223
223
Jun 28, 2018
06/18
by
Katrin Hänsel; Natalie Wilde; Hamed Haddadi; Akram Alomainy
texts
eye 223
favorite 0
comment 0
Health and fitness wearable technology has recently advanced, making it easier for an individual to monitor their behaviours. Previously self generated data interacts with the user to motivate positive behaviour change, but issues arise when relating this to long term mention of wearable devices. Previous studies within this area are discussed. We also consider a new approach where data is used to support instead of motivate, through monitoring and logging to encourage reflection. Based on...
Topics: Computing Research Repository, Computers and Society, Human-Computer Interaction
Source: http://arxiv.org/abs/1509.05238
216
216
Jun 28, 2018
06/18
by
Cosimo Anglano
texts
eye 216
favorite 0
comment 0
We present the forensic analysis of the artifacts left on Android devices by \textit{WhatsApp Messenger}, the client of the WhatsApp instant messaging system. We provide a complete description of all the artifacts generated by WhatsApp Messenger, we discuss the decoding and the interpretation of each one of them, and we show how they can be correlated together to infer various types of information that cannot be obtained by considering each one of them in isolation. By using the results...
Topics: Computing Research Repository, Cryptography and Security
Source: http://arxiv.org/abs/1507.07739
184
184
Jun 30, 2018
06/18
by
John M. Chambers
texts
eye 184
favorite 1
comment 0
This paper reviews some programming techniques in R that have proved useful, particularly for substantial projects. These include several versions of object-oriented programming, used in a large number of R packages. The review tries to clarify the origins and ideas behind the various versions, each of which is valuable in the appropriate context. R has also been strongly influenced by the ideas of functional programming and, in particular, by the desire to combine functional with object...
Topics: Computation, Statistics, Computing Research Repository, Methodology, Software Engineering,...
Source: http://arxiv.org/abs/1409.3531
165
165
Jun 28, 2018
06/18
by
Xiao Lu; Ping Wang; Dusit Niyato; Dong In Kim; Zhu Han
texts
eye 165
favorite 0
comment 0
Wireless charging is a technology of transmitting power through an air gap to electrical devices for the purpose of energy replenishment. The recent progress in wireless charging techniques and development of commercial products have provided a promising alternative way to address the energy bottleneck of conventionally portable battery-powered devices. However, the incorporation of wireless charging into the existing wireless communication systems also brings along a series of challenging...
Topics: Networking and Internet Architecture, Computing Research Repository
Source: http://arxiv.org/abs/1509.00940
121
121
Jun 28, 2018
06/18
by
Baolin Peng; Zhengdong Lu; Hang Li; Kam-Fai Wong
texts
eye 121
favorite 0
comment 0
We propose Neural Reasoner, a framework for neural network-based reasoning over natural language sentences. Given a question, Neural Reasoner can infer over multiple supporting facts and find an answer to the question in specific forms. Neural Reasoner has 1) a specific interaction-pooling mechanism, allowing it to examine multiple facts, and 2) a deep architecture, allowing it to model the complicated logical relations in reasoning tasks. Assuming no particular structure exists in the question...
Topics: Computation and Language, Artificial Intelligence, Computing Research Repository, Learning, Neural...
Source: http://arxiv.org/abs/1508.05508
119
119
Jun 29, 2018
06/18
by
Ming Yang; Hongyang Chao; Chi Zhang; Jun Guo; Lu Yuan; Jian Sun
texts
eye 119
favorite 0
comment 0
Bezigons, i.e., closed paths composed of B\'ezier curves, have been widely employed to describe shapes in image vectorization results. However, most existing vectorization techniques infer the bezigons by simply approximating an intermediate vector representation (such as polygons). Consequently, the resultant bezigons are sometimes imperfect due to accumulated errors, fitting ambiguities, and a lack of curve priors, especially for low-resolution images. In this paper, we describe a novel...
Topics: Graphics, Computing Research Repository
Source: http://arxiv.org/abs/1602.01913
115
115
Jun 27, 2018
06/18
by
R. J. Cintra; H. M. de Oliveira
texts
eye 115
favorite 0
comment 0
Arithmetic complexity has a main role in the performance of algorithms for spectrum evaluation. Arithmetic transform theory offers a method for computing trigonometrical transforms with minimal number of multiplications. In this paper, the proposed algorithms for the arithmetic Fourier transform are surveyed. A new arithmetic transform for computing the discrete Hartley transform is introduced: the Arithmetic Hartley transform. The interpolation process is shown to be the key element of the...
Topics: Numerical Analysis, Computing Research Repository, Mathematics, Classical Analysis and ODEs
Source: http://arxiv.org/abs/1504.06106
113
113
Jun 29, 2018
06/18
by
E. Matsinos
texts
eye 113
favorite 0
comment 0
The present document aims at providing a short, didactical introduction to three standard versions of the Kalman filter, namely its variants identified as Basic, Extended, and Unscented. The application of these algorithms in three representative problems is discussed.
Topics: Systems and Control, Computing Research Repository
Source: http://arxiv.org/abs/1607.05590
98
98
Jun 28, 2018
06/18
by
Joerg Schoenfisch; Janno von Stulpnagel; Jens Ortmann; Christian Meilicke; Heiner Stuckenschmidt
texts
eye 98
favorite 0
comment 0
IT infrastructure is a crucial part in most of today's business operations. High availability and reliability, and short response times to outages are essential. Thus a high amount of tool support and automation in risk management is desirable to decrease outages. We propose a new approach for calculating the root cause for an observed failure in an IT infrastructure. Our approach is based on Abduction in Markov Logic Networks. Abduction aims to find an explanation for a given observation in...
Topics: Artificial Intelligence, Computing Research Repository
Source: http://arxiv.org/abs/1511.05719
94
94
Jun 27, 2018
06/18
by
Han Xiao; Xiaoyan Zhu
texts
eye 94
favorite 1
comment 0
Margin-Based Principle has been proposed for a long time, it has been proved that this principle could reduce the structural risk and improve the performance in both theoretical and practical aspects. Meanwhile, feed-forward neural network is a traditional classifier, which is very hot at present with a deeper architecture. However, the training algorithm of feed-forward neural network is developed and generated from Widrow-Hoff Principle that means to minimize the squared error. In this paper,...
Topics: Computing Research Repository, Learning
Source: http://arxiv.org/abs/1506.03626
93
93
Jun 29, 2018
06/18
by
Mathieu Acher; François Esnault
texts
eye 93
favorite 0
comment 0
The strength of chess engines together with the availability of numerous chess games have attracted the attention of chess players, data scientists, and researchers during the last decades. State-of-the-art engines now provide an authoritative judgement that can be used in many applications like cheating detection, intrinsic ratings computation, skill assessment, or the study of human decision-making. A key issue for the research community is to gather a large dataset of chess games together...
Topics: Artificial Intelligence, Computing Research Repository
Source: http://arxiv.org/abs/1607.04186
90
90
Jun 28, 2018
06/18
by
Matthew Lai
texts
eye 90
favorite 0
comment 0
This report presents Giraffe, a chess engine that uses self-play to discover all its domain-specific knowledge, with minimal hand-crafted knowledge given by the programmer. Unlike previous attempts using machine learning only to perform parameter-tuning on hand-crafted evaluation functions, Giraffe's learning system also performs automatic feature extraction and pattern recognition. The trained evaluation function performs comparably to the evaluation functions of state-of-the-art chess engines...
Topics: Artificial Intelligence, Computing Research Repository, Learning, Neural and Evolutionary Computing
Source: http://arxiv.org/abs/1509.01549
90
90
Jun 29, 2018
06/18
by
Yannis M. Assael; Brendan Shillingford; Shimon Whiteson; Nando de Freitas
texts
eye 90
favorite 0
comment 0
Lipreading is the task of decoding text from the movement of a speaker's mouth. Traditional approaches separated the problem into two stages: designing or learning visual features, and prediction. More recent deep lipreading approaches are end-to-end trainable (Wand et al., 2016; Chung & Zisserman, 2016a). However, existing work on models trained end-to-end perform only word classification, rather than sentence-level sequence prediction. Studies have shown that human lipreading performance...
Topics: Computer Vision and Pattern Recognition, Computation and Language, Computing Research Repository,...
Source: http://arxiv.org/abs/1611.01599
86
86
Jun 26, 2018
06/18
by
Jobin Wilson; Chitharanj Kachappilly; Rakesh Mohan; Prateek Kapadia; Arun Soman; Santanu Chaudhury
texts
eye 86
favorite 0
comment 0
Communication Service Providers (CSPs) are in a unique position to utilize their vast transactional data assets generated from interactions of subscribers with network elements as well as with other subscribers. CSPs could leverage its data assets for a gamut of applications such as service personalization, predictive offer management, loyalty management, revenue forecasting, network capacity planning, product bundle optimization and churn management to gain significant competitive advantage....
Topics: Learning, Computers and Society, Computing Research Repository, Software Engineering
Source: http://arxiv.org/abs/1502.02215
85
85
Jun 26, 2018
06/18
by
Paul Doyle
texts
eye 85
favorite 0
comment 0
Astronomical photometry is the science of measuring the flux of a celestial object. Since its introduction, the CCD has been the principle method of measuring flux to calculate the apparent magnitude of an object. Each CCD image taken must go through a process of cleaning and calibration prior to its use. As the number of research telescopes increases the overall computing resources required for image processing also increases. Existing processing techniques are primarily sequential in nature,...
Topics: Instrumentation and Methods for Astrophysics, Distributed, Parallel, and Cluster Computing,...
Source: http://arxiv.org/abs/1502.02821
85
85
Jun 26, 2018
06/18
by
Jens Maßberg
texts
eye 85
favorite 0
comment 0
"Solitaire Chess" is a logic puzzle published by Thinkfun, that can be seen as a single person version of traditional chess. Given a chess board with some chess pieces of the same color placed on it, the task is to capture all pieces but one using only moves that are allowed in chess. Moreover, in each move one piece has to be captured. We prove that deciding if a given instance of Solitaire Chess is solvable is NP-complete.
Topics: Computational Complexity, Computing Research Repository, Combinatorics, Mathematics
Source: http://arxiv.org/abs/1501.06398
82
82
Jun 30, 2018
06/18
by
Simon Kramer
texts
eye 82
favorite 0
comment 0
We propose a semantic representation of the standard quantum logic QL within a classical, normal modal logic, and this via a lattice-embedding of orthomodular lattices into Boolean algebras with one modal operator. Thus our classical logic is a completion of the quantum logic QL. In other words, we refute Birkhoff and von Neumann's classic thesis that the logic (the formal character) of Quantum Mechanics would be non-classical as well as Putnam's thesis that quantum logic (of his kind) would be...
Topics: Quantum Physics, Mathematics, Quantum Algebra, Computing Research Repository, Logic in Computer...
Source: http://arxiv.org/abs/1406.3526
78
78
Jun 27, 2018
06/18
by
Ben Baumer
texts
eye 78
favorite 0
comment 0
Data science is an emerging interdisciplinary field that combines elements of mathematics, statistics, computer science, and knowledge in a particular application domain for the purpose of extracting meaningful information from the increasingly sophisticated array of data available in many settings. These data tend to be non-traditional, in the sense that they are often live, large, complex, and/or messy. A first course in statistics at the undergraduate level typically introduces students with...
Topics: Other Statistics, Computers and Society, Statistics, Computing Research Repository, Computation
Source: http://arxiv.org/abs/1503.05570
78
78
Jun 30, 2018
06/18
by
Satish Palaniappan; Ronojoy Adhikari
texts
eye 78
favorite 0
comment 0
Standardized corpora of undeciphered scripts, a necessary starting point for computational epigraphy, requires laborious human effort for their preparation from raw archaeological records. Automating this process through machine learning algorithms can be of significant aid to epigraphical research. Here, we take the first steps in this direction and present a deep learning pipeline that takes as input images of the undeciphered Indus script, as found in archaeological artifacts, and returns as...
Topics: Learning, Computing Research Repository, Computer Vision and Pattern Recognition, Computation and...
Source: http://arxiv.org/abs/1702.00523
77
77
Jun 28, 2018
06/18
by
Symeon Meichanetzoglou; Sotiris Ioannidis; Nikolaos Laoutaris
texts
eye 77
favorite 0
comment 0
We have collected and analysed prices for more than 1.4 million flight tickets involving 63 destinations and 125 airlines and have found that common sense violation i.e., discrepancies between what consumers would expect and what truly holds for those prices, are far more frequent than one would think. For example, oftentimes the price of a single leg flight is higher than two-leg flights that include it under similar terms of travel (class, luggage allowance, etc.). This happened for up to...
Topics: Computing Research Repository, Computers and Society
Source: http://arxiv.org/abs/1509.05382
76
76
Jun 27, 2018
06/18
by
Jules Hedges; Paulo Oliva; Evguenia Sprits; Viktor Winschel; Philipp Zahn
texts
eye 76
favorite 1
comment 0
In applied game theory the motivation of players is a key element. It is encoded in the payoffs of the game form and often based on utility functions. But there are cases were formal descriptions in the form of a utility function do not exist. In this paper we introduce a representation of games where players' goals are modeled based on so-called higher-order functions. Our representation provides a general and powerful way to mathematically summarize players' intentions. In our framework...
Topics: Computing Research Repository, Computer Science and Game Theory
Source: http://arxiv.org/abs/1506.01002
75
75
Jun 29, 2018
06/18
by
Xiujun Li; Zachary C. Lipton; Bhuwan Dhingra; Lihong Li; Jianfeng Gao; Yun-Nung Chen
texts
eye 75
favorite 0
comment 0
Despite widespread interests in reinforcement-learning for task-oriented dialogue systems, several obstacles can frustrate research and development progress. First, reinforcement learners typically require interaction with the environment, so conventional dialogue corpora cannot be used directly. Second, each task presents specific challenges, requiring separate corpus of task-specific annotated data. Third, collecting and annotating human-machine or human-human conversations for task-oriented...
Topics: Artificial Intelligence, Computation and Language, Computing Research Repository, Learning
Source: http://arxiv.org/abs/1612.05688
75
75
Jun 29, 2018
06/18
by
Moustafa Elhamshary; Moustafa Youssef; Akira Uchiyama; Hirozumi Yamaguchi; Teruo Higashino
texts
eye 75
favorite 0
comment 0
We present TransitLabel, a crowd-sensing system for automatic enrichment of transit stations indoor floorplans with different semantics like ticket vending machines, entrance gates, drink vending machines, platforms, cars' waiting lines, restrooms, lockers, waiting (sitting) areas, among others. Our key observations show that certain passengers' activities (e.g., purchasing tickets, crossing entrance gates, etc) present identifiable signatures on one or more cell-phone sensors. TransitLabel...
Topics: Computing Research Repository, Computers and Society
Source: http://arxiv.org/abs/1606.03302
72
72
Jun 26, 2018
06/18
by
Aleks Kissinger; Vladimir Zamdzhiev
texts
eye 72
favorite 0
comment 0
String diagrams are a powerful tool for reasoning about composite structures in symmetric monoidal categories. By representing string diagrams as graphs, equational reasoning can be done automatically by double-pushout rewriting. !-graphs give us the means of expressing and proving properties about whole families of these graphs simultaneously. While !-graphs provide elegant proofs of surprisingly powerful theorems, little is known about the formal properties of the graph languages they define....
Topics: Category Theory, Computing Research Repository, Mathematics, Logic in Computer Science, Formal...
Source: http://arxiv.org/abs/1501.06059
70
70
Jun 29, 2018
06/18
by
Robert J. Brunner; Edward J. Kim
texts
eye 70
favorite 0
comment 0
We describe an introductory data science course, entitled Introduction to Data Science, offered at the University of Illinois at Urbana-Champaign. The course introduced general programming concepts by using the Python programming language with an emphasis on data preparation, processing, and presentation. The course had no prerequisites, and students were not expected to have any programming experience. This introductory course was designed to cover a wide range of topics, from the nature of...
Topics: Physics Education, Computers and Society, Physics, Other Statistics, Statistics, Computing Research...
Source: http://arxiv.org/abs/1604.07397
69
69
Jun 27, 2018
06/18
by
Daniel Ritter; Manuel Holzleitner
texts
eye 69
favorite 0
comment 0
Integration Adapters are a fundamental part of an integration system, since they provide (business) applications access to its messaging channel. However, their modeling and configuration remain under-represented. In previous work, the integration control and data flow syntax and semantics have been expressed in the Business Process Model and Notation (BPMN) as a semantic model for message-based integration, while adapter and the related quality of service modeling were left for further...
Topics: Software Engineering, Computing Research Repository
Source: http://arxiv.org/abs/1503.02007
69
69
Jun 27, 2018
06/18
by
A. Kapanowski; Ł. Gałuszka
texts
eye 69
favorite 0
comment 0
Python implementation of selected weighted graph algorithms is presented. The minimal graph interface is defined together with several classes implementing this interface. Graph nodes can be any hashable Python objects. Directed edges are instances of the Edge class. Graphs are instances of the Graph class. It is based on the adjacency-list representation, but with fast lookup of nodes and neighbors (dict-of-dict structure). Other implementations of this class are also possible. In this work,...
Topics: Data Structures and Algorithms, Computing Research Repository
Source: http://arxiv.org/abs/1504.07828
68
68
Jun 29, 2018
06/18
by
James Harland
texts
eye 68
favorite 0
comment 0
The busy beaver problem is a well-known example of a non-computable function. In order to determine a particular value of this function, it is necessary to generate and classify a large number of Turing machines. Previous work on this problem has described the processes used for the generation and classification of these machines, but unfortunately has generally not provided details of the machines considered. While there is no reason to doubt the veracity of the results known so far, it is...
Topics: Formal Languages and Automata Theory, Computing Research Repository
Source: http://arxiv.org/abs/1610.03184
68
68
Jun 26, 2018
06/18
by
Yong Niu; Yong Li; Depeng Jin; Li Su; Athanasios V. Vasilakos
texts
eye 68
favorite 0
comment 0
With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagation loss, directivity, and sensitivity to blockage. These characteristics of mmWave communications pose several challenges to fully exploit the...
Topics: Networking and Internet Architecture, Computing Research Repository
Source: http://arxiv.org/abs/1502.07228
68
68
Sep 21, 2013
09/13
by
David Wingate; Theophane Weber
texts
eye 68
favorite 0
comment 0
We present a new algorithm for approximate inference in probabilistic programs, based on a stochastic gradient for variational programs. This method is efficient without restrictions on the probabilistic program; it is particularly practical for distributions which are not analytically tractable, including highly structured distributions that arise in probabilistic programs. We show how to automatically derive mean-field probabilistic programs and optimize them, and demonstrate that our...
Topics: Machine Learning, Learning, Computing Research Repository, Statistics, Artificial Intelligence
Source: http://arxiv.org/abs/1301.1299
66
66
Jun 27, 2018
06/18
by
Jiwei Li; Eduard Hovy
texts
eye 66
favorite 0
comment 0
It is commonly accepted that machine translation is a more complex task than part of speech tagging. But how much more complex? In this paper we make an attempt to develop a general framework and methodology for computing the informational and/or processing complexity of NLP applications and tasks. We define a universal framework akin to a Turning Machine that attempts to fit (most) NLP tasks into one paradigm. We calculate the complexities of various NLP tasks using measures of Shannon...
Topics: Computing Research Repository, Computation and Language
Source: http://arxiv.org/abs/1503.00168
66
66
Jun 30, 2018
06/18
by
Quoc Duy Vo; Jaya Thomas; Shinyoung Cho; Pradipta De; Bong Jun Choi; Lee Sael
texts
eye 66
favorite 0
comment 0
Business Intelligence and Analytics (BI&A) is the process of extracting and predicting business-critical insights from data. Traditional BI focused on data collection, extraction, and organization to enable efficient query processing for deriving insights from historical data. With the rise of big data and cloud computing, there are many challenges and opportunities for the BI. Especially with the growing number of data sources, traditional BI\&A are evolving to provide intelligence at...
Topics: Artificial Intelligence, Computing Research Repository
Source: http://arxiv.org/abs/1704.03402
65
65
Jun 26, 2018
06/18
by
Jan Jachnik; Dan B Goldman; Linjie Luo; Andrew J. Davison
texts
eye 65
favorite 0
comment 0
Sculptors often deviate from geometric accuracy in order to enhance the appearance of their sculpture. These subtle stylizations may emphasize anatomy, draw the viewer's focus to characteristic features of the subject, or symbolize textures that might not be accurately reproduced in a particular sculptural medium, while still retaining fidelity to the unique proportions of an individual. In this work we demonstrate an interactive system for enhancing face geometry using a class of stylizations...
Topics: Graphics, Computational Geometry, Computing Research Repository
Source: http://arxiv.org/abs/1502.01954
64
64
Jun 30, 2018
06/18
by
Vladimir Gurvich; Vladimir Oudalov
texts
eye 64
favorite 0
comment 0
In this short note we give an example of a four-person finite positional game with perfect information that has no positions of chance and no Nash equilibria in pure stationary strategies. The corresponding directed graph has only one directed cycle and only five terminal positions. It remains open: (i) if the number $n$ of the players can be reduced from $4$ to $3$, (ii) if the number $p$ of the terminals can be reduced from $5$ to $4$, and most important, (iii) whether it is possible to get a...
Topics: Computer Science and Game Theory, Mathematics, Combinatorics, Computing Research Repository
Source: http://arxiv.org/abs/1411.0349
62
62
Jun 27, 2018
06/18
by
Raul Rojas
texts
eye 62
favorite 0
comment 0
This paper is a concise and painless introduction to the $\lambda$-calculus. This formalism was developed by Alonzo Church as a tool for studying the mathematical properties of effectively computable functions. The formalism became popular and has provided a strong theoretical foundation for the family of functional programming languages. This tutorial shows how to perform arithmetical and logical computations using the $\lambda$-calculus and how to define recursive functions, even though...
Topics: Computing Research Repository, Logic in Computer Science
Source: http://arxiv.org/abs/1503.09060
62
62
Jun 30, 2018
06/18
by
Paul Dorbec; Mehdi Mhalla
texts
eye 62
favorite 0
comment 0
In this paper, we propose a Quantum variation of combinatorial games, generalizing the Quantum Tic-Tac-Toe proposed by Allan Goff [2006]. A Combinatorial Game is a two-player game with no chance and no hidden information, such as Go or Chess. In this paper, we consider the possibility of playing superpositions of moves in such games. We propose different rulesets depending on when superposed moves should be played, and prove that all these rulesets may lead similar games to different outcomes....
Topics: Quantum Physics, Computing Research Repository, Discrete Mathematics
Source: http://arxiv.org/abs/1701.02193
61
61
Jun 29, 2018
06/18
by
Umar Iqbal; Martin Garbade; Juergen Gall
texts
eye 61
favorite 0
comment 0
In this work we propose to utilize information about human actions to improve pose estimation in monocular videos. To this end, we present a pictorial structure model that exploits high-level information about activities to incorporate higher-order part dependencies by modeling action specific appearance models and pose priors. However, instead of using an additional expensive action recognition framework, the action priors are efficiently estimated by our pose estimation framework. This is...
Topics: Computer Vision and Pattern Recognition, Computing Research Repository
Source: http://arxiv.org/abs/1603.04037
61
61
Jun 28, 2018
06/18
by
Joshua Adam Taylor; Sairaj V. Dhople; Duncan S. Callaway
texts
eye 61
favorite 0
comment 0
The finiteness of fossil fuels implies that future electric power systems may predominantly source energy from fuel-free renewable resources like wind and solar. Evidently, these power systems without fuel will be environmentally benign, sustainable, and subject to milder failure scenarios. Many of these advantages were projected decades ago with the definition of the soft energy path, which describes a future where all energy is provided by numerous small, simple, and diverse renewable...
Topics: Systems and Control, Computing Research Repository
Source: http://arxiv.org/abs/1506.04799
60
60
Jun 29, 2018
06/18
by
Chathura Sarathchandra Magurawalage; Kun Yang
texts
eye 60
favorite 0
comment 0
Location Aware Password Protection System (LAPPS) is designed to strengthen the security of traditional password protection systems. This is achieved by adding several layers of protection to the passwords that most traditional password protection systems generate. The current implementation looks at the Password/Pin numbers of Credit/Debit cards that are used on Automated Teller Machine (ATM),though the underlying design of the system can be used in many other scenarios. A password that is...
Topics: Cryptography and Security, Networking and Internet Architecture, Computing Research Repository
Source: http://arxiv.org/abs/1601.02117
59
59
Jun 28, 2018
06/18
by
Rashid Mijumbi; Joan Serrat; Juan Luis Gorricho; Niels Bouten; Filip De Turck; Raouf Boutaba
texts
eye 59
favorite 0
comment 0
Network Function Virtualization (NFV) has drawn significant attention from both industry and academia as an important shift in telecommunication service provisioning. By decoupling Network Functions (NFs) from the physical devices on which they run, NFV has the potential to lead to significant reductions in Operating Expenses (OPEX) and Capital Expenses (CAPEX) and facilitate the deployment of new services with increased agility and faster time-to-value. The NFV paradigm is still in its infancy...
Topics: Networking and Internet Architecture, Computing Research Repository
Source: http://arxiv.org/abs/1509.07675
58
58
Jun 30, 2018
06/18
by
Christian Szegedy; Wei Liu; Yangqing Jia; Pierre Sermanet; Scott Reed; Dragomir Anguelov; Dumitru Erhan; Vincent Vanhoucke; Andrew Rabinovich
texts
eye 58
favorite 0
comment 0
We propose a deep convolutional neural network architecture codenamed "Inception", which was responsible for setting the new state of the art for classification and detection in the ImageNet Large-Scale Visual Recognition Challenge 2014 (ILSVRC 2014). The main hallmark of this architecture is the improved utilization of the computing resources inside the network. This was achieved by a carefully crafted design that allows for increasing the depth and width of the network while keeping...
Topics: Computing Research Repository, Computer Vision and Pattern Recognition
Source: http://arxiv.org/abs/1409.4842
57
57
Jun 27, 2018
06/18
by
Rene Ndoundam; Stephane Gael Raymond Ekodeck
texts
eye 57
favorite 0
comment 0
We propose different approaches of PDF files based steganography, essentially based on the Chinese Remainder Theorem. Here, after a cover PDF document has been released from unnecessary A0, a secret message is hidden in it using one of the proposed approaches, making it invisible to common PDF readers, and the file is then transmitted through a non-secure communication channel. Where each of our methods, ensure the condition that the number of inserted A0 is less than the number of characters...
Topics: Computing Research Repository, Cryptography and Security
Source: http://arxiv.org/abs/1506.01256
57
57
Jun 30, 2018
06/18
by
Marc Moreno Lopez; Jugal Kalita
texts
eye 57
favorite 0
comment 0
Convolutional Neural Network (CNNs) are typically associated with Computer Vision. CNNs are responsible for major breakthroughs in Image Classification and are the core of most Computer Vision systems today. More recently CNNs have been applied to problems in Natural Language Processing and gotten some interesting results. In this paper, we will try to explain the basics of CNNs, its different variations and how they have been applied to NLP.
Topics: Computing Research Repository, Computation and Language
Source: http://arxiv.org/abs/1703.03091
57
57
Jun 29, 2018
06/18
by
Anastasia Mavridou; Eduard Baranov; Simon Bliudze; Joseph Sifakis
texts
eye 57
favorite 0
comment 0
Architecture styles characterise families of architectures sharing common characteristics. We have recently proposed configuration logics for architecture style specification. In this paper, we study a graphical notation to enhance readability and easiness of expression. We study simple architecture diagrams and a more expressive extension, interval architecture diagrams. For each type of diagrams, we present its semantics, a set of necessary and sufficient consistency conditions and a method...
Topics: Software Engineering, Computing Research Repository
Source: http://arxiv.org/abs/1608.03324
56
56
Jun 28, 2018
06/18
by
Bilegsaikhan Naidan; Leonid Boytsov
texts
eye 56
favorite 0
comment 0
This document describes a library for similarity searching. Even though the library contains a variety of metric-space access methods, our main focus is on search methods for non-metric spaces. Because there are fewer exact solutions for non-metric spaces, many of our methods give only approximate answers. Thus, the methods are evaluated in terms of efficiency-effectiveness trade-offs rather than merely in terms of their efficiency. Our goal is, therefore, to provide not only state-of-the-art...
Topics: Computing Research Repository, Mathematical Software, Information Retrieval
Source: http://arxiv.org/abs/1508.05470
56
56
Jun 28, 2018
06/18
by
Philipp Hoffmann
texts
eye 56
favorite 0
comment 0
Negotiations, a model of concurrency with multi party negotiation as primitive, have been recently introduced by J. Desel and J. Esparza. We initiate the study of games for this model. We study coalition problems: can a given coalition of agents force that a negotiation terminates (resp. block the negotiation so that it goes on forever)?; can the coalition force a given outcome of the negotiation? We show that for arbitrary negotiations the problems are EXPTIME-complete. Then we show that for...
Topics: Logic in Computer Science, Computing Research Repository
Source: http://arxiv.org/abs/1509.07199
54
54
Jun 30, 2018
06/18
by
Jeffrey G. Andrews; Stefano Buzzi; Wan Choi; Stephen Hanly; Angel Lozano; Anthony C. K. Soong; Jianzhong Charlie Zhang
texts
eye 54
favorite 0
comment 0
What will 5G be? What it will not be is an incremental advance on 4G. The previous four generations of cellular technology have each been a major paradigm shift that has broken backwards compatibility. And indeed, 5G will need to be a paradigm shift that includes very high carrier frequencies with massive bandwidths, extreme base station and device densities and unprecedented numbers of antennas. But unlike the previous four generations, it will also be highly integrative: tying any new 5G air...
Topics: Networking and Internet Architecture, Mathematics, Computing Research Repository, Information Theory
Source: http://arxiv.org/abs/1405.2957
54
54
Jun 29, 2018
06/18
by
J. B. Heaton; N. G. Polson; J. H. Witte
texts
eye 54
favorite 0
comment 0
We explore the use of deep learning hierarchical models for problems in financial prediction and classification. Financial prediction problems -- such as those presented in designing and pricing securities, constructing portfolios, and risk management -- often involve large data sets with complex data interactions that currently are difficult or impossible to specify in a full economic model. Applying deep learning methods to these problems can produce more useful results than standard methods...
Topics: Computing Research Repository, Learning
Source: http://arxiv.org/abs/1602.06561
53
53
Jun 28, 2018
06/18
by
Daniel S. Katz; Sou-Cheng T. Choi; Nancy Wilkins-Diehr; Neil Chue Hong; Colin C. Venters; James Howison; Frank Seinstra; Matthew Jones; Karen Cranston; Thomas L. Clune; Miguel de Val-Borro; Richard Littauer
texts
eye 53
favorite 0
comment 0
This technical report records and discusses the Second Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2). The report includes a description of the alternative, experimental submission and review process, two workshop keynote presentations, a series of lightning talks, a discussion on sustainability, and five discussions from the topic areas of exploring sustainability; software development experiences; credit & incentives; reproducibility & reuse &...
Topics: Computing Research Repository, Software Engineering
Source: http://arxiv.org/abs/1507.01715
52
52
Jun 28, 2018
06/18
by
Arjun Guha; Claudiu Saftoiu; Shriram Krishnamurthi
texts
eye 52
favorite 0
comment 0
We reduce JavaScript to a core calculus structured as a small-step operational semantics. We present several peculiarities of the language and show that our calculus models them. We explicate the desugaring process that turns JavaScript programs into ones in the core. We demonstrate faithfulness to JavaScript using real-world test suites. Finally, we illustrate utility by defining a security property, implementing it as a type system on the core, and extending it to the full language.
Topics: Programming Languages, Computing Research Repository
Source: http://arxiv.org/abs/1510.00925