200971
int64
549k
3.01B
ontology as a source for rule generation
stringlengths
5
255
This paper discloses the potential of OWL (Web Ontology Language) ontologies for generation of rules. The main purpose of this paper is to identify new types of rules, which may be generated from OWL ontologies. Rules, generated from OWL ontologies, are necessary for the functioning of the Semantic Web Expert System. It is expected that the Semantic Web Expert System (SWES) will be able to process ontologies from the Web with the purpose to supplement or even to develop its knowledge base.
stringlengths
91
9.63k
94,501,141
deterministic parameterized algorithms for matching and packing problems
We present three deterministic parameterized algorithms for well-studied packing and matching problems, namely, Weighted q-Dimensional p-Matching ((q,p)-WDM) and Weighted q-Set p-Packing ((q,p)-WSP). More specifically, we present an O*(2.85043^{(q-1)p}) time deterministic algorithm for (q,p)-WDM, an O*(8.04143^p) time deterministic algorithm for the unweighted version of (3,p)-WDM, and an O*((0.56201\cdot 2.85043^q)^p) time deterministic algorithm for (q,p)-WSP. Our algorithms significantly improve the previously best known O* running times in solving (q,p)-WDM and (q,p)-WSP, and the previously best known deterministic O* running times in solving the unweighted versions of these problems. Moreover, we present kernels of size O(e^qq(p-1)^q) for (q,p)-WDM and (q,p)-WSP, improving the previously best known kernels of size O(q!q(p-1)^q) for these problems.
94,833,765
improved approximation algorithms for box contact representations
We study the following geometric representation problem: Given a graph whose vertices correspond to axis-aligned rectangles with fixed dimensions, arrange the rectangles without overlaps in the plane such that two rectangles touch if the graph contains an edge between them. This problem is called Contact Representation of Word Networks (Crown) since it formalizes the geometric problem behind drawing word clouds in which semantically related words are close to each other. Crown is known to be NP-hard, and there are approximation algorithms for certain graph classes for the optimization version, Max-Crown, in which realizing each desired adjacency yields a certain profit. We present the first O(1)-approximation algorithm for the general case, when the input is a complete weighted graph, and for the bipartite case. Since the subgraph of realized adjacencies is necessarily planar, we also consider several planar graph classes (namely stars, trees, outerplanar, and planar graphs), improving upon the known results. For some graph classes, we also describe improvements in the unweighted case, where each adjacency yields the same profit. Finally, we show that the problem is APX-complete on bipartite graphs of bounded maximum degree.
94,922,150
generalized rank weights duality and griesmer bound
We consider linear codes over some fixed finite field extension over an arbitrary finite field. Gabidulin introduced the rank weight for such codes, associating a matrix to a codeword and studied basic properties of these so-called rank metric codes, in analogy with codes endowed with the classical Hamming distance. Inspired by the characterization of wiretap II codes in terms of generalized Hamming weights by Wei, Kurihara \textit{et al.} defined some generalized rank weights and showed their interest in secure network coding. In this paper, we derive a statement for generalized rank weights of the dual code, completely analogous to Wei's one for generalized Hamming weights. We then establish a Griesmer bound for these generalized rank weights and discuss the equality case.
95,053,101
efficient approximation of well founded justification and well founded domination corrected and extended version
Many native ASP solvers exploit unfounded sets to compute consequences of a logic program via some form of well-founded negation, but disregard its contrapositive, well-founded justification (WFJ), due to computational cost. However, we demonstrate that this can hinder propagation of many relevant conditions such as reachability. In order to perform WFJ with low computational cost, we devise a method that approximates its consequences by computing dominators in a flowgraph, a problem for which linear-time algorithms exist. Furthermore, our method allows for additional unfounded set inference, called well-founded domination (WFD). We show that the effect of WFJ and WFD can be simulated for a important classes of logic programs that include reachability. This paper is a corrected and extended version of a paper published at the 12th International Conference on Logic Programming and Nonmonotonic Reasoning (LPNMR 2013). It has been adapted to exclude Theorem 10 and its consequences, but provides all missing proofs.
95,159,000
an algorithmic solution to the five point pose problem based on the cayley representation of orthogonal matrices
We give a new algorithmic solution to the well-known five-point pose problem. Our approach does not deal with the famous cubic constraint on an essential matrix. Instead, we use the Cayley representation of orthogonal matrices in order to obtain a polynomial system from epipolar constraints. Solving that system, we directly get a rotation matrix and translation vector of the second camera.
95,166,803
on bootstrapping machine learning performance predictors via analytical models
Performance modeling typically relies on two antithetic methodologies: white box models, which exploit knowledge on system's internals and capture its dynamics using analytical approaches, and black box techniques, which infer relations among the input and output variables of a system based on the evidences gathered during an initial training phase. In this paper we investigate a technique, which we name Bootstrapping, which aims at reconciling these two methodologies and at compensating the cons of the one with the pros of the other. We thoroughly analyze the design space of this gray box modeling technique, and identify a number of algorithmic and parametric trade-offs which we evaluate via two realistic case studies, a Key-Value Store and a Total Order Broadcast service.
95,171,454
adaptively sharing time series with differential privacy
Sharing real-time aggregate statistics of private data is of great value to the public to perform data mining for understanding important phenomena, such as Influenza outbreaks and traffic congestion. However, releasing time-series data with standard differential privacy mechanism has limited utility due to high correlation between data values. We propose FAST, a novel framework to release real-time aggregate statistics under differential privacy based on filtering and adaptive sampling. To minimize the overall privacy cost, FAST adaptively samples long time-series according to the detected data dynamics. To improve the accuracy of data release per time stamp, FAST predicts data values at non-sampling points and corrects noisy observations at sampling points. Our experiments with real-world as well as synthetic data sets confirm that FAST improves the accuracy of released aggregates even under small privacy cost and can be used to enable a wide range of monitoring applications.
95,488,835
gesture recognition with a focus on important actions by using a path searching method in weighted graph
This paper proposes a method of gesture recognition with a focus on important actions for distinguishing similar gestures. The method generates a partial action sequence by using optical flow images, expresses the sequence in the eigenspace, and checks the feature vector sequence by applying an optimum path-searching method of weighted graph to focus the important actions. Also presented are the results of an experiment on the recognition of similar sign language words.
95,716,193
on prefix normal words
We present a new class of binary words: the prefix normal words. They are defined by the property that for any given length k, no factor of length k has more a's than the prefix of the same length. These words arise in the context of indexing for jumbled pattern matching (a.k.a. permutation matching or Parikh vector matching), where the aim is to decide whether a string has a factor with a given multiplicity of characters, i.e., with a given Parikh vector. Using prefix normal words, we give the first non-trivial characterization of binary words having the same set of Parikh vectors of factors. We prove that the language of prefix normal words is not context-free and is strictly contained in the language of pre-necklaces, which are prefixes of powers of Lyndon words. We discuss further properties and state open problems.
95,787,555
protein threading based on nonlinear integer programming
Protein threading is a method of computational protein structure prediction used for protein sequences which have the same fold as proteins of known structures but do not have homologous proteins with known structure. The most popular algorithm is based on linear integer programming. In this paper, we consider methods based on nonlinear integer programming. Actually, the existing linear integer programming is directly linearized from the original quadratic integer programming. We then develop corresponding efficient algorithms.
96,054,451
the fundamental scale of descriptions
The complexity of a system description is a function of the entropy of its symbolic description. Prior to computing the entropy of the system description, an observation scale has to be assumed. In natural language texts, typical scales are binary, characters, and words. However, considering languages as structures built around certain preconceived set of symbols, like words or characters, is only a presumption. This study depicts the notion of the Description Fundamental Scale as a set of symbols which serves to analyze the essence a language structure. The concept of Fundamental Scale is tested using English and MIDI music texts by means of an algorithm developed to search for a set of symbols, which minimizes the system observed entropy, and therefore best expresses the fundamental scale of the language employed. Test results show that it is possible to find the Fundamental Scale of some languages. The concept of Fundamental Scale, and the method for its determination, emerges as an interesting tool to facilitate the study of languages and complex systems.
96,146,822
the bag of frames approach a not so sufficient model for urban soundscapes
The "bag-of-frames" approach (BOF), which encodes audio signals as the long-term statistical distribution of short-term spectral features, is commonly regarded as an effective and sufficient way to represent environmental sound recordings (soundscapes) since its introduction in an influential 2007 article. The present paper describes a concep-tual replication of this seminal article using several new soundscape datasets, with results strongly questioning the adequacy of the BOF approach for the task. We show that the good accuracy originally re-ported with BOF likely result from a particularly thankful dataset with low within-class variability, and that for more realistic datasets, BOF in fact does not perform significantly better than a mere one-point av-erage of the signal's features. Soundscape modeling, therefore, may not be the closed case it was once thought to be. Progress, we ar-gue, could lie in reconsidering the problem of considering individual acoustical events within each soundscape.
96,152,805
improved online square into square packing
In this paper, we show an improved bound and new algorithm for the online square-into-square packing problem. This two-dimensional packing problem involves packing an online sequence of squares into a unit square container without any two squares overlapping. The goal is to find the largest area $\alpha$ such that any set of squares with total area $\alpha$ can be packed. We show an algorithm that can pack any set of squares with total area $\alpha \leq 3/8$ into a unit square in an online setting, improving the previous bound of $11/32$.
96,206,767
efficient refinement of gps based localization in urban areas using visual information and sensor parameter
An efficient method is proposed for refining GPS-acquired location coordinates in urban areas using camera images, Google Street View (GSV) and sensor parameters. The main goal is to compensate for GPS location imprecision in dense area of cities due to proximity to walls and buildings. Avail-able methods for better localization often use visual information by using query images acquired with camera-equipped mobile devices and applying image retrieval techniques to find the closest match in a GPS-referenced image data set. The search areas required for reliable search are about 1-2 sq. Km and the accuracy is typically 25-100 meters. Here we describe a method based on image retrieval where a reliable search can be confined to areas of 0.01 sq. Km and the accuracy in our experiments is less than 10 meters. To test our procedure we created a database by acquiring all Google Street View images close to what is seen by a pedestrian in a large region of downtown Chicago and saved all coordinates and orientation data to be used for confining our search region. Prior knowledge from approximate position of query image is leveraged to address complexity and accuracy issues of our search in a large scale geo-tagged data set. One key aspect that differentiates our work is that it utilizes the sensor information of GPS SOS and the camera orientation in improving localization. Finally we demonstrate retrieval-based technique are less accurate in sparse open areas compared with purely GPS measurement. The effectiveness of our approach is discussed in detail and experimental results show improved performance when compared with regular approaches.
96,403,140
road detection by one class color classification dataset and experiments
Detecting traversable road areas ahead a moving vehicle is a key process for modern autonomous driving systems. A common approach to road detection consists of exploiting color features to classify pixels as road or background. These algorithms reduce the effect of lighting variations and weather conditions by exploiting the discriminant/invariant properties of different color representations. Furthermore, the lack of labeled datasets has motivated the development of algorithms performing on single images based on the assumption that the bottom part of the image belongs to the road surface. #R##N#In this paper, we first introduce a dataset of road images taken at different times and in different scenarios using an onboard camera. Then, we devise a simple online algorithm and conduct an exhaustive evaluation of different classifiers and the effect of using different color representation to characterize pixels.
96,948,785
data gathering for sensing applications in vehicular networks
We propose to use Vehicular ad hoc networks (VANET) as the infrastructure for an urban cyber-physical system for gathering up-to-date data about a city, like traffic conditions or environmental parameters. In this context, it is critical to design a data collection protocol that enables retrieving the data from the vehicles in almost real-time in an efficient way for urban scenarios. #R##N#We propose Back off-based Per-hop Forwarding (BPF), a broadcast-based receiver-oriented protocol that uses the destination location information to select the forwarding order among the nodes receiving the packet. BFP does not require nodes to exchange periodic messages with their neighbors communicating their locations to keep a low management message overhead. It uses geographic information about the final destination node in the header of each data packet to route it in a hop-by-hop basis. It takes advantage of redundant forwarding to increase packet delivery to a destination, what is more critical in an urban scenario than in a highway, where the road topology does not represent a challenge for forwarding. #R##N#We evaluate the performance of the BPF protocol using ns-3 and a Manhattan grid topology and compare it with well-known broadcast suppression techniques. Our results show that BPF achieves significantly higher packet delivery rates at a reduced redundancy cost.
97,275,946
a typeful characterization of multiparty structured conversations based on binary sessions
Relating the specification of the global communication behavior of a distributed system and the specifications of the local communication behavior of each of its nodes/peers (e.g., to check if the former is realizable by the latter under some safety and/or liveness conditions) is a challenging problem addressed in many relevant scenarios. In the context of networked software services, a widespread programming language-based approach relies on global specifications defined by session types or behavioral contracts. Static type checking can then be used to ensure that components follow the prescribed interaction protocols. In the case of session types, developments have been mostly framed within quite different type theories for either binary (two-party) or multiparty (n-party) protocols. Unfortunately, the precise relationship between analysis techniques for multiparty and binary protocols is yet to be understood. #R##N#In this work, we bridge this previously open gap in a principled way: we show that the analysis of multiparty protocols can also be developed within a much simpler type theory for binary protocols, ensuring protocol fidelity and deadlock-freedom. We present characterization theorems which provide new insights on the relation between two existing, yet very differently motivated, session type systems---one based on linear logic, the other based on automata theory---and suggest useful type-based verification techniques for multiparty systems relying on reductions to the binary case.
97,329,072
a parametric analysis of project management performance to enhance software development process
Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects developed in a service oriented software company in order to comprehend the project management process. The analysis throws light on the existence of variation in the aforementioned factors between estimation and observed results. It further captures the need for betterment of project management process in estimation and allocation of resources in the realization of high quality software product. The paper therefore aims to bring in an improved awareness in software engineering personnel concerning the magnitude and significance of better estimation and accurate allocation of resources for developing successful project.
97,558,857
adaptive objectness for object tracking
To exploit the reliable prior knowledge that the target object in tracking must be an object other than nonobject, in this letter, we propose to adapt objectness for visual object tracking. Instead of directly applying an existing objectness measure that is generic and handles various objects and environments, we adapt it to be compatible to the specific tracking sequence and object. More specifically, we use the newly proposed binarized normed gradient (BING) objectness as the base, and then train an object-adaptive objectness for each tracking task. The training is implemented by using an adaptive support vector machine that integrates information from the specific tracking target into the BING measure. We emphasize that the benefit of the proposed adaptive objectness, named ADOBING, is generic. To show this, we combine ADOBING with eight top performed trackers in recent evaluations. We run the ADOBING-enhanced trackers along with their base trackers on the CVPR2013 benchmark, and our methods consistently improve the base trackers both in overall performance and under all challenge factors. Noting that the way we integrate objectness in visual tracking is generic and straightforward, we expect even more improvement by using tracker-specific objectness.
97,688,833
ctbnctoolkit continuous time bayesian network classifier toolkit
Continuous time Bayesian network classifiers are designed for temporal classification of multivariate streaming data when time duration of events matters and the class does not change over time. This paper introduces the CTBNCToolkit: an open source Java toolkit which provides a stand-alone application for temporal classification and a library for continuous time Bayesian network classifiers. CTBNCToolkit implements the inference algorithm, the parameter learning algorithm, and the structural learning algorithm for continuous time Bayesian network classifiers. The structural learning algorithm is based on scoring functions: the marginal log-likelihood score and the conditional log-likelihood score are provided. CTBNCToolkit provides also an implementation of the expectation maximization algorithm for clustering purpose. The paper introduces continuous time Bayesian network classifiers. How to use the CTBNToolkit from the command line is described in a specific section. Tutorial examples are included to facilitate users to understand how the toolkit must be used. A section dedicate to the Java library is proposed to help further code extensions.
98,231,526
tighter fourier transform complexity tradeoffs
The Fourier Transform is one of the most important linear transformations used in science and engineering. Cooley and Tukey's Fast Fourier Transform (FFT) from 1964 is a method for computing this transformation in time $O(n\log n)$. Achieving a matching lower bound in a reasonable computational model is one of the most important open problems in theoretical computer science. #R##N#In 2014, improving on his previous work, Ailon showed that if an algorithm speeds up the FFT by a factor of $b=b(n)\geq 1$, then it must rely on computing, as an intermediate "bottleneck" step, a linear mapping of the input with condition number $\Omega(b(n))$. Our main result shows that a factor $b$ speedup implies existence of not just one but $\Omega(n)$ $b$-ill conditioned bottlenecks occurring at $\Omega(n)$ different steps, each causing information from independent (orthogonal) components of the input to either overflow or underflow. This provides further evidence that beating FFT is hard. Our result also gives the first quantitative tradeoff between computation speed and information loss in Fourier computation on fixed word size architectures. The main technical result is an entropy analysis of the Fourier transform under transformations of low trace, which is interesting in its own right.
98,454,352
word packing algorithms for dynamic connectivity and dynamic sets
We examine several (dynamic) graph and set intersection problems in the word-RAM model with word size $w$. We begin with Dynamic Connectivity where we need to maintain a fully dynamic graph $G=(V,E)$ with $n=|V|$ vertices while supporting $(s,t)$-connectivity queries. To do this, we provide a new simplified worst-case solution for the famous Dynamic Connectivity (which is interesting on its own merit), and then show how in the word-RAM model the query and update cost can be reduced to $O(\sqrt{n\frac{\log n}{w}\log(\frac{w}{\log n})})$, assuming $w < n^{1-\Omega(1)}$. Since $w=\Omega(\log n)$, this bound is always $O(\sqrt{n})$ and it is $o(\sqrt{n})$ when $w=\omega(\log n)$. #R##N#We then examine the task of maintaining a family $F$ of dynamic sets where insertions and deletions into the sets are allowed, while enabling a set intersection reporting queries on sets from $F$. We first show that given a known upper-bound $d$ on the size of any set, we can maintain $F$ so that a set intersection reporting query costs $O(\frac{d}{w/log^2 w})$ expected time, and updates cost $O(\log w)$ expected time. Using this algorithm we can list all triangles of a graph $G=(V,E)$ in $O(\frac{m\alpha}{w/log^2 w} +t)$ expected time where $m=|E|$, $\alpha$ is the arboricity of $G$, and $t$ is the size of the output. This is comparable with known algorithms that run in $O(m \alpha)$ time. #R##N#Next, we provide an incremental data structure on $F$ that supports intersection proof queries where two sets that intersect must return an element in the intersection. Both queries and insertions of elements into sets take $O(\sqrt \frac{N}{w/log^2 w})$ expected time, where $N=\sum_{S\in F} |S|$. Finally, we provide time/space tradeoffs for the fully dynamic set intersection listing problem.
98,577,079
recommending learning algorithms and their associated hyperparameters
The success of machine learning on a given task dependson, among other things, which learning algorithm is selected and its associated hyperparameters. Selecting an appropriate learning algorithm and setting its hyperparameters for a given data set can be a challenging task, especially for users who are not experts in machine learning. Previous work has examined using meta-features to predict which learning algorithm and hyperparameters should be used. However, choosing a set of meta-features that are predictive of algorithm performance is difficult. Here, we propose to apply collaborative filtering techniques to learning algorithm and hyperparameter selection, and find that doing so avoids determining which meta-features to use and outperforms traditional meta-learning approaches in many cases.
98,580,527
self organizing maps in computer security
Some argue that biologically inspired algorithms are the future of solving difficult problems in computer science. Others strongly believe that the future lies in the exploration of mathematical foundations of problems at hand. The field of computer security tends to accept the latter view as a more appropriate approach due to its more workable validation and verification possibilities. The lack of rigorous scientific practices prevalent in biologically inspired security research does not aid in presenting bio-inspired security approaches as a viable way of dealing with complex security problems. This chapter introduces a biologically inspired algorithm, called the SelfOrganising Map (SOM), that was developed by Teuvo Kohonen in 1981. Since the algorithm’s inception it has been scrutinised by the scientific community and analysed in more than 4000 research papers, many of which dealt with various computer security issues, from anomaly detection, analysis of executables all the way to wireless network monitoring. In this chapter a review of security related SOM research undertaken in the past is presented and analysed. The algorithm’s biological analogies are detailed and the author’s view on the future possibilities of this successful bio-inspired approach are given. The SOM algorithm’s close relation to a number of vital functions of the human brain and the emergence of multi-core computer architectures are the two main reasons behind our assumption that the future of the SOM algorithm and its variations is promising, notably in the field of computer security.
98,607,775
one generalization of counters
In this paper we generalize the definition of a counter and investigate the resulting increase in power of deterministic counter automata in terms of language recognition.
98,825,195
parallel compressed sensing reconstruction
In this letter, a parallel reconstruction architecture for compressed sensing is proposed. In this architecture, a measurement matrix is constructed from a block-diagonal sensing matrix and the sparsifying basis of the target signal. In this way, the projection of the signal onto the sparsifying basis can be divided into several segments and all segments can be reconstructed in parallel. Thus, the computational complexity and the time for reconstruction can be reduced significantly. Furthermore, to reduce the number of measurements needed to achieve the desired reconstruction error performance, permutation is introduced for the projection of the signal. To implement permutation in the parallel reconstruction architecture, only a modification is needed for the measurem ent matrix at the encoder side, while decoding can be achieved in parallel.
99,189,775
constellation design for multi color visible light communications
In this paper, we propose a novel high dimensional constellation design scheme for visible light communication (VLC) systems employing red/green/blue light emitting diodes (RGB LEDs). It is in fact a generalized color shift keying (CSK) scheme which does not suffer efficiency loss due to a constrained sum intensity for all constellation symbols. Crucial lighting requirements are included as optimization constraints. To control non-linear distortion, the optical peak-to-average-power ratio (PAPR) of LEDs is individually constrained. Fixing the average optical power, our scheme is able to achieve much lower bit-error rate (BER) than conventional schems especially when illumination color is more "unbalanced". When cross-talks exist among the multiple optical channels, we apply a singular value decomposition (SVD)-based pre-equalizer and redesign the constellations, and such scheme is shown to outperform post-equalized schemes based on zero-forcing or linear minimum-mean-squared-error (LMMSE) principles. To further reduce system BER, a binary switching algorithm (BSA) is employed the first time for labeling high dimensional constellation. We thus obtains the optimal bits-to-symbols mapping.
99,356,858
proving linearisability via coarse grained abstraction
Linearisability has become the standard safety criterion for concurrent data structures ensuring that the effect of a concrete operation takes place after the execution some atomic statement (often referred to as the linearisation point). Identification of linearisation points is a non-trivial task and it is even possible for an operation to be linearised by the execution of other concurrent operations. This paper presents a method for verifying linearisability that does not require identification of linearisation points in the concrete code. Instead, we show that the concrete program is a refinement of some coarse-grained abstraction. The linearisation points in the abstraction are straightforward to identify and the linearisability proof itself is simpler due to the coarse granularity of its atomic statements. The concrete fine-grained program is a refinement of the coarse-grained program, and hence is also linearisable because every behaviour of the concrete program is a possible behaviour its abstraction.
99,485,931
learning to learn
Preface. Part I: Overview Articles. 1. Learning to Learn: Introduction and Overview S. Thrun, L. Pratt. 2. A Survey of Connectionist Network Reuse Through Transfer L. Pratt, B. Jennings. 3. Transfer in Cognition A. Robins. Part II: Prediction. 4. Theoretical Models of Learning to Learn J. Baxter. 5. Multitask Learning R. Caruana. 6. Making a Low-Dimensional Representation Suitable for Diverse Tasks N. Intrator, S. Edelman. 7. The Canonical Distortion Measure for Vector Quantization and Function Approximation J. Baxter. 8. Lifelong Learning Algorithms S. Thrun. Part III: Relatedness. 9. The Parallel Transfer of Task Knowledge Using Dynamic Learning Rates Based on a Measure of Relatedness D.L. Silver, R.E. Mercer. 10. Clustering Learning Tasks and the Selective Cross-Task Transfer of Knowledge S. Thrun, J. O'Sullivan. Part IV: Control. 11. CHILD: A First Step Towards Continual Learning M.B. Ring. 12. Reinforcement Learning with Self-Modifying Policies J. Schmidhuber, et al. 13. Creating Advice-Taking Reinforcement Learners R. Maclin, J.W. Shavlik. Contributing Authors. Index.
99,927,159
international scientific migration and collaboration patterns following a bibliometrics line of investigation
This study introduces a bibliometric approach to st udy international scientific migration, based on an analysis of the affiliation countries of auth ors publishing in peer reviewed scientificscholarly journals indexed in Scopus. A model is pr esented relating base notions in migration and collaboration studies to bibliometric construct s, and its potentialities and limitations are discussed. Synchronous and asynchronous analyses are presented for 10 rapidly growing countries and 7 scientifically established countrie s, comparing international migration with coauthorship relationships. Rough error rates of the proposed indicators are estimated. It is concluded that the bibliometric approach is useful provided that its outcomes are interpreted with care. Error rates for units of assessment with larg e indicator values are estimated to be fairly below 10 per cent. International migration and coll aboration, though related, are different aspects of globalization. Common language plays a larger, a nd political tensions a less prominent role in the former compared to the latter.
99,952,873
enframe a platform for processing probabilistic data
This paper introduces ENFrame, a unified data processing platform for querying and mining probabilistic data. Using ENFrame, users can write programs in a fragment of Python with constructs such as bounded-range loops, list comprehension, aggregate operations on lists, and calls to external database engines. The program is then interpreted probabilistically by ENFrame. #R##N#The realisation of ENFrame required novel contributions along several directions. We propose an event language that is expressive enough to succinctly encode arbitrary correlations, trace the computation of user programs, and allow for computation of discrete probability distributions of program variables. We exemplify ENFrame on three clustering algorithms: k-means, k-medoids, and Markov Clustering. We introduce sequential and distributed algorithms for computing the probability of interconnected events exactly or approximately with error guarantees. Experiments with k-medoids clustering of sensor readings from energy networks show orders-of-magnitude improvements of exact clustering using ENFrame over na\"ive clustering in each possible world, of approximate over exact, and of distributed over sequential algorithms.
100,991,319
weighted shortest path models a revisit to the simulation of internet routing
Understanding how packets are routed in Internet is significantly important to Internet measurement and modeling. The conventional solution for route simulation is based on the assumption of unweighted shortest path. However, it has been found and widely accepted that a packet in Internet is usually not transmitted along the unweighted shortest path between its source and destination. To better simulate the routing behavior of a packet, we thoroughly explore the real-world Internet routes and present a novel local information based simulation model, with a tuning parameter, which assigns weights to links based on local information and then simulates the Internet route with weighted shortest path. Comparisons with baseline approaches show its capability in well replicating the route length distribution and other structural properties of the Internet topology. Meanwhile, the optimal parameter of this model locates in the range of (0, 2), which implies that a packet inside the Internet inclines to move to nodes with small degrees. This behavior actually reflects the design philosophy of Internet routing, balancing between network efficiency and traffic congestion.
101,255,788
fuzzy aggregates in fuzzy answer set programming
Fuzzy answer set programming is a declarative framework for representing and reasoning about knowledge in fuzzy environments. However, the unavailability of fuzzy aggregates in disjunctive fuzzy logic programs, DFLP, with fuzzy answer set semantics prohibits the natural and concise representation of many interesting problems. In this paper, we extend DFLP to allow arbitrary fuzzy aggregates. We define fuzzy answer set semantics for DFLP with arbitrary fuzzy aggregates including monotone, antimonotone, and nonmonotone fuzzy aggregates. We show that the proposed fuzzy answer set semantics subsumes both the original fuzzy answer set semantics of DFLP and the classical answer set semantics of classical disjunctive logic programs with classical aggregates, and consequently subsumes the classical answer set semantics of classical disjunctive logic programs. We show that the proposed fuzzy answer sets of DFLP with fuzzy aggregates are minimal fuzzy models and hence incomparable, which is an important property for nonmonotonic fuzzy reasoning.
101,316,822
robust sparse signal recovery for compressed sensing with sampling and dictionary uncertainties
Compressed sensing (CS) shows that a signal having a sparse or compressible representation can be recovered from a small set of linear measurements. In classical CS theory, the sampling matrix and dictionary are assumed be known exactly in advance. However, uncertainties exist due to sampling distortion, finite grids of the parameter space of dictionary, etc. In this paper, we take a generalized sparse signal model, which simultaneously considers the sampling and dictionary uncertainties. Based on the new signal model, a new optimization model for robust sparse signal recovery is proposed. This optimization model can be deduced with stochastic robust approximation analysis. Both convex relaxation and greedy algorithms are used to solve the optimization problem. For the convex relaxation method, a sufficient condition for recovery by convex relaxation method is given; For the greedy algorithm, it is realized by the introduction of a pre-processing of the sensing matrix and the measurements. In numerical experiments, both simulated data and real-life ECG data based results show that the proposed method has a better performance than the current methods.
101,358,407
consensus in the presence of interference
This paper studies distributed strategies for average-consensus of arbitrary vectors in the presence of network interference. We assume that the underlying communication on any \emph{link} suffers from \emph{additive interference} caused due to the communication by other agents following their own consensus protocol. Additionally, no agent knows how many or which agents are interfering with its communication. Clearly, the standard consensus protocol does not remain applicable in such scenarios. In this paper, we cast an algebraic structure over the interference and show that the standard protocol can be modified such that the average is reachable in a subspace whose dimension is complimentary to the maximal dimension of the interference subspaces (over all of the communication links). To develop the results, we use \emph{information alignment} to align the intended transmission (over each link) to the null-space of the interference (on that link). We show that this alignment is indeed invertible, i.e. the intended transmission can be recovered over which, subsequently, consensus protocol is implemented. That \emph{local} protocols exist even when the collection of the interference subspaces span the entire vector space is somewhat surprising.
101,374,798
on some unifications arising from the mimo rician shadowed model
This paper shows that the proposed Rician shadowed model for multi-antenna communications allows for the unification of a wide set of models, both for multiple-input multiple output (MIMO) and single-input single output (SISO) communications. The MIMO Rayleigh and MIMO Rician can be deduced from the MIMO Rician shadowed, and so their SISO counterparts. Other SISO models, besides the Rician shadowed proposed by Abdi et. al., are included in the model, such as the $\kappa$-$\mu$ defined by Yacoub, and its recent generalization, the \mbox{$\kappa$-$\mu$} shadowed model. Moreover, the SISO \mbox{$\eta$-$\mu$} and \mbox{Nakagami-$q$} models can be seen as particular cases of the MIMO Rician shadowed. The literature already presents the probability density function (pdf) of the Rician shadowed Gram channel matrix in terms of the well-known gamma-Wishart distribution. We here derive its moment generating function in a tractable form. Closed-form expressions for the cumulative distribution function and the pdf of the maximum eigenvalue are also carried out.
101,421,797
controlling false positives in frequent itemsets mining through the vc dimension
Frequent itemsets mining is a fundamental primitive in data mining, requiring to identify all itemsets that appear in a fraction at least $\theta$ of the transactional dataset. However, a transactional dataset only represents a sample from the underlying process that generates the data, the understanding of which is the ultimate goal of data mining. In general, the generative process yields transactions according to a probability distribution. Therefore, the output of traditional frequent itemsets mining algorithms can and typically does contain a large number of spurious patterns that only happen to have a support larger than the minimum threshold $\theta$ in the dataset at hand because of the stochasticity inherent in the dataset generation process. In order for the end user to take informed decisions using the mining results, it is necessary that the returned collection only contains \emph{Real Frequent Itemsets (RFI's)}, i.e., itemsets $A$ such that their \emph{real frequency} (the probability that $A$ appear in a transaction) is greater or equal to the the minimum threshold $\theta$. In this work we present an algorithm to extract a collection $C$ of RFI's while keeping the probability that one or more spurious itemsets are included in $C$ to within a user-specified limit. In other words, we present a statistical test for RFI's for which we can guarantee that the \emph{Family-Wise Error Rate} is within the user-specified limits. We use results from statistical learning theory involving the Vapnik-Chervonenkis (VC) dimension of the problem at hand to accomplish this goal. This allows us to achieve, on the same data, much stricter bounds on the probability of a Type I error than what could be done using traditional multiple hypothesis testing corrections. In our experimental evaluation we show empirically that our test has very high statistical power.
101,457,924
limits on support recovery with probabilistic models an information spectrum approach
The support recovery problem consists of determining a sparse subset of a set of variables that is relevant in generating a set of observations, and arises in a diverse range of settings such as group testing, compressive sensing, and subset selection in regression. In this paper, we take a unified approach to support recovery problems, considering general probabilistic observation models relating a sparse data vector to an observation vector. We study the information-theoretic limits of both exact and partial support recovery, taking a novel approach based on information-spectrum techniques. We provide general achievability and converse bounds characterizing the trade-off between the error probability and number of measurements, and we specialize these bounds to variants of models from group testing, linear regression, and 1-bit compressive sensing. In several cases, our bounds not only provide matching scaling laws in the necessary and sufficient number of measurements, but also sharp thresholds with matching constant factors. Our approach has several advantages over previous approaches: For the achievability part, we obtain sharp thresholds under broader scalings of the sparsity level and other parameters (e.g.~signal-to-noise ratio) compared to several previous works, and for the converse part, we not only provide conditions under which the error probability fails to vanish, but also conditions under which it tends to one.
101,705,070
on reverse engineering the kuka robot language
Most commercial manufacturers of industrial robots require their robots to be programmed in a proprietary language tailored to the domain - a typical domain-specific language (DSL). However, these languages oftentimes suffer from shortcomings such as controller-specific design, limited expressiveness and a lack of extensibility. For that reason, we developed the extensible Robotics API for programming industrial robots on top of a general-purpose language. Although being a very flexible approach to programming industrial robots, a fully-fledged language can be too complex for simple tasks. Additionally, legacy support for code written in the original DSL has to be maintained. For these reasons, we present a lightweight implementation of a typical robotic DSL, the KUKA Robot Language (KRL), on top of our Robotics API. This work deals with the challenges in reverse-engineering the language and mapping its specifics to the Robotics API. We introduce two different approaches of interpreting and executing KRL programs: tree-based and bytecode-based interpretation.
102,836,821
modelling office energy consumption an agent based approach
In this paper, we develop an agent-based model which integrates four important elements, i.e. organisational energy management policies/regulations, energy management technologies, electric appliances and equipment, and human behaviour, based on a case study, to simulate the energy consumption in office buildings. With the model, we test the effectiveness of different energy management strategies, and solve practical office energy consumption problems. This paper theoretically contributes to an integration of four elements involved in the complex organisational issue of office energy consumption, and practically contributes to an application of agent-based approach for office building energy consumption study.
103,181,800
proximity based non uniform abstractions for approximate planning
In a deterministic world, a planning agent can be certain of the consequences of its planned sequence of actions. Not so, however, in dynamic, stochastic domains where Markov decision processes are commonly used. Unfortunately these suffer from the 'curse of dimensionality': if the state space is a Cartesian product of many small sets ('dimensions'), planning is exponential in the number of those dimensions.#R##N##R##N#Our new technique exploits the intuitive strategy of selectively ignoring various dimensions in different parts of the state space. The resulting non-uniformity has strong implications, since the approximation is no longer Markovian, requiring the use of a modified planner. We also use a spatial and temporal proximity measure, which responds to continued planning as well as movement of the agent through the state space, to dynamically adapt the abstraction as planning progresses.#R##N##R##N#We present qualitative and quantitative results across a range of experimental domains showing that an agent exploiting this novel approximation method successfully finds solutions to the planning problem using much less than the full state space. We assess and analyse the features of domains which our method can exploit.
104,095,019
a distributed asynchronous and incremental algorithm for nonconvex optimization an admm based approach
The alternating direction method of multipliers (ADMM) has been popular for solving many signal processing problems, convex or nonconvex. In this paper, we study an asynchronous implementation of the ADMM for solving a nonconvex nonsmooth optimization problem, whose objective is the sum of a number of component functions. The proposed algorithm allows the problem to be solved in a distributed, asynchronous and incremental manner. First, the component functions can be distributed to different computing nodes, who perform the updates asynchronously without coordinating with each other. Two sources of asynchrony are covered by our algorithm: one is caused by the heterogeneity of the computational nodes, and the other arises from unreliable communication links. Second, the algorithm can be viewed as implementing an incremental algorithm where at each step the (possibly delayed) gradients of only a subset of component functions are update d. We show that when certain bounds are put on the level of asynchrony, the proposed algorithm converges to the set of stationary solutions (resp. optimal solutions) for the nonconvex (resp. convex) problem. To the best of our knowledge, the proposed ADMM implementation can tolerate the highest degree of asynchrony, among all known asynchronous variants of the ADMM. Moreover, it is the first ADMM implementation that can deal with nonconvexity and asynchrony at the same time.
104,370,652
a general framework for bilateral and mean shift filtering
We present a generalization of the bilateral filter that can be applied to feature-preserving smoothing of signals on images, meshes, and other domains within a single unified framework. Our discretization is competitive with state-of-the-art smoothing techniques in terms of both accuracy and speed, is easy to implement, and has parameters that are straightforward to understand. Unlike previous bilateral filters developed for meshes and other irregular domains, our construction reduces exactly to the image bilateral on rectangular domains and comes with a rigorous foundation in both the smooth and discrete settings. These guarantees allow us to construct unconditionally convergent mean-shift schemes that handle a variety of extremely noisy signals. We also apply our framework to geometric edge-preserving effects like feature enhancement and show how it is related to local histogram techniques.
104,757,940
complexity and unwinding for intransitive noninterference
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows. Checking (i) P-security (Goguen and Meseguer), (ii) IP-security (Haigh and Young), and (iii) TA-security (van der Meyden) are all in PTIME, while checking TO-security (van der Meyden) is undecidable, as is checking ITO-security (van der Meyden). The most important ingredients in the proofs of the PTIME upper bounds are new characterizations of the respective security notions, which also lead to new unwinding proof techniques that are shown to be sound and complete for these notions of security, and enable the algorithms to return simple counter-examples demonstrating insecurity. Our results for IP-security improve a previous doubly exponential bound of Hadj-Alouane et al.
105,256,292
a representation of robotic behaviors using component port arbitration
Developing applications considering reactiveness, scalability and re-usability has always been at the center of attention of robotic researchers. Behavior-based architectures have been proposed as a programming paradigm to develop robust and complex behaviors as integration of simpler modules whose activities are directly modulated by sensory feedback or input from other models. The design of behavior based systems, however, becomes increasingly difficult as the complexity of the application grows. This article proposes an approach for modeling and coordinating behaviors in distributed architectures based on port arbitration which clearly separates representation of the behaviors from the composition of the software components. Therefore, based on different behavioral descriptions, the same software components can be reused to implement different applications.
105,390,565
blind sensor calibration using approximate message passing
The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure.
106,094,172
towards combining htn planning and geometric task planning
In this paper we present an interface between a symbolic planner and a geometric task planner, which is different to a standard trajectory planner in that the former is able to perform geometric reasoning on abstract entities---tasks. We believe that this approach facilitates a more principled interface to symbolic planning, while also leaving more room for the geometric planner to make independent decisions. We show how the two planners could be interfaced, and how their planning and backtracking could be interleaved. We also provide insights for a methodology for using the combined system, and experimental results to use as a benchmark with future extensions to both the combined system, as well as to the geometric task planner.
106,547,350
turing then now and still key
This paper looks at Turing’s postulations about Artificial Intelligence in his paper ‘Computing Machinery and Intelligence’, published in 1950. It notes how accurate they were and how relevant they still are today. This paper notes the arguments and mechanisms that he suggested and tries to expand on them further. The paper however is mostly about describing the essential ingredients for building an intelligent model and the problems related with that. The discussion includes recent work by the author himself, who adds his own thoughts on the matter that come from a purely technical investigation into the problem. These are personal and quite speculative, but provide an interesting insight into the mechanisms that might be used for building an intelligent system.
106,632,145
query answering in object oriented knowledge bases in logic programming description and challenge for asp
Computer Science Department, New Mexico State University, NM 88003, USAAbstract. Research on developing ecient and scalable ASP solverscan substantially bene t by the availability of data sets to experimentwith. KB Bio 101 contains knowledge from a biology textbook, has beendeveloped as part of Project Halo, and has recently become available forresearch use. KB Bio 101 is one of the largest KBs available in ASP andthe reasoning with it is undecidable in general. We give a descriptionof this KB and ASP programs for a suite of queries that have been ofpractical interest. We explain why these queries pose signi cant practicalchallenges for the current ASP solvers.
106,665,802
polynomial time algorithms for energy games with special weight structures
Energy games belong to a class of turn-based two-player infinite-duration games played on a weighted directed graph. It is one of the rare and intriguing combinatorial problems that lie in NP?co-NP, but are not known to be in P. The existence of polynomial-time algorithms has been a major open problem for decades and apart from pseudopolynomial algorithms there is no algorithm that solves any non-trivial subclass in polynomial time.#R##N##R##N#In this paper, we give several results based on the weight structures of the graph. First, we identify a notion of penalty and present a polynomial-time algorithm when the penalty is large. Our algorithm is the first polynomial-time algorithm on a large class of weighted graphs. It includes several worst-case instances on which previous algorithms, such as value iteration and random facet algorithms, require at least sub-exponential time. Our main technique is developing the first non-trivial approximation algorithm and showing how to convert it to an exact algorithm. Moreover, we show that in a practical case in verification where weights are clustered around a constant number of values, the energy game problem can be solved in polynomial time. We also show that the problem is still as hard as in general when the clique-width is bounded or the graph is strongly ergodic, suggesting that restricting the graph structure does not necessarily help.
106,798,762
communication efficient parallel belief propagation for latent dirichlet allocation
This paper presents a novel communication-efficient parallel belief propagation (CE-PBP) algorithm for training latent Dirichlet allocation (LDA). Based on the synchronous belief propagation (BP) algorithm, we first develop a parallel belief propagation (PBP) algorithm on the parallel architecture. Because the extensive communication delay often causes a low efficiency of parallel topic modeling, we further use Zipf's law to reduce the total communication cost in PBP. Extensive experiments on different data sets demonstrate that CE-PBP achieves a higher topic modeling accuracy and reduces more than 80% communication cost than the state-of-the-art parallel Gibbs sampling (PGS) algorithm.
107,210,492
expander like codes based on finite projective geometry
We present a novel error correcting code and decoding algorithm which have construction similar to expander codes. The code is based on a bipartite graph derived from the subsumption relations of finite projective geometry, and Reed-Solomon codes as component codes. We use a modified version of well-known Zemor's decoding algorithm for expander codes, for decoding our codes. By derivation of geometric bounds rather than eigenvalue bounds, it has been proved that for practical values of the code rate, the random error correction capability of our codes is much better than those derived for previously studied graph codes, including Zemor's bound. MATLAB simulations further reveal that the average case performance of this code is 10 times better than these geometric bounds obtained, in almost 99% of the test cases. By exploiting the symmetry of projective space lattices, we have designed a corresponding decoder that has optimal throughput. The decoder design has been prototyped on Xilinx Virtex 5 FPGA. The codes are designed for potential applications in secondary storage media. As an application, we also discuss usage of these codes to improve the burst error correction capability of CD-ROM decoder.
107,247,512
single image super resolution via manifold approximation
Image super-resolution remains an important research topic to overcome the limitations of physical acquisition systems, and to support the development of high resolution displays. Previous example-based super-resolution approaches mainly focus on analyzing the co-occurrence properties of low resolution and high-resolution patches. Recently, we proposed a novel single image super-resolution approach based on linear manifold approximation of the high-resolution image-patch space [1]. The image super-resolution problem is then formulated as an optimization problem of searching for the best matched high resolution patch in the manifold for a given low-resolution patch. We developed a novel technique based on the l1 norm sparse graph to learn a set of low dimensional affine spaces or tangent subspaces of the high-resolution patch manifold. The optimization problem is then solved based on the learned set of tangent subspaces. In this paper, we build on our recent work as follows. First, we consider and analyze each tangent subspace as one point in a Grassmann manifold, which helps to compute geodesic pairwise distances among these tangent subspaces. Second, we develop a min-max algorithm to select an optimal subset of tangent subspaces. This optimal subset reduces the computational cost while still preserving the quality of the reconstructed high-resolution image. Third, and to further achieve lower computational complexity, we perform hierarchical clustering on the optimal subset based on Grassmann manifold distances. Finally, we analytically prove the validity of the proposed Grassmann-distance based clustering. A comparison of the obtained results with other state-of-the-art methods clearly indicates the viability of the new proposed framework.
107,411,382
sonification aesthetics and listening for network situational awareness
This paper looks at the problem of using sonification to enable network administrators to maintaining situational awareness about their network environment. Network environments generate a lot of data and the need for continuous monitoring means that sonification systems must be designed in such a way as to maximise acceptance while minimising annoyance and listener fatigue. It will be argued that solutions based on the concept of the soundscape offer an ecological advantage over other sonification designs.
107,552,913
an upper bound on euclidean embeddings of rigid graphs with 8 vertices
A graph is called (generically) rigid in R^d if, for any choice of sufficiently generic edge lengths, it can be embedded in R^d in a finite number of distinct ways, modulo rigid transformations. Here, we deal with the problem of determining the maximum number of planar Euclidean embeddings of minimally rigid graphs with 8 vertices, because this is the smallest unknown case in the plane.
107,592,570
ranking under uncertainty
Ranking objects is a simple and natural procedure for organizing data. It is often performed by assigning a quality score to each object according to its relevance to the problem at hand. Ranking is widely used for object selection, when resources are limited and it is necessary to select a subset of most relevant objects for further processing. In real world situations, the object's scores are often calculated from noisy measurements, casting doubt on the ranking reliability. We introduce an analytical method for assessing the influence of noise levels on the ranking reliability. We use two similarity measures for reliability evaluation, Top-K-List overlap and Kendall's tau measure, and show that the former is much more sensitive to noise than the latter. We apply our method to gene selection in a series of microarray experiments of several cancer types. The results indicate that the reliability of the lists obtained from these experiments is very poor, and that experiment sizes which are necessary for attaining reasonably stable Top-K-Lists are much larger than those currently available. Simulations support our analytical results.
108,060,532
green cellular wireless networks where to begin
Conventional cellular wireless networks were designed with the purpose of providing high throughput for the user and high capacity for the service provider, without any provisions of energy efficiency. As a result, these networks have an enormous Carbon footprint. In this note, we describe the sources of the inefficiencies in such networks. First we quantify how much Carbon footprint such networks generate. We also discuss how much more mobile traffic is expected to increase so that this Carbon footprint will even increase tremendously more. We then discuss specific sources of inefficiency and potential sources of improvement at the physical layer as well as higher layers of the communication protocol hierarchy. In particular, considering that most of the energy inefficiency in wireless cellular networks is at the base stations, we discuss multi-tier networks and point to the potential of exploiting mobility patterns in order to use base station energy judiciously.
108,251,128
achievable rates and training optimization for uplink multiuser massive mimo systems
We study the performance of uplink transmission in a large-scale (massive) MIMO system, where all the transmitters have single antennas and the receiver (base station) has a large number of antennas. Specifically, we first derive the rates th at are possible through minimum mean-squared error (MMSE) channel estimation and three linear receivers: maximum ratio combining (MRC), zero-forcing (ZF), and MMSE. Based on the derived rates, we quantify the amount of energy savings that are possible through increased number of base-station antennas or increased coherence interval. We also analyze achievable total degrees of freedom of such a system without assuming channel state information at the receiver, which is shown to be the same as that of a point-to-point MIMO channel. Linear receiver is sufficient when the number of users is less than the number of antennas. Otherwise, nonlinear processing is necessary to achieve the full degrees of freedom. Finally, the training period and optimal training energy allocation under the average and peak power constraints are optimized jointly to maximize the achievable sum rate when either MRC or ZF receiver is adopted at the receiver.
108,411,630
a simplication of the mv matching algorithm and its proof
For all practical purposes, the Micali-Vazirani [MV80] general graph maximum matching algorithm is still the most ecient known algorithm for the problem. The purpose of this paper is to provide a complete proof of correctness of the algorithm in the simplest possible terms; graph-theoretic machinery developed for this purpose also helps simplify the algorithm.
108,615,132
convex sparse pca for unsupervised feature learning
Principal component analysis (PCA) has been widely applied to dimensionality reduction and data pre-processing for different applications in engineering, biology, social science, and the like. Classical PCA and its variants seek for linear projections of the original variables to obtain the low-dimensional feature representations with maximal variance. One limitation is that it is difficult to interpret the results of PCA. Besides, the classical PCA is vulnerable to certain noisy data. In this paper, we propose a Convex Sparse Principal Component Analysis (CSPCA) algorithm and apply it to feature learning. First, we show that PCA can be formulated as a low-rank regression optimization problem. Based on the discussion, the l2, 1-normminimization is incorporated into the objective function to make the regression coefficients sparse, thereby robust to the outliers. Also, based on the sparse model used in CSPCA, an optimal weight is assigned to each of the original feature, which in turn provides the output with good interpretability. With the output of our CSPCA, we can effectively analyze the importance of each feature under the PCA criteria. Our new objective function is convex, and we propose an iterative algorithm to optimize it. We apply the CSPCA algorithm to feature selection and conduct extensive experiments on seven benchmark datasets. Experimental results demonstrate that the proposed algorithm outperforms state-of-the-art unsupervised feature selection algorithms.
108,634,422
visual words for automatic lip reading
Lip reading is used to understand or interpret speech without hearing it, a technique especially mastered by people with hearing difficulties. The ability to lip read enables a person with a hearing impairment to communicate with others and to engage in social activities, which otherwise would be difficult. Recent advances in the fields of computer vision, pattern recognition, and signal processing has led to a growing interest in automating this challenging task of lip reading. Indeed, automating the human ability to lip read, a process referred to as visual speech recognition, could open the door for other novel applications. This thesis investigates various issues faced by an automated lip-reading system and proposes a novel "visual words" based approach to automatic lip reading. The proposed approach includes a novel automatic face localisation scheme and a lip localisation method.
108,686,177
distributed k means algorithm
In this paper we provide a fully distributed implementation of the k-means clustering algorithm, intended for wireless sensor networks where each agent is endowed with a possibly high-dimensional observation (e.g., position, humidity, temperature, etc.) The proposed algorithm, by means of one-hop communication, partitions the agents into measure-dependent groups that have small in-group and large out-group "distances". Since the partitions may not have a relation with the topology of the network--members of the same clusters may not be spatially close--the algorithm is provided with a mechanism to compute the clusters'centroids even when the clusters are disconnected in several sub-clusters.The results of the proposed distributed algorithm coincide, in terms of minimization of the objective function, with the centralized k-means algorithm. Some numerical examples illustrate the capabilities of the proposed solution.
108,703,518
resourceful contextual bandits
We study contextual bandits with ancillary constraints on resources, which are common in real-world applications such as choosing ads or dynamic pricing of items. We design the first algorithm for solving these problems that handles constrained resources other than time, and improves over a trivial reduction to the non-contextual case. We consider very general settings for both contextual bandits (arbitrary policy sets, e.g. Dudik et al. (UAI'11)) and bandits with resource constraints (bandits with knapsacks, Badanidiyuru et al. (FOCS'13)), and prove a regret guarantee with near-optimal statistical properties.
109,359,232
location verification systems under spatially correlated shadowing
The verification of the location information utilized in wireless communication networks is a subject of growing importance. In this work, we formally analyze, for the first time, the performance of a wireless location verification system (LVS) under the realistic setting of spatially correlated shadowing. Our analysis illustrates that anticipated levels of correlated shadowing can lead to a dramatic performance improvement of a received signal strength (RSS)-based LVS. We also analyze the performance of an LVS that utilizes differential received signal strength (DRSS), formally proving the rather counter-intuitive result that a DRSS-based LVS has identical performance to that of an RSS-based LVS, for all levels of correlated shadowing. Even more surprisingly, the identical performance of RSS and DRSS-based LVSs is found to hold even when the adversary does not optimize his true location. Only in the case where the adversary does not optimize all variables under his control, do we find the performance of an RSS-based LVS to be better than a DRSS-based LVS. The results reported here are important for a wide range of emerging wireless communication applications whose proper functioning depends on the authenticity of the location information reported by a transceiver.
109,419,343
symbolic control design of nonlinear networked control systems
Networked Control Systems (NCS) are distributed systems where plants, sensors, actuators and controllers communicate over shared networks. Non-ideal behaviors of the communication network include variable sampling/transmission intervals and communication delays, packet losses, communication constraints and quantization errors. NCS have been the object of intensive study in the last few years. However, due to the inherent complexity of NCS, current literature focuses on only a subset of these non-idealities and mostly considers stability and stabilizability problems. Recent technology advances indeed demand that different and more complex control objectives are considered. In this paper we present first a general model of NCS, including all the non-idealities of the communication network; then, we propose a symbolic model approach to the control design with objectives expressed in terms of non-deterministic transition systems. The presented results are based on recent advances in symbolic control design of hybrid and continuous control systems. An example in the context of robot motion planning with remote control is included, showing the effectiveness of the approach taken.
109,496,234
recommendation and personalization a survey
Recommendation and personalization attempt to reduce information overload and retain customers. While research in both recommender systems and personalization grew mainly out of information retrieval, both areas have emerged from nascent levels to veritable and challenging research areas in their own right. Whereas no technical or sophisticated methodologies exist by which to build such systems, the field also lacks a comprehensive, yet manageable survey by which to study recommendation systems and personalization facilities. In this paper, we attempt to fill that gap by presenting a thematic approach toward studying recommendation and personalization. Specifically, we present three major representative personalization themes: recommendation; induction, exploration, and exploitation of social networks; and personalization of information access. We unify the presentation of the three themes which we have extracted from the rich landscape of recommender system and personalization research via a functional metaphor, where inputs and output to a function are identified in each theme and instantiated through a number of systems and projects visited. In addition, we examine how a number of systems implement the function through various operators and techniques. Finally, we cover several broadening aspects, such as targeting, privacy and trust, and evaluation, regarding recommendation and personalization and present visions of future directions and challenges.
109,899,698
simultaneous diagonalization the asymmetric low rank and noisy settings
Simultaneous matrix diagonalization is used as a subroutine in many machine learning problems, including blind source separation and paramater estimation in latent variable models. Here, we extend algorithms for performing joint diagonalization to low-rank and asymmetric matrices, and we also provide extensions to the perturbation analysis of these methods. Our results allow joint diagonalization to be applied in several new settings.
110,091,294
improved approximations for robust mincut and shortest path
In two-stage robust optimization the solution to a problem is built in two stages: In the first stage a partial, not necessarily feasible, solution is exhibited. Then the adversary chooses the "worst" scenario from a predefined set of scenarios. In the second stage, the first-stage solution is extended to become feasible for the chosen scenario. The costs at the second stage are larger than at the first one, and the objective is to minimize the total cost paid in the two stages. #R##N#We give a 2-approximation algorithm for the robust mincut problem and a ({\gamma}+2)-approximation for the robust shortest path problem, where {\gamma} is the approximation ratio for the Steiner tree. This improves the factors (1+\sqrt2) and 2({\gamma}+2) from [Golovin, Goyal and Ravi. Pay today for a rainy day: Improved approximation algorithms for demand-robust min-cut and shortest path problems. STACS 2006]. In addition, our solution for robust shortest path is simpler and more efficient than the earlier ones; this is achieved by a more direct algorithm and analysis, not using some of the standard demand-robust optimization techniques.
110,198,305
evaluation of security solutions for android systems
With the increasing usage of smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not aways properly designed for smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the Android operating system has the highest market share today, we decided to focus on it in this study in which we review some of the state-of-the-art security solutions for Android-based smartphones. In addition, we present a set of evaluation criteria aiming at evaluating security mechanisms that are specifically designed for Android-based smartphones. We believe that the proposed framework will help security solution designers develop more effective solutions and assist security experts evaluate the effectiveness of security solutions for Android-based smartphones.
110,739,889
mini step strategy for transient analysis
Domain decomposition methods are widely used to solve sparse linear systems from scientific problems, but they are not suited to solve sparse linear systems extracted from integrated circuits. The reason is that the sparse linear system of integrated circuits may be non-diagonal-dominant, and domain decomposition method might be unconvergent for these non-diagonal-dominant matrices. In this paper, we propose a mini-step strategy to do the circuit transient analysis. Different from the traditional large-step approach, this strategy is able to generate diagonal-dominant sparse linear systems. As a result, preconditioned domain decomposition methods can be used to simulate the large integrated circuits on the supercomputers and clouds.
111,891,052
effect of transmission correlations on the performance of general space time codes in single keyhole channels
The effect of spatial correlation of Rayleigh fading channel has been extensively studied in literatures. In Rayleigh channel, it has been shown that the transmission correlations always degrade the performance of space-time codes in high SNR regimes. In this correspondence, however, we show that when MIMO channels experience single-keyhole conditions, the effect of spatial correlations between transmission antennas is more sophisticated for non-orthogonal space-time codes: when $M>N$ (the number of transmission antennas greater than the receiving antennas), depending on how the correlation matrix $\mathbf{A}$ beamforms the code words difference matrix $\mathbf{\Delta}$, the performance of space-time codes can be either degraded or improved in the high SNR regimes. In particular, we provide a new measure which is based on the eigenvalues of $\mathbf{\Delta}$, and the numbers of transmission and receiving antennas, to exam if there exist some correlation matrices that can improve the performance of space-time codes in high SNR regimes. Previous studies on the effect of spatial correlation over single-keyhole conditions only concentrated on the cases when the space-time codes are orthogonal, while our new measure is for general space-time codes, and can also be used to explain the previous findings for orthogonal cases.
111,947,006
the impact of surface size on the radiative thermal behavior of embedded systems
This paper introduces a new global analytical model of the heat dissipation process that occurs in passively-cooled embedded systems, and explicits under what circumstances the folklore assumption that exponential cooling laws apply in such context is valid. Since the power consumption and reliability of microprocessors are highly dependent on temperature, both designers and, later on, run-time temperature management units must be able rely upon accurate heating and cooling models to handle heat generation and peak temperature. If exponential cooling models are justified for actively-cooled microprocessors, e.g., by forced air or water cooling, for passively cooled processors however, as frequently found in embedded systems such as mobile phones, an exponential law may not be theoretically justified. Here, we analyzed the tractability of the exact cooling law for a passively cooled body, subject to radiative cooling and a modest level of heat loss via convection. Focusing then on embedded microprocessors, we compare the performance difference between our new passive cooling law and the conventionally-used exponential one. We show that the differences between the exact solution and the exponential cooling law are not significant, and even negligible, for small surfaces of the order 10cm$^2$. However, for larger surface sizes, the radiative cooling component may become comparable to the convective cooling component. Our results thus suggest that, in the absence of accurate temperature measurements, an exponential cooling law is accurate enough for small-sized SoC systems that require low processing overhead.
111,979,814
stochastic hype flow based modelling of stochastic hybrid systems
Stochastic HYPE is a novel process algebra that models stochastic, instantaneous and continuous behaviour. It develops the flow-based approach of the hybrid process algebra HYPE by replacing non-urgent events with events with exponentially-distributed durations and also introduces random resets. The random resets allow for general stochasticity, and in particular allow for the use of event durations drawn from distributions other than the exponential distribution. To account for stochasticity, the semantics of stochastic HYPE target piecewise deterministic Markov processes (PDMPs), via intermediate transition-driven stochastic hybrid automata (TDSHA) in contrast to the hybrid automata used as semantic target for HYPE. Stochastic HYPE models have a specific structure where the controller of a system is separate from the continuous aspect of this system providing separation of concerns and supporting reasoning. A novel equivalence is defined which captures when two models have the same stochastic behaviour (as in stochastic bisimulation), instantaneous behaviour (as in classical bisimulation) and continuous behaviour. These techniques are illustrated via an assembly line example.
112,114,804
greedy online bipartite matching on random graphs
We study the average performance of online greedy matching algorithms on G(n,n,p), the random bipartite graph with n vertices on each side and edges occurring independently with probability p = p(n). In the online model, vertices on one side of the graph are given up front while vertices on the other side arrive sequentially; when a vertex arrives its edges are revealed and it must be immediately matched or dropped. We begin by analyzing the oblivious algorithm, which tries to match each arriving vertex to a random neighbor, even if the neighbor has already been matched. The algorithm is shown to have a performance ratio of at least 1 − 1/e for all monotonic functions p(n), where the performance ratio is defined asymptotically as the ratio of the expected matching size given by the algorithm to the expected maximum matching size. Next we show that the conventional greedy algorithm, which assigns each vertex to a random unmatched neighbor, has a performance ratio of at least 0.837 for all monotonic functions p(n). Under the G(n,n,p) model, the performance of greedy is equivalent to the performance of the well known ranking algorithm, so our results show that ranking has a performance ratio of at least 0.837. We finally consider vertex-weighted bipartite matching. Our proofs are based on simple differential equations that describe the evolution of the matching process.
112,153,112
convolutional neural networks for joint object detection and pose estimation a comparative study
In this paper we study the application of convolutional neural networks for jointly detecting objects depicted in still images and estimating their 3D pose. We identify different feature representations of oriented objects, and energies that lead a network to learn this representations. The choice of the representation is crucial since the pose of an object has a natural, continuous structure while its category is a discrete variable. We evaluate the different approaches on the joint object detection and pose estimation task of the Pascal3D+ benchmark using Average Viewpoint Precision. We show that a classification approach on discretized viewpoints achieves state-of-the-art performance for joint object detection and pose estimation, and significantly outperforms existing baselines on this benchmark.
112,155,648
an empirical study of sections in classifying disease outbreak reports
Identifying articles that relate to infectious diseases is a necessary step for any automatic bio-surveillance system that monitors news articles from the Internet. Unlike scientific articles that are available in a strongly structured form, news articles are usually loosely structured. In this chapter, we investigate the importance of each section and the effect of section weighting on the performance of text classification. The experimental results show that (1) classification models using the headline and leading sentence achieve a high performance in terms of F-score compared to other parts of the article; (2) all section with bag-of-word representation (full text) achieves the highest recall; and (3) section weighting information can help to improve accuracy.
112,464,607
priority based coordination of mobile robots
Since the end of the 1980's, the development of self-driven autonomous vehicles is an intensive research area in most major industrial countries. Positive socio-economic potential impacts include a decrease of crashes, a reduction of travel times, energy efficiency improvements, and a reduced need of costly physical infrastructure. Some form of vehicle-to-vehicle and/or vehicle-to-infrastructure cooperation is required to ensure a safe and efficient global transportation system. This thesis deals with a particular form of cooperation by studying the problem of coordinating multiple mobile robots at an intersection area. Most of coordination systems proposed in previous work consist of planning a trajectory and to control the robots along the planned trajectory: that is the plan-as-program paradigm where planning is considered as a generative mechanism of action. The approach of the thesis is to plan priorities – the relative order of robots to go through the intersection – which is much weaker as many trajectories respect the same priorities. Then, priorities are merely used as a coordination resource to guide robots through the intersection. Once priorities are assigned, robots are controlled through a control law preserving the assigned priorities. It results in a more robust coordination system – able to handle a large class of unexpected events in a reactive manner – particularly well adapted for an application to the coordination of autonomous vehicles at intersections where cars, public transport and pedestrians share the road.
112,551,182
evidential confirmation as transformed probability
A considerable body of work in AI has been concerned with aggregating measures of confirmatory and disconfirmatory evidence for a common set of propositions. Claiming classical probability to be inadequate or inappropriate, several researchers have gone so far as to invent new formalisms and methods. We show how to represent two major such alternative approaches to evidential confirmation not only in terms of transformed (Bayesian) probability, but also in terms of each other. This unifies two of the leading approaches to confirmation theory, by showing that a revised MYCIN Certainty Factor method [12] is equivalent to a special case of Dempster-Shafer theory. It yields a well-understood axiomatic basis, i.e. conditional independence, to interpret previous work on quantitative confirmation theory. It substantially resolves the "taxe-them-or-leave-them" problem of priors: MYCIN had to leave them out, while PROSPECTOR had to have them in. It recasts some of confirmation theory's advantages in terms of the psychological accessibility of probabilistic information in different (transformed) formats. Finally, it helps to unify the representation of uncertain reasoning (see also [11]).
112,666,333
reinforcement and imitation learning via interactive no regret learning
Recent work has demonstrated that problems-- particularly imitation learning and structured prediction-- where a learner's predictions influence the input-distribution it is tested on can be naturally addressed by an interactive approach and analyzed using no-regret online learning. These approaches to imitation learning, however, neither require nor benefit from information about the cost of actions. We extend existing results in two directions: first, we develop an interactive imitation learning approach that leverages cost information; second, we extend the technique to address reinforcement learning. The results provide theoretical support to the commonly observed successes of online approximate policy iteration. Our approach suggests a broad new family of algorithms and provides a unifying view of existing techniques for imitation and reinforcement learning.
113,439,672
model checking markov chains against unambiguous buchi automata
We give a polynomial-time algorithm for model checking finite Markov chains against omega-regular specifications given as unambiguous Buchi automata.
113,491,885
privacy4ictd in india exploring perceptions attitudes and awareness about ict use
Several ICT studies give anecdotal evidences showing privacy to be an area of concern that can influence adoption of technology in the developing world. However, in-depth understanding of end users' privacy attitudes and awareness is largely unexplored in developing countries such as India. We conducted a survey with 10,427 Indian citizens to bring forth various insights on privacy expectations and perceptions of end users. Our study explores end-users' privacy expectations on three ICT platforms - mobile phones, OSN (Online Social Network), and government projects. Our results, though preliminary, show that users disproportionately consider financial details as personal information in comparison to medical records. Users heavily use mobile phones to store personal details and show high trust in mobile service providers for protecting the private data. However, users show concerns that mobile service provider may allow improper access of their personal information to third parties and government. We also find that female participants in the study were marginally more conscious of their privacy than males. To the best of our knowledge, this work presents the largest privacy study which benchmarks privacy perceptions among Indian citizens. Understanding users' privacy perceptions can help improve technology adoption and develop policies and laws for improving technology experience and enabling development for a better life in India.
113,556,353
on evaluation validity in music autotagging
Music autotagging, an established problem in Music Information Retrieval, aims to alleviate the human cost required to manually annotate collections of recorded music with textual labels by automating the process. Many autotagging systems have been proposed and evaluated by procedures and datasets that are now standard (used in MIREX, for instance). Very little work, however, has been dedicated to determine what these evaluations really mean about an autotagging system, or the comparison of two systems, for the problem of annotating music in the real world. In this article, we are concerned with explaining the figure of merit of an autotagging system evaluated with a standard approach. Specifically, does the figure of merit, or a comparison of figures of merit, warrant a conclusion about how well autotagging systems have learned to describe music with a specific vocabulary? The main contributions of this paper are a formalization of the notion of validity in autotagging evaluation, and a method to test it in general. We demonstrate the practical use of our method in experiments with three specific state-of-the-art autotagging systems --all of which are reproducible using the linked code and data. Our experiments show for these specific systems in a simple and objective two-class task that the standard evaluation approach does not provide valid indicators of their performance.
113,606,198
a blind adaptive cdma receiver based on state space structures
Code Division Multiple Access (CDMA) is a channel access method, based on spread-spectrum technology, used by various radio technologies world-wide. In general, CDMA is used as an access method in many mobile standards such as CDMA2000 and WCDMA. We address the problem of blind multiuser equalization in the wideband CDMA system, in the noisy multipath propagation environment. Herein, we propose three new blind receiver schemes, which are based on state space structures and Independent Component Analysis (ICA). These blind state-space receivers (BSSR) do not require knowledge of the propagation parameters or spreading code sequences of the users they primarily exploit the natural assumption of statistical independence among the source signals. We also develop three semi blind adaptive detectors by incorporating the new adaptive methods into the standard RAKE receiver structure. Extensive comparative case study, based on Bit error rate (BER) performance of these methods, is carried out for different number of users, symbols per user, and signal to noise ratio (SNR) in comparison with conventional detectors, including the Blind Multiuser Detectors (BMUD) and Linear Minimum mean squared error (LMMSE). The results show that the proposed methods outperform the other detectors in estimating the symbol signals from the received mixed CDMA signals. Moreover, the new blind detectors mitigate the multi access interference (MAI) in CDMA.
113,617,344
cooperative environmental monitoring for ptz visual sensor networks a payoff based learning approach
This paper investigates cooperative environmental monitoring for Pan-Tilt-Zoom (PTZ) visual sensor networks. We first present a novel formulation of the optimal environmental monitoring problem, whose objective function is intertwined with the uncertain state of the environment. In addition, due to the large volume of vision data, it is desired for each sensor to execute processing through local computation and communication. To address the issues, we present a distributed solution to the problem based on game theoretic cooperative control and payoff-based learning. At the first stage, a utility function is designed so that the resulting game constitutes a potential game with potential function equal to the group objective function, where the designed utility is shown to be computable through local image processing and communication. Then, we present a payoff-based learning algorithm so that the sensors are led to the global objective function maximizers without using any prior information on the environmental state. Finally, we run experiments to demonstrate the effectiveness of the present approach.
113,720,669
the handbook of engineering self aware and self expressive systems
When faced with the task of designing and implementing a new self-aware and self-expressive computing system, researchers and practitioners need a set of guidelines on how to use the concepts and foundations developed in the Engineering Proprioception in Computing Systems (EPiCS) project. This report provides such guidelines on how to design self-aware and self-expressive computing systems in a principled way. We have documented different categories of self-awareness and self-expression level using architectural patterns. We have also documented common architectural primitives, their possible candidate techniques and attributes for architecting self-aware and self-expressive systems. Drawing on the knowledge obtained from the previous investigations, we proposed a pattern driven methodology for engineering self-aware and self-expressive systems to assist in utilising the patterns and primitives during design. The methodology contains detailed guidance to make decisions with respect to the possible design alternatives, providing a systematic way to build self-aware and self-expressive systems. Then, we qualitatively and quantitatively evaluated the methodology using two case studies. The results reveal that our pattern driven methodology covers the main aspects of engineering self-aware and self-expressive systems, and that the resulted systems perform significantly better than the non-self-aware systems.
113,745,951
inter sensing time optimization in cognitive radio networks
We consider a set of primary channels that operate in an unslotted fashion, switching activity at random times. A secondary user senses the primary channels searching for transmission opportunities. If a channel is sensed to be free, the secondary terminal transmits, and if sensed to be busy, the secondary transmitter remains silent.We solve the problem of determining the optimal time after which a primary channel needs to be sensed again depending on the sensing outcome. The objective is to find the inter-sensing times such that the mean secondary throughput is maximized while imposing a constraint over the maximum tolerable interference inflicted on the primary network. Our numerical results show that by optimizing the sensing-dependent inter-sensing times, our proposed scheme reduces the impact of sensing errors caused by false alarm and misdetection and outperforms the case of a single sensing period.
113,863,356
onboard multivariable controller design for a small scale helicopter using coefficient diagram method
A mini scale helicopter exhibits not only increased sensitivity to control inputs and disturbances, but also higher bandwidth of its dynamics. These properties make model helicopters, as a flying robot, more difficult to control. The dynamics model accuracy will determine the performance of the designed controller. It is attractive in this regards to have a controller that can accommodate the unmodeled dynamics or parameter changes and perform well in such situations. Coefficient Diagram Method (CDM) is chosen as the candidate to synthesize such a controller due to its simplicity and convenience in demonstrating integrated performance measures including equivalent time constant, stability indices and robustness. In this study, CDM is implemented for a design of multivariable controller for a small scale helicopter during hover and cruise flight. In the synthesis of MIMO CDM, good design common sense based on hands-on experience is necessary. The low level controller algorithm is designed as part of hybrid supervisory control architecture to be implemented on an onboard computer system. Its feasibility and performance are evaluated based on its robustness, desired time domain system responses and compliance to hard-real time requirements.
113,996,647
measuring science irresistible temptations easy shortcuts and dangerous consequences
In benchmarking international research, although publication and citation analyses should not be used to compare different disciplines, scientometrists frequently fail to resist the temptation to present rankings based on total publications and citations. Such measures are affected by significant distortions, due to the uneven fertility across scientific disciplines and the dishomogeneity of scientific specialisation among nations and universities. In this paper, we provide an indication of the extent of the distortions when comparative bibliometric analyses fail to recognise the range of levels of scientific fertility, not only within a given major disciplinary area but also within the different scientific disciplines encompassed by the same area.
114,547,669
preferred well founded semantics for logic programming by alternating fixpoints preliminary report
We analyze the problem of defining well-founded semantics for ordered logic programs within a general framework based on alternating fixpoint theory. We start by showing that generalizations of existing answer set approaches to preference are too weak in the setting of well-founded semantics. We then specify some informal yet intuitive criteria and propose a semantical framework for preference handling that is more suitable for defining well-founded semantics for ordered logic programs. The suitability of the new approach is convinced by the fact that many attractive properties are satisfied by our semantics. In particular, our semantics is still correct with respect to various existing answer sets semantics while it successfully overcomes the weakness of their generalization to well-founded semantics. Finally, we indicate how an existing preferred well-founded semantics can be captured within our semantical framework.
114,822,237
concept oriented programming from classes to concepts and from inheritance to inclusion
For the past several decades, programmers have been modeling things in the world with trees using hierarchies of classes and object-oriented programming (OOP) languages. In this paper, we describe a novel approach to programming, called concept-oriented programming (COP), which generalizes classes and inheritance by introducing concepts and inclusion, respectively.
115,363,455
thue s 1914 paper a translation
This paper includes notes to accompany a reading of Thue's 1914 paper "Probleme uber Veranderungen von Zeichenreihen nach gegebenen Reglen", along with a translation of that paper. Thue's 1914 paper is mainly famous for proving an early example of an undecidable problem, cited prominently by Post. However, Post's paper principally makes use of the definition of Thue systems, described on the first two pages of Thue's paper, and does not depend on the more specific results in the remainder of Thue's paper. A closer study of the remaining parts of that paper highlight a number of important themes in the history of computing: the transition from algebra to formal language theory, the analysis of the "computational power" (in a pre-1936 sense) of rules, and the development of algorithms to generate rule-sets.
115,652,783
improved estimation of the spectral efficiency versus energy per bit tradeoff in the wideband regime
In this paper, a new lower bound on spectral efficiency in the low-power wideband regime is derived and utilized to develop an improved estimate of the behavior of spectral efficiency above but in the vicinity of the Shannon limit.
115,693,837
cloud computing benefits for educational institutions
Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) are used as business model for Cloud Computing. The paper also introduces the cloud computing infrastructure provided by Microsoft, Google and Amazon Web Service. In this paper we will review the features the educational institutions can use from the cloud computing providers to increase the benefits of students and teachers.
116,214,155
on the absence of the rip in real world applications of compressed sensing and the rip in levels
The purpose of this paper is twofold. The first is to point out that the Restricted Isometry Property (RIP) does not hold in many applications where compressed sensing is successfully used. This includes fields like Magnetic Resonance Imaging (MRI), Computerized Tomography, Electron Microscopy, Radio Interferometry and Fluorescence Microscopy. We demonstrate that for natural compressed sensing matrices involving a level based reconstruction basis (e.g. wavelets), the number of measurements required to recover all $s$-sparse signals for reasonable $s$ is excessive. In particular, uniform recovery of all $s$-sparse signals is quite unrealistic. This realisation shows that the RIP is insufficient for explaining the success of compressed sensing in various practical applications. The second purpose of the paper is to introduce a new framework based on a generalised RIP-like definition that fits the applications where compressed sensing is used. We show that the shortcomings that show that uniform recovery is unreasonable no longer apply if we instead ask for structured recovery that is uniform only within each of the levels. To examine this phenomenon, a new tool, termed the 'Restricted Isometry Property in Levels' is described and analysed. Furthermore, we show that with certain conditions on the Restricted Isometry Property in Levels, a form of uniform recovery within each level is possible. Finally, we conclude the paper by providing examples that demonstrate the optimality of the results obtained.
116,893,223
learning with forest sparsity
In this paper, we investigate a new model called \emph{forest sparsity} for sparse learning and compressive sensing. It is an extension of standard sparsity when the support set of the data is consisted of a series of mutually correlated trees. Forest sparsity exists in many practical applications such as multi-contrast MRI, parallel MRI, multispectral image and color image recovery. We theoretically prove the benefit of forest sparsity, that much less measurements are required for successful recovery in compressive sensing. Moreover, a new algorithm is proposed and applied on several applications with forest sparsity. All experimental results validate the superiority of forest sparsity.
117,361,776
the information flow foundation for conceptual knowledge organization
The sharing of ontologies between diverse communities of discourse allows them to compare their own information structures with that of other communities that share a common terminology and semantics - ontology sharing facilitates interoperability between online knowledge organizations. This paper demonstrates how ontology sharing is formalizable within the conceptual knowledge model of Information Flow (IF). Information Flow indirectly represents sharing through a specifiable, ontology extension hierarchy augmented with synonymic type equivalencing - two ontologies share terminology and meaning through a common generic ontology that each extends. Using the paradigm of participant community ontologies formalized as IF logics, a common shared extensible ontology formalized as an IF theory, participant community specification links from the common ontology to the participating community ontology formalizable as IF theory interpretations, this paper argues that ontology sharing is concentrated in a virtual ontology of community connections, and demonstrates how this virtual ontology is computable as the fusion of the participant ontologies - the quotient of the sum of the participant ontologies modulo the ontological sharing structure.
117,491,949
optimal topology of multi agent systems with two leaders a zero sum game perspective
It is typical to assume that there is no conflict of interest among leaders. Under such assumption, it is known that, for a multi-agent system with two leaders, if the followers' interaction subgraph is undirected and connected, then followers will converge to a convex combination of two leaders' states with linear consensus protocol. In this paper, we introduce the conflict between leaders: by choosing k followers to connect with, every leader attempts all followers converge to himself closer than that of the other. By using graph theory and matrix theory, we formulate this conflict as a standard two-player zero-sum game and give some properties about it. It is noteworthy that the interaction graph here is generated from the conflict between leaders. Interestingly, we find that to find the optimal topology of the system is equivalent to solve a Nash equilibrium. Especially for the case of choosing one connected follower, the necessary and sufficient condition for an interaction graph to be the optimal one is given. Moreover, if followers' interaction graph is a circulant graph or a graph with a center node, then the system's optimal topology is obtained. Simulation examples are provided to validate the effectiveness of the theoretical results.
117,540,911
load balancing in two tier cellular networks with open and hybrid access femtocells
Femtocell base station (BS) is a low-power, low-price BS based on the cellular communication technology. It is expected to become a cost-effective solution for improving the communication performance of indoor users, whose traffic demands are large in general. We propose long-term parameter optimization schemes for open and hybrid femtocells, which maximize the average throughput of macrocell users by offloading the macro users’ downlink traffic to femtocells. To achieve this goal, load balancing between femtocells and macrocells is needed, and hence, we jointly optimize the ratio of dedicated resources for femtocells as well as the femtocell service area in open access femtocell networks by numerical analysis. Then, we extend our algorithm to hybrid access femtocells, where some intra-femtocell resources are dedicated only for femtocell owners, while remaining resources are shared with foreign macrocell users. Our evaluation results show that the proposed parameter optimization schemes significantly enhance the performance of macrocell users because of the large offloading gain. The benefits provided to femtocell users are also adaptively maintained according to the femtocell users’ requirements. The results in this paper also provide insights about the situations where femtocell deployment on dedicated channels is preferred to the cochannel deployment.
117,543,203
a domain specific transformation language
Domain specific languages (DSLs) allow domain experts to model parts of the system under development in a problem-oriented no- tation that is well-known in the respective domain. The introduction of a DSL is often accompanied the desire to transform its instances. Although the modeling language is domain specific, the transformation language used to describe modifications, such as model evolution or refactoring operations, on the underlying model, usually is a rather domain inde- pendent language nowadays. Most transformation languages use a generic notation of model patterns that is closely related to typed and attributed graphs or to object di- agrams (the abstract syntax). A notation that reflects the transformed elements of the original DSL in its own concrete syntax would be strongly preferable, because it would be more comprehensible and easier to learn for domain experts. In this paper we present a transformation language that reuses the concrete syntax of a textual modeling language for hier-
118,358,129
a diffie hellman like key exchange protocol based on multivariate ore polynomials
In this paper we present a key exchange protocol based on multivariate non-commutative polynomial rings, analogous to the classic Diffie-Hellman method. Ourtechnique extends the proposed scheme of Boucher et al. from 2010. Their method was broken by Dubois and Kammerer in 2011, who exploited the Euclidean domain structure of the chosen ring. However, our proposal is immune against such attacks, without losing the advantages of non-commutative polynomial rings as outlined by Boucher et al. Moreover, our extension is not restricted to any particular ring, but is designed to allow users to readily choose from a large class of rings when applying the protocol.