From Binary Measurements Of Sparse Signals. Arxiv:1407.8246v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8246**Description:**Binary measurements arise naturally in a variety of statistical and engineering applications. They may be inherent to the problem---e.g., in determining the relationship between genetics and the presence or absence of a disease---or they may be a result of extreme quantization. In one-bit compressed sensing it has recently been shown that the number of one-bit measurements required for signal estimation mirrors that of unquantized compressed sensing. Indeed, s -sparse signals in mathbb R ^n can ... read more »## Design Of Quantum Stabilizer Codes From Quadratic Residues Sets. Arxiv:1407.8249v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8249**Description:**We propose two types, namely Type-I and Type-II, quantum stabilizer codes using quadratic residue sets of prime modulus given by the form p=4n pm1 . The proposed Type-I stabilizer codes are of cyclic structure and code length N=p . They are constructed based on multi-weight circulant matrix generated from idempotent polynomial, which is obtained from a quadratic residue set. The proposed Type-II stabilizer codes are of quasi-cyclic QC structure and code length N=pk , where k is the size of a qua... read more »## Type Variability And Completeness Of Interfaces In Java Applications. Arxiv:1407.8251v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8251**Description:**Interfaces are widely used as central design elements of Java applications. Although interfaces are abstract types similar to abstract classes, the usage of interfaces in Java applications may considerably differ from the usage of abstract classes. Unlike abstract classes, interfaces are meant to enable multiple inheritance in Java programs. Hence, interfaces are meant to encode shared similarities between classes belonging to different class-type hierarchies. Therefore, it is frequent to use in... read more »## Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept. Arxiv:1407.8258v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8258**Description:**This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept. read more »## Justified Representation In Approval-based Committee Voting. Arxiv:1407.8269v1 Cs.ma

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8269**Description:**We consider approval-based committee voting in which agents approve a subset of candidates and based on the approvals, a set of winners is selected. We propose a natural axiom called justified representation that is a strengthening of unanimity. The axiom ensures that a group of agents that is large enough should have at least one approved candidate in the winning set. The concept has some better computational, fairness, and proportionality properties than some of the previous approaches for pro... read more »## Dusk: A Dual Structure-preserving Kernel For Supervised Tensor Learning With Applications To Neuroimages. Arxiv:1407.8289v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8289**Description:**With advances in data collection technologies, tensor data is assuming increasing prominence in many applications and the problem of supervised tensor learning has emerged as a topic of critical significance in the data mining and machine learning community. Conventional methods for supervised tensor learning mainly focus on learning kernels by flattening the tensor into vectors or matrices, however structural information within the tensors will be lost. In this paper, we introduce a new scheme ... read more »## Pruning Techniques For The Stochastic On-time Arrival Problem Texorpdfstring -- An Experimental Study. Arxiv:1407.8295v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8295**Description:**Computing shortest paths is one of the most researched topics in algorithm engineering. Currently available algorithms compute shortest paths in mere fractions of a second on continental sized road networks. In the presence of unreliability, however, current algorithms fail to achieve results as impressive as for the static setting. In contrast to speed-up techniques for static route planning, current implementations for the stochastic on-time arrival problem require the computationally expensiv... read more »## An Alternating Direction Method Approach To Cloud Traffic Management. Arxiv:1407.8309v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8309**Description:**In this paper, we introduce a unified framework for studying various cloud traffic management problems, ranging from geographical load balancing to backbone traffic engineering. We first abstract these real-world problems as a multi-facility resource allocation problem, and then develop two distributed optimization algorithms by exploiting the special structure of the problem. Our algorithms are inspired by Alternating Direction Method of Multipliers ADMM , enjoying a number of unique features. ... read more »## Sparse Fast Fourier Transform For Exactly And Generally K-sparse Signals By Downsampling And Sparse Recovery. Arxiv:1407.8315v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8315**Description:**Fast Fourier Transform FFT is one of the most important tools in digital signal processing. FFT costs O N log N for transforming a signal of length N. Recently, researchers at MIT have proposed Sparse Fast Fourier Transform sFFT 1 2 as a breakthrough with computational complexity O K log N and O K log N log N/K for exactly K-sparse signal with only K non-zero frequency grids and generally K-sparse signal with K significant frequency grids , respectively, to outperform classic FFT. In this paper,... read more »## An Implementation Of Web Services For Inter-connectivity Of Information Systems. Arxiv:1407.8320v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8320**Description:**As educational institutions and their departments rapidly increase, a communication between their end-users becomes more and more difficult in traditional online management systems OMS . However, the end-users, i.e., employees, teaching staff, and students are associated to different sub-domains and using different subsystems that are executed on different platforms following different administrative policies. Because of their intercommunication is not automated integrated, consequently, the ove... read more »## Zipf's Law For Word Frequencies: Word Forms Versus Lemmas In Long Texts. Arxiv:1407.8322v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8322**Description:**Zipf's law is a fundamental paradigm in the statistics of written and spoken natural language as well as in other communication systems. We raise the question of the elementary units for which Zipf's law should hold in the most natural way, studying its validity for plain word forms and for the corresponding lemma forms. In order to have as homogeneous sources as possible, we analyze some of the longest literary texts ever written, comprising four different languages, with different levels of mo... read more »## Improved Efficiency Guarantees In Auctions With Budgets. Arxiv:1407.8325v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8325**Description:**We study the efficiency guarantees in the simple auction environment where the auctioneer has one unit of a divisible good to be distributed among a number of budget constrained agents. With budget constraints, the social welfare cannot be approximated by a better factor than the number of players. Thus, we follow a recent work by Dobzinski and Leme ICALP 2014 to approximate the liquid welfare, which is the welfare of the agents each capped by her/his own budgets. We design a new truthful auctio... read more »## A New Model Of Array Grammar For Generating Connected Patterns On An Image Neighborhood. Arxiv:1407.8337v1 Cs.fl

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8337**Description:**Study of patterns on images is recognized as an important step in characterization and classification of image. The ability to efficiently analyze and describe image patterns is thus of fundamental importance. The study of syntactic methods of describing pictures has been of interest for researchers. Array Grammars can be used to represent and recognize connected patterns. In any image the patterns are recognized using connected patterns. It is very difficult to represent all connected patterns ... read more »## Combinatorial Multi-armed Bandit And Its Extension To Probabilistically Triggered Arms. Arxiv:1407.8339v1 Cs.lg

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8339**Description:**We define a general framework for a large class of combinatorial multi-armed bandit CMAB problems, where subsets of base arms with unknown distributions form super arms. In each round, a super arm is played and the base arms contained in the super arm are played and their outcomes are observed. We further consider the extension in which more based arms could be probabilistically triggered based on the outcomes of already triggered arms. The reward of the super arm depends on the outcomes of all ... read more »## Social-aware Forwarding In Opportunistic Wireless Networks: Content Awareness Or Obliviousness . Arxiv:1407.8342v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8342**Description:**With the current host-based Internet architecture, networking faces limitations in dynamic scenarios, due mostly to host mobility. The ICN paradigm mitigates such problems by releasing the need to have an end-to-end transport session established during the life time of the data transfer. Moreover, the ICN concept solves the mismatch between the Internet architecture and the way users would like to use it: currently a user needs to know the topological location of the hosts involved in the commun... read more »## On The Degrees Of Freedom Of Siso X-channel With Alternating Csit. Arxiv:1407.8348v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8348**Description:**In this paper, we establish the degrees of freedom DoF of the two-user single input single output SISO X-channel with alternating channel state information at the transmitters CSIT . Three cases are considered for the availability of CSIT; perfect, delayed and no-CSIT. Each state is associated with a fraction of time denoted by lambda_P, lambda_D and lambda_N , respectively. We provide new results for DoF of the two-user SISO X-channel when the available CSIT alternates between these three cases... read more »## Socialdtn: A Dtn Implementation For Digital And Social Inclusion. Arxiv:1407.8355v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8355**Description:**Despite of the importance of access to computers and to the Internet for the development of people and their inclusion in society, there are people that still suffer with digital divide and social exclusion. Delay/Disruption-Tolerant Networking DTN can help the digital/social inclusion of these people as it allows opportunistic and asynchronous communication, which does not depend upon networking infrastructure. We introduce SocialDTN, an implementation of the DTN architecture for Android device... read more »## The Dof Of The 3-user P,p+1 Mimo Interference Channel. Arxiv:1407.8359v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8359**Description:**The emph degrees of freedom DoF of the 3-user multiple-input multiple-output MIMO interference channel IC with full channel state information CSI and constant channel coefficients are characterized when linear filters are employed and p,p+1 antennas are deployed at the transmitters and receivers, respectively. The point of departure of this paper is the work of Wang et al, which conjectured but not proved the DoF for the configuration tackled in this work. In this work we prove the optimal DoF b... read more »## Social-aware Opportunistic Routing Protocol Based On User's Interactions And Interests. Arxiv:1407.8363v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8363**Description:**Nowadays, routing proposals must deal with a panoply of heterogeneous devices, intermittent connectivity, and the users' constant need for communication, even in rather challenging networking scenarios. Thus, we propose a Social-aware Content-based Opportunistic Routing Protocol, SCORP, that considers the users' social interaction and their interests to improve data delivery in urban, dense scenarios. Through simulations, using synthetic mobility and human traces scenarios, we compare the perfor... read more »## A Novel C2c E-commerce Recommender System Based On Link Prediction: Applying Social Network Analysis. Arxiv:1407.8365v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8365**Description:**Social network analysis emerged as an important research topic in sociology decades ago, and it has also attracted scientists from various fields of study like psychology, anthropology, geography and economics. In recent years, a significant number of researches has been conducted on using social network analysis to design e-commerce recommender systems. Most of the current recommender systems are designed for B2C e-commerce websites. This paper focuses on building a recommendation algorithm for... read more »## Opportunistic Routing Based On Daily Routines. Arxiv:1407.8368v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8368**Description:**Opportunistic routing is being investigated to enable the proliferation of low-cost wireless applications. A recent trend is looking at social structures, inferred from the social nature of human mobility, to bring messages close to a destination. To have a better picture of social structures, social-based opportunistic routing solutions should consider the dynamism of users' behavior resulting from their daily routines. We address this challenge by presenting dLife, a routing algorithm able to ... read more »## Assessment Model For Opportunistic Routing Latincom . Arxiv:1407.8372v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8372**Description:**Due to the increased capabilities of mobile devices and through wireless opportunistic contacts, users can experience new ways to share and retrieve content anywhere and anytime, even in the presence of link intermittency. Due to the significant number of available routing solutions, it is difficult to understand which one has the best performance, since all of them follow a different evaluation method. This paper proposes an assessment model, based on a new taxonomy, which comprises an evaluati... read more »## Optimal Hub Labeling Is Np-complete. Arxiv:1407.8373v1 Cs.cc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8373**Description:**Distance labeling is a preprocessing technique introduced by Peleg Journal of Graph Theory, 33 3 to speed up distance queries in large networks. Herein, each vertex receives a short label and, the distance between two vertices can be inferred from their two labels. One such preprocessing problem occurs in the hub labeling algorithm Abraham et al., SODA'10 : the label of a vertex v is a set of vertices x the "hubs" with their distance d x,v to v and the distance between any two vertices... read more »## Sli, A New Metric To Determine Success Of A Software Project. Arxiv:1407.8377v1 Cs.se

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8377**Description:**Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigation shows impact analysis of resources such as cost, time, and number of developers towards the succes... read more »## On The Completeness Of Looped-functionals Arising In The Analysis Of Periodic, Sampled-data And Hybrid Systems. Arxiv:1407.8383v1 Cs.sy

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8383**Description:**We prove that the looped-functional considered in several papers pertaining on the analysis of sampled-data, impulsive and switched systems is "complete", in the sense that it can be used to equivalently characterize a certain discrete-time stability criterion involving matrix exponentials. This result is derived for a wider class of linear systems, referred to as pseudo-periodic systems with impulses, encompassing periodic, impulsive, sampled-data and switched systems. read more »## Moneybarl: Exploiting Pitcher Decision-making Using Reinforcement Learning. Arxiv:1407.8392v1 Cs.ai

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8392**Description:**This manuscript uses machine learning techniques to exploit baseball pitchers' decision making, so-called "Baseball IQ," by modeling the at-bat information, pitch selection and counts, as a Markov Decision Process MDP . Each state of the MDP models the pitcher's current pitch selection in a Markovian fashion, conditional on the information immediately prior to making the current pitch. This includes the count prior to the previous pitch, his ensuing pitch selection, the batter's ensuin... read more »## Equilibria On A Game With Discrete Variables. Arxiv:1407.8394v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8394**Description:**Equilibrium in Economics has been seldom addressed in a situation where some variables are discrete. This work introduces a problem related to lot-sizing with several players, and analyses some strategies which are likely to be found in real world games. An illustration with a simple example is presented, with concerns about the difficulty of the problem and computation possibilities. read more »## Joint Network And Gelfand-pinsker Coding For 3-receiver Gaussian Broadcast Channels With Receiver Message Side Information. Arxiv:1407.8409v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8409**Description:**The problem of characterizing the capacity region for Gaussian broadcast channels with receiver message side information appears difficult and remains open for N ge 3 receivers. This paper proposes a joint network and Gelfand-Pinsker coding method for 3-receiver cases. Using the method, we establish a unified inner bound on the capacity region of 3-receiver Gaussian broadcast channels under general message side information configuration. The achievability proof of the inner bound uses an idea of... read more »## Social-aware Opportunistic Routing: The New Trend. Arxiv:1407.8411v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8411**Description:**Since users move around based on social relationships and interests, the resulting movement patterns can represent how nodes are socially connected i.e., nodes with strong social ties, nodes that meet occasionally by sharing the same working environment . This means that social interactions reflect personal relationships e.g., family, friends, co-workers, passers-by that may be translated into statistical contact opportunities within and between social groups over time. Such contact opportunitie... read more »## A Model For Dynamical Evolution Of Science In Space. Arxiv:1407.8422v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8422**Description:**How does the topological space of science emerge Inspired by the concept of maps of science, i.e. mapping scientific topics to a scientific space, we ask which topological structure a dynamical process of authors collaborating and publishing papers can generate. We propose a dynamical process where papers as well as new groups receive topical positions embedded in a two-dimensional euclidean space. The precise position of new papers depends on previous topics of the respective authors and is cho... read more »## Proceedings 9th Workshop On Quantum Physics And Logic. Arxiv:1407.8427v1 Quant-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8427**Description:**This volume contains the proceedings of the ninth workshop on Quantum Physics and Logic QPL2012 which took place in Brussels from the 10th to the 12th of October 2012. QPL2012 brought together researchers working on mathematical foundations of quantum physics, quantum computing, and spatio-temporal causal structures. The particular focus was on the use of logical tools, ordered algebraic and category-theoretic structures, formal languages, semantical techniques, and other computer science method... read more »## The 1-2-3-toolkit For Building Your Own Balls-into-bins Algorithm. Arxiv:1407.8433v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8433**Description:**In this work, we examine a generic class of simple distributed balls-into-bins algorithms. Exploiting the strong concentration bounds that apply to balls-into-bins games, we provide an iterative method to compute accurate estimates of the remaining balls and the load distribution after each round. Each algorithm is classified by i the load that bins accept in a given round, ii the number of messages each ball sends in a given round, and iii whether each such message is given a rank expressing th... read more »## Multiple Access Via Compute-and-forward. Arxiv:1407.8463v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8463**Description:**Lattice codes used under the Compute-and-Forward paradigm suggest an alternative strategy for the standard Gaussian multiple-access channel MAC : The receiver successively decodes integer linear combinations of the messages until it can invert and recover all messages. In this paper, this strategy is developed and analyzed. For the two-user MAC, it is shown that without time-sharing, the entire capacity region can be attained with a single-user decoder as soon as the signal-to-noise ratios are a... read more »## On The Equivalence Between Interference And Eavesdropping In Wireless Communications. Arxiv:1407.8469v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8469**Description:**We show that the problem of analyzing the outage probability in cellular systems affected by co-channel interference and background noise is mathematically equivalent to the problem of analyzing the wireless information-theoretic security in terms of the maximum secrecy rate in fading channels. Hence, these both apparently unrelated problems can be addressed by using a common approach. We illustrate the applicability of the connection unveiled herein to provide new results for the secrecy outage... read more »## Voronoi Game On Graphs. Arxiv:1407.8474v1 Cs.ds

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8474**Description:**textit Voronoi game is a geometric model of competitive facility location problem played between two players. Users are generally modeled as points uniformly distributed on a given underlying space. Each player chooses a set of points in the underlying space to place their facilities. Each user avails service from its nearest facility. Service zone of a facility consists of the set of users which are closer to it than any other facility. Payoff of each player is defined by the quantity of users ... read more »## A Comparative Study Between Seasonal Wind Speed By Fourier And Wavelet Analysis. Arxiv:1407.8476v1 Cs.ce

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8476**Description:**Wind Energy is a useful resource for Renewable energy purpose. Wind speed plays a vital role for wind energy calculation of certain location. So, it is very much necessary to know the wind speed data characteristics. In this paper fourier and wavelet transform are applied to study the wind speed data. We have compared wind speed of winter with summer by taking their speed into account using various discrete wavelets namely Haar and Daubechies-4 Db-4 . Also the periodicity of wind speed is checke... read more »## Joint Design Of Optimal Cooperative Jamming And Power Allocation For Linear Precoding. Arxiv:1407.8494v1 Cs.it

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8494**Description:**Linear precoding and cooperative jamming for multiuser broadcast channel is studied to enhance the physical layer security. We consider the system where multiple independent data streams are transmitted from the base station to multiple legitimate users with the help of a friendly jammer. It is assumed that a normalized linear precoding matrix is given at the base station, whereas the power allocated to each user is to be determined. The problem is to jointly design the power allocation across d... read more »## A Bottom-up Approach For Automatic Pancreas Segmentation In Abdominal Ct Scans. Arxiv:1407.8497v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8497**Description:**Organ segmentation is a prerequisite for a computer-aided diagnosis CAD system to detect pathologies and perform quantitative analysis. For anatomically high-variability abdominal organs such as the pancreas, previous segmentation works report low accuracies when comparing to organs like the heart or liver. In this paper, a fully-automated bottom-up method is presented for pancreas segmentation, using abdominal computed tomography CT scans. The method is based on a hierarchical two-tiered inform... read more »## Intersections Of The Hermitian Surface With Irreducible Quadrics In Even Characteristic. Arxiv:1407.8498v1 Math.co

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8498**Description:**We determine the possible intersection sizes of a Hermitian surface mathcal H with an irreducible quadric of mathrm PG 3,q^2 sharing at least a tangent plane at a common non-singular point when q is even. read more »## Twitter User Classification Using Ambient Metadata. Arxiv:1407.8499v1 Cs.si

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8499**Description:**Microblogging websites, especially Twitter have become an important means of communication, in today's time. Often these services have been found to be faster than conventional news services. With millions of users, a need was felt to classify users based on ambient metadata associated with their user accounts. We particularly look at the effectiveness of the profile description field in order to carry out the task of user classification. Our results show that such metadata can be an effective f... read more »## A Stochastic Model Of Catalytic Reaction Networks In Protocells. Arxiv:1407.8508v1 Q-bio.mn

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8508**Description:**Protocells are supposed to have played a key role in the self-organizing processes leading to the emergence of life. Existing models either i describe protocell architecture and dynamics, given the existence of sets of collectively self-replicating molecules for granted, or ii describe the emergence of the aforementioned sets from an ensemble of random molecules in a simple experimental setting e.g. a closed system or a steady-state flow reactor that does not properly describe a protocell. In th... read more »## Rti Goes Wild: Radio Tomographic Imaging For Outdoor People Detection And Localization. Arxiv:1407.8509v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8509**Description:**RF sensor networks are used to localize people indoor without requiring them to wear invasive electronic devices. These wireless mesh networks, formed by low-power radio transceivers, continuously measure the received signal strength RSS of the links. Radio Tomographic Imaging RTI is a technique that generates 2D images of the change in the electromagnetic field inside the area covered by the radio transceivers to spot the presence and movements of animates e.g., people, large animals or large m... read more »## Qpsk Waveform For Mimo Radar With Spectrum Sharing Constraints. Arxiv:1407.8510v1 Cs.ni

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8510**Description:**Multiple-input multiple-output MIMO radar is a relatively new concept in the field of radar signal processing. Many novel MIMO radar waveforms have been developed by considering various performance metrics and constraints. In this paper, we show that finite alphabet constant-envelope FACE quadrature-pulse shift keying QPSK waveforms can be designed to realize a given covariance matrix by transforming a constrained nonlinear optimization problem into an unconstrained nonlinear optimization proble... read more »## Link Overlap, Viability, And Mutual Percolation In Multiplex Networks. Arxiv:1407.8513v1 Physics.soc-ph

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8513**Description:**Many real-world complex systems are best modeled by multiplex networks. The multiplexity has proved to have broad impact on the system's structure and function. Most theoretical studies on multiplex networks to date, however, have largely ignored the effect of link overlap across layers despite strong empirical evidences for its significance. In this article, we investigate the effect of link overlap in the viability of multiplex networks, both analytically and numerically. Distinctive role of o... read more »## Integrated Erp System For Improving The Functional Efficiency Of The Organization By Customized Architecture. Arxiv:1407.8515v1 Cs.db

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8515**Description:**An ERP is a kind of package which consist front end and backend as DBMS like a collection of DBMSs. You can create DBMS to manage one aspect of your business. For example, a publishing house has a database of books that keeps information about books such as Author Name, Title, Translator Name, etc. But this database app only helps enter books data and search them. It doesn't help them, for example, sell books. They get or develop another DBMS database that has all the Books data plus prices, dis... read more »## Beyond Kernelboost. Arxiv:1407.8518v1 Cs.cv

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8518**Description:**In this Technical Report we propose a set of improvements with respect to the KernelBoost classifier presented in Becker et al., MICCAI 2013 . We start with a scheme inspired by Auto-Context, but that is suitable in situations where the lack of large training sets poses a potential problem of overfitting. The aim is to capture the interactions between neighboring image pixels to better regularize the boundaries of segmented regions. As in Auto-Context Tu et al., PAMI 2009 the segmentation proces... read more »## A Near-optimal Mechanism For Impartial Selection. Arxiv:1407.8535v1 Cs.gt

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8535**Description:**We examine strategy-proof elections to select a winner amongst a set of agents, each of whom cares only about winning. This impartial selection problem was introduced independently by Holzman and Moulin and Alon et al. Fisher and Klimm showed that the permutation mechanism is impartial and 1/2 -optimal, that is, it selects an agent who gains, in expectation, at least half the number of votes of most popular agent. Furthermore, they showed the mechanism is 7/12 -optimal if agents cannot abstain i... read more »## Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses. Arxiv:1407.8540v1 Cs.cr

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8540**Description:**A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-day exploits into existence. Attacker response to two defender temporal platform migration scheduling pol... read more »## Improving The Scalability Of Dpws-based Networked Infrastructures. Arxiv:1407.8546v1 Cs.dc

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8546**Description:**The Devices Profile for Web Services DPWS specification enables seamless discovery, configuration, and interoperability of networked devices in various settings, ranging from home automation and multimedia to manufacturing equipment and data centers. Unfortunately, the sheer simplicity of event notification mechanisms that makes it fit for resource-constrained devices, makes it hard to scale to large infrastructures with more stringent dependability requirements, ironically, where self-configura... read more »## Towards A Generic Formal Framework For Access Control Systems. Arxiv:1204.2342v2 Cs.cr Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1204.2342**Description:**There have been many proposals for access control models and authorization policy languages, which are used to inform the design of access control systems. Most, if not all, of these proposals impose restrictions on the implementation of access control systems, thereby limiting the type of authorization requests that can be processed or the structure of the authorization policies that can be specified. In this paper, we develop a formal characterization of the features of an access control model... read more »## Pebble Motion On Graphs With Rotations: Efficient Feasibility Tests And Planning Algorithms. Arxiv:1205.5263v4 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1205.5263**Description:**We study the problem of planning paths for p distinguishable pebbles robots residing on the vertices of an n -vertex connected graph with p le n . A pebble may move from a vertex to an adjacent one in a time step provided that it does not collide with other pebbles. When p = n , the only collision free moves are synchronous rotations of pebbles on disjoint cycles of the graph. We show that the feasibility of such problems is intrinsically determined by the diameter of a unique permutation group ... read more »## A Comparative Study Of Sip Overload Control Algorithms. Arxiv:1210.1505v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1210.1505**Description:**Recent collapses of SIP servers in the carrier networks indicates two potential problems of SIP: 1 the current SIP design does not easily scale up to large network sizes, and 2 the built-in SIP overload control mechanism cannot handle overload conditions effectively. In order to help carriers prevent widespread SIP network failure effectively, this chapter presents a systematic investigation of current state-of-the-art overload control algorithms. To achieve this goal, this chapter first reviews... read more »## Comp Meets Smart Grid: A New Communication And Energy Cooperation Paradigm. Arxiv:1303.2870v4 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1303.2870**Description:**In this paper, we pursue a unified study on smart grid and coordinated multi-point CoMP enabled wireless communication by investigating a new joint communication and energy cooperation approach. We consider a practical CoMP system with clustered multiple-antenna base stations BSs cooperatively communicating with multiple single-antenna mobile terminals MTs , where each BS is equipped with local renewable energy generators to supply power and also a smart meter to enable two-way energy flow with ... read more »## Improved Bounds On Sample Size For Implicit Matrix Trace Estimators. Arxiv:1308.2475v2 Cs.na Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.2475**Description:**This article is concerned with Monte-Carlo methods for the estimation of the trace of an implicitly given matrix A whose information is only available through matrix-vector products. Such a method approximates the trace by an average of N expressions of the form ww^t A ww , with random vectors ww drawn from an appropriate distribution. We prove, discuss and experiment with bounds on the number of realizations N required in order to guarantee a probabilistic bound on the relative error of the tra... read more »## Target Assignment In Robotic Networks: Distance Optimality Guarantees And Hierarchical Strategies. Arxiv:1308.3956v3 Cs.ro Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1308.3956**Description:**We study the problem of multi-robot target assignment to minimize the total distance traveled by the robots until they all reach an equal number of static targets. In the first half of the paper, we present a necessary and sufficient condition under which true distance optimality can be achieved for robots with limited communication and target-sensing ranges. Moreover, we provide an explicit, non-asymptotic formula for computing the number of robots needed to achieve distance optimality in terms... read more »## A Canonical Partition Of The Primes Of Logic Functions. Arxiv:1309.0029v10 Math.co Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1309.0029**Description:**This paper presents algorithms that relate to the problem of finding a minimum-cost sum-of-primes representation of a Boolean function f when the cost function C is positive and additive. A set of primes whose sum equals f is called a basis for f, so a solution to the problem is a minimum-cost basis. The algorithms construct the following canonical partition of the complete set of primes and identify the members of sets 1, 2, and 3: 1 Essential Primes, which must be part of any basis for f, 2 Un... read more »## Scalable Synchronization And Reciprocity Calibration For Distributed Multiuser Mimo. Arxiv:1310.7001v3 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1310.7001**Description:**Large-scale distributed Multiuser MIMO MU-MIMO is a promising wireless network architecture that combines the advantages of "massive MIMO" and "small cells." It consists of several Access Points APs connected to a central server via a wired backhaul network and acting as a large distributed antenna system. We focus on the downlink, which is both more demanding in terms of traffic and more challenging in terms of implementation than the uplink. In order to enable multiuser joi... read more »## Learning Mixtures Of Linear Classifiers. Arxiv:1311.2547v4 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.2547**Description:**We consider a discriminative learning regression problem, whereby the regression function is a convex combination of k linear classifiers. Existing approaches are based on the EM algorithm, or similar techniques, without provable guarantees. We develop a simple method based on spectral techniques and a mirroring' trick, that discovers the subspace spanned by the classifiers' parameter vectors. Under a probabilistic assumption on the feature vector distribution, we prove that this approach has ne... read more »## Recommending With An Agenda: Active Learning Of Private Attributes Using Matrix Factorization. Arxiv:1311.6802v2 Cs.lg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1311.6802**Description:**Recommender systems leverage user demographic information, such as age, gender, etc., to personalize recommendations and better place their targeted ads. Oftentimes, users do not volunteer this information due to privacy concerns, or due to a lack of initiative in filling out their online profiles. We illustrate a new threat in which a recommender learns private attributes of users who do not voluntarily disclose them. We design both passive and active attacks that solicit ratings for strategica... read more »## Low Latency Datacenter Networking: A Short Survey. Arxiv:1312.3455v2 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.3455**Description:**Datacenters are the cornerstone of the big data infrastructure supporting numerous online services. The demand for interactivity, which significantly impacts user experience and provider revenue, is translated into stringent timing requirements for flows in datacenter networks. Thus low latency networking is becoming a major concern of both industry and academia. We provide a short survey of recent progress made by the networking community for low latency datacenter networks. We propose a taxono... read more »## Constrained Parametric Proposals And Pooling Methods For Semantic Segmentation In Rgb-d Images. Arxiv:1312.7715v2 Cs.cv Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1312.7715**Description:**We focus on the problem of semantic segmentation based on RGB-D data, with emphasis on analyzing cluttered indoor scenes containing many instances from many visual categories. Our approach is based on a parametric figure-ground intensity and depth-constrained proposal process that generates spatial layout hypotheses at multiple locations and scales in the image followed by a sequential inference algorithm that integrates the proposals into a complete scene estimate. Our contributions can be summ... read more »## Turing Minimalism And The Emergence Of Complexity. Arxiv:1401.3613v2 Cs.cc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.3613**Description:**Not only did Turing help found one of the most exciting areas of modern science computer science , but it may be that his contribution to our understanding of our physical reality is greater than we had hitherto supposed. Here I explore the path that Alan Turing would have certainly liked to follow, that of complexity science, which was launched in the wake of his seminal work on computability and structure formation. In particular, I will explain how the theory of algorithmic probability based ... read more »## On The Complexity Of Computing With Planar Algebraic Curves. Arxiv:1401.5690v2 Cs.sc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1401.5690**Description:**In this paper, we give improved bounds for the computational complexity of computing with planar algebraic curves. More specifically, for arbitrary coprime polynomials f , g in mathbb Z x,y and an arbitrary polynomial h in mathbb Z x,y , each of total degree less than n and with integer coefficients of absolute value less than 2^ tau , we show that each of the following problems can be solved in a deterministic way with a number of bit operations bounded by tilde O n^6+n^5 tau , where we ignore ... read more »## A Tight Lower Bound On Certificate Complexity In Terms Of Block Sensitivity And Sensitivity. Arxiv:1402.5078v2 Cs.cc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1402.5078**Description:**Sensitivity, certificate complexity and block sensitivity are widely used Boolean function complexity measures. A longstanding open problem, proposed by Nisan and Szegedy, is whether sensitivity and block sensitivity are polynomially related. Motivated by the constructions of functions which achieve the largest known separations, we study the relation between 1-certificate complexity and 0-sensitivity and 0-block sensitivity. Previously the best known lower bound was C_1 f geq frac bs_0 f 2 s_0 ... read more »## Modeling Website Popularity Competition In The Attention-activity Marketplace. Arxiv:1403.0600v2 Physics.soc-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.0600**Description:**How does a new startup drive the popularity of competing websites into oblivion like Facebook famously did to MySpace This question is of great interest to academics, technologists, and financial investors alike. In this work we exploit the singular way in which Facebook wiped out the popularity of MySpace, Hi5, Friendster, and Multiply to guide the design of a new popularity competition model. Our model provides new insights into what Nobel Laureate Herbert A. Simon called the "marketplace... read more »## What Is Tumblr: A Statistical Overview And Comparison. Arxiv:1403.5206v2 Cs.si Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1403.5206**Description:**Tumblr, as one of the most popular microblogging platforms, has gained momentum recently. It is reported to have 166.4 millions of users and 73.4 billions of posts by January 2014. While many articles about Tumblr have been published in major press, there is not much scholar work so far. In this paper, we provide some pioneer analysis on Tumblr from a variety of aspects. We study the social network structure among Tumblr users, analyze its user generated content, and describe reblogging patterns... read more »## Why Walking The Dog Takes Time: Frechet Distance Has No Strongly Subquadratic Algorithms Unless Seth Fails. Arxiv:1404.1448v2 Cs.cg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.1448**Description:**The Frechet distance is a well-studied and very popular measure of similarity of two curves. Many variants and extensions have been studied since Alt and Godau introduced this measure to computational geometry in 1991. Their original algorithm to compute the Frechet distance of two polygonal curves with n vertices has a runtime of O n^2 log n . More than 20 years later, the state of the art algorithms for most variants still take time more than O n^2 / log n , but no matching lower bounds are kn... read more »## Transmit Antenna Selection In Underlay Cognitive Radio Environment. Arxiv:1404.5083v3 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.5083**Description:**Cognitive radio CR technology addresses the problem of spectrum under-utilization. In underlay CR mode, the secondary users are allowed to communicate provided that their transmission is not detrimental to primary user communication. Transmit antenna selection is one of the low-complexity methods to increase the capacity of wireless communication systems. In this article, we propose and analyze the performance benefit of a transmit antenna selection scheme for underlay secondary system that ensu... read more »## Cellular Interference Alignment: Omni-directional Antennas And Asymmetric Configurations. Arxiv:1404.6512v2 Cs.it Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1404.6512**Description:**Although interference alignment IA can theoretically achieve the optimal degrees of freedom DoFs in the K -user Gaussian interference channel, its direct application comes at the prohibitive cost of precoding over exponentially-many signaling dimensions. On the other hand, it is known that practical "one-shot" IA precoding i.e., linear schemes without symbol expansion provides a vanishing DoFs gain in large fully-connected networks with generic channel coefficients. In our previous wor... read more »## On The Construction Of Maximum-quality Aggregation Trees In Deadline-constrained Wsns. Arxiv:1405.0597v3 Cs.ni Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.0597**Description:**In deadline-constrained data aggregation in wireless sensor networks WSNs , the imposed sink deadline along with the interference constraint hinders participation of all sensor nodes in data aggregation. Thus, exploiting the wisdom of the crowd paradigm, the total number of participant nodes in data aggregation determines the quality of aggregation QoA . Although the previous studies have proposed optimal algorithms to maximize QoA under an imposed deadline and a given aggregation tree, there is... read more »## Targetdp: An Abstraction Of Lattice Based Parallelism With Portable Performance. Arxiv:1405.6162v2 Cs.dc Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.6162**Description:**To achieve high performance on modern computers, it is vital to map algorithmic parallelism to that inherent in the hardware. From an application developer's perspective, it is also important that code can be maintained in a portable manner across a range of hardware. Here we present targetDP target Data Parallel , a lightweight programming layer that allows the abstraction of data parallelism for applications that employ structured grids. A single source code may be used to target both thread l... read more »## Faster Reductions For Straight Skeletons To Motorcycle Graphs. Arxiv:1405.6260v2 Cs.cg Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1405.6260**Description:**We give an algorithm that reduces the straight skeleton to the motorcycle graph in O n log n time for simple polygons and O n log n log m time for a planar straight line graph PSLG with m connected components. This improves on the previous best of O n log n log r for polygons with r reflex vertices possibly with holes and O n^2 log n for general planar straight line graphs. This allows us to speed up the straight skeleton algorithm for polygons and PSLGs. For a polygon with h holes and r reflex ... read more »## Concurrent Kleene Algebra Of Partial Strings. Arxiv:1407.0385v3 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.0385**Description:**Concurrent Kleene Algebra CKA by Tony Hoare et al. is an algebraic structure that unifies the laws of concurrent programming. The unifying power of CKA rests largely on the so called exchange law that describes how concurrent and sequential composition operators can be interchanged. This paper extends Gischer's pomsets model with least fixed point operators thereby constructing a partial order model of CKA including its exchange law. The existence of such a model is particularly relevant when we... read more »## Decision Versions Of Optimization Problems: Cardinality Constraint Lower Bound As A Cnf Horn Formula For Matching And Clique. Arxiv:1407.1403v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.1403**Description:**We provide a formula for the cardinality constraint, a lower bound in the form of F ge K , in such a way that the conjunction of the BFC and the OFC explained below can be solved simultaneously. The parameter K can vary from instance to instance. We assume the availability of a successor predicate, and that the domain is ordered. To our knowledge, no polynomially solvable expression has been developed so far, even for a simple problem such as Matching. However, once such a formula is developed f... read more »## 2-edge Connectivity In Directed Graphs. Arxiv:1407.3041v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.3041**Description:**Edge and vertex connectivity are fundamental concepts in graph theory. While they have been thoroughly studied in the case of undirected graphs, surprisingly not much has been investigated for directed graphs. In this paper we study 2 -edge connectivity problems in directed graphs and, in particular, we consider the computation of the following natural relation: We say that two vertices v and w are 2 -edge-connected if there are two edge-disjoint paths from v to w and two edge-disjoint paths fro... read more »## New Routing Techniques And Their Applications. Arxiv:1407.6730v2 Cs.ds Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.6730**Description:**Let G= V,E be an undirected graph with n vertices and m edges. We obtain the following new routing schemes: - A routing scheme for unweighted graphs that uses tilde O frac 1 epsilon n^ 2/3 space at each vertex and tilde O 1/ epsilon -bit headers, to route a message between any pair of vertices u,v in V on a 2 + epsilon,1 -stretch path, i.e., a path of length at most 2+ epsilon cdot d u,v +1 . This should be compared to the 2,1 -stretch and tilde O n^ 5/3 space distance oracle of Patrascu and Rod... read more »## Parameterized Model-checking For Timed-systems With Conjunctive Guards Extended Version . Arxiv:1407.7305v2 Cs.lo Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.7305**Description:**In this work we extend the Emerson and Kahlon's cutoff theorems for process skeletons with conjunctive guards to Parameterized Networks of Timed Automata, i.e. systems obtained by an emph apriori unknown number of Timed Automata instantiated from a finite set U_1, dots, U_n of Timed Automata templates. In this way we aim at giving a tool to universally verify software systems where an unknown number of software components i.e. processes interact with continuous time temporal constraints. It is o... read more »## Multi-agents Architecture For Semantic Retrieving Video In Distributed Environment. Arxiv:1407.7989v2 Cs.ir Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.7989**Description:**This paper presents an integrated multi-agents architecture for indexing and retrieving video information.The focus of our work is to elaborate an extensible approach that gathers a priori almost of the mandatory tools which palliate to the major intertwining problems raised in the whole process of the video lifecycle classification, indexing and retrieval . In fact, effective and optimal retrieval video information needs a collaborative approach based on multimodal aspects. Clearly, it must to ... read more »## Modularity Of Directed Networks: Cycle Decomposition Approach. Arxiv:1407.8039v2 Math-ph Updated

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8039**Description:**The problem of decomposing networks into modules or clusters has gained much attention in recent years, as it can account for a coarse-grained description of complex systems, often revealing functional subunits of these systems. A variety of module detection algorithms have been proposed, mostly oriented towards finding hard partitionings of undirected networks. Despite the increasing number of fuzzy clustering methods for directed networks, many of these approaches tend to neglect important dir... read more »## Quantum Channel Capacities With Passive Environment Assistance. Arxiv:1407.8160v1 Quant-ph Cross Listed

**Published:**Wednesday December 31st 7PM**Link:**http://arxiv.org/abs/1407.8160**Description:**We initiate the study of passive environment-assisted communication via a quantum channel, modeled as a unitary interaction between the information carrying system and an environment. In this model, the environment is controlled by a benevolent helper who can set its initial state such as to assist sender and receiver of the communication link. The case of a malicious environment, also known as jammer, or arbitrarily varying channel, is essentially well-understood and comprehensively reviewed. H... read more »

Http Www.forrester. Rss Biodiversit Rss Toronto Road Rss York Region Road Rss Extreme Health Rss Hangar 1 Rss Unsealed Rss Http Www Mobilemarketer Rss Www Mobilemarketer Rss Http Www Readwriteweb Mobile Rss Www Readwriteweb Mobile Rss James Rodriguez Rss Blogs Jonah Ayoub Rss Www Mediapost Publications Mobile Insider Rss Www.mediapost. Publications Mobile Insider Rss Http Local Amazon Rss Http Www Mediapost Publications Mobile Insider Rss Www.mobilemarketer. Rss Www.readwriteweb. Mobile Rss Http Www.readwriteweb. Mobile Rss Http Www.mediapost. Publications Mobile Insider Rss Http Www.mobilemarketer. Rss Posts Arts Rss Tv2 Vejret Rss Il Sole 24 Ore Economia Rss Il Sole 24 Ore Formazione Rss Daily Economic Rss Http Local.amazon. Rss Chart Week Rss Daily Economy Rss Daily Chart Rss Chart Of The Day Rss Recherche Franck Dubosc Rss Donna S Delights Rss The Atom Blog Rss Shark News Rss Personal Nature Rss Mergers Acquisition Rss Bloomberg All News Rss Ustc Rss